forked from LeenkxTeam/LNXSDK
		
	
		
			
				
	
	
		
			213 lines
		
	
	
		
			6.8 KiB
		
	
	
	
		
			Haxe
		
	
	
	
	
	
			
		
		
	
	
			213 lines
		
	
	
		
			6.8 KiB
		
	
	
	
		
			Haxe
		
	
	
	
	
	
| /*
 | |
|  * Copyright (C)2014-2020 Haxe Foundation
 | |
|  *
 | |
|  * Permission is hereby granted, free of charge, to any person obtaining a
 | |
|  * copy of this software and associated documentation files (the "Software"),
 | |
|  * to deal in the Software without restriction, including without limitation
 | |
|  * the rights to use, copy, modify, merge, publish, distribute, sublicense,
 | |
|  * and/or sell copies of the Software, and to permit persons to whom the
 | |
|  * Software is furnished to do so, subject to the following conditions:
 | |
|  *
 | |
|  * The above copyright notice and this permission notice shall be included in
 | |
|  * all copies or substantial portions of the Software.
 | |
|  *
 | |
|  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 | |
|  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 | |
|  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
 | |
|  * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 | |
|  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
 | |
|  * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
 | |
|  * DEALINGS IN THE SOFTWARE.
 | |
|  */
 | |
| 
 | |
| package js.node;
 | |
| 
 | |
| import haxe.extern.EitherType;
 | |
| import js.node.Buffer;
 | |
| import js.node.tls.SecureContext;
 | |
| import js.node.tls.SecurePair;
 | |
| import js.node.tls.Server;
 | |
| import js.node.tls.TLSSocket;
 | |
| #if haxe4
 | |
| import js.lib.Error;
 | |
| #else
 | |
| import js.Error;
 | |
| #end
 | |
| 
 | |
| typedef TlsOptionsBase = {
 | |
| 	/**
 | |
| 		If true the server will reject any connection which is not authorized with the list of supplied CAs.
 | |
| 		This option only has an effect if `requestCert` is true.
 | |
| 		Default: false.
 | |
| 	**/
 | |
| 	@:optional var rejectUnauthorized:Bool;
 | |
| 
 | |
| 	/**
 | |
| 		possible NPN protocols. (Protocols should be ordered by their priority).
 | |
| 	**/
 | |
| 	@:optional var NPNProtocols:EitherType<Array<String>, Buffer>;
 | |
| }
 | |
| 
 | |
| typedef TlsServerOptionsBase = {
 | |
| 	> TlsOptionsBase,
 | |
| 
 | |
| 	/**
 | |
| 		If true the server will request a certificate from clients that connect
 | |
| 		and attempt to verify that certificate.
 | |
| 		Default: false.
 | |
| 	**/
 | |
| 	@:optional var requestCert:Bool;
 | |
| 
 | |
| 	/**
 | |
| 		A function that will be called if client supports SNI TLS extension.
 | |
| 		Two argument will be passed to it: `servername`, and `cb`.
 | |
| 		SNICallback should invoke `cb(null, ctx)`, where `ctx` is a SecureContext instance.
 | |
| 		(You can use tls.createSecureContext(...) to get proper `SecureContext`).
 | |
| 		If `SNICallback` wasn't provided - default callback with high-level API will be used.
 | |
| 	**/
 | |
| 	@:optional var SNICallback:#if (haxe_ver >= 4)(servername:String, cb:(Error->SecureContext)) -> Void #else String->(Error->SecureContext)->Void #end;
 | |
| }
 | |
| 
 | |
| typedef TlsClientOptionsBase = {
 | |
| 	> TlsOptionsBase,
 | |
| 
 | |
| 	/**
 | |
| 		A Buffer instance, containing TLS session.
 | |
| 	**/
 | |
| 	@:optional var session:Buffer;
 | |
| 
 | |
| 	/**
 | |
| 		If true - OCSP status request extension would be added to client hello,
 | |
| 		and OCSPResponse event will be emitted on socket before establishing secure communication
 | |
| 	**/
 | |
| 	@:optional var requestOCSP:Bool;
 | |
| }
 | |
| 
 | |
| /**
 | |
| 	Base structure for options object used in tls methods.
 | |
| **/
 | |
| typedef TlsCreateServerOptions = {
 | |
| 	> TlsServerOptionsBase,
 | |
| 	> SecureContextOptions,
 | |
| 
 | |
| 	/**
 | |
| 		Abort the connection if the SSL/TLS handshake does not finish in this many milliseconds.
 | |
| 		The default is 120 seconds.
 | |
| 		A 'clientError' is emitted on the `tls.Server` object whenever a handshake times out.
 | |
| 	**/
 | |
| 	@:optional var handshakeTimeout:Int;
 | |
| 
 | |
| 	/**
 | |
| 		An integer specifying the seconds after which TLS session identifiers
 | |
| 		and TLS session tickets created by the server are timed out.
 | |
| 		See SSL_CTX_set_timeout for more details.
 | |
| 	**/
 | |
| 	@:optional var sessionTimeout:Int;
 | |
| 
 | |
| 	/**
 | |
| 		A 48-byte `Buffer` instance consisting of 16-byte prefix, 16-byte hmac key, 16-byte AES key.
 | |
| 		You could use it to accept tls session tickets on multiple instances of tls server.
 | |
| 
 | |
| 		NOTE: Automatically shared between cluster module workers.
 | |
| 	**/
 | |
| 	@:optional var ticketKeys:Buffer;
 | |
| }
 | |
| 
 | |
| typedef TlsConnectOptions = {
 | |
| 	> TlsClientOptionsBase,
 | |
| 	> SecureContextOptions,
 | |
| 
 | |
| 	/**
 | |
| 		Host the client should connect to.
 | |
| 		Defaults to 'localhost'
 | |
| 	**/
 | |
| 	@:optional var host:String;
 | |
| 
 | |
| 	/**
 | |
| 		Port the client should connect to
 | |
| 	**/
 | |
| 	@:optional var port:Int;
 | |
| 
 | |
| 	/**
 | |
| 		Establish secure connection on a given socket rather than creating a new socket.
 | |
| 		If this option is specified, `host` and `port` are ignored.
 | |
| 	**/
 | |
| 	@:optional var socket:js.node.net.Socket;
 | |
| 
 | |
| 	/**
 | |
| 		Creates unix socket connection to path.
 | |
| 		If this option is specified, host and port are ignored.
 | |
| 	**/
 | |
| 	@:optional var path:String;
 | |
| 
 | |
| 	/**
 | |
| 		Servername for SNI (Server Name Indication) TLS extension.
 | |
| 	**/
 | |
| 	@:optional var servername:String;
 | |
| 
 | |
| 	/**
 | |
| 		An override for checking server's hostname against the certificate.
 | |
| 		Should return an error if verification fails. Return `js.Lib.undefined` if passing.
 | |
| 	**/
 | |
| 	@:optional var checkServerIdentity:String -> {}->Dynamic; // TODO: peer cerficicate structure
 | |
| 
 | |
| }
 | |
| 
 | |
| /**
 | |
| 	The tls module uses OpenSSL to provide Transport Layer Security
 | |
| 	and/or Secure Socket Layer: encrypted stream communication.
 | |
| **/
 | |
| @:jsRequire("tls")
 | |
| extern class Tls {
 | |
| 	/**
 | |
| 		renegotiation limit, default is 3.
 | |
| 	**/
 | |
| 	static var CLIENT_RENEG_LIMIT:Int;
 | |
| 
 | |
| 	/**
 | |
| 		renegotiation window in seconds, default is 10 minutes.
 | |
| 	**/
 | |
| 	static var CLIENT_RENEG_WINDOW:Int;
 | |
| 
 | |
| 	/**
 | |
| 		Size of slab buffer used by all tls servers and clients. Default: 10 * 1024 * 1024.
 | |
| 
 | |
| 		Don't change the defaults unless you know what you are doing.
 | |
| 	**/
 | |
| 	static var SLAB_BUFFER_SIZE:Int;
 | |
| 
 | |
| 	/**
 | |
| 		Returns an array with the names of the supported SSL ciphers.
 | |
| 	**/
 | |
| 	static function getCiphers():Array<String>;
 | |
| 
 | |
| 	/**
 | |
| 		Creates a new `Server`.
 | |
| 		The `connectionListener` argument is automatically set as a listener for the 'secureConnection' event.
 | |
| 	**/
 | |
| 	static function createServer(options:TlsCreateServerOptions, ?secureConnectionListener:TLSSocket->Void):Server;
 | |
| 
 | |
| 	/**
 | |
| 		Creates a new client connection to the given `port` and `host` (old API) or `options.port` and `options.host`.
 | |
| 		If `host` is omitted, it defaults to 'localhost'.
 | |
| 	**/
 | |
| 	@:overload(function(port:Int, ?callback:Void->Void):TLSSocket {})
 | |
| 	@:overload(function(port:Int, options:TlsConnectOptions, ?callback:Void->Void):TLSSocket {})
 | |
| 	@:overload(function(port:Int, host:String, ?callback:Void->Void):TLSSocket {})
 | |
| 	@:overload(function(port:Int, host:String, options:TlsConnectOptions, ?callback:Void->Void):TLSSocket {})
 | |
| 	static function connect(options:TlsConnectOptions, ?callback:Void->Void):TLSSocket;
 | |
| 
 | |
| 	/**
 | |
| 		Creates a credentials object.
 | |
| 	**/
 | |
| 	static function createSecureContext(?details:SecureContextOptions):SecureContext;
 | |
| 
 | |
| 	/**
 | |
| 		Creates a new secure pair object with two streams, one of which reads/writes encrypted data,
 | |
| 		and one reads/writes cleartext data.
 | |
| 		Generally the encrypted one is piped to/from an incoming encrypted data stream,
 | |
| 		and the cleartext one is used as a replacement for the initial encrypted stream.
 | |
| 	**/
 | |
| 	static function createSecurePair(?context:SecureContext, ?isServer:Bool, ?requestCert:Bool, ?rejectUnauthorized:Bool):SecurePair;
 | |
| }
 |