|
1 | | -// use core::panicking::panic; |
2 | 1 | use napi_derive::napi; |
3 | 2 | use napi::bindgen_prelude::*; |
4 | 3 |
|
@@ -41,97 +40,100 @@ impl Config { |
41 | 40 | let config = quiche::Config::new( |
42 | 41 | quiche::PROTOCOL_VERSION |
43 | 42 | ).or_else( |
44 | | - |err| Err(Error::from_reason(err.to_string())) |
| 43 | + |err| Err(napi::Error::from_reason(err.to_string())) |
45 | 44 | )?; |
46 | 45 | return Ok(Config(config)); |
47 | 46 | } |
48 | 47 |
|
| 48 | + /// Creates configuration with custom TLS context |
| 49 | + /// Servers must be setup with a key and cert |
49 | 50 | #[napi(factory)] |
50 | 51 | pub fn with_boring_ssl_ctx( |
51 | | - cert_pem: Option<Uint8Array>, |
52 | | - key_pem: Option<Uint8Array>, |
53 | | - supported_key_algos: Option<String>, |
54 | | - ca_cert_pem: Option<Uint8Array>, |
55 | 52 | verify_peer: bool, |
| 53 | + ca: Option<Uint8Array>, |
| 54 | + key: Option<Vec<Uint8Array>>, |
| 55 | + cert: Option<Vec<Uint8Array>>, |
| 56 | + sigalgs: Option<String>, |
56 | 57 | ) -> Result<Self> { |
57 | 58 | let mut ssl_ctx_builder = boring::ssl::SslContextBuilder::new( |
58 | 59 | boring::ssl::SslMethod::tls(), |
59 | 60 | ).or_else( |
60 | | - |err| Err(Error::from_reason(err.to_string())) |
| 61 | + |e| Err(napi::Error::from_reason(e.to_string())) |
61 | 62 | )?; |
62 | | - let verify_value = if verify_peer {boring::ssl::SslVerifyMode::PEER | boring::ssl::SslVerifyMode::FAIL_IF_NO_PEER_CERT } |
63 | | - else { boring::ssl::SslVerifyMode::NONE }; |
| 63 | + let verify_value = if verify_peer { |
| 64 | + boring::ssl::SslVerifyMode::PEER | boring::ssl::SslVerifyMode::FAIL_IF_NO_PEER_CERT |
| 65 | + } else { |
| 66 | + boring::ssl::SslVerifyMode::NONE |
| 67 | + }; |
64 | 68 | ssl_ctx_builder.set_verify(verify_value); |
65 | | - // Processing and adding the cert chain |
66 | | - if let Some(cert_pem) = cert_pem { |
67 | | - let x509_cert_chain = boring::x509::X509::stack_from_pem( |
68 | | - &cert_pem.to_vec() |
69 | | - ).or_else( |
70 | | - |err| Err(Error::from_reason(err.to_string())) |
71 | | - )?; |
72 | | - for (i, cert) in x509_cert_chain.iter().enumerate() { |
73 | | - if i == 0 { |
74 | | - ssl_ctx_builder.set_certificate( |
75 | | - cert, |
76 | | - ).or_else( |
77 | | - |err| Err(Error::from_reason(err.to_string())) |
78 | | - )?; |
79 | | - } else { |
80 | | - ssl_ctx_builder.add_extra_chain_cert( |
81 | | - cert.clone(), |
82 | | - ).or_else( |
83 | | - |err| Err(Error::from_reason(err.to_string())) |
84 | | - )?; |
85 | | - } |
86 | | - } |
87 | | - } |
88 | | - // Processing and adding the private key |
89 | | - if let Some(key_pem) = key_pem { |
90 | | - let private_key = boring::pkey::PKey::private_key_from_pem(&key_pem) |
91 | | - .or_else( |
92 | | - |err| Err(Error::from_reason(err.to_string())) |
93 | | - )?; |
94 | | - ssl_ctx_builder.set_private_key(&private_key) |
95 | | - .or_else( |
96 | | - |err| Err(Error::from_reason(err.to_string())) |
97 | | - )?; |
98 | | - } |
99 | | - // Adding supported private key algorithms |
100 | | - if let Some(supported_key_algos) = supported_key_algos { |
101 | | - ssl_ctx_builder.set_sigalgs_list(&supported_key_algos) |
| 69 | + // Setup all CA certificates |
| 70 | + if let Some(ca) = ca { |
| 71 | + let mut x509_store_builder = boring::x509::store::X509StoreBuilder::new() |
102 | 72 | .or_else( |
103 | | - |err| Err(Error::from_reason(err.to_string())) |
| 73 | + |e| Err(napi::Error::from_reason(e.to_string())) |
104 | 74 | )?; |
105 | | - } |
106 | | - // Processing CA certificate |
107 | | - if let Some(ca_cert_pem) = ca_cert_pem { |
108 | 75 | let x509_certs = boring::x509::X509::stack_from_pem( |
109 | | - &ca_cert_pem.to_vec() |
| 76 | + &ca.to_vec() |
110 | 77 | ).or_else( |
111 | | - |err| Err(Error::from_reason(err.to_string())) |
| 78 | + |e| Err(napi::Error::from_reason(e.to_string())) |
112 | 79 | )?; |
113 | | - let mut x509_store_builder = boring::x509::store::X509StoreBuilder::new() |
114 | | - .or_else( |
115 | | - |err| Err(Error::from_reason(err.to_string())) |
116 | | - )?; |
117 | 80 | for x509 in x509_certs.into_iter() { |
118 | 81 | x509_store_builder.add_cert(x509) |
119 | 82 | .or_else( |
120 | | - |err| Err(Error::from_reason(err.to_string())) |
| 83 | + |e| Err(napi::Error::from_reason(e.to_string())) |
121 | 84 | )?; |
122 | 85 | } |
123 | 86 | let x509_store = x509_store_builder.build(); |
124 | 87 | ssl_ctx_builder.set_verify_cert_store(x509_store) |
125 | 88 | .or_else( |
| 89 | + |e| Err(napi::Error::from_reason(e.to_string())) |
| 90 | + )?; |
| 91 | + } |
| 92 | + // Setup all certificates and keys |
| 93 | + // The below may not actually work |
| 94 | + // We assume we can just use certificate and add them to it |
| 95 | + // However this may not be possible |
| 96 | + if let (Some(key), Some(cert)) = (key, cert) { |
| 97 | + for (k, c) in key.iter().zip(cert.iter()) { |
| 98 | + let private_key = boring::pkey::PKey::private_key_from_pem(&k) |
| 99 | + .or_else( |
126 | 100 | |err| Err(Error::from_reason(err.to_string())) |
127 | 101 | )?; |
| 102 | + ssl_ctx_builder.set_private_key(&private_key).or_else( |
| 103 | + |e| Err(napi::Error::from_reason(e.to_string())) |
| 104 | + )?; |
| 105 | + let x509_cert_chain = boring::x509::X509::stack_from_pem( |
| 106 | + &c.to_vec() |
| 107 | + ).or_else( |
| 108 | + |err| Err(napi::Error::from_reason(err.to_string())) |
| 109 | + )?; |
| 110 | + for (i, cert) in x509_cert_chain.iter().enumerate() { |
| 111 | + if i == 0 { |
| 112 | + ssl_ctx_builder.set_certificate(cert,).or_else( |
| 113 | + |err| Err(Error::from_reason(err.to_string())) |
| 114 | + )?; |
| 115 | + } else { |
| 116 | + ssl_ctx_builder.add_extra_chain_cert( |
| 117 | + cert.clone(), |
| 118 | + ).or_else( |
| 119 | + |err| Err(Error::from_reason(err.to_string())) |
| 120 | + )?; |
| 121 | + } |
| 122 | + } |
| 123 | + } |
| 124 | + } |
| 125 | + // Setup supported signature algorithms |
| 126 | + if let Some(sigalgs) = sigalgs { |
| 127 | + ssl_ctx_builder.set_sigalgs_list(&sigalgs).or_else( |
| 128 | + |e| Err(napi::Error::from_reason(e.to_string())) |
| 129 | + )?; |
128 | 130 | } |
129 | 131 | let ssl_ctx= ssl_ctx_builder.build(); |
130 | 132 | let config = quiche::Config::with_boring_ssl_ctx( |
131 | 133 | quiche::PROTOCOL_VERSION, |
132 | 134 | ssl_ctx, |
133 | 135 | ).or_else( |
134 | | - |err| Err(Error::from_reason(err.to_string())) |
| 136 | + |e| Err(Error::from_reason(e.to_string())) |
135 | 137 | )?; |
136 | 138 | return Ok(Config(config)); |
137 | 139 | } |
|
0 commit comments