|
1 |
| -// use core::panicking::panic; |
2 | 1 | use napi_derive::napi;
|
3 | 2 | use napi::bindgen_prelude::*;
|
4 | 3 |
|
@@ -41,97 +40,100 @@ impl Config {
|
41 | 40 | let config = quiche::Config::new(
|
42 | 41 | quiche::PROTOCOL_VERSION
|
43 | 42 | ).or_else(
|
44 |
| - |err| Err(Error::from_reason(err.to_string())) |
| 43 | + |err| Err(napi::Error::from_reason(err.to_string())) |
45 | 44 | )?;
|
46 | 45 | return Ok(Config(config));
|
47 | 46 | }
|
48 | 47 |
|
| 48 | + /// Creates configuration with custom TLS context |
| 49 | + /// Servers must be setup with a key and cert |
49 | 50 | #[napi(factory)]
|
50 | 51 | pub fn with_boring_ssl_ctx(
|
51 |
| - cert_pem: Option<Uint8Array>, |
52 |
| - key_pem: Option<Uint8Array>, |
53 |
| - supported_key_algos: Option<String>, |
54 |
| - ca_cert_pem: Option<Uint8Array>, |
55 | 52 | verify_peer: bool,
|
| 53 | + ca: Option<Uint8Array>, |
| 54 | + key: Option<Vec<Uint8Array>>, |
| 55 | + cert: Option<Vec<Uint8Array>>, |
| 56 | + sigalgs: Option<String>, |
56 | 57 | ) -> Result<Self> {
|
57 | 58 | let mut ssl_ctx_builder = boring::ssl::SslContextBuilder::new(
|
58 | 59 | boring::ssl::SslMethod::tls(),
|
59 | 60 | ).or_else(
|
60 |
| - |err| Err(Error::from_reason(err.to_string())) |
| 61 | + |e| Err(napi::Error::from_reason(e.to_string())) |
61 | 62 | )?;
|
62 |
| - let verify_value = if verify_peer {boring::ssl::SslVerifyMode::PEER | boring::ssl::SslVerifyMode::FAIL_IF_NO_PEER_CERT } |
63 |
| - else { boring::ssl::SslVerifyMode::NONE }; |
| 63 | + let verify_value = if verify_peer { |
| 64 | + boring::ssl::SslVerifyMode::PEER | boring::ssl::SslVerifyMode::FAIL_IF_NO_PEER_CERT |
| 65 | + } else { |
| 66 | + boring::ssl::SslVerifyMode::NONE |
| 67 | + }; |
64 | 68 | ssl_ctx_builder.set_verify(verify_value);
|
65 |
| - // Processing and adding the cert chain |
66 |
| - if let Some(cert_pem) = cert_pem { |
67 |
| - let x509_cert_chain = boring::x509::X509::stack_from_pem( |
68 |
| - &cert_pem.to_vec() |
69 |
| - ).or_else( |
70 |
| - |err| Err(Error::from_reason(err.to_string())) |
71 |
| - )?; |
72 |
| - for (i, cert) in x509_cert_chain.iter().enumerate() { |
73 |
| - if i == 0 { |
74 |
| - ssl_ctx_builder.set_certificate( |
75 |
| - cert, |
76 |
| - ).or_else( |
77 |
| - |err| Err(Error::from_reason(err.to_string())) |
78 |
| - )?; |
79 |
| - } else { |
80 |
| - ssl_ctx_builder.add_extra_chain_cert( |
81 |
| - cert.clone(), |
82 |
| - ).or_else( |
83 |
| - |err| Err(Error::from_reason(err.to_string())) |
84 |
| - )?; |
85 |
| - } |
86 |
| - } |
87 |
| - } |
88 |
| - // Processing and adding the private key |
89 |
| - if let Some(key_pem) = key_pem { |
90 |
| - let private_key = boring::pkey::PKey::private_key_from_pem(&key_pem) |
91 |
| - .or_else( |
92 |
| - |err| Err(Error::from_reason(err.to_string())) |
93 |
| - )?; |
94 |
| - ssl_ctx_builder.set_private_key(&private_key) |
95 |
| - .or_else( |
96 |
| - |err| Err(Error::from_reason(err.to_string())) |
97 |
| - )?; |
98 |
| - } |
99 |
| - // Adding supported private key algorithms |
100 |
| - if let Some(supported_key_algos) = supported_key_algos { |
101 |
| - ssl_ctx_builder.set_sigalgs_list(&supported_key_algos) |
| 69 | + // Setup all CA certificates |
| 70 | + if let Some(ca) = ca { |
| 71 | + let mut x509_store_builder = boring::x509::store::X509StoreBuilder::new() |
102 | 72 | .or_else(
|
103 |
| - |err| Err(Error::from_reason(err.to_string())) |
| 73 | + |e| Err(napi::Error::from_reason(e.to_string())) |
104 | 74 | )?;
|
105 |
| - } |
106 |
| - // Processing CA certificate |
107 |
| - if let Some(ca_cert_pem) = ca_cert_pem { |
108 | 75 | let x509_certs = boring::x509::X509::stack_from_pem(
|
109 |
| - &ca_cert_pem.to_vec() |
| 76 | + &ca.to_vec() |
110 | 77 | ).or_else(
|
111 |
| - |err| Err(Error::from_reason(err.to_string())) |
| 78 | + |e| Err(napi::Error::from_reason(e.to_string())) |
112 | 79 | )?;
|
113 |
| - let mut x509_store_builder = boring::x509::store::X509StoreBuilder::new() |
114 |
| - .or_else( |
115 |
| - |err| Err(Error::from_reason(err.to_string())) |
116 |
| - )?; |
117 | 80 | for x509 in x509_certs.into_iter() {
|
118 | 81 | x509_store_builder.add_cert(x509)
|
119 | 82 | .or_else(
|
120 |
| - |err| Err(Error::from_reason(err.to_string())) |
| 83 | + |e| Err(napi::Error::from_reason(e.to_string())) |
121 | 84 | )?;
|
122 | 85 | }
|
123 | 86 | let x509_store = x509_store_builder.build();
|
124 | 87 | ssl_ctx_builder.set_verify_cert_store(x509_store)
|
125 | 88 | .or_else(
|
| 89 | + |e| Err(napi::Error::from_reason(e.to_string())) |
| 90 | + )?; |
| 91 | + } |
| 92 | + // Setup all certificates and keys |
| 93 | + // The below may not actually work |
| 94 | + // We assume we can just use certificate and add them to it |
| 95 | + // However this may not be possible |
| 96 | + if let (Some(key), Some(cert)) = (key, cert) { |
| 97 | + for (k, c) in key.iter().zip(cert.iter()) { |
| 98 | + let private_key = boring::pkey::PKey::private_key_from_pem(&k) |
| 99 | + .or_else( |
126 | 100 | |err| Err(Error::from_reason(err.to_string()))
|
127 | 101 | )?;
|
| 102 | + ssl_ctx_builder.set_private_key(&private_key).or_else( |
| 103 | + |e| Err(napi::Error::from_reason(e.to_string())) |
| 104 | + )?; |
| 105 | + let x509_cert_chain = boring::x509::X509::stack_from_pem( |
| 106 | + &c.to_vec() |
| 107 | + ).or_else( |
| 108 | + |err| Err(napi::Error::from_reason(err.to_string())) |
| 109 | + )?; |
| 110 | + for (i, cert) in x509_cert_chain.iter().enumerate() { |
| 111 | + if i == 0 { |
| 112 | + ssl_ctx_builder.set_certificate(cert,).or_else( |
| 113 | + |err| Err(Error::from_reason(err.to_string())) |
| 114 | + )?; |
| 115 | + } else { |
| 116 | + ssl_ctx_builder.add_extra_chain_cert( |
| 117 | + cert.clone(), |
| 118 | + ).or_else( |
| 119 | + |err| Err(Error::from_reason(err.to_string())) |
| 120 | + )?; |
| 121 | + } |
| 122 | + } |
| 123 | + } |
| 124 | + } |
| 125 | + // Setup supported signature algorithms |
| 126 | + if let Some(sigalgs) = sigalgs { |
| 127 | + ssl_ctx_builder.set_sigalgs_list(&sigalgs).or_else( |
| 128 | + |e| Err(napi::Error::from_reason(e.to_string())) |
| 129 | + )?; |
128 | 130 | }
|
129 | 131 | let ssl_ctx= ssl_ctx_builder.build();
|
130 | 132 | let config = quiche::Config::with_boring_ssl_ctx(
|
131 | 133 | quiche::PROTOCOL_VERSION,
|
132 | 134 | ssl_ctx,
|
133 | 135 | ).or_else(
|
134 |
| - |err| Err(Error::from_reason(err.to_string())) |
| 136 | + |e| Err(Error::from_reason(e.to_string())) |
135 | 137 | )?;
|
136 | 138 | return Ok(Config(config));
|
137 | 139 | }
|
|
0 commit comments