Skip to content

Commit 700e43a

Browse files
authoredMar 18, 2025··
Merge pull request #189 from skilbjo/main
Add option to disable TLS 1.0
2 parents 2c0474d + 437babb commit 700e43a

File tree

4 files changed

+95
-2
lines changed

4 files changed

+95
-2
lines changed
 

‎src/mockttp.ts

+12
Original file line numberDiff line numberDiff line change
@@ -723,6 +723,18 @@ export type MockttpHttpsOptions = CAOptions & {
723723
* here for additional configuration of this behaviour.
724724
*/
725725
tlsInterceptOnly?: Array<{ hostname: string }>;
726+
727+
/**
728+
* Set the TLS server options, used for incoming TLS connections.
729+
*
730+
* The only officially supported option for now is the minimum TLS version, which can
731+
* be used to relax/tighten TLS requirements on clients. If not set, this defaults
732+
* to your Node version's default TLS configuration. The full list of versions can be
733+
* found at https://nodejs.org/api/tls.html#tlssocketgetprotocol.
734+
*/
735+
tlsServerOptions?: {
736+
minVersion?: 'TLSv1.3' | 'TLSv1.2' | 'TLSv1.1' | 'TLSv1';
737+
};
726738
};
727739

728740
export interface MockttpOptions {

‎src/server/http-combo-server.ts

+1
Original file line numberDiff line numberDiff line change
@@ -184,6 +184,7 @@ export async function createComboServer(
184184
cert: defaultCert.cert,
185185
ca: [defaultCert.ca],
186186
...ALPNOption,
187+
...(options.https?.tlsServerOptions || {}),
187188
SNICallback: (domain: string, cb: Function) => {
188189
if (options.debug) console.log(`Generating certificate for ${domain}`);
189190

‎test/integration/https.spec.ts

+81-2
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ import * as http from 'http';
22
import * as tls from 'tls';
33
import * as https from 'https';
44
import * as fs from 'fs/promises';
5+
import * as semver from 'semver';
56

67
import { getLocal } from "../..";
78
import {
@@ -11,7 +12,8 @@ import {
1112
delay,
1213
openRawSocket,
1314
openRawTlsSocket,
14-
http2ProxyRequest
15+
http2ProxyRequest,
16+
DETAILED_TLS_ERROR_CODES
1517
} from "../test-utils";
1618
import { streamToBuffer } from '../../src/util/buffer-utils';
1719

@@ -418,5 +420,82 @@ describe("When configured for HTTPS", () => {
418420
);
419421
});
420422
});
423+
424+
describe("with TLS version restrictions", () => {
425+
const server = getLocal({
426+
https: {
427+
keyPath: './test/fixtures/test-ca.key',
428+
certPath: './test/fixtures/test-ca.pem',
429+
tlsServerOptions: {
430+
minVersion: 'TLSv1.2'
431+
} as any
432+
}
433+
});
434+
435+
beforeEach(async () => {
436+
await server.start();
437+
await server.forAnyRequest().thenReply(200, "Mock response");
438+
});
439+
440+
afterEach(async () => {
441+
await server.stop();
442+
});
443+
444+
it("should accept TLS 1.2 connections", async () => {
445+
const tlsSocket = await openRawTlsSocket(server, {
446+
rejectUnauthorized: false,
447+
minVersion: 'TLSv1.2',
448+
maxVersion: 'TLSv1.2'
449+
});
450+
451+
expect(tlsSocket.getProtocol()).to.equal('TLSv1.2');
452+
tlsSocket.destroy();
453+
});
454+
455+
it("should reject TLS 1.0 connections", async () => {
456+
try {
457+
await openRawTlsSocket(server, {
458+
rejectUnauthorized: false,
459+
minVersion: 'TLSv1',
460+
maxVersion: 'TLSv1'
461+
});
462+
throw new Error('Expected connection to fail');
463+
} catch (e: any) {
464+
expect(e.code).to.equal(
465+
semver.satisfies(process.version, DETAILED_TLS_ERROR_CODES)
466+
? 'ERR_SSL_TLSV1_ALERT_PROTOCOL_VERSION'
467+
: 'ECONNRESET'
468+
);
469+
}
470+
});
471+
472+
it("should reject TLS 1.1 connections", async () => {
473+
try {
474+
await openRawTlsSocket(server, {
475+
rejectUnauthorized: false,
476+
minVersion: 'TLSv1.1',
477+
maxVersion: 'TLSv1.1'
478+
});
479+
throw new Error('Expected connection to fail');
480+
} catch (e: any) {
481+
expect(e.code).to.equal(
482+
semver.satisfies(process.version, DETAILED_TLS_ERROR_CODES)
483+
? 'ERR_SSL_TLSV1_ALERT_PROTOCOL_VERSION'
484+
: 'ECONNRESET'
485+
);
486+
}
487+
});
488+
489+
it("should accept TLS 1.3 connections when TLS 1.2 is minimum", async () => {
490+
const tlsSocket = await openRawTlsSocket(server, {
491+
rejectUnauthorized: false,
492+
minVersion: 'TLSv1.3',
493+
maxVersion: 'TLSv1.3'
494+
});
495+
496+
expect(tlsSocket.getProtocol()).to.equal('TLSv1.3');
497+
tlsSocket.destroy();
498+
});
499+
});
421500
});
422-
});
501+
});

‎test/test-utils.ts

+1
Original file line numberDiff line numberDiff line change
@@ -257,6 +257,7 @@ export async function startDnsServer(callback: (question: dns2.DnsQuestion) => s
257257

258258
export const H2_TLS_ON_TLS_SUPPORTED = ">=12.17";
259259
export const HTTP_ABORTSIGNAL_SUPPORTED = ">=14.17";
260+
export const DETAILED_TLS_ERROR_CODES = ">=18";
260261
export const NATIVE_FETCH_SUPPORTED = ">=18";
261262
export const SOCKET_RESET_SUPPORTED = "^16.17 || >=18.3";
262263
export const BROKEN_H1_OVER_H2_TUNNELLING = "^18.8";

0 commit comments

Comments
 (0)
Please sign in to comment.