@@ -2,6 +2,7 @@ import * as http from 'http';
2
2
import * as tls from 'tls' ;
3
3
import * as https from 'https' ;
4
4
import * as fs from 'fs/promises' ;
5
+ import * as semver from 'semver' ;
5
6
6
7
import { getLocal } from "../.." ;
7
8
import {
@@ -11,7 +12,8 @@ import {
11
12
delay ,
12
13
openRawSocket ,
13
14
openRawTlsSocket ,
14
- http2ProxyRequest
15
+ http2ProxyRequest ,
16
+ DETAILED_TLS_ERROR_CODES
15
17
} from "../test-utils" ;
16
18
import { streamToBuffer } from '../../src/util/buffer-utils' ;
17
19
@@ -418,5 +420,82 @@ describe("When configured for HTTPS", () => {
418
420
) ;
419
421
} ) ;
420
422
} ) ;
423
+
424
+ describe ( "with TLS version restrictions" , ( ) => {
425
+ const server = getLocal ( {
426
+ https : {
427
+ keyPath : './test/fixtures/test-ca.key' ,
428
+ certPath : './test/fixtures/test-ca.pem' ,
429
+ tlsServerOptions : {
430
+ minVersion : 'TLSv1.2'
431
+ } as any
432
+ }
433
+ } ) ;
434
+
435
+ beforeEach ( async ( ) => {
436
+ await server . start ( ) ;
437
+ await server . forAnyRequest ( ) . thenReply ( 200 , "Mock response" ) ;
438
+ } ) ;
439
+
440
+ afterEach ( async ( ) => {
441
+ await server . stop ( ) ;
442
+ } ) ;
443
+
444
+ it ( "should accept TLS 1.2 connections" , async ( ) => {
445
+ const tlsSocket = await openRawTlsSocket ( server , {
446
+ rejectUnauthorized : false ,
447
+ minVersion : 'TLSv1.2' ,
448
+ maxVersion : 'TLSv1.2'
449
+ } ) ;
450
+
451
+ expect ( tlsSocket . getProtocol ( ) ) . to . equal ( 'TLSv1.2' ) ;
452
+ tlsSocket . destroy ( ) ;
453
+ } ) ;
454
+
455
+ it ( "should reject TLS 1.0 connections" , async ( ) => {
456
+ try {
457
+ await openRawTlsSocket ( server , {
458
+ rejectUnauthorized : false ,
459
+ minVersion : 'TLSv1' ,
460
+ maxVersion : 'TLSv1'
461
+ } ) ;
462
+ throw new Error ( 'Expected connection to fail' ) ;
463
+ } catch ( e : any ) {
464
+ expect ( e . code ) . to . equal (
465
+ semver . satisfies ( process . version , DETAILED_TLS_ERROR_CODES )
466
+ ? 'ERR_SSL_TLSV1_ALERT_PROTOCOL_VERSION'
467
+ : 'ECONNRESET'
468
+ ) ;
469
+ }
470
+ } ) ;
471
+
472
+ it ( "should reject TLS 1.1 connections" , async ( ) => {
473
+ try {
474
+ await openRawTlsSocket ( server , {
475
+ rejectUnauthorized : false ,
476
+ minVersion : 'TLSv1.1' ,
477
+ maxVersion : 'TLSv1.1'
478
+ } ) ;
479
+ throw new Error ( 'Expected connection to fail' ) ;
480
+ } catch ( e : any ) {
481
+ expect ( e . code ) . to . equal (
482
+ semver . satisfies ( process . version , DETAILED_TLS_ERROR_CODES )
483
+ ? 'ERR_SSL_TLSV1_ALERT_PROTOCOL_VERSION'
484
+ : 'ECONNRESET'
485
+ ) ;
486
+ }
487
+ } ) ;
488
+
489
+ it ( "should accept TLS 1.3 connections when TLS 1.2 is minimum" , async ( ) => {
490
+ const tlsSocket = await openRawTlsSocket ( server , {
491
+ rejectUnauthorized : false ,
492
+ minVersion : 'TLSv1.3' ,
493
+ maxVersion : 'TLSv1.3'
494
+ } ) ;
495
+
496
+ expect ( tlsSocket . getProtocol ( ) ) . to . equal ( 'TLSv1.3' ) ;
497
+ tlsSocket . destroy ( ) ;
498
+ } ) ;
499
+ } ) ;
421
500
} ) ;
422
- } ) ;
501
+ } ) ;
0 commit comments