@mysql/xdevapi
Version:
MySQL Connector/Node.js - A Node.js driver for MySQL using the X Protocol and X DevAPI.
205 lines (177 loc) • 10.2 kB
JavaScript
/*
* Copyright (c) 2020, 2021, Oracle and/or its affiliates.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License, version 2.0, as
* published by the Free Software Foundation.
*
* This program is also distributed with certain software (including
* but not limited to OpenSSL) that is licensed under separate terms,
* as designated in a particular file or component or in included license
* documentation. The authors of MySQL hereby grant you an
* additional permission to link the program and your derivative works
* with the separately licensed software that they have included with
* MySQL.
*
* Without limiting anything contained in the foregoing, this file,
* which is part of MySQL Connector/Node.js, is also subject to the
* Universal FOSS Exception, version 1.0, a copy of which can be found at
* http://oss.oracle.com/licenses/universal-foss-exception.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
* See the GNU General Public License, version 2.0, for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*/
/* eslint-env node, mocha */
const config = require('../../../config');
const expect = require('chai').expect;
const mysqlx = require('../../../..');
const tls = require('tls');
describe('connecting with specific TLS versions', () => {
const baseConfig = { schema: 'performance_schema', socket: undefined };
context('using a configuration object', () => {
context('when TLSv1.3 is supported by the client', () => {
it('picks the latest TLS version enabled on the server by default', function () {
// runs on Node.js >= 12.0.0
if (!tls.DEFAULT_MAX_VERSION || tls.DEFAULT_MAX_VERSION === 'TLSv1.2') {
return this.skip();
}
const tlsConfig = Object.assign({}, config, baseConfig);
const expected = ['TLSv1.2', 'TLSv1.3'];
return mysqlx.getSession(tlsConfig)
.then(session => {
return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'")
.execute()
.then(res => expect(res.fetchOne()[0]).to.be.oneOf(expected))
.then(() => session.close());
});
});
it('picks the latest TLS version enabled on the server that is provided by the application', function () {
// runs on Node.js >= 12.0.0
if (!tls.DEFAULT_MAX_VERSION || tls.DEFAULT_MAX_VERSION === 'TLSv1.2') {
return this.skip();
}
const versions = ['foo', 'TLSv1', 'TLSv1.1', 'TLSv1.2', 'TLSv1.3'];
const tlsConfig = Object.assign({}, config, baseConfig, { tls: { versions } });
const expected = ['TLSv1.2', 'TLSv1.3'];
return mysqlx.getSession(tlsConfig)
.then(session => {
return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'")
.execute()
.then(res => expect(res.fetchOne()[0]).to.be.oneOf(expected))
.then(() => session.close());
});
});
});
context('when TLSv1.3 is not supported by the client', () => {
it('picks TLSv1.2 by default when it is supported by the server', function () {
// runs on Node.js <= 12.0.0
if (tls.DEFAULT_MAX_VERSION && tls.DEFAULT_MAX_VERSION !== 'TLSv1.2') {
return this.skip();
}
const tlsConfig = Object.assign({}, config, baseConfig);
const expected = 'TLSv1.2';
return mysqlx.getSession(tlsConfig)
.then(session => {
return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'")
.execute()
.then(res => expect(res.fetchOne()[0]).to.equal(expected))
.then(() => session.close());
});
});
it('picks TLSv1.2 when it is provided by the application and is supported by the server', function () {
// runs on Node.js <= 12.0.0
if (tls.DEFAULT_MAX_VERSION && tls.DEFAULT_MAX_VERSION !== 'TLSv1.2') {
return this.skip();
}
const versions = ['foo', 'TLSv1', 'TLSv1.1', 'TLSv1.2', 'TLSv1.3'];
const tlsConfig = Object.assign({}, config, baseConfig, { tls: { versions } });
const expected = 'TLSv1.2';
return mysqlx.getSession(tlsConfig)
.then(session => {
return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'")
.execute()
.then(res => expect(res.fetchOne()[0]).to.equal(expected))
.then(() => session.close());
});
});
});
});
context('using a connection string', () => {
context('when TLSv1.3 is supported by the client', () => {
it('picks the latest TLS version enabled on the server by default', function () {
// runs on Node.js >= 12.0.0
if (!tls.DEFAULT_MAX_VERSION || tls.DEFAULT_MAX_VERSION === 'TLSv1.2') {
return this.skip();
}
const tlsConfig = Object.assign({}, config, baseConfig);
const uri = `mysqlx://${tlsConfig.user}:${tlsConfig.password}@${tlsConfig.host}:${tlsConfig.port}/${tlsConfig.schema}`;
const expected = ['TLSv1.3', 'TLSv1.2'];
return mysqlx.getSession(uri)
.then(session => {
return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'")
.execute()
.then(res => expect(res.fetchOne()[0]).to.be.oneOf(expected))
.then(() => session.close());
});
});
it('picks the latest TLS version enabled on the server that is provided by the application', function () {
// runs on Node.js >= 12.0.0
if (!tls.DEFAULT_MAX_VERSION || tls.DEFAULT_MAX_VERSION === 'TLSv1.2') {
return this.skip();
}
const versions = ['foo', 'TLSv1', 'TLSv1.1', 'TLSv1.2', 'TLSv1.3'];
const tlsConfig = Object.assign({}, config, baseConfig, { tls: { versions } });
const uri = `mysqlx://${tlsConfig.user}:${tlsConfig.password}@${tlsConfig.host}:${tlsConfig.port}/${tlsConfig.schema}?tls-versions=[${versions.join(',')}]`;
const expected = ['TLSv1.2', 'TLSv1.3'];
return mysqlx.getSession(uri)
.then(session => {
return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'")
.execute()
.then(res => expect(res.fetchOne()[0]).to.be.oneOf(expected))
.then(() => session.close());
});
});
});
context('when TLSv1.3 is not supported by the client', () => {
it('picks TLSv1.2 by default when it is supported by the server', function () {
// runs on Node.js <= 12.0.0
if (tls.DEFAULT_MAX_VERSION && tls.DEFAULT_MAX_VERSION !== 'TLSv1.2') {
return this.skip();
}
const tlsConfig = Object.assign({}, config, baseConfig);
const uri = `mysqlx://${tlsConfig.user}:${tlsConfig.password}@${tlsConfig.host}:${tlsConfig.port}/${tlsConfig.schema}`;
const expected = 'TLSv1.2';
return mysqlx.getSession(uri)
.then(session => {
return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'")
.execute()
.then(res => expect(res.fetchOne()[0]).to.equal(expected))
.then(() => session.close());
});
});
it('picks TLSv1.2 when it is provided by the application and is supported by the server', function () {
// runs on Node.js <= 12.0.0
if (tls.DEFAULT_MAX_VERSION && tls.DEFAULT_MAX_VERSION !== 'TLSv1.2') {
return this.skip();
}
const versions = ['foo', 'TLSv1', 'TLSv1.1', 'TLSv1.2', 'TLSv1.3'];
const tlsConfig = Object.assign({}, config, baseConfig, { tls: { versions } });
const uri = `mysqlx://${tlsConfig.user}:${tlsConfig.password}@${tlsConfig.host}:${tlsConfig.port}/${tlsConfig.schema}?tls-versions=[${versions.join(',')}]`;
const expected = 'TLSv1.2';
return mysqlx.getSession(uri)
.then(session => {
return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'")
.execute()
.then(res => expect(res.fetchOne()[0]).to.equal(expected))
.then(() => session.close());
});
});
});
});
});