UNPKG

@mysql/xdevapi

Version:

MySQL Connector/Node.js - A Node.js driver for MySQL using the X Protocol and X DevAPI.

205 lines (177 loc) 10.2 kB
/* * Copyright (c) 2020, 2021, Oracle and/or its affiliates. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License, version 2.0, as * published by the Free Software Foundation. * * This program is also distributed with certain software (including * but not limited to OpenSSL) that is licensed under separate terms, * as designated in a particular file or component or in included license * documentation. The authors of MySQL hereby grant you an * additional permission to link the program and your derivative works * with the separately licensed software that they have included with * MySQL. * * Without limiting anything contained in the foregoing, this file, * which is part of MySQL Connector/Node.js, is also subject to the * Universal FOSS Exception, version 1.0, a copy of which can be found at * http://oss.oracle.com/licenses/universal-foss-exception. * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. * See the GNU General Public License, version 2.0, for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software Foundation, Inc., * 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */ /* eslint-env node, mocha */ const config = require('../../../config'); const expect = require('chai').expect; const mysqlx = require('../../../..'); const tls = require('tls'); describe('connecting with specific TLS versions', () => { const baseConfig = { schema: 'performance_schema', socket: undefined }; context('using a configuration object', () => { context('when TLSv1.3 is supported by the client', () => { it('picks the latest TLS version enabled on the server by default', function () { // runs on Node.js >= 12.0.0 if (!tls.DEFAULT_MAX_VERSION || tls.DEFAULT_MAX_VERSION === 'TLSv1.2') { return this.skip(); } const tlsConfig = Object.assign({}, config, baseConfig); const expected = ['TLSv1.2', 'TLSv1.3']; return mysqlx.getSession(tlsConfig) .then(session => { return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'") .execute() .then(res => expect(res.fetchOne()[0]).to.be.oneOf(expected)) .then(() => session.close()); }); }); it('picks the latest TLS version enabled on the server that is provided by the application', function () { // runs on Node.js >= 12.0.0 if (!tls.DEFAULT_MAX_VERSION || tls.DEFAULT_MAX_VERSION === 'TLSv1.2') { return this.skip(); } const versions = ['foo', 'TLSv1', 'TLSv1.1', 'TLSv1.2', 'TLSv1.3']; const tlsConfig = Object.assign({}, config, baseConfig, { tls: { versions } }); const expected = ['TLSv1.2', 'TLSv1.3']; return mysqlx.getSession(tlsConfig) .then(session => { return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'") .execute() .then(res => expect(res.fetchOne()[0]).to.be.oneOf(expected)) .then(() => session.close()); }); }); }); context('when TLSv1.3 is not supported by the client', () => { it('picks TLSv1.2 by default when it is supported by the server', function () { // runs on Node.js <= 12.0.0 if (tls.DEFAULT_MAX_VERSION && tls.DEFAULT_MAX_VERSION !== 'TLSv1.2') { return this.skip(); } const tlsConfig = Object.assign({}, config, baseConfig); const expected = 'TLSv1.2'; return mysqlx.getSession(tlsConfig) .then(session => { return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'") .execute() .then(res => expect(res.fetchOne()[0]).to.equal(expected)) .then(() => session.close()); }); }); it('picks TLSv1.2 when it is provided by the application and is supported by the server', function () { // runs on Node.js <= 12.0.0 if (tls.DEFAULT_MAX_VERSION && tls.DEFAULT_MAX_VERSION !== 'TLSv1.2') { return this.skip(); } const versions = ['foo', 'TLSv1', 'TLSv1.1', 'TLSv1.2', 'TLSv1.3']; const tlsConfig = Object.assign({}, config, baseConfig, { tls: { versions } }); const expected = 'TLSv1.2'; return mysqlx.getSession(tlsConfig) .then(session => { return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'") .execute() .then(res => expect(res.fetchOne()[0]).to.equal(expected)) .then(() => session.close()); }); }); }); }); context('using a connection string', () => { context('when TLSv1.3 is supported by the client', () => { it('picks the latest TLS version enabled on the server by default', function () { // runs on Node.js >= 12.0.0 if (!tls.DEFAULT_MAX_VERSION || tls.DEFAULT_MAX_VERSION === 'TLSv1.2') { return this.skip(); } const tlsConfig = Object.assign({}, config, baseConfig); const uri = `mysqlx://${tlsConfig.user}:${tlsConfig.password}@${tlsConfig.host}:${tlsConfig.port}/${tlsConfig.schema}`; const expected = ['TLSv1.3', 'TLSv1.2']; return mysqlx.getSession(uri) .then(session => { return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'") .execute() .then(res => expect(res.fetchOne()[0]).to.be.oneOf(expected)) .then(() => session.close()); }); }); it('picks the latest TLS version enabled on the server that is provided by the application', function () { // runs on Node.js >= 12.0.0 if (!tls.DEFAULT_MAX_VERSION || tls.DEFAULT_MAX_VERSION === 'TLSv1.2') { return this.skip(); } const versions = ['foo', 'TLSv1', 'TLSv1.1', 'TLSv1.2', 'TLSv1.3']; const tlsConfig = Object.assign({}, config, baseConfig, { tls: { versions } }); const uri = `mysqlx://${tlsConfig.user}:${tlsConfig.password}@${tlsConfig.host}:${tlsConfig.port}/${tlsConfig.schema}?tls-versions=[${versions.join(',')}]`; const expected = ['TLSv1.2', 'TLSv1.3']; return mysqlx.getSession(uri) .then(session => { return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'") .execute() .then(res => expect(res.fetchOne()[0]).to.be.oneOf(expected)) .then(() => session.close()); }); }); }); context('when TLSv1.3 is not supported by the client', () => { it('picks TLSv1.2 by default when it is supported by the server', function () { // runs on Node.js <= 12.0.0 if (tls.DEFAULT_MAX_VERSION && tls.DEFAULT_MAX_VERSION !== 'TLSv1.2') { return this.skip(); } const tlsConfig = Object.assign({}, config, baseConfig); const uri = `mysqlx://${tlsConfig.user}:${tlsConfig.password}@${tlsConfig.host}:${tlsConfig.port}/${tlsConfig.schema}`; const expected = 'TLSv1.2'; return mysqlx.getSession(uri) .then(session => { return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'") .execute() .then(res => expect(res.fetchOne()[0]).to.equal(expected)) .then(() => session.close()); }); }); it('picks TLSv1.2 when it is provided by the application and is supported by the server', function () { // runs on Node.js <= 12.0.0 if (tls.DEFAULT_MAX_VERSION && tls.DEFAULT_MAX_VERSION !== 'TLSv1.2') { return this.skip(); } const versions = ['foo', 'TLSv1', 'TLSv1.1', 'TLSv1.2', 'TLSv1.3']; const tlsConfig = Object.assign({}, config, baseConfig, { tls: { versions } }); const uri = `mysqlx://${tlsConfig.user}:${tlsConfig.password}@${tlsConfig.host}:${tlsConfig.port}/${tlsConfig.schema}?tls-versions=[${versions.join(',')}]`; const expected = 'TLSv1.2'; return mysqlx.getSession(uri) .then(session => { return session.sql("select variable_value from session_status where variable_name = 'Mysqlx_ssl_version'") .execute() .then(res => expect(res.fetchOne()[0]).to.equal(expected)) .then(() => session.close()); }); }); }); }); });