@@ -2869,14 +2869,14 @@ The following values are valid for `mode`:
2869
2869
2870
2870
Node.js uses the trusted CA certificates present in the system store along with
2871
2871
the ` --use-bundled-ca ` option and the ` NODE_EXTRA_CA_CERTS ` environment variable.
2872
- On platform other than Windows and macOS, this loads certificates from the directory
2872
+ On platforms other than Windows and macOS, this loads certificates from the directory
2873
2873
and file trusted by OpenSSL, similar to ` --use-openssl-ca ` , with the difference being
2874
2874
that it caches the certificates after first load.
2875
2875
2876
- This option is only supported on Windows and macOS, and the certificate trust policy
2877
- is planned to follow [ Chromium's policy for locally trusted certificates] [ ] :
2876
+ On Windows and macOS, the certificate trust policy is planned to follow
2877
+ [ Chromium's policy for locally trusted certificates] [ ] :
2878
2878
2879
- On macOS, the following certifcates are trusted :
2879
+ On macOS, the following settings are respected :
2880
2880
2881
2881
* Default and System Keychains
2882
2882
* Trust:
@@ -2886,8 +2886,8 @@ On macOS, the following certifcates are trusted:
2886
2886
* Any certificate where the “When using this certificate” flag is set to “Never Trust” or
2887
2887
* Any certificate where the “Secure Sockets Layer (SSL)” flag is set to “Never Trust.”
2888
2888
2889
- On Windows, the following certificates are currently trusted (unlike
2890
- Chromium's policy, distrust is not currently supported):
2889
+ On Windows, the following settings are respected (unlike Chromium's policy, distrust
2890
+ and intermediate CA are not currently supported):
2891
2891
2892
2892
* Local Machine (accessed via ` certlm.msc ` )
2893
2893
* Trust:
@@ -2902,14 +2902,19 @@ Chromium's policy, distrust is not currently supported):
2902
2902
* Trusted Root Certification Authorities
2903
2903
* Enterprise Trust -> Group Policy -> Trusted Root Certification Authorities
2904
2904
2905
- On Windows and macOS, Node.js would check that the certificate's key usage and extended key
2906
- usage are consistent with TLS use cases before using it for server authentication.
2907
-
2908
- On other systems, Node.js loads certificates from the default file
2909
- (typically ` /etc/ssl/cert.pem ` ) and default directory (typically ` /etc/ssl/certs ` )
2910
- that the version of OpenSSL that Node.js links to respects.
2911
- If the overriding OpenSSL environment variables (typically ` SSL_CERT_FILE ` and
2912
- ` SSL_CERT_DIR ` ) are set, they will be used to load certificates from instead.
2905
+ On Windows and macOS, Node.js would check that the user settings for the certificates
2906
+ do not forbid them for TLS server authentication before using them.
2907
+
2908
+ On other systems, Node.js loads certificates from the default certificate file
2909
+ (typically ` /etc/ssl/cert.pem ` ) and default certificate directory (typically
2910
+ ` /etc/ssl/certs ` ) that the version of OpenSSL that Node.js links to respects.
2911
+ This typically works with the convention on major Linux distributions and other
2912
+ UNIX-like systems. If the overriding OpenSSL environment variables
2913
+ (typically ` SSL_CERT_FILE ` and ` SSL_CERT_DIR ` , depending on the configuration
2914
+ of the OpenSSL that Node.js links to) are set, the specified paths will be used to load
2915
+ certificates instead. These envvironment variables can be used as workarounds
2916
+ if the conventional paths used by the version of OpenSSL Node.js links to are
2917
+ not consistent with the system configuration that the users have for some reason.
2913
2918
2914
2919
### ` --v8-options `
2915
2920
0 commit comments