mirror of
https://github.com/nodejs/node.git
synced 2024-11-21 21:19:50 +01:00
5f28372207
PR-URL: https://github.com/nodejs/node/pull/47859 Reviewed-By: Tobias Nießen <tniessen@tnie.de> Reviewed-By: Richard Lau <rlau@redhat.com>
165 lines
5.2 KiB
JavaScript
165 lines
5.2 KiB
JavaScript
// Copyright Joyent, Inc. and other Node contributors.
|
|
//
|
|
// Permission is hereby granted, free of charge, to any person obtaining a
|
|
// copy of this software and associated documentation files (the
|
|
// "Software"), to deal in the Software without restriction, including
|
|
// without limitation the rights to use, copy, modify, merge, publish,
|
|
// distribute, sublicense, and/or sell copies of the Software, and to permit
|
|
// persons to whom the Software is furnished to do so, subject to the
|
|
// following conditions:
|
|
//
|
|
// The above copyright notice and this permission notice shall be included
|
|
// in all copies or substantial portions of the Software.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
|
|
// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
|
|
// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
|
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
'use strict';
|
|
const common = require('../common');
|
|
if (!common.hasCrypto)
|
|
common.skip('missing crypto');
|
|
const fixtures = require('../common/fixtures');
|
|
const assert = require('assert');
|
|
const tls = require('tls');
|
|
const { spawn } = require('child_process');
|
|
|
|
if (!common.opensslCli)
|
|
common.skip('node compiled without OpenSSL CLI.');
|
|
|
|
|
|
doTest({ tickets: false }, function() {
|
|
doTest({ tickets: true }, function() {
|
|
doTest({ tickets: false, invalidSession: true }, function() {
|
|
console.error('all done');
|
|
});
|
|
});
|
|
});
|
|
|
|
function doTest(testOptions, callback) {
|
|
const key = fixtures.readKey('rsa_private.pem');
|
|
const cert = fixtures.readKey('rsa_cert.crt');
|
|
const options = {
|
|
key,
|
|
cert,
|
|
ca: [cert],
|
|
requestCert: true,
|
|
rejectUnauthorized: false,
|
|
secureProtocol: 'TLS_method',
|
|
ciphers: 'RSA@SECLEVEL=0'
|
|
};
|
|
let requestCount = 0;
|
|
let resumeCount = 0;
|
|
let newSessionCount = 0;
|
|
let session;
|
|
|
|
const server = tls.createServer(options, function(cleartext) {
|
|
cleartext.on('error', function(er) {
|
|
// We're ok with getting ECONNRESET in this test, but it's
|
|
// timing-dependent, and thus unreliable. Any other errors
|
|
// are just failures, though.
|
|
if (er.code !== 'ECONNRESET')
|
|
throw er;
|
|
});
|
|
++requestCount;
|
|
cleartext.end('');
|
|
});
|
|
server.on('newSession', function(id, data, cb) {
|
|
++newSessionCount;
|
|
// Emulate asynchronous store
|
|
setImmediate(() => {
|
|
assert.ok(!session);
|
|
session = { id, data };
|
|
cb();
|
|
});
|
|
});
|
|
server.on('resumeSession', function(id, callback) {
|
|
++resumeCount;
|
|
assert.ok(session);
|
|
assert.strictEqual(session.id.toString('hex'), id.toString('hex'));
|
|
|
|
let data = session.data;
|
|
|
|
// Return an invalid session to test Node does not crash.
|
|
if (testOptions.invalidSession) {
|
|
data = Buffer.from('INVALID SESSION');
|
|
session = null;
|
|
}
|
|
|
|
// Just to check that async really works there
|
|
setImmediate(() => {
|
|
callback(null, data);
|
|
});
|
|
});
|
|
|
|
server.listen(0, function() {
|
|
const args = [
|
|
's_client',
|
|
'-tls1',
|
|
'-cipher', (common.hasOpenSSL31 ? 'DEFAULT:@SECLEVEL=0' : 'DEFAULT'),
|
|
'-connect', `localhost:${this.address().port}`,
|
|
'-servername', 'ohgod',
|
|
'-key', fixtures.path('keys/rsa_private.pem'),
|
|
'-cert', fixtures.path('keys/rsa_cert.crt'),
|
|
'-reconnect',
|
|
].concat(testOptions.tickets ? [] : '-no_ticket');
|
|
|
|
function spawnClient() {
|
|
const client = spawn(common.opensslCli, args, {
|
|
stdio: [ 0, 1, 'pipe' ]
|
|
});
|
|
let err = '';
|
|
client.stderr.setEncoding('utf8');
|
|
client.stderr.on('data', function(chunk) {
|
|
err += chunk;
|
|
});
|
|
|
|
client.on('exit', common.mustCall(function(code, signal) {
|
|
if (code !== 0) {
|
|
// If SmartOS and connection refused, then retry. See
|
|
// https://github.com/nodejs/node/issues/2663.
|
|
if (common.isSunOS && err.includes('Connection refused')) {
|
|
requestCount = 0;
|
|
spawnClient();
|
|
return;
|
|
}
|
|
assert.fail(`code: ${code}, signal: ${signal}, output: ${err}`);
|
|
}
|
|
assert.strictEqual(code, 0);
|
|
server.close(common.mustCall(function() {
|
|
setImmediate(callback);
|
|
}));
|
|
}));
|
|
}
|
|
|
|
spawnClient();
|
|
});
|
|
|
|
process.on('exit', function() {
|
|
// Each test run connects 6 times: an initial request and 5 reconnect
|
|
// requests.
|
|
assert.strictEqual(requestCount, 6);
|
|
|
|
if (testOptions.tickets) {
|
|
// No session cache callbacks are called.
|
|
assert.strictEqual(resumeCount, 0);
|
|
assert.strictEqual(newSessionCount, 0);
|
|
} else if (testOptions.invalidSession) {
|
|
// The resume callback was called, but each connection established a
|
|
// fresh session.
|
|
assert.strictEqual(resumeCount, 5);
|
|
assert.strictEqual(newSessionCount, 6);
|
|
} else {
|
|
// The resume callback was called, and only the initial connection
|
|
// establishes a fresh session.
|
|
assert.ok(session);
|
|
assert.strictEqual(resumeCount, 5);
|
|
assert.strictEqual(newSessionCount, 1);
|
|
}
|
|
});
|
|
}
|