mirror of
https://github.com/nodejs/node.git
synced 2024-11-28 22:46:31 +01:00
3e1b1dd4a9
The copyright and license notice is already in the LICENSE file. There is no justifiable reason to also require that it be included in every file, since the individual files are not individually distributed except as part of the entire package.
147 lines
3.4 KiB
JavaScript
147 lines
3.4 KiB
JavaScript
if (!process.features.tls_sni) {
|
|
console.error('Skipping because node compiled without OpenSSL or ' +
|
|
'with old OpenSSL version.');
|
|
process.exit(0);
|
|
}
|
|
|
|
var common = require('../common'),
|
|
assert = require('assert'),
|
|
fs = require('fs'),
|
|
tls = require('tls');
|
|
|
|
function filenamePEM(n) {
|
|
return require('path').join(common.fixturesDir, 'keys', n + '.pem');
|
|
}
|
|
|
|
function loadPEM(n) {
|
|
return fs.readFileSync(filenamePEM(n));
|
|
}
|
|
|
|
var serverOptions = {
|
|
key: loadPEM('agent2-key'),
|
|
cert: loadPEM('agent2-cert'),
|
|
SNICallback: function(servername, callback) {
|
|
var context = SNIContexts[servername];
|
|
|
|
// Just to test asynchronous callback
|
|
setTimeout(function() {
|
|
if (context) {
|
|
if (context.emptyRegression)
|
|
callback(null, {});
|
|
else
|
|
callback(null, tls.createSecureContext(context));
|
|
} else {
|
|
callback(null, null);
|
|
}
|
|
}, 100);
|
|
}
|
|
};
|
|
|
|
var SNIContexts = {
|
|
'a.example.com': {
|
|
key: loadPEM('agent1-key'),
|
|
cert: loadPEM('agent1-cert')
|
|
},
|
|
'b.example.com': {
|
|
key: loadPEM('agent3-key'),
|
|
cert: loadPEM('agent3-cert')
|
|
},
|
|
'c.another.com': {
|
|
emptyRegression: true
|
|
}
|
|
};
|
|
|
|
var serverPort = common.PORT;
|
|
|
|
var clientsOptions = [{
|
|
port: serverPort,
|
|
key: loadPEM('agent1-key'),
|
|
cert: loadPEM('agent1-cert'),
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'a.example.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: serverPort,
|
|
key: loadPEM('agent2-key'),
|
|
cert: loadPEM('agent2-cert'),
|
|
ca: [loadPEM('ca2-cert')],
|
|
servername: 'b.example.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: serverPort,
|
|
key: loadPEM('agent3-key'),
|
|
cert: loadPEM('agent3-cert'),
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'c.wrong.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: serverPort,
|
|
key: loadPEM('agent3-key'),
|
|
cert: loadPEM('agent3-cert'),
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'c.another.com',
|
|
rejectUnauthorized: false
|
|
}];
|
|
|
|
var serverResults = [],
|
|
clientResults = [],
|
|
serverErrors = [],
|
|
clientErrors = [],
|
|
serverError,
|
|
clientError;
|
|
|
|
var server = tls.createServer(serverOptions, function(c) {
|
|
serverResults.push(c.servername);
|
|
});
|
|
|
|
server.on('clientError', function(err) {
|
|
serverResults.push(null);
|
|
serverError = err.message;
|
|
});
|
|
|
|
server.listen(serverPort, startTest);
|
|
|
|
function startTest() {
|
|
function connectClient(i, callback) {
|
|
var options = clientsOptions[i];
|
|
clientError = null;
|
|
serverError = null;
|
|
|
|
var client = tls.connect(options, function() {
|
|
clientResults.push(
|
|
/Hostname\/IP doesn't/.test(client.authorizationError || ''));
|
|
client.destroy();
|
|
|
|
next();
|
|
});
|
|
|
|
client.on('error', function(err) {
|
|
clientResults.push(false);
|
|
clientError = err.message;
|
|
next();
|
|
});
|
|
|
|
function next() {
|
|
clientErrors.push(clientError);
|
|
serverErrors.push(serverError);
|
|
|
|
if (i === clientsOptions.length - 1)
|
|
callback();
|
|
else
|
|
connectClient(i + 1, callback);
|
|
}
|
|
};
|
|
|
|
connectClient(0, function() {
|
|
server.close();
|
|
});
|
|
}
|
|
|
|
process.on('exit', function() {
|
|
assert.deepEqual(serverResults, ['a.example.com', 'b.example.com',
|
|
'c.wrong.com', null]);
|
|
assert.deepEqual(clientResults, [true, true, false, false]);
|
|
assert.deepEqual(clientErrors, [null, null, null, "socket hang up"]);
|
|
assert.deepEqual(serverErrors, [null, null, null, "Invalid SNI context"]);
|
|
});
|