mirror of
https://github.com/nodejs/node.git
synced 2024-11-30 07:27:22 +01:00
2d2986ae72
* Make common.skip() exit. Also add common.printSkipMessage() for partial skips. * Don't make needless things before skip PR-URL: https://github.com/nodejs/node/pull/14021 Fixes: https://github.com/nodejs/node/issues/14016 Reviewed-By: Refael Ackermann <refack@gmail.com>
87 lines
2.6 KiB
JavaScript
87 lines
2.6 KiB
JavaScript
'use strict';
|
|
|
|
const common = require('../common');
|
|
if (!common.hasCrypto)
|
|
common.skip('missing crypto');
|
|
|
|
const initHooks = require('./init-hooks');
|
|
const tick = require('./tick');
|
|
const assert = require('assert');
|
|
const { checkInvocations } = require('./hook-checks');
|
|
|
|
const tls = require('tls');
|
|
const Connection = process.binding('crypto').Connection;
|
|
const hooks = initHooks();
|
|
hooks.enable();
|
|
|
|
function createServerConnection(
|
|
onhandshakestart,
|
|
certificate = null,
|
|
isServer = true,
|
|
servername = 'some server',
|
|
rejectUnauthorized
|
|
) {
|
|
if (certificate == null) certificate = tls.createSecureContext();
|
|
const ssl = new Connection(
|
|
certificate.context, isServer, servername, rejectUnauthorized
|
|
);
|
|
if (isServer) {
|
|
ssl.onhandshakestart = onhandshakestart;
|
|
ssl.lastHandshakeTime = 0;
|
|
}
|
|
return ssl;
|
|
}
|
|
|
|
// creating first server connection
|
|
const sc1 = createServerConnection(common.mustCall(onfirstHandShake));
|
|
|
|
let as = hooks.activitiesOfTypes('SSLCONNECTION');
|
|
assert.strictEqual(as.length, 1);
|
|
const f1 = as[0];
|
|
assert.strictEqual(f1.type, 'SSLCONNECTION');
|
|
assert.strictEqual(typeof f1.uid, 'number');
|
|
assert.strictEqual(typeof f1.triggerAsyncId, 'number');
|
|
checkInvocations(f1, { init: 1 }, 'first connection, when first created');
|
|
|
|
// creating second server connection
|
|
const sc2 = createServerConnection(common.mustCall(onsecondHandShake));
|
|
|
|
as = hooks.activitiesOfTypes('SSLCONNECTION');
|
|
assert.strictEqual(as.length, 2);
|
|
const f2 = as[1];
|
|
assert.strictEqual(f2.type, 'SSLCONNECTION');
|
|
assert.strictEqual(typeof f2.uid, 'number');
|
|
assert.strictEqual(typeof f2.triggerAsyncId, 'number');
|
|
checkInvocations(f1, { init: 1 }, 'first connection, when second created');
|
|
checkInvocations(f2, { init: 1 }, 'second connection, when second created');
|
|
|
|
// starting the connections which results in handshake starts
|
|
sc1.start();
|
|
sc2.start();
|
|
|
|
function onfirstHandShake() {
|
|
checkInvocations(f1, { init: 1, before: 1 },
|
|
'first connection, when first handshake');
|
|
checkInvocations(f2, { init: 1 }, 'second connection, when first handshake');
|
|
}
|
|
|
|
function onsecondHandShake() {
|
|
checkInvocations(f1, { init: 1, before: 1, after: 1 },
|
|
'first connection, when second handshake');
|
|
checkInvocations(f2, { init: 1, before: 1 },
|
|
'second connection, when second handshake');
|
|
tick(1E4);
|
|
}
|
|
|
|
process.on('exit', onexit);
|
|
|
|
function onexit() {
|
|
hooks.disable();
|
|
hooks.sanityCheck('SSLCONNECTION');
|
|
|
|
checkInvocations(f1, { init: 1, before: 1, after: 1 },
|
|
'first connection, when process exits');
|
|
checkInvocations(f2, { init: 1, before: 1, after: 1 },
|
|
'second connection, when process exits');
|
|
}
|