mirror of
https://github.com/nodejs/node.git
synced 2024-11-30 23:43:09 +01:00
69298d36cf
This patch makes the skip messages consistent so that the TAP plugin in CI can parse the messages properly. The format will be 1..0 # Skipped: [Actual reason why the test is skipped] PR-URL: https://github.com/nodejs/io.js/pull/2109 Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl> Reviewed-By: Johan Bergström <bugs@bergstroem.nu>
118 lines
2.6 KiB
JavaScript
118 lines
2.6 KiB
JavaScript
'use strict';
|
|
if (!process.features.tls_sni) {
|
|
console.log('1..0 # Skipped: node compiled without OpenSSL or ' +
|
|
'with old OpenSSL version.');
|
|
process.exit(0);
|
|
}
|
|
|
|
var common = require('../common'),
|
|
assert = require('assert'),
|
|
fs = require('fs');
|
|
|
|
if (!common.hasCrypto) {
|
|
console.log('1..0 # Skipped: missing crypto');
|
|
process.exit();
|
|
}
|
|
var tls = require('tls');
|
|
|
|
function filenamePEM(n) {
|
|
return require('path').join(common.fixturesDir, 'keys', n + '.pem');
|
|
}
|
|
|
|
function loadPEM(n) {
|
|
return fs.readFileSync(filenamePEM(n));
|
|
}
|
|
|
|
var serverOptions = {
|
|
key: loadPEM('agent2-key'),
|
|
cert: loadPEM('agent2-cert')
|
|
};
|
|
|
|
var SNIContexts = {
|
|
'a.example.com': {
|
|
key: loadPEM('agent1-key'),
|
|
cert: loadPEM('agent1-cert')
|
|
},
|
|
'asterisk.test.com': {
|
|
key: loadPEM('agent3-key'),
|
|
cert: loadPEM('agent3-cert')
|
|
},
|
|
'chain.example.com': {
|
|
key: loadPEM('agent6-key'),
|
|
// NOTE: Contains ca3 chain cert
|
|
cert: loadPEM('agent6-cert')
|
|
}
|
|
};
|
|
|
|
var serverPort = common.PORT;
|
|
|
|
var clientsOptions = [{
|
|
port: serverPort,
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'a.example.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: serverPort,
|
|
ca: [loadPEM('ca2-cert')],
|
|
servername: 'b.test.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: serverPort,
|
|
ca: [loadPEM('ca2-cert')],
|
|
servername: 'a.b.test.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: serverPort,
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'c.wrong.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: serverPort,
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'chain.example.com',
|
|
rejectUnauthorized: false
|
|
}];
|
|
|
|
var serverResults = [],
|
|
clientResults = [];
|
|
|
|
var server = tls.createServer(serverOptions, function(c) {
|
|
serverResults.push(c.servername);
|
|
});
|
|
|
|
server.addContext('a.example.com', SNIContexts['a.example.com']);
|
|
server.addContext('*.test.com', SNIContexts['asterisk.test.com']);
|
|
server.addContext('chain.example.com', SNIContexts['chain.example.com']);
|
|
|
|
server.listen(serverPort, startTest);
|
|
|
|
function startTest() {
|
|
var i = 0;
|
|
function start() {
|
|
// No options left
|
|
if (i === clientsOptions.length)
|
|
return server.close();
|
|
|
|
var options = clientsOptions[i++];
|
|
var client = tls.connect(options, function() {
|
|
clientResults.push(
|
|
client.authorizationError &&
|
|
/Hostname\/IP doesn't/.test(client.authorizationError));
|
|
client.destroy();
|
|
|
|
// Continue
|
|
start();
|
|
});
|
|
};
|
|
|
|
start();
|
|
}
|
|
|
|
process.on('exit', function() {
|
|
assert.deepEqual(serverResults, [
|
|
'a.example.com', 'b.test.com', 'a.b.test.com', 'c.wrong.com',
|
|
'chain.example.com'
|
|
]);
|
|
assert.deepEqual(clientResults, [true, true, false, false, true]);
|
|
});
|