0
0
mirror of https://github.com/nodejs/node.git synced 2024-12-01 16:10:02 +01:00
nodejs/test/parallel/test-tls-securepair-server.js
Sota Yamashita 5ffb7d72bb test: skip when openssl CLI doesn't exist
PR-URL: https://github.com/nodejs/node/pull/11095
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Yuta Hiroto <hello@about-hiroppy.com>
Reviewed-By: Gibson Fahnestock <gibfahn@gmail.com>
Reviewed-By: Michael Dawson <michael_dawson@ca.ibm.com>
Reviewed-By: Anna Henningsen <anna@addaleax.net>
Reviewed-By: Sakthipriyan Vairamani <thechargingvolcano@gmail.com>
Reviewed-By: Sam Roberts <vieuxtech@gmail.com>
2017-02-13 13:51:21 -08:00

140 lines
3.0 KiB
JavaScript

'use strict';
const common = require('../common');
const assert = require('assert');
if (!common.hasCrypto) {
common.skip('missing crypto');
return;
}
if (!common.opensslCli) {
common.skip('missing openssl-cli');
return;
}
const tls = require('tls');
const join = require('path').join;
const net = require('net');
const fs = require('fs');
const spawn = require('child_process').spawn;
const key = fs.readFileSync(join(common.fixturesDir, 'agent.key')).toString();
const cert = fs.readFileSync(join(common.fixturesDir, 'agent.crt')).toString();
function log(a) {
console.error('***server*** ' + a);
}
const server = net.createServer(common.mustCall(function(socket) {
log('connection fd=' + socket.fd);
const sslcontext = tls.createSecureContext({key: key, cert: cert});
sslcontext.context.setCiphers('RC4-SHA:AES128-SHA:AES256-SHA');
const pair = tls.createSecurePair(sslcontext, true);
assert.ok(pair.encrypted.writable);
assert.ok(pair.cleartext.writable);
pair.encrypted.pipe(socket);
socket.pipe(pair.encrypted);
log('i set it secure');
pair.on('secure', function() {
log('connected+secure!');
pair.cleartext.write('hello\r\n');
log(pair.cleartext.getPeerCertificate());
log(pair.cleartext.getCipher());
});
pair.cleartext.on('data', function(data) {
log('read bytes ' + data.length);
pair.cleartext.write(data);
});
socket.on('end', function() {
log('socket end');
});
pair.cleartext.on('error', function(err) {
log('got error: ');
log(err);
log(err.stack);
socket.destroy();
});
pair.encrypted.on('error', function(err) {
log('encrypted error: ');
log(err);
log(err.stack);
socket.destroy();
});
socket.on('error', function(err) {
log('socket error: ');
log(err);
log(err.stack);
socket.destroy();
});
socket.on('close', function(err) {
log('socket closed');
});
pair.on('error', function(err) {
log('secure error: ');
log(err);
log(err.stack);
socket.destroy();
});
}));
let gotHello = false;
let sentWorld = false;
let gotWorld = false;
server.listen(0, common.mustCall(function() {
// To test use: openssl s_client -connect localhost:8000
const args = ['s_client', '-connect', `127.0.0.1:${this.address().port}`];
// for the performance and stability issue in s_client on Windows
if (common.isWindows)
args.push('-no_rand_screen');
const client = spawn(common.opensslCli, args);
let out = '';
client.stdout.setEncoding('utf8');
client.stdout.on('data', function(d) {
out += d;
if (!gotHello && /hello/.test(out)) {
gotHello = true;
client.stdin.write('world\r\n');
sentWorld = true;
}
if (!gotWorld && /world/.test(out)) {
gotWorld = true;
client.stdin.end();
}
});
client.stdout.pipe(process.stdout, { end: false });
client.on('exit', common.mustCall(function(code) {
assert.strictEqual(0, code);
server.close();
}));
}));
process.on('exit', function() {
assert.ok(gotHello);
assert.ok(sentWorld);
assert.ok(gotWorld);
});