mirror of
https://github.com/nodejs/node.git
synced 2024-12-01 16:10:02 +01:00
f29762f4dd
Enable linting for the test directory. A number of changes was made so all tests conform the current rules used by lib and src directories. The only exception for tests is that unreachable (dead) code is allowed. test-fs-non-number-arguments-throw had to be excluded from the changes because of a weird issue on Windows CI. PR-URL: https://github.com/nodejs/io.js/pull/1721 Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
118 lines
2.6 KiB
JavaScript
118 lines
2.6 KiB
JavaScript
'use strict';
|
|
if (!process.features.tls_sni) {
|
|
console.error('Skipping because node compiled without OpenSSL or ' +
|
|
'with old OpenSSL version.');
|
|
process.exit(0);
|
|
}
|
|
|
|
var common = require('../common'),
|
|
assert = require('assert'),
|
|
fs = require('fs');
|
|
|
|
if (!common.hasCrypto) {
|
|
console.log('1..0 # Skipped: missing crypto');
|
|
process.exit();
|
|
}
|
|
var tls = require('tls');
|
|
|
|
function filenamePEM(n) {
|
|
return require('path').join(common.fixturesDir, 'keys', n + '.pem');
|
|
}
|
|
|
|
function loadPEM(n) {
|
|
return fs.readFileSync(filenamePEM(n));
|
|
}
|
|
|
|
var serverOptions = {
|
|
key: loadPEM('agent2-key'),
|
|
cert: loadPEM('agent2-cert')
|
|
};
|
|
|
|
var SNIContexts = {
|
|
'a.example.com': {
|
|
key: loadPEM('agent1-key'),
|
|
cert: loadPEM('agent1-cert')
|
|
},
|
|
'asterisk.test.com': {
|
|
key: loadPEM('agent3-key'),
|
|
cert: loadPEM('agent3-cert')
|
|
},
|
|
'chain.example.com': {
|
|
key: loadPEM('agent6-key'),
|
|
// NOTE: Contains ca3 chain cert
|
|
cert: loadPEM('agent6-cert')
|
|
}
|
|
};
|
|
|
|
var serverPort = common.PORT;
|
|
|
|
var clientsOptions = [{
|
|
port: serverPort,
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'a.example.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: serverPort,
|
|
ca: [loadPEM('ca2-cert')],
|
|
servername: 'b.test.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: serverPort,
|
|
ca: [loadPEM('ca2-cert')],
|
|
servername: 'a.b.test.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: serverPort,
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'c.wrong.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: serverPort,
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'chain.example.com',
|
|
rejectUnauthorized: false
|
|
}];
|
|
|
|
var serverResults = [],
|
|
clientResults = [];
|
|
|
|
var server = tls.createServer(serverOptions, function(c) {
|
|
serverResults.push(c.servername);
|
|
});
|
|
|
|
server.addContext('a.example.com', SNIContexts['a.example.com']);
|
|
server.addContext('*.test.com', SNIContexts['asterisk.test.com']);
|
|
server.addContext('chain.example.com', SNIContexts['chain.example.com']);
|
|
|
|
server.listen(serverPort, startTest);
|
|
|
|
function startTest() {
|
|
var i = 0;
|
|
function start() {
|
|
// No options left
|
|
if (i === clientsOptions.length)
|
|
return server.close();
|
|
|
|
var options = clientsOptions[i++];
|
|
var client = tls.connect(options, function() {
|
|
clientResults.push(
|
|
client.authorizationError &&
|
|
/Hostname\/IP doesn't/.test(client.authorizationError));
|
|
client.destroy();
|
|
|
|
// Continue
|
|
start();
|
|
});
|
|
};
|
|
|
|
start();
|
|
}
|
|
|
|
process.on('exit', function() {
|
|
assert.deepEqual(serverResults, [
|
|
'a.example.com', 'b.test.com', 'a.b.test.com', 'c.wrong.com',
|
|
'chain.example.com'
|
|
]);
|
|
assert.deepEqual(clientResults, [true, true, false, false, true]);
|
|
});
|