mirror of
https://github.com/nodejs/node.git
synced 2024-11-30 07:27:22 +01:00
ffd64adc78
refactor all var to either const/let change all assert.equal to assert.strictEqual change all assert.ok(...===...) to assert.strictEqual PR-URL: https://github.com/nodejs/node/pull/9970 Reviewed-By: Prince John Wesley <princejohnwesley@gmail.com> Reviewed-By: Colin Ihrig <cjihrig@gmail.com> Reviewed-By: James M Snell <jasnell@gmail.com>
132 lines
3.4 KiB
JavaScript
132 lines
3.4 KiB
JavaScript
'use strict';
|
|
const common = require('../common');
|
|
|
|
if (!process.features.tls_ocsp) {
|
|
common.skip('node compiled without OpenSSL or ' +
|
|
'with old OpenSSL version.');
|
|
return;
|
|
}
|
|
if (!common.opensslCli) {
|
|
common.skip('node compiled without OpenSSL CLI.');
|
|
return;
|
|
}
|
|
|
|
if (!common.hasCrypto) {
|
|
common.skip('missing crypto');
|
|
return;
|
|
}
|
|
const tls = require('tls');
|
|
|
|
const assert = require('assert');
|
|
const fs = require('fs');
|
|
const join = require('path').join;
|
|
|
|
const SSL_OP_NO_TICKET = require('crypto').constants.SSL_OP_NO_TICKET;
|
|
|
|
const pfx = fs.readFileSync(join(common.fixturesDir, 'keys', 'agent1-pfx.pem'));
|
|
|
|
function test(testOptions, cb) {
|
|
|
|
const keyFile = join(common.fixturesDir, 'keys', 'agent1-key.pem');
|
|
const certFile = join(common.fixturesDir, 'keys', 'agent1-cert.pem');
|
|
const caFile = join(common.fixturesDir, 'keys', 'ca1-cert.pem');
|
|
const key = fs.readFileSync(keyFile);
|
|
const cert = fs.readFileSync(certFile);
|
|
const ca = fs.readFileSync(caFile);
|
|
const options = {
|
|
key: key,
|
|
cert: cert,
|
|
ca: [ca]
|
|
};
|
|
let requestCount = 0;
|
|
let clientSecure = 0;
|
|
let ocspCount = 0;
|
|
let ocspResponse;
|
|
|
|
if (testOptions.pfx) {
|
|
delete options.key;
|
|
delete options.cert;
|
|
options.pfx = testOptions.pfx;
|
|
options.passphrase = testOptions.passphrase;
|
|
}
|
|
|
|
const server = tls.createServer(options, function(cleartext) {
|
|
cleartext.on('error', function(er) {
|
|
// We're ok with getting ECONNRESET in this test, but it's
|
|
// timing-dependent, and thus unreliable. Any other errors
|
|
// are just failures, though.
|
|
if (er.code !== 'ECONNRESET')
|
|
throw er;
|
|
});
|
|
++requestCount;
|
|
cleartext.end();
|
|
});
|
|
server.on('OCSPRequest', function(cert, issuer, callback) {
|
|
++ocspCount;
|
|
assert.ok(Buffer.isBuffer(cert));
|
|
assert.ok(Buffer.isBuffer(issuer));
|
|
|
|
// Just to check that async really works there
|
|
setTimeout(function() {
|
|
callback(null,
|
|
testOptions.response ? Buffer.from(testOptions.response) : null);
|
|
}, 100);
|
|
});
|
|
server.listen(0, function() {
|
|
const client = tls.connect({
|
|
port: this.address().port,
|
|
requestOCSP: testOptions.ocsp !== false,
|
|
secureOptions: testOptions.ocsp === false ?
|
|
SSL_OP_NO_TICKET : 0,
|
|
rejectUnauthorized: false
|
|
}, function() {
|
|
clientSecure++;
|
|
});
|
|
client.on('OCSPResponse', function(resp) {
|
|
ocspResponse = resp;
|
|
if (resp)
|
|
client.destroy();
|
|
});
|
|
client.on('close', function() {
|
|
server.close(cb);
|
|
});
|
|
});
|
|
|
|
process.on('exit', function() {
|
|
if (testOptions.ocsp === false) {
|
|
assert.strictEqual(requestCount, clientSecure);
|
|
assert.strictEqual(requestCount, 1);
|
|
return;
|
|
}
|
|
|
|
if (testOptions.response) {
|
|
assert.strictEqual(ocspResponse.toString(), testOptions.response);
|
|
} else {
|
|
assert.strictEqual(ocspResponse, null);
|
|
}
|
|
assert.strictEqual(requestCount, testOptions.response ? 0 : 1);
|
|
assert.strictEqual(clientSecure, requestCount);
|
|
assert.strictEqual(ocspCount, 1);
|
|
});
|
|
}
|
|
|
|
const tests = [
|
|
{ response: false },
|
|
{ response: 'hello world' },
|
|
{ ocsp: false }
|
|
];
|
|
|
|
if (!common.hasFipsCrypto) {
|
|
tests.push({ pfx: pfx, passphrase: 'sample', response: 'hello pfx' });
|
|
}
|
|
|
|
function runTests(i) {
|
|
if (i === tests.length) return;
|
|
|
|
test(tests[i], common.mustCall(function() {
|
|
runTests(i + 1);
|
|
}));
|
|
}
|
|
|
|
runTests(0);
|