mirror of
https://github.com/nodejs/node.git
synced 2024-11-30 07:27:22 +01:00
2bc7841d0f
This helps to prevent issues where a failed test can keep a bound socket open long enough to cause other tests to fail with EADDRINUSE because the same port number is used. PR-URL: https://github.com/nodejs/node/pull/7045 Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl> Reviewed-By: Matteo Collina <matteo.collina@gmail.com> Reviewed-By: Rod Vagg <rod@vagg.org>
117 lines
2.6 KiB
JavaScript
117 lines
2.6 KiB
JavaScript
'use strict';
|
|
const common = require('../common');
|
|
if (!process.features.tls_sni) {
|
|
common.skip('node compiled without OpenSSL or ' +
|
|
'with old OpenSSL version.');
|
|
return;
|
|
}
|
|
|
|
const assert = require('assert');
|
|
const fs = require('fs');
|
|
|
|
if (!common.hasCrypto) {
|
|
common.skip('missing crypto');
|
|
return;
|
|
}
|
|
var tls = require('tls');
|
|
|
|
function filenamePEM(n) {
|
|
return require('path').join(common.fixturesDir, 'keys', n + '.pem');
|
|
}
|
|
|
|
function loadPEM(n) {
|
|
return fs.readFileSync(filenamePEM(n));
|
|
}
|
|
|
|
var serverOptions = {
|
|
key: loadPEM('agent2-key'),
|
|
cert: loadPEM('agent2-cert')
|
|
};
|
|
|
|
var SNIContexts = {
|
|
'a.example.com': {
|
|
key: loadPEM('agent1-key'),
|
|
cert: loadPEM('agent1-cert')
|
|
},
|
|
'asterisk.test.com': {
|
|
key: loadPEM('agent3-key'),
|
|
cert: loadPEM('agent3-cert')
|
|
},
|
|
'chain.example.com': {
|
|
key: loadPEM('agent6-key'),
|
|
// NOTE: Contains ca3 chain cert
|
|
cert: loadPEM('agent6-cert')
|
|
}
|
|
};
|
|
|
|
var clientsOptions = [{
|
|
port: undefined,
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'a.example.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: undefined,
|
|
ca: [loadPEM('ca2-cert')],
|
|
servername: 'b.test.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: undefined,
|
|
ca: [loadPEM('ca2-cert')],
|
|
servername: 'a.b.test.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: undefined,
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'c.wrong.com',
|
|
rejectUnauthorized: false
|
|
}, {
|
|
port: undefined,
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'chain.example.com',
|
|
rejectUnauthorized: false
|
|
}];
|
|
|
|
const serverResults = [];
|
|
const clientResults = [];
|
|
|
|
var server = tls.createServer(serverOptions, function(c) {
|
|
serverResults.push(c.servername);
|
|
});
|
|
|
|
server.addContext('a.example.com', SNIContexts['a.example.com']);
|
|
server.addContext('*.test.com', SNIContexts['asterisk.test.com']);
|
|
server.addContext('chain.example.com', SNIContexts['chain.example.com']);
|
|
|
|
server.listen(0, startTest);
|
|
|
|
function startTest() {
|
|
var i = 0;
|
|
function start() {
|
|
// No options left
|
|
if (i === clientsOptions.length)
|
|
return server.close();
|
|
|
|
var options = clientsOptions[i++];
|
|
options.port = server.address().port;
|
|
var client = tls.connect(options, function() {
|
|
clientResults.push(
|
|
client.authorizationError &&
|
|
/Hostname\/IP doesn't/.test(client.authorizationError));
|
|
client.destroy();
|
|
|
|
// Continue
|
|
start();
|
|
});
|
|
}
|
|
|
|
start();
|
|
}
|
|
|
|
process.on('exit', function() {
|
|
assert.deepStrictEqual(serverResults, [
|
|
'a.example.com', 'b.test.com', 'a.b.test.com', 'c.wrong.com',
|
|
'chain.example.com'
|
|
]);
|
|
assert.deepStrictEqual(clientResults, [true, true, false, false, true]);
|
|
});
|