mirror of
https://github.com/nodejs/node.git
synced 2024-12-01 16:10:02 +01:00
04b4d15b39
Many of the tests use variables to track when callback functions are invoked or events are emitted. These variables are then asserted on process exit. This commit replaces this pattern in straightforward cases with common.mustCall(). This makes the tests easier to reason about, leads to a net reduction in lines of code, and uncovered a few bugs in tests. This commit also replaces some callbacks that should never be called with common.fail(). PR-URL: https://github.com/nodejs/node/pull/7753 Reviewed-By: Wyatt Preul <wpreul@gmail.com> Reviewed-By: Minwoo Jung <jmwsoft@gmail.com> Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
134 lines
2.9 KiB
JavaScript
134 lines
2.9 KiB
JavaScript
'use strict';
|
|
var common = require('../common');
|
|
var assert = require('assert');
|
|
|
|
if (!common.hasCrypto) {
|
|
common.skip('missing crypto');
|
|
return;
|
|
}
|
|
var tls = require('tls');
|
|
|
|
var join = require('path').join;
|
|
var net = require('net');
|
|
var fs = require('fs');
|
|
var spawn = require('child_process').spawn;
|
|
|
|
var key = fs.readFileSync(join(common.fixturesDir, 'agent.key')).toString();
|
|
var cert = fs.readFileSync(join(common.fixturesDir, 'agent.crt')).toString();
|
|
|
|
function log(a) {
|
|
console.error('***server*** ' + a);
|
|
}
|
|
|
|
var server = net.createServer(common.mustCall(function(socket) {
|
|
log('connection fd=' + socket.fd);
|
|
var sslcontext = tls.createSecureContext({key: key, cert: cert});
|
|
sslcontext.context.setCiphers('RC4-SHA:AES128-SHA:AES256-SHA');
|
|
|
|
var pair = tls.createSecurePair(sslcontext, true);
|
|
|
|
assert.ok(pair.encrypted.writable);
|
|
assert.ok(pair.cleartext.writable);
|
|
|
|
pair.encrypted.pipe(socket);
|
|
socket.pipe(pair.encrypted);
|
|
|
|
log('i set it secure');
|
|
|
|
pair.on('secure', function() {
|
|
log('connected+secure!');
|
|
pair.cleartext.write('hello\r\n');
|
|
log(pair.cleartext.getPeerCertificate());
|
|
log(pair.cleartext.getCipher());
|
|
});
|
|
|
|
pair.cleartext.on('data', function(data) {
|
|
log('read bytes ' + data.length);
|
|
pair.cleartext.write(data);
|
|
});
|
|
|
|
socket.on('end', function() {
|
|
log('socket end');
|
|
});
|
|
|
|
pair.cleartext.on('error', function(err) {
|
|
log('got error: ');
|
|
log(err);
|
|
log(err.stack);
|
|
socket.destroy();
|
|
});
|
|
|
|
pair.encrypted.on('error', function(err) {
|
|
log('encrypted error: ');
|
|
log(err);
|
|
log(err.stack);
|
|
socket.destroy();
|
|
});
|
|
|
|
socket.on('error', function(err) {
|
|
log('socket error: ');
|
|
log(err);
|
|
log(err.stack);
|
|
socket.destroy();
|
|
});
|
|
|
|
socket.on('close', function(err) {
|
|
log('socket closed');
|
|
});
|
|
|
|
pair.on('error', function(err) {
|
|
log('secure error: ');
|
|
log(err);
|
|
log(err.stack);
|
|
socket.destroy();
|
|
});
|
|
}));
|
|
|
|
var gotHello = false;
|
|
var sentWorld = false;
|
|
var gotWorld = false;
|
|
|
|
server.listen(0, common.mustCall(function() {
|
|
// To test use: openssl s_client -connect localhost:8000
|
|
|
|
var args = ['s_client', '-connect', `127.0.0.1:${this.address().port}`];
|
|
|
|
// for the performance and stability issue in s_client on Windows
|
|
if (common.isWindows)
|
|
args.push('-no_rand_screen');
|
|
|
|
var client = spawn(common.opensslCli, args);
|
|
|
|
|
|
var out = '';
|
|
|
|
client.stdout.setEncoding('utf8');
|
|
client.stdout.on('data', function(d) {
|
|
out += d;
|
|
|
|
if (!gotHello && /hello/.test(out)) {
|
|
gotHello = true;
|
|
client.stdin.write('world\r\n');
|
|
sentWorld = true;
|
|
}
|
|
|
|
if (!gotWorld && /world/.test(out)) {
|
|
gotWorld = true;
|
|
client.stdin.end();
|
|
}
|
|
});
|
|
|
|
client.stdout.pipe(process.stdout, { end: false });
|
|
|
|
client.on('exit', common.mustCall(function(code) {
|
|
assert.strictEqual(0, code);
|
|
server.close();
|
|
}));
|
|
}));
|
|
|
|
process.on('exit', function() {
|
|
assert.ok(gotHello);
|
|
assert.ok(sentWorld);
|
|
assert.ok(gotWorld);
|
|
});
|