summaryrefslogtreecommitdiff
path: root/test
diff options
context:
space:
mode:
authorSam Roberts <vieuxtech@gmail.com>2019-02-01 11:14:06 -0800
committerSam Roberts <vieuxtech@gmail.com>2019-02-06 15:17:45 -0800
commit8bc39e7286526dfc1b7edf5861f9c4c6f6146721 (patch)
tree6f78ba853267a55e2629508a48d208bc15bed514 /test
parentcdd6eb237b8393531a1beeef00901e89e5279c0a (diff)
downloadandroid-node-v8-8bc39e7286526dfc1b7edf5861f9c4c6f6146721.tar.gz
android-node-v8-8bc39e7286526dfc1b7edf5861f9c4c6f6146721.tar.bz2
android-node-v8-8bc39e7286526dfc1b7edf5861f9c4c6f6146721.zip
test: do not assume server gets secure connection
Test assumed that server got the the connection before the client destroys it, but that is not guaranteed. Also, the test was closing the TCP connection 3 times, effectively: 1. on the server side, right after TLS connection occurs (if it does) 2. on the client side, internal to tls, when the cert is rejected 3. again on the client side, in the error event which is emitted by the internal tls destroy from 2 This is too often, and the dependency on 1 occurring is fragile. PR-URL: https://github.com/nodejs/node/pull/25508 Reviewed-By: Anna Henningsen <anna@addaleax.net> Reviewed-By: James M Snell <jasnell@gmail.com>
Diffstat (limited to 'test')
-rw-r--r--test/parallel/test-tls-friendly-error-message.js7
1 files changed, 4 insertions, 3 deletions
diff --git a/test/parallel/test-tls-friendly-error-message.js b/test/parallel/test-tls-friendly-error-message.js
index b52918be27..4ae9d3f3f9 100644
--- a/test/parallel/test-tls-friendly-error-message.js
+++ b/test/parallel/test-tls-friendly-error-message.js
@@ -31,14 +31,15 @@ const tls = require('tls');
const key = fixtures.readKey('agent1-key.pem');
const cert = fixtures.readKey('agent1-cert.pem');
-tls.createServer({ key, cert }, common.mustCall(function(conn) {
- conn.end();
+tls.createServer({ key, cert }).on('connection', common.mustCall(function() {
+ // Server only receives one TCP connection, stop listening when that
+ // connection is destroyed by the client, which it should do after the cert is
+ // rejected as unauthorized.
this.close();
})).listen(0, common.mustCall(function() {
const options = { port: this.address().port, rejectUnauthorized: true };
tls.connect(options).on('error', common.mustCall(function(err) {
assert.strictEqual(err.code, 'UNABLE_TO_VERIFY_LEAF_SIGNATURE');
assert.strictEqual(err.message, 'unable to verify the first certificate');
- this.destroy();
}));
}));