diff options
author | Sam Roberts <vieuxtech@gmail.com> | 2019-02-01 11:14:06 -0800 |
---|---|---|
committer | Sam Roberts <vieuxtech@gmail.com> | 2019-02-06 15:17:45 -0800 |
commit | 8bc39e7286526dfc1b7edf5861f9c4c6f6146721 (patch) | |
tree | 6f78ba853267a55e2629508a48d208bc15bed514 /test | |
parent | cdd6eb237b8393531a1beeef00901e89e5279c0a (diff) | |
download | android-node-v8-8bc39e7286526dfc1b7edf5861f9c4c6f6146721.tar.gz android-node-v8-8bc39e7286526dfc1b7edf5861f9c4c6f6146721.tar.bz2 android-node-v8-8bc39e7286526dfc1b7edf5861f9c4c6f6146721.zip |
test: do not assume server gets secure connection
Test assumed that server got the the connection before the client
destroys it, but that is not guaranteed. Also, the test was closing the
TCP connection 3 times, effectively:
1. on the server side, right after TLS connection occurs (if it does)
2. on the client side, internal to tls, when the cert is rejected
3. again on the client side, in the error event which is emitted by
the internal tls destroy from 2
This is too often, and the dependency on 1 occurring is fragile.
PR-URL: https://github.com/nodejs/node/pull/25508
Reviewed-By: Anna Henningsen <anna@addaleax.net>
Reviewed-By: James M Snell <jasnell@gmail.com>
Diffstat (limited to 'test')
-rw-r--r-- | test/parallel/test-tls-friendly-error-message.js | 7 |
1 files changed, 4 insertions, 3 deletions
diff --git a/test/parallel/test-tls-friendly-error-message.js b/test/parallel/test-tls-friendly-error-message.js index b52918be27..4ae9d3f3f9 100644 --- a/test/parallel/test-tls-friendly-error-message.js +++ b/test/parallel/test-tls-friendly-error-message.js @@ -31,14 +31,15 @@ const tls = require('tls'); const key = fixtures.readKey('agent1-key.pem'); const cert = fixtures.readKey('agent1-cert.pem'); -tls.createServer({ key, cert }, common.mustCall(function(conn) { - conn.end(); +tls.createServer({ key, cert }).on('connection', common.mustCall(function() { + // Server only receives one TCP connection, stop listening when that + // connection is destroyed by the client, which it should do after the cert is + // rejected as unauthorized. this.close(); })).listen(0, common.mustCall(function() { const options = { port: this.address().port, rejectUnauthorized: true }; tls.connect(options).on('error', common.mustCall(function(err) { assert.strictEqual(err.code, 'UNABLE_TO_VERIFY_LEAF_SIGNATURE'); assert.strictEqual(err.message, 'unable to verify the first certificate'); - this.destroy(); })); })); |