summaryrefslogtreecommitdiff
path: root/test/parallel/test-tls-env-bad-extra-ca.js
blob: 5167f58607918791d456c7a273861092bd9131d2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
// Setting NODE_EXTRA_CA_CERTS to non-existent file emits a warning

'use strict';
const common = require('../common');

if (!common.hasCrypto)
  common.skip('missing crypto');

const assert = require('assert');
const fixtures = require('../common/fixtures');
const fork = require('child_process').fork;
const tls = require('tls');

if (process.env.CHILD) {
  // This will try to load the extra CA certs, and emit a warning when it fails.
  return tls.createServer({});
}

const env = Object.assign({}, process.env, {
  CHILD: 'yes',
  NODE_EXTRA_CA_CERTS: `${fixtures.fixturesDir}/no-such-file-exists-🐢`,
});

const opts = {
  env: env,
  silent: true,
};
let stderr = '';

fork(__filename, opts)
  .on('exit', common.mustCall(function(status) {
    // Check that client succeeded in connecting.
    assert.strictEqual(status, 0);
  }))
  .on('close', common.mustCall(function() {
    // TODO(addaleax): Make `SafeGetenv` work like `process.env`
    // encoding-wise
    if (!common.isWindows) {
      const re = /Warning: Ignoring extra certs from.*no-such-file-exists-🐢.* load failed:.*No such file or directory/;
      assert(re.test(stderr), stderr);
    }
  }))
  .stderr.setEncoding('utf8').on('data', function(str) {
    stderr += str;
  });