summaryrefslogtreecommitdiff
path: root/test/parallel/test-tls-env-extra-ca-file-load.js
blob: 85ee22b570e35ee588c91147c47c881c19fc333e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
'use strict';
// Flags: --expose-internals

const common = require('../common');

if (!common.hasCrypto)
  common.skip('missing crypto');

const assert = require('assert');
const tls = require('tls');
const fixtures = require('../common/fixtures');
const { internalBinding } = require('internal/test/binding');
const binding = internalBinding('crypto');

const { fork } = require('child_process');

// This test ensures that extra certificates are loaded at startup.
if (process.argv[2] !== 'child') {
  if (process.env.CHILD_USE_EXTRA_CA_CERTS === 'yes') {
    assert.strictEqual(binding.isExtraRootCertsFileLoaded(), true);
  } else if (process.env.CHILD_USE_EXTRA_CA_CERTS === 'no') {
    assert.strictEqual(binding.isExtraRootCertsFileLoaded(), false);
    tls.createServer({});
    assert.strictEqual(binding.isExtraRootCertsFileLoaded(), false);
  }
} else {
  const NODE_EXTRA_CA_CERTS = fixtures.path('keys', 'ca1-cert.pem');
  const extendsEnv = (obj) => Object.assign({}, process.env, obj);

  [
    extendsEnv({ CHILD_USE_EXTRA_CA_CERTS: 'yes', NODE_EXTRA_CA_CERTS }),
    extendsEnv({ CHILD_USE_EXTRA_CA_CERTS: 'no' }),
  ].forEach((processEnv) => {
    fork(__filename, ['child'], { env: processEnv })
    .on('exit', common.mustCall((status) => {
      // Client did not succeed in connecting
      assert.strictEqual(status, 0);
    }));
  });
}