summaryrefslogtreecommitdiff
path: root/test/parallel/test-tls-multiple-cas-as-string.js
blob: 679d6b6c4cdc426f01c856febddc9717d47cdd3c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
'use strict';
const common = require('../common');

if (!common.hasCrypto)
  common.skip('missing crypto');

// Verify that multiple CA certificates can be provided, and that for
// convenience that can also be in newline-separated strings.

const tls = require('tls');
const fixtures = require('../common/fixtures');

const ca1 = fixtures.readKey('ca1-cert.pem', 'utf8');
const ca2 = fixtures.readKey('ca2-cert.pem', 'utf8');
const cert = fixtures.readKey('agent3-cert.pem', 'utf8');
const key = fixtures.readKey('agent3-key.pem', 'utf8');

function test(ca) {
  const server = tls.createServer({ ca, cert, key });

  server.addContext('agent3', { ca, cert, key });

  const host = common.localhostIPv4;
  server.listen(0, host, common.mustCall(() => {
    const socket = tls.connect({
      servername: 'agent3',
      host,
      port: server.address().port,
      ca
    }, common.mustCall(() => {
      socket.end();
    }));

    socket.on('close', () => {
      server.close();
    });
  }));
}

// `ca1` is not actually necessary for the certificate validation -- maybe
// the fixtures should be written in a way that requires it?
test([ca1, ca2]);
test(`${ca1}\n${ca2}`);