summaryrefslogtreecommitdiff
path: root/test/parallel/test-tls-socket-default-options.js
blob: 87f785dab5e1b3392212f4756124f0d7ea78e525 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
'use strict';
const common = require('../common');
const fixtures = require('../common/fixtures');

// Test directly created TLS sockets and options.

const assert = require('assert');
const {
  connect, keys, tls
} = require(fixtures.path('tls-connect'));

test(undefined, (err) => {
  assert.strictEqual(err.message, 'unable to verify the first certificate');
});

test({}, (err) => {
  assert.strictEqual(err.message, 'unable to verify the first certificate');
});

test(
  { secureContext: tls.createSecureContext({ ca: keys.agent1.ca }) },
  (err) => { assert.ifError(err); });

test(
  { ca: keys.agent1.ca },
  (err) => { assert.ifError(err); });

// Secure context options, like ca, are ignored if a sec ctx is explicitly
// provided.
test(
  { secureContext: tls.createSecureContext(), ca: keys.agent1.ca },
  (err) => {
    assert.strictEqual(err.message,
                       'unable to verify the first certificate');
  });

function test(client, callback) {
  callback = common.mustCall(callback);
  connect({
    server: {
      key: keys.agent1.key,
      cert: keys.agent1.cert,
    },
  }, function(err, pair, cleanup) {
    assert.strictEqual(err.message, 'unable to verify the first certificate');
    let recv = '';
    pair.server.server.once('secureConnection', common.mustCall((conn) => {
      conn.on('data', (data) => recv += data);
      conn.on('end', common.mustCall(() => {
        // Server sees nothing wrong with connection, even though the client's
        // authentication of the server cert failed.
        assert.strictEqual(recv, 'hello');
        cleanup();
      }));
    }));

    // `new TLSSocket` doesn't support the 'secureConnect' event on client side,
    // and doesn't error if authentication failed. Caller must explicitly check
    // for failure.
    (new tls.TLSSocket(null, client)).connect(pair.server.server.address().port)
      .on('connect', common.mustCall(function() {
        this.end('hello');
      }))
      .on('secure', common.mustCall(function() {
        callback(this.ssl.verifyError());
      }));
  });
}