summaryrefslogtreecommitdiff
path: root/test/parallel/test-https-agent-session-injection.js
blob: cb9358b1b1700925e893fa9680fc734b35fb699c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
'use strict';
const common = require('../common');
const assert = require('assert');

if (!common.hasCrypto)
  common.skip('missing crypto');

const https = require('https');
const fixtures = require('../common/fixtures');

const options = {
  key: fixtures.readKey('agent1-key.pem'),

  // NOTE: Certificate Common Name is 'agent1'
  cert: fixtures.readKey('agent1-cert.pem'),

  // NOTE: TLS 1.3 creates new session ticket **after** handshake so
  // `getSession()` output will be different even if the session was reused
  // during the handshake.
  secureProtocol: 'TLSv1_2_method'
};

const ca = [ fixtures.readKey('ca1-cert.pem') ];

const server = https.createServer(options, function(req, res) {
  res.end('ok');
}).listen(0, common.mustCall(function() {
  const port = this.address().port;

  const req = https.get({
    port,
    path: '/',
    ca,
    servername: 'nodejs.org',
  }, common.mustNotCall(() => {}));

  req.on('error', common.mustCall((err) => {
    assert.strictEqual(
      err.message,
      'Hostname/IP does not match certificate\'s altnames: ' +
        'Host: nodejs.org. is not cert\'s CN: agent1');

    const second = https.get({
      port,
      path: '/',
      ca,
      servername: 'nodejs.org',
    }, common.mustNotCall(() => {}));

    second.on('error', common.mustCall((err) => {
      server.close();

      assert.strictEqual(
        err.message,
        'Hostname/IP does not match certificate\'s altnames: ' +
          'Host: nodejs.org. is not cert\'s CN: agent1');
    }));
  }));
}));