2015-05-19 11:00:06 +00:00
|
|
|
'use strict';
|
2015-08-19 06:15:25 +00:00
|
|
|
const common = require('../common');
|
2011-01-02 09:13:56 +00:00
|
|
|
|
2015-03-04 01:11:21 +00:00
|
|
|
if (!common.hasCrypto) {
|
2016-05-11 19:34:52 +00:00
|
|
|
common.skip('missing crypto');
|
2015-07-07 15:25:55 +00:00
|
|
|
return;
|
2015-03-04 01:11:21 +00:00
|
|
|
}
|
|
|
|
|
2015-08-19 06:15:25 +00:00
|
|
|
const assert = require('assert');
|
|
|
|
const https = require('https');
|
|
|
|
const fs = require('fs');
|
2011-01-02 09:13:56 +00:00
|
|
|
|
2015-08-19 06:15:25 +00:00
|
|
|
const options = {
|
2011-01-02 09:13:56 +00:00
|
|
|
key: fs.readFileSync(common.fixturesDir + '/keys/agent1-key.pem'),
|
|
|
|
cert: fs.readFileSync(common.fixturesDir + '/keys/agent1-cert.pem')
|
|
|
|
};
|
|
|
|
|
2015-08-19 06:15:25 +00:00
|
|
|
const tests = 2;
|
|
|
|
let successful = 0;
|
2011-01-02 09:13:56 +00:00
|
|
|
|
2015-08-19 06:15:25 +00:00
|
|
|
const testSucceeded = function() {
|
|
|
|
successful = successful + 1;
|
|
|
|
if (successful === tests) {
|
|
|
|
server.close();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
const body = 'hello world\n';
|
|
|
|
|
|
|
|
const serverCallback = common.mustCall(function(req, res) {
|
2011-01-02 09:13:56 +00:00
|
|
|
res.writeHead(200, { 'content-type': 'text/plain' });
|
|
|
|
res.end(body);
|
2011-10-04 22:08:18 +00:00
|
|
|
});
|
2011-01-02 09:13:56 +00:00
|
|
|
|
2015-08-19 06:15:25 +00:00
|
|
|
const server = https.createServer(options, serverCallback);
|
2011-01-02 09:13:56 +00:00
|
|
|
|
2016-05-29 07:06:56 +00:00
|
|
|
server.listen(0, function() {
|
2015-08-19 06:15:25 +00:00
|
|
|
// Do a request ignoring the unauthorized server certs
|
|
|
|
const noCertCheckOptions = {
|
|
|
|
hostname: '127.0.0.1',
|
2016-05-29 07:06:56 +00:00
|
|
|
port: this.address().port,
|
2015-08-19 06:15:25 +00:00
|
|
|
path: '/',
|
|
|
|
method: 'GET',
|
|
|
|
rejectUnauthorized: false
|
|
|
|
};
|
|
|
|
noCertCheckOptions.Agent = new https.Agent(noCertCheckOptions);
|
|
|
|
|
|
|
|
const req = https.request(noCertCheckOptions, function(res) {
|
|
|
|
let responseBody = '';
|
|
|
|
res.on('data', function(d) {
|
|
|
|
responseBody = responseBody + d;
|
|
|
|
});
|
|
|
|
|
|
|
|
res.on('end', function() {
|
2017-01-08 15:36:25 +00:00
|
|
|
assert.strictEqual(responseBody, body);
|
2015-08-19 06:15:25 +00:00
|
|
|
testSucceeded();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
req.end();
|
|
|
|
|
|
|
|
req.on('error', function(e) {
|
|
|
|
throw e;
|
|
|
|
});
|
|
|
|
|
|
|
|
// Do a request that throws error due to the invalid server certs
|
|
|
|
const checkCertOptions = {
|
|
|
|
hostname: '127.0.0.1',
|
2016-05-29 07:06:56 +00:00
|
|
|
port: this.address().port,
|
2015-08-19 06:15:25 +00:00
|
|
|
path: '/',
|
|
|
|
method: 'GET'
|
|
|
|
};
|
|
|
|
|
|
|
|
const checkCertReq = https.request(checkCertOptions, function(res) {
|
|
|
|
res.on('data', function() {
|
|
|
|
throw new Error('data should not be received');
|
2011-01-07 18:57:39 +00:00
|
|
|
});
|
2015-08-19 06:15:25 +00:00
|
|
|
|
|
|
|
res.on('end', function() {
|
|
|
|
throw new Error('connection should not be established');
|
|
|
|
});
|
|
|
|
});
|
|
|
|
checkCertReq.end();
|
|
|
|
|
|
|
|
checkCertReq.on('error', function(e) {
|
2017-01-08 15:36:25 +00:00
|
|
|
assert.strictEqual(e.code, 'UNABLE_TO_VERIFY_LEAF_SIGNATURE');
|
2015-08-19 06:15:25 +00:00
|
|
|
testSucceeded();
|
2011-01-07 18:57:39 +00:00
|
|
|
});
|
2011-01-02 09:13:56 +00:00
|
|
|
});
|
|
|
|
|
2011-10-04 22:08:18 +00:00
|
|
|
process.on('exit', function() {
|
2017-01-08 15:36:25 +00:00
|
|
|
assert.strictEqual(successful, tests);
|
2011-01-02 09:13:56 +00:00
|
|
|
});
|