// Copyright Joyent, Inc. and other Node contributors. // // Permission is hereby granted, free of charge, to any person obtaining a // copy of this software and associated documentation files (the // "Software"), to deal in the Software without restriction, including // without limitation the rights to use, copy, modify, merge, publish, // distribute, sublicense, and/or sell copies of the Software, and to permit // persons to whom the Software is furnished to do so, subject to the // following conditions: // // The above copyright notice and this permission notice shall be included // in all copies or substantial portions of the Software. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS // OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN // NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, // DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR // OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE // USE OR OTHER DEALINGS IN THE SOFTWARE. if (!process.versions.openssl) { console.error('Skipping because node compiled without OpenSSL.'); process.exit(0); } var hosterr = /Hostname\/IP doesn\'t match certificate\'s altnames/g; var testCases = [{ ca: ['ca1-cert'], key: 'agent2-key', cert: 'agent2-cert', servers: [ { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, { ok: false, key: 'agent3-key', cert: 'agent3-cert' } ] }, { ca: [], key: 'agent2-key', cert: 'agent2-cert', servers: [ { ok: false, key: 'agent1-key', cert: 'agent1-cert' }, { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, { ok: false, key: 'agent3-key', cert: 'agent3-cert' } ] }, { ca: ['ca1-cert', 'ca2-cert'], key: 'agent2-key', cert: 'agent2-cert', servers: [ { ok: true, key: 'agent1-key', cert: 'agent1-cert' }, { ok: false, key: 'agent2-key', cert: 'agent2-cert' }, { ok: true, key: 'agent3-key', cert: 'agent3-cert' } ] } ]; var common = require('../common'); var assert = require('assert'); var fs = require('fs'); var tls = require('tls'); function filenamePEM(n) { return require('path').join(common.fixturesDir, 'keys', n + '.pem'); } function loadPEM(n) { return fs.readFileSync(filenamePEM(n)); } var successfulTests = 0; function testServers(index, servers, clientOptions, cb) { var serverOptions = servers[index]; if (!serverOptions) { cb(); return; } var ok = serverOptions.ok; if (serverOptions.key) { serverOptions.key = loadPEM(serverOptions.key); } if (serverOptions.cert) { serverOptions.cert = loadPEM(serverOptions.cert); } var server = tls.createServer(serverOptions, function(s) { s.end('hello world\n'); }); server.listen(common.PORT, function() { var b = ''; console.error('connecting...'); var client = tls.connect(clientOptions, function() { var authorized = client.authorized || hosterr.test(client.authorizationError); console.error('expected: ' + ok + ' authed: ' + authorized); assert.equal(ok, authorized); server.close(); }); client.on('data', function(d) { b += d.toString(); }); client.on('end', function() { assert.equal('hello world\n', b); }); client.on('close', function() { testServers(index + 1, servers, clientOptions, cb); }); }); } function runTest(testIndex) { var tcase = testCases[testIndex]; if (!tcase) return; var clientOptions = { port: common.PORT, ca: tcase.ca.map(loadPEM), key: loadPEM(tcase.key), cert: loadPEM(tcase.cert), rejectUnauthorized: false }; testServers(0, tcase.servers, clientOptions, function() { successfulTests++; runTest(testIndex + 1); }); } runTest(0); process.on('exit', function() { console.log('successful tests: %d', successfulTests); assert.equal(successfulTests, testCases.length); });