summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBen Noordhuis <info@bnoordhuis.nl>2013-06-15 20:33:17 +0200
committerBen Noordhuis <info@bnoordhuis.nl>2013-06-15 20:35:59 +0200
commit10133aaa467648b62e537bd7160bea2e4e33824d (patch)
tree22eed13942d9a5423e61b51630a8607ee6d3a162
parent5613803f8dbd154accad5e38918143244d9ccd55 (diff)
downloadnode-new-10133aaa467648b62e537bd7160bea2e4e33824d.tar.gz
test: add https tls session reuse test
Check that TLS session resumptions work with HTTPS servers. Regression test for #3901.
-rw-r--r--test/simple/test-https-client-resume.js92
1 files changed, 92 insertions, 0 deletions
diff --git a/test/simple/test-https-client-resume.js b/test/simple/test-https-client-resume.js
new file mode 100644
index 0000000000..0433afdd99
--- /dev/null
+++ b/test/simple/test-https-client-resume.js
@@ -0,0 +1,92 @@
+// Copyright Joyent, Inc. and other Node contributors.
+//
+// Permission is hereby granted, free of charge, to any person obtaining a
+// copy of this software and associated documentation files (the
+// "Software"), to deal in the Software without restriction, including
+// without limitation the rights to use, copy, modify, merge, publish,
+// distribute, sublicense, and/or sell copies of the Software, and to permit
+// persons to whom the Software is furnished to do so, subject to the
+// following conditions:
+//
+// The above copyright notice and this permission notice shall be included
+// in all copies or substantial portions of the Software.
+//
+// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
+// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
+// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
+// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
+// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
+// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
+// USE OR OTHER DEALINGS IN THE SOFTWARE.
+
+// Create an ssl server. First connection, validate that not resume.
+// Cache session and close connection. Use session on second connection.
+// ASSERT resumption.
+
+if (!process.versions.openssl) {
+ console.error('Skipping because node compiled without OpenSSL.');
+ process.exit(0);
+}
+
+var common = require('../common');
+var assert = require('assert');
+var https = require('https');
+var tls = require('tls');
+var fs = require('fs');
+
+var options = {
+ key: fs.readFileSync(common.fixturesDir + '/keys/agent2-key.pem'),
+ cert: fs.readFileSync(common.fixturesDir + '/keys/agent2-cert.pem')
+};
+
+var connections = 0;
+
+// create server
+var server = https.createServer(options, function(res, res) {
+ res.end('Goodbye');
+ connections++;
+});
+
+// start listening
+server.listen(common.PORT, function() {
+
+ var session1 = null;
+ var client1 = tls.connect({
+ port: common.PORT,
+ rejectUnauthorized: false
+ }, function() {
+ console.log('connect1');
+ assert.ok(!client1.isSessionReused(), 'Session *should not* be reused.');
+ session1 = client1.getSession();
+ client1.write('GET / HTTP/1.0\r\n' +
+ 'Server: 127.0.0.1\r\n' +
+ '\r\n');
+ });
+
+ client1.on('close', function() {
+ console.log('close1');
+
+ var opts = {
+ port: common.PORT,
+ rejectUnauthorized: false,
+ session: session1
+ };
+
+ var client2 = tls.connect(opts, function() {
+ console.log('connect2');
+ assert.ok(client2.isSessionReused(), 'Session *should* be reused.');
+ client2.write('GET / HTTP/1.0\r\n' +
+ 'Server: 127.0.0.1\r\n' +
+ '\r\n');
+ });
+
+ client2.on('close', function() {
+ console.log('close2');
+ server.close();
+ });
+ });
+});
+
+process.on('exit', function() {
+ assert.equal(2, connections);
+});