summaryrefslogtreecommitdiff
path: root/test/parallel/test-tls-env-extra-ca.js
blob: 89f1b3a6c040d14d08173f7dec13fabd65b7f3d7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
// Certs in NODE_EXTRA_CA_CERTS are used for TLS peer validation

'use strict';
const common = require('../common');

if (!common.hasCrypto) {
  common.skip('missing crypto');
  return;
}

const assert = require('assert');
const tls = require('tls');
const fork = require('child_process').fork;
const fs = require('fs');

if (process.env.CHILD) {
  const copts = {
    port: process.env.PORT,
    checkServerIdentity: function() {},
  };
  const client = tls.connect(copts, function() {
    client.end('hi');
  });
  return;
}

const options = {
  key: fs.readFileSync(common.fixturesDir + '/keys/agent1-key.pem'),
  cert: fs.readFileSync(common.fixturesDir + '/keys/agent1-cert.pem'),
};

const server = tls.createServer(options, function(s) {
  s.end('bye');
  server.close();
}).listen(0, common.mustCall(function() {
  const env = {
    CHILD: 'yes',
    PORT: this.address().port,
    NODE_EXTRA_CA_CERTS: common.fixturesDir + '/keys/ca1-cert.pem',
  };

  fork(__filename, {env: env}).on('exit', common.mustCall(function(status) {
    assert.strictEqual(status, 0, 'client did not succeed in connecting');
  }));
}));