175 lines
4.6 KiB
JavaScript
175 lines
4.6 KiB
JavaScript
// Copyright Joyent, Inc. and other Node contributors.
|
|
//
|
|
// Permission is hereby granted, free of charge, to any person obtaining a
|
|
// copy of this software and associated documentation files (the
|
|
// "Software"), to deal in the Software without restriction, including
|
|
// without limitation the rights to use, copy, modify, merge, publish,
|
|
// distribute, sublicense, and/or sell copies of the Software, and to permit
|
|
// persons to whom the Software is furnished to do so, subject to the
|
|
// following conditions:
|
|
//
|
|
// The above copyright notice and this permission notice shall be included
|
|
// in all copies or substantial portions of the Software.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
|
|
// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
|
|
// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
|
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
'use strict';
|
|
const common = require('../common');
|
|
if (!common.hasCrypto)
|
|
common.skip('missing crypto');
|
|
|
|
const assert = require('assert');
|
|
const tls = require('tls');
|
|
const fixtures = require('../common/fixtures');
|
|
|
|
function loadPEM(n) {
|
|
return fixtures.readKey(`${n}.pem`);
|
|
}
|
|
|
|
const serverOptions = {
|
|
key: loadPEM('agent2-key'),
|
|
cert: loadPEM('agent2-cert'),
|
|
requestCert: true,
|
|
rejectUnauthorized: false,
|
|
SNICallback: function(servername, callback) {
|
|
const context = SNIContexts[servername];
|
|
|
|
// Just to test asynchronous callback
|
|
setTimeout(function() {
|
|
if (context) {
|
|
if (context.emptyRegression)
|
|
callback(null, {});
|
|
else
|
|
callback(null, tls.createSecureContext(context));
|
|
} else {
|
|
callback(null, null);
|
|
}
|
|
}, 100);
|
|
}
|
|
};
|
|
|
|
const SNIContexts = {
|
|
'a.example.com': {
|
|
key: loadPEM('agent1-key'),
|
|
cert: loadPEM('agent1-cert'),
|
|
ca: [ loadPEM('ca2-cert') ]
|
|
},
|
|
'b.example.com': {
|
|
key: loadPEM('agent3-key'),
|
|
cert: loadPEM('agent3-cert')
|
|
},
|
|
'c.another.com': {
|
|
emptyRegression: true
|
|
}
|
|
};
|
|
|
|
test({
|
|
port: undefined,
|
|
key: loadPEM('agent1-key'),
|
|
cert: loadPEM('agent1-cert'),
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'a.example.com',
|
|
rejectUnauthorized: false
|
|
},
|
|
true,
|
|
{ sni: 'a.example.com', authorized: false },
|
|
null,
|
|
null);
|
|
|
|
test({
|
|
port: undefined,
|
|
key: loadPEM('agent4-key'),
|
|
cert: loadPEM('agent4-cert'),
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'a.example.com',
|
|
rejectUnauthorized: false
|
|
},
|
|
true,
|
|
{ sni: 'a.example.com', authorized: true },
|
|
null,
|
|
null);
|
|
|
|
test({
|
|
port: undefined,
|
|
key: loadPEM('agent2-key'),
|
|
cert: loadPEM('agent2-cert'),
|
|
ca: [loadPEM('ca2-cert')],
|
|
servername: 'b.example.com',
|
|
rejectUnauthorized: false
|
|
},
|
|
true,
|
|
{ sni: 'b.example.com', authorized: false },
|
|
null,
|
|
null);
|
|
|
|
test({
|
|
port: undefined,
|
|
key: loadPEM('agent3-key'),
|
|
cert: loadPEM('agent3-cert'),
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'c.wrong.com',
|
|
rejectUnauthorized: false
|
|
},
|
|
false,
|
|
{ sni: 'c.wrong.com', authorized: false },
|
|
null,
|
|
null);
|
|
|
|
test({
|
|
port: undefined,
|
|
key: loadPEM('agent3-key'),
|
|
cert: loadPEM('agent3-cert'),
|
|
ca: [loadPEM('ca1-cert')],
|
|
servername: 'c.another.com',
|
|
rejectUnauthorized: false
|
|
},
|
|
false,
|
|
null,
|
|
'Client network socket disconnected before secure TLS ' +
|
|
'connection was established',
|
|
'Invalid SNI context');
|
|
|
|
function test(options, clientResult, serverResult, clientError, serverError) {
|
|
const server = tls.createServer(serverOptions, (c) => {
|
|
assert.deepStrictEqual(
|
|
serverResult,
|
|
{ sni: c.servername, authorized: c.authorized }
|
|
);
|
|
});
|
|
|
|
if (serverResult) {
|
|
assert(!serverError);
|
|
server.on('tlsClientError', common.mustNotCall());
|
|
} else {
|
|
assert(serverError);
|
|
server.on('tlsClientError', common.mustCall((err) => {
|
|
assert.strictEqual(err.message, serverError);
|
|
}));
|
|
}
|
|
|
|
server.listen(0, () => {
|
|
options.port = server.address().port;
|
|
const client = tls.connect(options, () => {
|
|
const result = client.authorizationError &&
|
|
(client.authorizationError === 'ERR_TLS_CERT_ALTNAME_INVALID');
|
|
assert.strictEqual(result, clientResult);
|
|
client.end();
|
|
});
|
|
|
|
client.on('close', common.mustCall(() => server.close()));
|
|
|
|
if (clientError)
|
|
client.on('error', common.mustCall((err) => {
|
|
assert.strictEqual(err.message, clientError);
|
|
}));
|
|
else
|
|
client.on('error', common.mustNotCall());
|
|
});
|
|
}
|