node/test/parallel/test-tls-set-default-ca-cer...

63 lines
1.8 KiB
JavaScript

'use strict';
// This tests that tls.setDefaultCACertificates() affects actual HTTPS connections
const common = require('../common');
if (!common.hasCrypto) common.skip('missing crypto');
const assert = require('assert');
const https = require('https');
const tls = require('tls');
const fixtures = require('../common/fixtures');
// Test HTTPS connection succeeds with proper CA, fails after removing it
const server = https.createServer({
cert: fixtures.readKey('agent8-cert.pem'),
key: fixtures.readKey('agent8-key.pem'),
}, common.mustCall((req, res) => {
res.writeHead(200);
res.end('hello world');
}, 1));
server.listen(0, common.mustCall(() => {
const port = server.address().port;
// First, set the correct CA certificate - connection should succeed.
tls.setDefaultCACertificates([fixtures.readKey('fake-startcom-root-cert.pem')]);
const req1 = https.request({
hostname: 'localhost',
port: port,
path: '/',
method: 'GET'
}, common.mustCall((res) => {
assert.strictEqual(res.statusCode, 200);
let data = '';
res.on('data', (chunk) => data += chunk);
res.on('end', common.mustCall(() => {
assert.strictEqual(data, 'hello world');
// Now set empty CA store - connection should fail.
tls.setDefaultCACertificates([]);
const req2 = https.request({
hostname: '127.0.0.1', // Use a different hostname to skip session cache.
port: port,
path: '/',
method: 'GET'
}, common.mustNotCall('Should not succeed with empty CA'));
req2.on('error', common.mustCall((err) => {
// Should fail with certificate verification error.
assert.strictEqual(err.code, 'UNABLE_TO_VERIFY_LEAF_SIGNATURE');
server.close();
}));
req2.end();
}));
}));
req1.on('error', common.mustNotCall('Should not error with correct CA'));
req1.end();
}));