|
| 1 | +'use strict'; |
| 2 | +constcommon=require('../common'); |
| 3 | +if(!common.hasCrypto)common.skip('missing crypto'); |
| 4 | +constfixtures=require('../common/fixtures'); |
| 5 | + |
| 6 | +// Test --tls-keylog CLI flag. |
| 7 | + |
| 8 | +constassert=require('assert'); |
| 9 | +constpath=require('path'); |
| 10 | +constfs=require('fs'); |
| 11 | +const{ fork }=require('child_process'); |
| 12 | + |
| 13 | +if(process.argv[2]==='test') |
| 14 | +returntest(); |
| 15 | + |
| 16 | +consttmpdir=require('../common/tmpdir'); |
| 17 | +tmpdir.refresh(); |
| 18 | +constfile=path.resolve(tmpdir.path,'keylog.log'); |
| 19 | + |
| 20 | +constchild=fork(__filename,['test'],{ |
| 21 | +execArgv: ['--tls-keylog='+file] |
| 22 | +}); |
| 23 | + |
| 24 | +child.on('close',common.mustCall((code,signal)=>{ |
| 25 | +assert.strictEqual(code,0); |
| 26 | +assert.strictEqual(signal,null); |
| 27 | +constlog=fs.readFileSync(file,'utf8'); |
| 28 | +assert(/SECRET/.test(log)); |
| 29 | +})); |
| 30 | + |
| 31 | +functiontest(){ |
| 32 | +const{ |
| 33 | + connect, keys |
| 34 | +}=require(fixtures.path('tls-connect')); |
| 35 | + |
| 36 | +connect({ |
| 37 | +client: { |
| 38 | +checkServerIdentity: (servername,cert)=>{}, |
| 39 | +ca: `${keys.agent1.cert}\n${keys.agent6.ca}`, |
| 40 | +}, |
| 41 | +server: { |
| 42 | +cert: keys.agent6.cert, |
| 43 | +key: keys.agent6.key |
| 44 | +}, |
| 45 | +},common.mustCall((err,pair,cleanup)=>{ |
| 46 | +if(pair.server.err){ |
| 47 | +console.trace('server',pair.server.err); |
| 48 | +} |
| 49 | +if(pair.client.err){ |
| 50 | +console.trace('client',pair.client.err); |
| 51 | +} |
| 52 | +assert.ifError(pair.server.err); |
| 53 | +assert.ifError(pair.client.err); |
| 54 | + |
| 55 | +returncleanup(); |
| 56 | +})); |
| 57 | +} |
0 commit comments