|
| 1 | +// Flags: --experimental-dtls --no-warnings |
| 2 | + |
| 3 | +// Test: DTLS interop -- OpenSSL s_server with Node.js DTLS client. |
| 4 | +// Verifies that Node's DTLS client can complete a handshake with an |
| 5 | +// external DTLS server (OpenSSL CLI) and exchange application data. |
| 6 | + |
| 7 | +import { hasCrypto, skip, mustCall, mustNotCall } from '../common/index.mjs'; |
| 8 | +import { createRequire } from 'module'; |
| 9 | +import assert from 'node:assert'; |
| 10 | +import { spawn } from 'node:child_process'; |
| 11 | +import * as fixtures from '../common/fixtures.mjs'; |
| 12 | + |
| 13 | +if (!hasCrypto) { |
| 14 | + skip('missing crypto'); |
| 15 | +} |
| 16 | + |
| 17 | +if (!process.features.dtls) { |
| 18 | + skip('DTLS is not enabled'); |
| 19 | +} |
| 20 | + |
| 21 | +const require = createRequire(import.meta.url); |
| 22 | +const common = require('../common'); |
| 23 | +const { opensslCli } = require('../common/crypto'); |
| 24 | + |
| 25 | +if (!opensslCli) { |
| 26 | + skip('missing openssl-cli'); |
| 27 | +} |
| 28 | + |
| 29 | +const { connect } = await import('node:dtls'); |
| 30 | + |
| 31 | +const reply = 'I AM THE WALRUS'; // Something recognizable |
| 32 | + |
| 33 | +// Start OpenSSL DTLS server. |
| 34 | +const server = spawn(opensslCli, [ |
| 35 | + 's_server', |
| 36 | + '-dtls1_2', |
| 37 | + '-accept', String(common.PORT), |
| 38 | + '-cert', fixtures.path('keys/agent1-cert.pem'), |
| 39 | + '-key', fixtures.path('keys/agent1-key.pem'), |
| 40 | + '-listen', |
| 41 | +], { stdio: 'pipe' }); |
| 42 | + |
| 43 | +let serverOut = ''; |
| 44 | +server.stdout.on('data', (data) => { serverOut += data; }); |
| 45 | +let serverErr = ''; |
| 46 | +server.stderr.on('data', (data) => { serverErr += data; }); |
| 47 | +server.on('error', mustNotCall()); |
| 48 | + |
| 49 | +const timeout = setTimeout(() => { |
| 50 | + server.kill(); |
| 51 | + assert.fail(`Test timed out\nstdout: ${serverOut}\nstderr: ${serverErr}`); |
| 52 | +}, 10000); |
| 53 | + |
| 54 | +// Wait for "ACCEPT" on stdout -- this means s_server is ready. |
| 55 | +await new Promise((resolve) => { |
| 56 | + server.stdout.on('data', function onReady() { |
| 57 | + if (!serverOut.includes('ACCEPT')) return; |
| 58 | + server.stdout.removeListener('data', onReady); |
| 59 | + resolve(); |
| 60 | + }); |
| 61 | +}); |
| 62 | + |
| 63 | +// Connect Node.js DTLS client. |
| 64 | +const session = connect('127.0.0.1', common.PORT, { |
| 65 | + ca: [fixtures.readKey('ca1-cert.pem').toString()], |
| 66 | + rejectUnauthorized: false, |
| 67 | +}); |
| 68 | + |
| 69 | +const { protocol } = await session.opened; |
| 70 | +assert.match(protocol, /DTLS/i); |
| 71 | + |
| 72 | +// Send data from Node to OpenSSL server. |
| 73 | +session.send('hello from node'); |
| 74 | + |
| 75 | +// Send data from OpenSSL server to Node client via s_server stdin. |
| 76 | +// s_server forwards its stdin to the connected client. |
| 77 | +server.stdin.write(reply + '\n'); |
| 78 | + |
| 79 | +// Wait for Node client to receive the message. |
| 80 | +const data = await new Promise((resolve) => { |
| 81 | + session.onmessage = mustCall(resolve); |
| 82 | +}); |
| 83 | +assert.strictEqual(data.toString().trim(), reply); |
| 84 | + |
| 85 | +// Clean up. |
| 86 | +await session.close(); |
| 87 | +await session.endpoint.close(); |
| 88 | +clearTimeout(timeout); |
| 89 | +server.kill(); |
| 90 | + |
| 91 | +// Wait for server to exit. |
| 92 | +const [, signal] = await new Promise((resolve) => { |
| 93 | + server.on('exit', mustCall((...args) => resolve(args))); |
| 94 | +}); |
| 95 | +assert.strictEqual(signal, 'SIGTERM'); |
0 commit comments