-
Notifications
You must be signed in to change notification settings - Fork 30.1k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
tls: allow enabling the TLS debug trace
Enable the same trace output that the OpenSSL s_client and s_server support with their `-trace` option. This is invaluable when debugging reports of TLS bugs as well as when debugging the internal TLS implementation. See: - #25383 - #17936 - postmanlabs/postman-app-support#5918 (comment)
- Loading branch information
1 parent
d155fe9
commit d481424
Showing
5 changed files
with
116 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,58 @@ | ||
// Flags: --expose-internals | ||
'use strict'; | ||
const common = require('../common'); | ||
if (!common.hasCrypto) common.skip('missing crypto'); | ||
const fixtures = require('../common/fixtures'); | ||
|
||
// Test enableTrace: option for TLS. | ||
|
||
const assert = require('assert'); | ||
const { fork } = require('child_process'); | ||
|
||
if (process.argv[2] === 'test') | ||
return test(); | ||
|
||
const binding = require('internal/test/binding').internalBinding; | ||
|
||
if (!binding('tls_wrap').HAVE_SSL_TRACE) | ||
return common.skip('no SSL_trace() compiled into openssl'); | ||
|
||
const child = fork(__filename, ['test'], { silent: true }); | ||
|
||
let stderr = ''; | ||
child.stderr.setEncoding('utf8'); | ||
child.stderr.on('data', (data) => stderr += data); | ||
child.on('close', common.mustCall(() => { | ||
assert(/Received Record/.test(stderr)); | ||
assert(/ClientHello/.test(stderr)); | ||
})); | ||
|
||
// For debugging and observation of actual trace output. | ||
child.stderr.pipe(process.stderr); | ||
child.stdout.pipe(process.stdout); | ||
|
||
child.on('exit', common.mustCall((code) => { | ||
assert.strictEqual(code, 0); | ||
})); | ||
|
||
function test() { | ||
const { | ||
connect, keys | ||
} = require(fixtures.path('tls-connect')); | ||
|
||
connect({ | ||
client: { | ||
checkServerIdentity: (servername, cert) => { }, | ||
ca: `${keys.agent1.cert}\n${keys.agent6.ca}`, | ||
}, | ||
server: { | ||
cert: keys.agent6.cert, | ||
key: keys.agent6.key, | ||
enableTrace: true, | ||
}, | ||
}, common.mustCall((err, pair, cleanup) => { | ||
pair.client.conn.enableTrace(); | ||
|
||
return cleanup(); | ||
})); | ||
} |