tls, https: validate server certificate by default
This commit changes the default value of the rejectUnauthorized option from false to true. What that means is that tls.connect(), https.get() and https.request() will reject invalid server certificates from now on, including self-signed certificates. There is an escape hatch: if you set the NODE_TLS_REJECT_UNAUTHORIZED environment variable to the literal string "0", node.js reverts to its old behavior. Fixes #3949.
This commit is contained in:
parent
4c171a504d
commit
35607f3a2d
@ -119,7 +119,7 @@ The following options from [tls.connect()][] can also be specified. However, a
|
|||||||
- `rejectUnauthorized`: If `true`, the server certificate is verified against
|
- `rejectUnauthorized`: If `true`, the server certificate is verified against
|
||||||
the list of supplied CAs. An `'error'` event is emitted if verification
|
the list of supplied CAs. An `'error'` event is emitted if verification
|
||||||
fails. Verification happens at the connection level, *before* the HTTP
|
fails. Verification happens at the connection level, *before* the HTTP
|
||||||
request is sent. Default `false`.
|
request is sent. Default `true`.
|
||||||
|
|
||||||
In order to specify these options, use a custom `Agent`.
|
In order to specify these options, use a custom `Agent`.
|
||||||
|
|
||||||
|
@ -240,7 +240,7 @@ Creates a new client connection to the given `port` and `host` (old API) or
|
|||||||
|
|
||||||
- `rejectUnauthorized`: If `true`, the server certificate is verified against
|
- `rejectUnauthorized`: If `true`, the server certificate is verified against
|
||||||
the list of supplied CAs. An `'error'` event is emitted if verification
|
the list of supplied CAs. An `'error'` event is emitted if verification
|
||||||
fails. Default: `false`.
|
fails. Default: `true`.
|
||||||
|
|
||||||
- `NPNProtocols`: An array of string or `Buffer` containing supported NPN
|
- `NPNProtocols`: An array of string or `Buffer` containing supported NPN
|
||||||
protocols. `Buffer` should have following format: `0x05hello0x05world`,
|
protocols. `Buffer` should have following format: `0x05hello0x05world`,
|
||||||
|
23
lib/https.js
23
lib/https.js
@ -21,6 +21,7 @@
|
|||||||
|
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
var http = require('http');
|
var http = require('http');
|
||||||
|
var util = require('util');
|
||||||
var url = require('url');
|
var url = require('url');
|
||||||
var inherits = require('util').inherits;
|
var inherits = require('util').inherits;
|
||||||
|
|
||||||
@ -97,11 +98,25 @@ exports.request = function(options, cb) {
|
|||||||
throw new Error('Protocol:' + options.protocol + ' not supported.');
|
throw new Error('Protocol:' + options.protocol + ' not supported.');
|
||||||
}
|
}
|
||||||
|
|
||||||
if (options.agent === undefined) {
|
options = util._extend({
|
||||||
options.agent = globalAgent;
|
createConnection: createConnection,
|
||||||
|
defaultPort: 443
|
||||||
|
}, options);
|
||||||
|
|
||||||
|
if (typeof options.agent === 'undefined') {
|
||||||
|
if (typeof options.ca === 'undefined' &&
|
||||||
|
typeof options.cert === 'undefined' &&
|
||||||
|
typeof options.ciphers === 'undefined' &&
|
||||||
|
typeof options.key === 'undefined' &&
|
||||||
|
typeof options.passphrase === 'undefined' &&
|
||||||
|
typeof options.pfx === 'undefined' &&
|
||||||
|
typeof options.rejectUnauthorized === 'undefined') {
|
||||||
|
options.agent = globalAgent;
|
||||||
|
} else {
|
||||||
|
options.agent = new Agent(options);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
options.createConnection = createConnection;
|
|
||||||
options.defaultPort = options.defaultPort || 443;
|
|
||||||
return new http.ClientRequest(options, cb);
|
return new http.ClientRequest(options, cb);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -1272,6 +1272,11 @@ exports.connect = function(/* [port, host], options, cb */) {
|
|||||||
var options = args[0];
|
var options = args[0];
|
||||||
var cb = args[1];
|
var cb = args[1];
|
||||||
|
|
||||||
|
var defaults = {
|
||||||
|
rejectUnauthorized: '0' !== process.env.NODE_TLS_REJECT_UNAUTHORIZED
|
||||||
|
};
|
||||||
|
options = util._extend(defaults, options || {});
|
||||||
|
|
||||||
var socket = options.socket ? options.socket : new net.Stream();
|
var socket = options.socket ? options.socket : new net.Stream();
|
||||||
|
|
||||||
var sslcontext = crypto.createCredentials(options);
|
var sslcontext = crypto.createCredentials(options);
|
||||||
|
5
test/fixtures/GH-892-request.js
vendored
5
test/fixtures/GH-892-request.js
vendored
@ -19,7 +19,10 @@
|
|||||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
|
|
||||||
// Called by test/simple/test-regress-GH-892.js
|
// Called by test/pummel/test-regress-GH-892.js
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var https = require('https');
|
var https = require('https');
|
||||||
var fs = require('fs');
|
var fs = require('fs');
|
||||||
|
@ -19,8 +19,8 @@
|
|||||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
|
@ -19,11 +19,12 @@
|
|||||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
// Server sends a large string. Client counts bytes and pauses every few
|
// Server sends a large string. Client counts bytes and pauses every few
|
||||||
// seconds. Makes sure that pause and resume work properly.
|
// seconds. Makes sure that pause and resume work properly.
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -19,8 +19,8 @@
|
|||||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var http = require('http'),
|
var http = require('http'),
|
||||||
https = require('https'),
|
https = require('https'),
|
||||||
|
@ -19,6 +19,9 @@
|
|||||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var https = require('https');
|
var https = require('https');
|
||||||
|
@ -27,6 +27,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var https = require('https');
|
var https = require('https');
|
||||||
|
@ -24,6 +24,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var https = require('https');
|
var https = require('https');
|
||||||
|
@ -47,21 +47,21 @@ var server = https.createServer(options, function(req, res) {
|
|||||||
|
|
||||||
function unauthorized() {
|
function unauthorized() {
|
||||||
var req = https.request({
|
var req = https.request({
|
||||||
port: common.PORT
|
port: common.PORT,
|
||||||
|
rejectUnauthorized: false
|
||||||
}, function(res) {
|
}, function(res) {
|
||||||
assert(!req.socket.authorized);
|
assert(!req.socket.authorized);
|
||||||
rejectUnauthorized();
|
rejectUnauthorized();
|
||||||
});
|
});
|
||||||
req.on('error', function(err) {
|
req.on('error', function(err) {
|
||||||
assert(false);
|
throw err;
|
||||||
});
|
});
|
||||||
req.end();
|
req.end();
|
||||||
}
|
}
|
||||||
|
|
||||||
function rejectUnauthorized() {
|
function rejectUnauthorized() {
|
||||||
var options = {
|
var options = {
|
||||||
port: common.PORT,
|
port: common.PORT
|
||||||
rejectUnauthorized: true
|
|
||||||
};
|
};
|
||||||
options.agent = new https.Agent(options);
|
options.agent = new https.Agent(options);
|
||||||
var req = https.request(options, function(res) {
|
var req = https.request(options, function(res) {
|
||||||
@ -76,7 +76,6 @@ function rejectUnauthorized() {
|
|||||||
function authorized() {
|
function authorized() {
|
||||||
var options = {
|
var options = {
|
||||||
port: common.PORT,
|
port: common.PORT,
|
||||||
rejectUnauthorized: true,
|
|
||||||
ca: [fs.readFileSync(path.join(common.fixturesDir, 'test_cert.pem'))]
|
ca: [fs.readFileSync(path.join(common.fixturesDir, 'test_cert.pem'))]
|
||||||
};
|
};
|
||||||
options.agent = new https.Agent(options);
|
options.agent = new https.Agent(options);
|
||||||
|
@ -24,6 +24,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var https = require('https');
|
var https = require('https');
|
||||||
|
@ -34,6 +34,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -19,6 +19,9 @@
|
|||||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var https = require('https'),
|
var https = require('https'),
|
||||||
fs = require('fs'),
|
fs = require('fs'),
|
||||||
|
@ -19,6 +19,9 @@
|
|||||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var https = require('https');
|
var https = require('https');
|
||||||
|
@ -27,6 +27,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
|
|
||||||
|
@ -24,6 +24,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
|
|
||||||
|
@ -24,6 +24,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var fs = require('fs');
|
var fs = require('fs');
|
||||||
|
@ -27,6 +27,9 @@ if (!process.versions.openssl) {
|
|||||||
var https = require('https');
|
var https = require('https');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var fs = require('fs');
|
var fs = require('fs');
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
|
|
||||||
var options = {
|
var options = {
|
||||||
|
@ -48,7 +48,10 @@ var server = tls.createServer(options, function(socket) {
|
|||||||
});
|
});
|
||||||
|
|
||||||
function unauthorized() {
|
function unauthorized() {
|
||||||
var socket = tls.connect(common.PORT, function() {
|
var socket = tls.connect({
|
||||||
|
port: common.PORT,
|
||||||
|
rejectUnauthorized: false
|
||||||
|
}, function() {
|
||||||
assert(!socket.authorized);
|
assert(!socket.authorized);
|
||||||
socket.end();
|
socket.end();
|
||||||
rejectUnauthorized();
|
rejectUnauthorized();
|
||||||
@ -60,9 +63,7 @@ function unauthorized() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
function rejectUnauthorized() {
|
function rejectUnauthorized() {
|
||||||
var socket = tls.connect(common.PORT, {
|
var socket = tls.connect(common.PORT, function() {
|
||||||
rejectUnauthorized: true
|
|
||||||
}, function() {
|
|
||||||
assert(false);
|
assert(false);
|
||||||
});
|
});
|
||||||
socket.on('error', function(err) {
|
socket.on('error', function(err) {
|
||||||
@ -74,7 +75,6 @@ function rejectUnauthorized() {
|
|||||||
|
|
||||||
function authorized() {
|
function authorized() {
|
||||||
var socket = tls.connect(common.PORT, {
|
var socket = tls.connect(common.PORT, {
|
||||||
rejectUnauthorized: true,
|
|
||||||
ca: [fs.readFileSync(path.join(common.fixturesDir, 'test_cert.pem'))]
|
ca: [fs.readFileSync(path.join(common.fixturesDir, 'test_cert.pem'))]
|
||||||
}, function() {
|
}, function() {
|
||||||
assert(socket.authorized);
|
assert(socket.authorized);
|
||||||
|
@ -28,6 +28,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -59,6 +59,9 @@ var testCases =
|
|||||||
];
|
];
|
||||||
|
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var fs = require('fs');
|
var fs = require('fs');
|
||||||
|
@ -19,6 +19,9 @@
|
|||||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -19,6 +19,9 @@
|
|||||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -19,6 +19,9 @@
|
|||||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -19,6 +19,9 @@
|
|||||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -25,6 +25,9 @@ if (!process.features.tls_npn) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common'),
|
var common = require('../common'),
|
||||||
assert = require('assert'),
|
assert = require('assert'),
|
||||||
fs = require('fs'),
|
fs = require('fs'),
|
||||||
|
@ -27,6 +27,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
|
|
||||||
|
@ -24,6 +24,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -24,6 +24,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -24,6 +24,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -24,6 +24,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -24,6 +24,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -24,6 +24,9 @@ if (!process.versions.openssl) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -19,6 +19,9 @@
|
|||||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -19,6 +19,9 @@
|
|||||||
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
||||||
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common');
|
var common = require('../common');
|
||||||
var assert = require('assert');
|
var assert = require('assert');
|
||||||
var tls = require('tls');
|
var tls = require('tls');
|
||||||
|
@ -28,6 +28,9 @@ if (!process.features.tls_sni) {
|
|||||||
process.exit(0);
|
process.exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// disable strict server certificate validation by the client
|
||||||
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
||||||
|
|
||||||
var common = require('../common'),
|
var common = require('../common'),
|
||||||
assert = require('assert'),
|
assert = require('assert'),
|
||||||
fs = require('fs'),
|
fs = require('fs'),
|
||||||
|
Loading…
x
Reference in New Issue
Block a user