mirror of
https://github.com/denoland/deno.git
synced 2024-12-17 12:52:26 -05:00
68119e1d7e
All Deno runtime test files were moved to cli/js/tests/ directory. It makes a clear distinction that cli/js/tests/ contains code that is run under Deno runtime as opposed to code in cli/js/ which is used to create bundle and snapshot with "deno_typescript".
214 lines
5.3 KiB
TypeScript
214 lines
5.3 KiB
TypeScript
// Copyright 2018-2020 the Deno authors. All rights reserved. MIT license.
|
|
import {
|
|
assert,
|
|
assertEquals,
|
|
createResolvable,
|
|
unitTest
|
|
} from "./test_util.ts";
|
|
import { BufWriter, BufReader } from "../../../std/io/bufio.ts";
|
|
import { TextProtoReader } from "../../../std/textproto/mod.ts";
|
|
|
|
const encoder = new TextEncoder();
|
|
const decoder = new TextDecoder();
|
|
|
|
unitTest(async function connectTLSNoPerm(): Promise<void> {
|
|
let err;
|
|
try {
|
|
await Deno.connectTLS({ hostname: "github.com", port: 443 });
|
|
} catch (e) {
|
|
err = e;
|
|
}
|
|
assert(err instanceof Deno.errors.PermissionDenied);
|
|
assertEquals(err.name, "PermissionDenied");
|
|
});
|
|
|
|
unitTest(async function connectTLSCertFileNoReadPerm(): Promise<void> {
|
|
let err;
|
|
try {
|
|
await Deno.connectTLS({
|
|
hostname: "github.com",
|
|
port: 443,
|
|
certFile: "cli/tests/tls/RootCA.crt"
|
|
});
|
|
} catch (e) {
|
|
err = e;
|
|
}
|
|
assert(err instanceof Deno.errors.PermissionDenied);
|
|
assertEquals(err.name, "PermissionDenied");
|
|
});
|
|
|
|
unitTest(
|
|
{ perms: { read: true, net: true } },
|
|
async function listenTLSNonExistentCertKeyFiles(): Promise<void> {
|
|
let err;
|
|
const options = {
|
|
hostname: "localhost",
|
|
port: 4500,
|
|
certFile: "cli/tests/tls/localhost.crt",
|
|
keyFile: "cli/tests/tls/localhost.key"
|
|
};
|
|
|
|
try {
|
|
Deno.listenTLS({
|
|
...options,
|
|
certFile: "./non/existent/file"
|
|
});
|
|
} catch (e) {
|
|
err = e;
|
|
}
|
|
assert(err instanceof Deno.errors.NotFound);
|
|
|
|
try {
|
|
Deno.listenTLS({
|
|
...options,
|
|
keyFile: "./non/existent/file"
|
|
});
|
|
} catch (e) {
|
|
err = e;
|
|
}
|
|
assert(err instanceof Deno.errors.NotFound);
|
|
}
|
|
);
|
|
|
|
unitTest(
|
|
{ perms: { net: true } },
|
|
async function listenTLSNoReadPerm(): Promise<void> {
|
|
let err;
|
|
try {
|
|
Deno.listenTLS({
|
|
hostname: "localhost",
|
|
port: 4500,
|
|
certFile: "cli/tests/tls/localhost.crt",
|
|
keyFile: "cli/tests/tls/localhost.key"
|
|
});
|
|
} catch (e) {
|
|
err = e;
|
|
}
|
|
assert(err instanceof Deno.errors.PermissionDenied);
|
|
assertEquals(err.name, "PermissionDenied");
|
|
}
|
|
);
|
|
|
|
unitTest(
|
|
{
|
|
perms: { read: true, write: true, net: true }
|
|
},
|
|
async function listenTLSEmptyKeyFile(): Promise<void> {
|
|
let err;
|
|
const options = {
|
|
hostname: "localhost",
|
|
port: 4500,
|
|
certFile: "cli/tests/tls/localhost.crt",
|
|
keyFile: "cli/tests/tls/localhost.key"
|
|
};
|
|
|
|
const testDir = Deno.makeTempDirSync();
|
|
const keyFilename = testDir + "/key.pem";
|
|
Deno.writeFileSync(keyFilename, new Uint8Array([]), {
|
|
mode: 0o666
|
|
});
|
|
|
|
try {
|
|
Deno.listenTLS({
|
|
...options,
|
|
keyFile: keyFilename
|
|
});
|
|
} catch (e) {
|
|
err = e;
|
|
}
|
|
assert(err instanceof Error);
|
|
}
|
|
);
|
|
|
|
unitTest(
|
|
{ perms: { read: true, write: true, net: true } },
|
|
async function listenTLSEmptyCertFile(): Promise<void> {
|
|
let err;
|
|
const options = {
|
|
hostname: "localhost",
|
|
port: 4500,
|
|
certFile: "cli/tests/tls/localhost.crt",
|
|
keyFile: "cli/tests/tls/localhost.key"
|
|
};
|
|
|
|
const testDir = Deno.makeTempDirSync();
|
|
const certFilename = testDir + "/cert.crt";
|
|
Deno.writeFileSync(certFilename, new Uint8Array([]), {
|
|
mode: 0o666
|
|
});
|
|
|
|
try {
|
|
Deno.listenTLS({
|
|
...options,
|
|
certFile: certFilename
|
|
});
|
|
} catch (e) {
|
|
err = e;
|
|
}
|
|
assert(err instanceof Error);
|
|
}
|
|
);
|
|
|
|
unitTest(
|
|
{ perms: { read: true, net: true } },
|
|
async function dialAndListenTLS(): Promise<void> {
|
|
const resolvable = createResolvable();
|
|
const hostname = "localhost";
|
|
const port = 4500;
|
|
|
|
const listener = Deno.listenTLS({
|
|
hostname,
|
|
port,
|
|
certFile: "cli/tests/tls/localhost.crt",
|
|
keyFile: "cli/tests/tls/localhost.key"
|
|
});
|
|
|
|
const response = encoder.encode(
|
|
"HTTP/1.1 200 OK\r\nContent-Length: 12\r\n\r\nHello World\n"
|
|
);
|
|
|
|
listener.accept().then(
|
|
async (conn): Promise<void> => {
|
|
assert(conn.remoteAddr != null);
|
|
assert(conn.localAddr != null);
|
|
await conn.write(response);
|
|
// TODO(bartlomieju): this might be a bug
|
|
setTimeout(() => {
|
|
conn.close();
|
|
resolvable.resolve();
|
|
}, 0);
|
|
}
|
|
);
|
|
|
|
const conn = await Deno.connectTLS({
|
|
hostname,
|
|
port,
|
|
certFile: "cli/tests/tls/RootCA.pem"
|
|
});
|
|
assert(conn.rid > 0);
|
|
const w = new BufWriter(conn);
|
|
const r = new BufReader(conn);
|
|
const body = `GET / HTTP/1.1\r\nHost: ${hostname}:${port}\r\n\r\n`;
|
|
const writeResult = await w.write(encoder.encode(body));
|
|
assertEquals(body.length, writeResult);
|
|
await w.flush();
|
|
const tpr = new TextProtoReader(r);
|
|
const statusLine = await tpr.readLine();
|
|
assert(statusLine !== Deno.EOF, `line must be read: ${String(statusLine)}`);
|
|
const m = statusLine.match(/^(.+?) (.+?) (.+?)$/);
|
|
assert(m !== null, "must be matched");
|
|
const [_, proto, status, ok] = m;
|
|
assertEquals(proto, "HTTP/1.1");
|
|
assertEquals(status, "200");
|
|
assertEquals(ok, "OK");
|
|
const headers = await tpr.readMIMEHeader();
|
|
assert(headers !== Deno.EOF);
|
|
const contentLength = parseInt(headers.get("content-length")!);
|
|
const bodyBuf = new Uint8Array(contentLength);
|
|
await r.readFull(bodyBuf);
|
|
assertEquals(decoder.decode(bodyBuf), "Hello World\n");
|
|
conn.close();
|
|
listener.close();
|
|
await resolvable;
|
|
}
|
|
);
|