Blame SOURCES/0005-Adjust-tests-expectations.patch

d744d0
From 41c8ca25d09862d473f3e741698c77f007cd0092 Mon Sep 17 00:00:00 2001
d744d0
From: =?UTF-8?q?Jan=20Stan=C4=9Bk?= <jstanek@redhat.com>
d744d0
Date: Fri, 2 Oct 2020 13:02:14 +0200
d744d0
Subject: [PATCH] Adjust tests expectations
d744d0
MIME-Version: 1.0
d744d0
Content-Type: text/plain; charset=UTF-8
d744d0
Content-Transfer-Encoding: 8bit
d744d0
d744d0
- Modify expected error messages
d744d0
d744d0
- https-agent-create-connection: Establish secure connection
d744d0
d744d0
- Add back workaround for OpenSSL 1.0
d744d0
d744d0
  This reverts commit ba7551cad8abd2e460763b06efa4207be96a7a19.
d744d0
d744d0
- tls-dhe: Do not hang on unexpected cipher
d744d0
d744d0
Signed-off-by: Jan Staněk <jstanek@redhat.com>
d744d0
---
d744d0
 test/parallel/test-crypto.js                  |  4 +-
d744d0
 .../test-https-agent-create-connection.js     |  2 +-
d744d0
 .../test-https-agent-session-eviction.js      | 42 +++++++++++++++----
d744d0
 test/parallel/test-tls-alert-handling.js      |  2 +-
d744d0
 test/parallel/test-tls-dhe.js                 |  5 ++-
d744d0
 test/parallel/test-tls-empty-sni-context.js   |  2 +-
d744d0
 test/parallel/test-tls-env-bad-extra-ca.js    |  2 +-
d744d0
 test/parallel/test-tls-min-max-version.js     | 15 ++++---
d744d0
 8 files changed, 54 insertions(+), 20 deletions(-)
d744d0
d744d0
diff --git a/test/parallel/test-crypto.js b/test/parallel/test-crypto.js
d744d0
index 7216523819..0bc35b47ee 100644
d744d0
--- a/test/parallel/test-crypto.js
d744d0
+++ b/test/parallel/test-crypto.js
d744d0
@@ -224,9 +224,9 @@ assert.throws(() => {
d744d0
 }, (err) => {
d744d0
   // Do the standard checks, but then do some custom checks afterwards.
d744d0
   assert.throws(() => { throw err; }, {
d744d0
-    message: 'error:0D0680A8:asn1 encoding routines:asn1_check_tlen:wrong tag',
d744d0
+    message: 'error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag',
d744d0
     library: 'asn1 encoding routines',
d744d0
-    function: 'asn1_check_tlen',
d744d0
+    function: 'ASN1_CHECK_TLEN',
d744d0
     reason: 'wrong tag',
d744d0
     code: 'ERR_OSSL_ASN1_WRONG_TAG',
d744d0
   });
d744d0
diff --git a/test/parallel/test-https-agent-create-connection.js b/test/parallel/test-https-agent-create-connection.js
d744d0
index d4840298aa..dcd1927b57 100644
d744d0
--- a/test/parallel/test-https-agent-create-connection.js
d744d0
+++ b/test/parallel/test-https-agent-create-connection.js
d744d0
@@ -145,7 +145,7 @@ function createServer() {
d744d0
     };
d744d0
 
d744d0
     const socket = agent.createConnection(port, host, options);
d744d0
-    socket.on('connect', common.mustCall((data) => {
d744d0
+    socket.on('secure', common.mustCall((data) => {
d744d0
       socket.end();
d744d0
     }));
d744d0
     socket.on('end', common.mustCall(() => {
d744d0
diff --git a/test/parallel/test-https-agent-session-eviction.js b/test/parallel/test-https-agent-session-eviction.js
d744d0
index 3f5cd36e8b..8e13b150bb 100644
d744d0
--- a/test/parallel/test-https-agent-session-eviction.js
d744d0
+++ b/test/parallel/test-https-agent-session-eviction.js
d744d0
@@ -7,8 +7,10 @@ const { readKey } = require('../common/fixtures');
d744d0
 if (!common.hasCrypto)
d744d0
   common.skip('missing crypto');
d744d0
 
d744d0
+const assert = require('assert');
d744d0
 const https = require('https');
d744d0
-const { SSL_OP_NO_TICKET } = require('crypto').constants;
d744d0
+const { OPENSSL_VERSION_NUMBER, SSL_OP_NO_TICKET } =
d744d0
+    require('crypto').constants;
d744d0
 
d744d0
 const options = {
d744d0
   key: readKey('agent1-key.pem'),
d744d0
@@ -58,12 +60,38 @@ function second(server, session) {
d744d0
     res.resume();
d744d0
   });
d744d0
 
d744d0
-  // Although we have a TLS 1.2 session to offer to the TLS 1.0 server,
d744d0
-  // connection to the TLS 1.0 server should work.
d744d0
-  req.on('response', common.mustCall(function(res) {
d744d0
-    // The test is now complete for OpenSSL 1.1.0.
d744d0
-    server.close();
d744d0
-  }));
d744d0
+  if (OPENSSL_VERSION_NUMBER >= 0x10100000) {
d744d0
+    // Although we have a TLS 1.2 session to offer to the TLS 1.0 server,
d744d0
+    // connection to the TLS 1.0 server should work.
d744d0
+    req.on('response', common.mustCall(function(res) {
d744d0
+      // The test is now complete for OpenSSL 1.1.0.
d744d0
+      server.close();
d744d0
+    }));
d744d0
+  } else {
d744d0
+    // OpenSSL 1.0.x mistakenly locked versions based on the session it was
d744d0
+    // offering. This causes this sequent request to fail. Let it fail, but
d744d0
+    // test that this is mitigated on the next try by invalidating the session.
d744d0
+    req.on('error', common.mustCall(function(err) {
d744d0
+      assert(/wrong version number/.test(err.message));
d744d0
+
d744d0
+      req.on('close', function() {
d744d0
+        third(server);
d744d0
+      });
d744d0
+    }));
d744d0
+  }
d744d0
+  req.end();
d744d0
+}
d744d0
 
d744d0
+// Try one more time - session should be evicted!
d744d0
+function third(server) {
d744d0
+  const req = https.request({
d744d0
+    port: server.address().port,
d744d0
+    rejectUnauthorized: false
d744d0
+  }, function(res) {
d744d0
+    res.resume();
d744d0
+    assert(!req.socket.isSessionReused());
d744d0
+    server.close();
d744d0
+  });
d744d0
+  req.on('error', common.mustNotCall());
d744d0
   req.end();
d744d0
 }
d744d0
diff --git a/test/parallel/test-tls-alert-handling.js b/test/parallel/test-tls-alert-handling.js
d744d0
index f9f42e2d51..9dc4637ff0 100644
d744d0
--- a/test/parallel/test-tls-alert-handling.js
d744d0
+++ b/test/parallel/test-tls-alert-handling.js
d744d0
@@ -33,7 +33,7 @@ let iter = 0;
d744d0
 const errorHandler = common.mustCall((err) => {
d744d0
   assert.strictEqual(err.code, 'ERR_SSL_WRONG_VERSION_NUMBER');
d744d0
   assert.strictEqual(err.library, 'SSL routines');
d744d0
-  assert.strictEqual(err.function, 'ssl3_get_record');
d744d0
+  assert.strictEqual(err.function, 'SSL3_GET_RECORD');
d744d0
   assert.strictEqual(err.reason, 'wrong version number');
d744d0
   errorReceived = true;
d744d0
   if (canCloseServer())
d744d0
diff --git a/test/parallel/test-tls-dhe.js b/test/parallel/test-tls-dhe.js
d744d0
index ef645ce1b6..737330345b 100644
d744d0
--- a/test/parallel/test-tls-dhe.js
d744d0
+++ b/test/parallel/test-tls-dhe.js
d744d0
@@ -81,8 +81,8 @@ function test(keylen, expectedCipher, cb) {
d744d0
       const reg = new RegExp(`Cipher    : ${expectedCipher}`);
d744d0
       if (reg.test(out)) {
d744d0
         nsuccess++;
d744d0
-        server.close();
d744d0
       }
d744d0
+      server.close();
d744d0
     });
d744d0
   });
d744d0
 }
d744d0
@@ -104,6 +104,7 @@ function test2048() {
d744d0
 }
d744d0
 
d744d0
 function testError() {
d744d0
+  // this one fails
d744d0
   test('error', 'ECDHE-RSA-AES128-SHA256', test512);
d744d0
   ntests++;
d744d0
 }
d744d0
@@ -111,6 +112,6 @@ function testError() {
d744d0
 test1024();
d744d0
 
d744d0
 process.on('exit', function() {
d744d0
-  assert.strictEqual(ntests, nsuccess);
d744d0
+  assert.strictEqual(nsuccess, 2);
d744d0
   assert.strictEqual(ntests, 3);
d744d0
 });
d744d0
diff --git a/test/parallel/test-tls-empty-sni-context.js b/test/parallel/test-tls-empty-sni-context.js
d744d0
index 9b963e6629..fe8753c602 100644
d744d0
--- a/test/parallel/test-tls-empty-sni-context.js
d744d0
+++ b/test/parallel/test-tls-empty-sni-context.js
d744d0
@@ -26,6 +26,6 @@ const server = tls.createServer(options, (c) => {
d744d0
   }, common.mustNotCall());
d744d0
 
d744d0
   c.on('error', common.mustCall((err) => {
d744d0
-    assert(/Client network socket disconnected/.test(err.message));
d744d0
+    assert(/Client network socket disconnected|handshake failure/.test(err.message));
d744d0
   }));
d744d0
 }));
d744d0
diff --git a/test/parallel/test-tls-env-bad-extra-ca.js b/test/parallel/test-tls-env-bad-extra-ca.js
d744d0
index 5ba1e227d2..0af6756dda 100644
d744d0
--- a/test/parallel/test-tls-env-bad-extra-ca.js
d744d0
+++ b/test/parallel/test-tls-env-bad-extra-ca.js
d744d0
@@ -37,7 +37,7 @@ fork(__filename, opts)
d744d0
     // TODO(addaleax): Make `SafeGetenv` work like `process.env`
d744d0
     // encoding-wise
d744d0
     if (!common.isWindows) {
d744d0
-      const re = /Warning: Ignoring extra certs from.*no-such-file-exists-🐢.* load failed:.*No such file or directory/;
d744d0
+      const re = /Warning: Ignoring extra certs from.*no-such-file-exists-🐢.* load failed:.*/;
d744d0
       assert(re.test(stderr), stderr);
d744d0
     }
d744d0
   }))
d744d0
diff --git a/test/parallel/test-tls-min-max-version.js b/test/parallel/test-tls-min-max-version.js
d744d0
index 7ef0f12426..4fcb9247d3 100644
d744d0
--- a/test/parallel/test-tls-min-max-version.js
d744d0
+++ b/test/parallel/test-tls-min-max-version.js
d744d0
@@ -52,6 +52,11 @@ function test(cmin, cmax, cprot, smin, smax, sprot, proto, cerr, serr) {
d744d0
       }
d744d0
       if (serr) {
d744d0
         assert(pair.server.err);
d744d0
+        // Accept these codes as aliases, the one reported depends on the
d744d0
+        // OpenSSL version.
d744d0
+        if (serr === 'ERR_SSL_UNSUPPORTED_PROTOCOL' &&
d744d0
+            pair.server.err.code === 'ERR_SSL_UNKNOWN_PROTOCOL')
d744d0
+          serr = 'ERR_SSL_UNKNOWN_PROTOCOL';
d744d0
         assert.strictEqual(pair.server.err.code, serr);
d744d0
       }
d744d0
       return cleanup();
d744d0
@@ -131,9 +136,9 @@ if (DEFAULT_MIN_VERSION === 'TLSv1.2') {
d744d0
   test(U, U, 'TLSv1_method', U, U, 'SSLv23_method',
d744d0
        U, 'ECONNRESET', 'ERR_SSL_UNSUPPORTED_PROTOCOL');
d744d0
   test(U, U, 'SSLv23_method', U, U, 'TLSv1_1_method',
d744d0
-       U, 'ERR_SSL_UNSUPPORTED_PROTOCOL', 'ERR_SSL_WRONG_VERSION_NUMBER');
d744d0
+       U, 'ERR_SSL_UNSUPPORTED_PROTOCOL', 'ECONNRESET');
d744d0
   test(U, U, 'SSLv23_method', U, U, 'TLSv1_method',
d744d0
-       U, 'ERR_SSL_UNSUPPORTED_PROTOCOL', 'ERR_SSL_WRONG_VERSION_NUMBER');
d744d0
+       U, 'ERR_SSL_UNSUPPORTED_PROTOCOL', 'ECONNRESET');
d744d0
 }
d744d0
 
d744d0
 if (DEFAULT_MIN_VERSION === 'TLSv1.1') {
d744d0
@@ -167,9 +172,9 @@ if (DEFAULT_MIN_VERSION === 'TLSv1.2') {
d744d0
 
d744d0
   if (DEFAULT_MAX_VERSION === 'TLSv1.2') {
d744d0
     test(U, U, U, U, U, 'TLSv1_1_method',
d744d0
-         U, 'ERR_SSL_UNSUPPORTED_PROTOCOL', 'ERR_SSL_WRONG_VERSION_NUMBER');
d744d0
+         U, 'ERR_SSL_UNSUPPORTED_PROTOCOL', 'ECONNRESET');
d744d0
     test(U, U, U, U, U, 'TLSv1_method',
d744d0
-         U, 'ERR_SSL_UNSUPPORTED_PROTOCOL', 'ERR_SSL_WRONG_VERSION_NUMBER');
d744d0
+         U, 'ERR_SSL_UNSUPPORTED_PROTOCOL', 'ECONNRESET');
d744d0
   } else {
d744d0
     // TLS1.3 client hellos are are not understood by TLS1.1 or below.
d744d0
     test(U, U, U, U, U, 'TLSv1_1_method',
d744d0
@@ -188,7 +193,7 @@ if (DEFAULT_MIN_VERSION === 'TLSv1.1') {
d744d0
 
d744d0
   if (DEFAULT_MAX_VERSION === 'TLSv1.2') {
d744d0
     test(U, U, U, U, U, 'TLSv1_method',
d744d0
-         U, 'ERR_SSL_UNSUPPORTED_PROTOCOL', 'ERR_SSL_WRONG_VERSION_NUMBER');
d744d0
+         U, 'ERR_SSL_UNSUPPORTED_PROTOCOL', 'ECONNRESET');
d744d0
   } else {
d744d0
     // TLS1.3 client hellos are are not understood by TLS1.1 or below.
d744d0
     test(U, U, U, U, U, 'TLSv1_method',
d744d0
-- 
d744d0
2.26.2
d744d0