%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream
'use strict'; // Flags: --expose-internals const common = require('../common'); if (!common.hasCrypto) common.skip('missing crypto'); const assert = require('assert'); const tls = require('tls'); const fixtures = require('../common/fixtures'); const { internalBinding } = require('internal/test/binding'); const binding = internalBinding('crypto'); const { fork } = require('child_process'); // This test ensures that extra certificates are loaded at startup. if (process.argv[2] !== 'child') { // Parent const NODE_EXTRA_CA_CERTS = fixtures.path('keys', 'ca1-cert.pem'); const extendsEnv = (obj) => ({ ...process.env, ...obj }); // Remove any pre-existing extra CA certs. delete process.env.NODE_EXTRA_CA_CERTS; [ extendsEnv({ CHILD_USE_EXTRA_CA_CERTS: 'yes', NODE_EXTRA_CA_CERTS }), extendsEnv({ CHILD_USE_EXTRA_CA_CERTS: 'no' }), ].forEach((processEnv) => { fork(__filename, ['child'], { env: processEnv }) .on('exit', common.mustCall((status) => { // Client did not succeed in connecting assert.strictEqual(status, 0); })); }); } else if (process.env.CHILD_USE_EXTRA_CA_CERTS === 'yes') { // Child with extra certificates loaded at startup. assert.strictEqual(binding.isExtraRootCertsFileLoaded(), true); } else { // Child without extra certificates. assert.strictEqual(binding.isExtraRootCertsFileLoaded(), false); tls.createServer({}); assert.strictEqual(binding.isExtraRootCertsFileLoaded(), false); }