@@ -23,15 +23,6 @@ function sharedOpenSSL() {
23
23
return process . config . variables . node_shared_openssl ;
24
24
}
25
25
26
- function addToEnv ( newVar , value ) {
27
- const envCopy = { } ;
28
- for ( const e in process . env ) {
29
- envCopy [ e ] = process . env [ e ] ;
30
- }
31
- envCopy [ newVar ] = value ;
32
- return envCopy ;
33
- }
34
-
35
26
function testHelper ( stream , args , expectedOutput , cmd , env ) {
36
27
const fullArgs = args . concat ( [ '-e' , `console.log(${ cmd } )` ] ) ;
37
28
const child = spawnSync ( process . execPath , fullArgs , {
@@ -69,7 +60,7 @@ testHelper(
69
60
[ ] ,
70
61
FIPS_DISABLED ,
71
62
'require("crypto").fips' ,
72
- addToEnv ( 'OPENSSL_CONF' , '' ) ) ;
63
+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : '' } ) ) ;
73
64
74
65
// --enable-fips should turn FIPS mode on
75
66
testHelper (
@@ -114,23 +105,23 @@ if (!sharedOpenSSL()) {
114
105
[ ] ,
115
106
compiledWithFips ( ) ? FIPS_ENABLED : FIPS_DISABLED ,
116
107
'require("crypto").fips' ,
117
- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_ON ) ) ;
108
+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_ON } ) ) ;
118
109
119
110
// --openssl-config option should override OPENSSL_CONF
120
111
testHelper (
121
112
'stdout' ,
122
113
[ `--openssl-config=${ CNF_FIPS_ON } ` ] ,
123
114
compiledWithFips ( ) ? FIPS_ENABLED : FIPS_DISABLED ,
124
115
'require("crypto").fips' ,
125
- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_OFF ) ) ;
116
+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_OFF } ) ) ;
126
117
}
127
118
128
119
testHelper (
129
120
'stdout' ,
130
121
[ `--openssl-config=${ CNF_FIPS_OFF } ` ] ,
131
122
FIPS_DISABLED ,
132
123
'require("crypto").fips' ,
133
- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_ON ) ) ;
124
+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_ON } ) ) ;
134
125
135
126
// --enable-fips should take precedence over OpenSSL config file
136
127
testHelper (
@@ -146,7 +137,7 @@ testHelper(
146
137
[ '--enable-fips' ] ,
147
138
compiledWithFips ( ) ? FIPS_ENABLED : OPTION_ERROR_STRING ,
148
139
'require("crypto").fips' ,
149
- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_OFF ) ) ;
140
+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_OFF } ) ) ;
150
141
151
142
// --force-fips should take precedence over OpenSSL config file
152
143
testHelper (
@@ -162,7 +153,7 @@ testHelper(
162
153
[ '--force-fips' ] ,
163
154
compiledWithFips ( ) ? FIPS_ENABLED : OPTION_ERROR_STRING ,
164
155
'require("crypto").fips' ,
165
- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_OFF ) ) ;
156
+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_OFF } ) ) ;
166
157
167
158
// setFipsCrypto should be able to turn FIPS mode on
168
159
testHelper (
0 commit comments