@@ -26,15 +26,6 @@ function sharedOpenSSL() {
26
26
return process . config . variables . node_shared_openssl ;
27
27
}
28
28
29
- function addToEnv ( newVar , value ) {
30
- const envCopy = { } ;
31
- for ( const e in process . env ) {
32
- envCopy [ e ] = process . env [ e ] ;
33
- }
34
- envCopy [ newVar ] = value ;
35
- return envCopy ;
36
- }
37
-
38
29
function testHelper ( stream , args , expectedOutput , cmd , env ) {
39
30
const fullArgs = args . concat ( [ '-e' , `console.log(${ cmd } )` ] ) ;
40
31
const child = spawnSync ( process . execPath , fullArgs , {
@@ -72,7 +63,7 @@ testHelper(
72
63
[ ] ,
73
64
FIPS_DISABLED ,
74
65
'require("crypto").fips' ,
75
- addToEnv ( 'OPENSSL_CONF' , '' ) ) ;
66
+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : '' } ) ) ;
76
67
77
68
// --enable-fips should turn FIPS mode on
78
69
testHelper (
@@ -117,23 +108,23 @@ if (!sharedOpenSSL()) {
117
108
[ ] ,
118
109
compiledWithFips ( ) ? FIPS_ENABLED : FIPS_DISABLED ,
119
110
'require("crypto").fips' ,
120
- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_ON ) ) ;
111
+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_ON } ) ) ;
121
112
122
113
// --openssl-config option should override OPENSSL_CONF
123
114
testHelper (
124
115
'stdout' ,
125
116
[ `--openssl-config=${ CNF_FIPS_ON } ` ] ,
126
117
compiledWithFips ( ) ? FIPS_ENABLED : FIPS_DISABLED ,
127
118
'require("crypto").fips' ,
128
- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_OFF ) ) ;
119
+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_OFF } ) ) ;
129
120
}
130
121
131
122
testHelper (
132
123
'stdout' ,
133
124
[ `--openssl-config=${ CNF_FIPS_OFF } ` ] ,
134
125
FIPS_DISABLED ,
135
126
'require("crypto").fips' ,
136
- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_ON ) ) ;
127
+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_ON } ) ) ;
137
128
138
129
// --enable-fips should take precedence over OpenSSL config file
139
130
testHelper (
@@ -149,7 +140,7 @@ testHelper(
149
140
[ '--enable-fips' ] ,
150
141
compiledWithFips ( ) ? FIPS_ENABLED : OPTION_ERROR_STRING ,
151
142
'require("crypto").fips' ,
152
- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_OFF ) ) ;
143
+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_OFF } ) ) ;
153
144
154
145
// --force-fips should take precedence over OpenSSL config file
155
146
testHelper (
@@ -165,7 +156,7 @@ testHelper(
165
156
[ '--force-fips' ] ,
166
157
compiledWithFips ( ) ? FIPS_ENABLED : OPTION_ERROR_STRING ,
167
158
'require("crypto").fips' ,
168
- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_OFF ) ) ;
159
+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_OFF } ) ) ;
169
160
170
161
// setFipsCrypto should be able to turn FIPS mode on
171
162
testHelper (
0 commit comments