@@ -26,15 +26,6 @@ function sharedOpenSSL() {
2626 return process . config . variables . node_shared_openssl ;
2727}
2828
29- function addToEnv ( newVar , value ) {
30- const envCopy = { } ;
31- for ( const e in process . env ) {
32- envCopy [ e ] = process . env [ e ] ;
33- }
34- envCopy [ newVar ] = value ;
35- return envCopy ;
36- }
37-
3829function testHelper ( stream , args , expectedOutput , cmd , env ) {
3930 const fullArgs = args . concat ( [ '-e' , `console.log(${ cmd } )` ] ) ;
4031 const child = spawnSync ( process . execPath , fullArgs , {
@@ -72,7 +63,7 @@ testHelper(
7263 [ ] ,
7364 FIPS_DISABLED ,
7465 'require("crypto").fips' ,
75- addToEnv ( 'OPENSSL_CONF' , '' ) ) ;
66+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : '' } ) ) ;
7667
7768// --enable-fips should turn FIPS mode on
7869testHelper (
@@ -117,23 +108,23 @@ if (!sharedOpenSSL()) {
117108 [ ] ,
118109 compiledWithFips ( ) ? FIPS_ENABLED : FIPS_DISABLED ,
119110 'require("crypto").fips' ,
120- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_ON ) ) ;
111+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_ON } ) ) ;
121112
122113 // --openssl-config option should override OPENSSL_CONF
123114 testHelper (
124115 'stdout' ,
125116 [ `--openssl-config=${ CNF_FIPS_ON } ` ] ,
126117 compiledWithFips ( ) ? FIPS_ENABLED : FIPS_DISABLED ,
127118 'require("crypto").fips' ,
128- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_OFF ) ) ;
119+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_OFF } ) ) ;
129120}
130121
131122testHelper (
132123 'stdout' ,
133124 [ `--openssl-config=${ CNF_FIPS_OFF } ` ] ,
134125 FIPS_DISABLED ,
135126 'require("crypto").fips' ,
136- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_ON ) ) ;
127+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_ON } ) ) ;
137128
138129// --enable-fips should take precedence over OpenSSL config file
139130testHelper (
@@ -149,7 +140,7 @@ testHelper(
149140 [ '--enable-fips' ] ,
150141 compiledWithFips ( ) ? FIPS_ENABLED : OPTION_ERROR_STRING ,
151142 'require("crypto").fips' ,
152- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_OFF ) ) ;
143+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_OFF } ) ) ;
153144
154145// --force-fips should take precedence over OpenSSL config file
155146testHelper (
@@ -165,7 +156,7 @@ testHelper(
165156 [ '--force-fips' ] ,
166157 compiledWithFips ( ) ? FIPS_ENABLED : OPTION_ERROR_STRING ,
167158 'require("crypto").fips' ,
168- addToEnv ( 'OPENSSL_CONF' , CNF_FIPS_OFF ) ) ;
159+ Object . assign ( { } , process . env , { 'OPENSSL_CONF' : CNF_FIPS_OFF } ) ) ;
169160
170161// setFipsCrypto should be able to turn FIPS mode on
171162testHelper (
0 commit comments