2015-05-19 13:00:06 +02:00
|
|
|
'use strict';
|
2016-07-19 02:03:42 +05:30
|
|
|
const common = require('../common');
|
2013-11-08 01:22:02 +04:00
|
|
|
// disable strict server certificate validation by the client
|
|
|
|
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
|
|
|
|
|
2015-03-04 12:11:21 +11:00
|
|
|
if (!common.hasCrypto) {
|
2016-05-11 15:34:52 -04:00
|
|
|
common.skip('missing crypto');
|
2015-07-07 20:55:55 +05:30
|
|
|
return;
|
2015-03-04 12:11:21 +11:00
|
|
|
}
|
2013-11-08 01:22:02 +04:00
|
|
|
var https = require('https');
|
2015-03-04 12:11:21 +11:00
|
|
|
|
2013-11-08 01:22:02 +04:00
|
|
|
var tls = require('tls');
|
|
|
|
|
var fs = require('fs');
|
|
|
|
|
|
|
|
|
|
var options = {
|
|
|
|
|
key: fs.readFileSync(common.fixturesDir + '/keys/agent1-key.pem'),
|
|
|
|
|
cert: fs.readFileSync(common.fixturesDir + '/keys/agent1-cert.pem')
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
// Force splitting incoming data
|
|
|
|
|
tls.SLAB_BUFFER_SIZE = 1;
|
|
|
|
|
|
|
|
|
|
var server = https.createServer(options);
|
2016-07-15 15:43:24 -04:00
|
|
|
server.on('upgrade', common.mustCall(function(req, socket, upgrade) {
|
2013-11-08 01:22:02 +04:00
|
|
|
socket.on('data', function(data) {
|
|
|
|
|
throw new Error('Unexpected data: ' + data);
|
|
|
|
|
});
|
|
|
|
|
socket.end('HTTP/1.1 200 Ok\r\n\r\n');
|
2016-07-15 15:43:24 -04:00
|
|
|
}));
|
2013-11-08 01:22:02 +04:00
|
|
|
|
2016-05-29 03:06:56 -04:00
|
|
|
server.listen(0, function() {
|
2013-11-08 01:22:02 +04:00
|
|
|
var req = https.request({
|
|
|
|
|
host: '127.0.0.1',
|
2016-05-29 03:06:56 -04:00
|
|
|
port: this.address().port,
|
2013-11-08 01:22:02 +04:00
|
|
|
agent: false,
|
|
|
|
|
headers: {
|
|
|
|
|
Connection: 'Upgrade',
|
|
|
|
|
Upgrade: 'Websocket'
|
|
|
|
|
}
|
|
|
|
|
}, function() {
|
|
|
|
|
req.socket.destroy();
|
|
|
|
|
server.close();
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
req.end();
|
|
|
|
|
});
|