Sha256: f9d7a84328111ae26cd52289062cc42a09742d94689230afddfa19d4ce59249c
Contents?: true
Size: 1.44 KB
Versions: 3
Compression:
Stored size: 1.44 KB
Contents
'use strict'; const common = require('../common'); if (!common.hasCrypto) { common.skip('missing crypto'); return; } const assert = require('assert'); const tls = require('tls'); const fs = require('fs'); const path = require('path'); const net = require('net'); const options = { key: fs.readFileSync(path.join(common.fixturesDir, 'test_key.pem')), cert: fs.readFileSync(path.join(common.fixturesDir, 'test_cert.pem')) }; const body = 'A'.repeat(40000); // the "proxy" server const a = tls.createServer(options, function(socket) { const myOptions = { host: '127.0.0.1', port: b.address().port, rejectUnauthorized: false }; const dest = net.connect(myOptions); dest.pipe(socket); socket.pipe(dest); dest.on('end', function() { socket.destroy(); }); }); // the "target" server const b = tls.createServer(options, function(socket) { socket.end(body); }); a.listen(0, function() { b.listen(0, function() { const myOptions = { host: '127.0.0.1', port: a.address().port, rejectUnauthorized: false }; const socket = tls.connect(myOptions); const ssl = tls.connect({ socket: socket, rejectUnauthorized: false }); ssl.setEncoding('utf8'); var buf = ''; ssl.on('data', function(data) { buf += data; }); ssl.on('end', common.mustCall(function() { assert.strictEqual(buf, body); ssl.end(); a.close(); b.close(); })); }); });
Version data entries
3 entries across 3 versions & 1 rubygems