summaryrefslogtreecommitdiff
path: root/test/parallel/test-http2-server-unknown-protocol.js
blob: b00ccc1b338e4758925bcf72dfaa7328f5c7116c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
'use strict';
const common = require('../common');
const fixtures = require('../common/fixtures');

// This test verifies that when a server receives an unknownProtocol it will
// not leave the socket open if the client does not close it.

if (!common.hasCrypto)
  common.skip('missing crypto');

const assert = require('assert');
const h2 = require('http2');
const tls = require('tls');

const server = h2.createSecureServer({
  key: fixtures.readKey('rsa_private.pem'),
  cert: fixtures.readKey('rsa_cert.crt'),
  unknownProtocolTimeout: 500,
  allowHalfOpen: true
});

server.on('secureConnection', common.mustCall((socket) => {
  socket.on('close', common.mustCall(() => {
    server.close();
  }));
}));

server.listen(0, function() {
  // If the client does not send an ALPN connection, and the server has not been
  // configured with allowHTTP1, then the server should destroy the socket
  // after unknownProtocolTimeout.
  tls.connect({
    port: server.address().port,
    rejectUnauthorized: false,
  });

  // If the client sends an ALPN extension that does not contain 'h2', the
  // server should send a fatal alert to the client before a secure connection
  // is established at all.
  tls.connect({
    port: server.address().port,
    rejectUnauthorized: false,
    ALPNProtocols: ['bogus']
  }).on('error', common.mustCall((err) => {
    assert.strictEqual(err.code, 'ECONNRESET');
  }));
});