-
Notifications
You must be signed in to change notification settings - Fork 29.8k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
http2: reinject data received before http2 is attached
Reinject the data already received from the TLS socket when the HTTP2 client is attached with a delay Fixes: #35475 PR-URL: #35678 Reviewed-By: Anna Henningsen <[email protected]> Reviewed-By: Matteo Collina <[email protected]> Reviewed-By: Rich Trott <[email protected]> Reviewed-By: Alba Mendez <[email protected]> Reviewed-By: Franziska Hinkelmann <[email protected]> Reviewed-By: Ricky Zhou <[email protected]>
- Loading branch information
1 parent
2dbaaf9
commit 57f2fe0
Showing
4 changed files
with
106 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,64 @@ | ||
// Flags: --expose-internals | ||
'use strict'; | ||
const common = require('../common'); | ||
if (!common.hasCrypto) | ||
common.skip('missing crypto'); | ||
|
||
if (!common.hasMultiLocalhost()) | ||
common.skip('platform-specific test.'); | ||
|
||
const http2 = require('http2'); | ||
const assert = require('assert'); | ||
const tls = require('tls'); | ||
const fixtures = require('../common/fixtures'); | ||
|
||
const serverOptions = { | ||
key: fixtures.readKey('agent1-key.pem'), | ||
cert: fixtures.readKey('agent1-cert.pem') | ||
}; | ||
const server = http2.createSecureServer(serverOptions, (req, res) => { | ||
console.log(`Connect from: ${req.connection.remoteAddress}`); | ||
assert.strictEqual(req.connection.remoteAddress, '127.0.0.2'); | ||
|
||
req.on('end', common.mustCall(() => { | ||
res.writeHead(200, { 'Content-Type': 'text/plain' }); | ||
res.end(`You are from: ${req.connection.remoteAddress}`); | ||
})); | ||
req.resume(); | ||
}); | ||
|
||
server.listen(0, '127.0.0.1', common.mustCall(() => { | ||
const options = { | ||
ALPNProtocols: ['h2'], | ||
host: '127.0.0.1', | ||
servername: 'localhost', | ||
localAddress: '127.0.0.2', | ||
port: server.address().port, | ||
rejectUnauthorized: false | ||
}; | ||
|
||
console.log('Server ready', server.address().port); | ||
|
||
const socket = tls.connect(options, async () => { | ||
|
||
console.log('TLS Connected!'); | ||
|
||
setTimeout(() => { | ||
|
||
const client = http2.connect( | ||
'https://localhost:' + server.address().port, | ||
{ ...options, createConnection: () => socket } | ||
); | ||
const req = client.request({ | ||
':path': '/' | ||
}); | ||
req.on('data', () => req.resume()); | ||
req.on('end', common.mustCall(function() { | ||
client.close(); | ||
req.close(); | ||
server.close(); | ||
})); | ||
req.end(); | ||
}, 1000); | ||
}); | ||
})); |