summaryrefslogtreecommitdiff
path: root/test/parallel/test-http2-misused-pseudoheaders.js
blob: c1ae37b9a36938e9208724641df91507c83fe87c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
'use strict';

const common = require('../common');
if (!common.hasCrypto)
  common.skip('missing crypto');
const h2 = require('http2');

const server = h2.createServer();

server.on('stream', common.mustCall((stream) => {
  [
    ':path',
    ':authority',
    ':method',
    ':scheme'
  ].forEach((i) => {
    common.expectsError(() => stream.respond({ [i]: '/' }),
                        {
                          code: 'ERR_HTTP2_INVALID_PSEUDOHEADER'
                        });
  });

  stream.respond({}, { waitForTrailers: true });

  stream.on('wantTrailers', () => {
    common.expectsError(() => {
      stream.sendTrailers({ ':status': 'bar' });
    }, {
      code: 'ERR_HTTP2_INVALID_PSEUDOHEADER'
    });
    stream.close();
  });

  stream.end('hello world');
}));


server.listen(0, common.mustCall(() => {
  const client = h2.connect(`http://localhost:${server.address().port}`);
  const req = client.request();

  req.on('response', common.mustCall());
  req.resume();
  req.on('end', common.mustCall());
  req.on('close', common.mustCall(() => {
    server.close();
    client.close();
  }));
}));