// This tests that when the TLS handshake with the endpoint fails, // the proxy client will get a connection error. import * as common from '../common/index.mjs'; import fixtures from '../common/fixtures.js'; import assert from 'node:assert'; import { once } from 'events'; import { runProxiedRequest, createProxyServer } from '../common/proxy-server.js'; if (!common.hasCrypto) common.skip('missing crypto'); // https must be dynamically imported so that builds without crypto support // can skip it. const { default: https } = await import('node:https'); const server = https.createServer({ cert: fixtures.readKey('agent8-cert.pem'), key: fixtures.readKey('agent8-key.pem'), }, common.mustNotCall()); server.on('error', common.mustNotCall((err) => { console.error('Server error', err); })); server.listen(0); await once(server, 'listening'); // Start a proxy server that sends incomplete headers. const { proxy, logs } = createProxyServer(); proxy.listen(0); await once(proxy, 'listening'); const serverHost = `localhost:${server.address().port}`; const requestUrl = `https://${serverHost}/test`; const { code, signal, stderr, stdout } = await runProxiedRequest({ NODE_USE_ENV_PROXY: 1, REQUEST_URL: requestUrl, HTTPS_PROXY: `http://localhost:${proxy.address().port}`, }); // The proxy client should get a UNABLE_TO_VERIFY_LEAF_SIGNATURE during TLS handshake. assert.match(stderr, /UNABLE_TO_VERIFY_LEAF_SIGNATURE/); assert.strictEqual(stdout, ''); assert.strictEqual(code, 0); assert.strictEqual(signal, null); // Verify that it goes through the proxy. assert.deepStrictEqual(logs, [{ method: 'CONNECT', url: serverHost, headers: { 'proxy-connection': 'keep-alive', 'host': serverHost, }, }]); proxy.close(); server.close();