Skip to content

Commit

Permalink
test: check that --insecure-http-parser works
Browse files Browse the repository at this point in the history
Test that using --insecure-http-parser will disable validation of
invalid characters in HTTP headers.

See:
- #30567

PR-URL: #31253
Reviewed-By: Richard Lau <[email protected]>
Reviewed-By: Ruben Bridgewater <[email protected]>
  • Loading branch information
sam-github authored and MylesBorins committed Jan 16, 2020
1 parent 69c4f22 commit 0b88c3d
Showing 1 changed file with 35 additions and 0 deletions.
35 changes: 35 additions & 0 deletions test/parallel/test-http-insecure-parser.js
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
// Flags: --insecure-http-parser

'use strict';
const common = require('../common');
const assert = require('assert');
const http = require('http');
const net = require('net');

const server = http.createServer(function(req, res) {
assert.strictEqual(req.headers['content-type'], 'text/te\bt');
req.pipe(res);
});

server.listen(0, common.mustCall(function() {
const bufs = [];
const client = net.connect(
this.address().port,
function() {
client.write(
'GET / HTTP/1.1\r\n' +
'Content-Type: text/te\x08t\r\n' +
'Connection: close\r\n\r\n');
}
);
client.on('data', function(chunk) {
bufs.push(chunk);
});
client.on('end', common.mustCall(function() {
const head = Buffer.concat(bufs)
.toString('latin1')
.split('\r\n')[0];
assert.strictEqual(head, 'HTTP/1.1 200 OK');
server.close();
}));
}));

0 comments on commit 0b88c3d

Please sign in to comment.