Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Provided CA parameter to pass to the tls socket connection and socket error non ECONNREFUSED reporting #6

Merged
merged 2 commits into from
Nov 15, 2013

Conversation

ifraixedes
Copy link
Contributor

I provided a new option to the transport that it is passed straightaway to TLS socket connection as node method accepts.
It allows to drop errors for self-signed certificate, so I could pass the test in my machine, otherwise the test was stopped waiting infinitely in the 'secure connection' suite. I think that it is a change of node API in some release, launched after you used for tested it.
I also added to socket.on('error', ... a check to emit an error to the transport when the socket receive an error different than ECONNREFUSED.

I added the ```ca``` options to provide an array with the CAs that
winston-logstash secure socket accept, so it is provided to node client
secure socket connection.

I also added a checking in socket ```error``` listener to report to
transport eventEmitter when socket received an error different from
ECONNREFUSED
I added a test to check the ca option and the error reporting so, I
regenerated the certificates and keys and provided another to check
which provoke an error on the transport socket to check the implemented
error reporting.

I also added a shell script to regenerate the server key and certificate
@jaakkos
Copy link
Owner

jaakkos commented Nov 15, 2013

Thanks! Looks good.

jaakkos added a commit that referenced this pull request Nov 15, 2013
Provided CA parameter to pass to the tls socket connection and socket error non ECONNREFUSED reporting
@jaakkos jaakkos merged commit 9083da8 into jaakkos:master Nov 15, 2013
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants