import {
afterAll,
afterEach,
beforeAll,
beforeEach,
describe,
expect,
it,
} from "bun:test";
import { connect, isIP, isIPv4, isIPv6, Socket } from "net";
it("should support net.isIP()", () => {
expect(isIP("::1")).toBe(6);
expect(isIP("foobar")).toBe(0);
expect(isIP("127.0.0.1")).toBe(4);
expect(isIP("127.0.0.1/24")).toBe(0);
expect(isIP("127.000.000.001")).toBe(0);
});
it("should support net.isIPv4()", () => {
expect(isIPv4("::1")).toBe(false);
expect(isIPv4("foobar")).toBe(false);
expect(isIPv4("127.0.0.1")).toBe(true);
expect(isIPv4("127.0.0.1/24")).toBe(false);
expect(isIPv4("127.000.000.001")).toBe(false);
});
it("should support net.isIPv6()", () => {
expect(isIPv6("::1")).toBe(true);
expect(isIPv6("foobar")).toBe(false);
expect(isIPv6("127.0.0.1")).toBe(false);
expect(isIPv6("127.0.0.1/24")).toBe(false);
expect(isIPv6("127.000.000.001")).toBe(false);
});
describe("net.Socket read", () => {
var port = 12345;
for (let [message, label] of [
// ["Hello World!".repeat(1024), "long message"],
["Hello!", "short message"],
]) {
describe(label, () => {
function runWithServer(cb) {
return (done) => {
function drain(socket) {
const message = socket.data.message;
const written = socket.write(message);
if (written < message.length) {
socket.data.message = message.slice(written);
} else {
socket.end();
}
}
var server = Bun.listen({
hostname: "localhost",
port: port++,
socket: {
open(socket) {
socket.data.message = message;
drain(socket);
},
drain,
error(socket, err) {
done(err);
},
},
data: {
message: "",
},
});
function onDone(err) {
server.stop();
done(err);
}
try {
cb(server, drain, onDone);
} catch (e) {
onDone(e);
}
};
}
it(
"should work with .connect(port)",
runWithServer((server, drain, done) => {
var data = "";
const socket = new Socket()
.connect(server.port)
.on("connect", () => {
expect(socket).toBeDefined();
expect(socket.connecting).toBe(false);
})
.setEncoding("utf8")
.on("data", (chunk) => {
data += chunk;
})
.on("end", () => {
try {
expect(data).toBe(message);
done();
} catch (e) {
server.stop();
done(e);
}
})
.on("error", done);
}),
);
it(
"should work with .connect(port, listener)",
runWithServer((server, drain, done) => {
var data = "";
const socket = new Socket()
.connect(server.port, () => {
expect(socket).toBeDefined();
expect(socket.connecting).toBe(false);
})
.setEncoding("utf8")
.on("data", (chunk) => {
data += chunk;
})
.on("end", () => {
try {
expect(data).toBe(message);
done();
} catch (e) {
server.stop();
done(e);
}
})
.on("error", done);
}),
);
it(
"should work with .connect(port, host, listener)",
runWithServer((server, drain, done) => {
var data = "";
const socket = new Socket()
.connect(server.port, "localhost", () => {
expect(socket).toBeDefined();
expect(socket.connecting).toBe(false);
})
.setEncoding("utf8")
.on("data", (chunk) => {
data += chunk;
})
.on("end", () => {
try {
expect(data).toBe(message);
done();
} catch (e) {
done(e);
}
})
.on("error", done);
}),
);
});
}
});
describe("net.Socket write", () => {
const message = "Hello World!".repeat(1024);
let port = 53213;
function runWithServer(cb) {
return (done) => {
let server;
function close(socket) {
expect(Buffer.concat(socket.data).toString("utf8")).toBe(message);
done();
}
var leaky;
server = Bun.listen({
hostname: "0.0.0.0",
port: port++,
socket: {
close,
data(socket, buffer) {
leaky = socket;
socket.data.push(buffer);
},
end: close,
error(socket, err) {
leaky = socket;
done(err);
},
open(socket) {
leaky = socket;
socket.data = [];
},
},
data: [],
});
function onDone(err) {
server.stop();
done(err);
}
try {
cb(server, onDone);
} catch (e) {
onDone(e);
}
};
}
it(
"should work with .end(data)",
runWithServer((server, done) => {
const socket = new Socket()
.connect(server.port)
.on("ready", () => {
expect(socket).toBeDefined();
expect(socket.connecting).toBe(false);
})
.on("error", done)
.end(message);
}),
);
it(
"should work with .write(data).end()",
runWithServer((server, done) => {
const socket = new Socket()
.connect(server.port, () => {
expect(socket).toBeDefined();
expect(socket.connecting).toBe(false);
})
.on("error", done);
socket.write(message);
socket.end();
}),
);
it(
"should work with multiple .write()s",
runWithServer((server, done) => {
const socket = new Socket()
.connect(server.port, server.hostname, () => {
expect(socket).toBeDefined();
expect(socket.connecting).toBe(false);
})
.on("error", done);
const size = 10;
for (let i = 0; i < message.length; i += size) {
socket.write(message.slice(i, i + size));
}
socket.end();
}),
);
});
it("should handle connection error", (done) => {
var data = {};
connect(55555, () => {
done(new Error("Should not have connected"));
}).on("error", (error) => {
expect(error).toBeDefined();
expect(error.name).toBe("SystemError");
expect(error.message).toBe("Failed to connect");
done();
});
});
ons'>jarred/esm-conditions
jarred/experiment-bsp
jarred/export-star-flat
jarred/exports-map
jarred/faster-error-capturestacktrace
jarred/faster-ordered-properties
jarred/fastmalloc
jarred/fetch-experiment
jarred/fetchheaders
jarred/fix-blob-slice-test
jarred/fix-bunbun-on-wsl
jarred/fix-crash
jarred/fix-http-compression
jarred/fix-issue-with-tsconfig-run
jarred/fix-proxy-regression
jarred/fixes-3129
jarred/gen
jarred/htmlrewriter
jarred/improve-testing
jarred/inquirer
jarred/isolation
jarred/jsc
jarred/land
jarred/landing
jarred/linux
jarred/live-bindings
jarred/make-strings-better
jarred/mdx-thrwawy
jarred/move
jarred/napi
jarred/new-bund
jarred/new-bund-ressurected-branch
jarred/new-http
jarred/no-more-npm
jarred/package-mapper
jarred/pg
jarred/port
jarred/possibly-2732
jarred/postgresql
jarred/precompile-linux-dependencies
jarred/prepare-for-libuv
jarred/profiled-call
jarred/read-tsconfig-jsx
jarred/redo-evaluation-order
jarred/redo-zigstring-for-utf16
jarred/relay
jarred/rename
jarred/repl
jarred/request-finalizer
jarred/rewrite-router
jarred/run
jarred/simdjson
jarred/simplify
jarred/some-fixes-for-eventsource
jarred/standalone-repro1
jarred/start
jarred/strong
jarred/subprocess
jarred/support-tee
jarred/tcc
jarred/throw-if
jarred/update-install-stuff
jarred/update-zig1
jarred/upgrade-zig-2
jarred/uws
jarred/webkit-upgrade-may-17
jarred/wip-more-reliable
jarred/workers
jarred/zlib
jarred/zls
lithdew/picohttp-mimalloc
main
move-templates
nestjs-guide
next-cleanup
origin/main
plugin/plugindata
plugin/resolvedir
postinstall_3
repl
request-body-stream
reserve-commands
revert-5167-dylan/decode-regex-if-needed
rfc/bun-bundler-api
rfc/bunfig-overhaul
save-in-update
sdl
test/action
types/mock
types/readable-stream-default
types/tty
u/vjpr/zig-0.10
xHyroM/types/expose-Bun-Env
Unnamed repository; edit this file 'description' to name the repository.
Age Commit message (Collapse ) Author Files Lines
fetch errors (#6390)
* fix abort signal and fetch error
* fix fetch error and lock behavior
added commands to install unzip package and to check Linux kernel version
fixed some minor documentation.
The exit code support is between 0-255 and not only in the signed positive range
(0-127).
Node.js does not seam to throw on a bigger integer and just wraps around,
but throwing a error is a good approach and makes the behaviour more defined.
This allows the range to be 0-255
Fixes: https://github.com/oven-sh/bun/issues/6284
* oops
* createSecretKey but weird error
* use the right prototype, do not add a function called export lol
* HMAC JWT export + base64 fix
* Fix Equals, Fix Get KeySize, add complete export RSA
* fix RSA export
* add EC exports
* X25519 and ED25519 export + fixes
* fix default exports
* better asymmetricKeyType
* fix private exports
* fix symmetricKeySize
* createPublicKey validations + refactor
* jwt + der fixes
* oopsies
* add PEM into createPublicKey
* cleanup
* WIP
* bunch of fixes
* public from private + private OKP
* encrypted keys fixes
* oops
* fix clear tls error, add some support to jwk and other formats on publicEncrypt/publicDecrypt
* more fixes and tests working
* more fixes more tests
* more clear hmac errors
* more tests and fixes
* add generateKeyPair
* more tests passing, some skips
* fix EC key from private
* fix OKP JWK
* nodejs ignores ext and key_ops on KeyObject.exports
* add EC sign verify test
* some fixes
* add crypto.generateKeyPairSync(type, options)
* more fixes and more tests
* fix hmac tests
* jsonwebtoken tests
* oops
* oops2
* generated files
* revert package.json
* vm tests
* todos instead of failues
* toBunString -> toString
* undo simdutf
* improvements
* unlikely
* cleanup
* cleanup 2
* oops
* move _generateKeyPairSync checks to native
Co-authored-by: Jarred Sumner <709451+Jarred-Sumner@users.noreply.github.com>
Returning undefined simply falls through to the next plugin, or to the default loader.
This is defined by esbuild, and supported by Bun, but the types don't reflect it properly.