tls.connect(opts, function() { socksSocket.authorized = socksSocket.socket.authorized; connectHandler.call(socksSocket); }).on('error', function(err) { socksSocket.emit('error', err); })
connect() { new Protobuf().then((protobuf) => { this.protobuf = protobuf this.socket = tls.connect(this.options.port, this.options.url, this.options, () => { this.emit('connected') }) this.socket.on('error', error => { this.emit('error', error) }) this.socket.on('data', this._onReceiveData.bind(this)) }) }
secureSocket.on('secure', function() { secureEstablished = true; onSecure(rejectUnauthorized ? this.ssl.verifyError() : null); });
function hb_check(node, container_port, container) { if (config.automatic_heartbeat.indexOf('enabled') > -1) { const client = config.ssl ? new tls.TLSSocket() : new net.Socket(); client.connect(container_port, node, container, () => {}); client.on('end', () => { addLog('\nA Heart Beat Check Just Ran.'); }); client.on('error', () => { addLog('\n' + container + ' failed on: ' + node); console.log('\n' + container + ' failed on: ' + node); if (config.container_host_constraints) { container_faillog.push(container); container_failover(container); } superagent .get(`${scheme}${server}:${server_port}/restart`) .query({ token: token, container }) .end((error, response) => { if (error) { console.log(error); } }); }); } }
// error handler for secure socket secureSocket.on('_tlsError', function(err) { if (secureEstablished) { connection._handleNetworkError(err); } else { onSecure(err); } });
socket.on('error', () => {
server.on('connection', (socket) => { sockets.add(socket); socket.on('data', (data) => { receivedData.push(data); ev.emit('data'); }, 10); }); socket.on('close', () => sockets.delete(socket)); }); server.on('listening', () => { try { tlsserver = tls.createServer({ tlsserver.on('secureConnection', (socket) => { tlssockets.add(socket); socket.on('data', (data) => { receivedData.push(data); ev.emit('data'); }, 10); }); socket.on('close', () => { socket.destroy(); tlssockets.delete(socket); }); }); tlsserver.on('listening', () => done()); tlsserver.on('error', (e) => done(e));
socket.setKeepAlive(tcpOptions.keepAlive, tcpOptions.initialDelay); }); socket.on("ready", () => { this.options.debug && console.log("[webtcp] Socket ready"); connection.send({ type: "connect" }); }); socket.on("end", () => { this.options.debug && console.log("[webtcp] Socket end"); if (connection.isOpen()) { socket.on("close", hadError => { connection.socket = null; this.options.debug && console.log("[webtcp] Socket closed", "error?", hadError); socket.on("timeout", () => { this.options.debug && console.log("[webtcp] Socket timeout"); socket.destroy(); connection.send({ type: "timeout" }); }); socket.on("error", (error) => { this.options.debug && console.log("[webtcp] Socket error", error); if (connection.isOpen()) { socket.on("data", payload => { this.options.debug && console.log("[webtcp] Socket data", payload); connection.send({
secureSocket.on('secure', function () { conn._ssl = this.ssl; });
function hb_check(node, container_port, container) { if (config.automatic_heartbeat.indexOf('enabled') > -1) { const client = config.ssl ? new tls.TLSSocket() : new net.Socket(); client.connect(container_port, node, container, () => {}); client.on('end', () => { addLog('\nA Heart Beat Check Just Ran.'); }); client.on('error', () => { addLog('\n' + container + ' failed on: ' + node); console.log('\n' + container + ' failed on: ' + node); if (config.container_host_constraints) { container_faillog.push(container); container_failover(container); } superagent .get(`${scheme}${server}:${server_port}/restart`) .query({ token: token, container }) .end((error, response) => { if (error) { console.log(error); } }); }); } }