Options
All
  • Public
  • Public/Protected
  • All
Menu

Hierarchy

  • RequestOptions
  • IOptionsCustom
    • IOptionsHTTPS

Index

Properties

Optional _defaultAgent

_defaultAgent?: Agent

Optional abort

abort?: AbortSignal

Optional agent

agent?: boolean | Agent

Optional auth

auth?: null | string

Optional authMethod

authMethod?: string[]

Stores the used auth method

Optional body

body?: any

content (body) of the request

Optional ca

ca?: string | Buffer | (string | Buffer)[]

Optionally override the trusted CA certificates. Default is to trust the well-known CAs curated by Mozilla. Mozilla's CAs are completely replaced when CAs are explicitly specified using this option.

Optional cert

cert?: string | Buffer | (string | Buffer)[]

Cert chains in PEM format. One cert chain should be provided per private key. Each cert chain should consist of the PEM formatted certificate for a provided private key, followed by the PEM formatted intermediate certificates (if any), in order, and not including the root CA (the root CA must be pre-known to the peer, see ca). When providing multiple cert chains, they do not have to be in the same order as their private keys in key. If the intermediate certificates are not provided, the peer will not be able to validate the certificate, and the handshake will fail.

Optional ciphers

ciphers?: string

Cipher suite specification, replacing the default. For more information, see modifying the default cipher suite. Permitted ciphers can be obtained via tls.getCiphers(). Cipher names must be uppercased in order for OpenSSL to accept them.

Optional clientCertEngine

clientCertEngine?: string

Name of an OpenSSL engine which can provide the client certificate.

Optional cookie

cookie?: any

Optional cookieJar

cookieJar?: any

Optional createConnection

createConnection?: (options: ClientRequestArgs, oncreate: (err: Error, socket: Socket) => void) => Socket

Type declaration

    • (options: ClientRequestArgs, oncreate: (err: Error, socket: Socket) => void): Socket
    • Parameters

      • options: ClientRequestArgs
      • oncreate: (err: Error, socket: Socket) => void
          • (err: Error, socket: Socket): void
          • Parameters

            • err: Error
            • socket: Socket

            Returns void

      Returns Socket

Optional crl

crl?: string | Buffer | (string | Buffer)[]

PEM formatted CRLs (Certificate Revocation Lists).

Optional debug

debug?: boolean

Enable the logger for debug purposes

Optional defaultPort

defaultPort?: string | number

Optional dhparam

dhparam?: string | Buffer

Diffie Hellman parameters, required for Perfect Forward Secrecy. Use openssl dhparam to create the parameters. The key length must be greater than or equal to 1024 bits or else an error will be thrown. Although 1024 bits is permissible, use 2048 bits or larger for stronger security. If omitted or invalid, the parameters are silently discarded and DHE ciphers will not be available.

Optional disableRedirect

disableRedirect?: boolean

Disables the interception of redirect responses

Optional domain

domain?: string

domain/target validation

Optional ecdhCurve

ecdhCurve?: string

A string describing a named curve or a colon separated list of curve NIDs or names, for example P-521:P-384:P-256, to use for ECDH key agreement. Set to auto to select the curve automatically. Use crypto.getCurves() to obtain a list of available curve names. On recent releases, openssl ecparam -list_curves will also display the name and description of each available elliptic curve. Default: tls.DEFAULT_ECDH_CURVE.

Optional family

family?: number

Optional headers

headers?: OutgoingHttpHeaders

Optional honorCipherOrder

honorCipherOrder?: boolean

Attempt to use the server's cipher suite preferences instead of the client's. When true, causes SSL_OP_CIPHER_SERVER_PREFERENCE to be set in secureOptions

Optional host

host?: null | string

Optional hostname

hostname?: null | string

Optional key

key?: string | Buffer | (Buffer | KeyObject)[]

Private keys in PEM format. PEM allows the option of private keys being encrypted. Encrypted keys will be decrypted with options.passphrase. Multiple keys using different algorithms can be provided either as an array of unencrypted key strings or buffers, or an array of objects in the form {pem: <string|buffer>[, passphrase: ]}. The object form can only occur in an array. object.passphrase is optional. Encrypted keys will be decrypted with object.passphrase if provided, or options.passphrase if it is not.

Optional localAddress

localAddress?: string

Optional lookup

lookup?: LookupFunction

Optional maxHeaderSize

maxHeaderSize?: number
default

8192

Optional maxVersion

maxVersion?: SecureVersion

Optionally set the maximum TLS version to allow. One of 'TLSv1.3', 'TLSv1.2', 'TLSv1.1', or 'TLSv1'. Cannot be specified along with the secureProtocol option, use one or the other. Default: 'TLSv1.3', unless changed using CLI options. Using --tls-max-v1.2 sets the default to 'TLSv1.2'. Using --tls-max-v1.3 sets the default to 'TLSv1.3'. If multiple of the options are provided, the highest maximum is used.

Optional method

method?: string

Optional minVersion

minVersion?: SecureVersion

Optionally set the minimum TLS version to allow. One of 'TLSv1.3', 'TLSv1.2', 'TLSv1.1', or 'TLSv1'. Cannot be specified along with the secureProtocol option, use one or the other. It is not recommended to use less than TLSv1.2, but it may be required for interoperability. Default: 'TLSv1.2', unless changed using CLI options. Using --tls-v1.0 sets the default to 'TLSv1'. Using --tls-v1.1 sets the default to 'TLSv1.1'. Using --tls-min-v1.3 sets the default to 'TLSv1.3'. If multiple of the options are provided, the lowest minimum is used.

Optional passphrase

passphrase?: string

Shared passphrase used for a single private key and/or a PFX.

Optional path

path?: null | string

Optional pfx

pfx?: string | Buffer | (string | Buffer | PxfObject)[]

PFX or PKCS12 encoded private key and certificate chain. pfx is an alternative to providing key and cert individually. PFX is usually encrypted, if it is, passphrase will be used to decrypt it. Multiple PFX can be provided either as an array of unencrypted PFX buffers, or an array of objects in the form {buf: <string|buffer>[, passphrase: ]}. The object form can only occur in an array. object.passphrase is optional. Encrypted PFX will be decrypted with object.passphrase if provided, or options.passphrase if it is not.

Optional port

port?: null | string | number

Optional privateKeyEngine

privateKeyEngine?: string

Name of an OpenSSL engine to get private key from. Should be used together with privateKeyIdentifier.

Optional privateKeyIdentifier

privateKeyIdentifier?: string

Identifier of a private key managed by an OpenSSL engine. Should be used together with privateKeyEngine. Should not be set together with key, because both options define a private key in different ways.

Optional protocol

protocol?: null | string

Optional pwd

pwd?: string

password of the username

Optional rejectUnauthorized

rejectUnauthorized?: boolean

Optional requests

requests?: number

Requests counter

Optional secureOptions

secureOptions?: number

Optionally affect the OpenSSL protocol behavior, which is not usually necessary. This should be used carefully if at all! Value is a numeric bitmask of the SSL_OP_* options from OpenSSL Options

Optional secureProtocol

secureProtocol?: string

Legacy mechanism to select the TLS protocol version to use, it does not support independent control of the minimum and maximum version, and does not support limiting the protocol to TLSv1.3. Use minVersion and maxVersion instead. The possible values are listed as SSL_METHODS, use the function names as strings. For example, use 'TLSv1_1_method' to force TLS version 1.1, or 'TLS_method' to allow any TLS protocol version up to TLSv1.3. It is not recommended to use TLS versions less than 1.2, but it may be required for interoperability. Default: none, see minVersion.

Optional servername

servername?: string

Optional sessionIdContext

sessionIdContext?: string

Opaque identifier used by servers to ensure session state is not shared between applications. Unused by clients.

Optional sessionTimeout

sessionTimeout?: number

The number of seconds after which a TLS session created by the server will no longer be resumable. See Session Resumption for more information. Default: 300.

Optional setHost

setHost?: boolean

Optional sigalgs

sigalgs?: string

Colon-separated list of supported signature algorithms. The list can contain digest algorithms (SHA256, MD5 etc.), public key algorithms (RSA-PSS, ECDSA etc.), combination of both (e.g 'RSA+SHA384') or TLS v1.3 scheme names (e.g. rsa_pss_pss_sha512).

Optional socketPath

socketPath?: string

Optional ticketKeys

ticketKeys?: Buffer

48-bytes of cryptographically strong pseudo-random data. See Session Resumption for more information.

Optional timeout

timeout?: number

Optional tough

tough?: any

Sets the tough-cookie module to enable session

Optional url

url?: string

http(s) url of the protected resource

Optional user

user?: string

username of valid user (can be DOMAIN\username format)

Optional workstation

workstation?: string

workstation id (calculated if undefined)

Generated using TypeDoc