2017-10-12 06:57:42 -07:00
|
|
|
'use strict';
|
|
|
|
|
const common = require('../common');
|
|
|
|
|
if (!common.hasCrypto)
|
|
|
|
|
common.skip('missing crypto');
|
|
|
|
|
const fixtures = require('../common/fixtures');
|
|
|
|
|
const https = require('https');
|
|
|
|
|
|
|
|
|
|
// This test assesses whether long-running writes can complete
|
|
|
|
|
// or timeout because the socket is not aware that the backing
|
|
|
|
|
// stream is still writing.
|
|
|
|
|
|
2017-12-11 17:55:17 -05:00
|
|
|
const writeSize = 30000000;
|
|
|
|
|
let socket;
|
2017-10-12 06:57:42 -07:00
|
|
|
|
|
|
|
|
const server = https.createServer({
|
|
|
|
|
key: fixtures.readKey('agent1-key.pem'),
|
|
|
|
|
cert: fixtures.readKey('agent1-cert.pem')
|
|
|
|
|
}, common.mustCall((req, res) => {
|
|
|
|
|
const content = Buffer.alloc(writeSize, 0x44);
|
|
|
|
|
|
|
|
|
|
res.writeHead(200, {
|
|
|
|
|
'Content-Type': 'application/octet-stream',
|
|
|
|
|
'Content-Length': content.length.toString(),
|
|
|
|
|
'Vary': 'Accept-Encoding'
|
|
|
|
|
});
|
|
|
|
|
|
2017-12-11 17:55:17 -05:00
|
|
|
socket = res.socket;
|
|
|
|
|
const onTimeout = socket._onTimeout;
|
|
|
|
|
socket._onTimeout = common.mustCallAtLeast(() => onTimeout.call(socket), 1);
|
|
|
|
|
res.write(content);
|
2017-10-12 06:57:42 -07:00
|
|
|
res.end();
|
|
|
|
|
}));
|
2017-12-11 17:55:17 -05:00
|
|
|
server.on('timeout', common.mustNotCall());
|
2017-10-12 06:57:42 -07:00
|
|
|
|
|
|
|
|
server.listen(0, common.mustCall(() => {
|
|
|
|
|
https.get({
|
|
|
|
|
path: '/',
|
|
|
|
|
port: server.address().port,
|
|
|
|
|
rejectUnauthorized: false
|
2017-12-11 17:55:17 -05:00
|
|
|
}, (res) => {
|
|
|
|
|
res.once('data', () => {
|
|
|
|
|
socket._onTimeout();
|
|
|
|
|
res.on('data', () => {});
|
|
|
|
|
});
|
|
|
|
|
res.on('end', () => server.close());
|
|
|
|
|
});
|
2017-10-12 06:57:42 -07:00
|
|
|
}));
|