56 lines
1.6 KiB
JavaScript
56 lines
1.6 KiB
JavaScript
'use strict';
|
|
const common = require('../common');
|
|
if (!common.hasCrypto)
|
|
common.skip('missing crypto');
|
|
const fixtures = require('../common/fixtures');
|
|
const http2 = require('http2');
|
|
|
|
// Regression test for https://github.com/nodejs/node/issues/29223.
|
|
// There was a "leak" in the accounting of session memory leading
|
|
// to streams eventually failing with NGHTTP2_ENHANCE_YOUR_CALM.
|
|
|
|
const server = http2.createSecureServer({
|
|
key: fixtures.readKey('agent2-key.pem'),
|
|
cert: fixtures.readKey('agent2-cert.pem'),
|
|
});
|
|
|
|
// Simple server that sends 200k and closes the stream.
|
|
const data200k = 'a'.repeat(200 * 1024);
|
|
server.on('stream', (stream) => {
|
|
stream.write(data200k);
|
|
stream.end();
|
|
});
|
|
|
|
server.listen(0, common.mustCall(() => {
|
|
const client = http2.connect(`https://localhost:${server.address().port}`, {
|
|
ca: fixtures.readKey('agent2-cert.pem'),
|
|
servername: 'agent2',
|
|
|
|
// Set maxSessionMemory to 1MB so the leak causes errors faster.
|
|
maxSessionMemory: 1
|
|
});
|
|
|
|
// Repeatedly create a new stream and read the incoming data. Even though we
|
|
// only have one stream active at a time, prior to the fix for #29223,
|
|
// session memory would steadily increase and we'd eventually hit the 1MB
|
|
// maxSessionMemory limit and get NGHTTP2_ENHANCE_YOUR_CALM errors trying to
|
|
// create new streams.
|
|
let streamsLeft = 50;
|
|
function newStream() {
|
|
const stream = client.request({ ':path': '/' });
|
|
|
|
stream.on('data', () => { });
|
|
|
|
stream.on('close', () => {
|
|
if (streamsLeft-- > 0) {
|
|
newStream();
|
|
} else {
|
|
client.destroy();
|
|
server.close();
|
|
}
|
|
});
|
|
}
|
|
|
|
newStream();
|
|
}));
|