summaryrefslogtreecommitdiff
path: root/test/parallel/test-https-agent-sockets-leak.js
blob: 15409d33dbd86a2da1459d9fbc1711ecb6eb24f5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
'use strict';

const common = require('../common');
if (!common.hasCrypto)
  common.skip('missing crypto');

const https = require('https');
const assert = require('assert');
const fixtures = require('../common/fixtures');

const options = {
  key: fixtures.readKey('agent1-key.pem'),
  cert: fixtures.readKey('agent1-cert.pem'),
  ca: fixtures.readKey('ca1-cert.pem')
};

const server = https.Server(options, common.mustCall((req, res) => {
  res.writeHead(200);
  res.end('https\n');
}));

const agent = new https.Agent({
  keepAlive: false
});

server.listen(0, common.mustCall(() => {
  https.get({
    host: server.address().host,
    port: server.address().port,
    headers: { host: 'agent1' },
    rejectUnauthorized: true,
    ca: options.ca,
    agent: agent
  }, common.mustCall((res) => {
    res.resume();
    server.close();

    // Only one entry should exist in agent.sockets pool
    // If there are more entries in agent.sockets,
    // removeSocket will not delete them resulting in a resource leak
    assert.strictEqual(Object.keys(agent.sockets).length, 1);

    res.req.on('close', common.mustCall(() => {
      // To verify that no leaks occur, check that no entries
      // exist in agent.sockets pool after both request and socket
      // has been closed.
      assert.strictEqual(Object.keys(agent.sockets).length, 0);
    }));
  }));
}));