summaryrefslogtreecommitdiff
path: root/test/parallel/test-tls-connect-hwm-option.js
blob: e016ccc6cba0dcf37f2e6af3a5e5712b9d87bb0b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
'use strict';

const common = require('../common');
if (!common.hasCrypto)
  common.skip('missing crypto');

const assert = require('assert');
const tls = require('tls');
const fixtures = require('../common/fixtures');

const pem = (n) => fixtures.readKey(`${n}.pem`);

let clients = 0;

const server = tls.createServer({
  key: pem('agent1-key'),
  cert: pem('agent1-cert')
}, common.mustCall(() => {
  if (--clients === 0)
    server.close();
}, 3));

server.listen(0, common.mustCall(() => {
  clients++;
  const highBob = tls.connect({
    port: server.address().port,
    rejectUnauthorized: false,
    highWaterMark: 128000,
  }, common.mustCall(() => {
    assert.strictEqual(highBob.readableHighWaterMark, 128000);
    highBob.end();
  }));

  clients++;
  const defaultHighBob = tls.connect({
    port: server.address().port,
    rejectUnauthorized: false,
    highWaterMark: undefined,
  }, common.mustCall(() => {
    assert.strictEqual(defaultHighBob.readableHighWaterMark, 16 * 1024);
    defaultHighBob.end();
  }));

  clients++;
  const zeroHighBob = tls.connect({
    port: server.address().port,
    rejectUnauthorized: false,
    highWaterMark: 0,
  }, common.mustCall(() => {
    assert.strictEqual(zeroHighBob.readableHighWaterMark, 0);
    zeroHighBob.end();
  }));
}));