mirror of
https://github.com/nodejs/node.git
synced 2024-12-01 16:10:02 +01:00
e3e56f1d71
Async wrap providers tested: - crypto.randomBytes - crypto.pbkdf2 - fs event wrap - fsreqwrap access - fsreqwrap readFile - getaddrinforeq wrap - getnameinforeq wrap - pipe connect wrap - query wrap - pipewrap - processwrap - shutdown wrap - tcpwrap - udpwrap - send wrap - detailed signal wrap - statwatcher - timerwrap via setTimeout - timerwrap via setInterval - for Immediate - http parser request - http parser response - connection via ssl server - tls wrap - write wrap - ttywrap via readstream - ttywrap via wriream - zctx via zlib binding deflate Embedder API: - async-event tests - one test looks at the happy paths - another ensures that in cases of events emitted in an order that doesn't make sense, the order is enforced by async hooks throwing a meaningful error - embedder enforcement tests are split up since async hook stack corruption now the process - therefore we launch a child and check for error output of the offending code Additional tests: - tests that show that we can enable/disable hooks inside their lifetime events - tests that verify the graph of resources triggering the creation of other resources Test Helpers: - init-hooks: - returns one collector instance - when created an async hook is created and the lifetime events are registered to call the appropriate collector functions - the collector also exposes `enable` and `disable` functions which call through to the async hook - hook checks: - checks invocations of life time hooks against the actual invocations that were collected - in some cases like `destroy` a min/max range of invocations can be supplied since in these cases the exact number is non-deterministic - verify graph: - verifies the triggerIds of specific async resources are as expected, i.e. the creation of resources was triggered by the resource we expect - includes a printGraph function to generate easily readable test input for verify graph - both functions prune TickObjects to create less brittle and easier to understand tests PR-URL: https://github.com/nodejs/node/pull/12892 Ref: https://github.com/nodejs/node/pull/11883 Ref: https://github.com/nodejs/node/pull/8531 Reviewed-By: Andreas Madsen <amwebdk@gmail.com> Reviewed-By: Anna Henningsen <anna@addaleax.net> Reviewed-By: Sam Roberts <vieuxtech@gmail.com> Reviewed-By: Matteo Collina <matteo.collina@gmail.com> Reviewed-By: Refael Ackermann <refack@gmail.com> Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Jeremiah Senkpiel <fishrock123@rocketmail.com>
99 lines
2.5 KiB
JavaScript
99 lines
2.5 KiB
JavaScript
'use strict';
|
|
|
|
const common = require('../common');
|
|
const assert = require('assert');
|
|
const initHooks = require('./init-hooks');
|
|
const fs = require('fs');
|
|
const { checkInvocations } = require('./hook-checks');
|
|
|
|
if (!common.hasCrypto) {
|
|
common.skip('missing crypto');
|
|
return;
|
|
}
|
|
|
|
const tls = require('tls');
|
|
const hooks = initHooks();
|
|
hooks.enable();
|
|
|
|
//
|
|
// Creating server and listening on port
|
|
//
|
|
const server = tls
|
|
.createServer({
|
|
cert: fs.readFileSync(common.fixturesDir + '/test_cert.pem'),
|
|
key: fs.readFileSync(common.fixturesDir + '/test_key.pem')
|
|
})
|
|
.on('listening', common.mustCall(onlistening))
|
|
.on('secureConnection', common.mustCall(onsecureConnection))
|
|
.listen(common.PORT);
|
|
|
|
assert.strictEqual(hooks.activitiesOfTypes('WRITEWRAP').length, 0,
|
|
'no WRITEWRAP when server created');
|
|
|
|
function onlistening() {
|
|
assert.strictEqual(hooks.activitiesOfTypes('WRITEWRAP').length, 0,
|
|
'no WRITEWRAP when server is listening');
|
|
//
|
|
// Creating client and connecting it to server
|
|
//
|
|
tls
|
|
.connect(common.PORT, { rejectUnauthorized: false })
|
|
.on('secureConnect', common.mustCall(onsecureConnect));
|
|
|
|
assert.strictEqual(hooks.activitiesOfTypes('WRITEWRAP').length, 0,
|
|
'no WRITEWRAP when client created');
|
|
}
|
|
|
|
function checkDestroyedWriteWraps(n, stage) {
|
|
const as = hooks.activitiesOfTypes('WRITEWRAP');
|
|
assert.strictEqual(as.length, n, n + ' WRITEWRAPs when ' + stage);
|
|
|
|
function checkValidWriteWrap(w) {
|
|
assert.strictEqual(w.type, 'WRITEWRAP', 'write wrap');
|
|
assert.strictEqual(typeof w.uid, 'number', 'uid is a number');
|
|
assert.strictEqual(typeof w.triggerId, 'number', 'triggerId is a number');
|
|
|
|
checkInvocations(w, { init: 1, destroy: 1 }, 'when ' + stage);
|
|
}
|
|
as.forEach(checkValidWriteWrap);
|
|
}
|
|
|
|
function onsecureConnection() {
|
|
//
|
|
// Server received client connection
|
|
//
|
|
checkDestroyedWriteWraps(3, 'server got secure connection');
|
|
}
|
|
|
|
function onsecureConnect() {
|
|
//
|
|
// Client connected to server
|
|
//
|
|
checkDestroyedWriteWraps(4, 'client connected');
|
|
|
|
//
|
|
// Destroying client socket
|
|
//
|
|
this.destroy();
|
|
|
|
checkDestroyedWriteWraps(4, 'client destroyed');
|
|
|
|
//
|
|
// Closing server
|
|
//
|
|
server.close(common.mustCall(onserverClosed));
|
|
checkDestroyedWriteWraps(4, 'server closing');
|
|
}
|
|
|
|
function onserverClosed() {
|
|
checkDestroyedWriteWraps(4, 'server closed');
|
|
}
|
|
|
|
process.on('exit', onexit);
|
|
|
|
function onexit() {
|
|
hooks.disable();
|
|
hooks.sanityCheck('WRITEWRAP');
|
|
checkDestroyedWriteWraps(4, 'process exits');
|
|
}
|