-
Notifications
You must be signed in to change notification settings - Fork 29.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Revert "tls: add highWaterMark option for connect" #33387
Conversation
This reverts commit 58682d8.
16d1ce8
to
c23f5d3
Compare
Can we revert this (as opposed to (doc?) deprecate) as #32786 went out in 13.4.0 and 14.1.0? |
doc/api/tls.md
Outdated
@@ -650,6 +650,10 @@ Methods that return TLS connection metadata (e.g. | |||
[`tls.TLSSocket.getPeerCertificate()`][] will only return data while the | |||
connection is open. | |||
|
|||
The `highWaterMark` parameter of the duplex [Stream][] makes no sense for | |||
`tls.TLSSocket`, because the TLS protocol assumes 16KB as the maximum record | |||
size. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I suggest to move this comment down below and to mention that it's not supported by extending the following entry * ...: Any [`socket.connect()`][] option not already listed.
.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Moved it. Please check the update.
@richardlau that's a good question. I don't think anyone started using this option already. I could keep entries in |
I think I'd be okay with that. The code will just ignore the option in the case anyone is setting it, correct? |
Also restores change entries for `highWaterMark` option in `tls` and `https` docs.
c23f5d3
to
de46fc4
Compare
Yes, that's right. Also that option wasn't working as expected when set (see #33262), so this PR shouldn't break any user code. |
@benjamingr Is bringing this over in the issue thread, and it probably makes sense to discuss it there, but what does the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
See the comment above – I’m not opposed but we should be clear about why it makes sense to remove this.
@addaleax as it was discussed in #33262, such buffering does not happen in |
@puzpuzpuz This test passes for me: Test in the fold'use strict';
const common = require('../common');
if (!common.hasCrypto)
common.skip('missing crypto');
const assert = require('assert');
const tls = require('tls');
const { PassThrough } = require('stream');
const fixtures = require('../common/fixtures');
const pem = (n) => fixtures.readKey(`${n}.pem`);
const server = tls.createServer({
key: pem('agent1-key'),
cert: pem('agent1-cert')
}, common.mustCall((client) => {
// Do not read from the client here.
client.destroy();
server.close();
}));
server.listen(0, common.mustCall(() => {
const stream = tls.connect({
port: server.address().port,
rejectUnauthorized: false,
highWaterMark: 128000,
}, common.mustCall(() => {
const pt = new PassThrough();
pt.pipe(stream);
for (let i = 0; i < 256; i++)
pt.write('a'.repeat(1000));
process.nextTick(() => {
assert.strictEqual(stream.writableLength, 128000);
});
}));
stream.on('error', () => {});
})); So I’d take that as proof that the HWM option does work? |
That has been my understanding as well. I agree we shouldn't remove highWatermark support from tls just because it doesn't work with HTTPs. In general setting a highWatermark in one part of a stream doesn't ensure that backpressure will be correctly respected throughout the different transformations of the stream. (A semi related interesting side note is the time when David Fowler who built the new .net web framework raised this issue of buffering streams when discussing I/O interfaces in Deno a while ago denoland/deno#387 (comment) to denoland/deno#387 (comment) ) @puzpuzpuz I'm sorry but I'm still confused:
In #33262 (comment) @bnoordhuis said:
There is a difference between "doesn't currently work" and "doesn't conceptually make sense". I'm not sure why having 16k sitting in a buffer somewhere mean Node.js can't buffer multiples of 16K with higher highWaterMark. |
Not really or, to be more precise, it works partially. The original discussion was about Test in the fold'use strict';
const common = require('../common');
if (!common.hasCrypto)
common.skip('missing crypto');
const assert = require('assert');
const tls = require('tls');
const { Buffer } = require('buffer');
const fixtures = require('../common/fixtures');
const pem = (n) => fixtures.readKey(`${n}.pem`);
const hwm = 16 * 1024; // this value works, while 128000 does not
const server = tls.createServer({
key: pem('agent1-key'),
cert: pem('agent1-cert')
}, common.mustCall((socket) => {
socket.write(Buffer.allocUnsafe(hwm), common.mustCall(() => {
socket.destroy();
server.close();
}));
}));
server.listen(0, common.mustCall(() => {
const socket = tls.connect({
port: server.address().port,
rejectUnauthorized: false,
highWaterMark: hwm,
}, common.mustCall(() => {}));
socket.on('data', (data) => {
assert.strictEqual(data.length, hwm);
});
socket.on('error', () => {});
})); |
@benjamingr I wasn't saying "doesn't conceptually make sense", but "doesn't currently work" (and it doesn't work as expected - see #33387 (comment)). Could you specify what exactly confuses you? |
@puzpuzpuz But that’s not what the HWM indicates – it’s not the size of the chunks in which data is read, it is the limit up to which data is read before a |
@addaleax then my understanding wasn't correct. Let me double check how HWM works. Thanks for the clarification. |
@puzpuzpuz the goal of watermarks is to enable steaming and save I/O at the cost of memory. As an example see this diagram from the Chromium wiki that describes how Chrome downloads MP4 files: In your example setting the highWatermark to 128k only changes the amount of buffering not the size of each 'data'. |
@addaleax after checking the documentation it seems that my understanding was correct, i.e. HWM sets the up to limit for a readable stream. Considering this, I agree that the option in Yet, I'm curious about the 16KB limitation. Do you happen to know where it comes from? TLS record size may be the answer, but as discussed here multiple records could be buffered when reading from the socket. |
I'm basing my comment in the other issue on this line from
In the context of receiving data (sending might a different matter), a HWM < 16k is meaningless because it's effectively ignored (because TLS frame size.) HWM > 16k is really HWM + 16k because the TLS frame record buffer isn't under control of JS land. Any HWM buffering is on top of that frame record buffer. |
That makes sense, I'm +1 on at least documenting HWM < 16K not being supported.
Right, that is my expectation and why I'd use HWM - why is there an issue with hwm > 16K? |
I'll close this PR and submit another one with the doc change. But I'm also curious about the reason behind this restriction. |
What restriction in particular? HWM must be at least 16K because buffering less than that in TLS doesn't make much sense because any size smaller than one frame record can't be understood without the rest of the frame. I don't think it has to be at most 16Kb, I think Anna's test shows it (with the support already added) can be more than 16Kb and be multiple frames. We can discuss another property that lets users control the size of each chunk emitted (separate from hwm), that would presumably have to be multiples of 16kb though I'm not sure we'd even want to support customizing that on the stream (as it's an implementation detail). |
The "I'd use HWM - why is there an issue with hwm > 16K?" one from #33387 (comment) |
The test shows that the option applies to |
It's not a reliable measure if you use it to limit memory usage. Say I have M bytes of memory. Most people probably expect S=M/HWM, where S is the number of TLS streams that can exist simultaneously. But it doesn't work that way. The real formula is S=M/(HWM+X), where X is the additional overhead of the TLS stream: frame record buffer, keying material, etc. X can be sizable (an extra 40 or 50k is not exceptional) and can vary over time. Maybe I set HWM=32k but the actual memory footprint might well be double that. |
I always thought of hwm like one would a literal watermark, it's the amount of data I have where I stop asking for more. It was never the absolute maximum amount of data I can hold in a stream. It's only the amount of data I stop asking for new data at. There is no expectation on my part that setting the hwm somehow limits how much memory my program could consime. If you believe users have such an expectation we should probably document the fact it is not possible to calculate the number of streams a server can support with a given amount of memory based on hwm |
I asked a few people and if what you're saying is the right way to think about HWM, then our docs are supremely terrible at conveying that because no one guessed it correctly (including me.) From stream.md:
My, ah, proof readers all thought that means it's a memory usage cap. And yes, I was careful to avoid leading questions. :-) |
This is correct. Once the highwatermark is hit the object will still happily keep buffering more but will keep telling you to stop. Specific stream implementations could choose to enforce stricter limits but doing so is optional. Specifically, it's a threshold, not a limit. |
@jasnell @bnoordhuis I opened a pull request partially based on James's comment and my previous one for the docs. #33432 Feel free to make changes/suggestions directly or if you believe we should make a more substantial change in the docs |
I am going to close this due to the discussion above. Please reopen in case someone would rather keep this open. I think it might be a good idea to open a PR that adds the test mentioned above by @addaleax |
@BridgeAR thanks for closing this PR. I wasn't able to follow the discussion for some time and after reading the updates I agree with all points. @benjamingr thanks for opening the doc enhancement PR! |
As it was discussed in #33262, TLS assumes 16KB as the maximum record size, so it makes no sense to expose hwm option in
tls.connect()
. Even if we do so, it's also a problem as connections may be reused inhttps
(see #30107 (comment)).highWaterMark
fortls.TLSSocket
(though, I'm not sure if that's the right place for this note).Checklist
make -j4 test
(UNIX), orvcbuild test
(Windows) passes