Skip to content

Commit 821518d

Browse files
edsadraddaleax
authored andcommitted
test: refactor test-tls-friendly-error-message.js
Replaces var with const and adds common.mustCall(). PR-URL: #9967 Reviewed-By: Colin Ihrig <[email protected]> Reviewed-By: Anna Henningsen <[email protected]>
1 parent 55269c1 commit 821518d

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed
Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,26 @@
11
'use strict';
2-
varcommon=require('../common');
3-
varassert=require('assert');
2+
constcommon=require('../common');
3+
constassert=require('assert');
44

55
if(!common.hasCrypto){
66
common.skip('missing crypto');
77
return;
88
}
9-
vartls=require('tls');
9+
consttls=require('tls');
1010

11-
varfs=require('fs');
11+
constfs=require('fs');
1212

13-
varkey=fs.readFileSync(common.fixturesDir+'/keys/agent1-key.pem');
14-
varcert=fs.readFileSync(common.fixturesDir+'/keys/agent1-cert.pem');
13+
constkey=fs.readFileSync(common.fixturesDir+'/keys/agent1-key.pem');
14+
constcert=fs.readFileSync(common.fixturesDir+'/keys/agent1-cert.pem');
1515

16-
tls.createServer({key: key,cert: cert},function(conn){
16+
tls.createServer({key: key,cert: cert},common.mustCall(function(conn){
1717
conn.end();
1818
this.close();
19-
}).listen(0,function(){
19+
})).listen(0,common.mustCall(function(){
2020
varoptions={port: this.address().port,rejectUnauthorized: true};
2121
tls.connect(options).on('error',common.mustCall(function(err){
22-
assert.equal(err.code,'UNABLE_TO_VERIFY_LEAF_SIGNATURE');
23-
assert.equal(err.message,'unable to verify the first certificate');
22+
assert.strictEqual(err.code,'UNABLE_TO_VERIFY_LEAF_SIGNATURE');
23+
assert.strictEqual(err.message,'unable to verify the first certificate');
2424
this.destroy();
2525
}));
26-
});
26+
}));

0 commit comments

Comments
(0)