39 lines
1.1 KiB
JavaScript
39 lines
1.1 KiB
JavaScript
'use strict';
|
|
const common = require('../common');
|
|
if (!common.hasCrypto)
|
|
common.skip('missing crypto');
|
|
|
|
const fixtures = require('../common/fixtures');
|
|
const makeDuplexPair = require('../common/duplexpair');
|
|
const assert = require('assert');
|
|
const { TLSSocket, connect } = require('tls');
|
|
|
|
const key = fixtures.readKey('agent1-key.pem');
|
|
const cert = fixtures.readKey('agent1-cert.pem');
|
|
const ca = fixtures.readKey('ca1-cert.pem');
|
|
|
|
const { clientSide, serverSide } = makeDuplexPair();
|
|
|
|
const clientTLS = connect({
|
|
socket: clientSide,
|
|
ca,
|
|
host: 'agent1' // Hostname from certificate
|
|
});
|
|
const serverTLS = new TLSSocket(serverSide, {
|
|
isServer: true,
|
|
key,
|
|
cert,
|
|
ca
|
|
});
|
|
|
|
assert.strictEqual(clientTLS.connecting, false);
|
|
assert.strictEqual(serverTLS.connecting, false);
|
|
|
|
clientTLS.on('secureConnect', common.mustCall(() => {
|
|
clientTLS.write('foobar', common.mustCall(() => {
|
|
assert.strictEqual(serverTLS.read().toString(), 'foobar');
|
|
assert.strictEqual(clientTLS._handle.writeQueueSize, 0);
|
|
}));
|
|
assert.ok(clientTLS._handle.writeQueueSize > 0);
|
|
}));
|