summaryrefslogtreecommitdiff
path: root/mysql-test/lib/My/ConfigFactory.pm
diff options
context:
space:
mode:
authorunknown <msvensson@shellback.(none)>2007-12-13 15:02:50 +0100
committerunknown <msvensson@shellback.(none)>2007-12-13 15:02:50 +0100
commit8218cb44ea94ee92807d3ce58d1e3bd5e24c4164 (patch)
tree469243b136ba57773a82aaa05d0378b89dcc43e7 /mysql-test/lib/My/ConfigFactory.pm
parent516a843b521431d359651cdd8ebd71691d217df6 (diff)
downloadmariadb-git-8218cb44ea94ee92807d3ce58d1e3bd5e24c4164.tar.gz
Generate ssl arguments only if ssl is supported
Diffstat (limited to 'mysql-test/lib/My/ConfigFactory.pm')
-rw-r--r--mysql-test/lib/My/ConfigFactory.pm22
1 files changed, 16 insertions, 6 deletions
diff --git a/mysql-test/lib/My/ConfigFactory.pm b/mysql-test/lib/My/ConfigFactory.pm
index f176ccbeab3..4911e4caaa8 100644
--- a/mysql-test/lib/My/ConfigFactory.pm
+++ b/mysql-test/lib/My/ConfigFactory.pm
@@ -139,27 +139,37 @@ sub fix_std_data {
return "$basedir/mysql-test/std_data";
}
+sub ssl_supported {
+ my ($self)= @_;
+ return $self->{ARGS}->{ssl};
+}
+
sub fix_ssl_ca {
+ return if !ssl_supported(@_);
my $std_data= fix_std_data(@_);
return "$std_data/cacert.pem"
}
sub fix_ssl_server_cert {
+ return if !ssl_supported(@_);
my $std_data= fix_std_data(@_);
return "$std_data/server-cert.pem"
}
sub fix_ssl_client_cert {
+ return if !ssl_supported(@_);
my $std_data= fix_std_data(@_);
return "$std_data/client-cert.pem"
}
sub fix_ssl_server_key {
+ return if !ssl_supported(@_);
my $std_data= fix_std_data(@_);
return "$std_data/server-key.pem"
}
sub fix_ssl_client_key {
+ return if !ssl_supported(@_);
my $std_data= fix_std_data(@_);
return "$std_data/client-key.pem"
}
@@ -188,9 +198,9 @@ my @mysqld_rules=
{ 'server-id' => \&fix_server_id, },
# By default, prevent the started mysqld to access files outside of vardir
{ 'secure-file-priv' => sub { return shift->{ARGS}->{vardir}; } },
- { 'loose-ssl-ca' => \&fix_ssl_ca },
- { 'loose-ssl-cert' => \&fix_ssl_server_cert },
- { 'loose-ssl-key' => \&fix_ssl_server_key },
+ { 'ssl-ca' => \&fix_ssl_ca },
+ { 'ssl-cert' => \&fix_ssl_server_cert },
+ { 'ssl-key' => \&fix_ssl_server_key },
);
@@ -268,9 +278,9 @@ my @client_rules=
#
my @mysqltest_rules=
(
- { 'loose-ssl-ca' => \&fix_ssl_ca },
- { 'loose-ssl-cert' => \&fix_ssl_client_cert },
- { 'loose-ssl-key' => \&fix_ssl_client_key },
+ { 'ssl-ca' => \&fix_ssl_ca },
+ { 'ssl-cert' => \&fix_ssl_client_cert },
+ { 'ssl-key' => \&fix_ssl_client_key },
);