diff options
author | Shaun Verch <shaun.verch@mongodb.com> | 2014-04-17 14:52:00 -0400 |
---|---|---|
committer | Shaun Verch <shaun.verch@mongodb.com> | 2014-04-17 17:00:59 -0400 |
commit | 44da20890f6af02ba766ca14991bbb072395a7ef (patch) | |
tree | f6496a2da0612fc4a8c13a1039564a5c633c947a /jstests/ssl/ssl_options.js | |
parent | b54e00ff344823cab5133142e38ec1f100728e1c (diff) | |
download | mongo-44da20890f6af02ba766ca14991bbb072395a7ef.tar.gz |
SERVER-13644 Fix command line censorship
Diffstat (limited to 'jstests/ssl/ssl_options.js')
-rw-r--r-- | jstests/ssl/ssl_options.js | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/jstests/ssl/ssl_options.js b/jstests/ssl/ssl_options.js new file mode 100644 index 00000000000..f4dcb4d4d47 --- /dev/null +++ b/jstests/ssl/ssl_options.js @@ -0,0 +1,35 @@ +var baseName = "jstests_ssl_ssl_options"; + +jsTest.log("Testing censorship of ssl options"); + +var mongodConfig = { sslPEMKeyFile : "jstests/libs/password_protected.pem", + sslMode : "requireSSL", + sslPEMKeyPassword : "qwerty", + sslClusterPassword : "qwerty" }; +var mongodSource = MongoRunner.runMongod(mongodConfig); + +var getCmdLineOptsResult = mongodSource.adminCommand("getCmdLineOpts"); + +var i; +var isPassword = false; +for (i = 0; i < getCmdLineOptsResult.argv.length; i++) { + if (isPassword) { + assert.eq(getCmdLineOptsResult.argv[i], "<password>", + "Password not properly censored: " + tojson(getCmdLineOptsResult)); + isPassword = false; + continue; + } + + if (getCmdLineOptsResult.argv[i] === "--sslPEMKeyPassword" || + getCmdLineOptsResult.argv[i] === "--sslClusterPassword") { + isPassword = true; + } +} +assert.eq(getCmdLineOptsResult.parsed.net.ssl.PEMKeyPassword, "<password>", + "Password not properly censored: " + tojson(getCmdLineOptsResult)); +assert.eq(getCmdLineOptsResult.parsed.net.ssl.clusterPassword, "<password>", + "Password not properly censored: " + tojson(getCmdLineOptsResult)); + +MongoRunner.stopMongod(mongodSource.port); + +print(baseName + " succeeded."); |