diff options
author | Amalia Hawkins <amalia.hawkins@10gen.com> | 2014-04-21 18:43:25 -0400 |
---|---|---|
committer | Amalia Hawkins <amalia.hawkins@10gen.com> | 2014-05-22 20:29:39 -0400 |
commit | 1b4b52a9d413e145478a303b63ab760894938c80 (patch) | |
tree | 3286cdd06d688d4345a80215f84b4674a398b753 /jstests/sslSpecial | |
parent | 7a85cae38fba537980d6c9fc573ef077fd2df74e (diff) | |
download | mongo-1b4b52a9d413e145478a303b63ab760894938c80.tar.gz |
SERVER-12621 narrow the localhost exception when auth is enabled
Diffstat (limited to 'jstests/sslSpecial')
-rw-r--r-- | jstests/sslSpecial/upgrade_to_x509_ssl_nossl.js | 21 |
1 files changed, 18 insertions, 3 deletions
diff --git a/jstests/sslSpecial/upgrade_to_x509_ssl_nossl.js b/jstests/sslSpecial/upgrade_to_x509_ssl_nossl.js index 481532c22de..ab70a6460f0 100644 --- a/jstests/sslSpecial/upgrade_to_x509_ssl_nossl.js +++ b/jstests/sslSpecial/upgrade_to_x509_ssl_nossl.js @@ -16,14 +16,22 @@ rst.initiate(); // Connect to master and do some basic operations var rstConn1 = rst.getMaster(); +rstConn1.getDB("admin").createUser({user: "root", pwd: "pwd", roles: ["root"]}); +rstConn1.getDB("admin").auth("root", "pwd"); rstConn1.getDB("test").a.insert({a:1, str:"TESTTESTTEST"}); assert.eq(1, rstConn1.getDB("test").a.count(), "Error interacting with replSet"); print("===== UPGRADE disabled,keyFile -> allowSSL,sendKeyfile ====="); +for (var n = 0; n < rst.nodes.length; n++) { + rst.nodes[n].getDB("admin").auth("root", "pwd"); +} rst.upgradeSet({sslMode:"allowSSL", sslPEMKeyFile: SERVER_CERT, sslAllowInvalidCertificates:"", clusterAuthMode:"sendKeyFile", keyFile: KEYFILE, - sslCAFile: CA_CERT}); + sslCAFile: CA_CERT}, "root", "pwd"); +for (var n = 0; n < rst.nodes.length; n++) { + rst.nodes[n].getDB("admin").auth("root", "pwd"); +} rst.awaitReplication(); var rstConn2 = rst.getMaster(); @@ -34,8 +42,12 @@ print("===== UPGRADE allowSSL,sendKeyfile -> preferSSL,sendX509 ====="); rst.upgradeSet({sslMode:"preferSSL", sslPEMKeyFile: SERVER_CERT, sslAllowInvalidCertificates:"", clusterAuthMode:"sendX509", keyFile: KEYFILE, - sslCAFile: CA_CERT}); + sslCAFile: CA_CERT}, "root", "pwd"); +for (var n = 0; n < rst.nodes.length; n++) { + rst.nodes[n].getDB("admin").auth("root", "pwd"); +} rst.awaitReplication(); + var rstConn3 = rst.getMaster(); rstConn3.getDB("test").a.insert({a:3, str:"PEASandCARROTS"}); assert.eq(3, rstConn3.getDB("test").a.count(), "Error interacting with replSet"); @@ -49,7 +61,10 @@ print("===== UPGRADE preferSSL,sendX509 -> preferSSL,x509 ====="); rst.upgradeSet({sslMode:"preferSSL", sslPEMKeyFile: SERVER_CERT, sslAllowInvalidCertificates:"", clusterAuthMode:"x509", keyFile: KEYFILE, - sslCAFile: CA_CERT}); + sslCAFile: CA_CERT}, "root", "pwd"); +for (var n = 0; n < rst.nodes.length; n++) { + rst.nodes[n].getDB("admin").auth("root", "pwd"); +} rst.awaitReplication(); var rstConn4 = rst.getMaster(); rstConn4.getDB("test").a.insert({a:4, str:"BEEP BOOP"}); |