summaryrefslogtreecommitdiff
path: root/jstests/sslSpecial
diff options
context:
space:
mode:
authorAmalia Hawkins <amalia.hawkins@10gen.com>2014-04-21 18:43:25 -0400
committerAmalia Hawkins <amalia.hawkins@10gen.com>2014-05-22 20:29:39 -0400
commit1b4b52a9d413e145478a303b63ab760894938c80 (patch)
tree3286cdd06d688d4345a80215f84b4674a398b753 /jstests/sslSpecial
parent7a85cae38fba537980d6c9fc573ef077fd2df74e (diff)
downloadmongo-1b4b52a9d413e145478a303b63ab760894938c80.tar.gz
SERVER-12621 narrow the localhost exception when auth is enabled
Diffstat (limited to 'jstests/sslSpecial')
-rw-r--r--jstests/sslSpecial/upgrade_to_x509_ssl_nossl.js21
1 files changed, 18 insertions, 3 deletions
diff --git a/jstests/sslSpecial/upgrade_to_x509_ssl_nossl.js b/jstests/sslSpecial/upgrade_to_x509_ssl_nossl.js
index 481532c22de..ab70a6460f0 100644
--- a/jstests/sslSpecial/upgrade_to_x509_ssl_nossl.js
+++ b/jstests/sslSpecial/upgrade_to_x509_ssl_nossl.js
@@ -16,14 +16,22 @@ rst.initiate();
// Connect to master and do some basic operations
var rstConn1 = rst.getMaster();
+rstConn1.getDB("admin").createUser({user: "root", pwd: "pwd", roles: ["root"]});
+rstConn1.getDB("admin").auth("root", "pwd");
rstConn1.getDB("test").a.insert({a:1, str:"TESTTESTTEST"});
assert.eq(1, rstConn1.getDB("test").a.count(), "Error interacting with replSet");
print("===== UPGRADE disabled,keyFile -> allowSSL,sendKeyfile =====");
+for (var n = 0; n < rst.nodes.length; n++) {
+ rst.nodes[n].getDB("admin").auth("root", "pwd");
+}
rst.upgradeSet({sslMode:"allowSSL", sslPEMKeyFile: SERVER_CERT,
sslAllowInvalidCertificates:"",
clusterAuthMode:"sendKeyFile", keyFile: KEYFILE,
- sslCAFile: CA_CERT});
+ sslCAFile: CA_CERT}, "root", "pwd");
+for (var n = 0; n < rst.nodes.length; n++) {
+ rst.nodes[n].getDB("admin").auth("root", "pwd");
+}
rst.awaitReplication();
var rstConn2 = rst.getMaster();
@@ -34,8 +42,12 @@ print("===== UPGRADE allowSSL,sendKeyfile -> preferSSL,sendX509 =====");
rst.upgradeSet({sslMode:"preferSSL", sslPEMKeyFile: SERVER_CERT,
sslAllowInvalidCertificates:"",
clusterAuthMode:"sendX509", keyFile: KEYFILE,
- sslCAFile: CA_CERT});
+ sslCAFile: CA_CERT}, "root", "pwd");
+for (var n = 0; n < rst.nodes.length; n++) {
+ rst.nodes[n].getDB("admin").auth("root", "pwd");
+}
rst.awaitReplication();
+
var rstConn3 = rst.getMaster();
rstConn3.getDB("test").a.insert({a:3, str:"PEASandCARROTS"});
assert.eq(3, rstConn3.getDB("test").a.count(), "Error interacting with replSet");
@@ -49,7 +61,10 @@ print("===== UPGRADE preferSSL,sendX509 -> preferSSL,x509 =====");
rst.upgradeSet({sslMode:"preferSSL", sslPEMKeyFile: SERVER_CERT,
sslAllowInvalidCertificates:"",
clusterAuthMode:"x509", keyFile: KEYFILE,
- sslCAFile: CA_CERT});
+ sslCAFile: CA_CERT}, "root", "pwd");
+for (var n = 0; n < rst.nodes.length; n++) {
+ rst.nodes[n].getDB("admin").auth("root", "pwd");
+}
rst.awaitReplication();
var rstConn4 = rst.getMaster();
rstConn4.getDB("test").a.insert({a:4, str:"BEEP BOOP"});