summaryrefslogtreecommitdiff
path: root/jstests/replsets/auth2.js
diff options
context:
space:
mode:
Diffstat (limited to 'jstests/replsets/auth2.js')
-rw-r--r--jstests/replsets/auth2.js128
1 files changed, 64 insertions, 64 deletions
diff --git a/jstests/replsets/auth2.js b/jstests/replsets/auth2.js
index 92d1c10e23a..b2eed7b4f1a 100644
--- a/jstests/replsets/auth2.js
+++ b/jstests/replsets/auth2.js
@@ -9,75 +9,75 @@
TestData.skipGossipingClusterTime = true;
(function() {
- var testInvalidAuthStates = function(replSetTest) {
- print("check that 0 is in recovering");
- replSetTest.waitForState(replSetTest.nodes[0], ReplSetTest.State.RECOVERING);
+var testInvalidAuthStates = function(replSetTest) {
+ print("check that 0 is in recovering");
+ replSetTest.waitForState(replSetTest.nodes[0], ReplSetTest.State.RECOVERING);
- print("shut down 1, 0 still in recovering.");
- replSetTest.stop(1);
- sleep(5);
-
- replSetTest.waitForState(replSetTest.nodes[0], ReplSetTest.State.RECOVERING);
-
- print("shut down 2, 0 becomes a secondary.");
- replSetTest.stop(2);
-
- replSetTest.waitForState(replSetTest.nodes[0], ReplSetTest.State.SECONDARY);
-
- replSetTest.restart(1, {"keyFile": key1});
- replSetTest.restart(2, {"keyFile": key1});
- };
-
- var name = "rs_auth2";
- var path = "jstests/libs/";
-
- // These keyFiles have their permissions set to 600 later in the test.
- var key1 = path + "key1";
- var key2 = path + "key2";
+ print("shut down 1, 0 still in recovering.");
+ replSetTest.stop(1);
+ sleep(5);
- var replSetTest = new ReplSetTest({name: name, nodes: 3, waitForKeys: true});
- var nodes = replSetTest.startSet();
- var hostnames = replSetTest.nodeList();
- replSetTest.initiate({
- "_id": name,
- "members": [
- {"_id": 0, "host": hostnames[0], "priority": 2},
- {"_id": 1, "host": hostnames[1], priority: 0},
- {"_id": 2, "host": hostnames[2], priority: 0}
- ]
- });
+ replSetTest.waitForState(replSetTest.nodes[0], ReplSetTest.State.RECOVERING);
- var master = replSetTest.getPrimary();
+ print("shut down 2, 0 becomes a secondary.");
+ replSetTest.stop(2);
- print("add an admin user");
- master.getDB("admin").createUser({user: "foo", pwd: "bar", roles: jsTest.adminUserRoles},
- {w: 3, wtimeout: replSetTest.kDefaultTimeoutMS});
- var m = replSetTest.nodes[0];
+ replSetTest.waitForState(replSetTest.nodes[0], ReplSetTest.State.SECONDARY);
- print("starting 1 and 2 with key file");
- replSetTest.stop(1);
replSetTest.restart(1, {"keyFile": key1});
- replSetTest.stop(2);
replSetTest.restart(2, {"keyFile": key1});
-
- // auth to all nodes with auth
- replSetTest.nodes[1].getDB("admin").auth("foo", "bar");
- replSetTest.nodes[2].getDB("admin").auth("foo", "bar");
- testInvalidAuthStates(replSetTest);
-
- print("restart mongod with bad keyFile");
-
- replSetTest.stop(0);
- m = replSetTest.restart(0, {"keyFile": key2});
-
- // auth to all nodes
- replSetTest.nodes[0].getDB("admin").auth("foo", "bar");
- replSetTest.nodes[1].getDB("admin").auth("foo", "bar");
- replSetTest.nodes[2].getDB("admin").auth("foo", "bar");
- testInvalidAuthStates(replSetTest);
-
- replSetTest.stop(0);
- m = replSetTest.restart(0, {"keyFile": key1});
-
- replSetTest.stopSet();
+};
+
+var name = "rs_auth2";
+var path = "jstests/libs/";
+
+// These keyFiles have their permissions set to 600 later in the test.
+var key1 = path + "key1";
+var key2 = path + "key2";
+
+var replSetTest = new ReplSetTest({name: name, nodes: 3, waitForKeys: true});
+var nodes = replSetTest.startSet();
+var hostnames = replSetTest.nodeList();
+replSetTest.initiate({
+ "_id": name,
+ "members": [
+ {"_id": 0, "host": hostnames[0], "priority": 2},
+ {"_id": 1, "host": hostnames[1], priority: 0},
+ {"_id": 2, "host": hostnames[2], priority: 0}
+ ]
+});
+
+var master = replSetTest.getPrimary();
+
+print("add an admin user");
+master.getDB("admin").createUser({user: "foo", pwd: "bar", roles: jsTest.adminUserRoles},
+ {w: 3, wtimeout: replSetTest.kDefaultTimeoutMS});
+var m = replSetTest.nodes[0];
+
+print("starting 1 and 2 with key file");
+replSetTest.stop(1);
+replSetTest.restart(1, {"keyFile": key1});
+replSetTest.stop(2);
+replSetTest.restart(2, {"keyFile": key1});
+
+// auth to all nodes with auth
+replSetTest.nodes[1].getDB("admin").auth("foo", "bar");
+replSetTest.nodes[2].getDB("admin").auth("foo", "bar");
+testInvalidAuthStates(replSetTest);
+
+print("restart mongod with bad keyFile");
+
+replSetTest.stop(0);
+m = replSetTest.restart(0, {"keyFile": key2});
+
+// auth to all nodes
+replSetTest.nodes[0].getDB("admin").auth("foo", "bar");
+replSetTest.nodes[1].getDB("admin").auth("foo", "bar");
+replSetTest.nodes[2].getDB("admin").auth("foo", "bar");
+testInvalidAuthStates(replSetTest);
+
+replSetTest.stop(0);
+m = replSetTest.restart(0, {"keyFile": key1});
+
+replSetTest.stopSet();
}());