diff options
Diffstat (limited to 'jstests/ssl/ssl_fips.js')
-rw-r--r-- | jstests/ssl/ssl_fips.js | 26 |
1 files changed, 15 insertions, 11 deletions
diff --git a/jstests/ssl/ssl_fips.js b/jstests/ssl/ssl_fips.js index 2630377fe36..9b3e4b94c96 100644 --- a/jstests/ssl/ssl_fips.js +++ b/jstests/ssl/ssl_fips.js @@ -1,27 +1,31 @@ // Test mongod start with FIPS mode enabled var port = allocatePort(); -var md = MongoRunner.runMongod({port: port, - sslMode: "requireSSL", - sslPEMKeyFile: "jstests/libs/server.pem", - sslCAFile: "jstests/libs/ca.pem", - sslFIPSMode: ""}); +var md = MongoRunner.runMongod({ + port: port, + sslMode: "requireSSL", + sslPEMKeyFile: "jstests/libs/server.pem", + sslCAFile: "jstests/libs/ca.pem", + sslFIPSMode: "" +}); var mongo = runMongoProgram("mongo", - "--port", port, + "--port", + port, "--ssl", "--sslAllowInvalidCertificates", - "--sslPEMKeyFile", "jstests/libs/client.pem", + "--sslPEMKeyFile", + "jstests/libs/client.pem", "--sslFIPSMode", - "--eval", ";"); + "--eval", + ";"); // if mongo shell didn't start/connect properly if (mongo != 0) { print("mongod failed to start, checking for FIPS support"); mongoOutput = rawMongoProgramOutput(); assert(mongoOutput.match(/this version of mongodb was not compiled with FIPS support/) || - mongoOutput.match(/FIPS_mode_set:fips mode not supported/)); -} -else { + mongoOutput.match(/FIPS_mode_set:fips mode not supported/)); +} else { // verify that auth works, SERVER-18051 md.getDB("admin").createUser({user: "root", pwd: "root", roles: ["root"]}); assert(md.getDB("admin").auth("root", "root"), "auth failed"); |