summaryrefslogtreecommitdiff
path: root/jstests/ssl/ssl_options.js
blob: 571f854851bb3580b4e911ea2c1a631e7cf411c5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
var baseName = "jstests_ssl_ssl_options";

jsTest.log("Testing censorship of ssl options");

var mongodConfig = {
    sslPEMKeyFile: "jstests/libs/password_protected.pem",
    sslMode: "requireSSL",
    sslPEMKeyPassword: "qwerty",
    sslClusterPassword: "qwerty",
    sslCAFile: "jstests/libs/ca.pem"
};
var mongodSource = MongoRunner.runMongod(mongodConfig);

var getCmdLineOptsResult = mongodSource.adminCommand("getCmdLineOpts");

var i;
var isPassword = false;
for (i = 0; i < getCmdLineOptsResult.argv.length; i++) {
    if (isPassword) {
        assert.eq(getCmdLineOptsResult.argv[i],
                  "<password>",
                  "Password not properly censored: " + tojson(getCmdLineOptsResult));
        isPassword = false;
        continue;
    }

    if (getCmdLineOptsResult.argv[i] === "--sslPEMKeyPassword" ||
        getCmdLineOptsResult.argv[i] === "--sslClusterPassword") {
        isPassword = true;
    }
}
assert.eq(getCmdLineOptsResult.parsed.net.ssl.PEMKeyPassword,
          "<password>",
          "Password not properly censored: " + tojson(getCmdLineOptsResult));
assert.eq(getCmdLineOptsResult.parsed.net.ssl.clusterPassword,
          "<password>",
          "Password not properly censored: " + tojson(getCmdLineOptsResult));

MongoRunner.stopMongod(mongodSource.port);

print(baseName + " succeeded.");