blob: 571f854851bb3580b4e911ea2c1a631e7cf411c5 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
|
var baseName = "jstests_ssl_ssl_options";
jsTest.log("Testing censorship of ssl options");
var mongodConfig = {
sslPEMKeyFile: "jstests/libs/password_protected.pem",
sslMode: "requireSSL",
sslPEMKeyPassword: "qwerty",
sslClusterPassword: "qwerty",
sslCAFile: "jstests/libs/ca.pem"
};
var mongodSource = MongoRunner.runMongod(mongodConfig);
var getCmdLineOptsResult = mongodSource.adminCommand("getCmdLineOpts");
var i;
var isPassword = false;
for (i = 0; i < getCmdLineOptsResult.argv.length; i++) {
if (isPassword) {
assert.eq(getCmdLineOptsResult.argv[i],
"<password>",
"Password not properly censored: " + tojson(getCmdLineOptsResult));
isPassword = false;
continue;
}
if (getCmdLineOptsResult.argv[i] === "--sslPEMKeyPassword" ||
getCmdLineOptsResult.argv[i] === "--sslClusterPassword") {
isPassword = true;
}
}
assert.eq(getCmdLineOptsResult.parsed.net.ssl.PEMKeyPassword,
"<password>",
"Password not properly censored: " + tojson(getCmdLineOptsResult));
assert.eq(getCmdLineOptsResult.parsed.net.ssl.clusterPassword,
"<password>",
"Password not properly censored: " + tojson(getCmdLineOptsResult));
MongoRunner.stopMongod(mongodSource.port);
print(baseName + " succeeded.");
|