blob: f4dcb4d4d47931cb2063c100ec42c6c6122f56a3 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
|
var baseName = "jstests_ssl_ssl_options";
jsTest.log("Testing censorship of ssl options");
var mongodConfig = { sslPEMKeyFile : "jstests/libs/password_protected.pem",
sslMode : "requireSSL",
sslPEMKeyPassword : "qwerty",
sslClusterPassword : "qwerty" };
var mongodSource = MongoRunner.runMongod(mongodConfig);
var getCmdLineOptsResult = mongodSource.adminCommand("getCmdLineOpts");
var i;
var isPassword = false;
for (i = 0; i < getCmdLineOptsResult.argv.length; i++) {
if (isPassword) {
assert.eq(getCmdLineOptsResult.argv[i], "<password>",
"Password not properly censored: " + tojson(getCmdLineOptsResult));
isPassword = false;
continue;
}
if (getCmdLineOptsResult.argv[i] === "--sslPEMKeyPassword" ||
getCmdLineOptsResult.argv[i] === "--sslClusterPassword") {
isPassword = true;
}
}
assert.eq(getCmdLineOptsResult.parsed.net.ssl.PEMKeyPassword, "<password>",
"Password not properly censored: " + tojson(getCmdLineOptsResult));
assert.eq(getCmdLineOptsResult.parsed.net.ssl.clusterPassword, "<password>",
"Password not properly censored: " + tojson(getCmdLineOptsResult));
MongoRunner.stopMongod(mongodSource.port);
print(baseName + " succeeded.");
|