mirror of https://github.com/mongodb/mongo
51 lines
1.9 KiB
JavaScript
51 lines
1.9 KiB
JavaScript
/**
|
|
* This test checks the upgrade path for mixed mode ssl
|
|
* from allowSSL up to requireSSL
|
|
*
|
|
* NOTE: This test is similar to upgrade_to_ssl_nossl.js in the
|
|
* sslSpecial test suite. This test uses ssl communication
|
|
* and therefore cannot test modes that do not allow ssl.
|
|
*/
|
|
|
|
load("jstests/ssl/libs/ssl_helpers.js");
|
|
|
|
// "sslAllowInvalidCertificates" is enabled to avoid hostname conflicts with our testing certs
|
|
var opts = {
|
|
sslMode: "allowSSL",
|
|
sslPEMKeyFile: SERVER_CERT,
|
|
sslAllowInvalidCertificates: "",
|
|
sslAllowConnectionsWithoutCertificates: "",
|
|
sslCAFile: "jstests/libs/ca.pem"
|
|
};
|
|
var rst = new ReplSetTest({name: 'sslSet', nodes: 3, nodeOptions: opts});
|
|
rst.startSet();
|
|
rst.initiate();
|
|
|
|
var rstConn1 = rst.getPrimary();
|
|
rstConn1.getDB("test").a.insert({a: 1, str: "TESTTESTTEST"});
|
|
assert.eq(1, rstConn1.getDB("test").a.count(), "Error interacting with replSet");
|
|
|
|
print("===== UPGRADE allowSSL -> preferSSL =====");
|
|
opts.sslMode = "preferSSL";
|
|
rst.upgradeSet(opts);
|
|
var rstConn2 = rst.getPrimary();
|
|
rstConn2.getDB("test").a.insert({a: 2, str: "CHECKCHECK"});
|
|
assert.eq(2, rstConn2.getDB("test").a.count(), "Error interacting with replSet");
|
|
|
|
// Check that non-ssl connections can still be made
|
|
var canConnectNoSSL = runMongoProgram("mongo", "--port", rst.ports[0], "--eval", ";");
|
|
assert.eq(0, canConnectNoSSL, "non-SSL Connection attempt failed when it should succeed");
|
|
|
|
print("===== UPGRADE preferSSL -> requireSSL =====");
|
|
opts.sslMode = "requireSSL";
|
|
rst.upgradeSet(opts);
|
|
var rstConn3 = rst.getPrimary();
|
|
rstConn3.getDB("test").a.insert({a: 3, str: "GREENEGGSANDHAM"});
|
|
assert.eq(3, rstConn3.getDB("test").a.count(), "Error interacting with replSet");
|
|
|
|
// Check that ssl connections can be made
|
|
var canConnectSSL = runMongoProgram(
|
|
"mongo", "--port", rst.ports[0], "--ssl", "--sslAllowInvalidCertificates", "--eval", ";");
|
|
assert.eq(0, canConnectSSL, "SSL Connection attempt failed when it should succeed");
|
|
rst.stopSet();
|