mongo/jstests/ssl/ssl_intermediate_ca.js

96 lines
2.9 KiB
JavaScript

// Test that including intermediate certificates
// in the certificate key file will be sent to the remote.
import {determineSSLProvider} from "jstests/ssl/libs/ssl_helpers.js";
// server-intermediate-ca was signed by ca.pem, not trusted-ca.pem
const VALID_CA = "jstests/libs/ca.pem";
const INVALID_CA = "jstests/libs/trusted-ca.pem";
function runTest(inbound, outbound) {
const mongod = MongoRunner.runMongod({
tlsMode: "requireTLS",
tlsAllowConnectionsWithoutCertificates: "",
tlsCertificateKeyFile: "jstests/libs/server-intermediate-ca.pem",
tlsCAFile: outbound,
tlsClusterCAFile: inbound,
});
assert(mongod);
assert.commandWorked(mongod.getDB("admin").runCommand("serverStatus"));
assert.eq(mongod.getDB("admin").system.users.find({}).toArray(), []);
MongoRunner.stopMongod(mongod);
}
// Normal mode, we have a valid CA being presented for outbound and inbound.
runTest(VALID_CA, VALID_CA);
// Alternate CA mode, only the inbound CA is valid.
runTest(VALID_CA, INVALID_CA);
// Validate we can make a connection from the shell with the intermediate certs
{
const mongod = MongoRunner.runMongod({
tlsMode: "requireTLS",
tlsAllowConnectionsWithoutCertificates: "",
tlsCertificateKeyFile: "jstests/libs/server.pem",
tlsCAFile: VALID_CA,
});
assert(mongod);
assert.eq(mongod.getDB("admin").system.users.find({}).toArray(), []);
const smoke = runMongoProgram(
"mongo",
"--host",
"localhost",
"--port",
mongod.port,
"--tls",
"--tlsCAFile",
VALID_CA,
"--tlsCertificateKeyFile",
"jstests/libs/server-intermediate-ca.pem",
"--eval",
"1;",
);
assert.eq(smoke, 0, "Could not connect with intermediate certificate");
MongoRunner.stopMongod(mongod);
}
// Validate we can make a chain with intermediate certs in ca file instead of key file
if (determineSSLProvider() === "apple") {
print("Skipping test as this configuration is not supported on OSX");
quit();
}
// Validate the server can build a certificate chain when the chain is split across the CA and PEM
// files.
{
const mongod = MongoRunner.runMongod({
tlsMode: "requireTLS",
tlsAllowConnectionsWithoutCertificates: "",
tlsCertificateKeyFile: "jstests/libs/server-intermediate-leaf.pem",
tlsCAFile: "jstests/libs/intermediate-ca-chain.pem",
});
assert(mongod);
assert.eq(mongod.getDB("admin").system.users.find({}).toArray(), []);
const smoke = runMongoProgram(
"mongo",
"--host",
"localhost",
"--port",
mongod.port,
"--tls",
"--tlsCAFile",
VALID_CA,
"--tlsCertificateKeyFile",
"jstests/libs/client.pem",
"--eval",
"1;",
);
assert.eq(smoke, 0, "Could not connect with intermediate certificate");
MongoRunner.stopMongod(mongod);
}