summaryrefslogtreecommitdiff
path: root/jstests/ssl_x509/x509_basic.js
blob: 74f43829d1a0da3840606ac7bfbed5b1a693ef2e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
// Check that if a hello command for intracluster auth contains both the saslSupportedMechs field
// for the __system user and a speculativeAuthenticate field for X509, we do not see a log marking
// the changing of the username from __system to that specified in the x509 certificate.
(function() {
'use strict';

load("jstests/libs/log.js");  // For findMatchingLogLine.

var x509_options = {
    sslMode: "requireSSL",
    sslPEMKeyFile: "jstests/libs/server.pem",
    sslCAFile: "jstests/libs/ca.pem",
    sslClusterFile: "jstests/libs/cluster_cert.pem",
    sslAllowInvalidHostnames: "",
    clusterAuthMode: "x509"
};

const mongo = MongoRunner.runMongod(Object.merge(x509_options, {auth: ""}));

const CLIENT_USER = "CN=client,OU=KernelUser,O=MongoDB,L=New York City,ST=New York,C=US";
const ext = mongo.getDB("$external");
ext.createUser({user: CLIENT_USER, roles: []});

assert.commandWorked(ext.runCommand({
    hello: 1,
    saslSupportedMechs: "local.__system",
    speculativeAuthenticate: {authenticate: "1", mechanism: "MONGODB-X509", db: "$external"}
}));

const profileLevelDB = mongo.getDB("x509_basic");
const globalLog = assert.commandWorked(profileLevelDB.adminCommand({getLog: 'global'}));
const fieldMatcher = {
    msg: "Different user name was supplied to saslSupportedMechs"
};
assert.eq(
    null,
    findMatchingLogLine(globalLog.log, fieldMatcher),
    "Found log line concerning \"Different user name was supplied to saslSupportedMechs\" when we did not expect to.");
MongoRunner.stopMongod(mongo);
})();