1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
|
// Check that if a hello command for intracluster auth contains both the saslSupportedMechs field
// for the __system user and a speculativeAuthenticate field for X509, we do not see a log marking
// the changing of the username from __system to that specified in the x509 certificate.
(function() {
'use strict';
load("jstests/libs/log.js"); // For findMatchingLogLine.
var x509_options = {
sslMode: "requireSSL",
sslPEMKeyFile: "jstests/libs/server.pem",
sslCAFile: "jstests/libs/ca.pem",
sslClusterFile: "jstests/libs/cluster_cert.pem",
sslAllowInvalidHostnames: "",
clusterAuthMode: "x509"
};
const mongo = MongoRunner.runMongod(Object.merge(x509_options, {auth: ""}));
const CLIENT_USER = "CN=client,OU=KernelUser,O=MongoDB,L=New York City,ST=New York,C=US";
const ext = mongo.getDB("$external");
ext.createUser({user: CLIENT_USER, roles: []});
assert.commandWorked(ext.runCommand({
hello: 1,
saslSupportedMechs: "local.__system",
speculativeAuthenticate: {authenticate: "1", mechanism: "MONGODB-X509", db: "$external"}
}));
const profileLevelDB = mongo.getDB("x509_basic");
const globalLog = assert.commandWorked(profileLevelDB.adminCommand({getLog: 'global'}));
const fieldMatcher = {
msg: "Different user name was supplied to saslSupportedMechs"
};
assert.eq(
null,
findMatchingLogLine(globalLog.log, fieldMatcher),
"Found log line concerning \"Different user name was supplied to saslSupportedMechs\" when we did not expect to.");
MongoRunner.stopMongod(mongo);
})();
|