0
0
mirror of https://github.com/mongodb/mongo.git synced 2024-11-27 15:06:34 +01:00
mongodb/jstests/ssl/ssl_hostname_validation.js
Matt Broadstone 771dabd098 SERVER-81339 Convert ReplSetTest and ShardingTest to modules (#26332)
GitOrigin-RevId: 744aa110a53786b23c62ff53f87a1418b5991e8d
2024-08-20 22:00:49 +00:00

143 lines
5.0 KiB
JavaScript

// Test SSL server certificate hostname validation
// for client-server and server-server connections
import {ReplSetTest} from "jstests/libs/replsettest.js";
var CA_CERT = "jstests/libs/ca.pem";
var SERVER_CERT = "jstests/libs/server.pem";
var CN_CERT = "jstests/libs/localhostnameCN.pem";
var SAN_CERT = "jstests/libs/localhostnameSAN.pem";
var CLIENT_CERT = "jstests/libs/client.pem";
var BAD_SAN_CERT = "jstests/libs/badSAN.pem";
var NOSUBJ_CERT = "jstests/libs/server_no_subject.pem";
var NOSUBJ_NOSAN_CERT = "jstests/libs/server_no_subject_no_SAN.pem";
function testCombination(certPath, allowInvalidHost, allowInvalidCert, shouldSucceed) {
jsTestLog("Testing certificate: " + JSON.stringify(arguments));
var mongod = MongoRunner.runMongod(
{tlsMode: "requireTLS", tlsCertificateKeyFile: certPath, tlsCAFile: CA_CERT});
var mongo;
if (allowInvalidCert) {
mongo = runMongoProgram("mongo",
"--port",
mongod.port,
"--tls",
"--tlsCAFile",
CA_CERT,
"--tlsCertificateKeyFile",
CLIENT_CERT,
"--tlsAllowInvalidCertificates",
"--eval",
";");
} else if (allowInvalidHost) {
mongo = runMongoProgram("mongo",
"--port",
mongod.port,
"--tls",
"--tlsCAFile",
CA_CERT,
"--tlsCertificateKeyFile",
CLIENT_CERT,
"--tlsAllowInvalidHostnames",
"--eval",
";");
} else {
mongo = runMongoProgram("mongo",
"--port",
mongod.port,
"--tls",
"--tlsCAFile",
CA_CERT,
"--tlsCertificateKeyFile",
CLIENT_CERT,
"--eval",
";");
}
if (shouldSucceed) {
// runMongoProgram returns 0 on success
assert.eq(
0, mongo, "Connection attempt failed when it should succeed certPath: " + certPath);
} else {
// runMongoProgram returns 1 on failure
assert.eq(
1, mongo, "Connection attempt succeeded when it should fail certPath: " + certPath);
}
MongoRunner.stopMongod(mongod);
}
// 1. Test client connections with different server certificates
// and allowInvalidCertificates
testCombination(CN_CERT, false, false, true);
testCombination(SAN_CERT, false, false, true);
// SERVER_CERT has SAN=localhost
testCombination(SERVER_CERT, false, false, true);
testCombination(SERVER_CERT, false, true, true);
testCombination(SERVER_CERT, true, false, true);
testCombination(SERVER_CERT, true, true, true);
// BAD_SAN_CERT has SAN=BadSAN.
testCombination(BAD_SAN_CERT, false, false, false);
// NOSUBJ_CERT has SAN=localhost but empty Subject
testCombination(NOSUBJ_CERT, false, false, true);
// NOSUBJ_NOSAN_CERT has neither Subject nor SANs
testCombination(NOSUBJ_NOSAN_CERT, false, false, false);
// Skip db hash check because replset cannot initiate.
TestData.skipCheckDBHashes = true;
// 2. Initiate ReplSetTest with invalid certs
let ssl_options = {
tlsMode: "requireTLS",
// SERVER_CERT has SAN=localhost. CLIENT_CERT is exact same except no SANS
tlsCertificateKeyFile: CLIENT_CERT,
tlsCAFile: CA_CERT
};
replTest = new ReplSetTest({nodes: {node0: ssl_options, node1: ssl_options}});
// We don't want to invoke the hang analyzer because we
// expect this test to fail by timing out
MongoRunner.runHangAnalyzer.disable();
replTest.startSet();
assert.throws(function() {
replTest.initiate();
});
replTest.stopSet();
// Re-enable the hang analyzer for the test
MongoRunner.runHangAnalyzer.enable();
TestData.skipCheckDBHashes = false;
// 3. Initiate ReplSetTest with invalid certs but set allowInvalidHostnames
ssl_options = {
tlsMode: "requireTLS",
tlsCertificateKeyFile: SERVER_CERT,
tlsCAFile: CA_CERT,
tlsAllowInvalidHostnames: ""
};
var replTest = new ReplSetTest({nodes: {node0: ssl_options, node1: ssl_options}});
replTest.startSet();
replTest.initiate();
replTest.stopSet();
// 4. Initiate ReplSetTest with invalid certs but set allowInvalidCertificates
ssl_options = {
tlsMode: "requireTLS",
// SERVER_CERT has SAN=localhost. CLIENT_CERT is exact same except no SANS
tlsCertificateKeyFile: SERVER_CERT,
tlsCAFile: CA_CERT,
tlsAllowInvalidCertificates: ""
};
replTest = new ReplSetTest({nodes: {node0: ssl_options, node1: ssl_options}});
replTest.startSet();
replTest.initiate();
replTest.stopSet();