File tree Expand file tree Collapse file tree 3 files changed +9
-9
lines changed Expand file tree Collapse file tree 3 files changed +9
-9
lines changed Original file line number Diff line number Diff line change 396396note " running server tests" ;
397397
398398$common_connstr =
399- " sslrootcert=ssl/root+server_ca.crt sslmode=require dbname=certdb hostaddr=$SERVERHOSTADDR " ;
399+ " sslrootcert=ssl/root+server_ca.crt sslmode=require dbname=certdb hostaddr=$SERVERHOSTADDR host=localhost " ;
400400
401401# no client cert
402402$node -> connect_fails(
573573# works, iff username matches Common Name
574574# fails, iff username doesn't match Common Name.
575575$common_connstr =
576- " sslrootcert=ssl/root+server_ca.crt sslmode=require dbname=verifydb hostaddr=$SERVERHOSTADDR " ;
576+ " sslrootcert=ssl/root+server_ca.crt sslmode=require dbname=verifydb hostaddr=$SERVERHOSTADDR host=localhost " ;
577577
578578$node -> connect_ok(
579579 " $common_connstr user=ssltestuser sslcert=ssl/client.crt sslkey=$key {'client.key'}" ,
600600# intermediate client_ca.crt is provided by client, and isn't in server's ssl_ca_file
601601switch_server_cert($node , ' server-cn-only' , ' root_ca' );
602602$common_connstr =
603- " user=ssltestuser dbname=certdb sslkey=$key {'client.key'} sslrootcert=ssl/root+server_ca.crt hostaddr=$SERVERHOSTADDR " ;
603+ " user=ssltestuser dbname=certdb sslkey=$key {'client.key'} sslrootcert=ssl/root+server_ca.crt hostaddr=$SERVERHOSTADDR host=localhost " ;
604604
605605$node -> connect_ok(
606606 " $common_connstr sslmode=require sslcert=ssl/client+client_ca.crt" ,
Original file line number Diff line number Diff line change 5353switch_server_cert($node , ' server-cn-only' );
5454$ENV {PGPASSWORD } = " pass" ;
5555$common_connstr =
56- " dbname=trustdb sslmode=require sslcert=invalid sslrootcert=invalid hostaddr=$SERVERHOSTADDR " ;
56+ " dbname=trustdb sslmode=require sslcert=invalid sslrootcert=invalid hostaddr=$SERVERHOSTADDR host=localhost " ;
5757
5858# Default settings
5959$node -> connect_ok(
104104 or die " failed to change permissions on $cert_tempdir /client_scram.key: $! " ;
105105$client_tmp_key =~ s !\\ ! /! g if $PostgreSQL::Test::Utils::windows_os ;
106106$node -> connect_fails(
107- " sslcert=ssl/client.crt sslkey=$client_tmp_key sslrootcert=invalid hostaddr=$SERVERHOSTADDR dbname=certdb user=ssltestuser channel_binding=require" ,
107+ " sslcert=ssl/client.crt sslkey=$client_tmp_key sslrootcert=invalid hostaddr=$SERVERHOSTADDR host=localhost dbname=certdb user=ssltestuser channel_binding=require" ,
108108 " Cert authentication and channel_binding=require" ,
109109 expected_stderr =>
110110 qr / channel binding required, but server authenticated client without channel binding/
111111);
112112
113113# Certificate verification at the connection level should still work fine.
114114$node -> connect_ok(
115- " sslcert=ssl/client.crt sslkey=$client_tmp_key sslrootcert=invalid hostaddr=$SERVERHOSTADDR dbname=verifydb user=ssltestuser" ,
115+ " sslcert=ssl/client.crt sslkey=$client_tmp_key sslrootcert=invalid hostaddr=$SERVERHOSTADDR host=localhost dbname=verifydb user=ssltestuser" ,
116116 " SCRAM with clientcert=verify-full" ,
117117 log_like => [
118118 qr / connection authenticated: identity="ssltestuser" method=scram-sha-256/
Original file line number Diff line number Diff line change 6767switch_server_cert($node , ' server-revoked' );
6868
6969$common_connstr =
70- " sslrootcert=ssl/root+server_ca.crt sslmode=require dbname=certdb hostaddr=$SERVERHOSTADDR " .
70+ " sslrootcert=ssl/root+server_ca.crt sslmode=require dbname=certdb hostaddr=$SERVERHOSTADDR host=localhost " .
7171 " user=ssltestuser sslcert=ssl/client_ext.crt sslkey=$client_tmp_key " ;
7272
7373# Make sure we can connect even though previous test suites have established this
9898
9999$result = $node -> safe_psql(" trustdb" , " SELECT ssl_client_cert_present();" ,
100100 connstr => " sslrootcert=ssl/root+server_ca.crt sslmode=require " .
101- " dbname=trustdb hostaddr=$SERVERHOSTADDR user=ssltestuser" );
101+ " dbname=trustdb hostaddr=$SERVERHOSTADDR user=ssltestuser host=localhost " );
102102is($result , ' f' , " ssl_client_cert_present() for connection without cert" );
103103
104104$result = $node -> safe_psql(" certdb" ,
113113
114114$result = $node -> safe_psql(" trustdb" , " SELECT ssl_client_dn_field('commonName');" ,
115115 connstr => " sslrootcert=ssl/root+server_ca.crt sslmode=require " .
116- " dbname=trustdb hostaddr=$SERVERHOSTADDR user=ssltestuser" );
116+ " dbname=trustdb hostaddr=$SERVERHOSTADDR user=ssltestuser host=localhost " );
117117is($result , ' ' , " ssl_client_dn_field() for connection without cert" );
118118
119119$result = $node -> safe_psql(" certdb" ,
You can’t perform that action at this time.
0 commit comments