Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
P
Postgres FD Implementation
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Abuhujair Javed
Postgres FD Implementation
Commits
958c7ae0
Commit
958c7ae0
authored
7 years ago
by
Peter Eisentraut
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Fix typo and improve punctuation
parent
77216cae
REL_14_STABLE
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
5 additions
and
5 deletions
+5
-5
src/test/ssl/t/001_ssltests.pl
src/test/ssl/t/001_ssltests.pl
+5
-5
No files found.
src/test/ssl/t/001_ssltests.pl
View file @
958c7ae0
...
...
@@ -46,20 +46,20 @@ note "running client tests";
$common_connstr
=
"
user=ssltestuser dbname=trustdb sslcert=invalid hostaddr=
$SERVERHOSTADDR
host=common-name.pg-ssltest.test
";
# The server should not accept non-SSL connections
# The server should not accept non-SSL connections
.
note
"
test that the server doesn't accept non-SSL connections
";
test_connect_fails
(
$common_connstr
,
"
sslmode=disable
");
# Try without a root cert. In sslmode=require, this should work. In verify-ca
# or verify-full mode it should fail
# or verify-full mode it should fail
.
note
"
connect without server root cert
";
test_connect_ok
(
$common_connstr
,
"
sslrootcert=invalid sslmode=require
");
test_connect_fails
(
$common_connstr
,
"
sslrootcert=invalid sslmode=verify-ca
");
test_connect_fails
(
$common_connstr
,
"
sslrootcert=invalid sslmode=verify-full
");
# Try with wrong root cert, should fail. (
w
e're using the client CA as the
# root, but the server's key is signed by the server CA)
note
"
connect with
out
wrong server root cert
";
# Try with wrong root cert, should fail. (
W
e're using the client CA as the
# root, but the server's key is signed by the server CA
.
)
note
"
connect with wrong server root cert
";
test_connect_fails
(
$common_connstr
,
"
sslrootcert=ssl/client_ca.crt sslmode=require
");
test_connect_fails
(
$common_connstr
,
...
...
This diff is collapsed.
Click to expand it.
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment