# hostname, because the server certificate is always for the domain
# postgresql-ssl-regression.test.
my $SERVERHOSTADDR = '127.0.0.1';
+# This is the pattern to use in pg_hba.conf to match incoming connections.
+my $SERVERHOSTCIDR = '127.0.0.1/32';
# Allocation of base connection string shared among multiple tests.
my $common_connstr;
my $result = $node->safe_psql('postgres', "SHOW ssl_library");
is($result, 'OpenSSL', 'ssl_library parameter');
-configure_test_server_for_ssl($node, $SERVERHOSTADDR, 'trust');
+configure_test_server_for_ssl($node, $SERVERHOSTADDR, $SERVERHOSTCIDR,
+ 'trust');
note "testing password-protected keys";
# This is the hostname used to connect to the server.
my $SERVERHOSTADDR = '127.0.0.1';
+# This is the pattern to use in pg_hba.conf to match incoming connections.
+my $SERVERHOSTCIDR = '127.0.0.1/32';
# Determine whether build supports tls-server-end-point.
my $supports_tls_server_end_point =
$node->start;
# Configure server for SSL connections, with password handling.
-configure_test_server_for_ssl($node, $SERVERHOSTADDR, "scram-sha-256",
- "pass", "scram-sha-256");
+configure_test_server_for_ssl($node, $SERVERHOSTADDR, $SERVERHOSTCIDR,
+ "scram-sha-256", "pass", "scram-sha-256");
switch_server_cert($node, 'server-cn-only');
$ENV{PGPASSWORD} = "pass";
$common_connstr =
return;
}
+# serverhost: what to put in listen_addresses, e.g. '127.0.0.1'
+# servercidr: what to put in pg_hba.conf, e.g. '127.0.0.1/32'
sub configure_test_server_for_ssl
{
- my ($node, $serverhost, $authmethod, $password, $password_enc) = @_;
+ my ($node, $serverhost, $servercidr, $authmethod, $password,
+ $password_enc) = @_;
my $pgdata = $node->data_dir;
$node->restart;
# Change pg_hba after restart because hostssl requires ssl=on
- configure_hba_for_ssl($node, $serverhost, $authmethod);
+ configure_hba_for_ssl($node, $servercidr, $authmethod);
return;
}
sub configure_hba_for_ssl
{
- my ($node, $serverhost, $authmethod) = @_;
+ my ($node, $servercidr, $authmethod) = @_;
my $pgdata = $node->data_dir;
- # Only accept SSL connections from localhost. Our tests don't depend on this
+ # Only accept SSL connections from $servercidr. Our tests don't depend on this
# but seems best to keep it as narrow as possible for security reasons.
#
# When connecting to certdb, also check the client certificate.
print $hba
"# TYPE DATABASE USER ADDRESS METHOD OPTIONS\n";
print $hba
- "hostssl trustdb md5testuser $serverhost/32 md5\n";
+ "hostssl trustdb md5testuser $servercidr md5\n";
print $hba
- "hostssl trustdb all $serverhost/32 $authmethod\n";
+ "hostssl trustdb all $servercidr $authmethod\n";
print $hba
- "hostssl trustdb all ::1/128 $authmethod\n";
+ "hostssl verifydb ssltestuser $servercidr $authmethod clientcert=verify-full\n";
print $hba
- "hostssl verifydb ssltestuser $serverhost/32 $authmethod clientcert=verify-full\n";
+ "hostssl verifydb anotheruser $servercidr $authmethod clientcert=verify-full\n";
print $hba
- "hostssl verifydb anotheruser $serverhost/32 $authmethod clientcert=verify-full\n";
+ "hostssl verifydb yetanotheruser $servercidr $authmethod clientcert=verify-ca\n";
print $hba
- "hostssl verifydb yetanotheruser $serverhost/32 $authmethod clientcert=verify-ca\n";
- print $hba
- "hostssl certdb all $serverhost/32 cert\n";
- print $hba
- "hostssl certdb all ::1/128 cert\n";
+ "hostssl certdb all $servercidr cert\n";
close $hba;
return;
}