if ($ENV{with_gssapi} eq 'yes')
{
- plan tests => 30;
+ plan tests => 32;
}
else
{
$node->connect_ok(
$connstr, $test_name,
sql => $query,
- expected_stdout => qr/t/);
+ expected_stdout => qr/^t$/);
}
else
{
my $connstr = $node->connstr('postgres')
. " user=$role host=$host hostaddr=$hostaddr $gssencmode";
- my ($stdoutres, $stderrres);
-
- $node->connect_ok($connstr, $test_name, $query, $expected);
+ $node->connect_ok(
+ $connstr, $test_name,
+ sql => $query,
+ expected_stdout => $expected);
return;
}
# correct client cert in encrypted PEM with empty password
$node->connect_fails(
"$common_connstr user=ssltestuser sslcert=ssl/client.crt sslkey=ssl/client-encrypted-pem_tmp.key sslpassword=''",
+ "certificate authorization fails with correct client cert and empty password in encrypted PEM format",
expected_stderr =>
- qr!\Qprivate key file "ssl/client-encrypted-pem_tmp.key": processing error\E!,
- "certificate authorization fails with correct client cert and empty password in encrypted PEM format"
+ qr!\Qprivate key file "ssl/client-encrypted-pem_tmp.key": processing error\E!
);
# correct client cert in encrypted PEM with no password
$node->connect_fails(
"$common_connstr user=ssltestuser sslcert=ssl/client.crt sslkey=ssl/client-encrypted-pem_tmp.key",
+ "certificate authorization fails with correct client cert and no password in encrypted PEM format",
expected_stderr =>
- qr!\Qprivate key file "ssl/client-encrypted-pem_tmp.key": processing error\E!,
- "certificate authorization fails with correct client cert and no password in encrypted PEM format"
+ qr!\Qprivate key file "ssl/client-encrypted-pem_tmp.key": processing error\E!
);
}