diff --git a/x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/transport/netty4/SecurityNetty4TransportTests.java b/x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/transport/netty4/SecurityNetty4TransportTests.java index 3c4ebee2ac59c..6ce7e2aebdef8 100644 --- a/x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/transport/netty4/SecurityNetty4TransportTests.java +++ b/x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/transport/netty4/SecurityNetty4TransportTests.java @@ -21,22 +21,37 @@ public class SecurityNetty4TransportTests extends ESTestCase { - public void testGetTransportProfileConfigurations() { + public void testGetSecureTransportProfileConfigurations() { final Settings settings = Settings.builder() .put("path.home", createTempDir()) .put("xpack.security.transport.ssl.verification_mode", VerificationMode.CERTIFICATE.name()) .put("transport.profiles.full.xpack.security.ssl.verification_mode", VerificationMode.FULL.name()) .put("transport.profiles.cert.xpack.security.ssl.verification_mode", VerificationMode.CERTIFICATE.name()) - .put("transport.profiles.none.xpack.security.ssl.verification_mode", VerificationMode.NONE.name()) .build(); final Environment env = TestEnvironment.newEnvironment(settings); SSLService sslService = new SSLService(settings, env); final SSLConfiguration defaultConfig = sslService.getSSLConfiguration("xpack.security.transport.ssl"); final Map profileConfigurations = getTransportProfileConfigurations(settings, sslService, defaultConfig); - assertThat(profileConfigurations.size(), Matchers.equalTo(4)); - assertThat(profileConfigurations.keySet(), Matchers.containsInAnyOrder("full", "cert", "none", "default")); + assertThat(profileConfigurations.size(), Matchers.equalTo(3)); + assertThat(profileConfigurations.keySet(), Matchers.containsInAnyOrder("full", "cert", "default")); assertThat(profileConfigurations.get("full").verificationMode(), Matchers.equalTo(VerificationMode.FULL)); assertThat(profileConfigurations.get("cert").verificationMode(), Matchers.equalTo(VerificationMode.CERTIFICATE)); + assertThat(profileConfigurations.get("default"), Matchers.sameInstance(defaultConfig)); + } + + public void testGetInsecureTransportProfileConfigurations() { + assumeFalse("Can't run in a FIPS JVM with verification mode None", inFipsJvm()); + final Settings settings = Settings.builder() + .put("path.home", createTempDir()) + .put("xpack.security.transport.ssl.verification_mode", VerificationMode.CERTIFICATE.name()) + .put("transport.profiles.none.xpack.security.ssl.verification_mode", VerificationMode.NONE.name()) + .build(); + final Environment env = TestEnvironment.newEnvironment(settings); + SSLService sslService = new SSLService(settings, env); + final SSLConfiguration defaultConfig = sslService.getSSLConfiguration("xpack.security.transport.ssl"); + final Map profileConfigurations = getTransportProfileConfigurations(settings, sslService, defaultConfig); + assertThat(profileConfigurations.size(), Matchers.equalTo(2)); + assertThat(profileConfigurations.keySet(), Matchers.containsInAnyOrder("none", "default")); assertThat(profileConfigurations.get("none").verificationMode(), Matchers.equalTo(VerificationMode.NONE)); assertThat(profileConfigurations.get("default"), Matchers.sameInstance(defaultConfig)); }