|
@@ -376,8 +376,19 @@ connect_with_invalid_client_cert(Config) ->
|
|
|
Dir = filename:join(code:lib_dir(epgsql), ?TEST_DATA_DIR),
|
|
|
File = fun(Name) -> filename:join(Dir, Name) end,
|
|
|
Trap = process_flag(trap_exit, true),
|
|
|
+ %% pre-otp23:
|
|
|
+ %% {error,
|
|
|
+ %% {ssl_negotiation_failed,
|
|
|
+ %% {tls_alert,
|
|
|
+ %% {unknown_ca, "received SERVER ALERT: Fatal - Unknown CA"}}}}
|
|
|
+ %% otp23+:
|
|
|
+ %% {error,
|
|
|
+ %% {sock_error,
|
|
|
+ %% {tls_alert,
|
|
|
+ %% {unknown_ca, "TLS client: <..> received SERVER ALERT: Fatal - Unknown CA\n"}}}}
|
|
|
?assertMatch(
|
|
|
- {error, {ssl_negotiation_failed, _}},
|
|
|
+ {error, {Err, {tls_alert, _}}} when Err == ssl_negotiation_failed;
|
|
|
+ Err == sock_error,
|
|
|
Module:connect(
|
|
|
#{username => "epgsql_test_cert",
|
|
|
database => "epgsql_test_db1",
|
|
@@ -388,7 +399,9 @@ connect_with_invalid_client_cert(Config) ->
|
|
|
[{keyfile, File("bad-client.key")},
|
|
|
{certfile, File("bad-client.crt")}]}
|
|
|
)),
|
|
|
- ?assertMatch({'EXIT', _, {ssl_negotiation_failed, _}}, receive Stop -> Stop end),
|
|
|
+ ?assertMatch({'EXIT', _, {Err, {tls_alert, _}}} when Err == ssl_negotiation_failed;
|
|
|
+ Err == sock_error,
|
|
|
+ receive Stop -> Stop end),
|
|
|
process_flag(trap_exit, Trap).
|
|
|
|
|
|
connect_map(Config) ->
|