mirror of
https://github.com/corda/corda.git
synced 2025-05-31 06:31:08 +00:00
More compilation fixes after OS merge
This commit is contained in:
parent
440c8d2da2
commit
23732ece4e
@ -130,7 +130,7 @@ class BridgeSmokeTest {
|
||||
setPrivateKey(
|
||||
X509Utilities.CORDA_CLIENT_TLS,
|
||||
tlsKeyPair.private,
|
||||
listOf(tlsCert, nodeCaCert, intermediateCa.certificate, rootCert))
|
||||
listOf(tlsCert, nodeCaCert, intermediateCa.certificate, rootCert), sslKeyStore.entryPassword)
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -62,10 +62,10 @@ class AMQPListenerTest {
|
||||
val trustStoreBytes = bridgeConfig.p2pSslOptions.trustStore.path.readAll()
|
||||
// start listening
|
||||
amqpListenerService.provisionKeysAndActivate(keyStoreBytes,
|
||||
bridgeConfig.p2pSslOptions.keyStore.password.toCharArray(),
|
||||
bridgeConfig.p2pSslOptions.keyStore.password.toCharArray(),
|
||||
bridgeConfig.p2pSslOptions.keyStore.storePassword.toCharArray(),
|
||||
bridgeConfig.p2pSslOptions.keyStore.entryPassword.toCharArray(),
|
||||
trustStoreBytes,
|
||||
bridgeConfig.p2pSslOptions.trustStore.password.toCharArray())
|
||||
bridgeConfig.p2pSslOptions.trustStore.storePassword.toCharArray())
|
||||
// Fire lots of activity to prove we are good
|
||||
assertEquals(TestAuditService.AuditEvent.STATUS_CHANGE, auditFollower.next())
|
||||
assertEquals(true, amqpListenerService.active)
|
||||
@ -137,21 +137,21 @@ class AMQPListenerTest {
|
||||
val trustStoreBytes = bridgeConfig.p2pSslOptions.trustStore.path.readAll()
|
||||
// start listening
|
||||
amqpListenerService.provisionKeysAndActivate(keyStoreBytes,
|
||||
bridgeConfig.p2pSslOptions.keyStore.password.toCharArray(),
|
||||
bridgeConfig.p2pSslOptions.keyStore.password.toCharArray(),
|
||||
bridgeConfig.p2pSslOptions.keyStore.storePassword.toCharArray(),
|
||||
bridgeConfig.p2pSslOptions.keyStore.entryPassword.toCharArray(),
|
||||
trustStoreBytes,
|
||||
bridgeConfig.p2pSslOptions.trustStore.password.toCharArray())
|
||||
bridgeConfig.p2pSslOptions.trustStore.storePassword.toCharArray())
|
||||
val connectionFollower = amqpListenerService.onConnection.toBlocking().iterator
|
||||
val auditFollower = auditService.onAuditEvent.toBlocking().iterator
|
||||
val clientKeys = Crypto.generateKeyPair(ECDSA_SECP256R1_SHA256)
|
||||
val clientCert = X509Utilities.createSelfSignedCACertificate(ALICE_NAME.x500Principal, clientKeys)
|
||||
val clientKeyStoreRaw = X509KeyStore("password")
|
||||
clientKeyStoreRaw.setPrivateKey("TLS_CERT", clientKeys.private, listOf(clientCert))
|
||||
val clientKeyStore = CertificateStore.of(clientKeyStoreRaw, "password")
|
||||
clientKeyStoreRaw.setPrivateKey("TLS_CERT", clientKeys.private, listOf(clientCert), "password")
|
||||
val clientKeyStore = CertificateStore.of(clientKeyStoreRaw, "password", "password")
|
||||
|
||||
val clientTrustStoreRaw = X509KeyStore("password")
|
||||
clientTrustStoreRaw.setCertificate("TLS_ROOT", clientCert)
|
||||
val clientTrustStore = CertificateStore.of(clientTrustStoreRaw, "password")
|
||||
val clientTrustStore = CertificateStore.of(clientTrustStoreRaw, "password", "password")
|
||||
val amqpConfig = object : AMQPConfiguration {
|
||||
override val keyStore = clientKeyStore
|
||||
override val trustStore = clientTrustStore
|
||||
|
@ -76,7 +76,8 @@ fun MutualSslConfiguration.createBridgeKeyStores(legalName: CordaX500Name,
|
||||
setPrivateKey(
|
||||
X509Utilities.CORDA_CLIENT_TLS,
|
||||
tlsKeyPair.private,
|
||||
listOf(tlsCert, nodeCaCert, intermediateCa.certificate, rootCert))
|
||||
listOf(tlsCert, nodeCaCert, intermediateCa.certificate, rootCert),
|
||||
sslKeyStore.entryPassword)
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -73,13 +73,13 @@ class ConfigTest {
|
||||
val config = createAndLoadConfigFromResource(tempFolder.root.toPath(), configResource)
|
||||
assertEquals(Paths.get("outboundcerts/outboundkeys.jks"), config.outboundConfig!!.customSSLConfiguration!!.keyStore.path)
|
||||
assertEquals(Paths.get("outboundcerts/outboundtrust.jks"), config.outboundConfig!!.customSSLConfiguration!!.trustStore.path)
|
||||
assertEquals("outboundkeypassword", config.outboundConfig!!.customSSLConfiguration!!.keyStore.password)
|
||||
assertEquals("outboundtrustpassword", config.outboundConfig!!.customSSLConfiguration!!.trustStore.password)
|
||||
assertEquals("outboundkeypassword", config.outboundConfig!!.customSSLConfiguration!!.keyStore.storePassword)
|
||||
assertEquals("outboundtrustpassword", config.outboundConfig!!.customSSLConfiguration!!.trustStore.storePassword)
|
||||
assertNull(config.inboundConfig)
|
||||
assertEquals(Paths.get("tunnelcerts/tunnelkeys.jks"), config.bridgeInnerConfig!!.customSSLConfiguration!!.keyStore.path)
|
||||
assertEquals(Paths.get("tunnelcerts/tunneltrust.jks"), config.bridgeInnerConfig!!.customSSLConfiguration!!.trustStore.path)
|
||||
assertEquals("tunnelkeypassword", config.bridgeInnerConfig!!.customSSLConfiguration!!.keyStore.password)
|
||||
assertEquals("tunneltrustpassword", config.bridgeInnerConfig!!.customSSLConfiguration!!.trustStore.password)
|
||||
assertEquals("tunnelkeypassword", config.bridgeInnerConfig!!.customSSLConfiguration!!.keyStore.storePassword)
|
||||
assertEquals("tunneltrustpassword", config.bridgeInnerConfig!!.customSSLConfiguration!!.trustStore.storePassword)
|
||||
assertNull(config.floatOuterConfig)
|
||||
}
|
||||
|
||||
@ -89,13 +89,13 @@ class ConfigTest {
|
||||
val config = createAndLoadConfigFromResource(tempFolder.root.toPath(), configResource)
|
||||
assertEquals(Paths.get("inboundcerts/inboundkeys.jks"), config.inboundConfig!!.customSSLConfiguration!!.keyStore.path)
|
||||
assertEquals(Paths.get("inboundcerts/inboundtrust.jks"), config.inboundConfig!!.customSSLConfiguration!!.trustStore.path)
|
||||
assertEquals("inboundkeypassword", config.inboundConfig!!.customSSLConfiguration!!.keyStore.password)
|
||||
assertEquals("inboundtrustpassword", config.inboundConfig!!.customSSLConfiguration!!.trustStore.password)
|
||||
assertEquals("inboundkeypassword", config.inboundConfig!!.customSSLConfiguration!!.keyStore.storePassword)
|
||||
assertEquals("inboundtrustpassword", config.inboundConfig!!.customSSLConfiguration!!.trustStore.storePassword)
|
||||
assertNull(config.outboundConfig)
|
||||
assertEquals(Paths.get("tunnelcerts/tunnelkeys.jks"), config.floatOuterConfig!!.customSSLConfiguration!!.keyStore.path)
|
||||
assertEquals(Paths.get("tunnelcerts/tunneltrust.jks"), config.floatOuterConfig!!.customSSLConfiguration!!.trustStore.path)
|
||||
assertEquals("tunnelkeypassword", config.floatOuterConfig!!.customSSLConfiguration!!.keyStore.password)
|
||||
assertEquals("tunneltrustpassword", config.floatOuterConfig!!.customSSLConfiguration!!.trustStore.password)
|
||||
assertEquals("tunnelkeypassword", config.floatOuterConfig!!.customSSLConfiguration!!.keyStore.storePassword)
|
||||
assertEquals("tunneltrustpassword", config.floatOuterConfig!!.customSSLConfiguration!!.trustStore.storePassword)
|
||||
assertNull(config.bridgeInnerConfig)
|
||||
}
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user