mirror of
https://github.com/corda/corda.git
synced 2025-06-06 09:21:47 +00:00
More compilation fixes after OS merge
This commit is contained in:
parent
440c8d2da2
commit
23732ece4e
@ -130,7 +130,7 @@ class BridgeSmokeTest {
|
|||||||
setPrivateKey(
|
setPrivateKey(
|
||||||
X509Utilities.CORDA_CLIENT_TLS,
|
X509Utilities.CORDA_CLIENT_TLS,
|
||||||
tlsKeyPair.private,
|
tlsKeyPair.private,
|
||||||
listOf(tlsCert, nodeCaCert, intermediateCa.certificate, rootCert))
|
listOf(tlsCert, nodeCaCert, intermediateCa.certificate, rootCert), sslKeyStore.entryPassword)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -62,10 +62,10 @@ class AMQPListenerTest {
|
|||||||
val trustStoreBytes = bridgeConfig.p2pSslOptions.trustStore.path.readAll()
|
val trustStoreBytes = bridgeConfig.p2pSslOptions.trustStore.path.readAll()
|
||||||
// start listening
|
// start listening
|
||||||
amqpListenerService.provisionKeysAndActivate(keyStoreBytes,
|
amqpListenerService.provisionKeysAndActivate(keyStoreBytes,
|
||||||
bridgeConfig.p2pSslOptions.keyStore.password.toCharArray(),
|
bridgeConfig.p2pSslOptions.keyStore.storePassword.toCharArray(),
|
||||||
bridgeConfig.p2pSslOptions.keyStore.password.toCharArray(),
|
bridgeConfig.p2pSslOptions.keyStore.entryPassword.toCharArray(),
|
||||||
trustStoreBytes,
|
trustStoreBytes,
|
||||||
bridgeConfig.p2pSslOptions.trustStore.password.toCharArray())
|
bridgeConfig.p2pSslOptions.trustStore.storePassword.toCharArray())
|
||||||
// Fire lots of activity to prove we are good
|
// Fire lots of activity to prove we are good
|
||||||
assertEquals(TestAuditService.AuditEvent.STATUS_CHANGE, auditFollower.next())
|
assertEquals(TestAuditService.AuditEvent.STATUS_CHANGE, auditFollower.next())
|
||||||
assertEquals(true, amqpListenerService.active)
|
assertEquals(true, amqpListenerService.active)
|
||||||
@ -137,21 +137,21 @@ class AMQPListenerTest {
|
|||||||
val trustStoreBytes = bridgeConfig.p2pSslOptions.trustStore.path.readAll()
|
val trustStoreBytes = bridgeConfig.p2pSslOptions.trustStore.path.readAll()
|
||||||
// start listening
|
// start listening
|
||||||
amqpListenerService.provisionKeysAndActivate(keyStoreBytes,
|
amqpListenerService.provisionKeysAndActivate(keyStoreBytes,
|
||||||
bridgeConfig.p2pSslOptions.keyStore.password.toCharArray(),
|
bridgeConfig.p2pSslOptions.keyStore.storePassword.toCharArray(),
|
||||||
bridgeConfig.p2pSslOptions.keyStore.password.toCharArray(),
|
bridgeConfig.p2pSslOptions.keyStore.entryPassword.toCharArray(),
|
||||||
trustStoreBytes,
|
trustStoreBytes,
|
||||||
bridgeConfig.p2pSslOptions.trustStore.password.toCharArray())
|
bridgeConfig.p2pSslOptions.trustStore.storePassword.toCharArray())
|
||||||
val connectionFollower = amqpListenerService.onConnection.toBlocking().iterator
|
val connectionFollower = amqpListenerService.onConnection.toBlocking().iterator
|
||||||
val auditFollower = auditService.onAuditEvent.toBlocking().iterator
|
val auditFollower = auditService.onAuditEvent.toBlocking().iterator
|
||||||
val clientKeys = Crypto.generateKeyPair(ECDSA_SECP256R1_SHA256)
|
val clientKeys = Crypto.generateKeyPair(ECDSA_SECP256R1_SHA256)
|
||||||
val clientCert = X509Utilities.createSelfSignedCACertificate(ALICE_NAME.x500Principal, clientKeys)
|
val clientCert = X509Utilities.createSelfSignedCACertificate(ALICE_NAME.x500Principal, clientKeys)
|
||||||
val clientKeyStoreRaw = X509KeyStore("password")
|
val clientKeyStoreRaw = X509KeyStore("password")
|
||||||
clientKeyStoreRaw.setPrivateKey("TLS_CERT", clientKeys.private, listOf(clientCert))
|
clientKeyStoreRaw.setPrivateKey("TLS_CERT", clientKeys.private, listOf(clientCert), "password")
|
||||||
val clientKeyStore = CertificateStore.of(clientKeyStoreRaw, "password")
|
val clientKeyStore = CertificateStore.of(clientKeyStoreRaw, "password", "password")
|
||||||
|
|
||||||
val clientTrustStoreRaw = X509KeyStore("password")
|
val clientTrustStoreRaw = X509KeyStore("password")
|
||||||
clientTrustStoreRaw.setCertificate("TLS_ROOT", clientCert)
|
clientTrustStoreRaw.setCertificate("TLS_ROOT", clientCert)
|
||||||
val clientTrustStore = CertificateStore.of(clientTrustStoreRaw, "password")
|
val clientTrustStore = CertificateStore.of(clientTrustStoreRaw, "password", "password")
|
||||||
val amqpConfig = object : AMQPConfiguration {
|
val amqpConfig = object : AMQPConfiguration {
|
||||||
override val keyStore = clientKeyStore
|
override val keyStore = clientKeyStore
|
||||||
override val trustStore = clientTrustStore
|
override val trustStore = clientTrustStore
|
||||||
|
@ -76,7 +76,8 @@ fun MutualSslConfiguration.createBridgeKeyStores(legalName: CordaX500Name,
|
|||||||
setPrivateKey(
|
setPrivateKey(
|
||||||
X509Utilities.CORDA_CLIENT_TLS,
|
X509Utilities.CORDA_CLIENT_TLS,
|
||||||
tlsKeyPair.private,
|
tlsKeyPair.private,
|
||||||
listOf(tlsCert, nodeCaCert, intermediateCa.certificate, rootCert))
|
listOf(tlsCert, nodeCaCert, intermediateCa.certificate, rootCert),
|
||||||
|
sslKeyStore.entryPassword)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -73,13 +73,13 @@ class ConfigTest {
|
|||||||
val config = createAndLoadConfigFromResource(tempFolder.root.toPath(), configResource)
|
val config = createAndLoadConfigFromResource(tempFolder.root.toPath(), configResource)
|
||||||
assertEquals(Paths.get("outboundcerts/outboundkeys.jks"), config.outboundConfig!!.customSSLConfiguration!!.keyStore.path)
|
assertEquals(Paths.get("outboundcerts/outboundkeys.jks"), config.outboundConfig!!.customSSLConfiguration!!.keyStore.path)
|
||||||
assertEquals(Paths.get("outboundcerts/outboundtrust.jks"), config.outboundConfig!!.customSSLConfiguration!!.trustStore.path)
|
assertEquals(Paths.get("outboundcerts/outboundtrust.jks"), config.outboundConfig!!.customSSLConfiguration!!.trustStore.path)
|
||||||
assertEquals("outboundkeypassword", config.outboundConfig!!.customSSLConfiguration!!.keyStore.password)
|
assertEquals("outboundkeypassword", config.outboundConfig!!.customSSLConfiguration!!.keyStore.storePassword)
|
||||||
assertEquals("outboundtrustpassword", config.outboundConfig!!.customSSLConfiguration!!.trustStore.password)
|
assertEquals("outboundtrustpassword", config.outboundConfig!!.customSSLConfiguration!!.trustStore.storePassword)
|
||||||
assertNull(config.inboundConfig)
|
assertNull(config.inboundConfig)
|
||||||
assertEquals(Paths.get("tunnelcerts/tunnelkeys.jks"), config.bridgeInnerConfig!!.customSSLConfiguration!!.keyStore.path)
|
assertEquals(Paths.get("tunnelcerts/tunnelkeys.jks"), config.bridgeInnerConfig!!.customSSLConfiguration!!.keyStore.path)
|
||||||
assertEquals(Paths.get("tunnelcerts/tunneltrust.jks"), config.bridgeInnerConfig!!.customSSLConfiguration!!.trustStore.path)
|
assertEquals(Paths.get("tunnelcerts/tunneltrust.jks"), config.bridgeInnerConfig!!.customSSLConfiguration!!.trustStore.path)
|
||||||
assertEquals("tunnelkeypassword", config.bridgeInnerConfig!!.customSSLConfiguration!!.keyStore.password)
|
assertEquals("tunnelkeypassword", config.bridgeInnerConfig!!.customSSLConfiguration!!.keyStore.storePassword)
|
||||||
assertEquals("tunneltrustpassword", config.bridgeInnerConfig!!.customSSLConfiguration!!.trustStore.password)
|
assertEquals("tunneltrustpassword", config.bridgeInnerConfig!!.customSSLConfiguration!!.trustStore.storePassword)
|
||||||
assertNull(config.floatOuterConfig)
|
assertNull(config.floatOuterConfig)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -89,13 +89,13 @@ class ConfigTest {
|
|||||||
val config = createAndLoadConfigFromResource(tempFolder.root.toPath(), configResource)
|
val config = createAndLoadConfigFromResource(tempFolder.root.toPath(), configResource)
|
||||||
assertEquals(Paths.get("inboundcerts/inboundkeys.jks"), config.inboundConfig!!.customSSLConfiguration!!.keyStore.path)
|
assertEquals(Paths.get("inboundcerts/inboundkeys.jks"), config.inboundConfig!!.customSSLConfiguration!!.keyStore.path)
|
||||||
assertEquals(Paths.get("inboundcerts/inboundtrust.jks"), config.inboundConfig!!.customSSLConfiguration!!.trustStore.path)
|
assertEquals(Paths.get("inboundcerts/inboundtrust.jks"), config.inboundConfig!!.customSSLConfiguration!!.trustStore.path)
|
||||||
assertEquals("inboundkeypassword", config.inboundConfig!!.customSSLConfiguration!!.keyStore.password)
|
assertEquals("inboundkeypassword", config.inboundConfig!!.customSSLConfiguration!!.keyStore.storePassword)
|
||||||
assertEquals("inboundtrustpassword", config.inboundConfig!!.customSSLConfiguration!!.trustStore.password)
|
assertEquals("inboundtrustpassword", config.inboundConfig!!.customSSLConfiguration!!.trustStore.storePassword)
|
||||||
assertNull(config.outboundConfig)
|
assertNull(config.outboundConfig)
|
||||||
assertEquals(Paths.get("tunnelcerts/tunnelkeys.jks"), config.floatOuterConfig!!.customSSLConfiguration!!.keyStore.path)
|
assertEquals(Paths.get("tunnelcerts/tunnelkeys.jks"), config.floatOuterConfig!!.customSSLConfiguration!!.keyStore.path)
|
||||||
assertEquals(Paths.get("tunnelcerts/tunneltrust.jks"), config.floatOuterConfig!!.customSSLConfiguration!!.trustStore.path)
|
assertEquals(Paths.get("tunnelcerts/tunneltrust.jks"), config.floatOuterConfig!!.customSSLConfiguration!!.trustStore.path)
|
||||||
assertEquals("tunnelkeypassword", config.floatOuterConfig!!.customSSLConfiguration!!.keyStore.password)
|
assertEquals("tunnelkeypassword", config.floatOuterConfig!!.customSSLConfiguration!!.keyStore.storePassword)
|
||||||
assertEquals("tunneltrustpassword", config.floatOuterConfig!!.customSSLConfiguration!!.trustStore.password)
|
assertEquals("tunneltrustpassword", config.floatOuterConfig!!.customSSLConfiguration!!.trustStore.storePassword)
|
||||||
assertNull(config.bridgeInnerConfig)
|
assertNull(config.bridgeInnerConfig)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user