mirror of
https://github.com/corda/corda.git
synced 2025-06-15 13:48:14 +00:00
AMQP Bridging between nodes (#2181)
* Able to send hand coded messages to an Artemis node inbox Get startup race condition fixed. Start cleanup work. Fixup after rebase Remove SASL hack for now Minor tweaks. Enable AMQP mode manually. Add configuration control Slight clean up Stop timeouts that don't work with AMQP Rename class Get TLS constants from :node-api Primitive integration test Put back commented line Session per bridge to alow rollback on remote rejects. Add more tests and handle multiple IP adddresses Reduce logging Fixup after rebase Add a test to verify the remote end AMQP rejection logic works and does cause message replay. Allow Artemis to duplicate after session rollback Reduce number of threads Move legacy bridge related code over to CoreBridgeManager Shared threadpool for bridges Add a test to confirm that no side effects when using a shared thread pool. Address PR comments and remove dead lines Rebase and add some comments Remove a couple of blank lines Ensure AMQP bridges are used in tests Fixup after removal of testNodeConfiguration Add a couple of doc comments Add a couple of doc comments Make things internal and use CordaFuture Address some PR comments Change comment type * Use Artemis 2.2 to fix AMQP problems. Add explicit test of legacy core bridges, as marking the factory class private had silently broken them. * Fix change due to using Artemis 2.2
This commit is contained in:
@ -29,12 +29,14 @@ class ArtemisTcpTransport {
|
||||
// but we allow classical RSA certificates to work in case:
|
||||
// a) we need to use keytool certificates in some demos,
|
||||
// b) we use cloud providers or HSMs that do not support ECC.
|
||||
private val CIPHER_SUITES = listOf(
|
||||
val CIPHER_SUITES = listOf(
|
||||
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
|
||||
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
|
||||
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256"
|
||||
)
|
||||
|
||||
val TLS_VERSIONS = listOf("TLSv1.2")
|
||||
|
||||
fun tcpTransport(
|
||||
direction: ConnectionDirection,
|
||||
hostAndPort: NetworkHostAndPort,
|
||||
@ -68,7 +70,7 @@ class ArtemisTcpTransport {
|
||||
TransportConstants.TRUSTSTORE_PATH_PROP_NAME to config.trustStoreFile,
|
||||
TransportConstants.TRUSTSTORE_PASSWORD_PROP_NAME to config.trustStorePassword,
|
||||
TransportConstants.ENABLED_CIPHER_SUITES_PROP_NAME to CIPHER_SUITES.joinToString(","),
|
||||
TransportConstants.ENABLED_PROTOCOLS_PROP_NAME to "TLSv1.2",
|
||||
TransportConstants.ENABLED_PROTOCOLS_PROP_NAME to TLS_VERSIONS.joinToString(","),
|
||||
TransportConstants.NEED_CLIENT_AUTH_PROP_NAME to true,
|
||||
VERIFY_PEER_LEGAL_NAME to (direction as? ConnectionDirection.Outbound)?.expectedCommonNames
|
||||
)
|
||||
|
Reference in New Issue
Block a user