You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@camel.apache.org by co...@apache.org on 2019/05/24 19:39:41 UTC
[camel] 19/21: CAMEL-13402 - Fixed CS
This is an automated email from the ASF dual-hosted git repository.
coheigea pushed a commit to branch camel-2.x
in repository https://gitbox.apache.org/repos/asf/camel.git
commit cfe2e8881dc66436f8c88d36f9efbc35eaca2f24
Author: Andrea Cosentino <an...@gmail.com>
AuthorDate: Tue Apr 30 11:44:52 2019 +0200
CAMEL-13402 - Fixed CS
---
.../java/org/apache/camel/coap/CoAPProducer.java | 2 +-
.../apache/camel/coap/CoAPComponentTLSTest.java | 87 ++++++++--------------
2 files changed, 32 insertions(+), 57 deletions(-)
diff --git a/components/camel-coap/src/main/java/org/apache/camel/coap/CoAPProducer.java b/components/camel-coap/src/main/java/org/apache/camel/coap/CoAPProducer.java
index 5441481..71766df 100644
--- a/components/camel-coap/src/main/java/org/apache/camel/coap/CoAPProducer.java
+++ b/components/camel-coap/src/main/java/org/apache/camel/coap/CoAPProducer.java
@@ -95,7 +95,7 @@ public class CoAPProducer extends DefaultProducer {
client = new CoapClient(uri);
// Configure TLS
- if (CoAPEndpoint.enableTLS((uri))) {
+ if (CoAPEndpoint.enableTLS(uri)) {
DTLSConnector connector = endpoint.createDTLSConnector(null, true);
CoapEndpoint.Builder coapBuilder = new CoapEndpoint.Builder();
coapBuilder.setConnector(connector);
diff --git a/components/camel-coap/src/test/java/org/apache/camel/coap/CoAPComponentTLSTest.java b/components/camel-coap/src/test/java/org/apache/camel/coap/CoAPComponentTLSTest.java
index 4e1e61a..c2c7bb1 100644
--- a/components/camel-coap/src/test/java/org/apache/camel/coap/CoAPComponentTLSTest.java
+++ b/components/camel-coap/src/test/java/org/apache/camel/coap/CoAPComponentTLSTest.java
@@ -202,10 +202,8 @@ public class CoAPComponentTLSTest extends CamelTestSupport {
keystoreParameters.setPassword("security");
KeyStore keyStore = keystoreParameters.createKeyStore();
- PrivateKey privateKey =
- (PrivateKey)keyStore.getKey("service", "security".toCharArray());
- PublicKey publicKey =
- keyStore.getCertificate("service").getPublicKey();
+ PrivateKey privateKey = (PrivateKey)keyStore.getKey("service", "security".toCharArray());
+ PublicKey publicKey = keyStore.getCertificate("service").getPublicKey();
KeyStoreParameters keystoreParameters2 = new KeyStoreParameters();
keystoreParameters2.setResource("selfsigned.jks");
@@ -223,8 +221,12 @@ public class CoAPComponentTLSTest extends CamelTestSupport {
truststoreParameters2.setResource("truststore2.jks");
truststoreParameters2.setPassword("storepass");
- TrustedRpkStore trustedRpkStore = id -> { return true;};
- TrustedRpkStore failedTrustedRpkStore = id -> { return false;};
+ TrustedRpkStore trustedRpkStore = id -> {
+ return true;
+ };
+ TrustedRpkStore failedTrustedRpkStore = id -> {
+ return false;
+ };
KeyGenerator keyGenerator = KeyGenerator.getInstance("AES");
PskStore pskStore = new StaticPskStore("some-identity", keyGenerator.generateKey().getEncoded());
@@ -249,87 +251,60 @@ public class CoAPComponentTLSTest extends CamelTestSupport {
@Override
public void configure() throws Exception {
+ fromF("coaps://localhost:%d/TestResource?alias=service&password=security&" + "keyStoreParameters=#keyParams", PORT).transform(body().prepend("Hello "));
- fromF("coaps://localhost:%d/TestResource?alias=service&password=security&keyStoreParameters=#keyParams", PORT)
- .transform(body().prepend("Hello "));
+ fromF("coaps://localhost:%d/TestResource?alias=selfsigned&password=security&" + "keyStoreParameters=#keyParams2", PORT2).transform(body().prepend("Hello "));
- fromF("coaps://localhost:%d/TestResource?alias=selfsigned&password=security&keyStoreParameters=#keyParams2", PORT2)
- .transform(body().prepend("Hello "));
+ fromF("coaps://localhost:%d/TestResource?alias=service&password=security&" + "trustStoreParameters=#trustParams&"
+ + "keyStoreParameters=#keyParams&clientAuthentication=REQUIRE", PORT3).transform(body().prepend("Hello "));
- fromF("coaps://localhost:%d/TestResource?alias=service&password=security&trustStoreParameters=#trustParams&"
- + "keyStoreParameters=#keyParams&clientAuthentication=REQUIRE", PORT3)
+ fromF("coaps://localhost:%d/TestResource?alias=service&password=security&" + "keyStoreParameters=#keyParams&cipherSuites=TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8", PORT4)
.transform(body().prepend("Hello "));
- fromF("coaps://localhost:%d/TestResource?alias=service&password=security&keyStoreParameters=#keyParams&cipherSuites=TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8", PORT4)
- .transform(body().prepend("Hello "));
+ fromF("coaps://localhost:%d/TestResource?privateKey=#privateKey&publicKey=#publicKey", PORT5).transform(body().prepend("Hello "));
- fromF("coaps://localhost:%d/TestResource?privateKey=#privateKey&publicKey=#publicKey", PORT5)
+ fromF("coaps://localhost:%d/TestResource?privateKey=#privateKey&publicKey=#publicKey&" + "clientAuthentication=REQUIRE&trustedRpkStore=#trustedRpkStore", PORT6)
.transform(body().prepend("Hello "));
- fromF("coaps://localhost:%d/TestResource?privateKey=#privateKey&publicKey=#publicKey&clientAuthentication=REQUIRE&trustedRpkStore=#trustedRpkStore", PORT6)
- .transform(body().prepend("Hello "));
+ fromF("coaps://localhost:%d/TestResource?pskStore=#pskStore", PORT7).transform(body().prepend("Hello "));
- fromF("coaps://localhost:%d/TestResource?pskStore=#pskStore", PORT7)
+ fromF("coaps://localhost:%d/TestResource?alias=service&password=security&" + "keyStoreParameters=#keyParams&pskStore=#pskStore", PORT8)
.transform(body().prepend("Hello "));
- fromF("coaps://localhost:%d/TestResource?alias=service&password=security&keyStoreParameters=#keyParams&pskStore=#pskStore", PORT8)
- .transform(body().prepend("Hello "));
+ from("direct:start").toF("coaps://localhost:%d/TestResource?trustStoreParameters=#trustParams", PORT).to("mock:result");
- from("direct:start")
- .toF("coaps://localhost:%d/TestResource?trustStoreParameters=#trustParams", PORT)
- .to("mock:result");
+ from("direct:notruststore").toF("coaps://localhost:%d/TestResource", PORT).to("mock:result");
- from("direct:notruststore")
- .toF("coaps://localhost:%d/TestResource", PORT)
- .to("mock:result");
+ from("direct:failedtrust").toF("coaps://localhost:%d/TestResource?trustStoreParameters=#trustParams2", PORT).to("mock:result");
- from("direct:failedtrust")
- .toF("coaps://localhost:%d/TestResource?trustStoreParameters=#trustParams2", PORT)
- .to("mock:result");
-
- from("direct:selfsigned")
- .toF("coaps://localhost:%d/TestResource?trustStoreParameters=#keyParams2", PORT2)
- .to("mock:result");
+ from("direct:selfsigned").toF("coaps://localhost:%d/TestResource?trustStoreParameters=#keyParams2", PORT2).to("mock:result");
from("direct:clientauth")
- .toF("coaps://localhost:%d/TestResource?trustStoreParameters=#trustParams&keyStoreParameters=#keyParams3&alias=client&password=security", PORT3)
+ .toF("coaps://localhost:%d/TestResource?trustStoreParameters=#trustParams&" + "keyStoreParameters=#keyParams3&alias=client&password=security", PORT3)
.to("mock:result");
from("direct:failedclientauth")
- .toF("coaps://localhost:%d/TestResource?trustStoreParameters=#trustParams&keyStoreParameters=#keyParams2&alias=selfsigned&password=security", PORT3)
+ .toF("coaps://localhost:%d/TestResource?trustStoreParameters=#trustParams&" + "keyStoreParameters=#keyParams2&alias=selfsigned&password=security", PORT3)
.to("mock:result");
- from("direct:ciphersuites")
- .toF("coaps://localhost:%d/TestResource?trustStoreParameters=#trustParams&cipherSuites=TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8", PORT4)
+ from("direct:ciphersuites").toF("coaps://localhost:%d/TestResource?trustStoreParameters=#trustParams&" + "cipherSuites=TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8", PORT4)
.to("mock:result");
- from("direct:rpk")
- .toF("coaps://localhost:%d/TestResource?trustedRpkStore=#trustedRpkStore", PORT5)
- .to("mock:result");
+ from("direct:rpk").toF("coaps://localhost:%d/TestResource?trustedRpkStore=#trustedRpkStore", PORT5).to("mock:result");
- from("direct:rpknotruststore")
- .toF("coaps://localhost:%d/TestResource", PORT5)
- .to("mock:result");
+ from("direct:rpknotruststore").toF("coaps://localhost:%d/TestResource", PORT5).to("mock:result");
- from("direct:rpkfailedtrust")
- .toF("coaps://localhost:%d/TestResource?trustedRpkStore=#failedTrustedRpkStore", PORT5)
- .to("mock:result");
+ from("direct:rpkfailedtrust").toF("coaps://localhost:%d/TestResource?trustedRpkStore=#failedTrustedRpkStore", PORT5).to("mock:result");
- from("direct:rpkclientauth")
- .toF("coaps://localhost:%d/TestResource?trustedRpkStore=#trustedRpkStore&privateKey=#privateKey&publicKey=#publicKey", PORT6)
+ from("direct:rpkclientauth").toF("coaps://localhost:%d/TestResource?trustedRpkStore=#trustedRpkStore&" + "privateKey=#privateKey&publicKey=#publicKey", PORT6)
.to("mock:result");
- from("direct:psk")
- .toF("coaps://localhost:%d/TestResource?pskStore=#pskStore", PORT7)
- .to("mock:result");
+ from("direct:psk").toF("coaps://localhost:%d/TestResource?pskStore=#pskStore", PORT7).to("mock:result");
- from("direct:pskciphersuite")
- .toF("coaps://localhost:%d/TestResource?pskStore=#pskStore&cipherSuites=TLS_PSK_WITH_AES_128_CBC_SHA256", PORT7)
+ from("direct:pskciphersuite").toF("coaps://localhost:%d/TestResource?pskStore=#pskStore&" + "cipherSuites=TLS_PSK_WITH_AES_128_CBC_SHA256", PORT7)
.to("mock:result");
- from("direct:pskx509")
- .toF("coaps://localhost:%d/TestResource?pskStore=#pskStore&trustStoreParameters=#trustParams", PORT8)
- .to("mock:result");
+ from("direct:pskx509").toF("coaps://localhost:%d/TestResource?pskStore=#pskStore&trustStoreParameters=#trustParams", PORT8).to("mock:result");
}
};
}