jetty-9 jetty-server compiling and passing many tests
This commit is contained in:
parent
145938cecc
commit
3f51fb52fa
|
@ -17,7 +17,7 @@ import org.eclipse.jetty.util.ssl.SslContextFactory;
|
|||
/** The interface for SSL connectors and their configuration methods.
|
||||
*
|
||||
*/
|
||||
public interface SslConnector extends Connector
|
||||
public interface SslConnector extends Connector.NetConnector
|
||||
{
|
||||
@Deprecated
|
||||
public static final String DEFAULT_KEYSTORE_ALGORITHM=(Security.getProperty("ssl.KeyManagerFactory.algorithm")==null?"SunX509":Security.getProperty("ssl.KeyManagerFactory.algorithm"));
|
||||
|
|
|
@ -53,7 +53,8 @@ public class SessionHandlerTest
|
|||
}
|
||||
};
|
||||
|
||||
Request baseRequest = new Request();
|
||||
// TODO this probably wont work
|
||||
Request baseRequest = new Request(null);
|
||||
baseRequest.setDispatcherType(DispatcherType.REQUEST);
|
||||
assertEquals(DispatcherType.REQUEST,baseRequest.getDispatcherType());
|
||||
|
||||
|
@ -182,7 +183,8 @@ public class SessionHandlerTest
|
|||
}
|
||||
};
|
||||
|
||||
Request baseRequest = new Request();
|
||||
// TODO this probably wont work
|
||||
Request baseRequest = new Request(null);
|
||||
baseRequest.setDispatcherType(DispatcherType.REQUEST);
|
||||
assertEquals(DispatcherType.REQUEST,baseRequest.getDispatcherType());
|
||||
|
||||
|
|
|
@ -24,6 +24,7 @@ import org.eclipse.jetty.server.Request;
|
|||
import org.eclipse.jetty.server.Server;
|
||||
import org.eclipse.jetty.server.handler.AbstractHandler;
|
||||
import org.eclipse.jetty.toolchain.test.MavenTestingUtils;
|
||||
import org.eclipse.jetty.util.BufferUtil;
|
||||
import org.eclipse.jetty.util.StringUtil;
|
||||
import org.eclipse.jetty.util.log.Log;
|
||||
import org.eclipse.jetty.util.log.Logger;
|
||||
|
@ -74,7 +75,6 @@ public class SslRenegotiateTest
|
|||
try
|
||||
{
|
||||
String keystore = MavenTestingUtils.getTestResourceFile("keystore").getAbsolutePath();
|
||||
connector.setPort(0);
|
||||
SslContextFactory cf = connector.getSslContextFactory();
|
||||
cf.setKeyStorePath(keystore);
|
||||
cf.setKeyStorePassword("storepwd");
|
||||
|
@ -113,7 +113,7 @@ public class SslRenegotiateTest
|
|||
doWrap();
|
||||
doUnwrap();
|
||||
_inAppB.flip();
|
||||
String response=new IndirectNIOBuffer(_inAppB,true).toString();
|
||||
String response=BufferUtil.toString(_inAppB);
|
||||
// System.err.println(response);
|
||||
assertTrue(response.startsWith("HTTP/1.1 200 OK"));
|
||||
|
||||
|
@ -122,7 +122,7 @@ public class SslRenegotiateTest
|
|||
_inAppB.clear();
|
||||
doUnwrap();
|
||||
_inAppB.flip();
|
||||
response=new IndirectNIOBuffer(_inAppB,true).toString();
|
||||
response=BufferUtil.toString(_inAppB);
|
||||
}
|
||||
|
||||
assertTrue(response.indexOf("HELLO WORLD")>=0);
|
||||
|
@ -141,7 +141,7 @@ public class SslRenegotiateTest
|
|||
doWrap();
|
||||
doUnwrap();
|
||||
_inAppB.flip();
|
||||
response=new IndirectNIOBuffer(_inAppB,true).toString();
|
||||
response=BufferUtil.toString(_inAppB);
|
||||
assertTrue(response.startsWith("HTTP/1.1 200 OK"));
|
||||
assertTrue(response.indexOf("HELLO WORLD")>0);
|
||||
|
||||
|
|
|
@ -1,78 +0,0 @@
|
|||
// ========================================================================
|
||||
// Copyright (c) 2004-2009 Mort Bay Consulting Pty. Ltd.
|
||||
// ------------------------------------------------------------------------
|
||||
// All rights reserved. This program and the accompanying materials
|
||||
// are made available under the terms of the Eclipse Public License v1.0
|
||||
// and Apache License v2.0 which accompanies this distribution.
|
||||
// The Eclipse Public License is available at
|
||||
// http://www.eclipse.org/legal/epl-v10.html
|
||||
// The Apache License v2.0 is available at
|
||||
// http://www.opensource.org/licenses/apache2.0.php
|
||||
// You may elect to redistribute this code under either of these licenses.
|
||||
// ========================================================================
|
||||
|
||||
package org.eclipse.jetty.server.ssl;
|
||||
import java.io.FileInputStream;
|
||||
import java.net.Socket;
|
||||
import java.security.KeyStore;
|
||||
|
||||
import javax.net.ssl.SSLContext;
|
||||
import javax.net.ssl.SSLSocket;
|
||||
import javax.net.ssl.TrustManagerFactory;
|
||||
|
||||
import org.eclipse.jetty.server.HttpServerTestBase;
|
||||
import org.eclipse.jetty.util.ssl.SslContextFactory;
|
||||
import org.junit.BeforeClass;
|
||||
import org.junit.Test;
|
||||
|
||||
/**
|
||||
* HttpServer Tester.
|
||||
*/
|
||||
public class SslSocketServerTest extends HttpServerTestBase
|
||||
{
|
||||
static SSLContext __sslContext;
|
||||
{
|
||||
_scheme="https";
|
||||
}
|
||||
|
||||
@Override
|
||||
protected Socket newSocket(String host, int port) throws Exception
|
||||
{
|
||||
SSLSocket socket = (SSLSocket)__sslContext.getSocketFactory().createSocket(host,port);
|
||||
socket.setEnabledProtocols(new String[] {"TLSv1"});
|
||||
return socket;
|
||||
}
|
||||
|
||||
|
||||
@BeforeClass
|
||||
public static void init() throws Exception
|
||||
{
|
||||
SslSocketConnector connector = new SslSocketConnector();
|
||||
String keystorePath = System.getProperty("basedir",".") + "/src/test/resources/keystore";
|
||||
SslContextFactory cf = connector.getSslContextFactory();
|
||||
cf.setKeyStorePath(keystorePath);
|
||||
cf.setKeyStorePassword("storepwd");
|
||||
cf.setKeyManagerPassword("keypwd");
|
||||
cf.setTrustStore(keystorePath);
|
||||
cf.setTrustStorePassword("storepwd");
|
||||
startServer(connector);
|
||||
|
||||
|
||||
KeyStore keystore = KeyStore.getInstance(KeyStore.getDefaultType());
|
||||
keystore.load(new FileInputStream(connector.getKeystore()), "storepwd".toCharArray());
|
||||
TrustManagerFactory trustManagerFactory = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
|
||||
trustManagerFactory.init(keystore);
|
||||
__sslContext = SSLContext.getInstance("TLSv1");
|
||||
__sslContext.init(null, trustManagerFactory.getTrustManagers(), null);
|
||||
|
||||
|
||||
}
|
||||
|
||||
@Override
|
||||
@Test
|
||||
public void testFlush() throws Exception
|
||||
{
|
||||
// TODO this test uses URL, so noop for now
|
||||
}
|
||||
|
||||
}
|
|
@ -1,64 +0,0 @@
|
|||
// ========================================================================
|
||||
// Copyright (c) 2010 Mort Bay Consulting Pty. Ltd.
|
||||
// ------------------------------------------------------------------------
|
||||
// All rights reserved. This program and the accompanying materials
|
||||
// are made available under the terms of the Eclipse Public License v1.0
|
||||
// and Apache License v2.0 which accompanies this distribution.
|
||||
// The Eclipse Public License is available at
|
||||
// http://www.eclipse.org/legal/epl-v10.html
|
||||
// The Apache License v2.0 is available at
|
||||
// http://www.opensource.org/licenses/apache2.0.php
|
||||
// You may elect to redistribute this code under either of these licenses.
|
||||
// ========================================================================
|
||||
|
||||
package org.eclipse.jetty.server.ssl;
|
||||
|
||||
import java.io.FileInputStream;
|
||||
import java.net.Socket;
|
||||
import java.security.KeyStore;
|
||||
|
||||
import javax.net.ssl.SSLContext;
|
||||
import javax.net.ssl.SSLSocket;
|
||||
import javax.net.ssl.TrustManagerFactory;
|
||||
|
||||
import org.eclipse.jetty.server.ConnectorTimeoutTest;
|
||||
import org.eclipse.jetty.util.ssl.SslContextFactory;
|
||||
import org.junit.BeforeClass;
|
||||
|
||||
public class SslSocketTimeoutTest extends ConnectorTimeoutTest
|
||||
{
|
||||
static SSLContext __sslContext;
|
||||
|
||||
@Override
|
||||
protected Socket newSocket(String host, int port) throws Exception
|
||||
{
|
||||
SSLSocket socket = (SSLSocket)__sslContext.getSocketFactory().createSocket(host,port);
|
||||
socket.setEnabledProtocols(new String[] {"TLSv1"});
|
||||
return socket;
|
||||
}
|
||||
|
||||
@BeforeClass
|
||||
public static void init() throws Exception
|
||||
{
|
||||
SslSocketConnector connector = new SslSocketConnector();
|
||||
connector.setMaxIdleTime(MAX_IDLE_TIME); //250 msec max idle
|
||||
String keystorePath = System.getProperty("basedir",".") + "/src/test/resources/keystore";
|
||||
SslContextFactory cf = connector.getSslContextFactory();
|
||||
cf.setKeyStorePath(keystorePath);
|
||||
cf.setKeyStorePassword("storepwd");
|
||||
cf.setKeyManagerPassword("keypwd");
|
||||
cf.setTrustStore(keystorePath);
|
||||
cf.setTrustStorePassword("storepwd");
|
||||
startServer(connector);
|
||||
|
||||
|
||||
KeyStore keystore = KeyStore.getInstance(KeyStore.getDefaultType());
|
||||
keystore.load(new FileInputStream(connector.getKeystore()), "storepwd".toCharArray());
|
||||
TrustManagerFactory trustManagerFactory = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
|
||||
trustManagerFactory.init(keystore);
|
||||
__sslContext = SSLContext.getInstance("TLSv1");
|
||||
__sslContext.init(null, trustManagerFactory.getTrustManagers(), null);
|
||||
|
||||
}
|
||||
|
||||
}
|
Loading…
Reference in New Issue