From 58102e97e16f9d89b2cedf789a3eb11d6c0a26fc Mon Sep 17 00:00:00 2001 From: SHaselbauer <sarah.haselbauer@akquinet.de> Date: Wed, 23 Jan 2013 11:47:55 -0500 Subject: [PATCH] alternative variant to disable thread creation by the scheduledExecutor in test selenium test cases --- tests/com/gitblit/tests/X509UtilsTest.java | 36 ++++++++++++++++++++++++------------ 1 files changed, 24 insertions(+), 12 deletions(-) diff --git a/tests/com/gitblit/tests/X509UtilsTest.java b/tests/com/gitblit/tests/X509UtilsTest.java index 85afce0..5d17e18 100644 --- a/tests/com/gitblit/tests/X509UtilsTest.java +++ b/tests/com/gitblit/tests/X509UtilsTest.java @@ -34,6 +34,7 @@ import com.gitblit.utils.HttpUtils; import com.gitblit.utils.X509Utils; import com.gitblit.utils.X509Utils.RevocationReason; +import com.gitblit.utils.X509Utils.X509Log; import com.gitblit.utils.X509Utils.X509Metadata; /** @@ -48,12 +49,18 @@ // based on the JCE policy files String caPassword = "aBcDeFg"; File folder = new File(System.getProperty("user.dir"), "x509test"); + + X509Log log = new X509Log() { + public void log(String message) { + System.out.println(message); + } + }; @Before public void prepare() throws Exception { cleanUp(); X509Metadata goMetadata = new X509Metadata("localhost", caPassword); - X509Utils.prepareX509Infrastructure(goMetadata, folder); + X509Utils.prepareX509Infrastructure(goMetadata, folder, log); } @After @@ -66,16 +73,16 @@ @Test public void testNewCA() throws Exception { File storeFile = new File(folder, X509Utils.CA_KEY_STORE); - X509Utils.getPrivateKey(X509Utils.CA_FN, storeFile, caPassword); - X509Certificate cert = X509Utils.getCertificate(X509Utils.CA_FN, storeFile, caPassword); + X509Utils.getPrivateKey(X509Utils.CA_ALIAS, storeFile, caPassword); + X509Certificate cert = X509Utils.getCertificate(X509Utils.CA_ALIAS, storeFile, caPassword); assertEquals("O=Gitblit,OU=Gitblit,CN=Gitblit Certificate Authority", cert.getIssuerDN().getName()); } @Test public void testCertificateUserMapping() throws Exception { File storeFile = new File(folder, X509Utils.CA_KEY_STORE); - PrivateKey caPrivateKey = X509Utils.getPrivateKey(X509Utils.CA_FN, storeFile, caPassword); - X509Certificate caCert = X509Utils.getCertificate(X509Utils.CA_FN, storeFile, caPassword); + PrivateKey caPrivateKey = X509Utils.getPrivateKey(X509Utils.CA_ALIAS, storeFile, caPassword); + X509Certificate caCert = X509Utils.getCertificate(X509Utils.CA_ALIAS, storeFile, caPassword); X509Metadata userMetadata = new X509Metadata("james", "james"); userMetadata.serverHostname = "www.myserver.com"; @@ -108,10 +115,15 @@ userMetadata.userDisplayname = "James Moger"; userMetadata.passwordHint = "your name"; - File zip = X509Utils.newClientBundle(userMetadata, storeFile, caPassword); + File zip = X509Utils.newClientBundle(userMetadata, storeFile, caPassword, log); assertTrue(zip.exists()); - List<String> expected = Arrays.asList(userMetadata.commonName + ".pem", userMetadata.commonName + ".p12", "README.TXT"); + List<String> expected = Arrays.asList( + userMetadata.commonName + ".pem", + userMetadata.commonName + ".p12", + userMetadata.commonName + ".cer", + "ca.cer", + "README.TXT"); ZipInputStream zis = new ZipInputStream(new FileInputStream(zip)); ZipEntry entry = null; @@ -124,8 +136,8 @@ @Test public void testCertificateRevocation() throws Exception { File storeFile = new File(folder, X509Utils.CA_KEY_STORE); - PrivateKey caPrivateKey = X509Utils.getPrivateKey(X509Utils.CA_FN, storeFile, caPassword); - X509Certificate caCert = X509Utils.getCertificate(X509Utils.CA_FN, storeFile, caPassword); + PrivateKey caPrivateKey = X509Utils.getPrivateKey(X509Utils.CA_ALIAS, storeFile, caPassword); + X509Certificate caCert = X509Utils.getCertificate(X509Utils.CA_ALIAS, storeFile, caPassword); X509Metadata userMetadata = new X509Metadata("james", "james"); userMetadata.serverHostname = "www.myserver.com"; @@ -140,7 +152,7 @@ assertFalse(X509Utils.isRevoked(cert1, caRevocationList)); // revoke certificate and then confirm it IS revoked - X509Utils.revoke(cert1, RevocationReason.ACompromise, caRevocationList, storeFile, caPassword); + X509Utils.revoke(cert1, RevocationReason.ACompromise, caRevocationList, storeFile, caPassword, log); assertTrue(X509Utils.isRevoked(cert1, caRevocationList)); // generate a second certificate @@ -151,7 +163,7 @@ assertFalse(X509Utils.isRevoked(cert2, caRevocationList)); // revoke second certificate and then confirm it IS revoked - X509Utils.revoke(cert2, RevocationReason.ACompromise, caRevocationList, caPrivateKey); + X509Utils.revoke(cert2, RevocationReason.ACompromise, caRevocationList, caPrivateKey, log); assertTrue(X509Utils.isRevoked(cert1, caRevocationList)); assertTrue(X509Utils.isRevoked(cert2, caRevocationList)); @@ -164,7 +176,7 @@ assertFalse(X509Utils.isRevoked(cert3, caRevocationList)); // revoke third certificate and then confirm it IS revoked - X509Utils.revoke(cert3, RevocationReason.ACompromise, caRevocationList, caPrivateKey); + X509Utils.revoke(cert3, RevocationReason.ACompromise, caRevocationList, caPrivateKey, log); assertTrue(X509Utils.isRevoked(cert1, caRevocationList)); assertTrue(X509Utils.isRevoked(cert2, caRevocationList)); assertTrue(X509Utils.isRevoked(cert3, caRevocationList)); -- Gitblit v1.9.1