From 9a29faf9cbba2faee8dc63a67a387123531e542f Mon Sep 17 00:00:00 2001 From: Gabriel Landais <glandais@kereval.com> Date: Wed, 15 Feb 2012 10:31:46 +0000 Subject: [PATCH] Syslog test git-svn-id: https://scm.gforge.inria.fr/authscm/ycadoret/svn/gazelle/Maven/gazelle-proxy/trunk@26339 356b4b1a-1d2b-0410-8bf1-ffa24008f01e --- .../java/net/ihe/gazelle/proxy/netty/App.java | 51 +++++++++--------- .../src/test/resources/keys/185.jks | Bin 0 -> 2839 bytes .../src/test/resources/keys/186.jks | Bin 0 -> 2838 bytes 3 files changed, 24 insertions(+), 27 deletions(-) create mode 100644 gazelle-proxy-netty/src/test/resources/keys/185.jks create mode 100644 gazelle-proxy-netty/src/test/resources/keys/186.jks diff --git a/gazelle-proxy-netty/src/test/java/net/ihe/gazelle/proxy/netty/App.java b/gazelle-proxy-netty/src/test/java/net/ihe/gazelle/proxy/netty/App.java index 4eb227a8..2e2d0e3a 100644 --- a/gazelle-proxy-netty/src/test/java/net/ihe/gazelle/proxy/netty/App.java +++ b/gazelle-proxy-netty/src/test/java/net/ihe/gazelle/proxy/netty/App.java @@ -67,12 +67,14 @@ public class App { } private static void startSyslogProxyTLS() { - // Syslog Client -TLS> Proxy1 -> Proxy Web app -> Proxy3 -TLS> Syslog + // Syslog Client 9443-TLS> Proxy1 10000-> Proxy Web app 8442-> Proxy3 + // 8443-TLS> Syslog // Server // Starts a Syslog server (8443) try { - AuthSSLSocketFactory serverSocketFactory = getSyslogServerSocketFactory(); + AuthSSLSocketFactory serverSocketFactory = new AuthSSLSocketFactory(getKeyStoreServer(), + getKeyStoreClient()); org.openhealthtools.openatna.syslog.mina.tls.TlsConfig serverConfig = new org.openhealthtools.openatna.syslog.mina.tls.TlsConfig(); serverConfig.setSSLContext(serverSocketFactory.getSSLContext()); serverConfig.setHost("localhost"); @@ -87,20 +89,20 @@ public class App { RawEventListenerSimple listener = new RawEventListenerSimple(System.out); - // Starts proxy3 - InputStream clientKeyStoreStream = listener.getClass().getResourceAsStream("/keys/clientKeyStore"); - TlsCredentials clientCredentials = new TlsCredentials(clientKeyStoreStream, "clientStorePass".toCharArray(), - "myClientCert", "password".toCharArray()); + // Starts proxy3 (provider not TLS - 8442, connects to a TLS server - 8443) + InputStream clientKeyStoreStream = listener.getClass().getResourceAsStream("/keys/185.jks"); + TlsCredentials clientCredentials = new TlsCredentials(clientKeyStoreStream, "password".toCharArray(), "tomcat", + "password".toCharArray()); TlsConfig tlsConfigClient = new TlsConfig(null, true, clientCredentials); ConnectionConfig connectionConfigClient = new ConnectionConfigSimpleTls(8442, "127.0.0.1", 8443, ChannelType.SYSLOG, tlsConfigClient); RawProxy proxy3 = new RawProxy(listener, connectionConfigClient); proxy3.start(); - // Starts proxy2 - InputStream serverKeyStoreStream = listener.getClass().getResourceAsStream("/keys/serverKeyStore"); - TlsCredentials serverCredentials = new TlsCredentials(serverKeyStoreStream, "serverStorePass".toCharArray(), - "myServerCert", "password".toCharArray()); + // Starts proxy1 (provider TLS - 9443, connects to a not TLS server - 10000) + InputStream serverKeyStoreStream = listener.getClass().getResourceAsStream("/keys/186.jks"); + TlsCredentials serverCredentials = new TlsCredentials(serverKeyStoreStream, "password".toCharArray(), "tomcat", + "password".toCharArray()); TlsConfig tlsConfigServer = new TlsConfig(serverCredentials, false, null); ConnectionConfig connectionConfigServer = new ConnectionConfigSimpleTls(9443, "127.0.0.1", 10000, ChannelType.SYSLOG, tlsConfigServer); @@ -109,8 +111,8 @@ public class App { // Ping! try { - AuthSSLSocketFactory clientSocketFactory = getSyslogClientSocketFactory(); - + AuthSSLSocketFactory clientSocketFactory = new AuthSSLSocketFactory(getKeyStoreClient(), + getKeyStoreServer()); ProtocolMessage sl = new ProtocolMessage(10, 5, "2009-08-14T14:12:23.115Z", "localhost", new StringLogMessage("<atna></atna>"), "IHE_XDS", "ATNALOG", "1234"); List<SdParam> params = new ArrayList<SdParam>(); @@ -121,7 +123,8 @@ public class App { StructuredElement se = new StructuredElement("exampleSDID@1234", params); sl.addStructuredElement(se); - Socket s = clientSocketFactory.createSecureSocket("localhost", 9443); +// Socket s = clientSocketFactory.createSecureSocket("localhost", 8443); + Socket s = clientSocketFactory.createSecureSocket("jumbo.irisa.fr", 6514); OutputStream out = s.getOutputStream(); byte[] bytes = sl.toByteArray(); for (int i = 0; i < 5; i++) { @@ -140,22 +143,16 @@ public class App { } - private static AuthSSLSocketFactory getSyslogServerSocketFactory() throws IOException { - URL u = Thread.currentThread().getContextClassLoader().getResource("keys/serverKeyStore"); - KeystoreDetails key = new KeystoreDetails(u.toString(), "serverStorePass", "myServerCert", "password"); - URL uu = Thread.currentThread().getContextClassLoader().getResource("keys/clientKeyStore"); - KeystoreDetails trust = new KeystoreDetails(uu.toString(), "clientStorePass", "myClientCert"); - AuthSSLSocketFactory f = new AuthSSLSocketFactory(key, trust); - return f; + private static KeystoreDetails getKeyStoreServer() { + URL u = Thread.currentThread().getContextClassLoader().getResource("keys/186.jks"); + KeystoreDetails key = new KeystoreDetails(u.toString(), "password", "tomcat", "password"); + return key; } - private static AuthSSLSocketFactory getSyslogClientSocketFactory() throws IOException { - URL u = Thread.currentThread().getContextClassLoader().getResource("keys/serverKeyStore"); - KeystoreDetails trust = new KeystoreDetails(u.toString(), "serverStorePass", "myServerCert"); - URL uu = Thread.currentThread().getContextClassLoader().getResource("keys/clientKeyStore"); - KeystoreDetails key = new KeystoreDetails(uu.toString(), "clientStorePass", "myClientCert", "password"); - AuthSSLSocketFactory f = new AuthSSLSocketFactory(key, trust); - return f; + private static KeystoreDetails getKeyStoreClient() { + URL uu = Thread.currentThread().getContextClassLoader().getResource("keys/185.jks"); + KeystoreDetails key = new KeystoreDetails(uu.toString(), "password", "tomcat", "password"); + return key; } private static void startDicomProxyTLS(int port) { diff --git a/gazelle-proxy-netty/src/test/resources/keys/185.jks b/gazelle-proxy-netty/src/test/resources/keys/185.jks new file mode 100644 index 0000000000000000000000000000000000000000..482f714e2f0ca03b9d1e1d0f14ee15c1cedfbce2 GIT binary patch literal 2839 zcmezO_TO6u1_mZLW-H3iFG)^hU|=+@*~jpNfi*(U)WDK~ftk~wiJ8@)i79UZGZP~d z6C<MmFB_*;n@8JsUPeY<Rt5t-Lv903Hs(+kHen`b4?`XUE)a){huPD^)lkrYAH-wk z;c!YV$}=)BG%}DA=LM1=WNKnyY7iyPYlO@t*}TU2$Sz`JWngaXWiV*$WNK_=c)GLg zmt)WVB`zEux#jJfme1Vm{LSv|L$3^*#fPS+ik(}lyua~IOoPdfs&b<Wm4*Hh6XZg* z5*Qht#70^--1Ml}|HG@gYt7Sj?emZP(-RIz`{Hji@l!y}O19HSl=v^quv@xd)&7_% zezT=lU$kLa-QB2QcTwzfp4@G<Ssmgb^VdFSVrFDuT-?NHXwbx{YhViu3R!s;GXoO? zqXh;F^xAYXN=gc>^!3vdt5S1vQuQ)3QuXpuOY{q}Gxd{;a`X)?4E2)}fh;{BHn3*n zOlb39Z2RHF$ikv0Mz&^Vk~Q;z9L~?k_@9LZm<ZUwaVjee;<Fks11SSpkODpyF&2?) zi3&SJ_r2)JPm>D$w?lW+P5p~E4dg-6$}AEFVhz|82qL@&^cyo113Pk@0#g|?Ff#W{ z+xKM^m*MZ5@k>O{w)|w>nV|IM!}rF_ZxNEBGW;5*4_4SdoU7L{!}DO$mn8iK>l-ZJ ze%v(6OjSQ{yX>WB+2^;MIbNYIr?Khw^n<q-9##~;V#~F*NcrCCZ8zOdyxbFeWY>XB zKeW7+(w6OwT2@hWRxr8p^`j5o>JmTeUwCI)rOyQB6-EZOlKkA{#1eQuVPM(=%p5xm z_}I9#*%(<EwU`7MfoYJXiD}7uCev-6`r*4)wI;DAFFtoRNx`Cf|1+C|y<0`AHs1by z*~CI{>2zVYV^cDZPWpWKoMeu$$ib{<bLYr599qtH|9nCH`=3wER2IzR$q~u@*EgA+ z_ldZ(mGqj1r?$GEou<xFxUits=%UDKnJsMl!{0h(>b?!=_SmG!v-;tJ1=%xKx^ouZ zslMu^ZNank=+?`YHp&N%B&UR?tiPS)e7yPl^5(CfT_m<%T+6oWYQawP<*O$8y8Jv9 z9vlAA%#G=!ykv$;DyxU&nOo;Sm4|L|uzapsv5@op{_Aa*tl#`FxxG5HHF4iY7QU-S zRwoY?Fx&LszI^MClwY#apUvN|O`X@hwj}tPQCsBgJ3DnaES9+Dd(JsJ_393_dWA!* zy*}~JHYloYT={WjljXd3lRp|3drY-Sn7N}!dPSdGgPTL(h4cuO!&Up22y?yFm#iyr z{>HDiy5hWz{Bf(*8;?lGrExsF@a*D}ZG2*DZkhRB_psYzow<awL|J%6^wE#(=HcrU zF4wB;C|mWl=VZC?UM<tRneP?6&YrS0jjZ?)#uA`y;M{IIF+#qZEBEvJFX48x4Qu?r z2B<Z^<UH2DXc70pEsHzu<Q@CH<xgC4hyJs|BS$XUvMc>r;<=$@di&9+fX_*6Z+SK( zWW2j<9>tlI@MNFUDFM4_EAliaWU`i(@LW7mQYKn?s>`r2`Re_P9e)bWKRXle`uNYW z_{KX7UyHS(h4yhLr}TWd#~AO#v9iG7z)nNA7ZpsGi!=V5;HfN@Gntpu=&a^g7TeUd z^{2~%HObR9d=3$K6Ek(%#!T^bCj19Kb~ifenT77r`u4Z*na$kNzvs@XY&NM5^eIt& z)+Q5{w&rFvV@uzDn+K_O+dk#SO}RPq+d_>a*S5+%<T}HWSf45M@%MUl8R`De1VM@I zQpL^S@*h^#Gu{9eQ&)i47FyP`qUA!8%VtPfZ)9j<Xl86^Vg@Pe5nKZ!q`Jc`2(9iA zH4p}t8^F4Qr?|2>CqF$oCo?s#!~kD;zdG9Od)XD9bw{*}{cekLS34L@`5bHeqj}EJ z*OQbK%bv3oPg7Gd@=E!gVtk<}?A(RENR{N|Ta6AMwT!PQJ$gRxx`s)mzsOX1KC_=n zCvBz8YrFhs?!CS4M)bR<%`4vM#4olh6x!Js;{Qv>jDJy?@4D<y%7TVVx#v54>JZqm z-hdNa-lGK?sOU2PwQl`{q@Z-hTTk9?U#y^cNMm#2ohj3Ac4(dNiIfV>KDc%UXZ7#( zW<}XX`#k+MKHqt=ygw$+{L<V1`*-%n^j(=F^V#+LW!0>0h37*fPnr9q^VKXAU7EYk zwxaLx=j3IwNz!U3TRYOWc)2Bf&#C=>PAONaB&&5dv-zQ}r>@gvGDoZP(dr!0kQlAb cLDhNW!;Hy)AN?-$cQjjY;qS8SBJuUf0L-EwA^-pY literal 0 HcmV?d00001 diff --git a/gazelle-proxy-netty/src/test/resources/keys/186.jks b/gazelle-proxy-netty/src/test/resources/keys/186.jks new file mode 100644 index 0000000000000000000000000000000000000000..bc00bf5439435e176e95b2298d23ddbc89410f07 GIT binary patch literal 2838 zcmezO_TO6u1_mZLW-H3iFG)^hU|=+@+55(efi*(U)WDK~ftk~wiJ8@)i79UZGZP~d z6C<MmFB_*;n@8JsUPeY<Rt5t-Lv903Hs(+kHen`b4?`XUE)a){huPD^)lkrYAH-wk z;c!YV$}=)BG%}DA=LM1=WNKnyY7iyPYlO@t*}TU2$Sz`JWngaXWiV*$WNK_=c)GLg zmt)WVB`zEux#jJfme1Vm{LSv|L$3^*#fPS+ik(}lyua~IOoPdfs&b<Wm4*Hh6XZg* z5*Qht#70^--1Ml}|HG@gYt7Sj?emZP(-RIz`{Hji@l!y}O19HSl=v^quv@xd)&7_% zezT=lU$kLa-QB2QcTwzfp4@G<Ssmgb^VdFSVrFDuT-?NHXwbx{YhViu3R!s;GXoO? zqXh;F^xAYXN=gc>^!3vdt5S1vQuQ)3QuXpuOY{q}Gxd{;a`X)?4E2)}fh;{BHn3*n zOlb39Z2RHF$ikv0Mz&^Vk~Q;z9L~?k_@9LZm<ZUwaVjee;<Fks11SSpkODpyF&2?) zi3&SJ_r2)JPm>D$w?lW+P5p~E4dg-6$}AEFVhz|82qL@&^cyo113Pk@0#g|?Ff#W{ z+xKM^m*MZ5@k>O{w)|w>nV|IM!}rF_ZxNEBGW;5*4_4SdoU7L{!}DO$mn8iK>l-ZJ ze%v(6OjSQ{yX>WB+2^;MIbNYIr?Khw^n<q-9##~;V#~F*NcrCCZ8zOdyxbFeWY>XB zKeW7+(w6OwT2@hWRxr8p^`j5o>JmTeUwCI)rOyQB6-EZOlKkA{#1eQuVPM(~%pBVd z_}I9#*%(<EwU`7MfoYJXiD_}#;;;WK)dIZFtf;m;sJHXQ$t~|)+NY_8TfVURRde>! zFB{H<^NaLtlrCtVl)D!x^ow&xsp^-A8p}m{dOzRUdPVW}&S@`xxcuf{UjEH?mc!3_ zf2+w;UaNRbnOn6YrlV8L_k7FQcZw3Px9G2Zbw$*7dee#d(<VBVJ5A$Q_eXMB;HT-5 z^E2<AOq9{;Pq^GAUwzQW|6OK*<O{LIhGGVPZ#%8qWS()<*r8Wive%|+N9HF%gS4x+ zY^yJZMPA&Kqg9ug_i2smVs%s9nre^xl}`70FP@mW@JW{H`H-a#x=-EOR-K=ueovUW zxiE+&m^XUr3>B8vGB4Q&o#kKe2v6bEJe<6i<882}T#DF)Gml<xoZnT&)s~Siv}>19 z@$u(r{vF8%;ofJps+ZhsEogWvb&375Me(EdmcwTc78@Ebn)szPT$Jqv>k;c|QGYw{ zo@~wXOfm_}TrR)GleNgREL`4)(cLQY<qJ-ZmWA&ovYXw!Gkd3R`@T256T<KO^z7Zd zezNxhjxV3SJpT0P#nulJb{;=gthN2YDl_--XRFCf^K_T5>$14Qvi}i7*vjoUt@npJ zPPi7nVeJ$99n(v$8vi){d{Wb*$DzJ9QGDtq?9DqjIV$)beYsv@d-iEgo=0rE&o4Jx zzNp;9+BfjGs<Xs7&7{lxP9F-@D@~uMs!h7}LDa<c;+m3uhirbaz7#Nfom(03RA}|t zL$6$o`B=Q?|5>Wgyj?&#sqLp6_b087M>cV#?^d4RfB4jW<}NMen<sB{PZqM%bUa+J z*!9u6ob+>nXLA34l)NK&uQ$H(;-;>kve5fYhv$BNeB{J4WwW~J@|r>^2cF)3sFGkU ze)7BX4M|O3QI^`$P{WgdjO6-ELzvF`a}}2@iw)W-6U$<Gu_Wj2!;bsEA8@<R{UF4t zT6+gv{KJZR#v8y=>Ix9sLW_Dfv`k2H(F`f-jSNi;&5R9A%ppZRf@@%eRCTxop;aBC z2ExE%16XzN6jv7K<fj*>7L}zI8Q?4KXW9ST+As3@ZFQYfkL!n*zb3fx<ea#>;+}m` zdcY#zYi@;aR5O0~eo&aW=uy-84>pJPRKA#|(iF$3urOkJZ2#ruYM)-1awYmp+w0hR z*}lAO|HjY2oq5fL{|)iYGi2WCR&nwy6rJ|+Mg95>uLK%(L%(cXq9P}y|9tX;1F|)V z^}9BLi+i*{1C?BXiMr2X{}wl~7-(rKZJOCLeM+83*1Y=DN&Ba*eY0tA&D;3+Sq?RM z?PoMEX36$^<o>v^L-I85tB1d(8Mw`zi{EPh`2YV5``%yLx<w^31Em%|jmZ3ca896c z$kWA*wYyEFPiws`dd!ivLMFBOLmm6s<ob0T+m2PU-?(!9+>GT{{wR;u=A*Saq8%|> dn}cfev@-&wZ0EYzUu1c0niO#I<;OOoGyt%JC?Nm< literal 0 HcmV?d00001 -- GitLab