This is an automated email from the ASF dual-hosted git repository.
liubao pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/servicecomb-java-chassis.git
The following commit(s) were added to refs/heads/master by this push:
new b7a9cb4 fix typo and test case assert not correct in higher version
of JDK (#2089)
b7a9cb4 is described below
commit b7a9cb4bc86d770a9c4c304071324384e5081408
Author: bao liu <[email protected]>
AuthorDate: Fri Nov 27 14:56:46 2020 +0800
fix typo and test case assert not correct in higher version of JDK (#2089)
---
.../servicecomb/foundation/ssl/SSLManager.java | 2 +-
.../servicecomb/foundation/ssl/SSLManagerTest.java | 32 ++++++++++++----------
.../foundation/vertx/VertxTLSBuilder.java | 2 +-
3 files changed, 19 insertions(+), 17 deletions(-)
diff --git
a/foundations/foundation-ssl/src/main/java/org/apache/servicecomb/foundation/ssl/SSLManager.java
b/foundations/foundation-ssl/src/main/java/org/apache/servicecomb/foundation/ssl/SSLManager.java
index a505973..0b28c5b 100644
---
a/foundations/foundation-ssl/src/main/java/org/apache/servicecomb/foundation/ssl/SSLManager.java
+++
b/foundations/foundation-ssl/src/main/java/org/apache/servicecomb/foundation/ssl/SSLManager.java
@@ -189,7 +189,7 @@ public final class SSLManager {
return r;
}
- public static String[] getEnalbedCiphers(String enabledCiphers) {
+ public static String[] getEnabledCiphers(String enabledCiphers) {
SSLOption option = new SSLOption();
option.setProtocols("TLSv1.2");
option.setCiphers(enabledCiphers);
diff --git
a/foundations/foundation-ssl/src/test/java/org/apache/servicecomb/foundation/ssl/SSLManagerTest.java
b/foundations/foundation-ssl/src/test/java/org/apache/servicecomb/foundation/ssl/SSLManagerTest.java
index d1b1476..3121367 100644
---
a/foundations/foundation-ssl/src/test/java/org/apache/servicecomb/foundation/ssl/SSLManagerTest.java
+++
b/foundations/foundation-ssl/src/test/java/org/apache/servicecomb/foundation/ssl/SSLManagerTest.java
@@ -199,7 +199,8 @@ public class SSLManagerTest {
};
SSLEngine aSSLEngine = SSLManager.createSSLEngine(option, custom);
- Assert.assertEquals(false, aSSLEngine.getUseClientMode());
+ // if client mode may not decided at initialization. Different JDK is
different, do not check it.
+ // Assert.assertEquals(false, aSSLEngine.getUseClientMode());
Assert.assertNotNull(aSSLEngine);
}
@@ -222,7 +223,7 @@ public class SSLManagerTest {
String peerHost = "host1";
SSLEngine aSSLEngine = SSLManager.createSSLEngine(option, custom,
peerHost, port);
Assert.assertNotNull(aSSLEngine);
- Assert.assertEquals("host1", aSSLEngine.getPeerHost().toString());
+ Assert.assertEquals("host1", aSSLEngine.getPeerHost());
}
@Test
@@ -249,8 +250,8 @@ public class SSLManagerTest {
};
try {
- SSLContext context = SSLManager.createSSLContext(option, custom);
- Assert.assertNotNull(context);
+ SSLManager.createSSLContext(option, custom);
+ Assert.assertNotNull(null);
} catch (Exception e) {
Assert.assertEquals("java.lang.IllegalArgumentException",
e.getClass().getName());
}
@@ -280,8 +281,8 @@ public class SSLManagerTest {
};
try {
- SSLContext context = SSLManager.createSSLContext(option, custom);
- Assert.assertNotNull(context);
+ SSLManager.createSSLContext(option, custom);
+ Assert.assertNotNull(null);
} catch (Exception e) {
Assert.assertEquals("java.lang.IllegalArgumentException",
e.getClass().getName());
}
@@ -311,9 +312,9 @@ public class SSLManagerTest {
};
try {
- SSLServerSocket context = SSLManager.createSSLServerSocket(option,
custom);
+ SSLManager.createSSLServerSocket(option, custom);
- Assert.assertNotNull(context);
+ Assert.assertNotNull(null);
} catch (Exception e) {
Assert.assertEquals("java.lang.IllegalArgumentException",
e.getClass().getName());
}
@@ -343,8 +344,8 @@ public class SSLManagerTest {
};
try {
- SSLServerSocket context = SSLManager.createSSLServerSocket(option,
custom);
- Assert.assertNotNull(context);
+ SSLManager.createSSLServerSocket(option, custom);
+ Assert.assertNotNull(null);
} catch (Exception e) {
Assert.assertEquals("java.lang.IllegalArgumentException",
e.getClass().getName());
}
@@ -374,8 +375,8 @@ public class SSLManagerTest {
};
try {
- SSLSocket context = SSLManager.createSSLSocket(option, custom);
- Assert.assertNotNull(context);
+ SSLManager.createSSLSocket(option, custom);
+ Assert.assertNotNull(null);
} catch (Exception e) {
Assert.assertEquals("java.lang.IllegalArgumentException",
e.getClass().getName());
}
@@ -405,8 +406,8 @@ public class SSLManagerTest {
};
try {
- SSLSocket context = SSLManager.createSSLSocket(option, custom);
- Assert.assertNotNull(context);
+ SSLManager.createSSLSocket(option, custom);
+ Assert.assertNotNull(null);
} catch (Exception e) {
Assert.assertEquals("java.lang.IllegalArgumentException",
e.getClass().getName());
}
@@ -431,8 +432,9 @@ public class SSLManagerTest {
Assert.assertNotNull(aSSLSocketFactory.getDefaultCipherSuites()[0]);
}
+ @Test
public void testGetSupportedCiphers() {
- String[] ciphers =
SSLManager.getEnalbedCiphers("TLS_RSA_WITH_AES_128_GCM_SHA256");
+ String[] ciphers =
SSLManager.getEnabledCiphers("TLS_RSA_WITH_AES_128_GCM_SHA256");
Assert.assertEquals(ciphers[0], "TLS_RSA_WITH_AES_128_GCM_SHA256");
}
}
diff --git
a/foundations/foundation-vertx/src/main/java/org/apache/servicecomb/foundation/vertx/VertxTLSBuilder.java
b/foundations/foundation-vertx/src/main/java/org/apache/servicecomb/foundation/vertx/VertxTLSBuilder.java
index 790c764..5f8434d 100644
---
a/foundations/foundation-vertx/src/main/java/org/apache/servicecomb/foundation/vertx/VertxTLSBuilder.java
+++
b/foundations/foundation-vertx/src/main/java/org/apache/servicecomb/foundation/vertx/VertxTLSBuilder.java
@@ -141,7 +141,7 @@ public final class VertxTLSBuilder {
tcpClientOptions
.setEnabledSecureTransportProtocols(new
HashSet<String>(Arrays.asList(sslOption.getProtocols().split(","))));
- for (String cipher : SSLManager.getEnalbedCiphers(sslOption.getCiphers()))
{
+ for (String cipher : SSLManager.getEnabledCiphers(sslOption.getCiphers()))
{
tcpClientOptions.addEnabledCipherSuite(cipher);
}