Repository: incubator-geode
Updated Branches:
  refs/heads/develop 18c2dc3fb -> f3b0d0e15


GEODE-420: Adding test to SSLConfigurationFactoryJUnitTest.java to test for 
non-ssl configurations


Project: http://git-wip-us.apache.org/repos/asf/incubator-geode/repo
Commit: http://git-wip-us.apache.org/repos/asf/incubator-geode/commit/f3b0d0e1
Tree: http://git-wip-us.apache.org/repos/asf/incubator-geode/tree/f3b0d0e1
Diff: http://git-wip-us.apache.org/repos/asf/incubator-geode/diff/f3b0d0e1

Branch: refs/heads/develop
Commit: f3b0d0e15df54b4014dbec976c62cfbdde6f34db
Parents: 18c2dc3
Author: Udo Kohlmeyer <ukohlme...@pivotal.io>
Authored: Wed Oct 5 11:31:30 2016 +1100
Committer: Udo Kohlmeyer <ukohlme...@pivotal.io>
Committed: Wed Oct 5 11:31:30 2016 +1100

----------------------------------------------------------------------
 .../net/SSLConfigurationFactoryJUnitTest.java   | 37 ++++++++++++--------
 1 file changed, 23 insertions(+), 14 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/incubator-geode/blob/f3b0d0e1/geode-core/src/test/java/org/apache/geode/internal/net/SSLConfigurationFactoryJUnitTest.java
----------------------------------------------------------------------
diff --git 
a/geode-core/src/test/java/org/apache/geode/internal/net/SSLConfigurationFactoryJUnitTest.java
 
b/geode-core/src/test/java/org/apache/geode/internal/net/SSLConfigurationFactoryJUnitTest.java
index 29ef943..80d195d 100644
--- 
a/geode-core/src/test/java/org/apache/geode/internal/net/SSLConfigurationFactoryJUnitTest.java
+++ 
b/geode-core/src/test/java/org/apache/geode/internal/net/SSLConfigurationFactoryJUnitTest.java
@@ -41,6 +41,16 @@ public class SSLConfigurationFactoryJUnitTest {
   }
 
   @Test
+  public void getNonSSLConfiguration() throws Exception {
+    Properties properties = new Properties();
+    DistributionConfigImpl distributionConfig = new 
DistributionConfigImpl(properties);
+    SSLConfigurationFactory.setDistributionConfig(distributionConfig);
+    for (SecurableCommunicationChannel securableComponent : 
SecurableCommunicationChannel.values()) {
+      assertSSLConfig(properties, 
SSLConfigurationFactory.getSSLConfigForComponent(securableComponent), 
securableComponent, distributionConfig);
+    }
+  }
+
+  @Test
   public void getSSLConfigWithCommaDelimitedProtocols() throws Exception {
     Properties properties = new Properties();
     properties.setProperty(SSL_ENABLED_COMPONENTS, "all");
@@ -157,21 +167,20 @@ public class SSLConfigurationFactoryJUnitTest {
     }
   }
 
-  private void assertSSLConfig(final Properties properties,
-                               final SSLConfig sslConfig,
-                               final SecurableCommunicationChannel 
expectedSecurableComponent,
-                               final DistributionConfigImpl 
distributionConfig) {
+  private void assertSSLConfig(final Properties properties, final SSLConfig 
sslConfig, final SecurableCommunicationChannel expectedSecurableComponent, 
final DistributionConfigImpl distributionConfig) {
     assertEquals(isSSLComponentEnabled(expectedSecurableComponent, 
distributionConfig.getSecurableCommunicationChannels()), sslConfig.isEnabled());
-    assertEquals(properties.getProperty(SSL_KEYSTORE), 
sslConfig.getKeystore());
-    assertEquals(properties.getProperty(SSL_KEYSTORE_PASSWORD), 
sslConfig.getKeystorePassword());
-    assertEquals(properties.getProperty(SSL_KEYSTORE_TYPE), 
sslConfig.getKeystoreType());
-    assertEquals(properties.getProperty(SSL_TRUSTSTORE), 
sslConfig.getTruststore());
-    assertEquals(properties.getProperty(SSL_TRUSTSTORE_PASSWORD), 
sslConfig.getTruststorePassword());
-    assertEquals(properties.getProperty(SSL_CIPHERS).replace(","," "), 
sslConfig.getCiphers());
-    assertEquals(properties.getProperty(SSL_PROTOCOLS).replace(","," "), 
sslConfig.getProtocols());
-    assertEquals(getCorrectAlias(expectedSecurableComponent, properties), 
sslConfig.getAlias());
-    assertEquals(requiresAuthentication(properties, 
expectedSecurableComponent), sslConfig.isRequireAuth());
-    assertEquals(expectedSecurableComponent, 
sslConfig.getSecuredCommunicationChannel());
+    if (sslConfig.isEnabled()) {
+      assertEquals(properties.getProperty(SSL_KEYSTORE), 
sslConfig.getKeystore());
+      assertEquals(properties.getProperty(SSL_KEYSTORE_PASSWORD), 
sslConfig.getKeystorePassword());
+      assertEquals(properties.getProperty(SSL_KEYSTORE_TYPE), 
sslConfig.getKeystoreType());
+      assertEquals(properties.getProperty(SSL_TRUSTSTORE), 
sslConfig.getTruststore());
+      assertEquals(properties.getProperty(SSL_TRUSTSTORE_PASSWORD), 
sslConfig.getTruststorePassword());
+      assertEquals(properties.getProperty(SSL_CIPHERS).replace(",", " "), 
sslConfig.getCiphers());
+      assertEquals(properties.getProperty(SSL_PROTOCOLS).replace(",", " "), 
sslConfig.getProtocols());
+      assertEquals(getCorrectAlias(expectedSecurableComponent, properties), 
sslConfig.getAlias());
+      assertEquals(requiresAuthentication(properties, 
expectedSecurableComponent), sslConfig.isRequireAuth());
+      assertEquals(expectedSecurableComponent, 
sslConfig.getSecuredCommunicationChannel());
+    }
   }
 
   private boolean requiresAuthentication(final Properties properties, final 
SecurableCommunicationChannel expectedSecurableComponent) {

Reply via email to