Skip to content

Commit

Permalink
COH-31673: Build: Failures in the SSL tests Ant script should fail th…
Browse files Browse the repository at this point in the history
…e build (14.1.1.0 cl 113904 --> ce/14.1.1.0)

[git-p4: depot-paths = "//dev/coherence-ce/release/coherence-ce-v14.1.1.0/": change = 113968]
  • Loading branch information
fryp committed Feb 2, 2025
1 parent de37b41 commit eeffdee
Showing 1 changed file with 40 additions and 40 deletions.
80 changes: 40 additions & 40 deletions prj/test/functional/ssl/build.xml
Original file line number Diff line number Diff line change
Expand Up @@ -37,146 +37,146 @@
</delete>

<!-- Create the CA key and cert -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="genrsa -passout pass:1111 -des3 -out target/ca/cakey.pem 4096"/>
</exec>
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="req -passin pass:1111 -new -x509 -days 3650 -key target/ca/cakey.pem -out target/ca/cacert.pem -subj '/C=US/ST=MA/L=Burlington/O=Oracle/CN=CA'"/>
</exec>

<!-- Create the client key -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="genrsa -passout pass:1111 -des3 -out target/test-classes/client.key 4096"/>
</exec>

<!-- Create the server key -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="genrsa -passout pass:1111 -des3 -out target/test-classes/server.key 4096"/>
</exec>

<!-- Create the guest key -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="genrsa -passout pass:1111 -des3 -out target/test-classes/guest.key 4096"/>
</exec>

<!-- Create the client signing request -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="req -passin pass:1111 -new -key target/test-classes/client.key -out target/test-classes/client.csr -subj '/C=US/ST=MA/L=Burlington/O=Oracle/CN=client'"/>
</exec>

<!-- Create the server signing request -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="req -passin pass:1111 -new -key target/test-classes/server.key -out target/test-classes/server.csr -subj '/C=US/ST=MA/L=Burlington/O=Oracle/CN=server'"/>
</exec>

<!-- Create the guest signing request -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="req -passin pass:1111 -new -key target/test-classes/guest.key -out target/test-classes/guest.csr -subj '/C=US/ST=MA/L=Burlington/O=Oracle/CN=guest'"/>
</exec>

<!-- Create Self-signed client certificate -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="x509 -req -passin pass:1111 -days 3650 -in target/test-classes/client.csr -CA target/ca/cacert.pem -CAkey target/ca/cakey.pem -set_serial 01 -out target/test-classes/client.chain"/>
</exec>

<!-- Create Self-signed server certificate -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="x509 -req -passin pass:1111 -days 3650 -in target/test-classes/server.csr -CA target/ca/cacert.pem -CAkey target/ca/cakey.pem -set_serial 01 -out target/test-classes/server.chain"/>
</exec>

<!-- Create Self-signed guest certificate -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="x509 -req -passin pass:1111 -days 3650 -in target/test-classes/guest.csr -CA target/ca/cacert.pem -CAkey target/ca/cakey.pem -set_serial 01 -out target/test-classes/guest.chain"/>
</exec>

<!-- Remove passphrase from client key -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="rsa -passin pass:1111 -in target/test-classes/client.key -out target/test-classes/client.key"/>
</exec>

<!-- Remove passphrase from server key -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="rsa -passin pass:1111 -in target/test-classes/server.key -out target/test-classes/server.key"/>
</exec>

<!-- Remove passphrase from guest key -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="rsa -passin pass:1111 -in target/test-classes/guest.key -out target/test-classes/guest.key"/>
</exec>

<!-- Create client.pem from client key -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="pkcs8 -topk8 -nocrypt -in target/test-classes/client.key -out target/test-classes/client.pem"/>
</exec>

<!-- Create server.pem from client key -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="pkcs8 -topk8 -nocrypt -in target/test-classes/server.key -out target/test-classes/server.pem"/>
</exec>

<!-- Create guest.pem from client key -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="pkcs8 -topk8 -nocrypt -in target/test-classes/guest.key -out target/test-classes/guest.pem"/>
</exec>

<!-- Create client.p12 from client.pem -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="pkcs12 -export -passout pass:private -inkey target/test-classes/client.pem -name client -in target/test-classes/client.chain -out target/test-classes/client.p12"/>
</exec>

<!-- Create server.p12 from server.pem -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="pkcs12 -export -passout pass:private -inkey target/test-classes/server.pem -name server -in target/test-classes/server.chain -out target/test-classes/server.p12"/>
</exec>

<!-- Create guest.p12 from guest.pem -->
<exec executable="openssl">
<exec executable="openssl" failonerror="true">
<arg line="pkcs12 -export -passout pass:private -inkey target/test-classes/guest.pem -name guest -in target/test-classes/guest.chain -out target/test-classes/guest.p12"/>
</exec>

<!-- Create the client keystore -->
<exec executable="${keytool}">
<exec executable="${keytool}" failonerror="true">
<arg line="-importkeystore -storepass password -noprompt -srcstorepass private -srckeystore target/test-classes/client.p12 -srcstoretype pkcs12 -destkeypass private -deststoretype JKS -destkeystore target/test-classes/client.jks"/>
</exec>

<!-- Create the server keystore -->
<exec executable="${keytool}">
<exec executable="${keytool}" failonerror="true">
<arg line="-importkeystore -storepass password -noprompt -srcstorepass private -srckeystore target/test-classes/server.p12 -srcstoretype pkcs12 -destkeypass private -deststoretype JKS -destkeystore target/test-classes/server.jks"/>
</exec>

<!-- Create the guest keystore -->
<exec executable="${keytool}">
<exec executable="${keytool}" failonerror="true">
<arg line="-importkeystore -storepass password -noprompt -srcstorepass private -srckeystore target/test-classes/guest.p12 -srcstoretype pkcs12 -destkeypass private -deststoretype JKS -destkeystore target/test-classes/guest.jks"/>
</exec>

<!-- Create the rogue keystore -->
<exec executable="${keytool}">
<exec executable="${keytool}" failonerror="true">
<arg line="-genkey -keyalg RSA -keysize 4096 -validity 3650 -dname 'CN=rogue, O=Evil, L=Eviland, ST=EV, C=US' -alias rogue -keypass private -keystore target/test-classes/rogue.jks -storepass password -storetype JKS"/>
</exec>

<!-- Create the process keystore and certificate -->
<exec executable="${keytool}">
<exec executable="${keytool}" failonerror="true">
<arg line="-genkey -keyalg RSA -keysize 4096 -validity 3650 -dname 'CN=process, O=Oracle, L=Burlington, ST=MA, C=US' -alias process -storetype JKS -keystore target/test-classes/process.jks -keypass private -storepass password"/>
</exec>
<exec executable="${keytool}">
<exec executable="${keytool}" failonerror="true">
<arg line="-exportcert -alias process -file target/test-classes/process.pem -keystore target/test-classes/process.jks -storepass password"/>
</exec>

<!-- Create the peer keystore and certificate -->
<exec executable="${keytool}">
<exec executable="${keytool}" failonerror="true">
<arg line="-importkeystore -storepass password -noprompt -srcstorepass private -srckeystore target/test-classes/client.p12 -srcstoretype pkcs12 -destkeypass private -deststoretype JKS -destkeystore target/test-classes/peer.jks"/>
</exec>
<exec executable="${keytool}">
<exec executable="${keytool}" failonerror="true">
<arg line="-importkeystore -storepass password -noprompt -srcstorepass private -srckeystore target/test-classes/server.p12 -srcstoretype pkcs12 -destkeypass private -deststoretype JKS -destkeystore target/test-classes/peer.jks"/>
</exec>

<!-- Create the trust keystore -->
<exec executable="${keytool}">
<exec executable="${keytool}" failonerror="true">
<arg line="-importcert -noprompt -alias CA -file target/ca/cacert.pem -keystore target/test-classes/trust.jks -storepass password"/>
</exec>

<!-- Create the self-signed trust keystore -->
<exec executable="${keytool}">
<exec executable="${keytool}" failonerror="true">
<arg line="-importcert -noprompt -alias process -file target/test-classes/process.pem -keystore target/test-classes/trust-ss.jks -storepass password"/>
</exec>
</target>
Expand All @@ -188,17 +188,17 @@
</delete>

<!-- Create the client CSR -->
<exec executable="keytool">
<exec executable="${keytool}" failonerror="true">
<arg line="-certreq -alias client -file target/test-classes/client.csr -keypass private -keystore target/test-classes/client.jks -storepass password"/>
</exec>

<!-- Create the server CSR -->
<exec executable="keytool">
<exec executable="${keytool}" failonerror="true">
<arg line="-certreq -alias server -file target/test-classes/server.csr -keypass private -keystore target/test-classes/server.jks -storepass password"/>
</exec>

<!-- Create the guest CSR -->
<exec executable="keytool">
<exec executable="${keytool}" failonerror="true">
<arg line="-certreq -alias guest -file target/test-classes/guest.csr -keypass private -keystore target/test-classes/guest.jks -storepass password"/>
</exec>
</target>
Expand All @@ -210,35 +210,35 @@
</delete>

<!-- Update the client keystore -->
<exec executable="keytool">
<exec executable="${keytool}" failonerror="true">
<arg line="-import -alias client -noprompt -file target/test-classes/client.chain -keypass private -keystore target/test-classes/client.jks -storepass password"/>
</exec>

<!-- Update the server keystore -->
<exec executable="keytool">
<exec executable="${keytool}" failonerror="true">
<arg line="-import -alias server -noprompt -file target/test-classes/server.chain -keypass private -keystore target/test-classes/server.jks -storepass password"/>
</exec>

<!-- Update the guest keystore -->
<exec executable="keytool">
<exec executable="${keytool}" failonerror="true">
<arg line="-import -alias guest -noprompt -file target/test-classes/guest.chain -keypass private -keystore target/test-classes/guest.jks -storepass password"/>
</exec>

<!-- Export the client certificate -->
<exec executable="keytool">
<exec executable="${keytool}" failonerror="true">
<arg line="-exportcert -alias client -file target/test-classes/client.pem -keystore target/test-classes/client.jks -storepass password"/>
</exec>

<!-- Export the server certificate -->
<exec executable="keytool">
<exec executable="${keytool}" failonerror="true">
<arg line="-exportcert -alias server -file target/test-classes/server.pem -keystore target/test-classes/server.jks -storepass password"/>
</exec>

<!-- Create the peer keystore -->
<exec executable="keytool">
<exec executable="${keytool}" failonerror="true">
<arg line="-importcert -noprompt -alias client -file target/test-classes/client.pem -keystore target/test-classes/peer.jks -storepass password"/>
</exec>
<exec executable="keytool">
<exec executable="${keytool}" failonerror="true">
<arg line="-importcert -noprompt -alias server -file target/test-classes/server.pem -keystore target/test-classes/peer.jks -storepass password"/>
</exec>
</target>
Expand Down

0 comments on commit eeffdee

Please sign in to comment.