This is an automated email from the ASF dual-hosted git repository.

robbie pushed a commit to branch 0.x
in repository https://gitbox.apache.org/repos/asf/qpid-jms.git

commit cfeddfe8830166dcb8c43f781bb1f389fe5df7f5
Author: Robbie Gemmell <rob...@apache.org>
AuthorDate: Fri Jul 23 18:04:08 2021 +0100

    NO-JIRA: consolidate on use of pkcs12 stores for test server
    
    removes already-unused jceks and now-unused jks stores (converted one to 
pkcs12), and simplify creation steps accordingly
    
    (cherry picked from commit c24b9bd2b91be2a4be21512e4b48c56394080f22)
---
 .../qpid/jms/integration/ProxyIntegrationTest.java |   8 +--
 .../qpid/jms/integration/SaslIntegrationTest.java  |  12 ++---
 .../qpid/jms/integration/SslIntegrationTest.java   |  55 +++++++--------------
 .../qpid/jms/integration/WsIntegrationTest.java    |   4 +-
 ...hAmqpOpenProvidedServerListIntegrationTest.java |  24 ++++-----
 .../qpid/jms/transports/TransportSupportTest.java  |   4 --
 .../transports/netty/NettySslTransportTest.java    |   7 ++-
 qpid-jms-client/src/test/resources/README.txt      |  17 ++-----
 .../src/test/resources/broker-jceks.keystore       | Bin 3762 -> 0 bytes
 .../src/test/resources/broker-jceks.truststore     | Bin 843 -> 0 bytes
 .../src/test/resources/broker-jks.keystore         | Bin 3782 -> 0 bytes
 .../src/test/resources/broker-jks.truststore       | Bin 843 -> 0 bytes
 .../resources/broker-wrong-host-pkcs12.keystore    | Bin 0 -> 4349 bytes
 13 files changed, 51 insertions(+), 80 deletions(-)

diff --git 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/ProxyIntegrationTest.java
 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/ProxyIntegrationTest.java
index 96fd7b7..b2efc8a 100644
--- 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/ProxyIntegrationTest.java
+++ 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/ProxyIntegrationTest.java
@@ -69,7 +69,7 @@ import io.netty.handler.proxy.Socks5ProxyHandler;
 @RunWith(QpidJMSTestRunner.class)
 public class ProxyIntegrationTest extends QpidJmsTestCase {
     private static final Logger LOG = 
LoggerFactory.getLogger(ProxyIntegrationTest.class);
-    private static final String BROKER_JKS_KEYSTORE = 
"src/test/resources/broker-jks.keystore";
+    private static final String BROKER_PKCS12_KEYSTORE = 
"src/test/resources/broker-pkcs12.keystore";
     private static final String CLIENT_JKS_TRUSTSTORE = 
"src/test/resources/client-jks.truststore";
     private static final String PASSWORD = "password";
 
@@ -98,7 +98,7 @@ public class ProxyIntegrationTest extends QpidJmsTestCase {
     @Test(timeout = 20000)
     public void testCreateSecureConnectionViaSocksProxy() throws Exception {
         TransportOptions sslOptions = new TransportOptions();
-        sslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
+        sslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
         sslOptions.setKeyStorePassword(PASSWORD);
         sslOptions.setVerifyHost(false);
 
@@ -232,7 +232,7 @@ public class ProxyIntegrationTest extends QpidJmsTestCase {
 
     private void doTestCreateWebSocketConnectionViaHttpProxyAndStart(boolean 
secure) throws Exception {
         TransportOptions options = new TransportOptions();
-        options.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
+        options.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
         options.setKeyStorePassword(PASSWORD);
         options.setVerifyHost(false);
 
@@ -290,7 +290,7 @@ public class ProxyIntegrationTest extends QpidJmsTestCase {
 
     private void doTestCreateWebSocketConnectionViaSocksProxyAndStart(boolean 
secure) throws Exception {
         TransportOptions serverOptions = new TransportOptions();
-        serverOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
+        serverOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
         serverOptions.setKeyStorePassword(PASSWORD);
         serverOptions.setVerifyHost(false);
 
diff --git 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/SaslIntegrationTest.java
 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/SaslIntegrationTest.java
index 8c8f8de..91ffda1 100644
--- 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/SaslIntegrationTest.java
+++ 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/SaslIntegrationTest.java
@@ -70,8 +70,8 @@ public class SaslIntegrationTest extends QpidJmsTestCase {
     private static final UnsignedByte SASL_SYS_PERM = 
UnsignedByte.valueOf((byte) 3);
     private static final UnsignedByte SASL_SYS_TEMP = 
UnsignedByte.valueOf((byte) 4);
 
-    private static final String BROKER_JKS_KEYSTORE = 
"src/test/resources/broker-jks.keystore";
-    private static final String BROKER_JKS_TRUSTSTORE = 
"src/test/resources/broker-jks.truststore";
+    private static final String BROKER_PKCS12_KEYSTORE = 
"src/test/resources/broker-pkcs12.keystore";
+    private static final String BROKER_PKCS12_TRUSTSTORE = 
"src/test/resources/broker-pkcs12.truststore";
     private static final String CLIENT_JKS_KEYSTORE = 
"src/test/resources/client-jks.keystore";
     private static final String CLIENT_JKS_TRUSTSTORE = 
"src/test/resources/client-jks.truststore";
     private static final String PASSWORD = "password";
@@ -79,10 +79,10 @@ public class SaslIntegrationTest extends QpidJmsTestCase {
     @Test(timeout = 20000)
     public void testSaslExternalConnection() throws Exception {
         TransportOptions sslOptions = new TransportOptions();
-        sslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
+        sslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
         sslOptions.setKeyStorePassword(PASSWORD);
         sslOptions.setVerifyHost(false);
-        sslOptions.setTrustStoreLocation(BROKER_JKS_TRUSTSTORE);
+        sslOptions.setTrustStoreLocation(BROKER_PKCS12_TRUSTSTORE);
         sslOptions.setTrustStorePassword(PASSWORD);
 
         String connOptions = "?transport.trustStoreLocation=" + 
CLIENT_JKS_TRUSTSTORE + "&" +
@@ -342,11 +342,11 @@ public class SaslIntegrationTest extends QpidJmsTestCase {
 
     private void doMechanismSelectedExternalTestImpl(boolean 
requireClientCert, Symbol clientSelectedMech, Symbol[] serverMechs) throws 
Exception {
         TransportOptions sslOptions = new TransportOptions();
-        sslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
+        sslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
         sslOptions.setKeyStorePassword(PASSWORD);
         sslOptions.setVerifyHost(false);
         if (requireClientCert) {
-            sslOptions.setTrustStoreLocation(BROKER_JKS_TRUSTSTORE);
+            sslOptions.setTrustStoreLocation(BROKER_PKCS12_TRUSTSTORE);
             sslOptions.setTrustStorePassword(PASSWORD);
         }
 
diff --git 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/SslIntegrationTest.java
 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/SslIntegrationTest.java
index e1668a7..ccb9e7b 100644
--- 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/SslIntegrationTest.java
+++ 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/SslIntegrationTest.java
@@ -53,9 +53,7 @@ import io.netty.handler.ssl.OpenSsl;
 
 public class SslIntegrationTest extends QpidJmsTestCase {
 
-    private static final String BROKER_JKS_KEYSTORE = 
"src/test/resources/broker-jks.keystore";
     private static final String BROKER_PKCS12_KEYSTORE = 
"src/test/resources/broker-pkcs12.keystore";
-    private static final String BROKER_JKS_TRUSTSTORE = 
"src/test/resources/broker-jks.truststore";
     private static final String BROKER_PKCS12_TRUSTSTORE = 
"src/test/resources/broker-pkcs12.truststore";
     private static final String CLIENT_MULTI_KEYSTORE = 
"src/test/resources/client-multiple-keys-jks.keystore";
     private static final String CLIENT_JKS_TRUSTSTORE = 
"src/test/resources/client-jks.truststore";
@@ -100,7 +98,7 @@ public class SslIntegrationTest extends QpidJmsTestCase {
 
     private void testCreateAndCloseSslConnection(boolean openSSL) throws 
Exception {
         TransportOptions sslOptions = new TransportOptions();
-        sslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
+        sslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
         sslOptions.setKeyStorePassword(PASSWORD);
         sslOptions.setVerifyHost(false);
 
@@ -135,7 +133,7 @@ public class SslIntegrationTest extends QpidJmsTestCase {
 
     private void 
doTestCreateSslConnectionWithServerSendingPreemptiveData(boolean openSSL) 
throws Exception {
         TransportOptions serverSslOptions = new TransportOptions();
-        serverSslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
+        serverSslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
         serverSslOptions.setKeyStorePassword(PASSWORD);
         serverSslOptions.setVerifyHost(false);
 
@@ -179,8 +177,8 @@ public class SslIntegrationTest extends QpidJmsTestCase {
 
     private void doTestCreateAndCloseSslConnectionWithClientAuth(boolean 
openSSL) throws Exception {
         TransportOptions sslOptions = new TransportOptions();
-        sslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
-        sslOptions.setTrustStoreLocation(BROKER_JKS_TRUSTSTORE);
+        sslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
+        sslOptions.setTrustStoreLocation(BROKER_PKCS12_TRUSTSTORE);
         sslOptions.setKeyStorePassword(PASSWORD);
         sslOptions.setTrustStorePassword(PASSWORD);
         sslOptions.setVerifyHost(false);
@@ -221,8 +219,8 @@ public class SslIntegrationTest extends QpidJmsTestCase {
 
     private void doConnectionWithAliasTestImpl(String alias, String 
expectedDN, boolean requestOpenSSL) throws Exception, JMSException, 
SSLPeerUnverifiedException, IOException {
         TransportOptions sslOptions = new TransportOptions();
-        sslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
-        sslOptions.setTrustStoreLocation(BROKER_JKS_TRUSTSTORE);
+        sslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
+        sslOptions.setTrustStoreLocation(BROKER_PKCS12_TRUSTSTORE);
         sslOptions.setKeyStorePassword(PASSWORD);
         sslOptions.setTrustStorePassword(PASSWORD);
         sslOptions.setVerifyHost(false);
@@ -268,8 +266,8 @@ public class SslIntegrationTest extends QpidJmsTestCase {
 
     private void doCreateConnectionWithInvalidAliasTestImpl(String alias) 
throws Exception, IOException {
         TransportOptions sslOptions = new TransportOptions();
-        sslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
-        sslOptions.setTrustStoreLocation(BROKER_JKS_TRUSTSTORE);
+        sslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
+        sslOptions.setTrustStoreLocation(BROKER_PKCS12_TRUSTSTORE);
         sslOptions.setKeyStorePassword(PASSWORD);
         sslOptions.setTrustStorePassword(PASSWORD);
         sslOptions.setVerifyHost(false);
@@ -327,8 +325,8 @@ public class SslIntegrationTest extends QpidJmsTestCase {
 
     private void doConnectionWithSslContextOverride(String clientKeyStorePath, 
String expectedDN, boolean useExtension) throws Exception {
         TransportOptions serverSslOptions = new TransportOptions();
-        serverSslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
-        serverSslOptions.setTrustStoreLocation(BROKER_JKS_TRUSTSTORE);
+        serverSslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
+        serverSslOptions.setTrustStoreLocation(BROKER_PKCS12_TRUSTSTORE);
         serverSslOptions.setKeyStorePassword(PASSWORD);
         serverSslOptions.setTrustStorePassword(PASSWORD);
         serverSslOptions.setVerifyHost(false);
@@ -410,8 +408,8 @@ public class SslIntegrationTest extends QpidJmsTestCase {
 
     private void doConnectionWithSslContextOverrideAndURIConfig(SSLContext 
clientContext, String expectedDN) throws Exception {
         TransportOptions serverSslOptions = new TransportOptions();
-        serverSslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
-        serverSslOptions.setTrustStoreLocation(BROKER_JKS_TRUSTSTORE);
+        serverSslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
+        serverSslOptions.setTrustStoreLocation(BROKER_PKCS12_TRUSTSTORE);
         serverSslOptions.setKeyStorePassword(PASSWORD);
         serverSslOptions.setTrustStorePassword(PASSWORD);
         serverSslOptions.setVerifyHost(false);
@@ -493,13 +491,13 @@ public class SslIntegrationTest extends QpidJmsTestCase {
     public void testConfigurePkcs12StoresWithSslSystemProperties() throws 
Exception {
         // Set properties and expect connection as Client1
         setSslSystemPropertiesForCurrentTest(CLIENT_PKCS12_KEYSTORE, 
CUSTOM_STORE_TYPE_PKCS12, PASSWORD, CLIENT_PKCS12_TRUSTSTORE, 
CUSTOM_STORE_TYPE_PKCS12, PASSWORD);
-        doConfigureStoresWithSslSystemPropertiesTestImpl(CLIENT_DN, true);
+        doConfigureStoresWithSslSystemPropertiesTestImpl(CLIENT_DN);
     }
 
     @Test(timeout = 30000)
     public void testNonSslConnectionFailsToSslServer() throws Exception {
         TransportOptions serverOptions = new TransportOptions();
-        serverOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
+        serverOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
         serverOptions.setKeyStorePassword(PASSWORD);
         serverOptions.setVerifyHost(false);
 
@@ -537,27 +535,12 @@ public class SslIntegrationTest extends QpidJmsTestCase {
     }
 
     private void doConfigureStoresWithSslSystemPropertiesTestImpl(String 
expectedDN) throws Exception {
-        doConfigureStoresWithSslSystemPropertiesTestImpl(expectedDN, false);
-    }
-
-    private void doConfigureStoresWithSslSystemPropertiesTestImpl(String 
expectedDN, boolean usePkcs12Store) throws Exception {
         TransportOptions serverSslOptions = new TransportOptions();
-
-        if (!usePkcs12Store) {
-            serverSslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
-            serverSslOptions.setTrustStoreLocation(BROKER_JKS_TRUSTSTORE);
-            serverSslOptions.setKeyStorePassword(PASSWORD);
-            serverSslOptions.setTrustStorePassword(PASSWORD);
-            serverSslOptions.setVerifyHost(false);
-        } else {
-            serverSslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
-            serverSslOptions.setTrustStoreLocation(BROKER_PKCS12_TRUSTSTORE);
-            serverSslOptions.setKeyStoreType(CUSTOM_STORE_TYPE_PKCS12);
-            serverSslOptions.setTrustStoreType(CUSTOM_STORE_TYPE_PKCS12);
-            serverSslOptions.setKeyStorePassword(PASSWORD);
-            serverSslOptions.setTrustStorePassword(PASSWORD);
-            serverSslOptions.setVerifyHost(false);
-        }
+        serverSslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
+        serverSslOptions.setTrustStoreLocation(BROKER_PKCS12_TRUSTSTORE);
+        serverSslOptions.setKeyStorePassword(PASSWORD);
+        serverSslOptions.setTrustStorePassword(PASSWORD);
+        serverSslOptions.setVerifyHost(false);
 
         SSLContext serverSslContext = 
TransportSupport.createJdkSslContext(serverSslOptions);
 
diff --git 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/WsIntegrationTest.java
 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/WsIntegrationTest.java
index 6d5e045..b7a4698 100644
--- 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/WsIntegrationTest.java
+++ 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/integration/WsIntegrationTest.java
@@ -35,13 +35,13 @@ import org.junit.Test;
 
 public class WsIntegrationTest extends QpidJmsTestCase {
 
-    private static final String BROKER_JKS_KEYSTORE = 
"src/test/resources/broker-jks.keystore";
+    private static final String BROKER_PKCS12_KEYSTORE = 
"src/test/resources/broker-pkcs12.keystore";
     private static final String PASSWORD = "password";
 
     @Test(timeout = 30000)
     public void testNonSslWebSocketConnectionFailsToSslServer() throws 
Exception {
         TransportOptions serverOptions = new TransportOptions();
-        serverOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
+        serverOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
         serverOptions.setKeyStorePassword(PASSWORD);
         serverOptions.setVerifyHost(false);
 
diff --git 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/provider/failover/FailoverWithAmqpOpenProvidedServerListIntegrationTest.java
 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/provider/failover/FailoverWithAmqpOpenProvidedServerListIntegrationTest.java
index 0baed85..01ecbf8 100644
--- 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/provider/failover/FailoverWithAmqpOpenProvidedServerListIntegrationTest.java
+++ 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/provider/failover/FailoverWithAmqpOpenProvidedServerListIntegrationTest.java
@@ -55,8 +55,8 @@ public class 
FailoverWithAmqpOpenProvidedServerListIntegrationTest extends QpidJ
 
     private static final Logger LOG = 
LoggerFactory.getLogger(FailoverWithAmqpOpenProvidedServerListIntegrationTest.class);
 
-    private static final String BROKER_JKS_KEYSTORE = 
"src/test/resources/broker-jks.keystore";
-    private static final String BROKER_JKS_TRUSTSTORE = 
"src/test/resources/broker-jks.truststore";
+    private static final String BROKER_PKCS12_KEYSTORE = 
"src/test/resources/broker-pkcs12.keystore";
+    private static final String BROKER_PKCS12_TRUSTSTORE = 
"src/test/resources/broker-pkcs12.truststore";
     private static final String PASSWORD = "password";
     private static final String CLIENT_JKS_KEYSTORE = 
"src/test/resources/client-jks.keystore";
     private static final String CLIENT_JKS_TRUSTSTORE = 
"src/test/resources/client-jks.truststore";
@@ -400,8 +400,8 @@ public class 
FailoverWithAmqpOpenProvidedServerListIntegrationTest extends QpidJ
     @Test(timeout = 20000)
     public void testFailoverUsingSSLConfiguredBySystemProperties() throws 
Exception {
         TransportOptions serverSslOptions = new TransportOptions();
-        serverSslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
-        serverSslOptions.setTrustStoreLocation(BROKER_JKS_TRUSTSTORE);
+        serverSslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
+        serverSslOptions.setTrustStoreLocation(BROKER_PKCS12_TRUSTSTORE);
         serverSslOptions.setKeyStorePassword(PASSWORD);
         serverSslOptions.setTrustStorePassword(PASSWORD);
         serverSslOptions.setVerifyHost(false);
@@ -509,7 +509,7 @@ public class 
FailoverWithAmqpOpenProvidedServerListIntegrationTest extends QpidJ
     @Test(timeout = 20000)
     public void testFailoverUsingSSLConfiguredByTransportOptions() throws 
Exception {
         TransportOptions sslOptions = new TransportOptions();
-        sslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
+        sslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
         sslOptions.setKeyStorePassword(PASSWORD);
         sslOptions.setVerifyHost(false);
 
@@ -628,7 +628,7 @@ public class 
FailoverWithAmqpOpenProvidedServerListIntegrationTest extends QpidJ
     @Test(timeout = 20000)
     public void testFailoverUsingSSLConfiguredByNestedTransportOptions() 
throws Exception {
         TransportOptions sslOptions = new TransportOptions();
-        sslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
+        sslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
         sslOptions.setKeyStorePassword(PASSWORD);
         sslOptions.setVerifyHost(false);
 
@@ -747,8 +747,8 @@ public class 
FailoverWithAmqpOpenProvidedServerListIntegrationTest extends QpidJ
     @Test(timeout = 20000)
     public void testFailoverUsingSSLConfiguredByCustomSSLContext() throws 
Exception {
         TransportOptions serverSslOptions = new TransportOptions();
-        serverSslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
-        serverSslOptions.setTrustStoreLocation(BROKER_JKS_TRUSTSTORE);
+        serverSslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
+        serverSslOptions.setTrustStoreLocation(BROKER_PKCS12_TRUSTSTORE);
         serverSslOptions.setKeyStorePassword(PASSWORD);
         serverSslOptions.setTrustStorePassword(PASSWORD);
         serverSslOptions.setVerifyHost(false);
@@ -886,8 +886,8 @@ public class 
FailoverWithAmqpOpenProvidedServerListIntegrationTest extends QpidJ
     private void doTestFailoverHandlingOfInsecureRedirectAdvertisement(boolean 
allow) throws Exception {
 
         TransportOptions serverSslOptions = new TransportOptions();
-        serverSslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
-        serverSslOptions.setTrustStoreLocation(BROKER_JKS_TRUSTSTORE);
+        serverSslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
+        serverSslOptions.setTrustStoreLocation(BROKER_PKCS12_TRUSTSTORE);
         serverSslOptions.setKeyStorePassword(PASSWORD);
         serverSslOptions.setTrustStorePassword(PASSWORD);
         serverSslOptions.setVerifyHost(false);
@@ -993,8 +993,8 @@ public class 
FailoverWithAmqpOpenProvidedServerListIntegrationTest extends QpidJ
     private void doTestFailoverAcceptsUpdateUsingTransportSchemes(String 
transportScheme, String expected) throws Exception {
 
         TransportOptions serverSslOptions = new TransportOptions();
-        serverSslOptions.setKeyStoreLocation(BROKER_JKS_KEYSTORE);
-        serverSslOptions.setTrustStoreLocation(BROKER_JKS_TRUSTSTORE);
+        serverSslOptions.setKeyStoreLocation(BROKER_PKCS12_KEYSTORE);
+        serverSslOptions.setTrustStoreLocation(BROKER_PKCS12_TRUSTSTORE);
         serverSslOptions.setKeyStorePassword(PASSWORD);
         serverSslOptions.setTrustStorePassword(PASSWORD);
         serverSslOptions.setVerifyHost(false);
diff --git 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/transports/TransportSupportTest.java
 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/transports/TransportSupportTest.java
index e4e7888..cac5c90 100644
--- 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/transports/TransportSupportTest.java
+++ 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/transports/TransportSupportTest.java
@@ -50,13 +50,9 @@ public class TransportSupportTest extends QpidJmsTestCase {
 
     public static final String PASSWORD = "password";
 
-    public static final String BROKER_JKS_KEYSTORE = 
"src/test/resources/broker-jks.keystore";
-    public static final String BROKER_JKS_TRUSTSTORE = 
"src/test/resources/broker-jks.truststore";
     public static final String CLIENT_JKS_KEYSTORE = 
"src/test/resources/client-jks.keystore";
     public static final String CLIENT_JKS_TRUSTSTORE = 
"src/test/resources/client-jks.truststore";
 
-    public static final String BROKER_JCEKS_KEYSTORE = 
"src/test/resources/broker-jceks.keystore";
-    public static final String BROKER_JCEKS_TRUSTSTORE = 
"src/test/resources/broker-jceks.truststore";
     public static final String CLIENT_JCEKS_KEYSTORE = 
"src/test/resources/client-jceks.keystore";
     public static final String CLIENT_JCEKS_TRUSTSTORE = 
"src/test/resources/client-jceks.truststore";
 
diff --git 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/transports/netty/NettySslTransportTest.java
 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/transports/netty/NettySslTransportTest.java
index 1205587..d54db24 100644
--- 
a/qpid-jms-client/src/test/java/org/apache/qpid/jms/transports/netty/NettySslTransportTest.java
+++ 
b/qpid-jms-client/src/test/java/org/apache/qpid/jms/transports/netty/NettySslTransportTest.java
@@ -57,9 +57,9 @@ public class NettySslTransportTest extends 
NettyTcpTransportTest {
     private static final Logger LOG = 
LoggerFactory.getLogger(NettySslTransportTest.class);
 
     public static final String PASSWORD = "password";
-    public static final String SERVER_KEYSTORE = 
"src/test/resources/broker-jks.keystore";
-    public static final String SERVER_TRUSTSTORE = 
"src/test/resources/broker-jks.truststore";
-    public static final String SERVER_WRONG_HOST_KEYSTORE = 
"src/test/resources/broker-wrong-host-jks.keystore";
+    public static final String SERVER_KEYSTORE = 
"src/test/resources/broker-pkcs12.keystore";
+    public static final String SERVER_TRUSTSTORE = 
"src/test/resources/broker-pkcs12.truststore";
+    public static final String SERVER_WRONG_HOST_KEYSTORE = 
"src/test/resources/broker-wrong-host-pkcs12.keystore";
     public static final String CLIENT_KEYSTORE = 
"src/test/resources/client-jks.keystore";
     public static final String CLIENT_MULTI_KEYSTORE = 
"src/test/resources/client-multiple-keys-jks.keystore";
     public static final String CLIENT_TRUSTSTORE = 
"src/test/resources/client-jks.truststore";
@@ -391,7 +391,6 @@ public class NettySslTransportTest extends 
NettyTcpTransportTest {
         options.setKeyStorePassword(PASSWORD);
         options.setTrustStoreLocation(SERVER_TRUSTSTORE);
         options.setTrustStorePassword(PASSWORD);
-        options.setStoreType(KEYSTORE_TYPE);
         options.setVerifyHost(false);
 
         return options;
diff --git a/qpid-jms-client/src/test/resources/README.txt 
b/qpid-jms-client/src/test/resources/README.txt
index 8e7b215..8b3048b 100644
--- a/qpid-jms-client/src/test/resources/README.txt
+++ b/qpid-jms-client/src/test/resources/README.txt
@@ -21,26 +21,19 @@ keytool -storetype pkcs12 -keystore ca-pkcs12.keystore 
-storepass password -alia
 keytool -storetype pkcs12 -keystore broker-pkcs12.keystore -storepass password 
-keypass password -importcert -alias ca -file ca.crt -noprompt
 keytool -storetype pkcs12 -keystore broker-pkcs12.keystore -storepass password 
-keypass password -importcert -alias broker -file broker.crt
 
-# Create some alternative keystore types for testing:
-# ---------------------------------------------------
-keytool -importkeystore -srckeystore broker-pkcs12.keystore -destkeystore 
broker-jceks.keystore -srcstoretype pkcs12 -deststoretype jceks -srcstorepass 
password -deststorepass password
-keytool -importkeystore -srckeystore broker-pkcs12.keystore -destkeystore 
broker-jks.keystore -srcstoretype pkcs12 -deststoretype jks -srcstorepass 
password -deststorepass password
-
 # Create a key pair for the broker with an unexpected hostname, and sign it 
with the CA:
 # 
--------------------------------------------------------------------------------------
-keytool -storetype jks -keystore broker-wrong-host-jks.keystore -storepass 
password -keypass password -alias broker-wrong-host -genkey -keyalg "RSA" 
-keysize 2048 -dname "O=Server,CN=wronghost" -validity 9999 -ext bc=ca:false 
-ext eku=sA
+keytool -storetype pkcs12 -keystore broker-wrong-host-pkcs12.keystore 
-storepass password -keypass password -alias broker-wrong-host -genkey -keyalg 
"RSA" -keysize 2048 -dname "O=Server,CN=wronghost" -validity 9999 -ext 
bc=ca:false -ext eku=sA
 
-keytool -storetype jks -keystore broker-wrong-host-jks.keystore -storepass 
password -alias broker-wrong-host -certreq -file broker-wrong-host.csr
+keytool -storetype pkcs12 -keystore broker-wrong-host-pkcs12.keystore 
-storepass password -alias broker-wrong-host -certreq -file 
broker-wrong-host.csr
 keytool -storetype pkcs12 -keystore ca-pkcs12.keystore -storepass password 
-alias ca -gencert -rfc -infile broker-wrong-host.csr -outfile 
broker-wrong-host.crt -validity 9999 -ext bc=ca:false -ext eku=sA
 
-keytool -storetype jks -keystore broker-wrong-host-jks.keystore -storepass 
password -keypass password -importcert -alias ca -file ca.crt -noprompt
-keytool -storetype jks -keystore broker-wrong-host-jks.keystore -storepass 
password -keypass password -importcert -alias broker-wrong-host -file 
broker-wrong-host.crt
+keytool -storetype pkcs12 -keystore broker-wrong-host-pkcs12.keystore 
-storepass password -keypass password -importcert -alias ca -file ca.crt 
-noprompt
+keytool -storetype pkcs12 -keystore broker-wrong-host-pkcs12.keystore 
-storepass password -keypass password -importcert -alias broker-wrong-host 
-file broker-wrong-host.crt
 
-# Create trust stores for the broker, import the CA cert:
+# Create trust store for the broker, import the CA cert:
 # -------------------------------------------------------
 keytool -storetype pkcs12 -keystore broker-pkcs12.truststore -storepass 
password -keypass password -importcert -alias ca -file ca.crt -noprompt
-keytool -importkeystore -srckeystore broker-pkcs12.truststore -destkeystore 
broker-jceks.truststore -srcstoretype pkcs12 -deststoretype jceks -srcstorepass 
password -deststorepass password
-keytool -importkeystore -srckeystore broker-pkcs12.truststore -destkeystore 
broker-jks.truststore -srcstoretype pkcs12 -deststoretype jks -srcstorepass 
password -deststorepass password
 
 # Create a key pair for the client, and sign it with the CA:
 # ----------------------------------------------------------
diff --git a/qpid-jms-client/src/test/resources/broker-jceks.keystore 
b/qpid-jms-client/src/test/resources/broker-jceks.keystore
deleted file mode 100644
index b5a155e..0000000
Binary files a/qpid-jms-client/src/test/resources/broker-jceks.keystore and 
/dev/null differ
diff --git a/qpid-jms-client/src/test/resources/broker-jceks.truststore 
b/qpid-jms-client/src/test/resources/broker-jceks.truststore
deleted file mode 100644
index 54a9fd5..0000000
Binary files a/qpid-jms-client/src/test/resources/broker-jceks.truststore and 
/dev/null differ
diff --git a/qpid-jms-client/src/test/resources/broker-jks.keystore 
b/qpid-jms-client/src/test/resources/broker-jks.keystore
deleted file mode 100644
index a6644f0..0000000
Binary files a/qpid-jms-client/src/test/resources/broker-jks.keystore and 
/dev/null differ
diff --git a/qpid-jms-client/src/test/resources/broker-jks.truststore 
b/qpid-jms-client/src/test/resources/broker-jks.truststore
deleted file mode 100644
index 60031b6..0000000
Binary files a/qpid-jms-client/src/test/resources/broker-jks.truststore and 
/dev/null differ
diff --git 
a/qpid-jms-client/src/test/resources/broker-wrong-host-pkcs12.keystore 
b/qpid-jms-client/src/test/resources/broker-wrong-host-pkcs12.keystore
new file mode 100644
index 0000000..6fa270b
Binary files /dev/null and 
b/qpid-jms-client/src/test/resources/broker-wrong-host-pkcs12.keystore differ

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscr...@qpid.apache.org
For additional commands, e-mail: commits-h...@qpid.apache.org

Reply via email to