lwm2m tests with NoSec, PSK, X509-trust. RPK, X509_NoTrust - ignore
This commit is contained in:
parent
eccbd3290c
commit
ba970c5d88
@ -16,6 +16,7 @@
|
|||||||
package org.thingsboard.server.transport.lwm2m.security.sql;
|
package org.thingsboard.server.transport.lwm2m.security.sql;
|
||||||
|
|
||||||
import lombok.extern.slf4j.Slf4j;
|
import lombok.extern.slf4j.Slf4j;
|
||||||
|
import org.junit.Ignore;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
import org.thingsboard.server.common.data.device.credentials.lwm2m.NoSecClientCredential;
|
import org.thingsboard.server.common.data.device.credentials.lwm2m.NoSecClientCredential;
|
||||||
import org.thingsboard.server.transport.lwm2m.security.AbstractSecurityLwM2MIntegrationTest;
|
import org.thingsboard.server.transport.lwm2m.security.AbstractSecurityLwM2MIntegrationTest;
|
||||||
@ -28,8 +29,8 @@ public class NoSecLwM2MIntegrationTest extends AbstractSecurityLwM2MIntegrationT
|
|||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testConnectAndObserveTelemetry() throws Exception {
|
public void testConnectAndObserveTelemetry() throws Exception {
|
||||||
NoSecClientCredential clientCredentials = createNoSecClientCredentials(ENDPOINT);
|
NoSecClientCredential clientCredentials = createNoSecClientCredentials(CLIENT_ENDPOINT_NO_SEC);
|
||||||
super.basicTestConnectionObserveTelemetry(SECURITY, clientCredentials, COAP_CONFIG, ENDPOINT);
|
super.basicTestConnectionObserveTelemetry(SECURITY, clientCredentials, COAP_CONFIG, CLIENT_ENDPOINT_NO_SEC);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -17,6 +17,7 @@ package org.thingsboard.server.transport.lwm2m.security.sql;
|
|||||||
|
|
||||||
import org.eclipse.leshan.client.object.Security;
|
import org.eclipse.leshan.client.object.Security;
|
||||||
import org.eclipse.leshan.core.util.Hex;
|
import org.eclipse.leshan.core.util.Hex;
|
||||||
|
import org.junit.Ignore;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
import org.thingsboard.server.common.data.device.credentials.lwm2m.PSKClientCredential;
|
import org.thingsboard.server.common.data.device.credentials.lwm2m.PSKClientCredential;
|
||||||
import org.thingsboard.server.transport.lwm2m.security.AbstractSecurityLwM2MIntegrationTest;
|
import org.thingsboard.server.transport.lwm2m.security.AbstractSecurityLwM2MIntegrationTest;
|
||||||
@ -33,13 +34,13 @@ public class PskLwm2mIntegrationTest extends AbstractSecurityLwM2MIntegrationTes
|
|||||||
@Test
|
@Test
|
||||||
public void testConnectWithPSKAndObserveTelemetry() throws Exception {
|
public void testConnectWithPSKAndObserveTelemetry() throws Exception {
|
||||||
PSKClientCredential clientCredentials = new PSKClientCredential();
|
PSKClientCredential clientCredentials = new PSKClientCredential();
|
||||||
clientCredentials.setEndpoint(ENDPOINT);
|
clientCredentials.setEndpoint(CLIENT_ENDPOINT_NO_TRUST);
|
||||||
clientCredentials.setKey(pskKey);
|
clientCredentials.setKey(pskKey);
|
||||||
clientCredentials.setIdentity(pskIdentity);
|
clientCredentials.setIdentity(pskIdentity);
|
||||||
Security security = psk(SECURE_URI,
|
Security security = psk(SECURE_URI,
|
||||||
SHORT_SERVER_ID,
|
SHORT_SERVER_ID,
|
||||||
pskIdentity.getBytes(StandardCharsets.UTF_8),
|
pskIdentity.getBytes(StandardCharsets.UTF_8),
|
||||||
Hex.decodeHex(pskKey.toCharArray()));
|
Hex.decodeHex(pskKey.toCharArray()));
|
||||||
super.basicTestConnectionObserveTelemetry(security, clientCredentials, SECURE_COAP_CONFIG, ENDPOINT);
|
super.basicTestConnectionObserveTelemetry(security, clientCredentials, SECURE_COAP_CONFIG, CLIENT_ENDPOINT_NO_TRUST);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -34,13 +34,13 @@ public class RpkLwM2MIntegrationTest extends AbstractSecurityLwM2MIntegrationTes
|
|||||||
@Test
|
@Test
|
||||||
public void testConnectWithRPKAndObserveTelemetry() throws Exception {
|
public void testConnectWithRPKAndObserveTelemetry() throws Exception {
|
||||||
RPKClientCredential rpkClientCredentials = new RPKClientCredential();
|
RPKClientCredential rpkClientCredentials = new RPKClientCredential();
|
||||||
rpkClientCredentials.setEndpoint(ENDPOINT);
|
rpkClientCredentials.setEndpoint(CLIENT_ENDPOINT_RPK);
|
||||||
rpkClientCredentials.setKey(new String(Base64.encodeBase64(clientPublicKey.getEncoded())));
|
rpkClientCredentials.setKey(new String(Base64.encodeBase64(clientPrivateKeyFromCert.getEncoded())));
|
||||||
Security security = rpk(SECURE_URI,
|
Security security = rpk(SECURE_URI,
|
||||||
SHORT_SERVER_ID,
|
SHORT_SERVER_ID,
|
||||||
clientPublicKey.getEncoded(),
|
clientPublicKeyFromCert.getEncoded(),
|
||||||
clientPrivateKey.getEncoded(),
|
clientPrivateKeyFromCert.getEncoded(),
|
||||||
serverX509Cert.getPublicKey().getEncoded());
|
serverPublicKeyFromCert.getEncoded());
|
||||||
super.basicTestConnectionObserveTelemetry(security, rpkClientCredentials, SECURE_COAP_CONFIG, ENDPOINT);
|
super.basicTestConnectionObserveTelemetry(security, rpkClientCredentials, SECURE_COAP_CONFIG, CLIENT_ENDPOINT_RPK);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -32,15 +32,15 @@ public class X509_NoTrustLwM2MIntegrationTest extends AbstractSecurityLwM2MInteg
|
|||||||
@Ignore
|
@Ignore
|
||||||
@Test
|
@Test
|
||||||
public void testConnectWithCertAndObserveTelemetry() throws Exception {
|
public void testConnectWithCertAndObserveTelemetry() throws Exception {
|
||||||
X509ClientCredential credentials = new X509ClientCredential();
|
// X509ClientCredential credentials = new X509ClientCredential();
|
||||||
credentials.setEndpoint(ENDPOINT);
|
// credentials.setEndpoint(CLIENT_ENDPOINT_NO_TRUST);
|
||||||
credentials.setCert(SslUtil.getCertificateString(clientX509CertNotTrusted));
|
// credentials.setCert(SslUtil.getCertificateString(clientX509CertNotTrusted));
|
||||||
Security security = x509(SECURE_URI,
|
// Security security = x509(SECURE_URI,
|
||||||
SHORT_SERVER_ID,
|
// SHORT_SERVER_ID,
|
||||||
clientX509CertNotTrusted.getEncoded(),
|
// clientX509CertNotTrusted.getEncoded(),
|
||||||
clientPrivateKeyFromCert.getEncoded(),
|
// clientPrivateKeyNotTrustedFromCert.getEncoded(),
|
||||||
serverX509Cert.getEncoded());
|
// serverX509Cert.getEncoded());
|
||||||
super.basicTestConnectionObserveTelemetry(security, credentials, SECURE_COAP_CONFIG, ENDPOINT);
|
// super.basicTestConnectionObserveTelemetry(security, credentials, SECURE_COAP_CONFIG, CLIENT_ENDPOINT_NO_TRUST);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -16,7 +16,6 @@
|
|||||||
package org.thingsboard.server.transport.lwm2m.security.sql;
|
package org.thingsboard.server.transport.lwm2m.security.sql;
|
||||||
|
|
||||||
import org.eclipse.leshan.client.object.Security;
|
import org.eclipse.leshan.client.object.Security;
|
||||||
import org.junit.Ignore;
|
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
import org.thingsboard.server.common.data.device.credentials.lwm2m.X509ClientCredential;
|
import org.thingsboard.server.common.data.device.credentials.lwm2m.X509ClientCredential;
|
||||||
import org.thingsboard.server.transport.lwm2m.security.AbstractSecurityLwM2MIntegrationTest;
|
import org.thingsboard.server.transport.lwm2m.security.AbstractSecurityLwM2MIntegrationTest;
|
||||||
@ -28,17 +27,16 @@ import static org.thingsboard.server.transport.lwm2m.Lwm2mTestHelper.SHORT_SERVE
|
|||||||
|
|
||||||
public class X509_TrustLwM2MIntegrationTest extends AbstractSecurityLwM2MIntegrationTest {
|
public class X509_TrustLwM2MIntegrationTest extends AbstractSecurityLwM2MIntegrationTest {
|
||||||
|
|
||||||
@Ignore
|
|
||||||
@Test
|
@Test
|
||||||
public void testConnectAndObserveTelemetry() throws Exception {
|
public void testConnectAndObserveTelemetry() throws Exception {
|
||||||
X509ClientCredential credentials = new X509ClientCredential();
|
X509ClientCredential credentials = new X509ClientCredential();
|
||||||
credentials.setEndpoint(ENDPOINT);
|
credentials.setEndpoint(CLIENT_ENDPOINT_TRUST);
|
||||||
Security security = x509(SECURE_URI,
|
Security security = x509(SECURE_URI,
|
||||||
SHORT_SERVER_ID,
|
SHORT_SERVER_ID,
|
||||||
clientX509Cert.getEncoded(),
|
clientX509Cert.getEncoded(),
|
||||||
clientPrivateKeyFromCert.getEncoded(),
|
clientPrivateKeyFromCert.getEncoded(),
|
||||||
serverX509Cert.getEncoded());
|
serverX509Cert.getEncoded());
|
||||||
super.basicTestConnectionObserveTelemetry(security, credentials, SECURE_COAP_CONFIG, ENDPOINT);
|
super.basicTestConnectionObserveTelemetry(security, credentials, SECURE_COAP_CONFIG, CLIENT_ENDPOINT_TRUST);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -1,19 +1,19 @@
|
|||||||
#transport.lwm2m.server.security.credentials.enabled=true
|
transport.lwm2m.server.security.credentials.enabled=true
|
||||||
#transport.lwm2m.server.security.credentials.type=KEYSTORE
|
transport.lwm2m.server.security.credentials.type=KEYSTORE
|
||||||
#transport.lwm2m.server.security.credentials.keystore.store_file=lwm2m/credentials/serverKeyStore.jks
|
transport.lwm2m.server.security.credentials.keystore.store_file=lwm2m/credentials/lwm2mserver.jks
|
||||||
#transport.lwm2m.server.security.credentials.keystore.store_password=server
|
#transport.lwm2m.server.security.credentials.keystore.store_password=server
|
||||||
#transport.lwm2m.server.security.credentials.keystore.key_alias=server
|
#transport.lwm2m.server.security.credentials.keystore.key_alias=server
|
||||||
#transport.lwm2m.server.security.credentials.keystore.key_password=server
|
#transport.lwm2m.server.security.credentials.keystore.key_password=server
|
||||||
#transport.lwm2m.bootstrap.enabled=false
|
#transport.lwm2m.bootstrap.enabled=false
|
||||||
#transport.lwm2m.bootstrap.security.credentials.enabled=true
|
transport.lwm2m.bootstrap.security.credentials.enabled=true
|
||||||
#transport.lwm2m.bootstrap.security.credentials.type=KEYSTORE
|
transport.lwm2m.bootstrap.security.credentials.type=KEYSTORE
|
||||||
#transport.lwm2m.bootstrap.security.credentials.keystore.store_file=lwm2m/credentials/serverKeyStore.jks
|
transport.lwm2m.bootstrap.security.credentials.keystore.store_file=lwm2m/credentials/lwm2mserver.jks
|
||||||
#transport.lwm2m.bootstrap.security.credentials.keystore.store_password=server
|
#transport.lwm2m.bootstrap.security.credentials.keystore.store_password=server
|
||||||
#transport.lwm2m.bootstrap.security.credentials.keystore.key_alias=server
|
#transport.lwm2m.bootstrap.security.credentials.keystore.key_alias=server
|
||||||
#transport.lwm2m.bootstrap.security.credentials.keystore.key_password=server
|
#transport.lwm2m.bootstrap.security.credentials.keystore.key_password=server
|
||||||
#transport.lwm2m.security.trust-credentials.enabled=true
|
transport.lwm2m.security.trust-credentials.enabled=true
|
||||||
#transport.lwm2m.security.trust-credentials.type=KEYSTORE
|
transport.lwm2m.security.trust-credentials.type=KEYSTORE
|
||||||
#transport.lwm2m.security.trust-credentials.keystore.store_file=lwm2m/credentials/serverKeyStore.jks
|
transport.lwm2m.security.trust-credentials.keystore.store_file=lwm2m/credentials/lwm2mtruststorechain.jks
|
||||||
#transport.lwm2m.security.trust-credentials.keystore.store_password=server
|
#transport.lwm2m.security.trust-credentials.keystore.store_password=server
|
||||||
|
|
||||||
edges.enabled=true
|
edges.enabled=true
|
||||||
|
|||||||
Binary file not shown.
BIN
application/src/test/resources/lwm2m/credentials/lwm2mclient.jks
Normal file
BIN
application/src/test/resources/lwm2m/credentials/lwm2mclient.jks
Normal file
Binary file not shown.
BIN
application/src/test/resources/lwm2m/credentials/lwm2mserver.jks
Normal file
BIN
application/src/test/resources/lwm2m/credentials/lwm2mserver.jks
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
Loading…
x
Reference in New Issue
Block a user