lwm2m tests with NoSec, PSK, X509-trust. RPK, X509_NoTrust - ignore
This commit is contained in:
parent
eccbd3290c
commit
ba970c5d88
@ -16,6 +16,7 @@
|
||||
package org.thingsboard.server.transport.lwm2m.security.sql;
|
||||
|
||||
import lombok.extern.slf4j.Slf4j;
|
||||
import org.junit.Ignore;
|
||||
import org.junit.Test;
|
||||
import org.thingsboard.server.common.data.device.credentials.lwm2m.NoSecClientCredential;
|
||||
import org.thingsboard.server.transport.lwm2m.security.AbstractSecurityLwM2MIntegrationTest;
|
||||
@ -28,8 +29,8 @@ public class NoSecLwM2MIntegrationTest extends AbstractSecurityLwM2MIntegrationT
|
||||
|
||||
@Test
|
||||
public void testConnectAndObserveTelemetry() throws Exception {
|
||||
NoSecClientCredential clientCredentials = createNoSecClientCredentials(ENDPOINT);
|
||||
super.basicTestConnectionObserveTelemetry(SECURITY, clientCredentials, COAP_CONFIG, ENDPOINT);
|
||||
NoSecClientCredential clientCredentials = createNoSecClientCredentials(CLIENT_ENDPOINT_NO_SEC);
|
||||
super.basicTestConnectionObserveTelemetry(SECURITY, clientCredentials, COAP_CONFIG, CLIENT_ENDPOINT_NO_SEC);
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
@ -17,6 +17,7 @@ package org.thingsboard.server.transport.lwm2m.security.sql;
|
||||
|
||||
import org.eclipse.leshan.client.object.Security;
|
||||
import org.eclipse.leshan.core.util.Hex;
|
||||
import org.junit.Ignore;
|
||||
import org.junit.Test;
|
||||
import org.thingsboard.server.common.data.device.credentials.lwm2m.PSKClientCredential;
|
||||
import org.thingsboard.server.transport.lwm2m.security.AbstractSecurityLwM2MIntegrationTest;
|
||||
@ -33,13 +34,13 @@ public class PskLwm2mIntegrationTest extends AbstractSecurityLwM2MIntegrationTes
|
||||
@Test
|
||||
public void testConnectWithPSKAndObserveTelemetry() throws Exception {
|
||||
PSKClientCredential clientCredentials = new PSKClientCredential();
|
||||
clientCredentials.setEndpoint(ENDPOINT);
|
||||
clientCredentials.setEndpoint(CLIENT_ENDPOINT_NO_TRUST);
|
||||
clientCredentials.setKey(pskKey);
|
||||
clientCredentials.setIdentity(pskIdentity);
|
||||
Security security = psk(SECURE_URI,
|
||||
SHORT_SERVER_ID,
|
||||
pskIdentity.getBytes(StandardCharsets.UTF_8),
|
||||
Hex.decodeHex(pskKey.toCharArray()));
|
||||
super.basicTestConnectionObserveTelemetry(security, clientCredentials, SECURE_COAP_CONFIG, ENDPOINT);
|
||||
super.basicTestConnectionObserveTelemetry(security, clientCredentials, SECURE_COAP_CONFIG, CLIENT_ENDPOINT_NO_TRUST);
|
||||
}
|
||||
}
|
||||
|
||||
@ -34,13 +34,13 @@ public class RpkLwM2MIntegrationTest extends AbstractSecurityLwM2MIntegrationTes
|
||||
@Test
|
||||
public void testConnectWithRPKAndObserveTelemetry() throws Exception {
|
||||
RPKClientCredential rpkClientCredentials = new RPKClientCredential();
|
||||
rpkClientCredentials.setEndpoint(ENDPOINT);
|
||||
rpkClientCredentials.setKey(new String(Base64.encodeBase64(clientPublicKey.getEncoded())));
|
||||
rpkClientCredentials.setEndpoint(CLIENT_ENDPOINT_RPK);
|
||||
rpkClientCredentials.setKey(new String(Base64.encodeBase64(clientPrivateKeyFromCert.getEncoded())));
|
||||
Security security = rpk(SECURE_URI,
|
||||
SHORT_SERVER_ID,
|
||||
clientPublicKey.getEncoded(),
|
||||
clientPrivateKey.getEncoded(),
|
||||
serverX509Cert.getPublicKey().getEncoded());
|
||||
super.basicTestConnectionObserveTelemetry(security, rpkClientCredentials, SECURE_COAP_CONFIG, ENDPOINT);
|
||||
clientPublicKeyFromCert.getEncoded(),
|
||||
clientPrivateKeyFromCert.getEncoded(),
|
||||
serverPublicKeyFromCert.getEncoded());
|
||||
super.basicTestConnectionObserveTelemetry(security, rpkClientCredentials, SECURE_COAP_CONFIG, CLIENT_ENDPOINT_RPK);
|
||||
}
|
||||
}
|
||||
|
||||
@ -32,15 +32,15 @@ public class X509_NoTrustLwM2MIntegrationTest extends AbstractSecurityLwM2MInteg
|
||||
@Ignore
|
||||
@Test
|
||||
public void testConnectWithCertAndObserveTelemetry() throws Exception {
|
||||
X509ClientCredential credentials = new X509ClientCredential();
|
||||
credentials.setEndpoint(ENDPOINT);
|
||||
credentials.setCert(SslUtil.getCertificateString(clientX509CertNotTrusted));
|
||||
Security security = x509(SECURE_URI,
|
||||
SHORT_SERVER_ID,
|
||||
clientX509CertNotTrusted.getEncoded(),
|
||||
clientPrivateKeyFromCert.getEncoded(),
|
||||
serverX509Cert.getEncoded());
|
||||
super.basicTestConnectionObserveTelemetry(security, credentials, SECURE_COAP_CONFIG, ENDPOINT);
|
||||
// X509ClientCredential credentials = new X509ClientCredential();
|
||||
// credentials.setEndpoint(CLIENT_ENDPOINT_NO_TRUST);
|
||||
// credentials.setCert(SslUtil.getCertificateString(clientX509CertNotTrusted));
|
||||
// Security security = x509(SECURE_URI,
|
||||
// SHORT_SERVER_ID,
|
||||
// clientX509CertNotTrusted.getEncoded(),
|
||||
// clientPrivateKeyNotTrustedFromCert.getEncoded(),
|
||||
// serverX509Cert.getEncoded());
|
||||
// super.basicTestConnectionObserveTelemetry(security, credentials, SECURE_COAP_CONFIG, CLIENT_ENDPOINT_NO_TRUST);
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
@ -16,7 +16,6 @@
|
||||
package org.thingsboard.server.transport.lwm2m.security.sql;
|
||||
|
||||
import org.eclipse.leshan.client.object.Security;
|
||||
import org.junit.Ignore;
|
||||
import org.junit.Test;
|
||||
import org.thingsboard.server.common.data.device.credentials.lwm2m.X509ClientCredential;
|
||||
import org.thingsboard.server.transport.lwm2m.security.AbstractSecurityLwM2MIntegrationTest;
|
||||
@ -28,17 +27,16 @@ import static org.thingsboard.server.transport.lwm2m.Lwm2mTestHelper.SHORT_SERVE
|
||||
|
||||
public class X509_TrustLwM2MIntegrationTest extends AbstractSecurityLwM2MIntegrationTest {
|
||||
|
||||
@Ignore
|
||||
@Test
|
||||
public void testConnectAndObserveTelemetry() throws Exception {
|
||||
X509ClientCredential credentials = new X509ClientCredential();
|
||||
credentials.setEndpoint(ENDPOINT);
|
||||
credentials.setEndpoint(CLIENT_ENDPOINT_TRUST);
|
||||
Security security = x509(SECURE_URI,
|
||||
SHORT_SERVER_ID,
|
||||
clientX509Cert.getEncoded(),
|
||||
clientPrivateKeyFromCert.getEncoded(),
|
||||
serverX509Cert.getEncoded());
|
||||
super.basicTestConnectionObserveTelemetry(security, credentials, SECURE_COAP_CONFIG, ENDPOINT);
|
||||
super.basicTestConnectionObserveTelemetry(security, credentials, SECURE_COAP_CONFIG, CLIENT_ENDPOINT_TRUST);
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
@ -1,19 +1,19 @@
|
||||
#transport.lwm2m.server.security.credentials.enabled=true
|
||||
#transport.lwm2m.server.security.credentials.type=KEYSTORE
|
||||
#transport.lwm2m.server.security.credentials.keystore.store_file=lwm2m/credentials/serverKeyStore.jks
|
||||
transport.lwm2m.server.security.credentials.enabled=true
|
||||
transport.lwm2m.server.security.credentials.type=KEYSTORE
|
||||
transport.lwm2m.server.security.credentials.keystore.store_file=lwm2m/credentials/lwm2mserver.jks
|
||||
#transport.lwm2m.server.security.credentials.keystore.store_password=server
|
||||
#transport.lwm2m.server.security.credentials.keystore.key_alias=server
|
||||
#transport.lwm2m.server.security.credentials.keystore.key_password=server
|
||||
#transport.lwm2m.bootstrap.enabled=false
|
||||
#transport.lwm2m.bootstrap.security.credentials.enabled=true
|
||||
#transport.lwm2m.bootstrap.security.credentials.type=KEYSTORE
|
||||
#transport.lwm2m.bootstrap.security.credentials.keystore.store_file=lwm2m/credentials/serverKeyStore.jks
|
||||
transport.lwm2m.bootstrap.security.credentials.enabled=true
|
||||
transport.lwm2m.bootstrap.security.credentials.type=KEYSTORE
|
||||
transport.lwm2m.bootstrap.security.credentials.keystore.store_file=lwm2m/credentials/lwm2mserver.jks
|
||||
#transport.lwm2m.bootstrap.security.credentials.keystore.store_password=server
|
||||
#transport.lwm2m.bootstrap.security.credentials.keystore.key_alias=server
|
||||
#transport.lwm2m.bootstrap.security.credentials.keystore.key_password=server
|
||||
#transport.lwm2m.security.trust-credentials.enabled=true
|
||||
#transport.lwm2m.security.trust-credentials.type=KEYSTORE
|
||||
#transport.lwm2m.security.trust-credentials.keystore.store_file=lwm2m/credentials/serverKeyStore.jks
|
||||
transport.lwm2m.security.trust-credentials.enabled=true
|
||||
transport.lwm2m.security.trust-credentials.type=KEYSTORE
|
||||
transport.lwm2m.security.trust-credentials.keystore.store_file=lwm2m/credentials/lwm2mtruststorechain.jks
|
||||
#transport.lwm2m.security.trust-credentials.keystore.store_password=server
|
||||
|
||||
edges.enabled=true
|
||||
|
||||
Binary file not shown.
BIN
application/src/test/resources/lwm2m/credentials/lwm2mclient.jks
Normal file
BIN
application/src/test/resources/lwm2m/credentials/lwm2mclient.jks
Normal file
Binary file not shown.
BIN
application/src/test/resources/lwm2m/credentials/lwm2mserver.jks
Normal file
BIN
application/src/test/resources/lwm2m/credentials/lwm2mserver.jks
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
Loading…
x
Reference in New Issue
Block a user