org.apache.activemq.broker.SslBrokerService

Here are the examples of the java api class org.apache.activemq.broker.SslBrokerService taken from open source projects.

1. ActiveMQSslConnectionFactoryTest#createSslBroker()

Project: activemq-artemis
File: ActiveMQSslConnectionFactoryTest.java
protected BrokerService createSslBroker(String uri) throws Exception {
    // http://java.sun.com/javase/javaseforbusiness/docs/TLSReadme.html
    // work around: javax.net.ssl.SSLHandshakeException: renegotiation is not allowed
    //System.setProperty("sun.security.ssl.allowUnsafeRenegotiation", "true");
    SslBrokerService service = new SslBrokerService();
    service.setPersistent(false);
    service.addConnector(uri);
    service.start();
    return service;
}

2. SslBrokerServiceTest#createBroker()

Project: activemq-artemis
File: SslBrokerServiceTest.java
@Override
protected BrokerService createBroker() throws Exception {
    // http://java.sun.com/javase/javaseforbusiness/docs/TLSReadme.html
    // work around: javax.net.ssl.SSLHandshakeException: renegotiation is not allowed
    System.setProperty("sun.security.ssl.allowUnsafeRenegotiation", "true");
    SslBrokerService service = new SslBrokerService();
    service.setPersistent(false);
    String baseUri = getBindLocation();
    String uri0 = baseUri + "?" + TransportConstants.SSL_ENABLED_PROP_NAME + "=true&" + TransportConstants.KEYSTORE_PATH_PROP_NAME + "=" + SslTransportBrokerTest.SERVER_KEYSTORE + "&" + TransportConstants.KEYSTORE_PASSWORD_PROP_NAME + "=" + SslTransportBrokerTest.PASSWORD + "&" + TransportConstants.KEYSTORE_PROVIDER_PROP_NAME + "=" + SslTransportBrokerTest.KEYSTORE_TYPE;
    String uri1 = uri0 + "&" + TransportConstants.ENABLED_CIPHER_SUITES_PROP_NAME + "=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,SSL_DH_anon_WITH_3DES_EDE_CBC_SHA";
    String uri2 = uri0 + "&" + TransportConstants.NEED_CLIENT_AUTH_PROP_NAME + "=true&" + TransportConstants.TRUSTSTORE_PATH_PROP_NAME + "=" + SslTransportBrokerTest.TRUST_KEYSTORE + "&" + TransportConstants.TRUSTSTORE_PASSWORD_PROP_NAME + "=" + SslTransportBrokerTest.PASSWORD + "&" + TransportConstants.TRUSTSTORE_PROVIDER_PROP_NAME + "=" + SslTransportBrokerTest.KEYSTORE_TYPE;
    //broker side
    TransportConnector serverConnector0 = service.addConnector(new URI(uri0));
    connector = new FakeTransportConnector(new URI("ssl://localhost:" + serverConnector0.getUri().getPort()));
    TransportConnector serverConnector1 = service.addConnector(new URI(uri1));
    limitedCipherSuites = new FakeTransportConnector(new URI("ssl://localhost:" + serverConnector1.getUri().getPort() + "?transport.enabledCipherSuites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,SSL_DH_anon_WITH_3DES_EDE_CBC_SHA"));
    TransportConnector serverConnector2 = service.addConnector(new URI(uri2));
    needClientAuthConnector = new FakeTransportConnector(new URI("ssl://localhost:" + serverConnector2.getUri().getPort() + "?transport.needClientAuth=true"));
    KeyManager[] km = getKeyManager();
    TrustManager[] tm = getTrustManager();
    // for client side
    SslTransportFactory sslFactory = new SslTransportFactory();
    SslContext ctx = new SslContext(km, tm, null);
    SslContext.setCurrentSslContext(ctx);
    TransportFactory.registerTransportFactory("ssl", sslFactory);
    return service;
}