tree: 3fdd76e5949ad718251d789592fa0d92b65d373f [path history] [tgz]
  1. cacerts.jks
  2. grizzly-config-bad.xml
  3. grizzly-config-io-strategies.xml
  4. grizzly-config-pu-http-https-same-port.xml
  5. grizzly-config-pu-loop.xml
  6. grizzly-config-pu.xml
  7. grizzly-config-scheme-override.xml
  8. grizzly-config-skh.xml
  9. grizzly-config-socket.xml
  10. grizzly-config-ssl.xml
  11. grizzly-config-timeout-disabled.xml
  12. grizzly-config.xml
  13. grizzly-direct-buffer.xml
  14. http-https-redirect-different-port.xml
  15. http-https-redirect-same-port.xml
  16. https-http-redirect-different-port.xml
  17. https-http-redirect-same-port.xml
  18. keystore.jks
  19. legacy-http-https-redirect.xml
  20. legacy-https-http-redirect.xml
  21. README.md
nucleus/grizzly/config/src/test/resources/README.md

Test certificate

The certificate required for the tests was created like this:

openssl genrsa -out server.key 4096
openssl req -new -sha256 -key server.key -out server.csr \
    -subj "/C=BE/L=Brussels/O=Eclipse Foundation/OU=Eclipse Glassfish/CN=localhost"
openssl x509 -req -sha256 -days 3650 -in server.csr -signkey server.key -out server.crt
openssl pkcs12 -in server.crt -inkey server.key -export -out server.p12 -name s1as -password pass:changeit
keytool -importkeystore \
    -srckeystore server.p12 -srcstoretype PKCS12 -srcstorepass changeit \
    -destkeystore keystore.jks -deststorepass changeit
keytool -import -noprompt -keystore cacerts.jks -storepass changeit -alias s1as -file server.crt