@Override public void inject(SecurityRealm value) { builder.remoteSecurity().ssl().sslContext(value.getSSLContext()); } };
private CacheDefinitionBuilder addNewCache() { if (configurationBuilder == null) configurationBuilder = getDefaultClusteredCacheConfig(CacheMode.DIST_SYNC); if (remotePort != null) { RemoteStoreConfigurationBuilder store = configurationBuilder.persistence().addStore(RemoteStoreConfigurationBuilder.class); store.hotRodWrapping(true) .remoteCacheName(name).protocolVersion(protocolVersion).shared(true) .addServer().host("localhost").port(remotePort); if (builder.trustStoreFileName != null) { store.remoteSecurity().ssl().enable().trustStoreFileName(builder.trustStoreFileName).trustStorePassword(builder.trustStorePassword); } if (builder.keyStoreFileName != null) { store.remoteSecurity().ssl().keyStoreFileName(builder.keyStoreFileName).keyStorePassword(builder.keyStorePassword); } } builder.addCache(name, configurationBuilder); return new CacheDefinitionBuilder(builder); } }
ModelNode encryption = store.get(ModelKeys.ENCRYPTION, ModelKeys.ENCRYPTION_NAME); SslConfigurationBuilder ssl = builder.remoteSecurity().ssl(); ssl.enable().sniHostName(EncryptionResource.SNI_HOSTNAME.resolveModelAttribute(context, encryption).asString()); String realm = EncryptionResource.SECURITY_REALM.resolveModelAttribute(context, encryption).asString(); ServiceName securityRealmServiceName = SecurityRealm.ServiceUtil.createServiceName(realm);
.remoteSecurity(); remoteSecurity .ssl().enable() .keyStoreFileName(cl.getResource("keystore_client.jks").getPath()) .keyStorePassword("secret".toCharArray()) .trustStoreFileName(cl.getResource("ca.jks").getPath()) .trustStorePassword("secret".toCharArray()) .addServer() .host(hrServer.getHost()) .port(hrServer.getPort());