]> WPIA git - gigi.git/commitdiff
FIX: Naive trust manager for EmailProviderClass tests
authorJanis Streib <janis@dogcraft.de>
Wed, 20 May 2015 18:23:50 +0000 (20:23 +0200)
committerJanis Streib <janis@dogcraft.de>
Wed, 20 May 2015 18:23:50 +0000 (20:23 +0200)
tests/org/cacert/gigi/email/TestEmailProviderClass.java

index 1098ac3aac75c64809dc0806ff068091a3262e35..2b470f767c2c4040c201604f2ee9ecd43baf0a8b 100644 (file)
@@ -4,8 +4,16 @@ import static org.junit.Assert.*;
 import static org.junit.Assume.*;
 
 import java.io.IOException;
+import java.security.KeyManagementException;
+import java.security.NoSuchAlgorithmException;
+import java.security.cert.CertificateException;
+import java.security.cert.X509Certificate;
 import java.util.Properties;
 
+import javax.net.ssl.SSLContext;
+import javax.net.ssl.TrustManager;
+import javax.net.ssl.X509TrustManager;
+
 import org.cacert.gigi.testUtils.ConfiguredTest;
 import org.junit.BeforeClass;
 import org.junit.Test;
@@ -37,9 +45,30 @@ public class TestEmailProviderClass extends ConfiguredTest {
     }
 
     @BeforeClass
-    public static void initMailsystem() {
+    public static void initMailsystem() throws NoSuchAlgorithmException, KeyManagementException {
         Properties prop = new Properties();
         prop.setProperty("emailProvider", "org.cacert.gigi.email.Sendmail");
         EmailProvider.initSystem(prop, null, null);
+        SSLContext c = SSLContext.getInstance("TLS");
+        c.init(null, new TrustManager[] {
+            new X509TrustManager() {
+
+                @Override
+                public X509Certificate[] getAcceptedIssuers() {
+                    return null;
+                }
+
+                @Override
+                public void checkClientTrusted(X509Certificate[] arg0, String arg1) throws CertificateException {
+
+                }
+
+                @Override
+                public void checkServerTrusted(X509Certificate[] arg0, String arg1) throws CertificateException {
+
+                }
+            }
+        }, null);
+        SSLContext.setDefault(c);
     }
 }