Skip to content

Commit

Permalink
Fix default key store type for JDK PKCS setup
Browse files Browse the repository at this point in the history
Fix default key/trust store
type which is `JKS` but not `PKCS12`

Signed-off-by: Andrey Pleskach <[email protected]>
  • Loading branch information
willyborankin committed Dec 30, 2024
1 parent a3345ef commit b8a8c94
Show file tree
Hide file tree
Showing 3 changed files with 7 additions and 4 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,6 @@
import java.nio.file.Files;
import java.nio.file.LinkOption;
import java.nio.file.Path;
import java.security.KeyStore;

import org.apache.logging.log4j.LogManager;
import org.apache.logging.log4j.Logger;
Expand All @@ -27,6 +26,7 @@

import static org.opensearch.security.ssl.SecureSSLSettings.SECURE_SUFFIX;
import static org.opensearch.security.ssl.util.SSLConfigConstants.DEFAULT_STORE_PASSWORD;
import static org.opensearch.security.ssl.util.SSLConfigConstants.DEFAULT_STORE_TYPE;
import static org.opensearch.security.ssl.util.SSLConfigConstants.KEYSTORE_ALIAS;
import static org.opensearch.security.ssl.util.SSLConfigConstants.KEYSTORE_FILEPATH;
import static org.opensearch.security.ssl.util.SSLConfigConstants.KEYSTORE_KEY_PASSWORD;
Expand Down Expand Up @@ -123,7 +123,7 @@ private KeyStoreConfiguration.JdkKeyStoreConfiguration buildJdkKeyStoreConfigura
) {
return new KeyStoreConfiguration.JdkKeyStoreConfiguration(
resolvePath(environment.settings().get(sslConfigSuffix + KEYSTORE_FILEPATH), environment),
environment.settings().get(sslConfigSuffix + KEYSTORE_TYPE, KeyStore.getDefaultType()),
environment.settings().get(sslConfigSuffix + KEYSTORE_TYPE, DEFAULT_STORE_TYPE),
settings.get(KEYSTORE_ALIAS, null),
keyStorePassword,
keyPassword
Expand All @@ -137,7 +137,7 @@ private TrustStoreConfiguration.JdkTrustStoreConfiguration buildJdkTrustStoreCon
) {
return new TrustStoreConfiguration.JdkTrustStoreConfiguration(
resolvePath(environment.settings().get(sslConfigSuffix + TRUSTSTORE_FILEPATH), environment),
environment.settings().get(sslConfigSuffix + TRUSTSTORE_TYPE, KeyStore.getDefaultType()),
environment.settings().get(sslConfigSuffix + TRUSTSTORE_TYPE, DEFAULT_STORE_TYPE),
settings.get(TRUSTSTORE_ALIAS, null),
trustStorePassword
);
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,8 @@

public final class SSLConfigConstants {

public static final String DEFAULT_STORE_TYPE = "JKS";

public static final String SSL_PREFIX = "plugins.security.ssl.";

public static final String HTTP_SETTINGS = "http";
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,7 @@
import static org.hamcrest.CoreMatchers.is;
import static org.hamcrest.MatcherAssert.assertThat;
import static org.opensearch.security.ssl.util.SSLConfigConstants.DEFAULT_STORE_PASSWORD;
import static org.opensearch.security.ssl.util.SSLConfigConstants.DEFAULT_STORE_TYPE;
import static org.opensearch.security.ssl.util.SSLConfigConstants.ENABLED;
import static org.opensearch.security.ssl.util.SSLConfigConstants.KEYSTORE_ALIAS;
import static org.opensearch.security.ssl.util.SSLConfigConstants.KEYSTORE_FILEPATH;
Expand All @@ -54,7 +55,7 @@

public class JdkSslCertificatesLoaderTest extends SslCertificatesLoaderTest {

static final Function<String, String> resolveKeyStoreType = s -> isNull(s) ? KeyStore.getDefaultType() : s;
static final Function<String, String> resolveKeyStoreType = s -> isNull(s) ? DEFAULT_STORE_TYPE : s;

static final String SERVER_TRUSTSTORE_ALIAS = "server-truststore-alias";

Expand Down

0 comments on commit b8a8c94

Please sign in to comment.