Uploaded image for project: 'Cloud Enablement'
  1. Cloud Enablement
  2. CLOUD-2289

Automatically import service-ca.crt in jre/lib/security/cacerts

XMLWordPrintable

    • Icon: Enhancement Enhancement
    • Resolution: Duplicate
    • Icon: Major Major
    • None
    • None
    • Common
    • None

      Currently certificate key/value pairs can be created automatically via the service.alpha.openshift.io/serving-cert-secret-name annotation. These certificates can then be consumed by client pods via the `/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt` file. For pods executing Java applications that require encryption it's necessary for each pod to import said file using keytool (either in a local truststore or system wide via `$JAVA_HOME/jre/lib/security/cacerts`).

      As many users will be creating client applications within their projects to consume middleware services, we should automate the importing of service-ca.crt into the JRE cacerts as part of the openJDK base image.

      An example use case is client pods consuming the JDG caching service (where encryption is enabled by default).

              Unassigned Unassigned
              remerson@redhat.com Ryan Emerson
              Votes:
              1 Vote for this issue
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: