-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Inputs can not read trusted TLS certs from directory #5939
Comments
duplicate of #5856 |
mpfz0r
added a commit
that referenced
this issue
May 22, 2019
The Input configuration TLS Client Auth Trusted Certs used to support either a file, or a directory of certificates. This got broken in 3.0 with PR #4397 - Fix this by extending also handling directories in loadCertificates(). - Delete the old TrustManager based version that is not used anymore. - Extend the KeyUtilTest and use `Resources.getResource()` instead, which does not rely on the resources to exist in the target directory. Fixes #5939
This was referenced May 22, 2019
mpfz0r
added a commit
that referenced
this issue
May 22, 2019
The Input configuration TLS Client Auth Trusted Certs used to support either a file, or a directory of certificates. This got broken in 3.0 with PR #4397 - Fix this by extending loadCertificates() to also handle directories. - Delete the old TrustManager based version that is not used anymore. - Extend the KeyUtilTest and use `Resources.getResource()` instead, which does not rely on the resources to exist in the target directory. Fixes #5939
kmerz
pushed a commit
that referenced
this issue
Jul 9, 2019
The Input configuration TLS Client Auth Trusted Certs used to support either a file, or a directory of certificates. This got broken in 3.0 with PR #4397 - Fix this by extending loadCertificates() to also handle directories. - Delete the old TrustManager based version that is not used anymore. - Extend the KeyUtilTest and use `Resources.getResource()` instead, which does not rely on the resources to exist in the target directory. Fixes #5939
kmerz
pushed a commit
that referenced
this issue
Jul 9, 2019
The Input configuration TLS Client Auth Trusted Certs used to support either a file, or a directory of certificates. This got broken in 3.0 with PR #4397 - Fix this by extending loadCertificates() to also handle directories. - Delete the old TrustManager based version that is not used anymore. - Extend the KeyUtilTest and use `Resources.getResource()` instead, which does not rely on the resources to exist in the target directory. Fixes #5939
mpfz0r
pushed a commit
that referenced
this issue
Jul 9, 2019
The Input configuration TLS Client Auth Trusted Certs used to support either a file, or a directory of certificates. This got broken in 3.0 with PR #4397 - Fix this by extending loadCertificates() to also handle directories. - Delete the old TrustManager based version that is not used anymore. - Extend the KeyUtilTest and use `Resources.getResource()` instead, which does not rely on the resources to exist in the target directory. Fixes #5939
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
The Input configuration
TLS Client Auth Trusted Certs
used to supporteither a file, or a directory of certificates.
Expected Behavior
Providing a directory should read all the certs within it
Current Behavior
Possible Solution
Bring back the code that got dropped in 3.0 with #4397
The former code handled directories:
https://github.com/Graylog2/graylog2-server/blob/2.4/graylog2-server/src/main/java/org/graylog2/plugin/inputs/transports/util/KeyUtil.java#L87
Possible Workaround
cat(1) all the needed certificates into one file (untested)
$ cat *.crt > jumbo.crt
Your Environment
The text was updated successfully, but these errors were encountered: