Uploaded image for project: 'Cloud Enablement'
  1. Cloud Enablement
  2. CLOUD-2289

Automatically import service-ca.crt in jre/lib/security/cacerts

XMLWordPrintable

    • Icon: Enhancement Enhancement
    • Resolution: Duplicate
    • Icon: Major Major
    • None
    • None
    • Common
    • None

      Currently certificate key/value pairs can be created automatically via the service.alpha.openshift.io/serving-cert-secret-name annotation. These certificates can then be consumed by client pods via the `/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt` file. For pods executing Java applications that require encryption it's necessary for each pod to import said file using keytool (either in a local truststore or system wide via `$JAVA_HOME/jre/lib/security/cacerts`).

      As many users will be creating client applications within their projects to consume middleware services, we should automate the importing of service-ca.crt into the JRE cacerts as part of the openJDK base image.

      An example use case is client pods consuming the JDG caching service (where encryption is enabled by default).

            Unassigned Unassigned
            remerson@redhat.com Ryan Emerson
            Votes:
            1 Vote for this issue
            Watchers:
            4 Start watching this issue

              Created:
              Updated:
              Resolved: