[ https://issues.apache.org/jira/browse/ARTEMIS-4528?focusedWorklogId=894565&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-894565 ]
ASF GitHub Bot logged work on ARTEMIS-4528: ------------------------------------------- Author: ASF GitHub Bot Created on: 07/Dec/23 17:34 Start Date: 07/Dec/23 17:34 Worklog Time Spent: 10m Work Description: gtully commented on code in PR #4706: URL: https://github.com/apache/activemq-artemis/pull/4706#discussion_r1419342895 ########## tests/security-resources/build.sh: ########## @@ -153,6 +153,10 @@ keytool -storetype pkcs12 -keystore unknown-client-keystore.p12 -storepass $STOR keytool -importkeystore -srckeystore unknown-client-keystore.p12 -destkeystore unknown-client-keystore.jceks -srcstoretype pkcs12 -deststoretype jceks -srcstorepass securepass -deststorepass securepass keytool -importkeystore -srckeystore unknown-client-keystore.p12 -destkeystore unknown-client-keystore.jks -srcstoretype pkcs12 -deststoretype jks -srcstorepass securepass -deststorepass securepass +# PEM versions +openssl pkcs12 -in server-keystore.p12 -out server-key-cert.pem -nodes -password pass:$STORE_PASS +openssl pkcs12 -in client-keystore.p12 -out client-key-cert.pem -nodes -password pass:$STORE_PASS + # Clean up working files # ----------------------- -rm -f *.crt *.csr openssl-* +rm -f *.csr openssl-* Review Comment: I have made pem files of the crt files I was referencing, allowing me to revert this. Issue Time Tracking ------------------- Worklog Id: (was: 894565) Time Spent: 1.5h (was: 1h 20m) > TLS support PEM format for key and trust store type > --------------------------------------------------- > > Key: ARTEMIS-4528 > URL: https://issues.apache.org/jira/browse/ARTEMIS-4528 > Project: ActiveMQ Artemis > Issue Type: Improvement > Components: Configuration > Affects Versions: 2.31.0 > Reporter: Gary Tully > Assignee: Gary Tully > Priority: Major > Fix For: 2.32.0 > > Time Spent: 1.5h > Remaining Estimate: 0h > > managing key and trust store passwords when the credentials are securely > stored or managed by other means is a nuisance. > there is a nice PEM keystore provider at: > [https://github.com/ctron/pem-keystore] > This gives us an intuitive way to easily reference a simple cert or key > without a password as is the case with jsk or pkcs12 > <acceptor > name="netty-ssl-acceptor">tcp://localhost:5500?sslEnabled=true;keyStorePath=server-keystore.pem;keyStoreType=PEM</acceptor> > -- This message was sent by Atlassian Jira (v8.20.10#820010)