Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

certs + private keys location is not in line with MRI #49

Closed
mkristian opened this issue Jun 17, 2015 · 3 comments · Fixed by #61
Closed

certs + private keys location is not in line with MRI #49

mkristian opened this issue Jun 17, 2015 · 3 comments · Fixed by #61

Comments

@mkristian
Copy link
Member

/usr/lib/ssl$ ls -al
certs -> /etc/ssl/certs
misc
openssl.cnf -> /etc/ssl/openssl.cnf
private -> /etc/ssl/private

MRI seems to inherits this from openssl

currently things do follow this partially:

  • for private keys it looks at /usr/lib/ssl/private
  • cacerts it looks in $JAVA_HOME/lib/security/cacerts but not in /usr/lib/ssl/certs

ubuntu does link the /usr/lib/ssl/ files to /etc/ssl

so altogether jruby-openssl do use the openssl directories and just fall back on $JAVA_HOME/lib/security/cacerts if there is a not other cacerts.

@kares
Copy link
Member

kares commented Jun 23, 2015

that should be actually smt intended see b914091 ... and issues such as jruby/jruby#1953

mkristian added a commit that referenced this issue Aug 10, 2015
keep the default x509 certs and directories in line with MRI, only if
they do not exists fallback on cacerts from the java.home/lib/security/cacerts

fixes #49 and keeps the idea of b914091

Sponsored by Lookout Inc.
mkristian added a commit that referenced this issue Aug 10, 2015
keep the default x509 certs and directories in line with MRI, only if
they do not exists fallback on cacerts from the java.home/lib/security/cacerts

fixes #49 and keeps the idea of b914091

Sponsored by Lookout Inc.
@kares
Copy link
Member

kares commented Aug 21, 2015

reverted in 0.9.10 ... aa35fb9

@kares kares reopened this Aug 21, 2015
@mkristian
Copy link
Member Author

see also discussion on this here: 1d3ba21#commitcomment-12800429

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants