[
https://issues.jboss.org/browse/AS7-3419?page=com.atlassian.jira.plugin.s...
]
Tomaz Cerar commented on AS7-3419:
----------------------------------
What does not work? I have tested it and it work properly...
i have tested with this configuration and all expressions resolved properly:
{code:xml}
<connector name="https" protocol="HTTP/1.1"
scheme="https" socket-binding="https" secure="true">
<ssl name="ssl.name" key-alias="alias"
password="${ssl.keystore.password:defaultPassword}"
certificate-key-file="${jboss.server.config.dir}/keystore.p12"
verify-client="true"
ca-certificate-file="${jboss.server.config.dir}/megapos.jks"
ca-certificate-password="${my.custom.sysprop:password}"
keystore-type="PKCS12" truststore-type="JKS"/>
</connector>
{code}
I didn't test with vault expression but other then that all expressions resolved
properly
JBossWeb::ssl element in connector settings should check for
vaultified strings
-------------------------------------------------------------------------------
Key: AS7-3419
URL:
https://issues.jboss.org/browse/AS7-3419
Project: Application Server 7
Issue Type: Feature Request
Components: Web
Affects Versions: 7.1.0.CR1
Reporter: Anil Saldhana
Assignee: Tomaz Cerar
Fix For: 7.1.0.Final
Currently, the passwords in the ssl element of the connector settings are in clear text.
https://community.jboss.org/wiki/JBossAS7SecuringPasswords describes very simple ways
of checking whether a string is of the vault format and invoking the vault to get the
decrypted string value.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators:
https://issues.jboss.org/secure/ContactAdministrators!default.jspa
For more information on JIRA, see:
http://www.atlassian.com/software/jira