Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

support standalone process with keystore/truststore type #994

Closed
3 of 4 tasks
aklemp opened this issue Sep 21, 2018 · 9 comments
Closed
3 of 4 tasks

support standalone process with keystore/truststore type #994

aklemp opened this issue Sep 21, 2018 · 9 comments

Comments

@aklemp
Copy link

aklemp commented Sep 21, 2018

@tomakehurst
Copy link
Member

I'll mark this as a feature request.

The reason we never bothered putting it in the CLI is that for a while the only practical reason to change it from the default was embedded Android testing.

@tomakehurst
Copy link
Member

Happy to accept a PR if you need this at all quickly.

@aklemp
Copy link
Author

aklemp commented Sep 26, 2018

Unfortunately, while testing the pull request, I noticed that this alone is not supporting PKCS12 as keystore. In addition the keystore password is required as described in #807. Temporarily setting the password in JettyHttpServer allows using a PKCS12 keystore. As described in the issue, it would break backwards compatibility so I haven't included that change in this PR.

@tomakehurst
Copy link
Member

Sorry for the long delay on this.

Is it not sufficient to use the existing --keystore-password and --truststore-password parameters with a type of PKCS12?

@aklemp
Copy link
Author

aklemp commented Jan 4, 2019

When I last tested this, it was not sufficient because it is not propagated in the JettyHttpServer.

@tomakehurst
Copy link
Member

Ah yes, it's calling setKeyManagerPassword(), not setKeyStorePassword(). I honestly can't remember why I did it that way, but it's not very intuitive.

I think this is a rare case where a breaking change might be the best way forward, adding support for both a key store and key manager password as separate config parameters (switching --keystore-password so that it actually ends up calling setKeyStorePassword()).

Would you be willing to add this to your PR?

@aklemp
Copy link
Author

aklemp commented Jan 6, 2019

Ok. I'm on it. Implementation seems to be done but I still have to test it in the next few days.

@aklemp
Copy link
Author

aklemp commented Jan 7, 2019

Updated the pull request. But I have no idea where to document that it contains the breaking change.

@phillbarber
Copy link

Perhaps the breaking change could be documented in the release notes? It would be great if this could be merged. I was almost about to start working on a fix for https://github.com/tomakehurst/wiremock/issues/807 when I realised that this fixes it. Thanks @aklemp for addressing this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants