On 10/08/2014 08:14 AM, Wang Weijun wrote:

On Oct 8, 2014, at 23:00, Sean Mullan <[email protected]> wrote:

I agree that we should not read jssecacerts by default. My vote would be to 
extend -trustcacerts to take an optional path to a cacerts file but fallback on 
lib/security/cacerts if not specified.

No keytool option takes an optional argument now. This will be a big change.

Ok, maybe add a new option then -cacertsfile <filename> (only applicable if -trustcacerts is specified).


This enhancement could then be useful for more than just jssecacerts. For 
example, in my JavaOne presentation, I gave an example of creating a Domain 
KeyStore that encompasses two root stores:

This means we will need to provide both store type and store path (or config 
file) in the same option. It looks like multiple system properties is good at 
this.

Good point.


Or, shall we invent a URI scheme?

No, that seems like too much work. In fact, it is plausible we should defer this RFE for now if it is a lot of work, and we have higher priority things to work on. How common is jssecacerts used anyway? I never really understood why there was a separate JSSE specific file for ca root certificates, I believe this may have been an artifact from when JSSE was shipped as a standalone extension.

--Sean


--Max


https://blogs.oracle.com/mullan/resource/J1-2014-CON5778.pdf

(see slides 34-35)

--Sean

Reply via email to