On Fri, 2 Jun 2023 11:54:00 GMT, Weijun Wang <wei...@openjdk.org> wrote:

>> Currently, security properties are held within the `java.security` file in 
>> the JDK tree for each installed JDK. The system property 
>> `java.security.properties` can be used to point to a file containing 
>> additional properties. These can be appended to the existing set or override 
>> all existing properties.
>> 
>> There is currently no way to specify additional properties permanently or to 
>> reference multiple files. Making permanent changes to the `java.security` 
>> properties requires editing the `java.security` file in each JDK where the 
>> changes are required.
>> 
>> This patch allows a directory tree to be specified either permanently in the 
>> java.security file by the `security.propertiesDir` property or on the 
>> command line using `java.security.propertiesDir`. Any property files found 
>> in this directory tree can be appended to those specified in 
>> `java.security`, as with the single file used by `java.security.properties`.
>> 
>> As an example, the `security.propertiesDir` in the `java.security` file of 
>> each JDK can be set to a common shared directory, allowing all JDKs to share 
>> a common set of security properties. This eases setting up properties on 
>> each new JDK installation and also allows the shared properties to be 
>> maintained under different access permissions to those of the JDK.
>> 
>> The command-line variant, `java.security.propertiesDir`, is intended 
>> primarily for testing and to disable a permanent properties directory by 
>> setting the value to empty. As with `java.security.properties`, the system 
>> property will be ignored if `security.overridePropertiesFile` in the 
>> `java.security` file is not set to true.
>> 
>> A less flexible version of this patch (a permanent hardcoded single file) 
>> has been [used in our JDK installations since 
>> 2016](https://bugzilla.redhat.com/show_bug.cgi?id=1249083) to provide a 
>> system-wide crypto policy. Having support for this in the upstream JDK would 
>> allow us to remove a local patch from our builds and reduce divergence from 
>> upstream.
>
> src/java.base/share/classes/java/security/Security.java line 139:
> 
>> 137:                 extraPropDir = PropertyExpander.expand(extraPropDir);
>> 138:                 stream = Files.find(Path.of(extraPropDir), 
>> Integer.MAX_VALUE,
>> 139:                                     ((path, attrs) -> 
>> attrs.isRegularFile()));
> 
> You might want to exclude those files starting with `.` . Some OSes 
> automatically generate them.

Yes, a check on `Files.isHidden(path)` should cover that.

-------------

PR Review Comment: https://git.openjdk.org/jdk/pull/14277#discussion_r1214304805

Reply via email to