Closed wkruse closed 5 years ago
It's by design, but we plan to change to native rpm in corretto-8-docker in the future.
That rpm will have dependency on system cacerts.
For you case, you can specify cacerts in your java options explicitly. -Djavax.net.ssl.trustStore=/etc/pki/ca-trust/extracted/java/cacerts
@navyxliu Thanks for the info, we are linking ${JAVA_HOME}/jre/lib/security/cacerts
to /etc/pki/ca-trust/extracted/java/cacerts
for now. The Amazon Root CA certs are in both trust stores and adding custom CAs to the system trust store is a lot easier.
Right now there are two trust stores in the Docker image:
/etc/pki/ca-trust/extracted/java/cacerts
/usr/lib/jvm/java-1.8.0-amazon-corretto/jre/lib/security/cacerts
Amazon Corretto 8 is using the latter:
But importing the for example the
rds-combined-ca-bundle.pem
withkeytool
to/usr/lib/jvm/java-1.8.0-amazon-corretto/jre/lib/security/cacerts
doesn't work as only the first certificate in the bundle is imported. Possible solutions would be either to splitrds-combined-ca-bundle.pem
to separate certificates and import them one-by-one or to convert the bundle to PKCS#7...https://docs.aws.amazon.com/documentdb/latest/developerguide/connect.html
It is a lot easier to import
rds-combined-ca-bundle.pem
to/etc/pki/ca-trust/extracted/java/cacerts
:https://www.systutorials.com/docs/linux/man/8-update-ca-trust/
Is there a good reason NOT to link
${JAVA_HOME}/jre/lib/security/cacerts
to/etc/pki/ca-trust/extracted/java/cacerts
per default in the Docker image?Related to https://github.com/corretto/corretto-8/issues/171.