Skip to content

Commit 812fe47

Browse files
committed
Hide SSLService.sslContext and reloadSSLContext
1 parent fb73639 commit 812fe47

File tree

3 files changed

+15
-15
lines changed

3 files changed

+15
-15
lines changed

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/ssl/SSLService.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -375,11 +375,11 @@ public static boolean isSSLClientAuthEnabled(SslConfiguration sslConfiguration)
375375
/**
376376
* Returns the {@link SSLContext} for the configuration. Mainly used for testing
377377
*/
378-
public SSLContext sslContext(SslConfiguration configuration) {
378+
SSLContext sslContext(SslConfiguration configuration) {
379379
return sslContextHolder(configuration).sslContext();
380380
}
381381

382-
public void reloadSSLContext(SslConfiguration configuration) {
382+
void reloadSSLContext(SslConfiguration configuration) {
383383
sslContextHolder(configuration).reload();
384384
}
385385

x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/security/transport/netty4/SimpleSecurityNetty4ServerTransportTests.java

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,6 @@
3131
import org.elasticsearch.common.settings.Setting;
3232
import org.elasticsearch.common.settings.Settings;
3333
import org.elasticsearch.common.ssl.SslClientAuthenticationMode;
34-
import org.elasticsearch.common.ssl.SslConfiguration;
3534
import org.elasticsearch.common.transport.TransportAddress;
3635
import org.elasticsearch.common.unit.ByteSizeValue;
3736
import org.elasticsearch.common.util.PageCacheRecycler;
@@ -66,6 +65,7 @@
6665
import org.elasticsearch.xpack.core.XPackSettings;
6766
import org.elasticsearch.xpack.core.common.socket.SocketAccess;
6867
import org.elasticsearch.xpack.core.ssl.SSLService;
68+
import org.elasticsearch.xpack.core.ssl.SslProfile;
6969
import org.elasticsearch.xpack.security.authc.CrossClusterAccessAuthenticationService;
7070
import org.elasticsearch.xpack.security.transport.SSLEngineUtils;
7171
import org.elasticsearch.xpack.security.transport.filter.IPFilter;
@@ -215,8 +215,8 @@ public void testRenegotiation() throws Exception {
215215
SSLService sslService = createSSLService(
216216
Settings.builder().put("xpack.security.transport.ssl.supported_protocols", "TLSv1.2").build()
217217
);
218-
final SslConfiguration sslConfiguration = sslService.getSSLConfiguration("xpack.security.transport.ssl");
219-
SocketFactory factory = sslService.sslSocketFactory(sslConfiguration);
218+
final SslProfile sslProfile = sslService.profile("xpack.security.transport.ssl");
219+
final SocketFactory factory = sslProfile.socketFactory();
220220
try (SSLSocket socket = (SSLSocket) factory.createSocket()) {
221221
SocketAccess.doPrivileged(() -> socket.connect(serviceA.boundAddress().publishAddress().address()));
222222

@@ -267,8 +267,8 @@ public void testSNIServerNameIsPropagated() throws Exception {
267267
assumeFalse("Can't run in a FIPS JVM, TrustAllConfig is not a SunJSSE TrustManagers", inFipsJvm());
268268
SSLService sslService = createSSLService();
269269

270-
final SslConfiguration sslConfiguration = sslService.getSSLConfiguration("xpack.security.transport.ssl");
271-
SSLContext sslContext = sslService.sslContext(sslConfiguration);
270+
final SslProfile sslProfile = sslService.profile("xpack.security.transport.ssl");
271+
final SSLContext sslContext = sslProfile.sslContext();
272272
final SSLServerSocketFactory serverSocketFactory = sslContext.getServerSocketFactory();
273273
final String sniIp = "sni-hostname";
274274
final SNIHostName sniHostName = new SNIHostName(sniIp);
@@ -332,8 +332,8 @@ public void testInvalidSNIServerName() throws Exception {
332332
assumeFalse("Can't run in a FIPS JVM, TrustAllConfig is not a SunJSSE TrustManagers", inFipsJvm());
333333
SSLService sslService = createSSLService();
334334

335-
final SslConfiguration sslConfiguration = sslService.getSSLConfiguration("xpack.security.transport.ssl");
336-
SSLContext sslContext = sslService.sslContext(sslConfiguration);
335+
final SslProfile sslProfile = sslService.profile("xpack.security.transport.ssl");
336+
final SSLContext sslContext = sslProfile.sslContext();
337337
final SSLServerSocketFactory serverSocketFactory = sslContext.getServerSocketFactory();
338338
final String sniIp = "invalid_hostname";
339339

@@ -859,8 +859,8 @@ public void testTcpHandshakeTimeout() throws IOException {
859859
assumeFalse("Can't run in a FIPS JVM, TrustAllConfig is not a SunJSSE TrustManagers", inFipsJvm());
860860
SSLService sslService = createSSLService();
861861

862-
final SslConfiguration sslConfiguration = sslService.getSSLConfiguration("xpack.security.transport.ssl");
863-
SSLContext sslContext = sslService.sslContext(sslConfiguration);
862+
final SslProfile sslProfile = sslService.profile("xpack.security.transport.ssl");
863+
final SSLContext sslContext = sslProfile.sslContext();
864864
final SSLServerSocketFactory serverSocketFactory = sslContext.getServerSocketFactory();
865865
// use latch to to ensure that the accepted socket below isn't closed before the handshake times out
866866
final CountDownLatch doneLatch = new CountDownLatch(1);
@@ -996,8 +996,8 @@ public void testTcpHandshakeConnectionReset() throws IOException, InterruptedExc
996996
assumeFalse("Can't run in a FIPS JVM, TrustAllConfig is not a SunJSSE TrustManagers", inFipsJvm());
997997
SSLService sslService = createSSLService();
998998

999-
final SslConfiguration sslConfiguration = sslService.getSSLConfiguration("xpack.security.transport.ssl");
1000-
SSLContext sslContext = sslService.sslContext(sslConfiguration);
999+
final SslProfile sslProfile = sslService.profile("xpack.security.transport.ssl");
1000+
final SSLContext sslContext = sslProfile.sslContext();
10011001
final SSLServerSocketFactory serverSocketFactory = sslContext.getServerSocketFactory();
10021002
try (ServerSocket socket = serverSocketFactory.createServerSocket()) {
10031003
socket.bind(getLocalEphemeral(), 1);

x-pack/plugin/security/src/test/java/org/elasticsearch/xpack/ssl/SSLErrorMessageCertificateVerificationTests.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -228,8 +228,8 @@ private static String randomCapitalization(Enum<?> enumValue) {
228228
}
229229

230230
private MockWebServer initWebServer(SSLService sslService) throws IOException {
231-
final SslConfiguration httpSslConfig = sslService.getSSLConfiguration(HTTP_SERVER_SSL);
232-
final MockWebServer webServer = new MockWebServer(sslService.sslContext(httpSslConfig), false);
231+
final SslProfile httpSslProfile = sslService.profile(HTTP_SERVER_SSL);
232+
final MockWebServer webServer = new MockWebServer(httpSslProfile.sslContext(), false);
233233

234234
webServer.enqueue(new MockResponse().setBody("{}").setResponseCode(200));
235235
webServer.start();

0 commit comments

Comments
 (0)