mirror of
https://github.com/honeymoose/OpenSearch.git
synced 2025-02-17 02:14:54 +00:00
In KeystoreWrapper class we determine if the error to decrypt a given keystore is caused by a wrong password based on the exception that the SunJCE implementation of AES is throwing(AEADBadTagException). Other implementations from other Security Providers fail with a different exception and as such we cannot differentiate between a corrupted file and a wrong password in a foolproof way. As in other tests such as in KeyStoreWrapperTests#testDecryptKeyStoreWithWrongPassword we handle this by matching both possible exception messages.
This commit is contained in:
parent
0f233b1b0b
commit
38e55cd348
@ -18,7 +18,9 @@ setup:
|
|||||||
- is_true: nodes
|
- is_true: nodes
|
||||||
- is_true: cluster_name
|
- is_true: cluster_name
|
||||||
- match: { nodes.$node_id.reload_exception.type: "security_exception" }
|
- match: { nodes.$node_id.reload_exception.type: "security_exception" }
|
||||||
- match: { nodes.$node_id.reload_exception.reason: "Provided keystore password was incorrect" }
|
- match: { nodes.$node_id.reload_exception.reason:
|
||||||
|
/^(Provided\skeystore\spassword\swas\sincorrect|
|
||||||
|
Keystore\shas\sbeen\scorrupted\sor\stampered\swith)$/ }
|
||||||
|
|
||||||
---
|
---
|
||||||
"node_reload_secure_settings test correct(empty) password":
|
"node_reload_secure_settings test correct(empty) password":
|
||||||
|
Loading…
x
Reference in New Issue
Block a user