@@ -83,8 +83,7 @@ task bwcTest {
83
83
84
84
task copyTestNodeKeyMaterial (type : Copy ) {
85
85
from project(' :x-pack:plugin:core' ). files(' src/test/resources/org/elasticsearch/xpack/security/transport/ssl/certs/simple/testnode.pem' ,
86
- ' src/test/resources/org/elasticsearch/xpack/security/transport/ssl/certs/simple/testnode.crt' ,
87
- ' src/test/resources/org/elasticsearch/xpack/security/transport/ssl/certs/simple/testnode.jks' )
86
+ ' src/test/resources/org/elasticsearch/xpack/security/transport/ssl/certs/simple/testnode.crt' )
88
87
into outputDir
89
88
}
90
89
@@ -122,18 +121,11 @@ for (Version version : bwcVersions.wireCompatible) {
122
121
setting ' xpack.security.authc.token.enabled' , ' true'
123
122
setting ' xpack.security.authc.token.timeout' , ' 60m'
124
123
setting ' xpack.security.audit.enabled' , ' true'
125
- rootProject. globalInfo. ready {
126
- if (project. inFipsJvm) {
127
- setting ' xpack.security.transport.ssl.key' , ' testnode.pem'
128
- setting ' xpack.security.transport.ssl.certificate' , ' testnode.crt'
129
- keystoreSetting ' xpack.security.transport.ssl.secure_key_passphrase' , ' testnode'
130
- } else {
131
- setting ' xpack.security.transport.ssl.keystore.path' , ' testnode.jks'
132
- setting ' xpack.security.transport.ssl.keystore.password' , ' testnode'
133
- }
134
- }
124
+ setting ' xpack.security.transport.ssl.key' , ' testnode.pem'
125
+ setting ' xpack.security.transport.ssl.certificate' , ' testnode.crt'
126
+ keystoreSetting ' xpack.security.transport.ssl.secure_key_passphrase' , ' testnode'
127
+
135
128
dependsOn copyTestNodeKeyMaterial
136
- extraConfigFile ' testnode.jks' , new File (outputDir + ' /testnode.jks' )
137
129
extraConfigFile ' testnode.pem' , new File (outputDir + ' /testnode.pem' )
138
130
extraConfigFile ' testnode.crt' , new File (outputDir + ' /testnode.crt' )
139
131
if (version. onOrAfter(' 7.0.0' )) {
@@ -196,22 +188,15 @@ for (Version version : bwcVersions.wireCompatible) {
196
188
setting ' xpack.security.enabled' , ' true'
197
189
setting ' xpack.security.transport.ssl.enabled' , ' true'
198
190
setting ' xpack.security.authc.token.timeout' , ' 60m'
199
- rootProject. globalInfo. ready {
200
- if (project. inFipsJvm) {
201
- setting ' xpack.security.transport.ssl.key' , ' testnode.pem'
202
- setting ' xpack.security.transport.ssl.certificate' , ' testnode.crt'
203
- keystoreSetting ' xpack.security.transport.ssl.secure_key_passphrase' , ' testnode'
204
- } else {
205
- setting ' xpack.security.transport.ssl.keystore.path' , ' testnode.jks'
206
- setting ' xpack.security.transport.ssl.keystore.password' , ' testnode'
207
- }
208
- }
191
+ setting ' xpack.security.transport.ssl.key' , ' testnode.pem'
192
+ setting ' xpack.security.transport.ssl.certificate' , ' testnode.crt'
193
+ keystoreSetting ' xpack.security.transport.ssl.secure_key_passphrase' , ' testnode'
194
+
209
195
setting ' node.attr.upgraded' , ' true'
210
196
setting ' xpack.security.authc.token.enabled' , ' true'
211
197
setting ' xpack.security.audit.enabled' , ' true'
212
198
setting ' node.name' , " upgraded-node-${ stopNode} "
213
199
dependsOn copyTestNodeKeyMaterial
214
- extraConfigFile ' testnode.jks' , new File (outputDir + ' /testnode.jks' )
215
200
extraConfigFile ' testnode.pem' , new File (outputDir + ' /testnode.pem' )
216
201
extraConfigFile ' testnode.crt' , new File (outputDir + ' /testnode.crt' )
217
202
setting ' xpack.security.authc.realms.file.file1.order' , ' 0'
0 commit comments