@@ -83,8 +83,7 @@ task bwcTest {
83
83
84
84
task copyTestNodeKeyMaterial (type : Copy ) {
85
85
from project(' :x-pack:plugin:core' ). files(' src/test/resources/org/elasticsearch/xpack/security/transport/ssl/certs/simple/testnode.pem' ,
86
- ' src/test/resources/org/elasticsearch/xpack/security/transport/ssl/certs/simple/testnode.crt' ,
87
- ' src/test/resources/org/elasticsearch/xpack/security/transport/ssl/certs/simple/testnode.jks' )
86
+ ' src/test/resources/org/elasticsearch/xpack/security/transport/ssl/certs/simple/testnode.crt' )
88
87
into outputDir
89
88
}
90
89
@@ -122,18 +121,11 @@ for (Version version : bwcVersions.wireCompatible) {
122
121
setting ' xpack.security.authc.token.enabled' , ' true'
123
122
setting ' xpack.security.authc.token.timeout' , ' 60m'
124
123
setting ' xpack.security.audit.enabled' , ' true'
125
- rootProject. globalInfo. ready {
126
- if (project. inFipsJvm) {
127
- setting ' xpack.security.transport.ssl.key' , ' testnode.pem'
128
- setting ' xpack.security.transport.ssl.certificate' , ' testnode.crt'
129
- keystoreSetting ' xpack.security.transport.ssl.secure_key_passphrase' , ' testnode'
130
- } else {
131
- setting ' xpack.security.transport.ssl.keystore.path' , ' testnode.jks'
132
- setting ' xpack.security.transport.ssl.keystore.password' , ' testnode'
133
- }
134
- }
124
+ setting ' xpack.security.transport.ssl.key' , ' testnode.pem'
125
+ setting ' xpack.security.transport.ssl.certificate' , ' testnode.crt'
126
+ keystoreSetting ' xpack.security.transport.ssl.secure_key_passphrase' , ' testnode'
127
+
135
128
dependsOn copyTestNodeKeyMaterial
136
- extraConfigFile ' testnode.jks' , new File (outputDir + ' /testnode.jks' )
137
129
extraConfigFile ' testnode.pem' , new File (outputDir + ' /testnode.pem' )
138
130
extraConfigFile ' testnode.crt' , new File (outputDir + ' /testnode.crt' )
139
131
if (version. onOrAfter(' 7.0.0' )) {
@@ -188,22 +180,15 @@ for (Version version : bwcVersions.wireCompatible) {
188
180
setting ' xpack.security.enabled' , ' true'
189
181
setting ' xpack.security.transport.ssl.enabled' , ' true'
190
182
setting ' xpack.security.authc.token.timeout' , ' 60m'
191
- rootProject. globalInfo. ready {
192
- if (project. inFipsJvm) {
193
- setting ' xpack.security.transport.ssl.key' , ' testnode.pem'
194
- setting ' xpack.security.transport.ssl.certificate' , ' testnode.crt'
195
- keystoreSetting ' xpack.security.transport.ssl.secure_key_passphrase' , ' testnode'
196
- } else {
197
- setting ' xpack.security.transport.ssl.keystore.path' , ' testnode.jks'
198
- setting ' xpack.security.transport.ssl.keystore.password' , ' testnode'
199
- }
200
- }
183
+ setting ' xpack.security.transport.ssl.key' , ' testnode.pem'
184
+ setting ' xpack.security.transport.ssl.certificate' , ' testnode.crt'
185
+ keystoreSetting ' xpack.security.transport.ssl.secure_key_passphrase' , ' testnode'
186
+
201
187
setting ' node.attr.upgraded' , ' true'
202
188
setting ' xpack.security.authc.token.enabled' , ' true'
203
189
setting ' xpack.security.audit.enabled' , ' true'
204
190
setting ' node.name' , " upgraded-node-${ stopNode} "
205
191
dependsOn copyTestNodeKeyMaterial
206
- extraConfigFile ' testnode.jks' , new File (outputDir + ' /testnode.jks' )
207
192
extraConfigFile ' testnode.pem' , new File (outputDir + ' /testnode.pem' )
208
193
extraConfigFile ' testnode.crt' , new File (outputDir + ' /testnode.crt' )
209
194
if (version. onOrAfter(' 7.0.0' )) {
0 commit comments