diff --git a/solr/bin/solr b/solr/bin/solr index d17f00a4013..0f901832d24 100755 --- a/solr/bin/solr +++ b/solr/bin/solr @@ -241,7 +241,7 @@ if [ "$SOLR_SSL_ENABLED" == "true" ]; then fi if [ "${SOLR_SSL_CLIENT_HOSTNAME_VERIFICATION:true}" == "true" ] ; then - SOLR_SSL_OPTS+=" -Dsolr.jetty.ssl.verifyClientHostName=HTTPS" + SOLR_SSL_OPTS+=" -Dsolr.jetty.ssl.verify.client.hostname=HTTPS" fi if [ -n "$SOLR_SSL_NEED_CLIENT_AUTH" ]; then diff --git a/solr/bin/solr.cmd b/solr/bin/solr.cmd index 44262f4f974..b4612d96373 100755 --- a/solr/bin/solr.cmd +++ b/solr/bin/solr.cmd @@ -109,7 +109,7 @@ IF "%SOLR_SSL_ENABLED%"=="true" ( set "SOLR_SSL_OPTS=!SOLR_SSL_OPTS! -Dsolr.jetty.keystore=%SOLR_SSL_KEY_STORE%" IF "%SOLR_SSL_RELOAD_ENABLED%"=="true" ( IF "%SOLR_SECURITY_MANAGER_ENABLED%"=="true" ( - set "SOLR_SSL_OPTS=!SOLR_SSL_OPTS! -Dsolr.jetty.keystoreParentPath=%SOLR_SSL_KEY_STORE%/.." + set "SOLR_SSL_OPTS=!SOLR_SSL_OPTS! -Dsolr.jetty.keystore.parent.path=%SOLR_SSL_KEY_STORE%/.." ) ) ) @@ -129,7 +129,7 @@ IF "%SOLR_SSL_ENABLED%"=="true" ( set SOLR_SSL_CLIENT_HOSTNAME_VERIFICATION=true ) IF "%SOLR_SSL_CLIENT_HOSTNAME_VERIFICATION%"=="true" ( - set "SOLR_SSL_OPTS=!SOLR_SSL_OPTS! -Dsolr.jetty.ssl.verifyClientHostName=HTTPS" + set "SOLR_SSL_OPTS=!SOLR_SSL_OPTS! -Dsolr.jetty.ssl.verify.client.hostname=HTTPS" ) IF DEFINED SOLR_SSL_NEED_CLIENT_AUTH ( diff --git a/solr/core/src/test/org/apache/solr/cloud/TestMiniSolrCloudClusterSSL.java b/solr/core/src/test/org/apache/solr/cloud/TestMiniSolrCloudClusterSSL.java index c82864b7f6f..e2a60e7edef 100644 --- a/solr/core/src/test/org/apache/solr/cloud/TestMiniSolrCloudClusterSSL.java +++ b/solr/core/src/test/org/apache/solr/cloud/TestMiniSolrCloudClusterSSL.java @@ -82,7 +82,7 @@ public class TestMiniSolrCloudClusterSSL extends SolrTestCaseJ4 { @Rule public TestRule syspropRestore = - new TestRuleRestoreSystemProperties(SolrHttpConstants.SYS_PROP_CHECK_PEER_NAME); + new TestRuleRestoreSystemProperties(SolrHttpConstants.SYS_PROP_CHECK_PEER_NAME_ENABLED); @Before public void before() { @@ -178,7 +178,7 @@ private void checkClusterWithNodeReplacement(SSLTestConfig sslConfig) throws Exc SSLContext.setDefault( sslConfig.isSSLMode() ? sslConfig.buildClientSSLContext() : DEFAULT_SSL_CONTEXT); System.setProperty( - SolrHttpConstants.SYS_PROP_CHECK_PEER_NAME, + SolrHttpConstants.SYS_PROP_CHECK_PEER_NAME_ENABLED, Boolean.toString(sslConfig.getCheckPeerName())); HttpClientUtil.resetHttpClientBuilder(); Http2SolrClient.resetSslContextFactory(); @@ -208,7 +208,7 @@ public void testSslWithInvalidPeerName() throws Exception { // now initialize a client that still uses the existing SSLContext/Provider, so it will accept // our existing certificate, but *does* care about validating the peer name - System.setProperty(SolrHttpConstants.SYS_PROP_CHECK_PEER_NAME, "true"); + System.setProperty(SolrHttpConstants.SYS_PROP_CHECK_PEER_NAME_ENABLED, "true"); HttpClientUtil.resetHttpClientBuilder(); Http2SolrClient.resetSslContextFactory(); diff --git a/solr/server/etc/jetty-http.xml b/solr/server/etc/jetty-http.xml index 02f53991c5c..1874ffe991c 100644 --- a/solr/server/etc/jetty-http.xml +++ b/solr/server/etc/jetty-http.xml @@ -40,9 +40,9 @@ - - - + + + diff --git a/solr/server/etc/jetty-https.xml b/solr/server/etc/jetty-https.xml index 4a74eb12506..4df38159756 100644 --- a/solr/server/etc/jetty-https.xml +++ b/solr/server/etc/jetty-https.xml @@ -66,8 +66,8 @@ - - + + diff --git a/solr/server/etc/jetty-ssl.xml b/solr/server/etc/jetty-ssl.xml index 2762b8e7567..bd479f90348 100644 --- a/solr/server/etc/jetty-ssl.xml +++ b/solr/server/etc/jetty-ssl.xml @@ -23,7 +23,7 @@ - + diff --git a/solr/server/etc/jetty.xml b/solr/server/etc/jetty.xml index 2f20e329c93..21e74eda672 100644 --- a/solr/server/etc/jetty.xml +++ b/solr/server/etc/jetty.xml @@ -65,7 +65,7 @@ - + true