diff --git a/solr/bin/solr b/solr/bin/solr
index d17f00a4013..0f901832d24 100755
--- a/solr/bin/solr
+++ b/solr/bin/solr
@@ -241,7 +241,7 @@ if [ "$SOLR_SSL_ENABLED" == "true" ]; then
fi
if [ "${SOLR_SSL_CLIENT_HOSTNAME_VERIFICATION:true}" == "true" ] ; then
- SOLR_SSL_OPTS+=" -Dsolr.jetty.ssl.verifyClientHostName=HTTPS"
+ SOLR_SSL_OPTS+=" -Dsolr.jetty.ssl.verify.client.hostname=HTTPS"
fi
if [ -n "$SOLR_SSL_NEED_CLIENT_AUTH" ]; then
diff --git a/solr/bin/solr.cmd b/solr/bin/solr.cmd
index 44262f4f974..b4612d96373 100755
--- a/solr/bin/solr.cmd
+++ b/solr/bin/solr.cmd
@@ -109,7 +109,7 @@ IF "%SOLR_SSL_ENABLED%"=="true" (
set "SOLR_SSL_OPTS=!SOLR_SSL_OPTS! -Dsolr.jetty.keystore=%SOLR_SSL_KEY_STORE%"
IF "%SOLR_SSL_RELOAD_ENABLED%"=="true" (
IF "%SOLR_SECURITY_MANAGER_ENABLED%"=="true" (
- set "SOLR_SSL_OPTS=!SOLR_SSL_OPTS! -Dsolr.jetty.keystoreParentPath=%SOLR_SSL_KEY_STORE%/.."
+ set "SOLR_SSL_OPTS=!SOLR_SSL_OPTS! -Dsolr.jetty.keystore.parent.path=%SOLR_SSL_KEY_STORE%/.."
)
)
)
@@ -129,7 +129,7 @@ IF "%SOLR_SSL_ENABLED%"=="true" (
set SOLR_SSL_CLIENT_HOSTNAME_VERIFICATION=true
)
IF "%SOLR_SSL_CLIENT_HOSTNAME_VERIFICATION%"=="true" (
- set "SOLR_SSL_OPTS=!SOLR_SSL_OPTS! -Dsolr.jetty.ssl.verifyClientHostName=HTTPS"
+ set "SOLR_SSL_OPTS=!SOLR_SSL_OPTS! -Dsolr.jetty.ssl.verify.client.hostname=HTTPS"
)
IF DEFINED SOLR_SSL_NEED_CLIENT_AUTH (
diff --git a/solr/core/src/test/org/apache/solr/cloud/TestMiniSolrCloudClusterSSL.java b/solr/core/src/test/org/apache/solr/cloud/TestMiniSolrCloudClusterSSL.java
index c82864b7f6f..e2a60e7edef 100644
--- a/solr/core/src/test/org/apache/solr/cloud/TestMiniSolrCloudClusterSSL.java
+++ b/solr/core/src/test/org/apache/solr/cloud/TestMiniSolrCloudClusterSSL.java
@@ -82,7 +82,7 @@ public class TestMiniSolrCloudClusterSSL extends SolrTestCaseJ4 {
@Rule
public TestRule syspropRestore =
- new TestRuleRestoreSystemProperties(SolrHttpConstants.SYS_PROP_CHECK_PEER_NAME);
+ new TestRuleRestoreSystemProperties(SolrHttpConstants.SYS_PROP_CHECK_PEER_NAME_ENABLED);
@Before
public void before() {
@@ -178,7 +178,7 @@ private void checkClusterWithNodeReplacement(SSLTestConfig sslConfig) throws Exc
SSLContext.setDefault(
sslConfig.isSSLMode() ? sslConfig.buildClientSSLContext() : DEFAULT_SSL_CONTEXT);
System.setProperty(
- SolrHttpConstants.SYS_PROP_CHECK_PEER_NAME,
+ SolrHttpConstants.SYS_PROP_CHECK_PEER_NAME_ENABLED,
Boolean.toString(sslConfig.getCheckPeerName()));
HttpClientUtil.resetHttpClientBuilder();
Http2SolrClient.resetSslContextFactory();
@@ -208,7 +208,7 @@ public void testSslWithInvalidPeerName() throws Exception {
// now initialize a client that still uses the existing SSLContext/Provider, so it will accept
// our existing certificate, but *does* care about validating the peer name
- System.setProperty(SolrHttpConstants.SYS_PROP_CHECK_PEER_NAME, "true");
+ System.setProperty(SolrHttpConstants.SYS_PROP_CHECK_PEER_NAME_ENABLED, "true");
HttpClientUtil.resetHttpClientBuilder();
Http2SolrClient.resetSslContextFactory();
diff --git a/solr/server/etc/jetty-http.xml b/solr/server/etc/jetty-http.xml
index 02f53991c5c..1874ffe991c 100644
--- a/solr/server/etc/jetty-http.xml
+++ b/solr/server/etc/jetty-http.xml
@@ -40,9 +40,9 @@
-
-
-
+
+
+
diff --git a/solr/server/etc/jetty-https.xml b/solr/server/etc/jetty-https.xml
index 4a74eb12506..4df38159756 100644
--- a/solr/server/etc/jetty-https.xml
+++ b/solr/server/etc/jetty-https.xml
@@ -66,8 +66,8 @@
-
-
+
+
diff --git a/solr/server/etc/jetty-ssl.xml b/solr/server/etc/jetty-ssl.xml
index 2762b8e7567..bd479f90348 100644
--- a/solr/server/etc/jetty-ssl.xml
+++ b/solr/server/etc/jetty-ssl.xml
@@ -23,7 +23,7 @@
-
+
diff --git a/solr/server/etc/jetty.xml b/solr/server/etc/jetty.xml
index 2f20e329c93..21e74eda672 100644
--- a/solr/server/etc/jetty.xml
+++ b/solr/server/etc/jetty.xml
@@ -65,7 +65,7 @@
-
+
true