Hakky54 commented on issue #3074:
URL: 
https://github.com/apache/logging-log4j2/issues/3074#issuecomment-2646111432

   > Could you explain more your use case? I looked at Tomcat's SSL 
implementation 
([SSLUtilBase](https://github.com/apache/tomcat/blob/3f5b0cc58ce3c5cc7f74a9cbcfe083b303f222ff/java/org/apache/tomcat/util/net/SSLUtilBase.java#L265))
 and some HTTP client libraries for Java and I couldn't find an example of the 
opportunistic keystore reloading behavior you are proposing.
   How do you deal with modification of the key/trust store in other Java 
components?
   >
   > Certificate expiration events are usually very rare, so I would assume 
that whenever such an event occurs:
   >
   > The keystore and truststore are modified.
   All the applications that use them are notified. IIRC UNIX for servers like 
NGINX you just need to send a SIGUSR signal. Since Java applications do not 
support that, they need to be restarted.
   
   Hi @ppkarwasz 
   
   I can provide an example with Tomcat. As you might know with Tomcat it is 
possible to programatically configure the ssl configuration and also reload it. 
I have written a working example here: 
https://github.com/Hakky54/java-tutorials/tree/main/instant-ssl-reloading-with-spring-tomcat
 It uses my own library for taking care of reloading the ssl configuration, see 
here 
https://github.com/Hakky54/sslcontext-kickstart?tab=readme-ov-file#support-for-reloading-ssl-at-runtime
   
   I hope it will be useful for this task
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@logging.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to