Frequently Asked Questions

  1. Why keystore types are supported?
  2. Why is JKS not supported?
  3. What is the default truststore password?
  4. Is a password required?
  5. Why is attaching not supported?
  6. How can I consume a dependency on a PKCS12 module?
  7. Can I create a source JAR containing the certificates?
Why keystore types are supported?

Only PKCS12 is supported.

[top]


Why is JKS not supported?

JKS is legacy and PKS12 is the default. Checkout JEP 229: Create PKCS12 Keystores by Default for more information.

[top]


What is the default truststore password?

There is no default truststore password.

[top]


Is a password required?

A password is not required but most tools expect a truststore password. Generating a truststore without a password is supported out of the box on JDK 18+ and requires the following system properties on earlier versions

-Dkeystore.pkcs12.certProtectionAlgorithm=NONE -Dkeystore.pkcs12.macAlgorithm=NONE

[top]


Why is attaching not supported?

Right now the pulgin does not support attaching a PKCS12 to an existing module, instead a new module has to be created. We feel this is in the philosophy of Maven of having a single artifact per module.

[top]


How can I consume a dependency on a PKCS12 module?

A dependency on a PKCS12 module can be consumed like any other Maven dependency. In particular it can be consumed by the Maven Assembly plugin. Check out this example of an assembly descriptor referencing a PKCS12 module.

[top]


Can I create a source JAR containing the certificates?

Absolutely you can use the maven-source-plugin to create a source JAR containing the certificates. It should work out of the box without a need to specify a source folder as long as it runs after this plugin.

[top]