Enable HTTPS support with self-signed certificate for embedded Jetty 9

Alex Cheng
Dec 12, 2017 · 1 min read

Sometimes you may want to test HTTPS support for embedded Jetty, a self-signed certificate is enough for testing. This post shows how to enable HTTP support with self-signed certificate for embedded Jetty 9.

Generate the keystore

The first step is to generate a keystore using keytool. -validity 3650 means the certificate is valid for 3650 days.

Configure Jetty

We can choose to support both HTTP and HTTPS by adding two ServerConnectors in Jetty. In the code below, we create a Server and add a ServerConnector for HTTP on port httpPort.

Then we create a SslContextFactory which loads the keystore file in path keyStorePath. A new ServerConnector is created for HTTPS on port httpsPort.

Obfuscated password

The keystore’s password can be obfuscated using org.eclipse.jetty.util.security.Password. The command below shows how to obfuscate the password password. The output should be used as the password. The obfuscated passwords start with OBF:.

HTTPS only

If you only want to enable HTTPS, you can either remove the ServerConnector for HTTP or use org.eclipse.jetty.server.handler.SecuredRedirectHandler to redirect HTTP to HTTPS. SecuredRedirectHandler should be put before other handlers in the handlers chain.

VividCode

High-quality IT articles

Alex Cheng

Written by

Full-stack software developer @ Auckland, NZ

VividCode

VividCode

High-quality IT articles

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade