Accessing Storage with TLS and Self-Signed Certificates

Sometimes the storage targeted by the Polaris Server is expected to be accessed over TLS but the storage system’s certificate does not have a trust chain leading to a well-known root. Often such a certificate is simply self-signed.

In this situation the JVM inside the Polaris Server will need to be configured with a custom trust store containing the self-signed certificate or its CA certificate.

The example below assumes using a self-signed certificate for storage and docker for running Polaris.

Creating a Custom Trust Store🔗

  • Take an existing java trust store (with the usual root certificates) and make a local copy.
  • Add the storage system’s certificate to it.
1keytool -importcert -file STORAGE_CERT.pem -keystore cacerts -alias STORAGE_CERT

Here, STORAGE_CERT.pem is the file containing the storage system’s certificate; cacerts is the name of a custom trust store file to be used by Polaris.

Running Polaris with a Custom Trust Store🔗

Map the location of the custom trust store to a local path inside the Polaris container and instruct the Polaris JVM to use it.

1docker run -p 8181:8181 \
2 -v /path/to/dir-containing-cacerts:/opt/tls \
3 -e JAVA_OPTS_APPEND='-Djavax.net.ssl.trustStore=/opt/tls/cacerts' \
4 apache/polaris:latest

Of course, add other Polaris and/or docker options as appropriate for your environment.

After this, create a Polaris catalog as usual. Note that the storage endpoint property in the catalog probably needs to use the https URI scheme.