Blame SOURCES/rh1915071-always_initialise_configurator_access.patch

673b76
diff --git openjdk.orig/src/java.base/share/classes/java/security/Security.java openjdk/src/java.base/share/classes/java/security/Security.java
673b76
--- openjdk.orig/src/java.base/share/classes/java/security/Security.java
673b76
+++ openjdk/src/java.base/share/classes/java/security/Security.java
673b76
@@ -32,6 +32,7 @@
673b76
 
673b76
 import jdk.internal.event.EventHelper;
673b76
 import jdk.internal.event.SecurityPropertyModificationEvent;
673b76
+import jdk.internal.misc.JavaSecuritySystemConfiguratorAccess;
673b76
 import jdk.internal.misc.SharedSecrets;
673b76
 import jdk.internal.util.StaticProperty;
673b76
 import sun.security.util.Debug;
673b76
@@ -74,6 +75,15 @@
673b76
     }
673b76
 
673b76
     static {
673b76
+        // Initialise here as used by code with system properties disabled
673b76
+        SharedSecrets.setJavaSecuritySystemConfiguratorAccess(
673b76
+            new JavaSecuritySystemConfiguratorAccess() {
673b76
+                @Override
673b76
+                public boolean isSystemFipsEnabled() {
673b76
+                    return SystemConfigurator.isSystemFipsEnabled();
673b76
+                }
673b76
+            });
673b76
+
673b76
         // doPrivileged here because there are multiple
673b76
         // things in initialize that might require privs.
673b76
         // (the FileInputStream call and the File.exists call,
673b76
@@ -193,9 +203,8 @@
673b76
         }
673b76
 
673b76
         String disableSystemProps = System.getProperty("java.security.disableSystemPropertiesFile");
673b76
-        if (disableSystemProps == null &&
673b76
-            "true".equalsIgnoreCase(props.getProperty
673b76
-                ("security.useSystemPropertiesFile"))) {
673b76
+        if ((disableSystemProps == null || "false".equalsIgnoreCase(disableSystemProps)) &&
673b76
+            "true".equalsIgnoreCase(props.getProperty("security.useSystemPropertiesFile"))) {
673b76
             if (SystemConfigurator.configure(props)) {
673b76
                 loadedProps = true;
673b76
             }
673b76
diff --git openjdk.orig/src/java.base/share/classes/java/security/SystemConfigurator.java openjdk/src/java.base/share/classes/java/security/SystemConfigurator.java
673b76
--- openjdk.orig/src/java.base/share/classes/java/security/SystemConfigurator.java
673b76
+++ openjdk/src/java.base/share/classes/java/security/SystemConfigurator.java
673b76
@@ -38,8 +38,6 @@
673b76
 import java.util.Properties;
673b76
 import java.util.regex.Pattern;
673b76
 
673b76
-import jdk.internal.misc.SharedSecrets;
673b76
-import jdk.internal.misc.JavaSecuritySystemConfiguratorAccess;
673b76
 import sun.security.util.Debug;
673b76
 
673b76
 /**
673b76
@@ -65,16 +63,6 @@
673b76
 
673b76
     private static boolean systemFipsEnabled = false;
673b76
 
673b76
-    static {
673b76
-        SharedSecrets.setJavaSecuritySystemConfiguratorAccess(
673b76
-            new JavaSecuritySystemConfiguratorAccess() {
673b76
-                @Override
673b76
-                public boolean isSystemFipsEnabled() {
673b76
-                    return SystemConfigurator.isSystemFipsEnabled();
673b76
-                }
673b76
-            });
673b76
-    }
673b76
-
673b76
     /*
673b76
      * Invoked when java.security.Security class is initialized, if
673b76
      * java.security.disableSystemPropertiesFile property is not set and