/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.tuscany.sca.policy.security.http.ssl; import static javax.xml.stream.XMLStreamConstants.END_ELEMENT; import static javax.xml.stream.XMLStreamConstants.START_ELEMENT; import javax.xml.namespace.QName; import javax.xml.stream.XMLStreamException; import javax.xml.stream.XMLStreamReader; import javax.xml.stream.XMLStreamWriter; import org.apache.tuscany.sca.assembly.xml.Constants; import org.apache.tuscany.sca.contribution.processor.ContributionReadException; import org.apache.tuscany.sca.contribution.processor.ContributionResolveException; import org.apache.tuscany.sca.contribution.processor.ContributionWriteException; import org.apache.tuscany.sca.contribution.processor.ProcessorContext; import org.apache.tuscany.sca.contribution.processor.StAXArtifactProcessor; import org.apache.tuscany.sca.contribution.resolver.ModelResolver; import org.apache.tuscany.sca.core.FactoryExtensionPoint; import org.apache.tuscany.sca.monitor.Monitor; public class HTTPSPolicyProcessor implements StAXArtifactProcessor<HTTPSPolicy> { private static final QName KEY_STORE_QNAME = new QName(Constants.SCA11_TUSCANY_NS, "keyStore"); private static final QName TRUST_STORE_QNAME = new QName(Constants.SCA11_TUSCANY_NS, "trustStore"); public HTTPSPolicyProcessor(FactoryExtensionPoint modelFactories) { } public QName getArtifactType() { return HTTPSPolicy.NAME; } public Class<HTTPSPolicy> getModelType() { return HTTPSPolicy.class; } public HTTPSPolicy read(XMLStreamReader reader, ProcessorContext context) throws ContributionReadException, XMLStreamException { HTTPSPolicy policy = new HTTPSPolicy(); int event = reader.getEventType(); QName start = reader.getName(); QName name = null; while (true) { switch (event) { case START_ELEMENT: name = reader.getName(); if(KEY_STORE_QNAME.equals(name)) { //<tuscany:keyStore type="JKS" file="conf/tomcat.keystore" password="apache"/> String type = reader.getAttributeValue(null, "type"); if(type == null) { Monitor.error(context.getMonitor(), this, "policy-security-validation-messages", "RequiredAttributeKeyStoreTypeMissing"); } else { policy.setKeyStoreType(type); } String file = reader.getAttributeValue(null, "file"); if(file == null) { Monitor.error(context.getMonitor(), this, "policy-security-validation-messages", "RequiredAttributeKeyStoreFileMissing"); } else { policy.setKeyStore(file); } String password = reader.getAttributeValue(null, "password"); if(file == null) { Monitor.error(context.getMonitor(), this, "policy-security-validation-messages", "RequiredAttributeKeyStorePasswordMissing"); } else { policy.setKeyStorePassword(password); } } else if(TRUST_STORE_QNAME.equals(name)) { //<tuscany:trustStore type="" file="" password=""/> String type = reader.getAttributeValue(null, "type"); if(type == null) { Monitor.error(context.getMonitor(), this, "policy-security-validation-messages", "RequiredAttributeTrustStoreTypeMissing"); } else { policy.setTrustStoreType(type); } String file = reader.getAttributeValue(null, "file"); if(file == null) { Monitor.error(context.getMonitor(), this, "policy-security-validation-messages", "RequiredAttributeTrustStoreFileMissing"); } else { policy.setTrustStore(file); } String password = reader.getAttributeValue(null, "password"); if(file == null) { Monitor.error(context.getMonitor(), this, "policy-security-validation-messages", "RequiredAttributeTrustStorePasswordMissing"); } else { policy.setTrustStorePassword(password); } } break; case END_ELEMENT: if (start.equals(reader.getName())) { if (reader.hasNext()) { reader.next(); } return policy; } } if (reader.hasNext()) { event = reader.next(); } else { return policy; } } } public void write(HTTPSPolicy model, XMLStreamWriter writer, ProcessorContext context) throws ContributionWriteException, XMLStreamException { // TODO } public void resolve(HTTPSPolicy model, ModelResolver resolver, ProcessorContext context) throws ContributionResolveException { } }