/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.tomcat.util.net; import java.io.File; import java.io.FileInputStream; import java.io.IOException; import java.io.InputStream; import java.security.KeyStore; import java.security.cert.X509Certificate; import java.util.Locale; import javax.net.ssl.KeyManager; import javax.net.ssl.KeyManagerFactory; import javax.net.ssl.SSLContext; import javax.net.ssl.TrustManager; import javax.net.ssl.TrustManagerFactory; import javax.net.ssl.X509TrustManager; import javax.servlet.ServletException; import javax.servlet.http.HttpServlet; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; import org.apache.catalina.Context; import org.apache.catalina.authenticator.SSLAuthenticator; import org.apache.catalina.connector.Connector; import org.apache.catalina.core.AprLifecycleListener; import org.apache.catalina.core.StandardServer; import org.apache.catalina.startup.TesterMapRealm; import org.apache.catalina.startup.Tomcat; import org.apache.tomcat.util.descriptor.web.LoginConfig; import org.apache.tomcat.util.descriptor.web.SecurityCollection; import org.apache.tomcat.util.descriptor.web.SecurityConstraint; public final class TesterSupport { public static final String ROLE = "testrole"; public static void initSsl(Tomcat tomcat) { initSsl(tomcat, "localhost.jks", null, null); } protected static void initSsl(Tomcat tomcat, String keystore, String keystorePass, String keyPass) { String protocol = tomcat.getConnector().getProtocolHandlerClassName(); if (!protocol.contains("Apr")) { Connector connector = tomcat.getConnector(); String sslImplementation = System.getProperty("tomcat.test.sslImplementation"); if (sslImplementation != null && !"${test.sslImplementation}".equals(sslImplementation)) { StandardServer server = (StandardServer) tomcat.getServer(); AprLifecycleListener listener = new AprLifecycleListener(); listener.setSSLRandomSeed("/dev/urandom"); server.addLifecycleListener(listener); tomcat.getConnector().setAttribute("sslImplementationName", sslImplementation); } connector.setProperty("sslProtocol", "tls"); File keystoreFile = new File("test/org/apache/tomcat/util/net/" + keystore); connector.setAttribute("keystoreFile", keystoreFile.getAbsolutePath()); File truststoreFile = new File( "test/org/apache/tomcat/util/net/ca.jks"); connector.setAttribute("truststoreFile", truststoreFile.getAbsolutePath()); if (keystorePass != null) { connector.setAttribute("keystorePass", keystorePass); } if (keyPass != null) { connector.setAttribute("keyPass", keyPass); } } else { File keystoreFile = new File( "test/org/apache/tomcat/util/net/localhost-cert.pem"); tomcat.getConnector().setAttribute("SSLCertificateFile", keystoreFile.getAbsolutePath()); keystoreFile = new File( "test/org/apache/tomcat/util/net/localhost-key.pem"); tomcat.getConnector().setAttribute("SSLCertificateKeyFile", keystoreFile.getAbsolutePath()); } tomcat.getConnector().setSecure(true); tomcat.getConnector().setProperty("SSLEnabled", "true"); } protected static KeyManager[] getUser1KeyManagers() throws Exception { KeyManagerFactory kmf = KeyManagerFactory.getInstance( KeyManagerFactory.getDefaultAlgorithm()); kmf.init(getKeyStore("test/org/apache/tomcat/util/net/user1.jks"), "changeit".toCharArray()); return kmf.getKeyManagers(); } protected static TrustManager[] getTrustManagers() throws Exception { TrustManagerFactory tmf = TrustManagerFactory.getInstance( TrustManagerFactory.getDefaultAlgorithm()); tmf.init(getKeyStore("test/org/apache/tomcat/util/net/ca.jks")); return tmf.getTrustManagers(); } protected static void configureClientSsl() { try { SSLContext sc = SSLContext.getInstance("TLS"); sc.init(TesterSupport.getUser1KeyManagers(), TesterSupport.getTrustManagers(), null); javax.net.ssl.HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory()); } catch (Exception e) { e.printStackTrace(); } } private static KeyStore getKeyStore(String keystore) throws Exception { File keystoreFile = new File(keystore); KeyStore ks = KeyStore.getInstance("JKS"); try (InputStream is = new FileInputStream(keystoreFile)) { ks.load(is, "changeit".toCharArray()); } return ks; } protected static boolean isMacOs() { return System.getProperty("os.name").toLowerCase(Locale.ENGLISH).startsWith("mac os x"); } protected static boolean isRenegotiationSupported(Tomcat tomcat) { String protocol = tomcat.getConnector().getProtocolHandlerClassName(); if (protocol.contains("Apr")) { // Disabled by default in 1.1.20 windows binary (2010-07-27) return false; } return true; } protected static boolean isClientRenegotiationSupported(Tomcat tomcat) { String protocol = tomcat.getConnector().getProtocolHandlerClassName(); if (protocol.contains("Apr")) { // Disabled by default in 1.1.20 windows binary (2010-07-27) return false; } if (protocol.contains("NioProtocol") || (protocol.contains("Nio2Protocol") && isMacOs())) { // Doesn't work on all platforms - see BZ 56448. return false; } String sslImplementation = System.getProperty("tomcat.test.sslImplementation"); if (sslImplementation != null && !"${test.sslImplementation}".equals(sslImplementation)) { // Assume custom SSL is not supporting this return false; } return true; } protected static void configureClientCertContext(Tomcat tomcat) { TesterSupport.initSsl(tomcat); // Need a web application with a protected and unprotected URL // No file system docBase required Context ctx = tomcat.addContext("", null); Tomcat.addServlet(ctx, "simple", new SimpleServlet()); ctx.addServletMappingDecoded("/unprotected", "simple"); ctx.addServletMappingDecoded("/protected", "simple"); // Security constraints SecurityCollection collection = new SecurityCollection(); collection.addPatternDecoded("/protected"); SecurityConstraint sc = new SecurityConstraint(); sc.addAuthRole(ROLE); sc.addCollection(collection); ctx.addConstraint(sc); // Configure the Realm TesterMapRealm realm = new TesterMapRealm(); realm.addUser("CN=user1, C=US", "not used"); realm.addUserRole("CN=user1, C=US", ROLE); ctx.setRealm(realm); // Configure the authenticator LoginConfig lc = new LoginConfig(); lc.setAuthMethod("CLIENT-CERT"); ctx.setLoginConfig(lc); ctx.getPipeline().addValve(new SSLAuthenticator()); } public static final byte DATA = (byte)33; public static class SimpleServlet extends HttpServlet { private static final long serialVersionUID = 1L; @Override protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException { resp.setContentType("text/plain"); resp.getWriter().print("OK"); if (req.isUserInRole(ROLE)) { resp.getWriter().print("-" + ROLE); } } @Override protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException { // Swallow any request body int read = 0; int len = 0; byte[] buffer = new byte[4096]; InputStream is = req.getInputStream(); boolean contentOK = true; while (len > -1) { len = is.read(buffer); read = read + len; for (int i=0; i<len && contentOK; i++) { contentOK = (buffer[i] == DATA); } } // len will have been -1 on last iteration read++; // Report the number of bytes read resp.setContentType("text/plain"); if (contentOK) resp.getWriter().print("OK-" + read); else resp.getWriter().print("CONTENT-MISMATCH-" + read); } } public static class TrustAllCerts implements X509TrustManager { @Override public X509Certificate[] getAcceptedIssuers() { return new X509Certificate[0]; } @Override public void checkClientTrusted(X509Certificate[] certs, String authType) { // NOOP - Trust everything } @Override public void checkServerTrusted(X509Certificate[] certs, String authType) { // NOOP - Trust everything } } }