/* * Copyright (C) 2012-2016 Facebook, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.jboss.netty.handler.ssl; import org.jboss.netty.buffer.ChannelBuffer; import org.jboss.netty.buffer.ChannelBufferInputStream; import javax.net.ssl.KeyManager; import javax.net.ssl.SSLContext; import javax.net.ssl.SSLException; import javax.net.ssl.SSLSessionContext; import javax.net.ssl.TrustManagerFactory; import javax.security.auth.x500.X500Principal; import java.io.File; import java.security.KeyStore; import java.security.cert.CertificateFactory; import java.security.cert.X509Certificate; import java.util.ArrayList; import java.util.Collections; import java.util.List; /** * This is a copy of {@link JdkSslClientContext} but the constructor takes an extra KeyManager[] parameter that is * passed to ctx.init(). This allows us to create a client with a certificate. For tesing only, do not use in * production. Will probably be removed when we update to a newer version of Netty that supports client-side certs. */ public final class HackyJdkSslClientContext extends JdkSslContext { private final SSLContext ctx; private final List<String> nextProtocols; /** * Creates a new instance. * * @param bufPool the buffer pool which will be used by this context. * {@code null} to use the default buffer pool. * @param certChainFile an X.509 certificate chain file in PEM format. * {@code null} to use the system default * @param keyManagers key managers for client-side certificates. * @param trustManagerFactory the {@link TrustManagerFactory} that provides the {@link javax.net.ssl.TrustManager}s * that verifies the certificates sent from servers. * {@code null} to use the default. * @param ciphers the cipher suites to enable, in the order of preference. * {@code null} to use the default cipher suites. * @param nextProtocols the application layer protocols to accept, in the order of preference. * {@code null} to disable TLS NPN/ALPN extension. * @param sessionCacheSize the size of the cache used for storing SSL session objects. * {@code 0} to use the default value. * @param sessionTimeout the timeout for the cached SSL session objects, in seconds. * {@code 0} to use the default value. */ public HackyJdkSslClientContext( SslBufferPool bufPool, File certChainFile, KeyManager[] keyManagers, TrustManagerFactory trustManagerFactory, Iterable<String> ciphers, Iterable<String> nextProtocols, long sessionCacheSize, long sessionTimeout) throws SSLException { super(bufPool, ciphers); if (nextProtocols != null && nextProtocols.iterator().hasNext()) { if (!JettyNpnSslEngine.isAvailable()) { throw new SSLException("NPN/ALPN unsupported: " + nextProtocols); } List<String> nextProtoList = new ArrayList<String>(); for (String p: nextProtocols) { if (p == null) { break; } nextProtoList.add(p); } this.nextProtocols = Collections.unmodifiableList(nextProtoList); } else { this.nextProtocols = Collections.emptyList(); } try { if (certChainFile == null) { ctx = SSLContext.getInstance(PROTOCOL); if (trustManagerFactory == null) { ctx.init(null, null, null); } else { trustManagerFactory.init((KeyStore) null); ctx.init(keyManagers, trustManagerFactory.getTrustManagers(), null); } } else { KeyStore ks = KeyStore.getInstance("JKS"); ks.load(null, null); CertificateFactory cf = CertificateFactory.getInstance("X.509"); for (ChannelBuffer buf: PemReader.readCertificates(certChainFile)) { X509Certificate cert = (X509Certificate) cf.generateCertificate(new ChannelBufferInputStream(buf)); X500Principal principal = cert.getSubjectX500Principal(); ks.setCertificateEntry(principal.getName("RFC2253"), cert); } // Set up trust manager factory to use our key store. if (trustManagerFactory == null) { trustManagerFactory = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm()); } trustManagerFactory.init(ks); // Initialize the SSLContext to work with the trust managers. ctx = SSLContext.getInstance(PROTOCOL); ctx.init(keyManagers, trustManagerFactory.getTrustManagers(), null); } SSLSessionContext sessCtx = ctx.getClientSessionContext(); if (sessionCacheSize > 0) { sessCtx.setSessionCacheSize((int) Math.min(sessionCacheSize, Integer.MAX_VALUE)); } if (sessionTimeout > 0) { sessCtx.setSessionTimeout((int) Math.min(sessionTimeout, Integer.MAX_VALUE)); } } catch (Exception e) { throw new SSLException("failed to initialize the server-side SSL context", e); } } @Override public SSLContext context() { return ctx; } @Override public boolean isClient() { return true; } @Override public List<String> nextProtocols() { return nextProtocols; } }