/* * JBoss, Home of Professional Open Source. * Copyright 2017, Red Hat, Inc., and individual contributors * as indicated by the @author tags. See the copyright.txt file in the * distribution for a full listing of individual contributors. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. */ package org.wildfly.extension.undertow; import static org.wildfly.extension.undertow.Capabilities.REF_SSL_CONTEXT; import javax.net.ssl.SSLContext; import org.jboss.as.controller.CapabilityServiceBuilder; import org.jboss.as.controller.OperationContext; import org.jboss.as.controller.OperationFailedException; import org.jboss.as.domain.management.SecurityRealm; import org.jboss.dmr.ModelNode; import org.jboss.msc.value.InjectedValue; import org.wildfly.extension.undertow.logging.UndertowLogger; import org.xnio.OptionMap; import io.undertow.server.ListenerRegistry; /** * Add handler for HTTPS listeners. * * @author <a href="mailto:darran.lofthouse@jboss.com">Darran Lofthouse</a> */ public class HttpsListenerAdd extends ListenerAdd { HttpsListenerAdd(HttpsListenerResourceDefinition def) { super(def); } @Override ListenerService createService(String name, final String serverName, final OperationContext context, ModelNode model, OptionMap listenerOptions, OptionMap socketOptions) throws OperationFailedException { OptionMap.Builder builder = OptionMap.builder().addAll(socketOptions); ModelNode securityRealmModel = HttpsListenerResourceDefinition.SECURITY_REALM.resolveModelAttribute(context, model); String cipherSuites = null; if(securityRealmModel.isDefined()) { //we only support setting these options for security realms HttpsListenerResourceDefinition.VERIFY_CLIENT.resolveOption(context, model, builder); ModelNode value = HttpsListenerResourceDefinition.ENABLED_CIPHER_SUITES.resolveModelAttribute(context, model); cipherSuites = value.isDefined() ? value.asString() : null; HttpsListenerResourceDefinition.ENABLED_PROTOCOLS.resolveOption(context, model, builder); HttpsListenerResourceDefinition.SSL_SESSION_CACHE_SIZE.resolveOption(context, model, builder); HttpsListenerResourceDefinition.SSL_SESSION_TIMEOUT.resolveOption(context, model, builder); } OptionMap.Builder listenerBuilder = OptionMap.builder().addAll(listenerOptions); HttpsListenerResourceDefinition.ENABLE_HTTP2.resolveOption(context, model, listenerBuilder); HttpListenerAdd.handleHttp2Options(context, model, listenerBuilder); HttpListenerResourceDefinition.REQUIRE_HOST_HTTP11.resolveOption(context, model,listenerBuilder); final boolean certificateForwarding = HttpListenerResourceDefinition.CERTIFICATE_FORWARDING.resolveModelAttribute(context, model).asBoolean(); final boolean proxyAddressForwarding = HttpListenerResourceDefinition.PROXY_ADDRESS_FORWARDING.resolveModelAttribute(context, model).asBoolean(); return new HttpsListenerService(name, serverName, listenerBuilder.getMap(), cipherSuites, builder.getMap(), certificateForwarding, proxyAddressForwarding); } @Override void configureAdditionalDependencies(OperationContext context, CapabilityServiceBuilder<? extends UndertowListener> serviceBuilder, ModelNode model, ListenerService service) throws OperationFailedException { serviceBuilder.addDependency(HttpListenerAdd.REGISTRY_SERVICE_NAME, ListenerRegistry.class, ((HttpListenerService) service).getHttpListenerRegistry()); ModelNode sslContextModel = HttpsListenerResourceDefinition.SSL_CONTEXT.resolveModelAttribute(context, model); ModelNode securityRealmModel = HttpsListenerResourceDefinition.SECURITY_REALM.resolveModelAttribute(context, model); final String sslContextRef = sslContextModel.isDefined() ? sslContextModel.asString() : null; final String securityRealmRef = securityRealmModel.isDefined() ? securityRealmModel.asString() : null; final InjectedValue<SSLContext> sslContextInjector = new InjectedValue<>(); final InjectedValue<SecurityRealm> securityRealmInjector = new InjectedValue<>(); if (securityRealmRef != null) { SecurityRealm.ServiceUtil.addDependency(serviceBuilder, securityRealmInjector, securityRealmRef); } if (sslContextRef != null) { serviceBuilder.addCapabilityRequirement(REF_SSL_CONTEXT, SSLContext.class, sslContextInjector, sslContextRef); } ((HttpsListenerService)service).setSSLContextSupplier(()-> { if (sslContextRef != null) { return sslContextInjector.getValue(); } if (securityRealmRef != null) { SSLContext sslContext = securityRealmInjector.getValue().getSSLContext(); if (sslContext == null) { throw UndertowLogger.ROOT_LOGGER.noSslContextInSecurityRealm(securityRealmRef); } return sslContext; } try { return SSLContext.getDefault(); } catch (Exception e) { throw new IllegalStateException(e); } }); } }