/*
*
* Copyright (c) 2013 - 2017 Lijun Liao
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License version 3
* as published by the Free Software Foundation with the addition of the
* following permission added to Section 15 as permitted in Section 7(a):
*
* FOR ANY PART OF THE COVERED WORK IN WHICH THE COPYRIGHT IS OWNED BY
* THE AUTHOR LIJUN LIAO. LIJUN LIAO DISCLAIMS THE WARRANTY OF NON INFRINGEMENT
* OF THIRD PARTY RIGHTS.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
* The interactive user interfaces in modified source and object code versions
* of this program must display Appropriate Legal Notices, as required under
* Section 5 of the GNU Affero General Public License.
*
* You can be released from the requirements of the license by purchasing
* a commercial license. Buying such a license is mandatory as soon as you
* develop commercial activities involving the XiPKI software without
* disclosing the source code of your own applications.
*
* For more information, please contact Lijun Liao at this
* address: lijun.liao@gmail.com
*/
package org.xipki.commons.security.shell;
import java.io.ByteArrayOutputStream;
import java.io.File;
import java.io.FileInputStream;
import java.security.Key;
import java.security.KeyStore;
import java.security.cert.Certificate;
import java.util.Enumeration;
import org.apache.karaf.shell.api.action.Command;
import org.apache.karaf.shell.api.action.Completion;
import org.apache.karaf.shell.api.action.Option;
import org.apache.karaf.shell.api.action.lifecycle.Service;
import org.xipki.commons.console.karaf.completer.FilePathCompleter;
import org.xipki.commons.security.util.KeyUtil;
/**
* @author Lijun Liao
* @since 2.0.0
*/
@Command(scope = "xipki-tk", name = "keystore-convert",
description = "convert the keystore format")
@Service
public class KeystoreConvertCmd extends SecurityCommandSupport {
@Option(name = "--in-type",
required = true,
description = "type of source keystore\n"
+ "(required)")
private String inType;
@Option(name = "--in",
required = true,
description = "file of source keystore\n"
+ "(required)")
@Completion(FilePathCompleter.class)
private String inFile;
@Option(name = "--in-pass",
description = "password of source keystore")
private String inPass;
@Option(name = "--in-keypass-diff",
description = "whether the password for the keys differs from that of source keystore\n"
+ "will be ignored if --in-keypass is set")
private Boolean inKeyPassDiff = Boolean.FALSE;
@Option(name = "--in-keypass",
description = "password for the keys of source keystore\n"
+ "Default to the keystore password")
private String inKeyPass;
@Option(name = "--out-type",
required = true,
description = "type of target keystore\n"
+ "(required)")
private String outType;
@Option(name = "--out",
required = true,
description = "file of target keystore\n"
+ "(required)")
@Completion(FilePathCompleter.class)
private String outFile;
@Option(name = "--out-pass",
description = "password of target keystore")
private String outPass;
@Option(name = "--out-keypass-diff",
description = "whether the password for the keys differs from that of target keystore\n"
+ "will be ignored if --out-keypass is set")
private Boolean outKeyPassDiff = Boolean.FALSE;
@Option(name = "--out-keypass",
description = "password for the keys of target keystore\n"
+ "Default to the keystore password")
private String outKeyPass;
@Override
protected Object doExecute() throws Exception {
KeyStore srcKs = KeyUtil.getKeyStore(inType);
char[] inPwd;
if (inPass != null) {
inPwd = inPass.toCharArray();
} else {
inPwd = readPassword("Enter the password of the source keystore");
}
srcKs.load(new FileInputStream(inFile), inPwd);
Enumeration<String> aliases = srcKs.aliases();
boolean containsKeyEntry = false;
while (aliases.hasMoreElements()) {
String alias = aliases.nextElement();
if (srcKs.isKeyEntry(alias)) {
containsKeyEntry = true;
break;
}
}
char[] inKeyPwd = null;
if (containsKeyEntry) {
if (inKeyPass != null) {
inKeyPwd = inKeyPass.toCharArray();
} else {
if (inKeyPassDiff) {
inKeyPwd = readPassword("Enter the password for keys of the source keystore");
} else {
inKeyPwd = inPwd;
}
}
}
char[] outPwd;
if (outPass != null) {
outPwd = outPass.toCharArray();
} else {
outPwd = readPassword("Enter the password of the target keystore");
}
char[] outKeyPwd = null;
if (containsKeyEntry) {
if (outKeyPass != null) {
inKeyPwd = outKeyPass.toCharArray();
} else {
if (outKeyPassDiff) {
inKeyPwd = readPassword("Enter the password for keys of the target keystore");
} else {
inKeyPwd = inPwd;
}
}
}
KeyStore destKs = KeyUtil.getKeyStore(outType);
destKs.load(null, outPwd);
aliases = srcKs.aliases();
while (aliases.hasMoreElements()) {
String alias = aliases.nextElement();
if (srcKs.isKeyEntry(alias)) {
Key key = srcKs.getKey(alias, inKeyPwd);
Certificate[] chain = srcKs.getCertificateChain(alias);
destKs.setKeyEntry(alias, key, outKeyPwd, chain);
} else if (srcKs.isCertificateEntry(alias)) {
Certificate cert = srcKs.getCertificate(alias);
destKs.setCertificateEntry(alias, cert);
} else {
println("entry " + alias + " is neither key nor certificate, ignore it");
}
}
ByteArrayOutputStream bout = new ByteArrayOutputStream();
destKs.store(bout, outPwd);
saveVerbose("converted keystore to", new File(outFile), bout.toByteArray());
return null;
}
}