blob: d6772de464dfe13e1deb33cfc99a8172a34da6c7 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache license, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the license for the specific language governing permissions and
* limitations under the license.
*/
package org.apache.logging.log4j.core.net.ssl;
import java.security.KeyManagementException;
import java.security.KeyStoreException;
import java.security.NoSuchAlgorithmException;
import java.security.UnrecoverableKeyException;
import javax.net.ssl.KeyManager;
import javax.net.ssl.KeyManagerFactory;
import javax.net.ssl.SSLContext;
import javax.net.ssl.SSLServerSocketFactory;
import javax.net.ssl.SSLSocketFactory;
import javax.net.ssl.TrustManager;
import javax.net.ssl.TrustManagerFactory;
import org.apache.logging.log4j.core.Core;
import org.apache.logging.log4j.plugins.Plugin;
import org.apache.logging.log4j.plugins.PluginAttribute;
import org.apache.logging.log4j.plugins.PluginElement;
import org.apache.logging.log4j.plugins.PluginFactory;
import org.apache.logging.log4j.status.StatusLogger;
/**
* SSL Configuration
*/
@Plugin(name = "Ssl", category = Core.CATEGORY_NAME, printObject = true)
public class SslConfiguration {
private static final StatusLogger LOGGER = StatusLogger.getLogger();
private final KeyStoreConfiguration keyStoreConfig;
private final TrustStoreConfiguration trustStoreConfig;
private final SSLContext sslContext;
private final String protocol;
private final boolean verifyHostName;
private SslConfiguration(final String protocol, final KeyStoreConfiguration keyStoreConfig,
final TrustStoreConfiguration trustStoreConfig, final boolean verifyHostName) {
this.keyStoreConfig = keyStoreConfig;
this.trustStoreConfig = trustStoreConfig;
this.protocol = protocol == null ? SslConfigurationDefaults.PROTOCOL : protocol;
this.sslContext = this.createSslContext();
this.verifyHostName = verifyHostName;
}
/**
* Clears the secret fields in this object but still allow it to operate normally.
*/
public void clearSecrets() {
if (this.keyStoreConfig != null) {
this.keyStoreConfig.clearSecrets();
}
if (this.trustStoreConfig != null) {
this.trustStoreConfig.clearSecrets();
}
}
public SSLSocketFactory getSslSocketFactory() {
return sslContext.getSocketFactory();
}
public SSLServerSocketFactory getSslServerSocketFactory() {
return sslContext.getServerSocketFactory();
}
private SSLContext createSslContext() {
SSLContext context = null;
try {
context = createSslContextBasedOnConfiguration();
LOGGER.debug("Creating SSLContext with the given parameters");
}
catch (final TrustStoreConfigurationException e) {
context = createSslContextWithTrustStoreFailure();
}
catch (final KeyStoreConfigurationException e) {
context = createSslContextWithKeyStoreFailure();
}
return context;
}
private SSLContext createSslContextWithTrustStoreFailure() {
SSLContext context;
try {
context = createSslContextWithDefaultTrustManagerFactory();
LOGGER.debug("Creating SSLContext with default truststore");
}
catch (final KeyStoreConfigurationException e) {
context = createDefaultSslContext();
LOGGER.debug("Creating SSLContext with default configuration");
}
return context;
}
private SSLContext createSslContextWithKeyStoreFailure() {
SSLContext context;
try {
context = createSslContextWithDefaultKeyManagerFactory();
LOGGER.debug("Creating SSLContext with default keystore");
}
catch (final TrustStoreConfigurationException e) {
context = createDefaultSslContext();
LOGGER.debug("Creating SSLContext with default configuration");
}
return context;
}
private SSLContext createSslContextBasedOnConfiguration() throws KeyStoreConfigurationException, TrustStoreConfigurationException {
return createSslContext(false, false);
}
private SSLContext createSslContextWithDefaultKeyManagerFactory() throws TrustStoreConfigurationException {
try {
return createSslContext(true, false);
} catch (final KeyStoreConfigurationException dummy) {
LOGGER.debug("Exception occurred while using default keystore. This should be a BUG");
return null;
}
}
private SSLContext createSslContextWithDefaultTrustManagerFactory() throws KeyStoreConfigurationException {
try {
return createSslContext(false, true);
}
catch (final TrustStoreConfigurationException dummy) {
LOGGER.debug("Exception occurred while using default truststore. This should be a BUG");
return null;
}
}
private SSLContext createDefaultSslContext() {
try {
return SSLContext.getDefault();
} catch (final NoSuchAlgorithmException e) {
LOGGER.error("Failed to create an SSLContext with default configuration", e);
return null;
}
}
private SSLContext createSslContext(final boolean loadDefaultKeyManagerFactory, final boolean loadDefaultTrustManagerFactory)
throws KeyStoreConfigurationException, TrustStoreConfigurationException {
try {
KeyManager[] kManagers = null;
TrustManager[] tManagers = null;
final SSLContext newSslContext = SSLContext.getInstance(this.protocol);
if (!loadDefaultKeyManagerFactory) {
final KeyManagerFactory kmFactory = loadKeyManagerFactory();
kManagers = kmFactory.getKeyManagers();
}
if (!loadDefaultTrustManagerFactory) {
final TrustManagerFactory tmFactory = loadTrustManagerFactory();
tManagers = tmFactory.getTrustManagers();
}
newSslContext.init(kManagers, tManagers, null);
return newSslContext;
}
catch (final NoSuchAlgorithmException e) {
LOGGER.error("No Provider supports a TrustManagerFactorySpi implementation for the specified protocol", e);
throw new TrustStoreConfigurationException(e);
}
catch (final KeyManagementException e) {
LOGGER.error("Failed to initialize the SSLContext", e);
throw new KeyStoreConfigurationException(e);
}
}
private TrustManagerFactory loadTrustManagerFactory() throws TrustStoreConfigurationException {
if (trustStoreConfig == null) {
throw new TrustStoreConfigurationException(new Exception("The trustStoreConfiguration is null"));
}
try {
return trustStoreConfig.initTrustManagerFactory();
}
catch (final NoSuchAlgorithmException e) {
LOGGER.error("The specified algorithm is not available from the specified provider", e);
throw new TrustStoreConfigurationException(e);
} catch (final KeyStoreException e) {
LOGGER.error("Failed to initialize the TrustManagerFactory", e);
throw new TrustStoreConfigurationException(e);
}
}
private KeyManagerFactory loadKeyManagerFactory() throws KeyStoreConfigurationException {
if (keyStoreConfig == null) {
throw new KeyStoreConfigurationException(new Exception("The keyStoreConfiguration is null"));
}
try {
return keyStoreConfig.initKeyManagerFactory();
}
catch (final NoSuchAlgorithmException e) {
LOGGER.error("The specified algorithm is not available from the specified provider", e);
throw new KeyStoreConfigurationException(e);
} catch (final KeyStoreException e) {
LOGGER.error("Failed to initialize the TrustManagerFactory", e);
throw new KeyStoreConfigurationException(e);
} catch (final UnrecoverableKeyException e) {
LOGGER.error("The key cannot be recovered (e.g. the given password is wrong)", e);
throw new KeyStoreConfigurationException(e);
}
}
/**
* Creates an SslConfiguration from a KeyStoreConfiguration and a TrustStoreConfiguration.
*
* @param protocol The protocol, see http://docs.oracle.com/javase/7/docs/technotes/guides/security/StandardNames.html#SSLContext
* @param keyStoreConfig The KeyStoreConfiguration.
* @param trustStoreConfig The TrustStoreConfiguration.
* @return a new SslConfiguration
*/
@PluginFactory
public static SslConfiguration createSSLConfiguration(
// @formatter:off
@PluginAttribute final String protocol,
@PluginElement final KeyStoreConfiguration keyStoreConfig,
@PluginElement final TrustStoreConfiguration trustStoreConfig) {
// @formatter:on
return new SslConfiguration(protocol, keyStoreConfig, trustStoreConfig, false);
}
/**
* Creates an SslConfiguration from a KeyStoreConfiguration and a TrustStoreConfiguration.
*
* @param protocol The protocol, see http://docs.oracle.com/javase/7/docs/technotes/guides/security/StandardNames.html#SSLContext
* @param keyStoreConfig The KeyStoreConfiguration.
* @param trustStoreConfig The TrustStoreConfiguration.
* @param verifyHostName whether or not to perform host name verification
* @return a new SslConfiguration
* @since 2.12
*/
public static SslConfiguration createSSLConfiguration(
// @formatter:off
@PluginAttribute final String protocol,
@PluginElement final KeyStoreConfiguration keyStoreConfig,
@PluginElement final TrustStoreConfiguration trustStoreConfig,
@PluginAttribute final boolean verifyHostName) {
// @formatter:on
return new SslConfiguration(protocol, keyStoreConfig, trustStoreConfig, verifyHostName);
}
@Override
public int hashCode() {
final int prime = 31;
int result = 1;
result = prime * result + ((keyStoreConfig == null) ? 0 : keyStoreConfig.hashCode());
result = prime * result + ((protocol == null) ? 0 : protocol.hashCode());
result = prime * result + ((sslContext == null) ? 0 : sslContext.hashCode());
result = prime * result + ((trustStoreConfig == null) ? 0 : trustStoreConfig.hashCode());
return result;
}
@Override
public boolean equals(final Object obj) {
if (this == obj) {
return true;
}
if (obj == null) {
return false;
}
if (getClass() != obj.getClass()) {
return false;
}
final SslConfiguration other = (SslConfiguration) obj;
if (keyStoreConfig == null) {
if (other.keyStoreConfig != null) {
return false;
}
} else if (!keyStoreConfig.equals(other.keyStoreConfig)) {
return false;
}
if (protocol == null) {
if (other.protocol != null) {
return false;
}
} else if (!protocol.equals(other.protocol)) {
return false;
}
if (sslContext == null) {
if (other.sslContext != null) {
return false;
}
} else if (!sslContext.equals(other.sslContext)) {
return false;
}
if (trustStoreConfig == null) {
if (other.trustStoreConfig != null) {
return false;
}
} else if (!trustStoreConfig.equals(other.trustStoreConfig)) {
return false;
}
return true;
}
public KeyStoreConfiguration getKeyStoreConfig() {
return keyStoreConfig;
}
public TrustStoreConfiguration getTrustStoreConfig() {
return trustStoreConfig;
}
public SSLContext getSslContext() {
return sslContext;
}
public String getProtocol() {
return protocol;
}
public boolean isVerifyHostName() {
return verifyHostName;
}
}