blob: 7688ed1dc749cb4cf9086d1d6c5d21c0e4343ba8 [file] [log] [blame]
/*
*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*/
package org.apache.qpid.server.security;
import java.io.File;
import java.io.IOException;
import java.net.MalformedURLException;
import java.net.URL;
import java.security.GeneralSecurityException;
import java.security.KeyStore;
import java.security.NoSuchAlgorithmException;
import java.security.UnrecoverableKeyException;
import java.security.cert.Certificate;
import java.util.ArrayList;
import java.util.Collection;
import java.util.Enumeration;
import java.util.List;
import java.util.Map;
import java.util.Set;
import javax.net.ssl.TrustManager;
import javax.net.ssl.TrustManagerFactory;
import javax.net.ssl.X509TrustManager;
import com.google.common.util.concurrent.Futures;
import com.google.common.util.concurrent.ListenableFuture;
import org.apache.qpid.server.configuration.IllegalConfigurationException;
import org.apache.qpid.server.logging.EventLogger;
import org.apache.qpid.server.logging.messages.TrustStoreMessages;
import org.apache.qpid.server.model.AbstractConfiguredObject;
import org.apache.qpid.server.model.AuthenticationProvider;
import org.apache.qpid.server.model.Broker;
import org.apache.qpid.server.model.ConfiguredObject;
import org.apache.qpid.server.model.IntegrityViolationException;
import org.apache.qpid.server.model.ManagedAttributeField;
import org.apache.qpid.server.model.ManagedObjectFactoryConstructor;
import org.apache.qpid.server.model.Port;
import org.apache.qpid.server.model.State;
import org.apache.qpid.server.model.StateTransition;
import org.apache.qpid.server.model.TrustStore;
import org.apache.qpid.server.model.VirtualHostNode;
import org.apache.qpid.server.security.auth.manager.SimpleLDAPAuthenticationManager;
import org.apache.qpid.server.util.urlstreamhandler.data.Handler;
import org.apache.qpid.transport.network.security.ssl.QpidMultipleTrustManager;
import org.apache.qpid.transport.network.security.ssl.QpidPeersOnlyTrustManager;
import org.apache.qpid.transport.network.security.ssl.SSLUtil;
public class FileTrustStoreImpl extends AbstractConfiguredObject<FileTrustStoreImpl> implements FileTrustStore<FileTrustStoreImpl>
{
private final Broker<?> _broker;
private final EventLogger _eventLogger;
@ManagedAttributeField
private String _trustStoreType;
@ManagedAttributeField
private String _trustManagerFactoryAlgorithm;
@ManagedAttributeField(afterSet = "postSetStoreUrl")
private String _storeUrl;
private String _path;
@ManagedAttributeField
private boolean _peersOnly;
@ManagedAttributeField
private String _password;
@ManagedAttributeField
private boolean _exposedAsMessageSource;
@ManagedAttributeField
private List<VirtualHostNode<?>> _includedVirtualHostNodeMessageSources;
@ManagedAttributeField
private List<VirtualHostNode<?>> _excludedVirtualHostNodeMessageSources;
static
{
Handler.register();
}
@ManagedObjectFactoryConstructor
public FileTrustStoreImpl(Map<String, Object> attributes, Broker<?> broker)
{
super(parentsMap(broker), attributes);
_broker = broker;
_eventLogger = _broker.getEventLogger();
_eventLogger.message(TrustStoreMessages.CREATE(getName()));
}
@Override
public void onValidate()
{
super.onValidate();
validateTrustStore(this);
if(!isDurable())
{
throw new IllegalArgumentException(getClass().getSimpleName() + " must be durable");
}
}
@StateTransition(currentState = {State.ACTIVE, State.ERRORED}, desiredState = State.DELETED)
protected ListenableFuture<Void> doDelete()
{
// verify that it is not in use
String storeName = getName();
Collection<Port<?>> ports = new ArrayList<Port<?>>(_broker.getPorts());
for (Port port : ports)
{
Collection<TrustStore> trustStores = port.getTrustStores();
if(trustStores != null)
{
for (TrustStore store : trustStores)
{
if(storeName.equals(store.getAttribute(TrustStore.NAME)))
{
throw new IntegrityViolationException("Trust store '"
+ storeName
+ "' can't be deleted as it is in use by a port: "
+ port.getName());
}
}
}
}
Collection<AuthenticationProvider> authenticationProviders = new ArrayList<AuthenticationProvider>(_broker.getAuthenticationProviders());
for (AuthenticationProvider authProvider : authenticationProviders)
{
if (authProvider instanceof SimpleLDAPAuthenticationManager)
{
SimpleLDAPAuthenticationManager simpleLdap = (SimpleLDAPAuthenticationManager) authProvider;
if (simpleLdap.getTrustStore() == this)
{
throw new IntegrityViolationException("Trust store '"
+ storeName
+ "' can't be deleted as it is in use by an authentication manager: "
+ authProvider.getName());
}
}
}
deleted();
setState(State.DELETED);
_eventLogger.message(TrustStoreMessages.DELETE(getName()));
return Futures.immediateFuture(null);
}
@StateTransition(currentState = {State.UNINITIALIZED, State.ERRORED}, desiredState = State.ACTIVE)
protected ListenableFuture<Void> doActivate()
{
setState(State.ACTIVE);
return Futures.immediateFuture(null);
}
@Override
protected void validateChange(final ConfiguredObject<?> proxyForValidation, final Set<String> changedAttributes)
{
super.validateChange(proxyForValidation, changedAttributes);
FileTrustStore updated = (FileTrustStore) proxyForValidation;
if (changedAttributes.contains(TrustStore.DESIRED_STATE) && updated.getDesiredState() == State.DELETED)
{
return;
}
if(changedAttributes.contains(TrustStore.NAME) && !getName().equals(updated.getName()))
{
throw new IllegalConfigurationException("Changing the trust store name is not allowed");
}
validateTrustStore(updated);
}
private static void validateTrustStore(FileTrustStore trustStore)
{
try
{
URL trustStoreUrl = getUrlFromString(trustStore.getStoreUrl());
SSLUtil.getInitializedKeyStore(trustStoreUrl, trustStore.getPassword(), trustStore.getTrustStoreType());
}
catch (Exception e)
{
final String message;
if (e instanceof IOException && e.getCause() != null && e.getCause() instanceof UnrecoverableKeyException)
{
message = "Check trust store password. Cannot instantiate trust store from '" + trustStore.getStoreUrl() + "'.";
}
else
{
message = "Cannot instantiate trust store from '" + trustStore.getStoreUrl() + "'.";
}
throw new IllegalConfigurationException(message, e);
}
try
{
TrustManagerFactory.getInstance(trustStore.getTrustManagerFactoryAlgorithm());
}
catch (NoSuchAlgorithmException e)
{
throw new IllegalConfigurationException("Unknown trustManagerFactoryAlgorithm: " + trustStore.getTrustManagerFactoryAlgorithm());
}
}
@Override
public String getStoreUrl()
{
return _storeUrl;
}
@Override
public String getPath()
{
return _path;
}
@Override
public String getTrustManagerFactoryAlgorithm()
{
return _trustManagerFactoryAlgorithm;
}
@Override
public String getTrustStoreType()
{
return _trustStoreType;
}
@Override
public boolean isPeersOnly()
{
return _peersOnly;
}
@Override
public String getPassword()
{
return _password;
}
public void setPassword(String password)
{
_password = password;
}
public TrustManager[] getTrustManagers() throws GeneralSecurityException
{
String trustStorePassword = getPassword();
String trustStoreType = _trustStoreType;
String trustManagerFactoryAlgorithm = _trustManagerFactoryAlgorithm;
try
{
URL trustStoreUrl = getUrlFromString(_storeUrl);
KeyStore ts = SSLUtil.getInitializedKeyStore(trustStoreUrl, trustStorePassword, trustStoreType);
final TrustManagerFactory tmf = TrustManagerFactory
.getInstance(trustManagerFactoryAlgorithm);
tmf.init(ts);
final Collection<TrustManager> trustManagersCol = new ArrayList<TrustManager>();
final QpidMultipleTrustManager mulTrustManager = new QpidMultipleTrustManager();
TrustManager[] delegateManagers = tmf.getTrustManagers();
for (TrustManager tm : delegateManagers)
{
if (tm instanceof X509TrustManager)
{
if (_peersOnly)
{
// truststore is supposed to trust only clients which peers certificates
// are directly in the store. CA signing will not be considered.
mulTrustManager.addTrustManager(new QpidPeersOnlyTrustManager(ts, (X509TrustManager) tm));
}
else
{
mulTrustManager.addTrustManager((X509TrustManager) tm);
}
}
else
{
trustManagersCol.add(tm);
}
}
if (! mulTrustManager.isEmpty())
{
trustManagersCol.add(mulTrustManager);
}
if (trustManagersCol.isEmpty())
{
throw new IllegalStateException("Truststore " + this + " defines no trust managers");
}
else
{
return trustManagersCol.toArray(new TrustManager[trustManagersCol.size()]);
}
}
catch (IOException e)
{
throw new GeneralSecurityException(e);
}
}
public Certificate[] getCertificates() throws GeneralSecurityException
{
String trustStorePassword = getPassword();
String trustStoreType = _trustStoreType;
try
{
URL trustStoreUrl = getUrlFromString(_storeUrl);
KeyStore ts = SSLUtil.getInitializedKeyStore(trustStoreUrl, trustStorePassword, trustStoreType);
final Collection<Certificate> certificates = new ArrayList<>();
Enumeration<String> aliases = ts.aliases();
while (aliases.hasMoreElements())
{
certificates.add(ts.getCertificate(aliases.nextElement()));
}
return certificates.toArray(new Certificate[certificates.size()]);
}
catch (IOException e)
{
throw new GeneralSecurityException(e);
}
}
private static URL getUrlFromString(String urlString) throws MalformedURLException
{
URL url;
try
{
url = new URL(urlString);
}
catch (MalformedURLException e)
{
File file = new File(urlString);
url = file.toURI().toURL();
}
return url;
}
@SuppressWarnings(value = "unused")
private void postSetStoreUrl()
{
if (_storeUrl != null && !_storeUrl.startsWith("data:"))
{
_path = _storeUrl;
}
else
{
_path = null;
}
}
@Override
public boolean isExposedAsMessageSource()
{
return _exposedAsMessageSource;
}
@Override
public List<VirtualHostNode<?>> getIncludedVirtualHostNodeMessageSources()
{
return _includedVirtualHostNodeMessageSources;
}
@Override
public List<VirtualHostNode<?>> getExcludedVirtualHostNodeMessageSources()
{
return _excludedVirtualHostNodeMessageSources;
}
}