blob: 81605c3b0b93e967644c766d173c2860403195b8 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.synapse.transport.passthru;
import org.apache.axiom.om.OMElement;
import org.apache.axis2.AxisFault;
import org.apache.axis2.description.Parameter;
import org.apache.axis2.description.TransportInDescription;
import org.apache.http.config.ConnectionConfig;
import org.apache.http.nio.NHttpServerEventHandler;
import org.apache.http.nio.reactor.IOEventDispatch;
import org.apache.http.nio.reactor.IOSession;
import org.apache.http.nio.reactor.ssl.SSLSetupHandler;
import org.apache.synapse.transport.utils.logging.LoggingUtils;
import javax.net.ssl.*;
import javax.xml.namespace.QName;
import java.io.FileInputStream;
import java.io.IOException;
import java.security.GeneralSecurityException;
import java.security.KeyStore;
public class PassThroughHttpSSLListener extends PassThroughHttpListener {
@Override
protected IOEventDispatch getEventDispatch(NHttpServerEventHandler handler, SSLContext sslContext,
SSLSetupHandler sslSetupHandler, ConnectionConfig config) {
return LoggingUtils.getServerIODispatch(handler, config, sslContext, sslSetupHandler);
}
/**
* Create the SSLContext to be used by this listener
* @param transportIn the Axis2 transport description
* @return the SSLContext to be used
* @throws org.apache.axis2.AxisFault if an error occurs
*/
protected SSLContext getSSLContext(TransportInDescription transportIn) throws AxisFault {
KeyManager[] keymanagers = null;
TrustManager[] trustManagers = null;
Parameter keyParam = transportIn.getParameter("keystore");
Parameter trustParam = transportIn.getParameter("truststore");
if (keyParam != null) {
OMElement ksEle = keyParam.getParameterElement().getFirstElement();
String location = ksEle.getFirstChildWithName(new QName("Location")).getText();
String type = ksEle.getFirstChildWithName(new QName("Type")).getText();
String storePassword = ksEle.getFirstChildWithName(new QName("Password")).getText();
String keyPassword = ksEle.getFirstChildWithName(new QName("KeyPassword")).getText();
FileInputStream fis = null;
try {
KeyStore keyStore = KeyStore.getInstance(type);
fis = new FileInputStream(location);
log.info("Loading Identity Keystore from : " + location);
keyStore.load(fis, storePassword.toCharArray());
KeyManagerFactory kmfactory = KeyManagerFactory.getInstance(
KeyManagerFactory.getDefaultAlgorithm());
kmfactory.init(keyStore, keyPassword.toCharArray());
keymanagers = kmfactory.getKeyManagers();
} catch (GeneralSecurityException gse) {
log.error("Error loading Key store : " + location, gse);
throw new AxisFault("Error loading Key store : " + location, gse);
} catch (IOException ioe) {
log.error("Error opening Key store : " + location, ioe);
throw new AxisFault("Error opening Key store : " + location, ioe);
} finally {
if (fis != null) {
try {
fis.close();
} catch (IOException ignore) {}
}
}
}
if (trustParam != null) {
OMElement tsEle = trustParam.getParameterElement().getFirstElement();
String location = tsEle.getFirstChildWithName(new QName("Location")).getText();
String type = tsEle.getFirstChildWithName(new QName("Type")).getText();
String storePassword = tsEle.getFirstChildWithName(new QName("Password")).getText();
FileInputStream fis = null;
try {
KeyStore trustStore = KeyStore.getInstance(type);
fis = new FileInputStream(location);
log.info("Loading Trust Keystore from : " + location);
trustStore.load(fis, storePassword.toCharArray());
TrustManagerFactory trustManagerfactory = TrustManagerFactory.getInstance(
TrustManagerFactory.getDefaultAlgorithm());
trustManagerfactory.init(trustStore);
trustManagers = trustManagerfactory.getTrustManagers();
} catch (GeneralSecurityException gse) {
log.error("Error loading Key store : " + location, gse);
throw new AxisFault("Error loading Key store : " + location, gse);
} catch (IOException ioe) {
log.error("Error opening Key store : " + location, ioe);
throw new AxisFault("Error opening Key store : " + location, ioe);
} finally {
if (fis != null) {
try {
fis.close();
} catch (IOException ignore) {}
}
}
}
try {
SSLContext sslcontext = SSLContext.getInstance("TLS");
sslcontext.init(keymanagers, trustManagers, null);
return sslcontext;
} catch (GeneralSecurityException gse) {
log.error("Unable to create SSL context with the given configuration", gse);
throw new AxisFault("Unable to create SSL context with the given configuration", gse);
}
}
protected SSLSetupHandler getSSLSetupHandler(TransportInDescription transportIn)
throws AxisFault {
final Parameter clientAuth = transportIn.getParameter("SSLVerifyClient");
return new SSLSetupHandler() {
public void initalize(SSLEngine sslengine) {
if (clientAuth != null) {
if ("optional".equals(clientAuth.getValue())) {
sslengine.setWantClientAuth(true);
} else if ("require".equals(clientAuth.getValue())) {
sslengine.setNeedClientAuth(true);
}
}
}
public void verify(IOSession ioSession, SSLSession sslSession) throws SSLException {
}
};
}
}