summaryrefslogtreecommitdiffstats
path: root/vespajlib/src/main/java/com/yahoo/security/SslContextBuilder.java
diff options
context:
space:
mode:
Diffstat (limited to 'vespajlib/src/main/java/com/yahoo/security/SslContextBuilder.java')
-rw-r--r--vespajlib/src/main/java/com/yahoo/security/SslContextBuilder.java137
1 files changed, 137 insertions, 0 deletions
diff --git a/vespajlib/src/main/java/com/yahoo/security/SslContextBuilder.java b/vespajlib/src/main/java/com/yahoo/security/SslContextBuilder.java
new file mode 100644
index 00000000000..75ab2417edf
--- /dev/null
+++ b/vespajlib/src/main/java/com/yahoo/security/SslContextBuilder.java
@@ -0,0 +1,137 @@
+// Copyright 2018 Yahoo Holdings. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root.
+package com.yahoo.security;
+
+import javax.net.ssl.KeyManager;
+import javax.net.ssl.KeyManagerFactory;
+import javax.net.ssl.SSLContext;
+import javax.net.ssl.TrustManager;
+import javax.net.ssl.TrustManagerFactory;
+import java.io.IOException;
+import java.io.UncheckedIOException;
+import java.nio.file.Files;
+import java.nio.file.Path;
+import java.security.GeneralSecurityException;
+import java.security.KeyStore;
+import java.security.PrivateKey;
+import java.security.cert.X509Certificate;
+import java.util.Collections;
+import java.util.List;
+
+import static java.util.Collections.singletonList;
+
+/**
+ * @author bjorncs
+ */
+public class SslContextBuilder {
+
+ private KeyStoreSupplier trustStoreSupplier;
+ private KeyStoreSupplier keyStoreSupplier;
+ private char[] keyStorePassword;
+
+ public SslContextBuilder() {}
+
+ public SslContextBuilder withTrustStore(Path file, KeyStoreType trustStoreType) {
+ this.trustStoreSupplier = () -> KeyStoreBuilder.withType(trustStoreType).fromFile(file).build();
+ return this;
+ }
+
+ public SslContextBuilder withTrustStore(KeyStore trustStore) {
+ this.trustStoreSupplier = () -> trustStore;
+ return this;
+ }
+
+ public SslContextBuilder withTrustStore(X509Certificate caCertificate) {
+ return withTrustStore(singletonList(caCertificate));
+ }
+
+ public SslContextBuilder withTrustStore(List<X509Certificate> caCertificates) {
+ this.trustStoreSupplier = () -> createTrustStore(caCertificates);
+ return this;
+ }
+
+ public SslContextBuilder withTrustStore(Path pemEncodedCaCertificates) {
+ this.trustStoreSupplier = () -> {
+ List<X509Certificate> caCertificates =
+ X509CertificateUtils.certificateListFromPem(new String(Files.readAllBytes(pemEncodedCaCertificates)));
+ return createTrustStore(caCertificates);
+ };
+ return this;
+ }
+
+ public SslContextBuilder withKeyStore(PrivateKey privateKey, X509Certificate certificate) {
+ char[] pwd = new char[0];
+ this.keyStoreSupplier = () -> KeyStoreBuilder.withType(KeyStoreType.JKS).withKeyEntry("default", privateKey, certificate).build();
+ this.keyStorePassword = pwd;
+ return this;
+ }
+
+ public SslContextBuilder withKeyStore(KeyStore keyStore, char[] password) {
+ this.keyStoreSupplier = () -> keyStore;
+ this.keyStorePassword = password;
+ return this;
+ }
+
+ public SslContextBuilder withKeyStore(Path file, char[] password, KeyStoreType keyStoreType) {
+ this.keyStoreSupplier = () -> KeyStoreBuilder.withType(keyStoreType).fromFile(file, password).build();
+ this.keyStorePassword = password;
+ return this;
+ }
+
+ public SslContextBuilder withKeyStore(Path privateKeyPemFile, Path certificatesPemFile) {
+ this.keyStoreSupplier =
+ () -> {
+ PrivateKey privateKey = KeyUtils.fromPemEncodedPrivateKey(new String(Files.readAllBytes(privateKeyPemFile)));
+ List<X509Certificate> certificates = X509CertificateUtils.certificateListFromPem(new String(Files.readAllBytes(certificatesPemFile)));
+ return KeyStoreBuilder.withType(KeyStoreType.JKS)
+ .withKeyEntry("default", privateKey, certificates)
+ .build();
+ };
+ this.keyStorePassword = new char[0];
+ return this;
+ }
+
+ public SSLContext build() {
+ try {
+ SSLContext sslContext = SSLContext.getInstance("TLSv1.2");
+ TrustManager[] trustManagers =
+ trustStoreSupplier != null ? createTrustManagers(trustStoreSupplier) : null;
+ KeyManager[] keyManagers =
+ keyStoreSupplier != null ? createKeyManagers(keyStoreSupplier, keyStorePassword) : null;
+ sslContext.init(keyManagers, trustManagers, null);
+ return sslContext;
+ } catch (GeneralSecurityException e) {
+ throw new RuntimeException(e);
+ } catch (IOException e) {
+ throw new UncheckedIOException(e);
+ }
+ }
+
+ private static TrustManager[] createTrustManagers(KeyStoreSupplier trustStoreSupplier)
+ throws GeneralSecurityException, IOException {
+ TrustManagerFactory trustManagerFactory =
+ TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
+ trustManagerFactory.init(trustStoreSupplier.get());
+ return trustManagerFactory.getTrustManagers();
+ }
+
+ private static KeyManager[] createKeyManagers(KeyStoreSupplier keyStoreSupplier, char[] password)
+ throws GeneralSecurityException, IOException {
+ KeyManagerFactory keyManagerFactory =
+ KeyManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm());
+ keyManagerFactory.init(keyStoreSupplier.get(), password);
+ return keyManagerFactory.getKeyManagers();
+ }
+
+ private static KeyStore createTrustStore(List<X509Certificate> caCertificates) {
+ KeyStoreBuilder trustStoreBuilder = KeyStoreBuilder.withType(KeyStoreType.JKS);
+ for (int i = 0; i < caCertificates.size(); i++) {
+ trustStoreBuilder.withCertificateEntry("cert-" + i, caCertificates.get(i));
+ }
+ return trustStoreBuilder.build();
+ }
+
+ private interface KeyStoreSupplier {
+ KeyStore get() throws IOException, GeneralSecurityException;
+ }
+
+}