|
15 | 15 | */ |
16 | 16 | package feign; |
17 | 17 |
|
| 18 | +import com.google.common.cache.CacheBuilder; |
| 19 | +import com.google.common.cache.CacheLoader; |
| 20 | +import com.google.common.cache.LoadingCache; |
| 21 | +import com.google.common.io.Closer; |
| 22 | +import com.google.common.io.InputSupplier; |
| 23 | +import com.google.common.io.Resources; |
| 24 | + |
18 | 25 | import java.io.IOException; |
| 26 | +import java.io.InputStream; |
19 | 27 | import java.net.InetAddress; |
20 | 28 | import java.net.Socket; |
| 29 | +import java.security.KeyStore; |
| 30 | +import java.security.Principal; |
| 31 | +import java.security.PrivateKey; |
21 | 32 | import java.security.SecureRandom; |
| 33 | +import java.security.cert.Certificate; |
22 | 34 | import java.security.cert.X509Certificate; |
| 35 | +import java.util.Arrays; |
23 | 36 |
|
24 | 37 | import javax.inject.Provider; |
25 | 38 | import javax.net.ssl.KeyManager; |
26 | 39 | import javax.net.ssl.SSLContext; |
27 | 40 | import javax.net.ssl.SSLSocket; |
28 | 41 | import javax.net.ssl.SSLSocketFactory; |
29 | 42 | import javax.net.ssl.TrustManager; |
| 43 | +import javax.net.ssl.X509KeyManager; |
30 | 44 | import javax.net.ssl.X509TrustManager; |
31 | 45 |
|
32 | 46 | import static com.google.common.base.Throwables.propagate; |
33 | 47 |
|
34 | 48 | /** |
35 | | - * used for ssl tests so that they can avoid having to read a keystore. |
| 49 | + * Used for ssl tests to simplify setup. |
36 | 50 | */ |
37 | | -final class TrustingSSLSocketFactory extends SSLSocketFactory implements X509TrustManager, KeyManager { |
| 51 | +final class TrustingSSLSocketFactory extends SSLSocketFactory implements X509TrustManager, X509KeyManager { |
| 52 | + |
| 53 | + private static LoadingCache<String, SSLSocketFactory> sslSocketFactories = |
| 54 | + CacheBuilder.newBuilder().build(new CacheLoader<String, SSLSocketFactory>() { |
| 55 | + @Override |
| 56 | + public SSLSocketFactory load(String serverAlias) throws Exception { |
| 57 | + return new TrustingSSLSocketFactory(serverAlias); |
| 58 | + } |
| 59 | + }); |
38 | 60 |
|
39 | 61 | public static SSLSocketFactory get() { |
40 | | - return Singleton.INSTANCE.get(); |
| 62 | + return get(""); |
41 | 63 | } |
42 | 64 |
|
| 65 | + public static SSLSocketFactory get(String serverAlias) { |
| 66 | + return sslSocketFactories.getUnchecked(serverAlias); |
| 67 | + } |
| 68 | + |
| 69 | + private static final char[] KEYSTORE_PASSWORD = "password".toCharArray(); |
| 70 | + |
43 | 71 | private final SSLSocketFactory delegate; |
| 72 | + private final String serverAlias; |
| 73 | + private final PrivateKey privateKey; |
| 74 | + private final X509Certificate[] certificateChain; |
44 | 75 |
|
45 | | - private TrustingSSLSocketFactory() { |
| 76 | + private TrustingSSLSocketFactory(String serverAlias) { |
46 | 77 | try { |
47 | 78 | SSLContext sc = SSLContext.getInstance("SSL"); |
48 | 79 | sc.init(new KeyManager[]{this}, new TrustManager[]{this}, new SecureRandom()); |
49 | 80 | this.delegate = sc.getSocketFactory(); |
50 | 81 | } catch (Exception e) { |
51 | 82 | throw propagate(e); |
52 | 83 | } |
| 84 | + this.serverAlias = serverAlias; |
| 85 | + if (serverAlias.isEmpty()) { |
| 86 | + this.privateKey = null; |
| 87 | + this.certificateChain = null; |
| 88 | + } else { |
| 89 | + try { |
| 90 | + KeyStore keyStore = loadKeyStore(Resources.newInputStreamSupplier(Resources.getResource("keystore.jks"))); |
| 91 | + this.privateKey = (PrivateKey) keyStore.getKey(serverAlias, KEYSTORE_PASSWORD); |
| 92 | + Certificate[] rawChain = keyStore.getCertificateChain(serverAlias); |
| 93 | + this.certificateChain = Arrays.copyOf(rawChain, rawChain.length, X509Certificate[].class); |
| 94 | + } catch (Exception e) { |
| 95 | + throw propagate(e); |
| 96 | + } |
| 97 | + } |
53 | 98 | } |
54 | 99 |
|
55 | 100 | @Override public String[] getDefaultCipherSuites() { |
@@ -100,15 +145,49 @@ public void checkClientTrusted(X509Certificate[] certs, String authType) { |
100 | 145 | public void checkServerTrusted(X509Certificate[] certs, String authType) { |
101 | 146 | } |
102 | 147 |
|
103 | | - private final static String[] ENABLED_CIPHER_SUITES = {"SSL_DH_anon_WITH_RC4_128_MD5"}; |
| 148 | + @Override |
| 149 | + public String[] getClientAliases(String keyType, Principal[] issuers) { |
| 150 | + return null; |
| 151 | + } |
104 | 152 |
|
105 | | - private static enum Singleton implements Provider<SSLSocketFactory> { |
106 | | - INSTANCE; |
| 153 | + @Override |
| 154 | + public String chooseClientAlias(String[] keyType, Principal[] issuers, Socket socket) { |
| 155 | + return null; |
| 156 | + } |
107 | 157 |
|
108 | | - private final SSLSocketFactory sslSocketFactory = new TrustingSSLSocketFactory(); |
| 158 | + @Override |
| 159 | + public String[] getServerAliases(String keyType, Principal[] issuers) { |
| 160 | + return null; |
| 161 | + } |
109 | 162 |
|
110 | | - @Override public SSLSocketFactory get() { |
111 | | - return sslSocketFactory; |
| 163 | + @Override |
| 164 | + public String chooseServerAlias(String keyType, Principal[] issuers, Socket socket) { |
| 165 | + return serverAlias; |
| 166 | + } |
| 167 | + |
| 168 | + @Override |
| 169 | + public X509Certificate[] getCertificateChain(String alias) { |
| 170 | + return certificateChain; |
| 171 | + } |
| 172 | + |
| 173 | + @Override |
| 174 | + public PrivateKey getPrivateKey(String alias) { |
| 175 | + return privateKey; |
| 176 | + } |
| 177 | + |
| 178 | + private static KeyStore loadKeyStore(InputSupplier<InputStream> inputStreamSupplier) throws IOException { |
| 179 | + Closer closer = Closer.create(); |
| 180 | + try { |
| 181 | + InputStream inputStream = closer.register(inputStreamSupplier.getInput()); |
| 182 | + KeyStore keyStore = KeyStore.getInstance("JKS"); |
| 183 | + keyStore.load(inputStream, KEYSTORE_PASSWORD); |
| 184 | + return keyStore; |
| 185 | + } catch (Throwable e) { |
| 186 | + throw closer.rethrow(e); |
| 187 | + } finally { |
| 188 | + closer.close(); |
112 | 189 | } |
113 | 190 | } |
| 191 | + |
| 192 | + private final static String[] ENABLED_CIPHER_SUITES = {"SSL_RSA_WITH_RC4_128_MD5"}; |
114 | 193 | } |
0 commit comments