All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.browserup.bup.mitm.TrustSource Maven / Gradle / Ivy

There is a newer version: 2.2.19
Show newest version
package com.browserup.bup.mitm;

import com.google.common.collect.ObjectArrays;
import com.google.common.io.Files;
import com.browserup.bup.mitm.exception.UncheckedIOException;
import com.browserup.bup.mitm.util.TrustUtil;

import java.io.File;
import java.io.IOException;
import java.nio.charset.StandardCharsets;
import java.security.KeyStore;
import java.security.cert.X509Certificate;
import java.util.List;

/**
 * A source of trusted root certificate authorities. Provides static methods to obtain default trust sources:
 * 
    *
  • {@link #defaultTrustSource()}- both the built-in and JVM-trusted CAs
  • *
  • {@link #javaTrustSource()} - only default CAs trusted by the JVM
  • *
  • {@link #builtinTrustSource()} - only built-in trusted CAs (ultimately derived from Firefox's trust list)
  • *
* * Custom TrustSources can be built by starting with {@link #empty()}, then calling the various add() methods to add * PEM-encoded files and Strings, KeyStores, and X509Certificates to the TrustSource. For example: *

* * TrustSource customTrustSource = TrustSource.empty() * .add(myX509Certificate) * .add(pemFileContainingMyCA) * .add(javaKeyStore); * *

* Note: This class is immutable, so calls to add() will return a new instance, rather than modifying the existing instance. */ public class TrustSource { /** * The default TrustSource. To obtain this TrustSource, use {@link #defaultTrustSource()}. */ private static final TrustSource DEFAULT_TRUST_SOURCE = TrustSource.javaTrustSource().add(TrustSource.builtinTrustSource()); /** * The root CAs this TrustSource trusts. */ private final X509Certificate[] trustedCAs; /** * Creates a TrustSource that contains no trusted certificates. For public use, see {@link #empty()}. */ protected TrustSource() { this(TrustUtil.EMPTY_CERTIFICATE_ARRAY); } /** * Creates a TrustSource that considers only the specified certificates as "trusted". For public use, * use {@link #empty()} followed by {@link #add(X509Certificate...)}. * * @param trustedCAs root CAs to trust */ protected TrustSource(X509Certificate... trustedCAs) { if (trustedCAs == null) { this.trustedCAs = TrustUtil.EMPTY_CERTIFICATE_ARRAY; } else { this.trustedCAs = trustedCAs; } } /** * Returns the X509 certificates considered "trusted" by this TrustSource. This method will not return null, but * may return an empty array. * @return X509Certificate[] */ public X509Certificate[] getTrustedCAs() { return trustedCAs; } /** * Returns a TrustSource that contains no trusted CAs. Can be used in conjunction with the add() methods to build * a TrustSource containing custom CAs from a variety of sources (PEM files, KeyStores, etc.). * @return TrustSource */ public static TrustSource empty() { return new TrustSource(); } /** * Returns a TrustSource containing the default trusted CAs. By default, contains both the JVM's trusted CAs and the * built-in trusted CAs (Firefox's trusted CAs). * @return TrustSource */ public static TrustSource defaultTrustSource() { return DEFAULT_TRUST_SOURCE; } /** * Returns a TrustSource containing only the builtin trusted CAs and does not include the JVM's trusted CAs. * See {@link TrustUtil#getBuiltinTrustedCAs()}. * @return TrustSource */ public static TrustSource builtinTrustSource() { return new TrustSource(TrustUtil.getBuiltinTrustedCAs()); } /** * Returns a TrustSource containing the default CAs trusted by this JVM. See {@link TrustUtil#getJavaTrustedCAs()}. * @return TrustSource */ public static TrustSource javaTrustSource() { return new TrustSource(TrustUtil.getJavaTrustedCAs()); } /** * Returns a new TrustSource containing the same trusted CAs as this TrustSource, plus zero or more CAs contained in * the PEM-encoded String. The String may contain multiple certificates and may contain comments or other non-PEM-encoded * text, as long as the PEM-encoded certificates are delimited by appropriate BEGIN_CERTIFICATE and END_CERTIFICATE * text blocks. * * @param trustedPemEncodedCAs String containing PEM-encoded certificates to trust * @return a new TrustSource containing this TrustSource's trusted CAs plus the CAs in the specified String */ public TrustSource add(String trustedPemEncodedCAs) { if (trustedPemEncodedCAs == null) { throw new IllegalArgumentException("PEM-encoded trusted CA String cannot be null"); } X509Certificate[] trustedCertificates = TrustUtil.readX509CertificatesFromPem(trustedPemEncodedCAs); return add(trustedCertificates); } /** * Returns a new TrustSource containing the same trusted CAs as this TrustSource, plus zero or more additional * trusted X509Certificates. If trustedCertificates is null or empty, returns this same TrustSource. * * @param trustedCertificates X509Certificates of CAs to trust * @return a new TrustSource containing this TrustSource's trusted CAs plus the specified CAs */ public TrustSource add(X509Certificate... trustedCertificates) { if (trustedCertificates == null || trustedCertificates.length == 0) { return this; } X509Certificate[] newTrustedCAs = ObjectArrays.concat(trustedCAs, trustedCertificates, X509Certificate.class); return new TrustSource(newTrustedCAs); } /** * Returns a new TrustSource containing the same trusted CAs as this TrustSource, plus all trusted certificate * entries from the specified trustStore. This method will only add trusted certificate entries from the specified * KeyStore (i.e. entries of type {@link java.security.KeyStore.TrustedCertificateEntry}; private keys will be * ignored. The trustStore may be in JKS or PKCS12 format. * * @param trustStore keystore containing trusted certificate entries * @return a new TrustSource containing this TrustSource's trusted CAs plus trusted certificate entries from the keystore */ public TrustSource add(KeyStore trustStore) { if (trustStore == null) { throw new IllegalArgumentException("Trust store cannot be null"); } List trustedCertificates = TrustUtil.extractTrustedCertificateEntries(trustStore); return add(trustedCertificates.toArray(new X509Certificate[0])); } /** * Returns a new TrustSource containing the same trusted CAs as this TrustSource, plus zero or more CAs contained in * the PEM-encoded File. The File may contain multiple certificates and may contain comments or other non-PEM-encoded * text, as long as the PEM-encoded certificates are delimited by appropriate BEGIN_CERTIFICATE and END_CERTIFICATE * text blocks. The file may contain UTF-8 characters, but the PEM-encoded certificate data itself must be US-ASCII. * * @param trustedCAPemFile File containing PEM-encoded certificates * @return a new TrustSource containing this TrustSource's trusted CAs plus the CAs in the specified String */ public TrustSource add(File trustedCAPemFile) { if (trustedCAPemFile == null) { throw new IllegalArgumentException("Trusted CA file cannot be null"); } String pemFileContents; try { pemFileContents = Files.asCharSource(trustedCAPemFile, StandardCharsets.UTF_8).read(); } catch (IOException e) { throw new UncheckedIOException("Unable to read file containing PEM-encoded trusted CAs: " + trustedCAPemFile.getAbsolutePath(), e); } return add(pemFileContents); } /** * Returns a new TrustSource containing the same trusted CAs as this TrustSource, plus the trusted CAs in the specified * TrustSource. * * @param trustSource TrustSource to combine with this TrustSource * @return a new TrustSource containing both TrustSources' trusted CAs */ public TrustSource add(TrustSource trustSource) { if (trustSource == null) { throw new IllegalArgumentException("TrustSource cannot be null"); } return add(trustSource.getTrustedCAs()); } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy