All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.cassandra.config.EncryptionOptions Maven / Gradle / Ivy

There is a newer version: 3.11.12.3
Show newest version
/*
 * Licensed to the Apache Software Foundation (ASF) under one
 * or more contributor license agreements.  See the NOTICE file
 * distributed with this work for additional information
 * regarding copyright ownership.  The ASF licenses this file
 * to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance
 * with the License.  You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package org.apache.cassandra.config;

import javax.net.ssl.SSLSocketFactory;
import java.util.Objects;

public abstract class EncryptionOptions
{
    public String keystore = "conf/.keystore";
    public String keystore_password = "cassandra";
    public String truststore = "conf/.truststore";
    public String truststore_password = "cassandra";
    public String[] cipher_suites = ((SSLSocketFactory)SSLSocketFactory.getDefault()).getDefaultCipherSuites();
    public String protocol = "TLS";
    public String algorithm = "SunX509";
    public String store_type = "JKS";
    public boolean require_client_auth = false;
    public boolean require_endpoint_verification = false;

    public static class ClientEncryptionOptions extends EncryptionOptions
    {
        public boolean enabled = false;
        public boolean optional = false;

        /**
         * The method is being mainly used to cache SslContexts therefore, we only consider
         * fields that would make a difference when the TrustStore or KeyStore files are updated
         */
        @Override
        public boolean equals(Object o)
        {
            if (o == this)
                return true;
            if (o == null || getClass() != o.getClass())
                return false;

            ClientEncryptionOptions opt = (ClientEncryptionOptions)o;
            return enabled == opt.enabled &&
                   optional == opt.optional &&
                   require_client_auth == opt.require_client_auth &&
                   require_endpoint_verification == opt.require_endpoint_verification &&
                   Objects.equals(keystore, opt.keystore) &&
                   Objects.equals(keystore_password, opt.keystore_password) &&
                   Objects.equals(truststore, opt.truststore) &&
                   Objects.equals(truststore_password, opt.truststore_password) &&
                   Objects.equals(protocol, opt.protocol) &&
                   Objects.equals(algorithm, opt.algorithm) &&
                   Objects.equals(store_type, opt.store_type) &&
                   Objects.equals(cipher_suites, opt.cipher_suites);
        }

        /**
         * The method is being mainly used to cache SslContexts therefore, we only consider
         * fields that would make a difference when the TrustStore or KeyStore files are updated
         */
        @Override
        public int hashCode()
        {
            int result = 0;
            result += 31 * (keystore == null ? 0 : keystore.hashCode());
            result += 31 * (keystore_password == null ? 0 : keystore_password.hashCode());
            result += 31 * (truststore == null ? 0 : truststore.hashCode());
            result += 31 * (truststore_password == null ? 0 : truststore_password.hashCode());
            result += 31 * (protocol == null ? 0 : protocol.hashCode());
            result += 31 * (algorithm == null ? 0 : algorithm.hashCode());
            result += 31 * (store_type == null ? 0 : store_type.hashCode());
            result += 31 * Boolean.hashCode(enabled);
            result += 31 * Boolean.hashCode(optional);
            result += 31 * (cipher_suites == null ? 0 : cipher_suites.hashCode());
            result += 31 * Boolean.hashCode(require_client_auth);
            result += 31 * Boolean.hashCode(require_endpoint_verification);
            return result;
        }
    }

    public static class ServerEncryptionOptions extends EncryptionOptions
    {
        public static enum InternodeEncryption
        {
            all, none, dc, rack
        }
        public InternodeEncryption internode_encryption = InternodeEncryption.none;

        /**
         * The method is being mainly used to cache SslContexts therefore, we only consider
         * fields that would make a difference when the TrustStore or KeyStore files are updated
         */
        @Override
        public boolean equals(Object o)
        {
            if (o == this)
                return true;
            if (o == null || getClass() != o.getClass())
                return false;

            EncryptionOptions opt = (EncryptionOptions)o;
            return require_client_auth == opt.require_client_auth &&
                   require_endpoint_verification == opt.require_endpoint_verification &&
                   Objects.equals(keystore, opt.keystore) &&
                   Objects.equals(keystore_password, opt.keystore_password) &&
                   Objects.equals(truststore, opt.truststore) &&
                   Objects.equals(truststore_password, opt.truststore_password) &&
                   Objects.equals(protocol, opt.protocol) &&
                   Objects.equals(algorithm, opt.algorithm) &&
                   Objects.equals(store_type, opt.store_type) &&
                   Objects.equals(cipher_suites, opt.cipher_suites);
        }

        /**
         * The method is being mainly used to cache SslContexts therefore, we only consider
         * fields that would make a difference when the TrustStore or KeyStore files are updated
         */
        @Override
        public int hashCode()
        {
            int result = 0;
            result += 31 * (keystore == null ? 0 : keystore.hashCode());
            result += 31 * (keystore_password == null ? 0 : keystore_password.hashCode());
            result += 31 * (truststore == null ? 0 : truststore.hashCode());
            result += 31 * (truststore_password == null ? 0 : truststore_password.hashCode());
            result += 31 * (protocol == null ? 0 : protocol.hashCode());
            result += 31 * (algorithm == null ? 0 : algorithm.hashCode());
            result += 31 * (store_type == null ? 0 : store_type.hashCode());
            result += 31 * (cipher_suites == null ? 0 : cipher_suites.hashCode());
            result += 31 * Boolean.hashCode(require_client_auth);
            result += 31 * Boolean.hashCode(require_endpoint_verification);
            return result;
        }
    }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy