org.opensaml.xml.security.credential.KeyStoreCredentialResolver Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of xmltooling Show documentation
Show all versions of xmltooling Show documentation
XMLTooling-J is a low-level library that may be used to construct libraries that allow developers to work with XML in a Java beans manner.
The newest version!
/*
* Licensed to the University Corporation for Advanced Internet Development,
* Inc. (UCAID) under one or more contributor license agreements. See the
* NOTICE file distributed with this work for additional information regarding
* copyright ownership. The UCAID licenses this file to You under the Apache
* License, Version 2.0 (the "License"); you may not use this file except in
* compliance with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.opensaml.xml.security.credential;
import java.security.GeneralSecurityException;
import java.security.KeyStore;
import java.security.KeyStoreException;
import java.security.UnrecoverableEntryException;
import java.security.KeyStore.SecretKeyEntry;
import java.security.cert.X509Certificate;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Collections;
import java.util.Map;
import org.opensaml.xml.security.CriteriaSet;
import org.opensaml.xml.security.SecurityException;
import org.opensaml.xml.security.criteria.EntityIDCriteria;
import org.opensaml.xml.security.criteria.UsageCriteria;
import org.opensaml.xml.security.x509.BasicX509Credential;
import org.opensaml.xml.security.x509.X509Credential;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
/**
* A {@link CredentialResolver} that extracts {@link Credential}'s from a key store.
*
* If no key usage type is presented at construction time this resolver will return the key, if available, regardless of
* the usage type provided to its resolve method.
*/
public class KeyStoreCredentialResolver extends AbstractCriteriaFilteringCredentialResolver {
/** Class logger. */
private final Logger log = LoggerFactory.getLogger(KeyStoreCredentialResolver.class);
/** Key store credentials are retrieved from. */
private KeyStore keyStore;
/** Passwords for keys. The key must be the entity ID, the value the password. */
private Map keyPasswords;
/** Usage type of all keys in the store. */
private UsageType keystoreUsage;
/**
* Constructor.
*
* @param store key store credentials are retrieved from
* @param passwords for key entries, map key is the entity id, map value is the password
*
* @throws IllegalArgumentException thrown if the given keystore is null
*/
public KeyStoreCredentialResolver(KeyStore store, Map passwords) throws IllegalArgumentException {
this(store, passwords, null);
}
/**
* Constructor.
*
* @param store key store credentials are retrieved from
* @param passwords for key entries, map key is the entity id, map value is the password
* @param usage usage type of all keys in the store
*
* @throws IllegalArgumentException thrown if the given keystore is null
*/
public KeyStoreCredentialResolver(KeyStore store, Map passwords, UsageType usage)
throws IllegalArgumentException {
super();
if (store == null) {
throw new IllegalArgumentException("Provided key store may not be null.");
}
try {
store.size();
} catch (KeyStoreException e) {
throw new IllegalArgumentException("Keystore has not been initialized.");
}
keyStore = store;
if (usage != null) {
keystoreUsage = usage;
} else {
keystoreUsage = UsageType.UNSPECIFIED;
}
keyPasswords = passwords;
}
/** {@inheritDoc} */
protected Iterable resolveFromSource(CriteriaSet criteriaSet) throws SecurityException {
checkCriteriaRequirements(criteriaSet);
String entityID = criteriaSet.get(EntityIDCriteria.class).getEntityID();
UsageCriteria usageCriteria = criteriaSet.get(UsageCriteria.class);
UsageType usage;
if (usageCriteria != null) {
usage = usageCriteria.getUsage();
} else {
usage = UsageType.UNSPECIFIED;
}
if (!matchUsage(keystoreUsage, usage)) {
log.debug("Specified usage criteria {} does not match keystore usage {}", usage, keystoreUsage);
log.debug("Can not resolve credentials from this keystore");
return Collections.emptySet();
}
KeyStore.PasswordProtection keyPassword = null;
if (keyPasswords.containsKey(entityID)) {
keyPassword = new KeyStore.PasswordProtection(keyPasswords.get(entityID).toCharArray());
}
KeyStore.Entry keyStoreEntry = null;
try {
keyStoreEntry = keyStore.getEntry(entityID, keyPassword);
} catch (UnrecoverableEntryException e) {
log.error("Unable to retrieve keystore entry for entityID (keystore alias): " + entityID);
log.error("Check for invalid keystore entityID/alias entry password");
throw new SecurityException("Could not retrieve entry from keystore", e);
} catch (GeneralSecurityException e) {
log.error("Unable to retrieve keystore entry for entityID (keystore alias): " + entityID, e);
throw new SecurityException("Could not retrieve entry from keystore", e);
}
if (keyStoreEntry == null) {
log.debug("Keystore entry for entity ID (keystore alias) {} does not exist", entityID);
return Collections.emptySet();
}
Credential credential = buildCredential(keyStoreEntry, entityID, keystoreUsage);
return Collections.singleton(credential);
}
/**
* Check that required credential criteria are available.
*
* @param criteriaSet the credential criteria set to evaluate
*/
protected void checkCriteriaRequirements(CriteriaSet criteriaSet) {
EntityIDCriteria entityCriteria = criteriaSet.get(EntityIDCriteria.class);
if (entityCriteria == null) {
log.error("EntityIDCriteria was not specified in the criteria set, resolution can not be attempted");
throw new IllegalArgumentException("No EntityIDCriteria was available in criteria set");
}
}
/**
* Match usage enum type values from keystore configured usage and from credential criteria.
*
* @param keyStoreUsage the usage type configured for the keystore
* @param criteriaUsage the value from credential criteria
* @return true if the two usage specifiers match for purposes of resolving credentials, false otherwise
*/
protected boolean matchUsage(UsageType keyStoreUsage, UsageType criteriaUsage) {
if (keyStoreUsage == UsageType.UNSPECIFIED || criteriaUsage == UsageType.UNSPECIFIED) {
return true;
}
return keyStoreUsage == criteriaUsage;
}
/**
* Build a credential instance from the key store entry.
*
* @param keyStoreEntry the key store entry to process
* @param entityID the entityID to include in the credential
* @param usage the usage type to include in the credential
* @return the new credential instance, appropriate to the type of key store entry being processed
* @throws SecurityException throw if there is a problem building a credential from the key store entry
*/
protected Credential buildCredential(KeyStore.Entry keyStoreEntry, String entityID, UsageType usage)
throws SecurityException {
log.debug("Building credential from keystore entry for entityID {}, usage type {}", entityID, usage);
Credential credential = null;
if (keyStoreEntry instanceof KeyStore.PrivateKeyEntry) {
credential = processPrivateKeyEntry((KeyStore.PrivateKeyEntry) keyStoreEntry, entityID, keystoreUsage);
} else if (keyStoreEntry instanceof KeyStore.TrustedCertificateEntry) {
credential = processTrustedCertificateEntry((KeyStore.TrustedCertificateEntry) keyStoreEntry, entityID,
keystoreUsage);
} else if (keyStoreEntry instanceof KeyStore.SecretKeyEntry) {
credential = processSecretKeyEntry((KeyStore.SecretKeyEntry) keyStoreEntry, entityID, keystoreUsage);
} else {
throw new SecurityException("KeyStore entry was of an unsupported type: "
+ keyStoreEntry.getClass().getName());
}
return credential;
}
/**
* Build an X509Credential from a keystore trusted certificate entry.
*
* @param trustedCertEntry the entry being processed
* @param entityID the entityID to set
* @param usage the usage type to set
* @return new X509Credential instance
*/
protected X509Credential processTrustedCertificateEntry(KeyStore.TrustedCertificateEntry trustedCertEntry,
String entityID, UsageType usage) {
log.debug("Processing TrustedCertificateEntry from keystore");
BasicX509Credential credential = new BasicX509Credential();
credential.setEntityId(entityID);
credential.setUsageType(usage);
X509Certificate cert = (X509Certificate) trustedCertEntry.getTrustedCertificate();
credential.setEntityCertificate(cert);
ArrayList certChain = new ArrayList();
certChain.add(cert);
credential.setEntityCertificateChain(certChain);
return credential;
}
/**
* Build an X509Credential from a keystore private key entry.
*
* @param privateKeyEntry the entry being processed
* @param entityID the entityID to set
* @param usage the usage type to set
* @return new X509Credential instance
*/
protected X509Credential processPrivateKeyEntry(KeyStore.PrivateKeyEntry privateKeyEntry, String entityID,
UsageType usage) {
log.debug("Processing PrivateKeyEntry from keystore");
BasicX509Credential credential = new BasicX509Credential();
credential.setEntityId(entityID);
credential.setUsageType(usage);
credential.setPrivateKey(privateKeyEntry.getPrivateKey());
credential.setEntityCertificate((X509Certificate) privateKeyEntry.getCertificate());
credential.setEntityCertificateChain(Arrays.asList((X509Certificate[]) privateKeyEntry.getCertificateChain()));
return credential;
}
/**
* Build a Credential from a keystore secret key entry.
*
* @param secretKeyEntry the entry being processed
* @param entityID the entityID to set
* @param usage the usage type to set
* @return new Credential instance
*/
protected Credential processSecretKeyEntry(SecretKeyEntry secretKeyEntry, String entityID, UsageType usage) {
log.debug("Processing SecretKeyEntry from keystore");
BasicCredential credential = new BasicCredential();
credential.setEntityId(entityID);
credential.setUsageType(usage);
credential.setSecretKey(secretKeyEntry.getSecretKey());
return credential;
}
}