org.tenio.interstellar.mongo.config.parser.KeyStoreHelper Maven / Gradle / Ivy
Show all versions of interstellar-ext-mongo Show documentation
package org.tenio.interstellar.mongo.config.parser;
import io.netty.util.internal.PlatformDependent;
import org.tenio.interstellar.buffer.Buffer;
import org.tenio.interstellar.mongo.exception.MongoException;
import javax.naming.ldap.LdapName;
import javax.naming.ldap.Rdn;
import javax.net.ssl.*;
import java.io.ByteArrayInputStream;
import java.io.IOException;
import java.io.InputStream;
import java.net.Socket;
import java.security.*;
import java.security.cert.Certificate;
import java.security.cert.CertificateException;
import java.security.cert.CertificateFactory;
import java.security.cert.X509Certificate;
import java.security.spec.InvalidKeySpecException;
import java.security.spec.PKCS8EncodedKeySpec;
import java.util.*;
import java.util.function.BiFunction;
import java.util.function.Supplier;
import java.util.regex.Matcher;
import java.util.regex.Pattern;
import java.util.stream.Collectors;
import java.util.stream.Stream;
/**
* TODO
*
* @author: Ban Tenio
* @version: 1.0
*/
public class KeyStoreHelper {
// Dummy password for encrypting pem based stores in memory
/**
*
* TODO
*
*/
public static final String DUMMY_PASSWORD = "dummy";
private static final String DUMMY_CERT_ALIAS = "cert-";
private static final Pattern BEGIN_PATTERN = Pattern.compile("-----BEGIN ([A-Z ]+)-----");
private static final Pattern END_PATTERN = Pattern.compile("-----END ([A-Z ]+)-----");
private final String password;
private final KeyStore store;
private final Map wildcardMgrMap = new HashMap<>();
private final Map mgrMap = new HashMap<>();
private final Map trustMgrMap = new HashMap<>();
/**
*
* TODO
*
* @param ks TODO
* @param password TODO
* @throws Exception TODO
*/
public KeyStoreHelper(KeyStore ks, String password) throws Exception {
Enumeration en = ks.aliases();
while (en.hasMoreElements()) {
String alias = en.nextElement();
Certificate cert = ks.getCertificate(alias);
if (ks.isCertificateEntry(alias) && !alias.startsWith(DUMMY_CERT_ALIAS)) {
final KeyStore keyStore = createEmptyKeyStore();
keyStore.setCertificateEntry("cert-1", cert);
TrustManagerFactory fact = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
fact.init(keyStore);
trustMgrMap.put(alias, fact);
}
if (ks.isKeyEntry(alias) && cert instanceof X509Certificate) {
X509Certificate x509Cert = (X509Certificate) cert;
Collection> ans = x509Cert.getSubjectAlternativeNames();
List domains = new ArrayList<>();
if (ans != null) {
for (List> l : ans) {
if (l.size() == 2 && l.get(0) instanceof Number && ((Number) l.get(0)).intValue() == 2) {
String dns = l.get(1).toString();
domains.add(dns);
}
}
}
String dn = x509Cert.getSubjectX500Principal().getName();
domains.addAll(getX509CertificateCommonNames(dn));
if (!domains.isEmpty()) {
PrivateKey key = (PrivateKey) ks.getKey(alias, password != null ? password.toCharArray() : null);
Certificate[] tmp = ks.getCertificateChain(alias);
if (tmp == null) {
// It's a private key
continue;
}
List chain = Arrays.asList(tmp)
.stream()
.map(c -> (X509Certificate)c)
.collect(Collectors.toList());
X509KeyManager mgr = new X509KeyManager() {
@Override
public String[] getClientAliases(String s, Principal[] principals) {
throw new UnsupportedOperationException();
}
@Override
public String chooseClientAlias(String[] strings, Principal[] principals, Socket socket) {
throw new UnsupportedOperationException();
}
@Override
public String[] getServerAliases(String s, Principal[] principals) {
throw new UnsupportedOperationException();
}
@Override
public String chooseServerAlias(String s, Principal[] principals, Socket socket) {
throw new UnsupportedOperationException();
}
@Override
public X509Certificate[] getCertificateChain(String s) {
return chain.toArray(new X509Certificate[0]);
}
@Override
public PrivateKey getPrivateKey(String s) {
return key;
}
};
for (String domain : domains) {
if (domain.startsWith("*.")) {
wildcardMgrMap.put(domain.substring(2), mgr);
} else {
mgrMap.put(domain, mgr);
}
}
}
}
}
this.store = ks;
this.password = password;
}
/**
* TODO
*
* @return TODO
* @throws Exception TODO
*/
public KeyManagerFactory getKeyMgrFactory() throws Exception {
KeyManagerFactory fact = KeyManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm());
fact.init(store, password != null ? password.toCharArray() : null);
return fact;
}
/**
* TODO
*
* @param serverName TODO
* @return TODO
*/
public X509KeyManager getKeyMgr(String serverName) {
X509KeyManager mgr = mgrMap.get(serverName);
if (mgr == null && !wildcardMgrMap.isEmpty()) {
int index = serverName.indexOf('.') + 1;
if (index > 0) {
String s = serverName.substring(index);
mgr = wildcardMgrMap.get(s);
}
}
return mgr;
}
/**
* TODO
*
* @return TODO
* @throws Exception TODO
*/
public KeyManager[] getKeyMgr() throws Exception {
return getKeyMgrFactory().getKeyManagers();
}
/**
* TODO
*
* @param serverName TODO
* @return TODO
*/
public TrustManager[] getTrustMgr(String serverName) {
TrustManagerFactory fact = trustMgrMap.get(serverName);
return fact != null ? fact.getTrustManagers() : null;
}
/**
* TODO
*
* @return TODO
* @throws Exception TODO
*/
public TrustManagerFactory getTrustMgrFactory() throws Exception {
TrustManagerFactory fact = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
fact.init(store);
return fact;
}
/**
* TODO
*
* @return TODO
* @throws Exception TODO
*/
public TrustManager[] getTrustMgrs() throws Exception {
return getTrustMgrFactory().getTrustManagers();
}
/**
* @return the store
*/
public KeyStore store() {
return store;
}
/**
* TODO
*
* @param dn TODO
* @return TODO
* @throws Exception TODO
*/
public static List getX509CertificateCommonNames(String dn) throws Exception {
List names = new ArrayList<>();
if (!PlatformDependent.isAndroid()) {
LdapName ldapDN = new LdapName(dn);
for (Rdn rdn : ldapDN.getRdns()) {
if (rdn.getType().equalsIgnoreCase("cn")) {
String name = rdn.getValue().toString();
names.add(name);
}
}
} else {
String [] rdns = dn.trim().split("[,;]");
for(String rdn : rdns) {
String [] nvp = rdn.trim().split("=");
if (nvp.length == 2 && "cn".equalsIgnoreCase(nvp[0])) {
names.add(nvp[1]);
}
}
}
return names;
}
/**
* TODO
*
* @param type TODO
* @param provider TODO
* @param password TODO
* @param value TODO
* @return TODO
* @throws Exception TODO
*/
public static KeyStore loadKeyStoreOptions(String type, String provider, String password, Supplier value) throws Exception {
Objects.requireNonNull(type);
KeyStore ks = provider == null ? KeyStore.getInstance(type) : KeyStore.getInstance(type, provider);
try (InputStream in = new ByteArrayInputStream(value.get().getBytes())) {
ks.load(in, password != null ? password.toCharArray() : null);
}
return ks;
}
/**
* TODO
*
* @param keyValue TODO
* @param certValue TODO
* @return TODO
* @throws Exception TODO
*/
public static KeyStore loadKeyCert(List keyValue, List certValue) throws Exception {
if (keyValue.size() < certValue.size()) {
throw new MongoException("Missing private key");
} else if (keyValue.size() > certValue.size()) {
throw new MongoException("Missing X.509 certificate");
}
final KeyStore keyStore = createEmptyKeyStore();
Iterator keyValueIt = keyValue.iterator();
Iterator certValueIt = certValue.iterator();
int index = 0;
while (keyValueIt.hasNext() && certValueIt.hasNext()) {
PrivateKey key = loadPrivateKey(keyValueIt.next());
Certificate[] chain = loadCerts(certValueIt.next());
keyStore.setEntry("dummy-entry-" + index++, new KeyStore.PrivateKeyEntry(key, chain), new KeyStore.PasswordProtection(DUMMY_PASSWORD.toCharArray()));
}
return keyStore;
}
private static PrivateKey loadPrivateKey(Buffer keyValue) throws Exception {
if (keyValue == null) {
throw new RuntimeException("Missing private key path");
}
KeyFactory rsaKeyFactory = KeyFactory.getInstance("RSA");
KeyFactory ecKeyFactory = getECKeyFactory();
List pems = loadPems(keyValue, (delimiter, content) -> {
try {
switch (delimiter) {
case "RSA PRIVATE KEY":
return Collections.singletonList(rsaKeyFactory.generatePrivate(PrivateKeyParser.getRSAKeySpec(content)));
case "PRIVATE KEY":
// in PKCS#8 the key algorithm is indicated at the beginning of the ASN.1 structure
// so we can use the corresponding key factory once we know the algorithm name
String algorithm = PrivateKeyParser.getPKCS8EncodedKeyAlgorithm(content);
if (rsaKeyFactory.getAlgorithm().equals(algorithm)) {
return Collections.singletonList(rsaKeyFactory.generatePrivate(new PKCS8EncodedKeySpec(content)));
} else if (ecKeyFactory != null &&
ecKeyFactory.getAlgorithm().equals(algorithm)) {
return Collections.singletonList(ecKeyFactory.generatePrivate(new PKCS8EncodedKeySpec(content)));
}
default:
return Collections.emptyList();
}
} catch (InvalidKeySpecException e) {
throw new MongoException(e);
}
});
if (pems.isEmpty()) {
throw new RuntimeException("Missing -----BEGIN PRIVATE KEY----- or -----BEGIN RSA PRIVATE KEY----- delimiter");
}
return pems.get(0);
}
private static KeyFactory getECKeyFactory() {
try {
return KeyFactory.getInstance("EC");
} catch (NoSuchAlgorithmException e) {
// support for ECC is not mandatory in JVM
return null;
}
}
/**
* TODO
*
* @param certValues TODO
* @return TODO
* @throws Exception TODO
*/
public static KeyStore loadCA(Stream certValues) throws Exception {
final KeyStore keyStore = createEmptyKeyStore();
keyStore.load(null, null);
int count = 0;
Iterable iterable = certValues::iterator;
for (Buffer certValue : iterable) {
for (Certificate cert : loadCerts(certValue)) {
keyStore.setCertificateEntry(DUMMY_CERT_ALIAS + count++, cert);
}
}
return keyStore;
}
private static List
loadPems(Buffer data, BiFunction> pemFact) throws IOException {
String pem = data.toString();
List pems = new ArrayList<>();
Matcher beginMatcher = BEGIN_PATTERN.matcher(pem);
Matcher endMatcher = END_PATTERN.matcher(pem);
while (true) {
boolean begin = beginMatcher.find();
if (!begin) {
break;
}
String beginDelimiter = beginMatcher.group(1);
boolean end = endMatcher.find();
if (!end) {
throw new RuntimeException("Missing -----END " + beginDelimiter + "----- delimiter");
} else {
String endDelimiter = endMatcher.group(1);
if (!beginDelimiter.equals(endDelimiter)) {
throw new RuntimeException("Missing -----END " + beginDelimiter + "----- delimiter");
} else {
String content = pem.substring(beginMatcher.end(), endMatcher.start());
content = content.replaceAll("\\s", "");
if (content.length() == 0) {
throw new RuntimeException("Empty pem file");
}
Collection
pemItems = pemFact.apply(endDelimiter, Base64.getDecoder().decode(content));
pems.addAll(pemItems);
}
}
}
return pems;
}
private static X509Certificate[] loadCerts(Buffer buffer) throws Exception {
if (buffer == null) {
throw new RuntimeException("Missing X.509 certificate path");
}
CertificateFactory certFactory = CertificateFactory.getInstance("X.509");
List certs = loadPems(buffer, (delimiter, content) -> {
try {
switch (delimiter) {
case "CERTIFICATE":
return (Collection) certFactory.generateCertificates(new ByteArrayInputStream(content));
default:
return Collections.emptyList();
}
} catch (CertificateException e) {
throw new MongoException(e);
}
});
if (certs.isEmpty()) {
throw new RuntimeException("Missing -----BEGIN CERTIFICATE----- delimiter");
}
return certs.toArray(new X509Certificate[0]);
}
/**
* Creates a empty key store using the industry standard PCKS12.
*
* The format is the default format for keystores for Java >=9 and available on GraalVM.
*
* PKCS12 is an extensible, standard, and widely-supported format for storing cryptographic keys.
* As of JDK 8, PKCS12 keystores can store private keys, trusted public key certificates, and
* secret keys.
*
* The "old" default "JKS" (available since Java 1.2) can only store private keys and trusted
* public-key certificates, and they are based on a proprietary format that is not easily
* extensible to new cryptographic algorithms.
* @return keystore instance
*
* @throws KeyStoreException if the underlying engine cannot create an instance
*/
private static KeyStore createEmptyKeyStore() throws KeyStoreException {
final KeyStore keyStore = KeyStore.getInstance("PKCS12");
try {
keyStore.load(null, null);
} catch (CertificateException | NoSuchAlgorithmException | IOException e) {
// these exceptions should never be thrown as there is no initial data
// provided to the initialization of the keystore
throw new KeyStoreException("Failed to initialize the keystore", e);
}
return keyStore;
}
}