org.elasticsearch.common.ssl.CompositeTrustConfig Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of elasticsearch-ssl-config Show documentation
Show all versions of elasticsearch-ssl-config Show documentation
Elasticsearch subproject :libs:elasticsearch-ssl-config
The newest version!
/*
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
* or more contributor license agreements. Licensed under the "Elastic License
* 2.0", the "GNU Affero General Public License v3.0 only", and the "Server Side
* Public License v 1"; you may not use this file except in compliance with, at
* your election, the "Elastic License 2.0", the "GNU Affero General Public
* License v3.0 only", or the "Server Side Public License, v 1".
*/
package org.elasticsearch.common.ssl;
import java.nio.file.Path;
import java.security.GeneralSecurityException;
import java.security.KeyStore;
import java.security.cert.Certificate;
import java.util.Arrays;
import java.util.Collection;
import java.util.List;
import java.util.Objects;
import java.util.stream.Collectors;
import javax.net.ssl.TrustManagerFactory;
import javax.net.ssl.X509ExtendedTrustManager;
/**
* A TrustConfiguration that merges trust anchors from a number of other trust configs to produce a single {@link X509ExtendedTrustManager}.
*/
public class CompositeTrustConfig implements SslTrustConfig {
private final List configs;
CompositeTrustConfig(List configs) {
this.configs = List.copyOf(configs);
}
@Override
public Collection getDependentFiles() {
return configs.stream().map(SslTrustConfig::getDependentFiles).flatMap(Collection::stream).collect(Collectors.toUnmodifiableSet());
}
@Override
public boolean isSystemDefault() {
return configs.stream().allMatch(SslTrustConfig::isSystemDefault);
}
@Override
public X509ExtendedTrustManager createTrustManager() {
try {
Collection trustedIssuers = configs.stream()
.map(c -> c.createTrustManager())
.map(tm -> tm.getAcceptedIssuers())
.flatMap(Arrays::stream)
.collect(Collectors.toSet());
final KeyStore store = KeyStoreUtil.buildTrustStore(trustedIssuers);
return KeyStoreUtil.createTrustManager(store, TrustManagerFactory.getDefaultAlgorithm());
} catch (GeneralSecurityException e) {
throw new SslConfigException(
"Cannot combine trust configurations ["
+ configs.stream().map(SslTrustConfig::toString).collect(Collectors.joining(","))
+ "]",
e
);
}
}
@Override
public Collection extends StoredCertificate> getConfiguredCertificates() {
return configs.stream().map(SslTrustConfig::getConfiguredCertificates).flatMap(Collection::stream).toList();
}
@Override
public boolean equals(Object o) {
if (this == o) return true;
if (o == null || getClass() != o.getClass()) return false;
CompositeTrustConfig that = (CompositeTrustConfig) o;
return configs.equals(that.configs);
}
@Override
public int hashCode() {
return Objects.hash(configs);
}
@Override
public String toString() {
return "Composite-Trust{" + configs.stream().map(SslTrustConfig::toString).collect(Collectors.joining(",")) + '}';
}
}