org.mariadb.jdbc.internal.protocol.tls.MariaDbX509TrustManager Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of mariadb-java-client Show documentation
Show all versions of mariadb-java-client Show documentation
JDBC driver for MariaDB and MySQL
/*
*
* MariaDB Client for Java
*
* Copyright (c) 2012-2014 Monty Program Ab.
* Copyright (c) 2015-2019 MariaDB Ab.
*
* This library is free software; you can redistribute it and/or modify it under
* the terms of the GNU Lesser General Public License as published by the Free
* Software Foundation; either version 2.1 of the License, or (at your option)
* any later version.
*
* This library is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License
* for more details.
*
* You should have received a copy of the GNU Lesser General Public License along
* with this library; if not, write to Monty Program Ab [email protected].
*
* This particular MariaDB Client for Java file is work
* derived from a Drizzle-JDBC. Drizzle-JDBC file which is covered by subject to
* the following copyright and notice provisions:
*
* Copyright (c) 2009-2011, Marcus Eriksson
*
* Redistribution and use in source and binary forms, with or without modification,
* are permitted provided that the following conditions are met:
* Redistributions of source code must retain the above copyright notice, this list
* of conditions and the following disclaimer.
*
* Redistributions in binary form must reproduce the above copyright notice, this
* list of conditions and the following disclaimer in the documentation and/or
* other materials provided with the distribution.
*
* Neither the name of the driver nor the names of its contributors may not be
* used to endorse or promote products derived from this software without specific
* prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
* OF SUCH DAMAGE.
*
*/
package org.mariadb.jdbc.internal.protocol.tls;
import org.mariadb.jdbc.internal.util.*;
import org.mariadb.jdbc.util.*;
import javax.net.ssl.*;
import java.io.*;
import java.net.*;
import java.security.*;
import java.security.cert.Certificate;
import java.security.cert.*;
import java.sql.*;
import java.util.*;
import static org.mariadb.jdbc.internal.util.SqlStates.*;
public class MariaDbX509TrustManager implements X509TrustManager {
private X509TrustManager trustManager;
/**
* MyX509TrustManager.
*
* @param options parsed url options
* @throws SQLException exception
*/
public MariaDbX509TrustManager(Options options) throws SQLException {
// if trustServerCertificate is true, will have a X509TrustManager implementation that validate
// all.
if (options.trustServerCertificate) {
return;
}
KeyStore ks;
try {
ks =
KeyStore.getInstance(
options.trustStoreType != null ? options.trustStoreType : KeyStore.getDefaultType());
} catch (GeneralSecurityException generalSecurityEx) {
throw new SQLException(
"Failed to create keystore instance",
SqlStates.CONNECTION_EXCEPTION.getSqlState(),
generalSecurityEx);
}
InputStream inStream = null;
try {
if (options.trustStore != null) {
// use the provided keyStore
try {
String trustStore = options.trustStore;
try {
inStream = new URL(trustStore).openStream();
} catch (IOException ioexception) {
inStream = new FileInputStream(trustStore);
}
ks.load(
inStream,
options.trustStorePassword == null ? null : options.trustStorePassword.toCharArray());
} catch (GeneralSecurityException generalSecurityEx) {
throw new SQLException(
"Failed to create trustStore instance",
CONNECTION_EXCEPTION.getSqlState(),
generalSecurityEx);
} catch (FileNotFoundException fileNotFoundEx) {
throw new SQLException(
"Failed to find trustStore file. trustStore=" + options.trustStore,
CONNECTION_EXCEPTION.getSqlState(),
fileNotFoundEx);
} catch (IOException ioEx) {
throw new SQLException(
"Failed to read trustStore file. trustStore=" + options.trustStore,
CONNECTION_EXCEPTION.getSqlState(),
ioEx);
}
} else {
// generate a keyStore from the provided cert
if (options.serverSslCert.startsWith("-----BEGIN CERTIFICATE-----")) {
inStream = new ByteArrayInputStream(options.serverSslCert.getBytes());
} else if (options.serverSslCert.startsWith("classpath:")) {
// Load it from a classpath relative file
String classpathFile = options.serverSslCert.substring("classpath:".length());
inStream =
Thread.currentThread().getContextClassLoader().getResourceAsStream(classpathFile);
} else {
try {
inStream = new FileInputStream(options.serverSslCert);
} catch (FileNotFoundException fileNotFoundEx) {
throw new SQLException(
"Failed to find serverSslCert file. serverSslCert=" + options.serverSslCert,
CONNECTION_EXCEPTION.getSqlState(),
fileNotFoundEx);
}
}
try {
// Note: KeyStore requires it be loaded even if you don't load anything into it
// (will be initialized with "javax.net.ssl.trustStore") values.
ks.load(null);
CertificateFactory cf = CertificateFactory.getInstance("X.509");
Collection extends Certificate> caList = cf.generateCertificates(inStream);
for (Certificate ca : caList) {
ks.setCertificateEntry(UUID.randomUUID().toString(), ca);
}
} catch (IOException ioEx) {
throw new SQLException("Failed load keyStore", CONNECTION_EXCEPTION.getSqlState(), ioEx);
} catch (GeneralSecurityException generalSecurityEx) {
throw new SQLException(
"Failed to store certificate from serverSslCert into a keyStore",
CONNECTION_EXCEPTION.getSqlState(),
generalSecurityEx);
}
}
} finally {
if (inStream != null) {
try {
inStream.close();
} catch (IOException ioEx) {
// ignore error
}
}
}
try {
TrustManagerFactory tmf =
TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
tmf.init(ks);
for (TrustManager tm : tmf.getTrustManagers()) {
if (tm instanceof X509TrustManager) {
trustManager = (X509TrustManager) tm;
break;
}
}
} catch (NoSuchAlgorithmException noSuchAlgorithmEx) {
throw new SQLException(
"Failed to create TrustManagerFactory default instance",
CONNECTION_EXCEPTION.getSqlState(),
noSuchAlgorithmEx);
} catch (GeneralSecurityException generalSecurityEx) {
throw new SQLException(
"Failed to initialize trust manager",
CONNECTION_EXCEPTION.getSqlState(),
generalSecurityEx);
}
if (trustManager == null) {
throw new SQLException("No X509TrustManager found");
}
}
/**
* Check client trusted.
*
* @param x509Certificates certificate
* @param string string
* @throws CertificateException exception
*/
@Override
public void checkClientTrusted(X509Certificate[] x509Certificates, String string)
throws CertificateException {
if (trustManager == null) {
return;
}
trustManager.checkClientTrusted(x509Certificates, string);
}
/**
* Check server trusted.
*
* @param x509Certificates certificate
* @param string string
* @throws CertificateException exception
*/
@Override
public void checkServerTrusted(X509Certificate[] x509Certificates, String string)
throws CertificateException {
if (trustManager == null) {
return;
}
trustManager.checkServerTrusted(x509Certificates, string);
}
public X509Certificate[] getAcceptedIssuers() {
return null;
}
}