All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.mariadb.jdbc.internal.protocol.tls.MariaDbX509TrustManager Maven / Gradle / Ivy

There is a newer version: 3.4.1
Show newest version
/*
 *
 * MariaDB Client for Java
 *
 * Copyright (c) 2012-2014 Monty Program Ab.
 * Copyright (c) 2015-2019 MariaDB Ab.
 *
 * This library is free software; you can redistribute it and/or modify it under
 * the terms of the GNU Lesser General Public License as published by the Free
 * Software Foundation; either version 2.1 of the License, or (at your option)
 * any later version.
 *
 * This library is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public License
 * for more details.
 *
 * You should have received a copy of the GNU Lesser General Public License along
 * with this library; if not, write to Monty Program Ab [email protected].
 *
 * This particular MariaDB Client for Java file is work
 * derived from a Drizzle-JDBC. Drizzle-JDBC file which is covered by subject to
 * the following copyright and notice provisions:
 *
 * Copyright (c) 2009-2011, Marcus Eriksson
 *
 * Redistribution and use in source and binary forms, with or without modification,
 * are permitted provided that the following conditions are met:
 * Redistributions of source code must retain the above copyright notice, this list
 * of conditions and the following disclaimer.
 *
 * Redistributions in binary form must reproduce the above copyright notice, this
 * list of conditions and the following disclaimer in the documentation and/or
 * other materials provided with the distribution.
 *
 * Neither the name of the driver nor the names of its contributors may not be
 * used to endorse or promote products derived from this software without specific
 * prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS  AND CONTRIBUTORS "AS IS"
 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 * IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
 * OF SUCH DAMAGE.
 *
 */

package org.mariadb.jdbc.internal.protocol.tls;

import org.mariadb.jdbc.internal.util.*;
import org.mariadb.jdbc.util.*;

import javax.net.ssl.*;
import java.io.*;
import java.net.*;
import java.security.*;
import java.security.cert.Certificate;
import java.security.cert.*;
import java.sql.*;
import java.util.*;

import static org.mariadb.jdbc.internal.util.SqlStates.*;

public class MariaDbX509TrustManager implements X509TrustManager {

  private X509TrustManager trustManager;

  /**
   * MyX509TrustManager.
   *
   * @param options parsed url options
   * @throws SQLException exception
   */
  public MariaDbX509TrustManager(Options options) throws SQLException {
    // if trustServerCertificate is true, will have a X509TrustManager implementation that validate
    // all.
    if (options.trustServerCertificate) {
      return;
    }

    KeyStore ks;
    try {
      ks =
          KeyStore.getInstance(
              options.trustStoreType != null ? options.trustStoreType : KeyStore.getDefaultType());
    } catch (GeneralSecurityException generalSecurityEx) {
      throw new SQLException(
          "Failed to create keystore instance",
          SqlStates.CONNECTION_EXCEPTION.getSqlState(),
          generalSecurityEx);
    }

    InputStream inStream = null;
    try {
      if (options.trustStore != null) {
        // use the provided keyStore
        try {
          String trustStore = options.trustStore;

          try {
            inStream = new URL(trustStore).openStream();
          } catch (IOException ioexception) {
            inStream = new FileInputStream(trustStore);
          }
          ks.load(
              inStream,
              options.trustStorePassword == null ? null : options.trustStorePassword.toCharArray());

        } catch (GeneralSecurityException generalSecurityEx) {
          throw new SQLException(
              "Failed to create trustStore instance",
              CONNECTION_EXCEPTION.getSqlState(),
              generalSecurityEx);
        } catch (FileNotFoundException fileNotFoundEx) {
          throw new SQLException(
              "Failed to find trustStore file. trustStore=" + options.trustStore,
              CONNECTION_EXCEPTION.getSqlState(),
              fileNotFoundEx);
        } catch (IOException ioEx) {
          throw new SQLException(
              "Failed to read trustStore file. trustStore=" + options.trustStore,
              CONNECTION_EXCEPTION.getSqlState(),
              ioEx);
        }
      } else {
        // generate a keyStore from the provided cert
        if (options.serverSslCert.startsWith("-----BEGIN CERTIFICATE-----")) {
          inStream = new ByteArrayInputStream(options.serverSslCert.getBytes());
        } else if (options.serverSslCert.startsWith("classpath:")) {
          // Load it from a classpath relative file
          String classpathFile = options.serverSslCert.substring("classpath:".length());
          inStream =
              Thread.currentThread().getContextClassLoader().getResourceAsStream(classpathFile);
        } else {
          try {
            inStream = new FileInputStream(options.serverSslCert);
          } catch (FileNotFoundException fileNotFoundEx) {
            throw new SQLException(
                "Failed to find serverSslCert file. serverSslCert=" + options.serverSslCert,
                CONNECTION_EXCEPTION.getSqlState(),
                fileNotFoundEx);
          }
        }

        try {
          // Note: KeyStore requires it be loaded even if you don't load anything into it
          // (will be initialized with "javax.net.ssl.trustStore") values.
          ks.load(null);
          CertificateFactory cf = CertificateFactory.getInstance("X.509");
          Collection caList = cf.generateCertificates(inStream);
          for (Certificate ca : caList) {
            ks.setCertificateEntry(UUID.randomUUID().toString(), ca);
          }
        } catch (IOException ioEx) {
          throw new SQLException("Failed load keyStore", CONNECTION_EXCEPTION.getSqlState(), ioEx);
        } catch (GeneralSecurityException generalSecurityEx) {
          throw new SQLException(
              "Failed to store certificate from serverSslCert into a keyStore",
              CONNECTION_EXCEPTION.getSqlState(),
              generalSecurityEx);
        }
      }
    } finally {
      if (inStream != null) {
        try {
          inStream.close();
        } catch (IOException ioEx) {
          // ignore error
        }
      }
    }
    try {
      TrustManagerFactory tmf =
          TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
      tmf.init(ks);
      for (TrustManager tm : tmf.getTrustManagers()) {
        if (tm instanceof X509TrustManager) {
          trustManager = (X509TrustManager) tm;
          break;
        }
      }
    } catch (NoSuchAlgorithmException noSuchAlgorithmEx) {
      throw new SQLException(
          "Failed to create TrustManagerFactory default instance",
          CONNECTION_EXCEPTION.getSqlState(),
          noSuchAlgorithmEx);
    } catch (GeneralSecurityException generalSecurityEx) {
      throw new SQLException(
          "Failed to initialize trust manager",
          CONNECTION_EXCEPTION.getSqlState(),
          generalSecurityEx);
    }

    if (trustManager == null) {
      throw new SQLException("No X509TrustManager found");
    }
  }

  /**
   * Check client trusted.
   *
   * @param x509Certificates certificate
   * @param string string
   * @throws CertificateException exception
   */
  @Override
  public void checkClientTrusted(X509Certificate[] x509Certificates, String string)
      throws CertificateException {
    if (trustManager == null) {
      return;
    }
    trustManager.checkClientTrusted(x509Certificates, string);
  }

  /**
   * Check server trusted.
   *
   * @param x509Certificates certificate
   * @param string string
   * @throws CertificateException exception
   */
  @Override
  public void checkServerTrusted(X509Certificate[] x509Certificates, String string)
      throws CertificateException {
    if (trustManager == null) {
      return;
    }
    trustManager.checkServerTrusted(x509Certificates, string);
  }

  public X509Certificate[] getAcceptedIssuers() {
    return null;
  }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy