org.wildfly.security.sasl.util.TrustManagerSaslServerFactory Maven / Gradle / Ivy
The newest version!
/*
* JBoss, Home of Professional Open Source.
* Copyright 2015 Red Hat, Inc., and individual contributors
* as indicated by the @author tags.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.wildfly.security.sasl.util;
import static org.wildfly.security.sasl._private.ElytronMessages.log;
import java.security.GeneralSecurityException;
import java.security.cert.CertificateException;
import java.security.cert.X509Certificate;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Iterator;
import java.util.List;
import java.util.Map;
import javax.net.ssl.X509TrustManager;
import javax.security.auth.callback.Callback;
import javax.security.auth.callback.CallbackHandler;
import javax.security.sasl.SaslException;
import javax.security.sasl.SaslServer;
import javax.security.sasl.SaslServerFactory;
import org.wildfly.security.FixedSecurityFactory;
import org.wildfly.security.SecurityFactory;
import org.wildfly.security.auth.callback.EvidenceDecodePrincipalCallback;
import org.wildfly.security.auth.callback.EvidenceVerifyCallback;
import org.wildfly.security.auth.callback.TrustedAuthoritiesCallback;
import org.wildfly.security.evidence.X509PeerCertificateChainEvidence;
import org.wildfly.security.ssl.SSLUtils;
import org.wildfly.security.x500.TrustedAuthority;
import org.wildfly.security.x500.TrustedAuthority.CertificateTrustedAuthority;
/**
* A {@link SaslServerFactory} which sets the trust manager that should be used for trust verification.
*
* @author Farah Juma
*/
public final class TrustManagerSaslServerFactory extends AbstractDelegatingSaslServerFactory {
private final SecurityFactory trustManagerFactory;
/**
* Construct a new instance.
*
* @param delegate the delegate SASL server factory
* @param trustManager the trust manager to use or {@code null} if the default trust manager should be used
*/
public TrustManagerSaslServerFactory(final SaslServerFactory delegate, final X509TrustManager trustManager) {
super(delegate);
if (trustManager == null) {
this.trustManagerFactory = SSLUtils.getDefaultX509TrustManagerSecurityFactory();
} else {
this.trustManagerFactory = new FixedSecurityFactory<>(trustManager);
}
}
public SaslServer createSaslServer(final String mechanism, final String protocol, final String serverName, final Map props, final CallbackHandler cbh) throws SaslException {
return delegate.createSaslServer(mechanism, protocol, serverName, props, callbacks -> {
ArrayList list = new ArrayList<>(Arrays.asList(callbacks));
final Iterator iterator = list.iterator();
while (iterator.hasNext()) {
Callback callback = iterator.next();
if (callback instanceof TrustedAuthoritiesCallback) {
final X509TrustManager trustManager = getTrustManager();
((TrustedAuthoritiesCallback) callback).setTrustedAuthorities(getTrustedAuthorities(trustManager.getAcceptedIssuers()));
iterator.remove();
} else if (callback instanceof EvidenceVerifyCallback) {
final EvidenceVerifyCallback evidenceVerifyCallback = (EvidenceVerifyCallback) callback;
final X509PeerCertificateChainEvidence peerCertificateChainEvidence = evidenceVerifyCallback.getEvidence(X509PeerCertificateChainEvidence.class);
if (peerCertificateChainEvidence != null) {
EvidenceDecodePrincipalCallback evidenceDecodePrincipalCallback = new EvidenceDecodePrincipalCallback(peerCertificateChainEvidence);
cbh.handle(new ArrayList<>(Arrays.asList(evidenceDecodePrincipalCallback)).toArray(new Callback[1]));
final X509TrustManager trustManager = getTrustManager();
try {
trustManager.checkClientTrusted(peerCertificateChainEvidence.getPeerCertificateChain(), peerCertificateChainEvidence.getAlgorithm());
evidenceVerifyCallback.setVerified(true);
} catch (CertificateException e) {
log.trace("Unable to verify certificate chain", e);
}
iterator.remove();
}
}
}
if (! list.isEmpty()) {
cbh.handle(list.toArray(new Callback[list.size()]));
}
});
}
private List getTrustedAuthorities(X509Certificate[] acceptedIssuers) {
if (acceptedIssuers == null) {
return null;
}
List trustedAuthorities = new ArrayList(acceptedIssuers.length);
for (X509Certificate acceptedIssuer : acceptedIssuers) {
trustedAuthorities.add(new CertificateTrustedAuthority(acceptedIssuer));
}
return trustedAuthorities;
}
private X509TrustManager getTrustManager() throws SaslException {
try {
return trustManagerFactory.create();
} catch (GeneralSecurityException e) {
throw new SaslException(e.getMessage(), e);
}
}
}