org.xbib.net.security.ssl.trustmanager.CompositeX509ExtendedTrustManager Maven / Gradle / Ivy
The newest version!
package org.xbib.net.security.ssl.trustmanager;
import org.xbib.net.security.ssl.util.TrustManagerUtils;
import javax.net.ssl.SSLEngine;
import javax.net.ssl.X509ExtendedTrustManager;
import java.net.Socket;
import java.security.cert.CertificateException;
import java.security.cert.X509Certificate;
import java.util.Arrays;
import java.util.Collections;
import java.util.List;
/**
* {@link CompositeX509ExtendedTrustManager} is a wrapper for a collection of TrustManagers.
* It has the ability to validate a certificate chain against multiple TrustManagers.
* If any one of the composed managers trusts a certificate chain, then it is trusted by the composite manager.
* The TrustManager can be build from one or more of any combination provided within the
* {@link TrustManagerUtils.TrustManagerBuilder TrustManagerUtils.TrustManagerBuilder}.
* This includes:
*
* - Any amount of custom TrustManagers
* - Any amount of custom TrustStores
*
*
*
* NOTE:
* Please don't use this class directly as it is part of the internal API. Class name and methods can be changed any time.
* Instead use the {@link TrustManagerUtils TrustManagerUtils} which provides the same functionality
* while it has a stable API because it is part of the public API.
*
*
* @see
* http://stackoverflow.com/questions/1793979/registering-multiple-keystores-in-jvm
*
* @see
* http://codyaray.com/2013/04/java-ssl-with-multiple-keystores
*
*
*/
public final class CompositeX509ExtendedTrustManager extends X509ExtendedTrustManager implements CombinableX509TrustManager {
private static final String CLIENT_CERTIFICATE_LOG_MESSAGE = "Received the following client certificate: [{0}]";
private static final String SERVER_CERTIFICATE_LOG_MESSAGE = "Received the following server certificate: [{0}]";
private final List trustManagers;
private final X509Certificate[] acceptedIssuers;
public CompositeX509ExtendedTrustManager(List extends X509ExtendedTrustManager> trustManagers) {
this.trustManagers = Collections.unmodifiableList(trustManagers);
this.acceptedIssuers = trustManagers.stream()
.map(X509ExtendedTrustManager::getAcceptedIssuers)
.flatMap(Arrays::stream)
.distinct()
.toArray(X509Certificate[]::new);
}
@Override
public void checkClientTrusted(X509Certificate[] chain, String authType) throws CertificateException {
checkTrusted(trustManager -> trustManager.checkClientTrusted(chain, authType));
}
@Override
public void checkClientTrusted(X509Certificate[] chain, String authType, Socket socket) throws CertificateException {
checkTrusted(trustManager -> trustManager.checkClientTrusted(chain, authType, socket));
}
@Override
public void checkClientTrusted(X509Certificate[] chain, String authType, SSLEngine sslEngine) throws CertificateException {
checkTrusted(trustManager -> trustManager.checkClientTrusted(chain, authType, sslEngine));
}
@Override
public void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException {
checkTrusted(trustManager -> trustManager.checkServerTrusted(chain, authType));
}
@Override
public void checkServerTrusted(X509Certificate[] chain, String authType, Socket socket) throws CertificateException {
checkTrusted(trustManager -> trustManager.checkServerTrusted(chain, authType, socket));
}
@Override
public void checkServerTrusted(X509Certificate[] chain, String authType, SSLEngine sslEngine) throws CertificateException {
checkTrusted(trustManager -> trustManager.checkServerTrusted(chain, authType, sslEngine));
}
@Override
public X509Certificate[] getAcceptedIssuers() {
return Arrays.copyOf(acceptedIssuers, acceptedIssuers.length);
}
@Override
public List getTrustManagers() {
return trustManagers;
}
}