1 | |
|
2 | |
|
3 | |
|
4 | |
|
5 | |
|
6 | |
|
7 | |
package org.mule.transport.ssl; |
8 | |
|
9 | |
import org.mule.api.MuleContext; |
10 | |
import org.mule.api.lifecycle.CreateException; |
11 | |
import org.mule.api.lifecycle.InitialisationException; |
12 | |
import org.mule.api.security.TlsDirectKeyStore; |
13 | |
import org.mule.api.security.TlsDirectTrustStore; |
14 | |
import org.mule.api.security.TlsIndirectKeyStore; |
15 | |
import org.mule.api.security.TlsProtocolHandler; |
16 | |
import org.mule.api.security.provider.SecurityProviderFactory; |
17 | |
import org.mule.api.security.tls.TlsConfiguration; |
18 | |
import org.mule.transport.tcp.TcpConnector; |
19 | |
import org.mule.transport.tcp.protocols.DirectProtocol; |
20 | |
|
21 | |
import java.io.IOException; |
22 | |
import java.net.ServerSocket; |
23 | |
import java.net.URI; |
24 | |
import java.security.Provider; |
25 | |
|
26 | |
import javax.net.ssl.KeyManagerFactory; |
27 | |
import javax.net.ssl.SSLServerSocket; |
28 | |
import javax.net.ssl.TrustManagerFactory; |
29 | |
|
30 | |
|
31 | |
|
32 | |
|
33 | |
|
34 | |
|
35 | |
public class SslConnector extends TcpConnector |
36 | |
implements TlsDirectKeyStore, TlsIndirectKeyStore, TlsDirectTrustStore, TlsProtocolHandler |
37 | |
{ |
38 | |
|
39 | |
public static final String SSL = "ssl"; |
40 | |
public static final String PEER_CERTIFICATES = "PEER_CERTIFICATES"; |
41 | |
public static final String LOCAL_CERTIFICATES = "LOCAL_CERTIFICATES"; |
42 | |
|
43 | |
|
44 | 0 | private TlsConfiguration tls = new TlsConfiguration(null); |
45 | |
|
46 | |
|
47 | |
|
48 | |
|
49 | 0 | private long sslHandshakeTimeout = 30000; |
50 | |
|
51 | |
public SslConnector(MuleContext context) |
52 | |
{ |
53 | 0 | super(context); |
54 | 0 | setSocketFactory(new SslSocketFactory(tls)); |
55 | 0 | setServerSocketFactory(new SslServerSocketFactory(tls)); |
56 | 0 | setTcpProtocol(new DirectProtocol()); |
57 | |
|
58 | 0 | setValidateConnections(false); |
59 | 0 | } |
60 | |
|
61 | |
@Override |
62 | |
protected void doInitialise() throws InitialisationException |
63 | |
{ |
64 | 0 | super.doInitialise(); |
65 | |
|
66 | |
|
67 | |
|
68 | |
try |
69 | |
{ |
70 | 0 | tls.initialise(null == getKeyStore(), TlsConfiguration.JSSE_NAMESPACE); |
71 | |
} |
72 | 0 | catch (CreateException e) |
73 | |
{ |
74 | 0 | throw new InitialisationException(e, this); |
75 | 0 | } |
76 | 0 | } |
77 | |
|
78 | |
@Override |
79 | |
protected ServerSocket getServerSocket(URI uri) throws IOException |
80 | |
{ |
81 | 0 | SSLServerSocket serverSocket = (SSLServerSocket) super.getServerSocket(uri); |
82 | 0 | serverSocket.setNeedClientAuth(isRequireClientAuthentication()); |
83 | 0 | return serverSocket; |
84 | |
} |
85 | |
|
86 | |
@Override |
87 | |
public String getProtocol() |
88 | |
{ |
89 | 0 | return SSL; |
90 | |
} |
91 | |
|
92 | |
public String getClientKeyStore() |
93 | |
{ |
94 | 0 | return tls.getClientKeyStore(); |
95 | |
} |
96 | |
|
97 | |
public String getClientKeyStorePassword() |
98 | |
{ |
99 | 0 | return tls.getClientKeyStorePassword(); |
100 | |
} |
101 | |
|
102 | |
public String getClientKeyStoreType() |
103 | |
{ |
104 | 0 | return this.tls.getClientKeyStoreType(); |
105 | |
} |
106 | |
|
107 | |
public String getKeyManagerAlgorithm() |
108 | |
{ |
109 | 0 | return tls.getKeyManagerAlgorithm(); |
110 | |
} |
111 | |
|
112 | |
public KeyManagerFactory getKeyManagerFactory() |
113 | |
{ |
114 | 0 | return tls.getKeyManagerFactory(); |
115 | |
} |
116 | |
|
117 | |
public String getKeyPassword() |
118 | |
{ |
119 | 0 | return tls.getKeyPassword(); |
120 | |
} |
121 | |
|
122 | |
public String getKeyStore() |
123 | |
{ |
124 | 0 | return tls.getKeyStore(); |
125 | |
} |
126 | |
|
127 | |
public String getKeyAlias() |
128 | |
{ |
129 | 0 | return tls.getKeyAlias(); |
130 | |
} |
131 | |
|
132 | |
public String getKeyStoreType() |
133 | |
{ |
134 | 0 | return tls.getKeyStoreType(); |
135 | |
} |
136 | |
|
137 | |
public String getProtocolHandler() |
138 | |
{ |
139 | 0 | return tls.getProtocolHandler(); |
140 | |
} |
141 | |
|
142 | |
public Provider getProvider() |
143 | |
{ |
144 | 0 | return tls.getProvider(); |
145 | |
} |
146 | |
|
147 | |
public SecurityProviderFactory getSecurityProviderFactory() |
148 | |
{ |
149 | 0 | return tls.getSecurityProviderFactory(); |
150 | |
} |
151 | |
|
152 | |
public String getSslType() |
153 | |
{ |
154 | 0 | return tls.getSslType(); |
155 | |
} |
156 | |
|
157 | |
public String getKeyStorePassword() |
158 | |
{ |
159 | 0 | return tls.getKeyStorePassword(); |
160 | |
} |
161 | |
|
162 | |
public String getTrustManagerAlgorithm() |
163 | |
{ |
164 | 0 | return tls.getTrustManagerAlgorithm(); |
165 | |
} |
166 | |
|
167 | |
public TrustManagerFactory getTrustManagerFactory() |
168 | |
{ |
169 | 0 | return tls.getTrustManagerFactory(); |
170 | |
} |
171 | |
|
172 | |
public String getTrustStore() |
173 | |
{ |
174 | 0 | return tls.getTrustStore(); |
175 | |
} |
176 | |
|
177 | |
public String getTrustStorePassword() |
178 | |
{ |
179 | 0 | return tls.getTrustStorePassword(); |
180 | |
} |
181 | |
|
182 | |
public String getTrustStoreType() |
183 | |
{ |
184 | 0 | return tls.getTrustStoreType(); |
185 | |
} |
186 | |
|
187 | |
public boolean isExplicitTrustStoreOnly() |
188 | |
{ |
189 | 0 | return tls.isExplicitTrustStoreOnly(); |
190 | |
} |
191 | |
|
192 | |
public boolean isRequireClientAuthentication() |
193 | |
{ |
194 | 0 | return tls.isRequireClientAuthentication(); |
195 | |
} |
196 | |
|
197 | |
public void setClientKeyStore(String clientKeyStore) throws IOException |
198 | |
{ |
199 | 0 | tls.setClientKeyStore(clientKeyStore); |
200 | 0 | } |
201 | |
|
202 | |
public void setClientKeyStorePassword(String clientKeyStorePassword) |
203 | |
{ |
204 | 0 | tls.setClientKeyStorePassword(clientKeyStorePassword); |
205 | 0 | } |
206 | |
|
207 | |
public void setClientKeyStoreType(String clientKeyStoreType) |
208 | |
{ |
209 | 0 | this.tls.setClientKeyStoreType(clientKeyStoreType); |
210 | 0 | } |
211 | |
|
212 | |
public void setExplicitTrustStoreOnly(boolean explicitTrustStoreOnly) |
213 | |
{ |
214 | 0 | tls.setExplicitTrustStoreOnly(explicitTrustStoreOnly); |
215 | 0 | } |
216 | |
|
217 | |
public void setKeyManagerAlgorithm(String keyManagerAlgorithm) |
218 | |
{ |
219 | 0 | tls.setKeyManagerAlgorithm(keyManagerAlgorithm); |
220 | 0 | } |
221 | |
|
222 | |
public void setKeyPassword(String keyPassword) |
223 | |
{ |
224 | 0 | tls.setKeyPassword(keyPassword); |
225 | 0 | } |
226 | |
|
227 | |
public void setKeyStore(String keyStore) throws IOException |
228 | |
{ |
229 | 0 | tls.setKeyStore(keyStore); |
230 | 0 | } |
231 | |
|
232 | |
public void setKeyAlias(String alias) |
233 | |
{ |
234 | 0 | tls.setKeyAlias(alias); |
235 | 0 | } |
236 | |
|
237 | |
public void setKeyStoreType(String keystoreType) |
238 | |
{ |
239 | 0 | tls.setKeyStoreType(keystoreType); |
240 | 0 | } |
241 | |
|
242 | |
public void setProtocolHandler(String protocolHandler) |
243 | |
{ |
244 | 0 | tls.setProtocolHandler(protocolHandler); |
245 | 0 | } |
246 | |
|
247 | |
public void setProvider(Provider provider) |
248 | |
{ |
249 | 0 | tls.setProvider(provider); |
250 | 0 | } |
251 | |
|
252 | |
public void setRequireClientAuthentication(boolean requireClientAuthentication) |
253 | |
{ |
254 | 0 | tls.setRequireClientAuthentication(requireClientAuthentication); |
255 | 0 | } |
256 | |
|
257 | |
public void setSecurityProviderFactory(SecurityProviderFactory spFactory) |
258 | |
{ |
259 | 0 | tls.setSecurityProviderFactory(spFactory); |
260 | 0 | } |
261 | |
|
262 | |
public void setSslType(String sslType) |
263 | |
{ |
264 | 0 | tls.setSslType(sslType); |
265 | 0 | } |
266 | |
|
267 | |
public void setKeyStorePassword(String storePassword) |
268 | |
{ |
269 | 0 | tls.setKeyStorePassword(storePassword); |
270 | 0 | } |
271 | |
|
272 | |
public void setTrustManagerAlgorithm(String trustManagerAlgorithm) |
273 | |
{ |
274 | 0 | tls.setTrustManagerAlgorithm(trustManagerAlgorithm); |
275 | 0 | } |
276 | |
|
277 | |
public void setTrustManagerFactory(TrustManagerFactory trustManagerFactory) |
278 | |
{ |
279 | 0 | tls.setTrustManagerFactory(trustManagerFactory); |
280 | 0 | } |
281 | |
|
282 | |
public void setTrustStore(String trustStore) throws IOException |
283 | |
{ |
284 | 0 | tls.setTrustStore(trustStore); |
285 | 0 | } |
286 | |
|
287 | |
public void setTrustStorePassword(String trustStorePassword) |
288 | |
{ |
289 | 0 | tls.setTrustStorePassword(trustStorePassword); |
290 | 0 | } |
291 | |
|
292 | |
public void setTrustStoreType(String trustStoreType) |
293 | |
{ |
294 | 0 | tls.setTrustStoreType(trustStoreType); |
295 | 0 | } |
296 | |
|
297 | |
public long getSslHandshakeTimeout() |
298 | |
{ |
299 | 0 | return sslHandshakeTimeout; |
300 | |
} |
301 | |
|
302 | |
public void setSslHandshakeTimeout(long sslHandshakeTimeout) |
303 | |
{ |
304 | 0 | this.sslHandshakeTimeout = sslHandshakeTimeout; |
305 | 0 | } |
306 | |
|
307 | |
} |