aboutsummaryrefslogtreecommitdiffstats
path: root/aai-schema-abstraction/src/main/java/org/onap/aai/schemaif/json/SecureClientHttpRequestFactory.java
blob: 5be74c39fa3c667a7bf06651f424be86cc4a2ed6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
/**
 * ============LICENSE_START=======================================================
 * org.onap.aai
 * ================================================================================
 * Copyright © 2017-2018 AT&T Intellectual Property. All rights reserved.
 * Copyright © 2017-2018 European Software Marketing Ltd.
 * ================================================================================
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 * ============LICENSE_END=========================================================
 */

package org.onap.aai.schemaif.json;


import java.io.FileInputStream;
import java.io.IOException;
import java.net.HttpURLConnection;
import java.security.KeyStore;
import java.security.cert.X509Certificate;

import javax.net.ssl.HostnameVerifier;
import javax.net.ssl.HttpsURLConnection;
import javax.net.ssl.KeyManagerFactory;
import javax.net.ssl.SSLContext;
import javax.net.ssl.SSLSession;
import javax.net.ssl.TrustManager;
import javax.net.ssl.X509TrustManager;

import org.springframework.http.client.SimpleClientHttpRequestFactory;


public class SecureClientHttpRequestFactory extends SimpleClientHttpRequestFactory {

    private static final String SSL_PROTOCOL = "TLS";
    private static final String KEYSTORE_ALGORITHM = "SunX509";
    private static final String KEYSTORE_TYPE = "PKCS12";
    private JsonSchemaProviderConfig config;


    public SecureClientHttpRequestFactory(JsonSchemaProviderConfig  config) {
        super();
        this.config = config;
    }

    @Override
    protected void prepareConnection(final HttpURLConnection connection, final String httpMethod)
        throws IOException {
        if (connection instanceof HttpsURLConnection) {
            ((HttpsURLConnection) connection)
                .setSSLSocketFactory(getSSLContext().getSocketFactory());
            ((HttpsURLConnection) connection).setHostnameVerifier(new HostnameVerifier() {
                @Override
                public boolean verify(String str, SSLSession sslSession) {
                    return true;
                }
            });
        } else {

            throw new IOException();
        }
        super.prepareConnection(connection, httpMethod);
    }

    protected SSLContext getSSLContext() throws IOException {
        try {
            TrustManager[] trustAllCerts = null;

            // We aren't validating certificates, so create a trust manager that
            // does
            // not validate certificate chains.
            trustAllCerts = new TrustManager[] {new X509TrustManager() {
                public X509Certificate[] getAcceptedIssuers() {
                    return null;
                }

                public void checkClientTrusted(X509Certificate[] certs, String authType) {
                }

                public void checkServerTrusted(X509Certificate[] certs, String authType) {
                }
            }};

            SSLContext ctx = SSLContext.getInstance(SSL_PROTOCOL);
            KeyManagerFactory kmf = KeyManagerFactory.getInstance(KEYSTORE_ALGORITHM);
            KeyStore ks = KeyStore.getInstance(KEYSTORE_TYPE);

            char[] pwd = null;
            if (config.getSchemaServiceCertPwd()!= null) {
                pwd = config.getSchemaServiceCertPwd().toCharArray();
            }

            if (config.getSchemaServiceCertFile() != null) {
                try (FileInputStream fin = new FileInputStream(config.getSchemaServiceCertFile())) {
                    // Load the keystore and initialize the key manager factory.
                    ks.load(fin, pwd);
                    kmf.init(ks, pwd);

                    ctx.init(kmf.getKeyManagers(), trustAllCerts, null);
                }
            } else {
                ctx.init(null, trustAllCerts, null);
            }

            return ctx;
        } catch (Exception e) {
            throw new IOException("Problem with getting the SSL Context::" + e.getMessage(), e);
        }

    }

}