private SSLEngineConfigurator buildSslEngineConfigurator(Path certFile, Path keyFile, String keyPassword) throws GeneralSecurityException, IOException { if (keyFile == null || !Files.isRegularFile(keyFile) || !Files.isReadable(keyFile)) { throw new InvalidKeyException("Unreadable or missing private key: " + keyFile); } if (certFile == null || !Files.isRegularFile(certFile) || !Files.isReadable(certFile)) { throw new CertificateException("Unreadable or missing X.509 certificate: " + certFile); } final SSLContextConfigurator sslContextConfigurator = new SSLContextConfigurator(); final char[] password = firstNonNull(keyPassword, "").toCharArray(); final KeyStore keyStore = PemKeyStore.buildKeyStore(certFile, keyFile, password); sslContextConfigurator.setKeyStorePass(password); sslContextConfigurator.setKeyStoreBytes(KeyStoreUtils.getBytes(keyStore, password)); final SSLContext sslContext = sslContextConfigurator.createSSLContext(true); return new SSLEngineConfigurator(sslContext, false, false, false); }
SSLEngineConfigurator sslConf = new SSLEngineConfigurator(sslContext).setClientMode(false); sslProperties.getClientAuth().filter(auth-> auth.toLowerCase().equals("want")) .ifPresent(auth->sslConf.setWantClientAuth(true));
new SSLEngineConfigurator(sslConfig) .setClientMode(false) .setNeedClientAuth(false)
/** * Start SSL-secured HTTP test server. * * @throws IOException in case there is an error while reading server key store or trust store. * @return an instance of the started SSL-secured HTTP test server. */ public static Server start() throws IOException { // Grizzly ssl configuration SSLContextConfigurator sslContext = new SSLContextConfigurator(); // set up security context sslContext.setKeyStoreFile(KEYSTORE_SERVER_FILE); // contains server keypair sslContext.setKeyStorePass(KEYSTORE_SERVER_PWD); sslContext.setTrustStoreFile(TRUSTORE_SERVER_FILE); // contains client certificate sslContext.setTrustStorePass(TRUSTORE_SERVER_PWD); ResourceConfig rc = new ResourceConfig(); rc.registerClasses(RootResource.class, SecurityFilter.class, AuthenticationExceptionMapper.class); final HttpServer grizzlyServer = GrizzlyHttpServerFactory.createHttpServer( getBaseURI(), rc, true, new SSLEngineConfigurator(sslContext).setClientMode(false).setNeedClientAuth(true) ); // start Grizzly embedded server // LOGGER.info("Jersey app started. Try out " + BASE_URI + "\nHit CTRL + C to stop it..."); grizzlyServer.start(); return new Server(grizzlyServer); }
public void startServer() throws TelegramApiRequestException { ResourceConfig rc = new ResourceConfig(); rc.register(restApi); rc.register(JacksonFeature.class); final HttpServer grizzlyServer; if (keystoreServerFile != null && keystoreServerPwd != null) { SSLContextConfigurator sslContext = new SSLContextConfigurator(); // set up security context sslContext.setKeyStoreFile(keystoreServerFile); // contains server keypair sslContext.setKeyStorePass(keystoreServerPwd); grizzlyServer = GrizzlyHttpServerFactory.createHttpServer(getBaseURI(), rc, true, new SSLEngineConfigurator(sslContext).setClientMode(false).setNeedClientAuth(false)); } else { grizzlyServer = GrizzlyHttpServerFactory.createHttpServer(getBaseURI(), rc); } try { grizzlyServer.start(); } catch (IOException e) { throw new TelegramApiRequestException("Error starting webhook server", e); } }
public SSLEngineConfigurator copy() { return new SSLEngineConfigurator(this); } }
public SSLEngineConfigurator copy() { return new SSLEngineConfigurator(this); } }
public SSLEngineConfigurator copy() { return new SSLEngineConfigurator(this); } }
public SSLCodec(SSLContext sslContext) { decoder = new SSLDecoderTransformer(); encoder = new SSLEncoderTransformer(); serverSSLEngineConfig = new SSLEngineConfigurator(sslContext, false, false, false); clientSSLEngineConfig = new SSLEngineConfigurator(sslContext, true, false, false); }
public SSLCodec(SSLContext sslContext) { decoder = new SSLDecoderTransformer(); encoder = new SSLEncoderTransformer(); serverSSLEngineConfig = new SSLEngineConfigurator(sslContext, false, false, false); clientSSLEngineConfig = new SSLEngineConfigurator(sslContext, true, false, false); }
public SSLEngineConfigurator createEngineConfigurator(KeyManager[] keyManager) { try { String protocol = getPropertyOrDefault(SYS_SECURE_PROTOCOL, SECURE_TYPE); SSLContext sslContext = SSLContext.getInstance(protocol); sslContext.init(keyManager, null, new SecureRandom()); return new SSLEngineConfigurator(sslContext, false, false, false); } catch (Exception ex) { log.error("createSSLContext", ex); } return null; }
public SSLCodec(SSLContext sslContext) { decoder = new SSLDecoderTransformer(); encoder = new SSLEncoderTransformer(); serverSSLEngineConfig = new SSLEngineConfigurator(sslContext, false, false, false); clientSSLEngineConfig = new SSLEngineConfigurator(sslContext, true, false, false); }
public SSLCodec(SSLContext sslContext) { decoder = new SSLDecoderTransformer(); encoder = new SSLEncoderTransformer(); serverSSLEngineConfig = new SSLEngineConfigurator(sslContext, false, false, false); clientSSLEngineConfig = new SSLEngineConfigurator(sslContext, true, false, false); }
public SSLCodec(SSLContext sslContext) { decoder = new SSLDecoderTransformer(); encoder = new SSLEncoderTransformer(); serverSSLEngineConfig = new SSLEngineConfigurator(sslContext, false, false, false); clientSSLEngineConfig = new SSLEngineConfigurator(sslContext, true, false, false); }
public SSLCodec(SSLContext sslContext) { decoder = new SSLDecoderTransformer(); encoder = new SSLEncoderTransformer(); serverSSLEngineConfig = new SSLEngineConfigurator(sslContext, false, false, false); clientSSLEngineConfig = new SSLEngineConfigurator(sslContext, true, false, false); }
public SSLCodec(SSLContext sslContext) { decoder = new SSLDecoderTransformer(); encoder = new SSLEncoderTransformer(); serverSSLEngineConfig = new SSLEngineConfigurator(sslContext, false, false, false); clientSSLEngineConfig = new SSLEngineConfigurator(sslContext, true, false, false); }
public SSLCodec(SSLContext sslContext) { decoder = new SSLDecoderTransformer(); encoder = new SSLEncoderTransformer(); serverSSLEngineConfig = new SSLEngineConfigurator(sslContext, false, false, false); clientSSLEngineConfig = new SSLEngineConfigurator(sslContext, true, false, false); }
public SSLCodec(SSLContext sslContext) { decoder = new SSLDecoderTransformer(); encoder = new SSLEncoderTransformer(); serverSSLEngineConfig = new SSLEngineConfigurator(sslContext, false, false, false); clientSSLEngineConfig = new SSLEngineConfigurator(sslContext, true, false, false); }
public SSLCodec(SSLContext sslContext) { decoder = new SSLDecoderTransformer(); encoder = new SSLEncoderTransformer(); serverSSLEngineConfig = new SSLEngineConfigurator(sslContext, false, false, false); clientSSLEngineConfig = new SSLEngineConfigurator(sslContext, true, false, false); }
public SSLCodec(SSLContext sslContext) { decoder = new SSLDecoderTransformer(); encoder = new SSLEncoderTransformer(); serverSSLEngineConfig = new SSLEngineConfigurator(sslContext, false, false, false); clientSSLEngineConfig = new SSLEngineConfigurator(sslContext, true, false, false); }