parent
c173e801c5
commit
5f7d871258
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* Copyright 2002-2019 the original author or authors.
|
* Copyright 2002-2021 the original author or authors.
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
* you may not use this file except in compliance with the License.
|
* you may not use this file except in compliance with the License.
|
||||||
|
@ -17,10 +17,15 @@
|
||||||
package org.springframework.security.converter;
|
package org.springframework.security.converter;
|
||||||
|
|
||||||
import java.io.BufferedReader;
|
import java.io.BufferedReader;
|
||||||
|
import java.io.ByteArrayInputStream;
|
||||||
|
import java.io.IOException;
|
||||||
import java.io.InputStream;
|
import java.io.InputStream;
|
||||||
import java.io.InputStreamReader;
|
import java.io.InputStreamReader;
|
||||||
import java.security.KeyFactory;
|
import java.security.KeyFactory;
|
||||||
import java.security.NoSuchAlgorithmException;
|
import java.security.NoSuchAlgorithmException;
|
||||||
|
import java.security.cert.CertificateException;
|
||||||
|
import java.security.cert.CertificateFactory;
|
||||||
|
import java.security.cert.X509Certificate;
|
||||||
import java.security.interfaces.RSAPrivateKey;
|
import java.security.interfaces.RSAPrivateKey;
|
||||||
import java.security.interfaces.RSAPublicKey;
|
import java.security.interfaces.RSAPublicKey;
|
||||||
import java.security.spec.PKCS8EncodedKeySpec;
|
import java.security.spec.PKCS8EncodedKeySpec;
|
||||||
|
@ -36,6 +41,7 @@ import org.springframework.util.Assert;
|
||||||
* Used for creating {@link java.security.Key} converter instances
|
* Used for creating {@link java.security.Key} converter instances
|
||||||
*
|
*
|
||||||
* @author Josh Cummings
|
* @author Josh Cummings
|
||||||
|
* @author Shazin Sadakath
|
||||||
* @since 5.2
|
* @since 5.2
|
||||||
*/
|
*/
|
||||||
public final class RsaKeyConverters {
|
public final class RsaKeyConverters {
|
||||||
|
@ -50,6 +56,10 @@ public final class RsaKeyConverters {
|
||||||
|
|
||||||
private static final String X509_PEM_FOOTER = DASHES + "END PUBLIC KEY" + DASHES;
|
private static final String X509_PEM_FOOTER = DASHES + "END PUBLIC KEY" + DASHES;
|
||||||
|
|
||||||
|
private static final String X509_CERT_HEADER = DASHES + "BEGIN CERTIFICATE" + DASHES;
|
||||||
|
|
||||||
|
private static final String X509_CERT_FOOTER = DASHES + "END CERTIFICATE" + DASHES;
|
||||||
|
|
||||||
private RsaKeyConverters() {
|
private RsaKeyConverters() {
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -91,8 +101,8 @@ public final class RsaKeyConverters {
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Construct a {@link Converter} for converting a PEM-encoded X.509 RSA Public Key
|
* Construct a {@link Converter} for converting a PEM-encoded X.509 RSA Public Key or
|
||||||
* into a {@link RSAPublicKey}.
|
* X.509 Certificate into a {@link RSAPublicKey}.
|
||||||
*
|
*
|
||||||
* This converter does not close the {@link InputStream} in order to avoid making
|
* This converter does not close the {@link InputStream} in order to avoid making
|
||||||
* non-portable assumptions about the streams' origin and further use.
|
* non-portable assumptions about the streams' origin and further use.
|
||||||
|
@ -101,27 +111,52 @@ public final class RsaKeyConverters {
|
||||||
*/
|
*/
|
||||||
public static Converter<InputStream, RSAPublicKey> x509() {
|
public static Converter<InputStream, RSAPublicKey> x509() {
|
||||||
KeyFactory keyFactory = rsaFactory();
|
KeyFactory keyFactory = rsaFactory();
|
||||||
|
CertificateFactory certificateFactory = x509CertificateFactory();
|
||||||
return (source) -> {
|
return (source) -> {
|
||||||
List<String> lines = readAllLines(source);
|
List<String> lines = readAllLines(source);
|
||||||
Assert.isTrue(!lines.isEmpty() && lines.get(0).startsWith(X509_PEM_HEADER),
|
Assert.isTrue(
|
||||||
"Key is not in PEM-encoded X.509 format, please check that the header begins with -----"
|
!lines.isEmpty()
|
||||||
+ X509_PEM_HEADER + "-----");
|
&& (lines.get(0).startsWith(X509_PEM_HEADER) || lines.get(0).startsWith(X509_CERT_HEADER)),
|
||||||
|
"Key is not in PEM-encoded X.509 format or a valid X.509 certificate, please check that the header begins with "
|
||||||
|
+ X509_PEM_HEADER + " or " + X509_CERT_HEADER);
|
||||||
StringBuilder base64Encoded = new StringBuilder();
|
StringBuilder base64Encoded = new StringBuilder();
|
||||||
for (String line : lines) {
|
for (String line : lines) {
|
||||||
if (RsaKeyConverters.isNotX509Wrapper(line)) {
|
if (RsaKeyConverters.isNotX509PemWrapper(line) && isNotX509CertificateWrapper(line)) {
|
||||||
base64Encoded.append(line);
|
base64Encoded.append(line);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
byte[] x509 = Base64.getDecoder().decode(base64Encoded.toString());
|
byte[] x509 = Base64.getDecoder().decode(base64Encoded.toString());
|
||||||
try {
|
if (lines.get(0).startsWith(X509_PEM_HEADER)) {
|
||||||
return (RSAPublicKey) keyFactory.generatePublic(new X509EncodedKeySpec(x509));
|
try {
|
||||||
|
return (RSAPublicKey) keyFactory.generatePublic(new X509EncodedKeySpec(x509));
|
||||||
|
}
|
||||||
|
catch (Exception ex) {
|
||||||
|
throw new IllegalArgumentException(ex);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
catch (Exception ex) {
|
if (lines.get(0).startsWith(X509_CERT_HEADER)) {
|
||||||
throw new IllegalArgumentException(ex);
|
try (InputStream x509CertStream = new ByteArrayInputStream(x509)) {
|
||||||
|
X509Certificate certificate = (X509Certificate) certificateFactory
|
||||||
|
.generateCertificate(x509CertStream);
|
||||||
|
return (RSAPublicKey) certificate.getPublicKey();
|
||||||
|
}
|
||||||
|
catch (CertificateException | IOException ex) {
|
||||||
|
throw new IllegalArgumentException(ex);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
return null;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private static CertificateFactory x509CertificateFactory() {
|
||||||
|
try {
|
||||||
|
return CertificateFactory.getInstance("X.509");
|
||||||
|
}
|
||||||
|
catch (CertificateException ex) {
|
||||||
|
throw new IllegalArgumentException(ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
private static List<String> readAllLines(InputStream source) {
|
private static List<String> readAllLines(InputStream source) {
|
||||||
BufferedReader reader = new BufferedReader(new InputStreamReader(source));
|
BufferedReader reader = new BufferedReader(new InputStreamReader(source));
|
||||||
return reader.lines().collect(Collectors.toList());
|
return reader.lines().collect(Collectors.toList());
|
||||||
|
@ -140,8 +175,12 @@ public final class RsaKeyConverters {
|
||||||
return !PKCS8_PEM_HEADER.equals(line) && !PKCS8_PEM_FOOTER.equals(line);
|
return !PKCS8_PEM_HEADER.equals(line) && !PKCS8_PEM_FOOTER.equals(line);
|
||||||
}
|
}
|
||||||
|
|
||||||
private static boolean isNotX509Wrapper(String line) {
|
private static boolean isNotX509PemWrapper(String line) {
|
||||||
return !X509_PEM_HEADER.equals(line) && !X509_PEM_FOOTER.equals(line);
|
return !X509_PEM_HEADER.equals(line) && !X509_PEM_FOOTER.equals(line);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private static boolean isNotX509CertificateWrapper(String line) {
|
||||||
|
return !X509_CERT_HEADER.equals(line) && !X509_CERT_FOOTER.equals(line);
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* Copyright 2002-2019 the original author or authors.
|
* Copyright 2002-2021 the original author or authors.
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
* you may not use this file except in compliance with the License.
|
* you may not use this file except in compliance with the License.
|
||||||
|
@ -93,6 +93,20 @@ public class RsaKeyConvertersTests {
|
||||||
+ "-----END PUBLIC KEY-----";
|
+ "-----END PUBLIC KEY-----";
|
||||||
// @formatter:on
|
// @formatter:on
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
private static final String X509_CERTIFICATE = "-----BEGIN CERTIFICATE-----\n" +
|
||||||
|
"MIIBqDCCARECBgF5zJA6MjANBgkqhkiG9w0BAQsFADAaMRgwFgYDVQQDEw9TaGF6\n" +
|
||||||
|
"aW4gU2FkYWthdGgwHhcNMjEwNjAxMTE1MTE0WhcNMjEwNTE3MjAwOTI1WjAaMRgw\n" +
|
||||||
|
"FgYDVQQDEw9TaGF6aW4gU2FkYWthdGgwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJ\n" +
|
||||||
|
"AoGBAKsKpS6sliNSri3koOAgzS7Nz2cpl0tGpNP3GPuUYVMP4MA0LJ2+blxjxUcn\n" +
|
||||||
|
"oIajtaf9HljFetKVjyARp1zjZ3Oxm//lfmyqqI5KDUjqe5J2rdtbdFCH9FXUEoGD\n" +
|
||||||
|
"mu2ameR9lAfxtaGI58DGS9uJ5hvGJoIvLiaDUfv1qZ+kIwG7AgMBAAEwDQYJKoZI\n" +
|
||||||
|
"hvcNAQELBQADgYEAWdIIi4cGPod5O/V7K0QSTXZRLRIKFQ7qhn5XTNlMUnFnwp7c\n" +
|
||||||
|
"8O8EsOiCKAZeVvgRnurFkxAlVnpxmdktZ9j+mv2mrMGKJxYkZcBkFh++DRixpY8N\n" +
|
||||||
|
"zBLbxZJ9kcOHWWDA602FMbNIEL1OiHrfggsPk3sckSaSg4d7UoP9T6+uqq8=\n" +
|
||||||
|
"-----END CERTIFICATE-----";
|
||||||
|
// @formatter:on
|
||||||
|
|
||||||
private static final String MALFORMED_X509_KEY = "malformed";
|
private static final String MALFORMED_X509_KEY = "malformed";
|
||||||
|
|
||||||
private final Converter<InputStream, RSAPublicKey> x509 = RsaKeyConverters.x509();
|
private final Converter<InputStream, RSAPublicKey> x509 = RsaKeyConverters.x509();
|
||||||
|
@ -112,11 +126,17 @@ public class RsaKeyConvertersTests {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void x509WhenConverteringX509PublicKeyThenOk() {
|
public void x509WhenConvertingX509PublicKeyThenOk() {
|
||||||
RSAPublicKey key = this.x509.convert(toInputStream(X509_PUBLIC_KEY));
|
RSAPublicKey key = this.x509.convert(toInputStream(X509_PUBLIC_KEY));
|
||||||
Assertions.assertThat(key.getModulus().bitLength()).isEqualTo(1024);
|
Assertions.assertThat(key.getModulus().bitLength()).isEqualTo(1024);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void x509WhenConvertingX509CertificateThenOk() {
|
||||||
|
RSAPublicKey key = this.x509.convert(toInputStream(X509_CERTIFICATE));
|
||||||
|
Assertions.assertThat(key.getModulus().bitLength()).isEqualTo(1024);
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void x509WhenConvertingDerEncodedX509PublicKeyThenIllegalArgumentException() {
|
public void x509WhenConvertingDerEncodedX509PublicKeyThenIllegalArgumentException() {
|
||||||
assertThatIllegalArgumentException().isThrownBy(() -> this.x509.convert(toInputStream(MALFORMED_X509_KEY)));
|
assertThatIllegalArgumentException().isThrownBy(() -> this.x509.convert(toInputStream(MALFORMED_X509_KEY)));
|
||||||
|
|
Loading…
Reference in New Issue