James Moger
2011-05-23 a4d2498b7f94012cfdf481fcf151f8cfd7537a42
src/com/gitblit/GitBlitServer.java
@@ -2,40 +2,23 @@
import java.io.BufferedReader;
import java.io.File;
import java.io.FileInputStream;
import java.io.FileOutputStream;
import java.io.IOException;
import java.io.InputStreamReader;
import java.io.OutputStream;
import java.math.BigInteger;
import java.net.InetAddress;
import java.net.ServerSocket;
import java.net.Socket;
import java.net.URL;
import java.net.UnknownHostException;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.KeyStore;
import java.security.ProtectionDomain;
import java.security.SecureRandom;
import java.security.Security;
import java.security.cert.X509Certificate;
import java.text.MessageFormat;
import java.util.ArrayList;
import java.util.Date;
import java.util.List;
import org.apache.log4j.ConsoleAppender;
import org.apache.log4j.PatternLayout;
import org.apache.wicket.protocol.http.ContextParamWebApplicationFactory;
import org.apache.wicket.protocol.http.WicketFilter;
import org.bouncycastle.asn1.x500.X500NameBuilder;
import org.bouncycastle.asn1.x500.style.BCStyle;
import org.bouncycastle.cert.X509v3CertificateBuilder;
import org.bouncycastle.cert.jcajce.JcaX509CertificateConverter;
import org.bouncycastle.cert.jcajce.JcaX509v3CertificateBuilder;
import org.bouncycastle.operator.ContentSigner;
import org.bouncycastle.operator.jcajce.JcaContentSignerBuilder;
import org.eclipse.jetty.http.security.Constraint;
import org.eclipse.jetty.security.ConstraintMapping;
import org.eclipse.jetty.security.ConstraintSecurityHandler;
@@ -46,6 +29,7 @@
import org.eclipse.jetty.server.Server;
import org.eclipse.jetty.server.bio.SocketConnector;
import org.eclipse.jetty.server.nio.SelectChannelConnector;
import org.eclipse.jetty.server.session.HashSessionManager;
import org.eclipse.jetty.server.ssl.SslConnector;
import org.eclipse.jetty.server.ssl.SslSelectChannelConnector;
import org.eclipse.jetty.server.ssl.SslSocketConnector;
@@ -170,7 +154,7 @@
         File keystore = new File("keystore");
         if (!keystore.exists()) {
            logger.info("Generating self-signed SSL certificate");
            generateSelfSignedCertificate("localhost", keystore, params.storePassword);
            MakeCertificate.generateSelfSignedCertificate("localhost", keystore, params.storePassword);
         }
         if (keystore.exists()) {
            Connector secureConnector = createSSLConnector(keystore, params.storePassword, params.useNIO, params.securePort);
@@ -209,6 +193,16 @@
      rootContext.setServer(server);
      rootContext.setWar(location.toExternalForm());
      rootContext.setTempDirectory(tempDir);
      // Mark all cookies HttpOnly so they are not accessible to JavaScript
      // engines.
      // http://erlend.oftedal.no/blog/?blogid=33
      // https://www.owasp.org/index.php/HttpOnly#Browsers_Supporting_HttpOnly
      HashSessionManager sessionManager = new HashSessionManager();
      sessionManager.setHttpOnly(true);
      // Use secure cookies if only serving https
      sessionManager.setSecureCookies(params.port <= 0 && params.securePort > 0);
      rootContext.getSessionHandler().setSessionManager(sessionManager);
      // Wicket Filter
      String wicketPathSpec = "/*";
@@ -336,48 +330,6 @@
      return connector;
   }
   
   private static void generateSelfSignedCertificate(String hostname, File keystore, String keystorePassword) {
      try {
         Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider());
         final String BC = org.bouncycastle.jce.provider.BouncyCastleProvider.PROVIDER_NAME;
         KeyPairGenerator kpGen = KeyPairGenerator.getInstance("RSA", "BC");
         kpGen.initialize(1024, new SecureRandom());
         KeyPair pair = kpGen.generateKeyPair();
         // Generate self-signed certificate
         X500NameBuilder builder = new X500NameBuilder(BCStyle.INSTANCE);
         builder.addRDN(BCStyle.OU, Constants.NAME);
         builder.addRDN(BCStyle.O, Constants.NAME);
         builder.addRDN(BCStyle.CN, hostname);
         Date notBefore = new Date(System.currentTimeMillis() - 1*24*60*60*1000l);
         Date notAfter = new Date(System.currentTimeMillis() + 10*365*24*60*60*1000l);
         BigInteger serial = BigInteger.valueOf(System.currentTimeMillis());
         X509v3CertificateBuilder certGen = new JcaX509v3CertificateBuilder(builder.build(), serial, notBefore, notAfter, builder.build(), pair.getPublic());
         ContentSigner sigGen = new JcaContentSignerBuilder("SHA256WithRSAEncryption").setProvider(BC).build(pair.getPrivate());
         X509Certificate cert = new JcaX509CertificateConverter().setProvider(BC).getCertificate(certGen.build(sigGen));
         cert.checkValidity(new Date());
         cert.verify(cert.getPublicKey());
         // Save to keystore
         KeyStore store = KeyStore.getInstance("JKS");
         if (keystore.exists()) {
            FileInputStream fis = new FileInputStream(keystore);
            store.load(fis, keystorePassword.toCharArray());
         } else {
            store.load(null);
         }
         store.setKeyEntry(hostname, pair.getPrivate(), keystorePassword.toCharArray(), new java.security.cert.Certificate[] { cert });
         store.store(new FileOutputStream(keystore), keystorePassword.toCharArray());
      } catch (Throwable t) {
         t.printStackTrace();
         throw new RuntimeException("Failed to generate self-signed certificate!", t);
      }
   }
   /**
    * Recursively delete a folder and its contents.
    * 
@@ -458,7 +410,7 @@
       * Authentication Parameters
       */
      @Parameter(names = { "--realmFile" }, description = "Users Realm Hash File")
      public String realmFile = fileSettings.getString(Keys.server.realmFile, "users.properties");
      public String realmFile = fileSettings.getString(Keys.realm.realmFile, "users.properties");
      /*
       * JETTY Parameters