From 5b60db394cbbbb031b615ff3278ec43cbe3fe88c Mon Sep 17 00:00:00 2001
From: James Moger <james.moger@gitblit.com>
Date: Thu, 05 May 2011 18:40:39 -0400
Subject: [PATCH] Automatically generate a self-signed certificate with BouncyCastle.

---
 src/com/gitblit/GitBlitServer.java |   81 ++++++++++++++++++++++++++++++++++++----
 1 files changed, 73 insertions(+), 8 deletions(-)

diff --git a/src/com/gitblit/GitBlitServer.java b/src/com/gitblit/GitBlitServer.java
index 9a9f63e..b5acd3d 100644
--- a/src/com/gitblit/GitBlitServer.java
+++ b/src/com/gitblit/GitBlitServer.java
@@ -2,23 +2,40 @@
 
 import java.io.BufferedReader;
 import java.io.File;
+import java.io.FileInputStream;
+import java.io.FileOutputStream;
 import java.io.IOException;
 import java.io.InputStreamReader;
 import java.io.OutputStream;
+import java.math.BigInteger;
 import java.net.InetAddress;
 import java.net.ServerSocket;
 import java.net.Socket;
 import java.net.URL;
 import java.net.UnknownHostException;
+import java.security.KeyPair;
+import java.security.KeyPairGenerator;
+import java.security.KeyStore;
 import java.security.ProtectionDomain;
+import java.security.SecureRandom;
+import java.security.Security;
+import java.security.cert.X509Certificate;
 import java.text.MessageFormat;
 import java.util.ArrayList;
+import java.util.Date;
 import java.util.List;
 
 import org.apache.log4j.ConsoleAppender;
 import org.apache.log4j.PatternLayout;
 import org.apache.wicket.protocol.http.ContextParamWebApplicationFactory;
 import org.apache.wicket.protocol.http.WicketFilter;
+import org.bouncycastle.asn1.x500.X500NameBuilder;
+import org.bouncycastle.asn1.x500.style.BCStyle;
+import org.bouncycastle.cert.X509v3CertificateBuilder;
+import org.bouncycastle.cert.jcajce.JcaX509CertificateConverter;
+import org.bouncycastle.cert.jcajce.JcaX509v3CertificateBuilder;
+import org.bouncycastle.operator.ContentSigner;
+import org.bouncycastle.operator.jcajce.JcaContentSignerBuilder;
 import org.eclipse.jetty.http.security.Constraint;
 import org.eclipse.jetty.security.ConstraintMapping;
 import org.eclipse.jetty.security.ConstraintSecurityHandler;
@@ -144,23 +161,28 @@
 			Connector httpConnector = createConnector(params.useNIO, params.port);
 			String bindInterface = fileSettings.getString(Keys.server.httpBindInterface, null);
 			if (!StringUtils.isEmpty(bindInterface)) {
-				logger.warn(MessageFormat.format("Binding port {0} to {1}", params.port, bindInterface));
+				logger.warn(MessageFormat.format("Binding connector on port {0} to {1}", params.port, bindInterface));
 				httpConnector.setHost(bindInterface);
 			}
 			connectors.add(httpConnector);
 		}
 
 		if (params.securePort > 0) {
-			if (new File("keystore").exists()) {
-				Connector secureConnector = createSSLConnector(params.useNIO, params.securePort, params.storePassword);
+			File keystore = new File("keystore");
+			if (!keystore.exists()) {
+				logger.info("Generating self-signed ssl certificate");
+				generateSelfSignedCertificate("localhost", keystore, params.storePassword);
+			}
+			if (keystore.exists()) {
+				Connector secureConnector = createSSLConnector(keystore, params.storePassword, params.useNIO, params.securePort);
 				String bindInterface = fileSettings.getString(Keys.server.httpsBindInterface, null);
 				if (!StringUtils.isEmpty(bindInterface)) {
-					logger.warn(MessageFormat.format("Binding port {0} to {1}", params.port, bindInterface));
+					logger.warn(MessageFormat.format("Binding ssl connector on port {0} to {1}", params.securePort, bindInterface));
 					secureConnector.setHost(bindInterface);
 				}
 				connectors.add(secureConnector);
 			} else {
-				logger.warn("Failed to find Keystore?  Did you run \"makekeystore\"?");
+				logger.warn("Failed to find or load Keystore?");
 				logger.warn("SSL connector DISABLED.");
 			}
 		}
@@ -296,25 +318,68 @@
 		return connector;
 	}
 
-	private static Connector createSSLConnector(boolean useNIO, int port, String password) {
+	private static Connector createSSLConnector(File keystore, String password, boolean useNIO, int port) {
 		SslConnector connector;
 		if (useNIO) {
 			logger.info("Setting up NIO SslSelectChannelConnector on port " + port);
 			SslSelectChannelConnector ssl = new SslSelectChannelConnector();
 			ssl.setSoLingerTime(-1);
-			ssl.setThreadPool(new QueuedThreadPool(20));
+			ssl.setThreadPool(new QueuedThreadPool(20));			
 			connector = ssl;
 		} else {
 			logger.info("Setting up NIO SslSocketConnector on port " + port);
 			SslSocketConnector ssl = new SslSocketConnector();
 			connector = ssl;
 		}
-		connector.setKeystore("keystore");
+		connector.setAllowRenegotiate(true);
+		connector.setKeystore(keystore.getAbsolutePath());
 		connector.setPassword(password);
 		connector.setPort(port);
 		connector.setMaxIdleTime(30000);
 		return connector;
 	}
+	
+	private static void generateSelfSignedCertificate(String hostname, File keystore, String keystorePassword) {
+		try {
+			Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider());
+
+			final String BC = org.bouncycastle.jce.provider.BouncyCastleProvider.PROVIDER_NAME;
+			
+			KeyPairGenerator kpGen = KeyPairGenerator.getInstance("RSA", "BC");
+			kpGen.initialize(1024, new SecureRandom());
+			KeyPair pair = kpGen.generateKeyPair();
+
+			// Generate self-signed certificate
+			X500NameBuilder builder = new X500NameBuilder(BCStyle.INSTANCE);
+			builder.addRDN(BCStyle.OU, Constants.NAME);
+			builder.addRDN(BCStyle.O, Constants.NAME);
+			builder.addRDN(BCStyle.CN, hostname);
+
+			Date notBefore = new Date(System.currentTimeMillis() - 1*24*60*60*1000l);
+			Date notAfter = new Date(System.currentTimeMillis() + 10*365*24*60*60*1000l);
+			BigInteger serial = BigInteger.valueOf(System.currentTimeMillis());
+
+			X509v3CertificateBuilder certGen = new JcaX509v3CertificateBuilder(builder.build(), serial, notBefore, notAfter, builder.build(), pair.getPublic());
+			ContentSigner sigGen = new JcaContentSignerBuilder("SHA256WithRSAEncryption").setProvider(BC).build(pair.getPrivate());
+			X509Certificate cert = new JcaX509CertificateConverter().setProvider(BC).getCertificate(certGen.build(sigGen));
+			cert.checkValidity(new Date());
+			cert.verify(cert.getPublicKey());
+
+			// Save to keystore			
+			KeyStore store = KeyStore.getInstance("JKS");
+			if (keystore.exists()) {
+				FileInputStream fis = new FileInputStream(keystore);
+				store.load(fis, keystorePassword.toCharArray());
+			} else {
+				store.load(null);
+			}
+			store.setKeyEntry(hostname, pair.getPrivate(), keystorePassword.toCharArray(), new java.security.cert.Certificate[] { cert });
+			store.store(new FileOutputStream(keystore), keystorePassword.toCharArray());
+		} catch (Throwable t) {
+			t.printStackTrace();
+			throw new RuntimeException("Failed to generate self-signed certificate!", t);
+		}
+	}
 
 	/**
 	 * Recursively delete a folder and its contents.

--
Gitblit v1.9.1