]> WPIA git - gigi.git/blob - src/org/cacert/gigi/Launcher.java
Added --port parameter
[gigi.git] / src / org / cacert / gigi / Launcher.java
1 package org.cacert.gigi;
2 import java.io.FileInputStream;
3 import java.io.FileNotFoundException;
4 import java.io.IOException;
5 import java.security.KeyStore;
6 import java.security.KeyStoreException;
7 import java.security.NoSuchAlgorithmException;
8 import java.security.cert.CertificateException;
9
10 import javax.net.ssl.SSLEngine;
11 import javax.net.ssl.SSLParameters;
12 import javax.net.ssl.TrustManager;
13 import javax.net.ssl.TrustManagerFactory;
14
15 import org.cacert.gigi.natives.SetUID;
16 import org.cacert.gigi.util.CipherInfo;
17 import org.eclipse.jetty.server.Connector;
18 import org.eclipse.jetty.server.Handler;
19 import org.eclipse.jetty.server.HttpConfiguration;
20 import org.eclipse.jetty.server.HttpConnectionFactory;
21 import org.eclipse.jetty.server.SecureRequestCustomizer;
22 import org.eclipse.jetty.server.Server;
23 import org.eclipse.jetty.server.ServerConnector;
24 import org.eclipse.jetty.server.SessionManager;
25 import org.eclipse.jetty.server.SslConnectionFactory;
26 import org.eclipse.jetty.server.handler.ContextHandler;
27 import org.eclipse.jetty.server.handler.HandlerList;
28 import org.eclipse.jetty.server.handler.ResourceHandler;
29 import org.eclipse.jetty.servlet.ServletContextHandler;
30 import org.eclipse.jetty.servlet.ServletHolder;
31 import org.eclipse.jetty.util.log.Log;
32 import org.eclipse.jetty.util.ssl.SslContextFactory;
33
34 public class Launcher {
35         public static void main(String[] args) throws Exception {
36                 int port = 443;
37                 for (int i = 0; i < args.length; i++) {
38                         if (args[i].equals("--port")) {
39                                 port = Integer.parseInt(args[i + 1]);
40                         }
41                         i++;
42                 }
43                 Server s = new Server();
44                 // === SSL HTTP Configuration ===
45                 HttpConfiguration https_config = new HttpConfiguration();
46                 https_config.setSendServerVersion(false);
47                 https_config.setSendXPoweredBy(false);
48
49                 // for client-cert auth
50                 https_config.addCustomizer(new SecureRequestCustomizer());
51
52                 ServerConnector connector = new ServerConnector(s,
53                                 new SslConnectionFactory(generateSSLContextFactory(),
54                                                 "http/1.1"), new HttpConnectionFactory(https_config));
55                 connector.setHost("127.0.0.1");
56                 connector.setPort(port);
57                 s.setConnectors(new Connector[]{connector});
58
59                 HandlerList hl = new HandlerList();
60                 hl.setHandlers(new Handler[]{generateStaticContext(),
61                                 generateGigiContext()});
62                 s.setHandler(hl);
63                 s.start();
64                 if (connector.getPort() <= 1024
65                                 && !System.getProperty("os.name").toLowerCase().contains("win")) {
66                         SetUID uid = new SetUID();
67                         if (!uid.setUid(-2, -2).getSuccess()) {
68                                 Log.getLogger(Launcher.class).warn("Couldn't set uid!");
69                         }
70                 }
71         }
72
73         private static ServletContextHandler generateGigiContext() {
74                 ServletContextHandler servlet = new ServletContextHandler(
75                                 ServletContextHandler.SESSIONS);
76                 servlet.setInitParameter(SessionManager.__SessionCookieProperty,
77                                 "CACert-Session");
78                 servlet.addServlet(new ServletHolder(new Gigi()), "/*");
79                 return servlet;
80         }
81
82         private static ContextHandler generateStaticContext() {
83                 ResourceHandler rh = new ResourceHandler();
84                 rh.setResourceBase("static");
85                 ContextHandler ch = new ContextHandler();
86                 ch.setHandler(rh);
87                 ch.setContextPath("/static");
88                 return ch;
89         }
90
91         private static SslContextFactory generateSSLContextFactory()
92                         throws NoSuchAlgorithmException, KeyStoreException, IOException,
93                         CertificateException, FileNotFoundException {
94                 TrustManagerFactory tmFactory = TrustManagerFactory.getInstance("PKIX");
95                 tmFactory.init((KeyStore) null);
96
97                 final TrustManager[] tm = tmFactory.getTrustManagers();
98
99                 SslContextFactory scf = new SslContextFactory() {
100
101                         String[] ciphers = null;
102
103                         @Override
104                         public void customize(SSLEngine sslEngine) {
105                                 super.customize(sslEngine);
106
107                                 SSLParameters ssl = sslEngine.getSSLParameters();
108                                 ssl.setUseCipherSuitesOrder(true);
109                                 if (ciphers == null) {
110                                         ciphers = CipherInfo.filter(sslEngine
111                                                         .getSupportedCipherSuites());
112                                 }
113
114                                 ssl.setCipherSuites(ciphers);
115                                 sslEngine.setSSLParameters(ssl);
116
117                         }
118
119                 };
120                 scf.setRenegotiationAllowed(false);
121                 scf.setWantClientAuth(true);
122                 KeyStore ks1 = KeyStore.getInstance("pkcs12");
123                 ks1.load(new FileInputStream("config/keystore.pkcs12"),
124                                 "".toCharArray());
125                 scf.setTrustStorePath("config/cacerts.jks");
126                 scf.setTrustStorePassword("changeit");
127                 scf.setProtocol("TLS");
128                 scf.setKeyStore(ks1);
129                 return scf;
130         }
131 }