| | |
| | | String path = argParser.useJavaKeyStoreArg.getValue(); |
| | | checkCertificateInKeystore(SecurityOptions.CertificateType.JKS, path, pwd, |
| | | certNickname, errorMessages, keystoreAliases); |
| | | if ((certNickname == null) && !keystoreAliases.isEmpty()) |
| | | { |
| | | certNickname = keystoreAliases.getFirst(); |
| | | } |
| | | securityOptions = SecurityOptions.createJKSCertificateOptions( |
| | | path, pwd, enableSSL, enableStartTLS, ldapsPort, certNickname); |
| | | } |
| | | else if (argParser.useJCEKSArg.isPresent()) |
| | | { |
| | | String path = argParser.useJCEKSArg.getValue(); |
| | | checkCertificateInKeystore(SecurityOptions.CertificateType.JCEKS, path, |
| | | pwd, certNickname, errorMessages, keystoreAliases); |
| | | if ((certNickname == null) && !keystoreAliases.isEmpty()) |
| | | { |
| | | certNickname = keystoreAliases.getFirst(); |
| | | } |
| | | securityOptions = SecurityOptions.createJCEKSCertificateOptions( |
| | | path, pwd, enableSSL, enableStartTLS, ldapsPort, certNickname); |
| | | } |
| | | else if (argParser.usePkcs12Arg.isPresent()) |
| | | { |
| | | String path = argParser.usePkcs12Arg.getValue(); |
| | | checkCertificateInKeystore(SecurityOptions.CertificateType.PKCS12, path, |
| | | pwd, certNickname, errorMessages, keystoreAliases); |
| | | if ((certNickname == null) && !keystoreAliases.isEmpty()) |
| | | { |
| | | certNickname = keystoreAliases.getFirst(); |
| | | } |
| | | securityOptions = SecurityOptions.createPKCS12CertificateOptions( |
| | | path, pwd, enableSSL, enableStartTLS, ldapsPort, certNickname); |
| | | } |
| | |
| | | { |
| | | checkCertificateInKeystore(SecurityOptions.CertificateType.PKCS11, null, |
| | | pwd, certNickname, errorMessages, keystoreAliases); |
| | | if ((certNickname == null) && !keystoreAliases.isEmpty()) |
| | | { |
| | | certNickname = keystoreAliases.getFirst(); |
| | | } |
| | | securityOptions = SecurityOptions.createPKCS11CertificateOptions( |
| | | pwd, enableSSL, enableStartTLS, ldapsPort, certNickname); |
| | | } |
| | |
| | | createSecurityOptionsPrompting(SecurityOptions.CertificateType.JKS, |
| | | enableSSL, enableStartTLS, ldapsPort); |
| | | } |
| | | else if (argParser.useJCEKSArg.isPresent()) |
| | | { |
| | | securityOptions = |
| | | createSecurityOptionsPrompting(SecurityOptions.CertificateType.JCEKS, |
| | | enableSSL, enableStartTLS, ldapsPort); |
| | | } |
| | | else if (argParser.usePkcs12Arg.isPresent()) |
| | | { |
| | | securityOptions = |
| | |
| | | { |
| | | final int SELF_SIGNED = 1; |
| | | final int JKS = 2; |
| | | final int PKCS12 = 3; |
| | | final int PKCS11 = 4; |
| | | int[] indexes = {SELF_SIGNED, JKS, PKCS12, PKCS11}; |
| | | final int JCEKS = 3; |
| | | final int PKCS12 = 4; |
| | | final int PKCS11 = 5; |
| | | int[] indexes = {SELF_SIGNED, JKS, JCEKS, PKCS12, PKCS11}; |
| | | Message[] msgs = { |
| | | INFO_INSTALLDS_CERT_OPTION_SELF_SIGNED.get(), |
| | | INFO_INSTALLDS_CERT_OPTION_JKS.get(), |
| | | INFO_INSTALLDS_CERT_OPTION_JCEKS.get(), |
| | | INFO_INSTALLDS_CERT_OPTION_PKCS12.get(), |
| | | INFO_INSTALLDS_CERT_OPTION_PKCS11.get() |
| | | }; |
| | |
| | | builder.setDefault(Message.raw(String.valueOf(JKS)), |
| | | MenuResult.success(JKS)); |
| | | break; |
| | | case JCEKS: |
| | | builder.setDefault(Message.raw(String.valueOf(JCEKS)), |
| | | MenuResult.success(JCEKS)); |
| | | break; |
| | | case PKCS11: |
| | | builder.setDefault(Message.raw(String.valueOf(PKCS11)), |
| | | MenuResult.success(PKCS11)); |
| | |
| | | createSecurityOptionsPrompting(SecurityOptions.CertificateType.JKS, |
| | | enableSSL, enableStartTLS, ldapsPort); |
| | | } |
| | | else if (certType == JCEKS) |
| | | { |
| | | securityOptions = |
| | | createSecurityOptionsPrompting( |
| | | SecurityOptions.CertificateType.JCEKS, |
| | | enableSSL, enableStartTLS, ldapsPort); |
| | | } |
| | | else if (certType == PKCS12) |
| | | { |
| | | securityOptions = |
| | |
| | | pwd); |
| | | break; |
| | | |
| | | case JCEKS: |
| | | certManager = new CertificateManager( |
| | | path, |
| | | CertificateManager.KEY_STORE_TYPE_JCEKS, |
| | | pwd); |
| | | break; |
| | | |
| | | case PKCS12: |
| | | certManager = new CertificateManager( |
| | | path, |
| | |
| | | switch (type) |
| | | { |
| | | case JKS: |
| | | errorMessages.add(INFO_PKCS11_KEYSTORE_DOES_NOT_EXIST.get()); |
| | | break; |
| | | |
| | | case PKCS12: |
| | | errorMessages.add(INFO_JKS_KEYSTORE_DOES_NOT_EXIST.get()); |
| | | break; |
| | | case PKCS11: |
| | | case JCEKS: |
| | | errorMessages.add(INFO_JCEKS_KEYSTORE_DOES_NOT_EXIST.get()); |
| | | break; |
| | | case PKCS12: |
| | | errorMessages.add(INFO_PKCS12_KEYSTORE_DOES_NOT_EXIST.get()); |
| | | break; |
| | | case PKCS11: |
| | | errorMessages.add(INFO_PKCS11_KEYSTORE_DOES_NOT_EXIST.get()); |
| | | break; |
| | | default: |
| | | throw new IllegalArgumentException("Invalid type: "+type); |
| | | } |
| | |
| | | case JKS: |
| | | errorMessages.add(INFO_ERROR_ACCESSING_JKS_KEYSTORE.get()); |
| | | break; |
| | | |
| | | case JCEKS: |
| | | errorMessages.add(INFO_ERROR_ACCESSING_JCEKS_KEYSTORE.get()); |
| | | break; |
| | | case PKCS12: |
| | | errorMessages.add(INFO_ERROR_ACCESSING_PKCS12_KEYSTORE.get()); |
| | | break; |
| | |
| | | defaultPathValue = lastResetKeyStorePath; |
| | | } |
| | | break; |
| | | case JCEKS: |
| | | path = argParser.useJCEKSArg.getValue(); |
| | | pathPrompt = INFO_INSTALLDS_PROMPT_JCEKS_PATH.get(); |
| | | defaultPathValue = argParser.useJCEKSArg.getValue(); |
| | | if (defaultPathValue == null) |
| | | { |
| | | defaultPathValue = lastResetKeyStorePath; |
| | | } |
| | | break; |
| | | case PKCS11: |
| | | path = null; |
| | | defaultPathValue = null; |
| | |
| | | securityOptions = SecurityOptions.createJKSCertificateOptions( |
| | | path, pwd, enableSSL, enableStartTLS, ldapsPort, certNickname); |
| | | break; |
| | | case JCEKS: |
| | | securityOptions = SecurityOptions.createJCEKSCertificateOptions( |
| | | path, pwd, enableSSL, enableStartTLS, ldapsPort, certNickname); |
| | | break; |
| | | case PKCS12: |
| | | securityOptions = SecurityOptions.createPKCS12CertificateOptions( |
| | | path, pwd, enableSSL, enableStartTLS, ldapsPort, certNickname); |
| | |
| | | if (msg.getDescriptor().equals(INFO_KEYSTORE_PATH_DOES_NOT_EXIST) || |
| | | msg.getDescriptor().equals(INFO_KEYSTORE_PATH_NOT_A_FILE) || |
| | | msg.getDescriptor().equals(INFO_JKS_KEYSTORE_DOES_NOT_EXIST) || |
| | | msg.getDescriptor().equals(INFO_JCEKS_KEYSTORE_DOES_NOT_EXIST) || |
| | | msg.getDescriptor().equals(INFO_PKCS12_KEYSTORE_DOES_NOT_EXIST) || |
| | | msg.getDescriptor().equals(INFO_PKCS11_KEYSTORE_DOES_NOT_EXIST) || |
| | | msg.getDescriptor().equals(INFO_ERROR_ACCESSING_JKS_KEYSTORE) || |
| | | msg.getDescriptor().equals(INFO_ERROR_ACCESSING_JCEKS_KEYSTORE) || |
| | | msg.getDescriptor().equals(INFO_ERROR_ACCESSING_PKCS12_KEYSTORE) || |
| | | msg.getDescriptor().equals(INFO_ERROR_ACCESSING_PKCS11_KEYSTORE)) |
| | | { |
| | |
| | | for (Message msg : msgs) |
| | | { |
| | | if (msg.getDescriptor().equals(INFO_JKS_KEYSTORE_DOES_NOT_EXIST) || |
| | | msg.getDescriptor().equals(INFO_JCEKS_KEYSTORE_DOES_NOT_EXIST) || |
| | | msg.getDescriptor().equals(INFO_PKCS12_KEYSTORE_DOES_NOT_EXIST) || |
| | | msg.getDescriptor().equals(INFO_PKCS11_KEYSTORE_DOES_NOT_EXIST) || |
| | | msg.getDescriptor().equals(INFO_ERROR_ACCESSING_JKS_KEYSTORE) || |
| | | msg.getDescriptor().equals(INFO_ERROR_ACCESSING_JCEKS_KEYSTORE) || |
| | | msg.getDescriptor().equals(INFO_ERROR_ACCESSING_PKCS12_KEYSTORE) || |
| | | msg.getDescriptor().equals(INFO_ERROR_ACCESSING_PKCS11_KEYSTORE) || |
| | | msg.getDescriptor().equals(INFO_ERROR_NO_KEYSTORE_PASSWORD) || |
| | |
| | | lastResetEnableStartTLS = sec.getEnableStartTLS(); |
| | | lastResetCertType = sec.getCertificateType(); |
| | | if (lastResetCertType == SecurityOptions.CertificateType.JKS || |
| | | lastResetCertType == SecurityOptions.CertificateType.PKCS11) |
| | | lastResetCertType == SecurityOptions.CertificateType.JCEKS || |
| | | lastResetCertType == SecurityOptions.CertificateType.PKCS12) |
| | | { |
| | | lastResetKeyStorePath = sec.getKeystorePath(); |
| | | } |