Apache CXF JaxWsProxyFactoryBean SSL 配置调用外部 https 失败

问题描述

我部署了一个 spring 微服务 docker。 我使用 JaxWsProxyfactorybean 调用外部服务器 (soap/wsdl),使用 http://externalServer 一切顺利:

JaxWsProxyfactorybean jaxWsProxyfactorybean = new JaxWsProxyfactorybean();
jaxWsProxyfactorybean.setAddress("http://externalServer");
...

当我在 setAddress 中调用 https 时会出现问题。

我使用 keytool 在密钥库中注册了被调用服务器的密钥/证书,并保存到 /root/.keystore(标准),从 pfx 导入它。 当我尝试调用 https 时,出现此错误

org.apache.cxf.transport.https.SSLUtils  : Default key managers cannot be initialized: Password must not be null

好的,我忘记密码了。但是把这个有害的密码放在哪里呢?在application.yml?在系统属性中? [keystore中使用的密码是标准的(changeit)]

已编辑

这里是日志的快照:

DEBUG 1 --- [  XNIO-1 task-1] org.apache.cxf.transport.https.SSLUtils  : The location of the key store has not been set via a system parameter or through configuration so the default value of /root/.keystore will be used.
DEBUG 1 --- [  XNIO-1 task-1] org.apache.cxf.transport.https.SSLUtils  : The key store password has not been set via a system property or through configuration,reading data from the keystore will fail.
DEBUG 1 --- [  XNIO-1 task-1] org.apache.cxf.transport.https.SSLUtils  : The key password has not been set via a system property or through configuration,reading data from the keystore will fail.
DEBUG 1 --- [  XNIO-1 task-1] org.apache.cxf.transport.https.SSLUtils  : The keystore type has not been set in configuration so the default value of JKS will be used.
WARN 1 --- [  XNIO-1 task-1] org.apache.cxf.transport.https.SSLUtils  : Default key managers cannot be initialized: Password must not be null

使用标准密钥库,但没有密码

解决方法

从您的问题的评论部分下查看我们的对话,我可以得出结论,您的 Apache CXF 没有配置 ssl。您需要做的是读取包含受信任证书的密钥库,并使用 TrustManagerFactory 和 TrustManager 将其加载到您的 SSLContext 中。

以下是您可以尝试的示例配置:

import org.apache.cxf.bus.CXFBusFactory;
import org.apache.cxf.configuration.jsse.TLSClientParameters;
import org.apache.cxf.jaxrs.client.JAXRSClientFactoryBean;
import org.apache.cxf.jaxrs.client.WebClient;
import org.apache.cxf.transport.http.HTTPConduitConfigurer;

import javax.net.ssl.KeyManager;
import javax.net.ssl.KeyManagerFactory;
import javax.net.ssl.SSLContext;
import javax.net.ssl.TrustManager;
import javax.net.ssl.TrustManagerFactory;
import java.security.KeyStore;

public class App {

    public static void main(String[] args) throws Exception {
        InputStream identityAsInputStream = Files.newInputStream(Paths.get("/path/to/your/identity.jks"));
        KeyStore identity = KeyStore.getInstance(KeyStore.getDefaultType());
        identity.load(identityAsInputStream,"keystore-password".toCharArray());

        KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm());
        keyManagerFactory.init(identity,"key-password".toCharArray());
        KeyManager[] keyManagers = keyManagerFactory.getKeyManagers();

        InputStream trustStoreInputStream = Files.newInputStream(Paths.get("/path/to/your/truststore.jks"));
        KeyStore trustStore = KeyStore.getInstance(KeyStore.getDefaultType());
        trustStore.load(trustStoreInputStream,"truststore-password".toCharArray());

        TrustManagerFactory trustManagerFactory = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
        trustManagerFactory.init(trustStore);
        TrustManager[] trustManagers = trustManagerFactory.getTrustManagers();

        SSLContext sslContext = SSLContext.getInstance("TLS");
        sslContext.init(keyManagers,trustManagers,null);

        JaxWsProxyFactoryBean factory = new JaxWsProxyFactoryBean();
        factory.setAddress("https://some-secure-server.com/");

        factory.setBus(new CXFBusFactory().createBus());
        factory.getBus().setExtension((name,address,httpConduit) -> {
            TLSClientParameters tls = new TLSClientParameters();
            tls.setSSLSocketFactory(sslContext.getSocketFactory());
            httpConduit.setTlsClientParameters(tls);
        },HTTPConduitConfigurer.class);

        WebClient webClient = factory.createWebClient();
    }
}

我这里还有一个基于 ssl 的单向和双向身份验证的 cxf 客户端的工作示例:GitHub - Example Apache CXF client ssl configuration