2020-06-22 17:02:36 +00:00
|
|
|
/*
|
|
|
|
Mangadex@Home
|
|
|
|
Copyright (c) 2020, MangaDex Network
|
|
|
|
This file is part of MangaDex@Home.
|
|
|
|
|
|
|
|
MangaDex@Home is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
MangaDex@Home is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this MangaDex@Home. If not, see <http://www.gnu.org/licenses/>.
|
2021-01-25 02:25:49 +00:00
|
|
|
*/
|
2021-01-24 04:55:11 +00:00
|
|
|
package mdnet.netty
|
2020-06-06 22:52:25 +00:00
|
|
|
|
|
|
|
import io.netty.bootstrap.ServerBootstrap
|
2021-07-19 16:38:09 +00:00
|
|
|
import io.netty.buffer.ByteBuf
|
2020-06-30 19:06:12 +00:00
|
|
|
import io.netty.channel.*
|
2021-01-24 18:05:05 +00:00
|
|
|
import io.netty.channel.epoll.Epoll
|
|
|
|
import io.netty.channel.epoll.EpollEventLoopGroup
|
|
|
|
import io.netty.channel.epoll.EpollServerSocketChannel
|
2020-06-06 22:52:25 +00:00
|
|
|
import io.netty.channel.nio.NioEventLoopGroup
|
|
|
|
import io.netty.channel.socket.SocketChannel
|
|
|
|
import io.netty.channel.socket.nio.NioServerSocketChannel
|
2020-06-08 22:10:22 +00:00
|
|
|
import io.netty.handler.codec.DecoderException
|
2021-07-19 16:38:09 +00:00
|
|
|
import io.netty.handler.codec.ProtocolDetectionResult
|
|
|
|
import io.netty.handler.codec.ProtocolDetectionState
|
|
|
|
import io.netty.handler.codec.haproxy.HAProxyMessage
|
|
|
|
import io.netty.handler.codec.haproxy.HAProxyMessageDecoder
|
|
|
|
import io.netty.handler.codec.haproxy.HAProxyProtocolVersion
|
|
|
|
import io.netty.handler.codec.http.FullHttpRequest
|
2021-01-26 16:15:50 +00:00
|
|
|
import io.netty.handler.codec.http.HttpObjectAggregator
|
|
|
|
import io.netty.handler.codec.http.HttpServerCodec
|
|
|
|
import io.netty.handler.codec.http.HttpServerKeepAliveHandler
|
2021-05-28 19:06:55 +00:00
|
|
|
import io.netty.handler.ssl.SniCompletionEvent
|
|
|
|
import io.netty.handler.ssl.SniHandler
|
2020-06-06 22:52:25 +00:00
|
|
|
import io.netty.handler.ssl.SslContextBuilder
|
|
|
|
import io.netty.handler.stream.ChunkedWriteHandler
|
2020-07-04 17:14:51 +00:00
|
|
|
import io.netty.handler.timeout.ReadTimeoutException
|
2020-06-30 19:06:12 +00:00
|
|
|
import io.netty.handler.timeout.ReadTimeoutHandler
|
2020-07-04 17:14:51 +00:00
|
|
|
import io.netty.handler.timeout.WriteTimeoutException
|
2020-06-30 19:06:12 +00:00
|
|
|
import io.netty.handler.timeout.WriteTimeoutHandler
|
2020-06-06 22:52:25 +00:00
|
|
|
import io.netty.handler.traffic.GlobalTrafficShapingHandler
|
|
|
|
import io.netty.handler.traffic.TrafficCounter
|
2021-01-24 18:05:05 +00:00
|
|
|
import io.netty.incubator.channel.uring.IOUring
|
|
|
|
import io.netty.incubator.channel.uring.IOUringEventLoopGroup
|
|
|
|
import io.netty.incubator.channel.uring.IOUringServerSocketChannel
|
2021-07-19 16:38:09 +00:00
|
|
|
import io.netty.util.AttributeKey
|
|
|
|
import io.netty.util.AttributeMap
|
2021-05-28 19:06:55 +00:00
|
|
|
import io.netty.util.DomainWildcardMappingBuilder
|
2021-07-19 16:38:09 +00:00
|
|
|
import io.netty.util.ReferenceCountUtil
|
2021-01-28 14:17:24 +00:00
|
|
|
import io.netty.util.concurrent.DefaultEventExecutorGroup
|
2021-01-26 16:15:50 +00:00
|
|
|
import io.netty.util.internal.SystemPropertyUtil
|
2021-01-24 04:55:11 +00:00
|
|
|
import mdnet.Constants
|
|
|
|
import mdnet.data.Statistics
|
|
|
|
import mdnet.logging.info
|
|
|
|
import mdnet.logging.trace
|
2021-01-26 16:15:50 +00:00
|
|
|
import mdnet.logging.warn
|
2021-05-28 19:06:55 +00:00
|
|
|
import mdnet.settings.DevSettings
|
|
|
|
import mdnet.settings.RemoteSettings
|
2021-01-24 04:55:11 +00:00
|
|
|
import mdnet.settings.ServerSettings
|
|
|
|
import org.http4k.core.HttpHandler
|
|
|
|
import org.http4k.server.Http4kChannelHandler
|
|
|
|
import org.http4k.server.Http4kServer
|
|
|
|
import org.http4k.server.ServerConfig
|
|
|
|
import org.slf4j.LoggerFactory
|
2020-06-09 19:21:18 +00:00
|
|
|
import java.io.ByteArrayInputStream
|
2020-06-09 14:40:36 +00:00
|
|
|
import java.io.IOException
|
2020-06-09 19:21:18 +00:00
|
|
|
import java.io.InputStream
|
2020-06-06 22:52:25 +00:00
|
|
|
import java.net.InetSocketAddress
|
2020-06-22 17:08:46 +00:00
|
|
|
import java.net.SocketException
|
2020-06-09 19:21:18 +00:00
|
|
|
import java.security.PrivateKey
|
|
|
|
import java.security.cert.CertificateFactory
|
|
|
|
import java.security.cert.X509Certificate
|
2021-01-26 16:15:50 +00:00
|
|
|
import java.util.Locale
|
2021-03-11 20:09:14 +00:00
|
|
|
import java.util.concurrent.TimeUnit
|
2020-06-08 22:10:22 +00:00
|
|
|
import javax.net.ssl.SSLException
|
2020-06-06 22:52:25 +00:00
|
|
|
|
2021-01-27 14:51:26 +00:00
|
|
|
sealed class NettyTransport(threads: Int) {
|
|
|
|
abstract val bossGroup: EventLoopGroup
|
|
|
|
abstract val workerGroup: EventLoopGroup
|
|
|
|
abstract val factory: ChannelFactory<ServerChannel>
|
2021-01-28 14:17:24 +00:00
|
|
|
val executor = DefaultEventExecutorGroup(
|
2021-01-27 14:51:26 +00:00
|
|
|
threads.also {
|
|
|
|
require(threads > 0) { "Threads must be greater than zero" }
|
|
|
|
}
|
|
|
|
)
|
2021-01-24 18:05:05 +00:00
|
|
|
|
2021-01-27 14:51:26 +00:00
|
|
|
private class NioTransport(threads: Int) : NettyTransport(threads) {
|
2021-01-26 16:15:50 +00:00
|
|
|
override val bossGroup = NioEventLoopGroup(1)
|
2021-01-27 14:51:26 +00:00
|
|
|
override val workerGroup = NioEventLoopGroup(8)
|
2021-01-24 18:05:05 +00:00
|
|
|
override val factory = ChannelFactory<ServerChannel> { NioServerSocketChannel() }
|
|
|
|
}
|
|
|
|
|
2021-01-27 14:51:26 +00:00
|
|
|
private class EpollTransport(threads: Int) : NettyTransport(threads) {
|
2021-01-26 16:15:50 +00:00
|
|
|
override val bossGroup = EpollEventLoopGroup(1)
|
2021-01-27 14:51:26 +00:00
|
|
|
override val workerGroup = EpollEventLoopGroup(8)
|
2021-01-24 18:05:05 +00:00
|
|
|
override val factory = ChannelFactory<ServerChannel> { EpollServerSocketChannel() }
|
|
|
|
}
|
|
|
|
|
2021-01-27 14:51:26 +00:00
|
|
|
private class IOUringTransport(threads: Int) : NettyTransport(threads) {
|
2021-01-26 16:15:50 +00:00
|
|
|
override val bossGroup = IOUringEventLoopGroup(1)
|
2021-01-27 14:51:26 +00:00
|
|
|
override val workerGroup = IOUringEventLoopGroup(8)
|
2021-01-24 18:05:05 +00:00
|
|
|
override val factory = ChannelFactory<ServerChannel> { IOUringServerSocketChannel() }
|
|
|
|
}
|
|
|
|
|
|
|
|
companion object {
|
|
|
|
private val LOGGER = LoggerFactory.getLogger(NettyTransport::class.java)
|
2021-01-27 14:51:26 +00:00
|
|
|
private fun defaultNumThreads() = Runtime.getRuntime().availableProcessors() * 2
|
2021-01-24 18:05:05 +00:00
|
|
|
|
2021-01-27 14:51:26 +00:00
|
|
|
fun bestForPlatform(threads: Int): NettyTransport {
|
2021-07-06 17:12:37 +00:00
|
|
|
val name = SystemPropertyUtil.get("os.name").lowercase(Locale.US).trim { it <= ' ' }
|
2021-01-27 14:51:26 +00:00
|
|
|
|
|
|
|
val threadsToUse = if (threads == 0) defaultNumThreads() else threads
|
2021-03-11 20:09:14 +00:00
|
|
|
LOGGER.info { "Choosing a transport with $threadsToUse threads" }
|
2021-01-27 19:33:28 +00:00
|
|
|
|
2021-01-26 16:15:50 +00:00
|
|
|
if (name.startsWith("linux")) {
|
2021-02-11 15:11:03 +00:00
|
|
|
if (!SystemPropertyUtil.get("no-iouring").toBoolean()) {
|
|
|
|
if (IOUring.isAvailable()) {
|
|
|
|
LOGGER.info { "Using IOUring transport" }
|
|
|
|
return IOUringTransport(threadsToUse)
|
|
|
|
} else {
|
2021-03-11 20:09:14 +00:00
|
|
|
LOGGER.info {
|
2021-02-23 17:18:47 +00:00
|
|
|
"IOUring transport not available (this may be normal)"
|
2021-02-11 15:11:03 +00:00
|
|
|
}
|
2021-01-26 16:15:50 +00:00
|
|
|
}
|
2021-01-24 18:05:05 +00:00
|
|
|
}
|
|
|
|
|
2021-02-11 15:11:03 +00:00
|
|
|
if (!SystemPropertyUtil.get("no-epoll").toBoolean()) {
|
|
|
|
if (Epoll.isAvailable()) {
|
|
|
|
LOGGER.info { "Using Epoll transport" }
|
|
|
|
return EpollTransport(threadsToUse)
|
|
|
|
} else {
|
2021-03-11 20:09:14 +00:00
|
|
|
LOGGER.info {
|
2021-02-23 17:18:47 +00:00
|
|
|
"Epoll transport not available (this may be normal)"
|
2021-02-11 15:11:03 +00:00
|
|
|
}
|
2021-01-26 16:15:50 +00:00
|
|
|
}
|
2021-01-24 18:05:05 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-27 19:33:28 +00:00
|
|
|
LOGGER.info { "Using Nio transport" }
|
2021-01-27 14:51:26 +00:00
|
|
|
return NioTransport(threadsToUse)
|
2021-01-24 18:05:05 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-26 16:15:50 +00:00
|
|
|
class Netty(
|
2021-05-28 19:06:55 +00:00
|
|
|
private val remoteSettings: RemoteSettings,
|
2021-01-26 16:15:50 +00:00
|
|
|
private val serverSettings: ServerSettings,
|
2021-05-28 19:06:55 +00:00
|
|
|
private val devSettings: DevSettings,
|
2021-01-26 16:15:50 +00:00
|
|
|
private val statistics: Statistics
|
|
|
|
) : ServerConfig {
|
2021-03-11 20:09:14 +00:00
|
|
|
override fun toServer(http: HttpHandler): Http4kServer = object : Http4kServer {
|
2021-01-27 14:51:26 +00:00
|
|
|
private val transport = NettyTransport.bestForPlatform(serverSettings.threads)
|
2021-01-24 04:55:11 +00:00
|
|
|
|
2021-02-11 15:11:03 +00:00
|
|
|
private lateinit var channel: Channel
|
2020-06-06 22:52:25 +00:00
|
|
|
private val burstLimiter = object : GlobalTrafficShapingHandler(
|
2021-01-27 14:51:26 +00:00
|
|
|
transport.workerGroup, serverSettings.maxKilobitsPerSecond * 1000L / 8L, 0, 100
|
2021-01-24 04:55:11 +00:00
|
|
|
) {
|
2020-06-06 22:52:25 +00:00
|
|
|
override fun doAccounting(counter: TrafficCounter) {
|
2021-01-26 16:15:50 +00:00
|
|
|
statistics.bytesSent.getAndAccumulate(counter.cumulativeWrittenBytes()) { a, b -> a + b }
|
2020-06-09 14:40:36 +00:00
|
|
|
counter.resetCumulativeTime()
|
2020-06-06 22:52:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
override fun start(): Http4kServer = apply {
|
2021-01-26 16:15:50 +00:00
|
|
|
LOGGER.info { "Starting Netty!" }
|
2021-05-28 19:06:55 +00:00
|
|
|
val tls = remoteSettings.tls!!
|
2020-06-11 18:47:43 +00:00
|
|
|
|
2020-06-27 18:15:49 +00:00
|
|
|
val certs = getX509Certs(tls.certificate)
|
2020-06-09 19:21:18 +00:00
|
|
|
val sslContext = SslContextBuilder
|
2021-01-24 04:55:11 +00:00
|
|
|
.forServer(getPrivateKey(tls.privateKey), certs)
|
|
|
|
.protocols("TLSv1.3", "TLSv1.2", "TLSv1.1", "TLSv1")
|
|
|
|
.build()
|
2020-06-06 22:52:25 +00:00
|
|
|
|
|
|
|
val bootstrap = ServerBootstrap()
|
2021-01-26 16:15:50 +00:00
|
|
|
bootstrap.group(transport.bossGroup, transport.workerGroup)
|
2021-01-24 18:05:05 +00:00
|
|
|
.channelFactory(transport.factory)
|
2021-01-24 04:55:11 +00:00
|
|
|
.childHandler(object : ChannelInitializer<SocketChannel>() {
|
|
|
|
public override fun initChannel(ch: SocketChannel) {
|
2021-07-19 16:38:09 +00:00
|
|
|
if (serverSettings.enableProxyProtocol) {
|
|
|
|
ch.pipeline().addLast(
|
|
|
|
"proxyProtocol",
|
|
|
|
object : ChannelInboundHandlerAdapter() {
|
|
|
|
override fun channelRead(ctx: ChannelHandlerContext, msg: Any) {
|
|
|
|
if (msg is ByteBuf) {
|
|
|
|
// Since the builtin `HAProxyMessageDecoder` will break non Proxy Protocol requests
|
|
|
|
// we need to use its detection capabilities to only add it when needed.
|
|
|
|
val result: ProtocolDetectionResult<HAProxyProtocolVersion> = HAProxyMessageDecoder.detectProtocol(msg)
|
|
|
|
if (result.state() == ProtocolDetectionState.DETECTED) {
|
|
|
|
ctx.pipeline().addAfter("proxyProtocol", null, HAProxyMessageDecoder())
|
|
|
|
ctx.pipeline().remove(this)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
super.channelRead(ctx, msg)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
)
|
|
|
|
ch.pipeline().addLast(
|
|
|
|
"saveOriginalIp",
|
|
|
|
object : SimpleChannelInboundHandler<HAProxyMessage>() {
|
|
|
|
override fun channelRead0(ctx: ChannelHandlerContext, msg: HAProxyMessage) {
|
|
|
|
// Store proxy IP in an attribute for later use after HTTP request is extracted.
|
|
|
|
// Using an attribute ensures the value is scoped to this channel.
|
|
|
|
(ctx as AttributeMap).attr(HAPROXY_SOURCE).set(msg.sourceAddress())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
)
|
|
|
|
}
|
2021-05-28 19:06:55 +00:00
|
|
|
ch.pipeline().addLast(
|
|
|
|
"ssl",
|
|
|
|
SniHandler(DomainWildcardMappingBuilder(sslContext).build())
|
|
|
|
)
|
|
|
|
|
|
|
|
ch.pipeline().addLast(
|
|
|
|
"dropHostname",
|
|
|
|
object : ChannelInboundHandlerAdapter() {
|
|
|
|
private val hostToTest = remoteSettings.url.authority.let {
|
|
|
|
it.substring(0, it.lastIndexOf(":"))
|
|
|
|
}
|
|
|
|
|
|
|
|
override fun userEventTriggered(ctx: ChannelHandlerContext, evt: Any) {
|
|
|
|
if (evt is SniCompletionEvent) {
|
|
|
|
if (!devSettings.disableSniCheck) {
|
2021-07-06 17:12:37 +00:00
|
|
|
if (evt.hostname() != null &&
|
|
|
|
!evt.hostname().endsWith(hostToTest) &&
|
2021-05-28 19:06:55 +00:00
|
|
|
!evt.hostname().endsWith("localhost")
|
|
|
|
) {
|
|
|
|
ctx.close()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ctx.fireUserEventTriggered(evt)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
)
|
2020-06-06 22:52:25 +00:00
|
|
|
|
2021-01-24 04:55:11 +00:00
|
|
|
ch.pipeline().addLast("codec", HttpServerCodec())
|
|
|
|
ch.pipeline().addLast("keepAlive", HttpServerKeepAliveHandler())
|
|
|
|
ch.pipeline().addLast("aggregator", HttpObjectAggregator(65536))
|
2020-06-09 19:29:33 +00:00
|
|
|
|
2021-07-19 16:38:09 +00:00
|
|
|
if (serverSettings.enableProxyProtocol) {
|
|
|
|
ch.pipeline().addLast(
|
|
|
|
"setForwardHeader",
|
|
|
|
object : SimpleChannelInboundHandler<FullHttpRequest>(false) {
|
|
|
|
override fun channelRead0(ctx: ChannelHandlerContext, request: FullHttpRequest) {
|
|
|
|
// The geo location code already supports the `Forwarded header so setting
|
|
|
|
// it is the easiest way to introduce the original IP downstream.
|
|
|
|
if ((ctx as AttributeMap).hasAttr(HAPROXY_SOURCE)) {
|
|
|
|
val addr = (ctx as AttributeMap).attr(HAPROXY_SOURCE).get()
|
|
|
|
request.headers().set("Forwarded", addr)
|
|
|
|
}
|
|
|
|
// Since we're modifying the request without handling it, we must
|
|
|
|
// call retain to ensure it will still be available downstream.
|
|
|
|
ReferenceCountUtil.retain(request)
|
|
|
|
ctx.fireChannelRead(request)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2021-01-24 04:55:11 +00:00
|
|
|
ch.pipeline().addLast("burstLimiter", burstLimiter)
|
2020-06-30 19:06:12 +00:00
|
|
|
|
2021-01-26 16:15:50 +00:00
|
|
|
ch.pipeline().addLast(
|
|
|
|
"readTimeoutHandler",
|
|
|
|
ReadTimeoutHandler(Constants.MAX_READ_TIME_SECONDS)
|
|
|
|
)
|
|
|
|
ch.pipeline().addLast(
|
|
|
|
"writeTimeoutHandler",
|
|
|
|
WriteTimeoutHandler(Constants.MAX_WRITE_TIME_SECONDS)
|
|
|
|
)
|
2020-06-30 19:06:12 +00:00
|
|
|
|
2021-01-24 04:55:11 +00:00
|
|
|
ch.pipeline().addLast("streamer", ChunkedWriteHandler())
|
2021-03-11 20:09:14 +00:00
|
|
|
ch.pipeline().addLast(transport.executor, "handler", Http4kChannelHandler(http))
|
2020-06-08 22:10:22 +00:00
|
|
|
|
2021-01-24 04:55:11 +00:00
|
|
|
ch.pipeline().addLast(
|
|
|
|
"exceptions",
|
|
|
|
object : ChannelInboundHandlerAdapter() {
|
2020-06-08 22:10:22 +00:00
|
|
|
override fun exceptionCaught(ctx: ChannelHandlerContext, cause: Throwable) {
|
|
|
|
if (cause is SSLException || (cause is DecoderException && cause.cause is SSLException)) {
|
2021-01-26 16:15:50 +00:00
|
|
|
LOGGER.trace(cause) { "Ignored invalid SSL connection" }
|
2020-06-22 17:08:46 +00:00
|
|
|
} else if (cause is IOException || cause is SocketException) {
|
2021-01-26 16:15:50 +00:00
|
|
|
LOGGER.trace(cause) { "User (downloader) abruptly closed the connection" }
|
2020-07-04 17:14:51 +00:00
|
|
|
} else if (cause !is ReadTimeoutException && cause !is WriteTimeoutException) {
|
2021-01-26 16:15:50 +00:00
|
|
|
LOGGER.warn(cause) { "Exception in pipeline" }
|
2020-06-08 22:10:22 +00:00
|
|
|
}
|
|
|
|
}
|
2021-01-24 04:55:11 +00:00
|
|
|
}
|
|
|
|
)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
.option(ChannelOption.SO_BACKLOG, 1000)
|
|
|
|
.childOption(ChannelOption.SO_KEEPALIVE, true)
|
|
|
|
|
2021-02-11 15:11:03 +00:00
|
|
|
channel = bootstrap.bind(InetSocketAddress(serverSettings.hostname, serverSettings.port)).sync().channel()
|
2020-06-06 22:52:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
override fun stop() = apply {
|
2021-02-21 17:59:11 +00:00
|
|
|
channel.close().sync()
|
2021-03-11 20:09:14 +00:00
|
|
|
transport.run {
|
|
|
|
bossGroup.shutdownGracefully(0, 500, TimeUnit.MILLISECONDS).sync()
|
|
|
|
workerGroup.shutdownGracefully(0, 500, TimeUnit.MILLISECONDS).sync()
|
|
|
|
executor.shutdownGracefully(0, 500, TimeUnit.MILLISECONDS).sync()
|
|
|
|
}
|
2020-06-06 22:52:25 +00:00
|
|
|
}
|
|
|
|
|
2021-03-11 20:09:14 +00:00
|
|
|
override fun port(): Int = (channel.localAddress() as InetSocketAddress).port
|
2021-01-24 04:55:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
companion object {
|
|
|
|
private val LOGGER = LoggerFactory.getLogger(Netty::class.java)
|
2021-07-19 16:38:09 +00:00
|
|
|
private val HAPROXY_SOURCE = AttributeKey.newInstance<String>("haproxy_source")
|
2020-06-06 22:52:25 +00:00
|
|
|
}
|
|
|
|
}
|
2020-06-09 19:21:18 +00:00
|
|
|
|
2020-06-27 18:15:49 +00:00
|
|
|
fun getX509Certs(certificates: String): Collection<X509Certificate> {
|
2020-06-09 19:21:18 +00:00
|
|
|
val targetStream: InputStream = ByteArrayInputStream(certificates.toByteArray())
|
2020-06-27 18:15:49 +00:00
|
|
|
@Suppress("unchecked_cast")
|
|
|
|
return CertificateFactory.getInstance("X509").generateCertificates(targetStream) as Collection<X509Certificate>
|
2020-06-09 19:21:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fun getPrivateKey(privateKey: String): PrivateKey {
|
|
|
|
return loadKey(privateKey)!!
|
2020-06-09 19:21:29 +00:00
|
|
|
}
|