首页 文章

如何忽略Apache HttpClient 4.0中的SSL证书错误

提问于
浏览
96

如何使用Apache HttpClient 4.0绕过无效的SSL证书错误?

23 回答

  • 3

    您需要使用自己的TrustManager创建SSLContext,并使用此上下文创建HTTPS方案 . 这是代码,

    SSLContext sslContext = SSLContext.getInstance("SSL");
    
    // set up a TrustManager that trusts everything
    sslContext.init(null, new TrustManager[] { new X509TrustManager() {
                public X509Certificate[] getAcceptedIssuers() {
                        System.out.println("getAcceptedIssuers =============");
                        return null;
                }
    
                public void checkClientTrusted(X509Certificate[] certs,
                                String authType) {
                        System.out.println("checkClientTrusted =============");
                }
    
                public void checkServerTrusted(X509Certificate[] certs,
                                String authType) {
                        System.out.println("checkServerTrusted =============");
                }
    } }, new SecureRandom());
    
    SSLSocketFactory sf = new SSLSocketFactory(sslContext);
    Scheme httpsScheme = new Scheme("https", 443, sf);
    SchemeRegistry schemeRegistry = new SchemeRegistry();
    schemeRegistry.register(httpsScheme);
    
    // apache HttpClient version >4.2 should use BasicClientConnectionManager
    ClientConnectionManager cm = new SingleClientConnManager(schemeRegistry);
    HttpClient httpClient = new DefaultHttpClient(cm);
    
  • 4

    所有其他答案都已弃用或不适用于HttpClient 4.3 .

    这是一种在构建http客户端时允许所有主机名的方法 .

    CloseableHttpClient httpClient = HttpClients
        .custom()
        .setHostnameVerifier(AllowAllHostnameVerifier.INSTANCE)
        .build();
    

    或者,如果您使用的是4.4或更高版本,则更新的调用如下所示:

    CloseableHttpClient httpClient = HttpClients
        .custom()
        .setSSLHostnameVerifier(NoopHostnameVerifier.INSTANCE)
        .build();
    
  • 25

    仅仅为了记录,有一个更简单的方法来实现与HttpClient 4.1相同

    SSLSocketFactory sslsf = new SSLSocketFactory(new TrustStrategy() {
    
            public boolean isTrusted(
                    final X509Certificate[] chain, String authType) throws CertificateException {
                // Oh, I am easy...
                return true;
            }
    
        });
    
  • 6

    为了记录,使用httpclient 4.3.6测试并与流畅的api的Executor兼容:

    CloseableHttpClient httpClient = HttpClients.custom().
                        setHostnameVerifier(new AllowAllHostnameVerifier()).
                        setSslcontext(new SSLContextBuilder().loadTrustMaterial(null, new TrustStrategy()
                        {
                            public boolean isTrusted(X509Certificate[] arg0, String arg1) throws CertificateException
                            {
                                return true;
                            }
                        }).build()).build();
    
  • 3

    对于Apache HttpClient 4.4:

    HttpClientBuilder b = HttpClientBuilder.create();
    
    SSLContext sslContext = new SSLContextBuilder().loadTrustMaterial(null, new TrustStrategy() {
        public boolean isTrusted(X509Certificate[] arg0, String arg1) throws CertificateException {
            return true;
        }
    }).build();
    b.setSslcontext( sslContext);
    
    // or SSLConnectionSocketFactory.getDefaultHostnameVerifier(), if you don't want to weaken
    HostnameVerifier hostnameVerifier = SSLConnectionSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER;
    
    SSLConnectionSocketFactory sslSocketFactory = new SSLConnectionSocketFactory(sslContext, hostnameVerifier);
    Registry<ConnectionSocketFactory> socketFactoryRegistry = RegistryBuilder.<ConnectionSocketFactory>create()
            .register("http", PlainConnectionSocketFactory.getSocketFactory())
            .register("https", sslSocketFactory)
            .build();
    
    // allows multi-threaded use
    PoolingHttpClientConnectionManager connMgr = new PoolingHttpClientConnectionManager( socketFactoryRegistry);
    b.setConnectionManager( connMgr);
    
    HttpClient client = b.build();
    

    这是从我们的实际工作实施中提取的 .

    其他答案很受欢迎,但对于HttpClient 4.4,它们不起作用 . 我花了好几个小时尝试和耗尽可能性,但似乎已经有非常重要的API更改和重新定位4.4 .

    另见一个稍微全面的解释:http://literatejava.com/networks/ignore-ssl-certificate-errors-apache-httpclient-4-4/

    希望有所帮助!

  • 2

    只需要使用较新的 HttpClient 4.5 来执行此操作,看起来它们是适用于我并使用最新API的代码段:'ve deprecated a few things since 4.4 so here'

    final SSLContext sslContext = new SSLContextBuilder()
            .loadTrustMaterial(null, (x509CertChain, authType) -> true)
            .build();
    
    return HttpClientBuilder.create()
            .setSSLContext(sslContext)
            .setConnectionManager(
                    new PoolingHttpClientConnectionManager(
                            RegistryBuilder.<ConnectionSocketFactory>create()
                                    .register("http", PlainConnectionSocketFactory.INSTANCE)
                                    .register("https", new SSLConnectionSocketFactory(sslContext,
                                            NoopHostnameVerifier.INSTANCE))
                                    .build()
                    ))
            .build();
    
  • 2

    如果您想要做的就是摆脱无效的主机名错误,您可以这样做:

    HttpClient httpClient = new DefaultHttpClient();
    SSLSocketFactory sf = (SSLSocketFactory)httpClient.getConnectionManager()
        .getSchemeRegistry().getScheme("https").getSocketFactory();
    sf.setHostnameVerifier(new AllowAllHostnameVerifier());
    
  • 11

    Apache HttpClient 4.5.5

    HttpClient httpClient = HttpClients
                .custom()
                .setSSLContext(new SSLContextBuilder().loadTrustMaterial(null, TrustAllStrategy.INSTANCE).build())
                .setSSLHostnameVerifier(NoopHostnameVerifier.INSTANCE)
                .build();
    

    没有使用过弃用的API .

    简单可验证的测试用例:

    package org.apache.http.client.test;
    
    import org.apache.http.HttpResponse;
    import org.apache.http.client.HttpClient;
    import org.apache.http.client.methods.HttpGet;
    import org.apache.http.client.methods.HttpUriRequest;
    import org.apache.http.conn.ssl.NoopHostnameVerifier;
    import org.apache.http.impl.client.HttpClients;
    import org.apache.http.ssl.SSLContextBuilder;
    import org.junit.Before;
    import org.junit.Test;
    
    import java.io.IOException;
    import java.security.KeyManagementException;
    import java.security.KeyStoreException;
    import java.security.NoSuchAlgorithmException;
    
    public class ApacheHttpClientTest {
    
        private HttpClient httpClient;
    
        @Before
        public void initClient() throws NoSuchAlgorithmException, KeyManagementException, KeyStoreException {
            httpClient = HttpClients
                    .custom()
                    .setSSLContext(new SSLContextBuilder().loadTrustMaterial(null, TrustAllStrategy.INSTANCE).build())
                    .setSSLHostnameVerifier(NoopHostnameVerifier.INSTANCE)
                    .build();
        }
    
        @Test
        public void apacheHttpClient455Test() throws IOException {
            executeRequestAndVerifyStatusIsOk("https://expired.badssl.com");
            executeRequestAndVerifyStatusIsOk("https://wrong.host.badssl.com");
            executeRequestAndVerifyStatusIsOk("https://self-signed.badssl.com");
            executeRequestAndVerifyStatusIsOk("https://untrusted-root.badssl.com");
            executeRequestAndVerifyStatusIsOk("https://revoked.badssl.com");
            executeRequestAndVerifyStatusIsOk("https://pinning-test.badssl.com");
            executeRequestAndVerifyStatusIsOk("https://sha1-intermediate.badssl.com");
        }
    
        private void executeRequestAndVerifyStatusIsOk(String url) throws IOException {
            HttpUriRequest request = new HttpGet(url);
    
            HttpResponse response = httpClient.execute(request);
            int statusCode = response.getStatusLine().getStatusCode();
    
            assert statusCode == 200;
        }
    }
    
  • 2

    我们正在使用HTTPClient 4.3.5并且我们尝试了几乎所有解决方案都存在于stackoverflow上但没有任何问题,在思考并找出问题之后,我们来看下面的代码,它完美地运行,只需在创建HttpClient实例之前添加它 .

    在发布帖子请求时调用的一些方法....

    SSLContextBuilder builder = new SSLContextBuilder();
        builder.loadTrustMaterial(null, new TrustStrategy() {
            @Override
            public boolean isTrusted(X509Certificate[] chain, String authType) throws CertificateException {
                return true;
            }
        });
    
        SSLConnectionSocketFactory sslSF = new SSLConnectionSocketFactory(builder.build(),
                SSLConnectionSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER);
    
        HttpClient httpClient = HttpClients.custom().setSSLSocketFactory(sslSF).build();
        HttpPost postRequest = new HttpPost(url);
    

    以正常形式继续您的请求

  • 79

    这就是我做到的 -

    • 创建我自己的MockSSLSocketFactory(下面附带的类)

    • 用它来初始化DefaultHttpClient . 如果使用代理,则需要提供代理设置 .


    初始化DefaultHTTPClient -

    SchemeRegistry schemeRegistry = new SchemeRegistry();
        schemeRegistry.register(new Scheme("http", 80, PlainSocketFactory.getSocketFactory()));
        schemeRegistry.register(new Scheme("https", 443, new MockSSLSocketFactory()));
        ClientConnectionManager cm = new SingleClientConnManager(schemeRegistry);
    
        DefaultHttpClient httpclient = new DefaultHttpClient(cm);
    

    模拟SSL工厂 -

    public class MockSSLSocketFactory extends SSLSocketFactory {
    
    public MockSSLSocketFactory() throws NoSuchAlgorithmException, KeyManagementException, KeyStoreException, UnrecoverableKeyException {
        super(trustStrategy, hostnameVerifier);
    }
    
    private static final X509HostnameVerifier hostnameVerifier = new X509HostnameVerifier() {
        @Override
        public void verify(String host, SSLSocket ssl) throws IOException {
            // Do nothing
        }
    
        @Override
        public void verify(String host, X509Certificate cert) throws SSLException {
            //Do nothing
        }
    
        @Override
        public void verify(String host, String[] cns, String[] subjectAlts) throws SSLException {
            //Do nothing
        }
    
        @Override
        public boolean verify(String s, SSLSession sslSession) {
            return true; 
        }
    };
    
    private static final TrustStrategy trustStrategy = new TrustStrategy() {
        @Override
        public boolean isTrusted(X509Certificate[] chain, String authType) throws CertificateException {
            return true;
        }
    };
    }
    

    如果在代理后面,需要这样做 -

    HttpParams params = new BasicHttpParams();
        params.setParameter(AuthPNames.PROXY_AUTH_PREF, getClientAuthPrefs());
    
    DefaultHttpClient httpclient = new DefaultHttpClient(cm, params);
    
    httpclient.getCredentialsProvider().setCredentials(
                            new AuthScope(proxyHost, proxyPort),
                            new UsernamePasswordCredentials(proxyUser, proxyPass));
    
  • 2

    使用流畅的4.5.2我必须进行以下修改才能使其正常工作 .

    try {
        TrustManager[] trustAllCerts = new TrustManager[] {
           new X509TrustManager() {
        public java.security.cert.X509Certificate[] getAcceptedIssuers() {
            return null;
        }
        public void checkClientTrusted(X509Certificate[] certs, String authType) {  }
    
        public void checkServerTrusted(X509Certificate[] certs, String authType) {  }
        }
        };
    
        SSLContext sc = SSLContext.getInstance("SSL");
        sc.init(null, trustAllCerts, new SecureRandom());
        CloseableHttpClient httpClient = HttpClients.custom().setSSLHostnameVerifier(NoopHostnameVerifier.INSTANCE).setSslcontext(sc).build();
    
        String output = Executor.newInstance(httpClient).execute(Request.Get("https://127.0.0.1:3000/something")
                                          .connectTimeout(1000)
                                          .socketTimeout(1000)).returnContent().asString();
        } catch (Exception e) {
        }
    
  • 8
    DefaultHttpClient httpclient = new DefaultHttpClient();
    
        SSLContext sslContext;
        try {
            sslContext = SSLContext.getInstance("SSL");
    
            // set up a TrustManager that trusts everything
            try {
                sslContext.init(null,
                        new TrustManager[] { new X509TrustManager() {
                            public X509Certificate[] getAcceptedIssuers() {
                                log.debug("getAcceptedIssuers =============");
                                return null;
                            }
    
                            public void checkClientTrusted(
                                    X509Certificate[] certs, String authType) {
                                log.debug("checkClientTrusted =============");
                            }
    
                            public void checkServerTrusted(
                                    X509Certificate[] certs, String authType) {
                                log.debug("checkServerTrusted =============");
                            }
                        } }, new SecureRandom());
            } catch (KeyManagementException e) {
            }
             SSLSocketFactory ssf = new SSLSocketFactory(sslContext,SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER);
             ClientConnectionManager ccm = this.httpclient.getConnectionManager();
             SchemeRegistry sr = ccm.getSchemeRegistry();
             sr.register(new Scheme("https", 443, ssf));            
        } catch (Exception e) {
            log.error(e.getMessage(),e);
        }
    
  • 2

    ZZ Coder's answer的扩展名中,覆盖hostnameverifier会很不错 .

    // ...
    SSLSocketFactory sf = new SSLSocketFactory (sslContext);
    sf.setHostnameVerifier(new X509HostnameVerifier() {
        public boolean verify(String hostname, SSLSession session) {
            return true;
        }
    
        public void verify(String host, String[] cns, String[] subjectAlts) throws SSLException {
        }
    
        public void verify(String host, X509Certificate cert) throws SSLException {
        }
    
        public void verify(String host, SSLSocket ssl) throws IOException {
        }
    });
    // ...
    
  • 29

    要接受HttpClient 4.4.x中的所有证书,您可以在创建httpClient时使用以下一个线程:

    httpClient = HttpClients.custom().setSSLHostnameVerifier(new NoopHostnameVerifier()).setSslcontext(new SSLContextBuilder().loadTrustMaterial(null, (x509Certificates, s) -> true).build()).build();
    
  • 10

    Apache HttpClient 4.1.3的完整工作版本(基于上面的oleg代码,但它仍需要我系统上的allow_all_hostname_verifier):

    private static HttpClient trustEveryoneSslHttpClient() {
        try {
            SchemeRegistry registry = new SchemeRegistry();
    
            SSLSocketFactory socketFactory = new SSLSocketFactory(new TrustStrategy() {
    
                public boolean isTrusted(final X509Certificate[] chain, String authType) throws CertificateException {
                    // Oh, I am easy...
                    return true;
                }
    
            }, org.apache.http.conn.ssl.SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER);
    
            registry.register(new Scheme("https", 443, socketFactory));
            ThreadSafeClientConnManager mgr = new ThreadSafeClientConnManager(registry);
            DefaultHttpClient client = new DefaultHttpClient(mgr, new DefaultHttpClient().getParams());
            return client;
        } catch (GeneralSecurityException e) {
            throw new RuntimeException(e);
        }
    }
    

    注意我正在重新抛出所有异常,因为实际上,如果在真实系统中出现任何异常,我无能为力!

  • 90

    如果您使用的是fluent API,则需要通过 Executor 进行设置:

    Executor.unregisterScheme("https");
    SSLSocketFactory sslSocketFactory = new SSLSocketFactory(sslContext,
                                      SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER);
    Executor.registerScheme(new Scheme("https", 443, sslSocketFactory));
    

    ...其中 sslContext 是创建的SSLContext,如_817179的答案所示 .

    之后,您可以执行以下http请求:

    String responseAsString = Request.Get("https://192.168.1.0/whatever.json")
                             .execute().getContent().asString();
    

    注意:使用HttpClient 4.2进行测试

  • 16

    测试4.3.3

    import java.security.KeyManagementException;
    import java.security.KeyStoreException;
    import java.security.NoSuchAlgorithmException;
    import java.security.SecureRandom;
    import java.security.cert.CertificateException;
    import java.security.cert.X509Certificate;
    
    import javax.net.ssl.SSLContext;
    
    import org.apache.http.Header;
    import org.apache.http.HttpEntity;
    import org.apache.http.client.methods.CloseableHttpResponse;
    import org.apache.http.client.methods.HttpGet;
    import org.apache.http.conn.ssl.SSLConnectionSocketFactory;
    import org.apache.http.conn.ssl.SSLContexts;
    import org.apache.http.conn.ssl.TrustStrategy;
    import org.apache.http.impl.client.CloseableHttpClient;
    import org.apache.http.impl.client.HttpClients;
    import org.apache.http.util.EntityUtils;
    
    public class AccessProtectedResource {
    
    public static void main(String[] args) throws Exception {
    
        // Trust all certs
        SSLContext sslcontext = buildSSLContext();
    
        // Allow TLSv1 protocol only
        SSLConnectionSocketFactory sslsf = new SSLConnectionSocketFactory(
                sslcontext,
                new String[] { "TLSv1" },
                null,
                SSLConnectionSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER);
    
        CloseableHttpClient httpclient = HttpClients.custom()
                .setSSLSocketFactory(sslsf)
                .build();
        try {
    
            HttpGet httpget = new HttpGet("https://yoururl");
    
            System.out.println("executing request" + httpget.getRequestLine());
    
            CloseableHttpResponse response = httpclient.execute(httpget);
            try {
                HttpEntity entity = response.getEntity();
    
                System.out.println("----------------------------------------");
                System.out.println(response.getStatusLine());
                if (entity != null) {
                    System.out.println("Response content length: " + entity.getContentLength());
                }
                for (Header header : response.getAllHeaders()) {
                    System.out.println(header);
                }
                EntityUtils.consume(entity);
            } finally {
                response.close();
            }
        } finally {
            httpclient.close();
        }
    }
    
    private static SSLContext buildSSLContext()
            throws NoSuchAlgorithmException, KeyManagementException,
            KeyStoreException {
        SSLContext sslcontext = SSLContexts.custom()
                .setSecureRandom(new SecureRandom())
                .loadTrustMaterial(null, new TrustStrategy() {
    
                    public boolean isTrusted(X509Certificate[] chain, String authType)
                            throws CertificateException {
                        return true;
                    }
                })
                .build();
        return sslcontext;
    }
    

    }

  • -1

    测试4.5.4:

    SSLContext sslContext = new SSLContextBuilder()
                        .loadTrustMaterial(null, (TrustStrategy) (arg0, arg1) -> true).build();
    
                CloseableHttpClient httpClient = HttpClients
                        .custom()
                        .setSSLHostnameVerifier(NoopHostnameVerifier.INSTANCE)
                        .setSSLContext(sslContext)
                        .build();
    
  • 0

    下面的代码适用于 4.5.5

    import java.io.IOException;
    import java.security.KeyManagementException;
    import java.security.NoSuchAlgorithmException;
    import java.security.SecureRandom;
    import java.security.cert.CertificateException;
    import java.security.cert.X509Certificate;
    
    import javax.net.ssl.HostnameVerifier;
    import javax.net.ssl.SSLContext;
    import javax.net.ssl.SSLSession;
    import javax.net.ssl.TrustManager;
    import javax.net.ssl.X509TrustManager;
    
    import org.apache.http.client.methods.CloseableHttpResponse;
    import org.apache.http.client.methods.HttpGet;
    import org.apache.http.client.methods.HttpUriRequest;
    import org.apache.http.conn.ssl.SSLConnectionSocketFactory;
    import org.apache.http.impl.client.CloseableHttpClient;
    import org.apache.http.impl.client.HttpClients;
    import org.apache.http.util.EntityUtils;
    
    class HttpsSSLClient {
    
    
        public static CloseableHttpClient createSSLInsecureClient() {
            SSLContext sslcontext = createSSLContext();
            SSLConnectionSocketFactory sslsf = new SSLConnectionSocketFactory(sslcontext, new HostnameVerifier() {
    
                @Override
                public boolean verify(String paramString, SSLSession paramSSLSession) {
                    return true;
                }
            });
            CloseableHttpClient httpclient = HttpClients.custom().setSSLSocketFactory(sslsf).build();
            return httpclient;
        }
    
    
        private static SSLContext createSSLContext() {
            SSLContext sslcontext = null;
            try {
                sslcontext = SSLContext.getInstance("TLS");
                sslcontext.init(null, new TrustManager[] {new TrustAnyTrustManager()}, new SecureRandom());
            } catch (NoSuchAlgorithmException e) {
                e.printStackTrace();
            } catch (KeyManagementException e) {
                e.printStackTrace();
            }
            return sslcontext;
        }
    
    
        private static class TrustAnyTrustManager implements X509TrustManager {
    
            public void checkClientTrusted(X509Certificate[] chain, String authType) throws CertificateException {}
    
            public void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException {}
    
            public X509Certificate[] getAcceptedIssuers() {
                return new X509Certificate[] {};
            }
        }
    
    }
    public class TestMe {
    
    
        public static void main(String[] args) throws IOException {
            CloseableHttpClient client = HttpsSSLClient.createSSLInsecureClient();
    
            CloseableHttpResponse res = client.execute(new HttpGet("https://wrong.host.badssl.com/"));
            System.out.println(EntityUtils.toString(res.getEntity()));
        }
    }
    

    代码输出是

    Code

    浏览器输出是

    Bad SSL

    使用的pom如下

    <?xml version="1.0" encoding="UTF-8"?>
    <project xmlns="http://maven.apache.org/POM/4.0.0"
             xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
             xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd">
        <modelVersion>4.0.0</modelVersion>
    
        <groupId>com.tarun</groupId>
        <artifactId>testing</artifactId>
        <version>1.0-SNAPSHOT</version>
        <build>
            <plugins>
                <plugin>
                    <groupId>org.apache.maven.plugins</groupId>
                    <artifactId>maven-compiler-plugin</artifactId>
                    <configuration>
                        <source>6</source>
                        <target>6</target>
                    </configuration>
                </plugin>
            </plugins>
        </build>
    
        <dependencies>
        <!-- https://mvnrepository.com/artifact/org.apache.httpcomponents/httpclient -->
        <dependency>
            <groupId>org.apache.httpcomponents</groupId>
            <artifactId>httpclient</artifactId>
            <version>4.5.5</version>
        </dependency>
    
    </dependencies>
    </project>
    
  • 6

    使用Fluent API测试HttpClient 4.5.5

    final SSLContext sslContext = new SSLContextBuilder()
        .loadTrustMaterial(null, (x509CertChain, authType) -> true).build();
    
    CloseableHttpClient httpClient = HttpClients.custom()
        .setSSLHostnameVerifier(NoopHostnameVerifier.INSTANCE)
        .setSSLContext(sslContext).build();
    
    String result = Executor.newInstance(httpClient)
        .execute(Request.Get("https://localhost:8080/someapi")
        .connectTimeout(1000).socketTimeout(1000))
        .returnContent().asString();
    
  • 0

    如果您在使用嵌入Apache HttpClient 4.1的AmazonS3Client时遇到此问题,您只需要定义这样的系统属性,以便放宽SSL证书检查程序:

    -Dcom.amazonaws.sdk.disableCertChecking =真

    恶作剧管理

  • 16

    fwiw,一个使用JAX-RS 2.x的“RestEasy”实现来构建一个特殊的“信任所有”客户端的例子......

    import java.io.IOException;
        import java.net.MalformedURLException;
        import java.security.GeneralSecurityException;
        import java.security.KeyManagementException;
        import java.security.KeyStoreException;
        import java.security.NoSuchAlgorithmException;
        import java.security.cert.CertificateException;
        import java.security.cert.X509Certificate;
        import java.util.ArrayList;
        import java.util.Arrays;
        import javax.ejb.Stateless;
        import javax.net.ssl.SSLContext;
        import javax.ws.rs.GET;
        import javax.ws.rs.Path;
        import javax.ws.rs.Produces;
        import org.apache.logging.log4j.LogManager;
        import org.apache.logging.log4j.Logger;
        import javax.ws.rs.client.Entity;
        import javax.ws.rs.core.MediaType;
        import javax.ws.rs.core.Response;
        import org.apache.http.config.Registry;
        import org.apache.http.config.RegistryBuilder;
        import org.apache.http.conn.HttpClientConnectionManager;
        import org.apache.http.conn.ssl.TrustStrategy;
        import org.jboss.resteasy.client.jaxrs.ResteasyClient;
        import org.jboss.resteasy.client.jaxrs.ResteasyClientBuilder;
        import org.jboss.resteasy.client.jaxrs.ResteasyWebTarget;
        import org.jboss.resteasy.client.jaxrs.engines.ApacheHttpClient4Engine;
        import org.apache.http.impl.conn.BasicHttpClientConnectionManager;
        import org.apache.http.conn.socket.ConnectionSocketFactory;
        import org.apache.http.conn.ssl.NoopHostnameVerifier;
        import org.apache.http.conn.ssl.SSLConnectionSocketFactory;
        import org.apache.http.impl.client.CloseableHttpClient;
        import org.apache.http.impl.client.HttpClientBuilder;
        import org.apache.http.ssl.SSLContexts;
    
        @Stateless
        @Path("/postservice")
        public class PostService {
    
            private static final Logger LOG = LogManager.getLogger("PostService");
    
            public PostService() {
            }
    
            @GET
            @Produces({MediaType.APPLICATION_JSON, MediaType.APPLICATION_XML})
            public PostRespDTO get() throws NoSuchAlgorithmException, KeyManagementException, MalformedURLException, IOException, GeneralSecurityException {
    
                //...object passed to the POST method...
                PostDTO requestObject = new PostDTO();
                requestObject.setEntryAList(new ArrayList<>(Arrays.asList("ITEM0000A", "ITEM0000B", "ITEM0000C")));
                requestObject.setEntryBList(new ArrayList<>(Arrays.asList("AAA", "BBB", "CCC")));
    
                //...build special "trust all" client to call POST method...
                ApacheHttpClient4Engine engine = new ApacheHttpClient4Engine(createTrustAllClient());
    
                ResteasyClient client = new ResteasyClientBuilder().httpEngine(engine).build();
                ResteasyWebTarget target = client.target("https://localhost:7002/postRespWS").path("postrespservice");
                Response response = target.request().accept(MediaType.APPLICATION_JSON).post(Entity.entity(requestObject, MediaType.APPLICATION_JSON));
    
                //...object returned from the POST method...
                PostRespDTO responseObject = response.readEntity(PostRespDTO.class);
    
                response.close();
    
                return responseObject;
            }
    
    
            //...get special "trust all" client...
            private static CloseableHttpClient createTrustAllClient() throws NoSuchAlgorithmException, KeyStoreException, KeyManagementException {
    
                SSLContext sslContext = SSLContexts.custom().loadTrustMaterial(null, TRUSTALLCERTS).useProtocol("TLS").build();
                HttpClientBuilder builder = HttpClientBuilder.create();
                NoopHostnameVerifier noop = new NoopHostnameVerifier();
                SSLConnectionSocketFactory sslConnectionSocketFactory = new SSLConnectionSocketFactory(sslContext, noop);
                builder.setSSLSocketFactory(sslConnectionSocketFactory);
                Registry<ConnectionSocketFactory> registry = RegistryBuilder.<ConnectionSocketFactory>create().register("https", sslConnectionSocketFactory).build();
                HttpClientConnectionManager ccm = new BasicHttpClientConnectionManager(registry);
                builder.setConnectionManager(ccm);
    
                return builder.build();
            }
    
    
            private static final TrustStrategy TRUSTALLCERTS = new TrustStrategy() {
                @Override
                public boolean isTrusted(X509Certificate[] chain, String authType)
                    throws CertificateException {
                    return true;
                }
            };
        }
    

    related Maven dependencies

    <dependency>
            <groupId>org.jboss.resteasy</groupId>
            <artifactId>resteasy-client</artifactId>
            <version>3.0.10.Final</version>
        </dependency>
        <dependency>
            <groupId>org.jboss.resteasy</groupId>
            <artifactId>jaxrs-api</artifactId>
            <version>3.0.10.Final</version>
        </dependency>
        <dependency>
            <groupId>org.jboss.resteasy</groupId>
            <artifactId>resteasy-jackson2-provider</artifactId>
            <version>3.0.10.Final</version>
        </dependency>
        <dependency>
            <groupId>org.apache.httpcomponents</groupId>
            <artifactId>httpclient</artifactId>
            <version>4.5</version>
            <type>jar</type>
        </dependency>
        <dependency>
            <groupId>javax</groupId>
            <artifactId>javaee-web-api</artifactId>
            <version>7.0</version>
            <scope>provided</scope>
        </dependency>
    
  • 1

    如果您使用 Apache httpClient 4.5.x ,请尝试以下操作:

    public static void main(String... args)  {
    
        try (CloseableHttpClient httpclient = createAcceptSelfSignedCertificateClient()) {
            HttpGet httpget = new HttpGet("https://example.com");
            System.out.println("Executing request " + httpget.getRequestLine());
    
            httpclient.execute(httpget);
            System.out.println("----------------------------------------");
        } catch (NoSuchAlgorithmException | KeyStoreException | KeyManagementException | IOException e) {
            throw new RuntimeException(e);
        }
    }
    
    private static CloseableHttpClient createAcceptSelfSignedCertificateClient()
            throws KeyManagementException, NoSuchAlgorithmException, KeyStoreException {
    
        // use the TrustSelfSignedStrategy to allow Self Signed Certificates
        SSLContext sslContext = SSLContextBuilder
                .create()
                .loadTrustMaterial(new TrustSelfSignedStrategy())
                .build();
    
        // we can optionally disable hostname verification. 
        // if you don't want to further weaken the security, you don't have to include this.
        HostnameVerifier allowAllHosts = new NoopHostnameVerifier();
    
        // create an SSL Socket Factory to use the SSLContext with the trust self signed certificate strategy
        // and allow all hosts verifier.
        SSLConnectionSocketFactory connectionFactory = new SSLConnectionSocketFactory(sslContext, allowAllHosts);
    
        // finally create the HttpClient using HttpClient factory methods and assign the ssl socket factory
        return HttpClients
                .custom()
                .setSSLSocketFactory(connectionFactory)
                .build();
    }
    

相关问题