From 8208e8137a3d950152d358ccd2ab0a8dc08cf4de Mon Sep 17 00:00:00 2001 From: zf <1603559716@qq.com> Date: 星期四, 14 九月 2023 17:13:20 +0800 Subject: [PATCH] 机构&&考点 --- ruoyi-common/src/main/java/com/ruoyi/common/signature/SkipHttpsUtils.java | 46 ++++++++++++++++++++++++++++++++++++++++++++++ 1 files changed, 46 insertions(+), 0 deletions(-) diff --git a/ruoyi-common/src/main/java/com/ruoyi/common/signature/SkipHttpsUtils.java b/ruoyi-common/src/main/java/com/ruoyi/common/signature/SkipHttpsUtils.java new file mode 100644 index 0000000..3fe57c2 --- /dev/null +++ b/ruoyi-common/src/main/java/com/ruoyi/common/signature/SkipHttpsUtils.java @@ -0,0 +1,46 @@ +package com.ruoyi.common.signature; + +import java.security.cert.CertificateException; +import java.security.cert.X509Certificate; +import javax.net.ssl.SSLContext; +import javax.net.ssl.TrustManager; +import javax.net.ssl.X509TrustManager; + +import org.apache.http.client.HttpClient; +import org.apache.http.conn.ssl.NoopHostnameVerifier; +import org.apache.http.conn.ssl.SSLConnectionSocketFactory; +import org.apache.http.impl.client.CloseableHttpClient; +import org.apache.http.impl.client.HttpClients; + +public class SkipHttpsUtils { + //绕过证书 + public static HttpClient wrapClient() { + try { + SSLContext ctx = SSLContext.getInstance("TLS"); + X509TrustManager tm = new X509TrustManager() { + @Override + public X509Certificate[] getAcceptedIssuers() { + return null; + } + + @Override + public void checkClientTrusted(X509Certificate[] arg0, + String arg1) throws CertificateException { + } + + @Override + public void checkServerTrusted(X509Certificate[] arg0, + String arg1) throws CertificateException { + } + }; + ctx.init(null, new TrustManager[] { tm }, null); + SSLConnectionSocketFactory ssf = new SSLConnectionSocketFactory( + ctx, NoopHostnameVerifier.INSTANCE); + CloseableHttpClient httpclient = HttpClients.custom() + .setSSLSocketFactory(ssf).build(); + return httpclient; + } catch (Exception e) { + return HttpClients.createDefault(); + } + } +} -- Gitblit v1.9.2