blob: 40eec5674cdd6d102a9cf62f9c381b7a82187f6b [file] [log] [blame]
// Licensed to the Apache Software Foundation (ASF) under one
// or more contributor license agreements. See the NOTICE file
// distributed with this work for additional information
// regarding copyright ownership. The ASF licenses this file
// to you under the Apache License, Version 2.0 (the
// "License"); you may not use this file except in compliance
// with the License. You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing,
// software distributed under the License is distributed on an
// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
// KIND, either express or implied. See the License for the
// specific language governing permissions and limitations
// under the License.
package com.cloud.user;
import com.cloud.exception.InvalidParameterValueException;
import org.apache.cloudstack.framework.config.ConfigKey;
import org.apache.cloudstack.framework.config.Configurable;
import org.apache.commons.lang3.StringUtils;
import org.apache.log4j.Logger;
public class PasswordPolicyImpl implements PasswordPolicy, Configurable {
private Logger logger = Logger.getLogger(PasswordPolicyImpl.class);
public void verifyIfPasswordCompliesWithPasswordPolicies(String password, String username, Long domainId) {
int numberOfSpecialCharactersInPassword = 0;
int numberOfUppercaseLettersInPassword = 0;
int numberOfLowercaseLettersInPassword = 0;
int numberOfDigitsInPassword = 0;
char[] splitPassword = password.toCharArray();
for (char character: splitPassword) {
if (!Character.isLetterOrDigit(character)) {
numberOfSpecialCharactersInPassword++;
} else if (Character.isUpperCase(character)) {
numberOfUppercaseLettersInPassword++;
} else if (Character.isLowerCase(character)) {
numberOfLowercaseLettersInPassword++;
} else if (Character.isDigit(character)) {
numberOfDigitsInPassword++;
}
}
validateIfPasswordContainsTheMinimumNumberOfSpecialCharacters(numberOfSpecialCharactersInPassword, username, domainId);
validateIfPasswordContainsTheMinimumNumberOfUpperCaseLetters(numberOfUppercaseLettersInPassword, username, domainId);
validateIfPasswordContainsTheMinimumNumberOfLowerCaseLetters(numberOfLowercaseLettersInPassword, username, domainId);
validateIfPasswordContainsTheMinimumNumberOfDigits(numberOfDigitsInPassword, username, domainId);
validateIfPasswordContainsTheMinimumLength(password, username, domainId);
validateIfPasswordContainsTheUsername(password, username, domainId);
validateIfPasswordMatchesRegex(password, username, domainId);
}
protected void validateIfPasswordContainsTheMinimumNumberOfSpecialCharacters(int numberOfSpecialCharactersInPassword, String username, Long domainId) {
Integer passwordPolicyMinimumSpecialCharacters = getPasswordPolicyMinimumSpecialCharacters(domainId);
logger.trace(String.format("Validating if the new password for user [%s] contains the minimum number of special characters [%s] defined in the configuration [%s].",
username, passwordPolicyMinimumSpecialCharacters, PasswordPolicyMinimumSpecialCharacters.key()));
if (passwordPolicyMinimumSpecialCharacters == 0) {
logger.trace(String.format("The minimum number of special characters for a user's password is 0; therefore, we will not validate the number of special characters for"
+ " the new password of user [%s].", username));
return;
}
if (numberOfSpecialCharactersInPassword < passwordPolicyMinimumSpecialCharacters) {
logger.error(String.format("User [%s] informed [%d] special characters for their new password; however, the minimum number of special characters is [%d]. "
+ "Refusing the user's new password.", username, numberOfSpecialCharactersInPassword, passwordPolicyMinimumSpecialCharacters));
throw new InvalidParameterValueException(String.format("User password should contain at least [%d] special characters.", passwordPolicyMinimumSpecialCharacters));
}
logger.trace(String.format("The new password for user [%s] complies with the policy of minimum special characters [%s].", username,
PasswordPolicyMinimumSpecialCharacters.key()));
}
protected void validateIfPasswordContainsTheMinimumNumberOfUpperCaseLetters(int numberOfUppercaseLettersInPassword, String username, Long domainId) {
Integer passwordPolicyMinimumUpperCaseLetters = getPasswordPolicyMinimumUpperCaseLetters(domainId);
logger.trace(String.format("Validating if the new password for user [%s] contains the minimum number of upper case letters [%s] defined in the configuration [%s].",
username, passwordPolicyMinimumUpperCaseLetters, PasswordPolicyMinimumUppercaseLetters.key()));
if (passwordPolicyMinimumUpperCaseLetters == 0) {
logger.trace(String.format("The minimum number of upper case letters for a user's password is 0; therefore, we will not validate the number of upper case letters for"
+ " the new password of user [%s].", username));
return;
}
if (numberOfUppercaseLettersInPassword < passwordPolicyMinimumUpperCaseLetters) {
logger.error(String.format("User [%s] informed [%d] upper case letters for their new password; however, the minimum number of upper case letters is [%d]. "
+ "Refusing the user's new password.", username, numberOfUppercaseLettersInPassword, passwordPolicyMinimumUpperCaseLetters));
throw new InvalidParameterValueException(String.format("User password should contain at least [%d] upper case letters.", passwordPolicyMinimumUpperCaseLetters));
}
logger.trace(String.format("The new password for user [%s] complies with the policy of minimum upper case letters [%s].", username,
PasswordPolicyMinimumUppercaseLetters.key()));
}
protected void validateIfPasswordContainsTheMinimumNumberOfLowerCaseLetters(int numberOfLowercaseLettersInPassword, String username, Long domainId) {
Integer passwordPolicyMinimumLowerCaseLetters = getPasswordPolicyMinimumLowerCaseLetters(domainId);
logger.trace(String.format("Validating if the new password for user [%s] contains the minimum number of lower case letters [%s] defined in the configuration [%s].",
username, passwordPolicyMinimumLowerCaseLetters, PasswordPolicyMinimumLowercaseLetters.key()));
if (passwordPolicyMinimumLowerCaseLetters == 0) {
logger.trace(String.format("The minimum number of lower case letters for a user's password is 0; therefore, we will not validate the number of lower case letters for"
+ " the new password of user [%s].", username));
return;
}
if (numberOfLowercaseLettersInPassword < passwordPolicyMinimumLowerCaseLetters) {
logger.error(String.format("User [%s] informed [%d] lower case letters for their new password; however, the minimum number of lower case letters is [%d]. "
+ "Refusing the user's new password.", username, numberOfLowercaseLettersInPassword, passwordPolicyMinimumLowerCaseLetters));
throw new InvalidParameterValueException(String.format("User password should contain at least [%d] lower case letters.", passwordPolicyMinimumLowerCaseLetters));
}
logger.trace(String.format("The new password for user [%s] complies with the policy of minimum lower case letters [%s].", username,
PasswordPolicyMinimumLowercaseLetters.key()));
}
protected void validateIfPasswordContainsTheMinimumNumberOfDigits(int numberOfDigitsInPassword, String username, Long domainId) {
Integer passwordPolicyMinimumDigits = getPasswordPolicyMinimumDigits(domainId);
logger.trace(String.format("Validating if the new password for user [%s] contains the minimum number of digits [%s] defined in the configuration [%s].",
username, passwordPolicyMinimumDigits, PasswordPolicyMinimumDigits.key()));
if (passwordPolicyMinimumDigits == 0) {
logger.trace(String.format("The minimum number of digits for a user's password is 0; therefore, we will not validate the number of digits for the new password of"
+ " user [%s].", username));
return;
}
if (numberOfDigitsInPassword < passwordPolicyMinimumDigits) {
logger.error(String.format("User [%s] informed [%d] digits for their new password; however, the minimum number of digits is [%d]. "
+ "Refusing the user's new password.", username, numberOfDigitsInPassword, passwordPolicyMinimumDigits));
throw new InvalidParameterValueException(String.format("User password should contain at least [%d] digits.", passwordPolicyMinimumDigits));
}
logger.trace(String.format("The new password for user [%s] complies with the policy of minimum digits [%s].", username, PasswordPolicyMinimumDigits.key()));
}
protected void validateIfPasswordContainsTheMinimumLength(String password, String username, Long domainId) {
Integer passwordPolicyMinimumLength = getPasswordPolicyMinimumLength(domainId);
logger.trace(String.format("Validating if the new password for user [%s] contains the minimum length [%s] defined in the configuration [%s].", username,
passwordPolicyMinimumLength, PasswordPolicyMinimumLength.key()));
if (passwordPolicyMinimumLength == 0) {
logger.trace(String.format("The minimum length of a user's password is 0; therefore, we will not validate the length of the new password of user [%s].", username));
return;
}
Integer passwordLength = password.length();
if (passwordLength < passwordPolicyMinimumLength) {
logger.error(String.format("User [%s] informed [%d] characters for their new password; however, the minimum password length is [%d]. Refusing the user's new password.",
username, passwordLength, passwordPolicyMinimumLength));
throw new InvalidParameterValueException(String.format("User password should contain at least [%d] characters.", passwordPolicyMinimumLength));
}
logger.trace(String.format("The new password for user [%s] complies with the policy of minimum length [%s].", username, PasswordPolicyMinimumLength.key()));
}
protected void validateIfPasswordContainsTheUsername(String password, String username, Long domainId) {
logger.trace(String.format("Validating if the new password for user [%s] contains their username.", username));
if (getPasswordPolicyAllowPasswordToContainUsername(domainId)) {
logger.trace(String.format("Allow password to contain username is true; therefore, we will not validate if the password contains the username of user [%s].", username));
return;
}
if (StringUtils.containsIgnoreCase(password, username)) {
logger.error(String.format("User [%s] informed a new password that contains their username; however, the this is not allowed as configured in [%s]. "
+ "Refusing the user's new password.", username, PasswordPolicyAllowPasswordToContainUsername.key()));
throw new InvalidParameterValueException("User password should not contain their username.");
}
logger.trace(String.format("The new password for user [%s] complies with the policy of allowing passwords to contain username [%s].", username,
PasswordPolicyAllowPasswordToContainUsername.key()));
}
protected void validateIfPasswordMatchesRegex(String password, String username, Long domainId) {
String passwordPolicyRegex = getPasswordPolicyRegex(domainId);
logger.trace(String.format("Validating if the new password for user [%s] matches regex [%s] defined in the configuration [%s].",
username, passwordPolicyRegex, PasswordPolicyRegex.key()));
if (passwordPolicyRegex == null){
logger.trace(String.format("Regex is null; therefore, we will not validate if the new password matches with regex for user [%s].", username));
return;
}
if (!password.matches(passwordPolicyRegex)){
logger.error(String.format("User [%s] informed a new password that does not match with regex [%s]. Refusing the user's new password.", username, passwordPolicyRegex));
throw new InvalidParameterValueException("User password does not match with password policy regex.");
}
logger.trace(String.format("The new password for user [%s] complies with the policy of matching regex [%s].", username,
PasswordPolicyRegex.key()));
}
@Override
public String getConfigComponentName() {
return PasswordPolicyImpl.class.getSimpleName();
}
@Override
public ConfigKey<?>[] getConfigKeys() {
return new ConfigKey<?>[]{PasswordPolicyMinimumLength, PasswordPolicyMinimumSpecialCharacters, PasswordPolicyMinimumUppercaseLetters, PasswordPolicyMinimumLowercaseLetters,
PasswordPolicyMinimumDigits, PasswordPolicyAllowPasswordToContainUsername, PasswordPolicyRegex
};
}
public Integer getPasswordPolicyMinimumLength(Long domainId) {
return PasswordPolicyMinimumLength.valueIn(domainId);
}
public Integer getPasswordPolicyMinimumSpecialCharacters(Long domainId) {
return PasswordPolicyMinimumSpecialCharacters.valueIn(domainId);
}
public Integer getPasswordPolicyMinimumUpperCaseLetters(Long domainId) {
return PasswordPolicyMinimumUppercaseLetters.valueIn(domainId);
}
public Integer getPasswordPolicyMinimumLowerCaseLetters(Long domainId) {
return PasswordPolicyMinimumLowercaseLetters.valueIn(domainId);
}
public Integer getPasswordPolicyMinimumDigits(Long domainId) {
return PasswordPolicyMinimumDigits.valueIn(domainId);
}
public Boolean getPasswordPolicyAllowPasswordToContainUsername(Long domainId) {
return PasswordPolicyAllowPasswordToContainUsername.valueIn(domainId);
}
public String getPasswordPolicyRegex(Long domainId) {
return PasswordPolicyRegex.valueIn(domainId);
}
}