blob: 755eb60b53577926fbb2e523b140cfb4b9e9eb9e [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.knox.gateway.services.security.impl;
import java.nio.charset.StandardCharsets;
import java.security.InvalidKeyException;
import java.security.KeyStoreException;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.Signature;
import java.security.SignatureException;
import java.util.HashMap;
import java.util.Map;
import org.apache.knox.gateway.GatewayMessages;
import org.apache.knox.gateway.config.GatewayConfig;
import org.apache.knox.gateway.i18n.messages.MessagesFactory;
import org.apache.knox.gateway.services.security.AliasService;
import org.apache.knox.gateway.services.security.AliasServiceException;
import org.apache.knox.gateway.services.security.CryptoService;
import org.apache.knox.gateway.services.security.EncryptionResult;
import org.apache.knox.gateway.services.security.KeystoreService;
import org.apache.knox.gateway.services.security.KeystoreServiceException;
import org.apache.knox.gateway.services.ServiceLifecycleException;
public class DefaultCryptoService implements CryptoService {
private static final GatewayMessages LOG = MessagesFactory.get( GatewayMessages.class );
private static final Map<String,ConfigurableEncryptor> ENCRYPTOR_CACHE = new HashMap<>();
private AliasService as;
private KeystoreService ks;
private GatewayConfig config;
public void setKeystoreService(KeystoreService ks) {
this.ks = ks;
}
public void setAliasService(AliasService as) {
this.as = as;
}
@Override
public void init(GatewayConfig config, Map<String, String> options)
throws ServiceLifecycleException {
this.config = config;
if (as == null) {
throw new ServiceLifecycleException("Alias service is not set");
}
}
@Override
public void start() throws ServiceLifecycleException {
}
@Override
public void stop() throws ServiceLifecycleException {
}
@Override
public void createAndStoreEncryptionKeyForCluster(String clusterName, String alias) {
try {
as.generateAliasForCluster(clusterName, alias);
} catch (AliasServiceException e) {
e.printStackTrace();
}
}
@Override
public EncryptionResult encryptForCluster(String clusterName, String alias, byte[] clear) {
char[] password = null;
try {
password = as.getPasswordFromAliasForCluster(clusterName, alias);
} catch (AliasServiceException e2) {
e2.printStackTrace();
}
if (password != null) {
try {
return getEncryptor(clusterName,password).encrypt( clear );
} catch (Exception e) {
LOG.failedToEncryptPasswordForCluster( clusterName, e );
}
}
return null;
}
@Override
public byte[] decryptForCluster(String clusterName, String alias, String cipherText) {
return decryptForCluster(clusterName, alias, cipherText.getBytes(StandardCharsets.UTF_8), null, null);
}
@Override
public byte[] decryptForCluster(String clusterName, String alias, byte[] cipherText, byte[] iv, byte[] salt) {
try {
char[] password;
ConfigurableEncryptor encryptor;
password = as.getPasswordFromAliasForCluster(clusterName, alias);
if (password != null) {
encryptor = getEncryptor(clusterName,password );
try {
return encryptor.decrypt( salt, iv, cipherText);
} catch (Exception e) {
LOG.failedToDecryptPasswordForCluster( clusterName, e );
}
}
else {
LOG.failedToDecryptCipherForClusterNullPassword( clusterName );
}
} catch (AliasServiceException e1) {
LOG.failedToDecryptCipherForClusterNullPassword( clusterName );
}
return null;
}
@Override
public boolean verify(String algorithm, String signed, byte[] signature) {
boolean verified = false;
try {
Signature sig=Signature.getInstance(algorithm);
sig.initVerify(ks.getCertificateForGateway().getPublicKey());
sig.update(signed.getBytes(StandardCharsets.UTF_8));
verified = sig.verify(signature);
} catch (SignatureException | KeystoreServiceException | InvalidKeyException | NoSuchAlgorithmException | KeyStoreException e) {
LOG.failedToVerifySignature( e );
}
LOG.signatureVerified( verified );
return verified;
}
@Override
public byte[] sign(String algorithm, String payloadToSign) {
try {
char[] passphrase;
passphrase = as.getGatewayIdentityPassphrase();
PrivateKey privateKey = (PrivateKey) ks.getKeyForGateway(passphrase);
Signature signature = Signature.getInstance(algorithm);
signature.initSign(privateKey);
signature.update(payloadToSign.getBytes(StandardCharsets.UTF_8));
return signature.sign();
} catch (NoSuchAlgorithmException | AliasServiceException | KeystoreServiceException | SignatureException | InvalidKeyException e) {
LOG.failedToSignData( e );
}
return null;
}
// The assumption here is that lock contention will be less of a performance issue than the cost of object creation.
// We have seen via profiling that AESEncryptor instantiation is very expensive.
private ConfigurableEncryptor getEncryptor( final String clusterName, final char[] password ) {
synchronized(ENCRYPTOR_CACHE) {
ConfigurableEncryptor encryptor = ENCRYPTOR_CACHE.get( clusterName );
if( encryptor == null ) {
encryptor = new ConfigurableEncryptor( String.valueOf( password ) );
encryptor.init(config);
ENCRYPTOR_CACHE.put( clusterName, encryptor );
}
return encryptor;
}
}
}