| /* |
| * Licensed to the Apache Software Foundation (ASF) under one or more |
| * contributor license agreements. See the NOTICE file distributed with |
| * this work for additional information regarding copyright ownership. |
| * The ASF licenses this file to You under the Apache License, Version 2.0 |
| * (the "License"); you may not use this file except in compliance with |
| * the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| package org.apache.nifi.encrypt; |
| |
| import org.apache.nifi.security.util.crypto.SecureHasher; |
| import org.apache.nifi.security.util.crypto.SecureHasherFactory; |
| import org.apache.nifi.util.NiFiProperties; |
| import org.slf4j.Logger; |
| import org.slf4j.LoggerFactory; |
| |
| import javax.crypto.Mac; |
| import javax.crypto.spec.SecretKeySpec; |
| import java.nio.charset.Charset; |
| import java.nio.charset.StandardCharsets; |
| import java.security.InvalidKeyException; |
| import java.security.NoSuchAlgorithmException; |
| import java.util.Base64; |
| import java.util.Objects; |
| |
| /** |
| * Encode a sensitive value using the NiFi sensitive properties key to derive the secret key used in the MAC operation. |
| */ |
| public class StandardSensitiveValueEncoder implements SensitiveValueEncoder { |
| |
| private static final Logger logger = LoggerFactory.getLogger(StandardSensitiveValueEncoder.class); |
| |
| private SecretKeySpec secretKeySpec; |
| private static Base64.Encoder base64Encoder; |
| private static final String HMAC_SHA256 = "HmacSHA256"; |
| private static final Charset PROPERTY_CHARSET = StandardCharsets.UTF_8; |
| |
| public StandardSensitiveValueEncoder(final NiFiProperties properties) { |
| this(properties.getProperty(NiFiProperties.SENSITIVE_PROPS_KEY), |
| SecureHasherFactory.getSecureHasher(properties.getProperty(NiFiProperties.SENSITIVE_PROPS_ALGORITHM))); |
| } |
| |
| // We use the sensitive properties key and a SecureHasher impl to derive a secret key for the getEncoded() method |
| private StandardSensitiveValueEncoder(final String sensitivePropertiesKey, final SecureHasher hasher) { |
| Objects.requireNonNull(sensitivePropertiesKey, "Sensitive Properties Key is required"); |
| Objects.requireNonNull(hasher, "SecureHasher is required"); |
| byte[] hashedSensitivePropertyKey = hasher.hashRaw(sensitivePropertiesKey.getBytes(PROPERTY_CHARSET)); |
| secretKeySpec = new SecretKeySpec(hashedSensitivePropertyKey, HMAC_SHA256); |
| base64Encoder = Base64.getEncoder(); |
| } |
| |
| /** |
| * Creates a securely-derived, deterministic representation of the provided decrypted NiFi property value |
| * for logging/comparison purposes. A SecureHasher implementation is used to derive a secret key from the sensitive which is |
| * then used to generate an HMAC using HMAC+SHA256. |
| * |
| * @param plaintextSensitiveValue A decrypted, sensitive property value |
| * |
| * @return a deterministic, securely hashed representation of the value which will be consistent across nodes. Safe to print in a log. |
| */ |
| @Override |
| public String getEncoded(final String plaintextSensitiveValue) { |
| try { |
| Mac mac = Mac.getInstance(HMAC_SHA256); |
| mac.init(secretKeySpec); |
| byte[] hashedBytes = mac.doFinal(plaintextSensitiveValue.getBytes(PROPERTY_CHARSET)); |
| return "[MASKED] (" + base64Encoder.encodeToString(hashedBytes) + ")"; |
| } catch (NoSuchAlgorithmException | InvalidKeyException e) { |
| logger.error("Encountered an error making the sensitive value loggable: {}", e.getLocalizedMessage()); |
| return "[Unable to mask value]"; |
| } |
| } |
| } |