use of org.apache.knox.gateway.services.security.AliasService in project knox by apache.
the class CredentialResource method getCredentialValueForAlias.
/**
* @param alias
* @return
*/
private CredentialValue getCredentialValueForAlias(String alias) {
GatewayServices services = (GatewayServices) request.getServletContext().getAttribute(GatewayServices.GATEWAY_SERVICES_ATTRIBUTE);
String clusterName = (String) request.getServletContext().getAttribute(GatewayServices.GATEWAY_CLUSTER_ATTRIBUTE);
AliasService as = services.getService(GatewayServices.ALIAS_SERVICE);
char[] credential = null;
try {
credential = as.getPasswordFromAliasForCluster(clusterName, alias);
} catch (AliasServiceException e) {
// TODO Auto-generated catch block
e.printStackTrace();
}
if (credential != null) {
return new CredentialValue(alias, new String(credential));
}
return null;
}
use of org.apache.knox.gateway.services.security.AliasService in project knox by apache.
the class SecureQueryEncodeProcessorTest method testSimpleQueryEncoding.
@Test
public void testSimpleQueryEncoding() throws Exception {
AliasService as = EasyMock.createNiceMock(AliasService.class);
String secret = "sdkjfhsdkjfhsdfs";
EasyMock.expect(as.getPasswordFromAliasForCluster("test-cluster-name", "encryptQueryString")).andReturn(secret.toCharArray()).anyTimes();
CryptoService cryptoService = new DefaultCryptoService();
((DefaultCryptoService) cryptoService).setAliasService(as);
GatewayServices gatewayServices = EasyMock.createNiceMock(GatewayServices.class);
EasyMock.expect(gatewayServices.getService(GatewayServices.CRYPTO_SERVICE)).andReturn(cryptoService);
UrlRewriteEnvironment environment = EasyMock.createNiceMock(UrlRewriteEnvironment.class);
EasyMock.expect(environment.getAttribute(GatewayServices.GATEWAY_SERVICES_ATTRIBUTE)).andReturn(gatewayServices).anyTimes();
EasyMock.expect(environment.getAttribute(GatewayServices.GATEWAY_CLUSTER_ATTRIBUTE)).andReturn(Arrays.asList("test-cluster-name")).anyTimes();
Template inTemplate = Parser.parseLiteral("http://host:0/root/path?query");
UrlRewriteContext context = EasyMock.createNiceMock(UrlRewriteContext.class);
EasyMock.expect(context.getCurrentUrl()).andReturn(inTemplate);
Capture<Template> outTemplate = new Capture<Template>();
context.setCurrentUrl(EasyMock.capture(outTemplate));
EasyMock.replay(environment, context);
SecureQueryEncodeDescriptor descriptor = new SecureQueryEncodeDescriptor();
SecureQueryEncodeProcessor processor = new SecureQueryEncodeProcessor();
processor.initialize(environment, descriptor);
processor.process(context);
BASE64Encoder encoder = new BASE64Encoder();
String encQuery = encoder.encode("query".getBytes("utf-8"));
encQuery = encQuery.replaceAll("\\=", "");
String outExpect = "http://host:0/root/path?_=" + encQuery;
String outActual = outTemplate.getValue().toString();
assertThat(outActual, is(outExpect));
}
use of org.apache.knox.gateway.services.security.AliasService in project knox by apache.
the class SecureQueryEncryptDecryptProcessorTest method testEncryptBadDecrypt.
@Test
public void testEncryptBadDecrypt() throws Exception {
Query query;
Template origTemplate = Parser.parseLiteral("http://host:0/path/file?query-param-name=query-param-value");
// Test encryption. Results are left in encTemplate
AliasService as = EasyMock.createNiceMock(AliasService.class);
String secret = "sdkjfhsdkjfhsdfs";
EasyMock.expect(as.getPasswordFromAliasForCluster("test-cluster-name", "encryptQueryString")).andReturn(secret.toCharArray()).anyTimes();
CryptoService cryptoService = new DefaultCryptoService();
((DefaultCryptoService) cryptoService).setAliasService(as);
GatewayServices gatewayServices = EasyMock.createNiceMock(GatewayServices.class);
EasyMock.expect(gatewayServices.getService(GatewayServices.CRYPTO_SERVICE)).andReturn(cryptoService);
UrlRewriteEnvironment encEnvironment = EasyMock.createNiceMock(UrlRewriteEnvironment.class);
EasyMock.expect(encEnvironment.getAttribute(GatewayServices.GATEWAY_SERVICES_ATTRIBUTE)).andReturn(gatewayServices).anyTimes();
EasyMock.expect(encEnvironment.getAttribute(GatewayServices.GATEWAY_CLUSTER_ATTRIBUTE)).andReturn("test-cluster-name").anyTimes();
UrlRewriteContext encContext = EasyMock.createNiceMock(UrlRewriteContext.class);
EasyMock.expect(encContext.getCurrentUrl()).andReturn(origTemplate);
Capture<Template> encTemplate = new Capture<Template>();
encContext.setCurrentUrl(EasyMock.capture(encTemplate));
EasyMock.replay(gatewayServices, as, encEnvironment, encContext);
SecureQueryEncryptDescriptor descriptor = new SecureQueryEncryptDescriptor();
SecureQueryEncryptProcessor processor = new SecureQueryEncryptProcessor();
processor.initialize(encEnvironment, descriptor);
processor.process(encContext);
assertThat(encTemplate, notNullValue());
query = encTemplate.getValue().getQuery().get("_");
assertThat(query.getFirstValue().getPattern().length(), greaterThan(1));
query = encTemplate.getValue().getQuery().get("query-param-name");
assertThat(query, nullValue());
// Test decryption with decode returning null
gatewayServices = EasyMock.createNiceMock(GatewayServices.class);
EasyMock.expect(gatewayServices.getService(GatewayServices.CRYPTO_SERVICE)).andReturn(cryptoService);
as = EasyMock.createNiceMock(AliasService.class);
EasyMock.expect(as.getPasswordFromAliasForCluster("test-cluster-name", "encryptQueryString")).andReturn(secret.toCharArray()).anyTimes();
UrlRewriteEnvironment decEnvironment = EasyMock.createNiceMock(UrlRewriteEnvironment.class);
EasyMock.expect(decEnvironment.getAttribute(GatewayServices.GATEWAY_SERVICES_ATTRIBUTE)).andReturn(gatewayServices).anyTimes();
EasyMock.expect(decEnvironment.getAttribute(GatewayServices.GATEWAY_CLUSTER_ATTRIBUTE)).andReturn("test-cluster-name").anyTimes();
Params decParams = EasyMock.createNiceMock(Params.class);
EasyMock.expect(decParams.resolve(GatewayServices.GATEWAY_CLUSTER_ATTRIBUTE)).andReturn(Arrays.asList("test-cluster-name")).anyTimes();
UrlRewriteContext decContext = EasyMock.createNiceMock(UrlRewriteContext.class);
EasyMock.expect(decContext.getCurrentUrl()).andReturn(encTemplate.getValue());
EasyMock.expect(decContext.getParameters()).andReturn(decParams);
Capture<Template> decTemplate = new Capture<Template>();
decContext.setCurrentUrl(EasyMock.capture(decTemplate));
SecureQueryDecryptDescriptor descriptor1 = new SecureQueryDecryptDescriptor();
SecureQueryDecryptProcessor decProcessor = EasyMock.createMockBuilder(SecureQueryDecryptProcessor.class).addMockedMethod(SecureQueryDecryptProcessor.class.getDeclaredMethod("decode", String.class)).createMock();
EasyMock.expect(decProcessor.decode(EasyMock.anyObject(String.class))).andReturn(null);
EasyMock.replay(gatewayServices, as, decEnvironment, decParams, decContext, decProcessor);
decProcessor.initialize(decEnvironment, descriptor1);
UrlRewriteStepStatus status = decProcessor.process(decContext);
Assert.assertTrue((status == UrlRewriteStepStatus.FAILURE));
}
use of org.apache.knox.gateway.services.security.AliasService in project knox by apache.
the class SecureQueryEncryptDecryptProcessorTest method testEncryptDecrypt.
@Test
public void testEncryptDecrypt() throws Exception {
Query query;
Template origTemplate = Parser.parseLiteral("http://host:0/path/file?query-param-name=query-param-value");
// Test encryption. Results are left in encTemplate
AliasService as = EasyMock.createNiceMock(AliasService.class);
String secret = "sdkjfhsdkjfhsdfs";
EasyMock.expect(as.getPasswordFromAliasForCluster("test-cluster-name", "encryptQueryString")).andReturn(secret.toCharArray()).anyTimes();
CryptoService cryptoService = new DefaultCryptoService();
((DefaultCryptoService) cryptoService).setAliasService(as);
GatewayServices gatewayServices = EasyMock.createNiceMock(GatewayServices.class);
EasyMock.expect(gatewayServices.getService(GatewayServices.CRYPTO_SERVICE)).andReturn(cryptoService);
UrlRewriteEnvironment encEnvironment = EasyMock.createNiceMock(UrlRewriteEnvironment.class);
EasyMock.expect(encEnvironment.getAttribute(GatewayServices.GATEWAY_SERVICES_ATTRIBUTE)).andReturn(gatewayServices).anyTimes();
EasyMock.expect(encEnvironment.getAttribute(GatewayServices.GATEWAY_CLUSTER_ATTRIBUTE)).andReturn("test-cluster-name").anyTimes();
UrlRewriteContext encContext = EasyMock.createNiceMock(UrlRewriteContext.class);
EasyMock.expect(encContext.getCurrentUrl()).andReturn(origTemplate);
Capture<Template> encTemplate = new Capture<Template>();
encContext.setCurrentUrl(EasyMock.capture(encTemplate));
EasyMock.replay(gatewayServices, as, encEnvironment, encContext);
SecureQueryEncryptDescriptor descriptor = new SecureQueryEncryptDescriptor();
SecureQueryEncryptProcessor processor = new SecureQueryEncryptProcessor();
processor.initialize(encEnvironment, descriptor);
processor.process(encContext);
assertThat(encTemplate, notNullValue());
query = encTemplate.getValue().getQuery().get("_");
assertThat(query.getFirstValue().getPattern().length(), greaterThan(1));
query = encTemplate.getValue().getQuery().get("query-param-name");
assertThat(query, nullValue());
// Test decryption. Results are left in decTemplate.
gatewayServices = EasyMock.createNiceMock(GatewayServices.class);
EasyMock.expect(gatewayServices.getService(GatewayServices.CRYPTO_SERVICE)).andReturn(cryptoService);
as = EasyMock.createNiceMock(AliasService.class);
EasyMock.expect(as.getPasswordFromAliasForCluster("test-cluster-name", "encryptQueryString")).andReturn(secret.toCharArray()).anyTimes();
UrlRewriteEnvironment decEnvironment = EasyMock.createNiceMock(UrlRewriteEnvironment.class);
EasyMock.expect(decEnvironment.getAttribute(GatewayServices.GATEWAY_SERVICES_ATTRIBUTE)).andReturn(gatewayServices).anyTimes();
EasyMock.expect(decEnvironment.getAttribute(GatewayServices.GATEWAY_CLUSTER_ATTRIBUTE)).andReturn("test-cluster-name").anyTimes();
Params decParams = EasyMock.createNiceMock(Params.class);
EasyMock.expect(decParams.resolve(GatewayServices.GATEWAY_CLUSTER_ATTRIBUTE)).andReturn(Arrays.asList("test-cluster-name")).anyTimes();
UrlRewriteContext decContext = EasyMock.createNiceMock(UrlRewriteContext.class);
EasyMock.expect(decContext.getCurrentUrl()).andReturn(encTemplate.getValue());
EasyMock.expect(decContext.getParameters()).andReturn(decParams);
Capture<Template> decTemplate = new Capture<Template>();
decContext.setCurrentUrl(EasyMock.capture(decTemplate));
EasyMock.replay(gatewayServices, as, decEnvironment, decParams, decContext);
SecureQueryDecryptDescriptor descriptor1 = new SecureQueryDecryptDescriptor();
SecureQueryDecryptProcessor decProcessor = new SecureQueryDecryptProcessor();
decProcessor.initialize(decEnvironment, descriptor1);
decProcessor.process(decContext);
assertThat(decTemplate, notNullValue());
assertThat(decTemplate.getValue(), notNullValue());
query = decTemplate.getValue().getQuery().get("query-param-name");
assertThat(query.getFirstValue().getPattern(), is("query-param-value"));
query = decTemplate.getValue().getQuery().get("_");
assertThat(query, nullValue());
}
use of org.apache.knox.gateway.services.security.AliasService in project knox by apache.
the class KnoxLdapContextFactory method setSystemPassword.
@Override
public void setSystemPassword(String systemPass) {
if (systemPass == null) {
return;
}
systemPass = systemPass.trim();
if (systemPass.length() == 0) {
return;
}
if (!systemPass.startsWith("S{ALIAS=")) {
super.setSystemPassword(systemPass);
return;
}
systemPass = systemPass.substring("S{ALIAS=".length(), systemPass.length() - 1);
String aliasName = systemPass;
GatewayServices services = GatewayServer.getGatewayServices();
AliasService aliasService = (AliasService) services.getService(GatewayServices.ALIAS_SERVICE);
String clusterName = getClusterName();
// System.err.println("FACTORY systempass 30: " + systemPass);
// System.err.println("FACTORY clustername 40: " + clusterName);
// System.err.println("FACTORY SystemProperty GatewayHome 50: " + System.getProperty(GatewayConfig.GATEWAY_HOME_VAR));
char[] password = null;
try {
password = aliasService.getPasswordFromAliasForCluster(clusterName, systemPass);
} catch (AliasServiceException e) {
LOG.unableToGetPassword(e);
}
// System.err.println("FACTORY password: " + ((password == null) ? "NULL" : new String(password)));
if (password != null) {
// System.err.println("FACTORY SUCCESS 20 system password :" + new String(password));
super.setSystemPassword(new String(password));
} else {
// System.err.println("FACTORY FORCING system password to blank");
super.setSystemPassword("");
LOG.aliasValueNotFound(clusterName, aliasName);
}
}
Aggregations