/** * ============LICENSE_START======================================================= * org.onap.aai * ================================================================================ * Copyright © 2017-2018 AT&T Intellectual Property. All rights reserved. * ================================================================================ * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at *

* http://www.apache.org/licenses/LICENSE-2.0 *

* Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * ============LICENSE_END========================================================= */ package org.onap.aai.schemaservice.config; import java.io.File; import java.io.FileInputStream; import java.io.IOException; import java.io.InputStream; import java.nio.charset.Charset; import java.util.LinkedHashMap; import java.util.Map; import java.util.Properties; import java.util.regex.Matcher; import java.util.regex.Pattern; import org.apache.commons.io.IOUtils; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import org.springframework.context.ApplicationContextInitializer; import org.springframework.context.ConfigurableApplicationContext; import org.springframework.core.env.ConfigurableEnvironment; import org.springframework.core.env.EnumerablePropertySource; import org.springframework.core.env.MapPropertySource; import org.springframework.core.env.PropertySource; public class PropertyPasswordConfiguration implements ApplicationContextInitializer { private static final Pattern decodePasswordPattern = Pattern.compile("password\\((.*?)\\)"); private PasswordDecoder passwordDecoder = new JettyPasswordDecoder(); private static final Logger logger = LoggerFactory.getLogger(PropertyPasswordConfiguration.class.getName()); @Override public void initialize(ConfigurableApplicationContext applicationContext) { ConfigurableEnvironment environment = applicationContext.getEnvironment(); String certPath = environment.getProperty("server.certs.location"); Map sslProps = new LinkedHashMap<>(); // Override the passwords from application.properties if we find AAF certman files if (certPath != null) { File passwordFile = new File(certPath + ".password"); try (InputStream passwordStream = new FileInputStream(passwordFile)) { String keystorePassword = null; keystorePassword = IOUtils.toString(passwordStream, Charset.defaultCharset()); if (keystorePassword != null) { keystorePassword = keystorePassword.trim(); sslProps.put("server.ssl.key-store-password", keystorePassword); } else { logger.warn("Keystore password is null in AAF Certman password file"); } } catch (IOException e) { logger.warn("Not using AAF Certman password file " + passwordFile.getName() + " e=" + e.getMessage()); } File passphrasesFile = new File(certPath + ".passphrases"); try (InputStream passphrasesStream = new FileInputStream(passphrasesFile)) { String truststorePassword = null; Properties passphrasesProps = new Properties(); passphrasesProps.load(passphrasesStream); truststorePassword = passphrasesProps.getProperty("cadi_truststore_password"); if (truststorePassword != null) { truststorePassword = truststorePassword.trim(); sslProps.put("server.ssl.trust-store-password", truststorePassword); } else { logger.warn("Truststore password is null in AAF Certman passphrases file"); } } catch (IOException e) { logger.warn("Not using AAF Certman passphrases file " + passphrasesFile.getName() + " e=" + e.getMessage()); } } for (PropertySource propertySource : environment.getPropertySources()) { Map propertyOverrides = new LinkedHashMap<>(); decodePasswords(propertySource, propertyOverrides); if (!propertyOverrides.isEmpty()) { PropertySource decodedProperties = new MapPropertySource("decoded " + propertySource.getName(), propertyOverrides); environment.getPropertySources().addBefore(propertySource.getName(), decodedProperties); } } if (!sslProps.isEmpty()) { logger.info("Using AAF Certman files"); PropertySource additionalProperties = new MapPropertySource("additionalProperties", sslProps); environment.getPropertySources().addFirst(additionalProperties); } } private void decodePasswords(PropertySource source, Map propertyOverrides) { if (source instanceof EnumerablePropertySource) { EnumerablePropertySource enumerablePropertySource = (EnumerablePropertySource) source; for (String key : enumerablePropertySource.getPropertyNames()) { Object rawValue = source.getProperty(key); if (rawValue instanceof String) { String decodedValue = decodePasswordsInString((String) rawValue); propertyOverrides.put(key, decodedValue); } } } } private String decodePasswordsInString(String input) { if (input == null) { return null; } StringBuffer output = new StringBuffer(); Matcher matcher = decodePasswordPattern.matcher(input); while (matcher.find()) { String replacement = passwordDecoder.decode(matcher.group(1)); matcher.appendReplacement(output, replacement); } matcher.appendTail(output); return output.toString(); } }