1 /*******************************************************************************
2 * ============LICENSE_START==================================================
4 * * ===========================================================================
5 * * Copyright © 2017 AT&T Intellectual Property. All rights reserved.
6 * * ===========================================================================
7 * * Licensed under the Apache License, Version 2.0 (the "License");
8 * * you may not use this file except in compliance with the License.
9 * * You may obtain a copy of the License at
11 * * http://www.apache.org/licenses/LICENSE-2.0
13 * * Unless required by applicable law or agreed to in writing, software
14 * * distributed under the License is distributed on an "AS IS" BASIS,
15 * * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * * See the License for the specific language governing permissions and
17 * * limitations under the License.
18 * * ============LICENSE_END====================================================
20 * * ECOMP is a trademark and service mark of AT&T Intellectual Property.
22 ******************************************************************************/
25 package org.onap.dmaap.datarouter.node;
27 import static com.att.eelf.configuration.Configuration.MDC_KEY_REQUEST_ID;
28 import static com.att.eelf.configuration.Configuration.MDC_SERVER_FQDN;
29 import static com.att.eelf.configuration.Configuration.MDC_SERVER_IP_ADDRESS;
30 import static com.att.eelf.configuration.Configuration.MDC_SERVICE_NAME;
32 import com.att.eelf.configuration.EELFLogger;
33 import com.att.eelf.configuration.EELFManager;
35 import java.io.FileInputStream;
36 import java.io.IOException;
37 import java.net.InetAddress;
38 import java.security.KeyStore;
39 import java.security.KeyStoreException;
40 import java.security.MessageDigest;
41 import java.security.NoSuchAlgorithmException;
42 import java.security.cert.CertificateException;
43 import java.security.cert.X509Certificate;
44 import java.text.SimpleDateFormat;
45 import java.util.Date;
46 import java.util.Enumeration;
47 import java.util.TimeZone;
48 import java.util.UUID;
49 import java.util.zip.GZIPInputStream;
50 import javax.naming.InvalidNameException;
51 import javax.naming.ldap.LdapName;
52 import javax.naming.ldap.Rdn;
53 import jakarta.servlet.http.HttpServletRequest;
54 import jakarta.servlet.http.HttpServletResponse;
55 import org.apache.commons.codec.binary.Base64;
56 import org.apache.commons.lang3.StringUtils;
57 import org.onap.dmaap.datarouter.node.eelf.EelfMsgs;
61 * Utility functions for the data router node.
63 public class NodeUtils {
65 private static final EELFLogger eelfLogger = EELFManager.getInstance().getLogger(NodeUtils.class);
71 * Base64 encode a byte array.
73 * @param raw The bytes to be encoded
74 * @return The encoded string
76 public static String base64Encode(byte[] raw) {
77 return (Base64.encodeBase64String(raw));
81 * Given a user and password, generate the credentials.
83 * @param user User name
84 * @param password User password
85 * @return Authorization header value
87 public static String getAuthHdr(String user, String password) {
88 if (user == null || password == null) {
91 return ("Basic " + base64Encode((user + ":" + password).getBytes()));
95 * Given a node name, generate the credentials.
97 * @param node Node name
99 public static String getNodeAuthHdr(String node, String key) {
101 MessageDigest md = MessageDigest.getInstance("SHA-512");
102 md.update(key.getBytes());
103 md.update(node.getBytes());
104 md.update(key.getBytes());
105 return (getAuthHdr(node, base64Encode(md.digest())));
106 } catch (Exception exception) {
108 .error("Exception in generating Credentials for given node name:= " + exception.getMessage(),
115 * Given a keystore file and its password, return the value of the CN of the first private key entry with a
118 * @param kstype The type of keystore
119 * @param ksfile The file name of the keystore
120 * @param kspass The password of the keystore
121 * @return CN of the certificate subject or null
123 public static String getCanonicalName(String kstype, String ksfile, String kspass) {
126 ks = KeyStore.getInstance(kstype);
127 if (loadKeyStore(ksfile, kspass, ks)) {
130 } catch (Exception e) {
131 setIpAndFqdnForEelf("getCanonicalName");
132 eelfLogger.error(EelfMsgs.MESSAGE_KEYSTORE_LOAD_ERROR, e, ksfile);
135 return (getCanonicalName(ks));
139 * Given a keystore, return the value of the CN of the first private key entry with a certificate.
141 * @param ks The KeyStore
142 * @return CN of the certificate subject or null
144 public static String getCanonicalName(KeyStore ks) {
146 Enumeration<String> aliases = ks.aliases();
147 while (aliases.hasMoreElements()) {
148 String name = getNameFromSubject(ks, aliases);
153 } catch (Exception e) {
154 eelfLogger.error("NODE0402 Error extracting my name from my keystore file " + e.toString(), e);
160 * Given a string representation of an IP address, get the corresponding byte array.
162 * @param ip The IP address as a string
163 * @return The IP address as a byte array or null if the address is invalid
165 public static byte[] getInetAddress(String ip) {
167 return (InetAddress.getByName(ip).getAddress());
168 } catch (Exception exception) {
170 .error("Exception in generating byte array for given IP address := " + exception.toString(),
177 * Given a uri with parameters, split out the feed ID and file ID.
179 public static String[] getFeedAndFileID(String uriandparams) {
180 int end = uriandparams.length();
181 int index = uriandparams.indexOf('#');
182 if (index != -1 && index < end) {
185 index = uriandparams.indexOf('?');
186 if (index != -1 && index < end) {
189 end = uriandparams.lastIndexOf('/', end);
193 index = uriandparams.lastIndexOf('/', end - 1);
197 return (new String[]{uriandparams.substring(index + 1, end), uriandparams.substring(end + 1)});
201 * Escape fields that might contain vertical bar, backslash, or newline by replacing them with backslash p,
202 * backslash e and backslash n.
204 public static String loge(String string) {
205 if (string == null) {
208 return (string.replaceAll("\\\\", "\\\\e").replaceAll("\\|", "\\\\p").replaceAll("\n", "\\\\n"));
212 * Undo what loge does.
214 public static String unloge(String string) {
215 if (string == null) {
218 return (string.replaceAll("\\\\p", "\\|").replaceAll("\\\\n", "\n").replaceAll("\\\\e", "\\\\"));
222 * Format a logging timestamp as yyyy-mm-ddThh:mm:ss.mmmZ
224 public static String logts(long when) {
225 return (logts(new Date(when)));
229 * Format a logging timestamp as yyyy-mm-ddThh:mm:ss.mmmZ
231 public static synchronized String logts(Date when) {
232 SimpleDateFormat logDate = new SimpleDateFormat("yyyy-MM-dd'T'HH:mm:ss.SSS'Z'");
233 logDate.setTimeZone(TimeZone.getTimeZone("GMT"));
234 return (logDate.format(when));
237 /** Method prints method name, server FQDN and IP Address of the machine in EELF logs.
239 * @param method Prints method name in EELF log.
241 public static void setIpAndFqdnForEelf(String method) {
243 MDC.put(MDC_SERVICE_NAME, method);
245 MDC.put(MDC_SERVER_FQDN, InetAddress.getLocalHost().getHostName());
246 MDC.put(MDC_SERVER_IP_ADDRESS, InetAddress.getLocalHost().getHostAddress());
247 } catch (Exception exception) {
249 .error("Exception in generating byte array for given IP address := " + exception.toString(),
255 /** Method sets RequestIs and InvocationId for se in EELF logs.
257 * @param req Request used to get RequestId and InvocationId.
259 public static void setRequestIdAndInvocationId(HttpServletRequest req) {
260 String reqId = req.getHeader("X-ONAP-RequestID");
261 if (StringUtils.isBlank(reqId)) {
262 reqId = UUID.randomUUID().toString();
264 MDC.put(MDC_KEY_REQUEST_ID, reqId);
265 String invId = req.getHeader("X-InvocationID");
266 if (StringUtils.isBlank(invId)) {
267 invId = UUID.randomUUID().toString();
269 MDC.put("InvocationId", invId);
273 * Sends error as response with error code input.
275 public static void sendResponseError(HttpServletResponse response, int errorCode, EELFLogger intlogger) {
277 response.sendError(errorCode);
278 } catch (IOException ioe) {
279 intlogger.error("IOException", ioe);
284 * Method to check to see if file is of type gzip.
286 * @param file The name of the file to be checked
287 * @return True if the file is of type gzip
289 public static boolean isFiletypeGzip(File file) {
290 try (FileInputStream fileInputStream = new FileInputStream(file);
291 GZIPInputStream gzip = new GZIPInputStream(fileInputStream)) {
294 } catch (IOException e) {
295 eelfLogger.error("NODE0403 " + file.toString() + " Not in gzip(gz) format: " + e.toString() + e);
301 private static boolean loadKeyStore(String ksfile, String kspass, KeyStore ks)
302 throws NoSuchAlgorithmException, CertificateException {
303 try (FileInputStream fileInputStream = new FileInputStream(ksfile)) {
304 ks.load(fileInputStream, kspass.toCharArray());
305 } catch (IOException ioException) {
306 eelfLogger.error("IOException occurred while opening FileInputStream: " + ioException.getMessage(),
314 private static String getNameFromSubject(KeyStore ks, Enumeration<String> aliases) throws KeyStoreException {
315 String alias = aliases.nextElement();
316 if (ks.entryInstanceOf(alias, KeyStore.PrivateKeyEntry.class)) {
317 X509Certificate cert = (X509Certificate) ks.getCertificate(alias);
319 String subject = cert.getSubjectX500Principal().getName();
321 LdapName ln = new LdapName(subject);
322 for (Rdn rdn : ln.getRdns()) {
323 if (rdn.getType().equalsIgnoreCase("CN")) {
324 return rdn.getValue().toString();
327 } catch (InvalidNameException e) {
328 eelfLogger.error("No valid CN not found for dr-node cert", e);