com.azure.messaging.eventhubs.implementation.EventHubSharedKeyCredential Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of azure-messaging-eventhubs Show documentation
Show all versions of azure-messaging-eventhubs Show documentation
Libraries built on Microsoft Azure Event Hubs
// Copyright (c) Microsoft Corporation. All rights reserved.
// Licensed under the MIT License.
package com.azure.messaging.eventhubs.implementation;
import com.azure.core.annotation.Immutable;
import com.azure.core.credential.AccessToken;
import com.azure.core.credential.TokenCredential;
import com.azure.core.credential.TokenRequestContext;
import com.azure.core.util.CoreUtils;
import com.azure.core.util.logging.ClientLogger;
import reactor.core.publisher.Mono;
import javax.crypto.Mac;
import javax.crypto.spec.SecretKeySpec;
import java.io.UnsupportedEncodingException;
import java.net.URLEncoder;
import java.security.InvalidKeyException;
import java.security.NoSuchAlgorithmException;
import java.time.Duration;
import java.time.Instant;
import java.time.OffsetDateTime;
import java.time.ZoneOffset;
import java.util.Arrays;
import java.util.Base64;
import java.util.Locale;
import java.util.Objects;
import static java.nio.charset.StandardCharsets.UTF_8;
/**
* Authorizes with Azure Event Hubs service using a shared access key from either an Event Hubs namespace or a specific
* Event Hub.
*
*
* The shared access key can be obtained by creating a shared access policy for the Event Hubs namespace or for
* a specific Event Hub instance. See
* Shared access authorization policies
* for more information.
*
*
* @see Authorize
* access with shared access signature.
*/
@Immutable
public class EventHubSharedKeyCredential implements TokenCredential {
private static final String SHARED_ACCESS_SIGNATURE_FORMAT = "SharedAccessSignature sr=%s&sig=%s&se=%s&skn=%s";
private static final String HASH_ALGORITHM = "HMACSHA256";
private static final ClientLogger LOGGER = new ClientLogger(EventHubSharedKeyCredential.class);
private final String policyName;
private final Duration tokenValidity;
private final SecretKeySpec secretKeySpec;
private final String sharedAccessSignature;
/**
* Creates an instance that authorizes using the {@code policyName} and {@code sharedAccessKey}.
*
* @param policyName Name of the shared access key policy.
* @param sharedAccessKey Value of the shared access key.
* @throws IllegalArgumentException if {@code policyName}, {@code sharedAccessKey} is an empty string. If the
* {@code sharedAccessKey} is an invalid value for the hashing algorithm.
* @throws NullPointerException if {@code policyName} or {@code sharedAccessKey} is null.
* @throws UnsupportedOperationException If the hashing algorithm cannot be instantiated, which is used to generate
* the shared access signatures.
*/
public EventHubSharedKeyCredential(String policyName, String sharedAccessKey) {
this(policyName, sharedAccessKey, ClientConstants.TOKEN_VALIDITY);
}
/**
* Creates an instance that authorizes using the {@code policyName} and {@code sharedAccessKey}. The authorization
* lasts for a period of {@code tokenValidity} before another token must be requested.
*
* @param policyName Name of the shared access key policy.
* @param sharedAccessKey Value of the shared access key.
* @param tokenValidity The duration for which the shared access signature is valid.
* @throws IllegalArgumentException if {@code policyName}, {@code sharedAccessKey} is an empty string. Or the
* duration of {@code tokenValidity} is zero or a negative value. If the {@code sharedAccessKey} is an invalid
* value for the hashing algorithm.
* @throws NullPointerException if {@code policyName}, {@code sharedAccessKey}, or {@code tokenValidity} is
* null.
* @throws UnsupportedOperationException If the hashing algorithm cannot be instantiated, which is used to generate
* the shared access signatures.
*/
public EventHubSharedKeyCredential(String policyName, String sharedAccessKey, Duration tokenValidity) {
Objects.requireNonNull(sharedAccessKey, "'sharedAccessKey' cannot be null.");
this.policyName = Objects.requireNonNull(policyName, "'sharedAccessKey' cannot be null.");
this.tokenValidity = Objects.requireNonNull(tokenValidity, "'tokenValidity' cannot be null.");
if (policyName.isEmpty()) {
throw new IllegalArgumentException("'policyName' cannot be an empty string.");
} else if (sharedAccessKey.isEmpty()) {
throw new IllegalArgumentException("'sharedAccessKey' cannot be an empty string.");
} else if (tokenValidity.isZero() || tokenValidity.isNegative()) {
throw new IllegalArgumentException("'tokenTimeToLive' has to positive and in the order-of seconds");
}
final byte[] sasKeyBytes = sharedAccessKey.getBytes(UTF_8);
secretKeySpec = new SecretKeySpec(sasKeyBytes, HASH_ALGORITHM);
sharedAccessSignature = null;
}
/**
* Creates an instance using the provided Shared Access Signature (SAS) string. The credential created using this
* constructor will not be refreshed. The expiration time is set to the time defined in "se={
* tokenValidationSeconds}`. If the SAS string does not contain this or is in invalid format, then the token
* expiration will be set to {@link OffsetDateTime#MAX max duration}.
* See how to generate SAS
* programmatically.
*
* @param sharedAccessSignature The base64 encoded shared access signature string.
* @throws NullPointerException if {@code sharedAccessSignature} is null.
*/
public EventHubSharedKeyCredential(String sharedAccessSignature) {
this.sharedAccessSignature = Objects.requireNonNull(sharedAccessSignature,
"'sharedAccessSignature' cannot be null");
this.policyName = null;
this.secretKeySpec = null;
this.tokenValidity = null;
}
/**
* Retrieves the token, given the audience/resources requested, for use in authorization against an Event Hubs
* namespace or a specific Event Hub instance.
*
* @param request The details of a token request
* @return A Mono that completes and returns the shared access signature.
* @throws IllegalArgumentException if {@code scopes} does not contain a single value, which is the token
* audience.
*/
@Override
public Mono getToken(TokenRequestContext request) {
if (request.getScopes().size() != 1) {
throw LOGGER.logExceptionAsError(new IllegalArgumentException(
"'scopes' should only contain a single argument that is the token audience or resource name."));
}
return Mono.fromCallable(() -> generateSharedAccessSignature(request.getScopes().get(0)));
}
private AccessToken generateSharedAccessSignature(final String resource) throws UnsupportedEncodingException {
if (CoreUtils.isNullOrEmpty(resource)) {
throw LOGGER.logExceptionAsError(new IllegalArgumentException("resource cannot be empty"));
}
if (sharedAccessSignature != null) {
return new AccessToken(sharedAccessSignature, getExpirationTime(sharedAccessSignature));
}
final Mac hmac;
try {
hmac = Mac.getInstance(HASH_ALGORITHM);
hmac.init(secretKeySpec);
} catch (NoSuchAlgorithmException e) {
throw LOGGER.logExceptionAsError(new UnsupportedOperationException(
String.format("Unable to create hashing algorithm '%s'", HASH_ALGORITHM), e));
} catch (InvalidKeyException e) {
throw LOGGER.logExceptionAsError(new IllegalArgumentException(
"'sharedAccessKey' is an invalid value for the hashing algorithm.", e));
}
final String utf8Encoding = UTF_8.name();
final OffsetDateTime expiresOn = OffsetDateTime.now(ZoneOffset.UTC).plus(tokenValidity);
final String expiresOnEpochSeconds = Long.toString(expiresOn.toEpochSecond());
final String audienceUri = URLEncoder.encode(resource, utf8Encoding);
final String secretToSign = audienceUri + "\n" + expiresOnEpochSeconds;
final byte[] signatureBytes = hmac.doFinal(secretToSign.getBytes(utf8Encoding));
final String signature = Base64.getEncoder().encodeToString(signatureBytes);
final String token = String.format(Locale.US, SHARED_ACCESS_SIGNATURE_FORMAT,
audienceUri,
URLEncoder.encode(signature, utf8Encoding),
URLEncoder.encode(expiresOnEpochSeconds, utf8Encoding),
URLEncoder.encode(policyName, utf8Encoding));
return new AccessToken(token, expiresOn);
}
private OffsetDateTime getExpirationTime(String sharedAccessSignature) {
String[] parts = sharedAccessSignature.split("&");
return Arrays.stream(parts)
.map(part -> part.split("="))
.filter(pair -> pair.length == 2 && pair[0].equalsIgnoreCase("se"))
.findFirst()
.map(pair -> pair[1])
.map(expirationTimeStr -> {
try {
long epochSeconds = Long.parseLong(expirationTimeStr);
return Instant.ofEpochSecond(epochSeconds).atOffset(ZoneOffset.UTC);
} catch (NumberFormatException exception) {
LOGGER.verbose("Invalid expiration time format in the SAS token: {}. Falling back to max "
+ "expiration time.", expirationTimeStr);
return OffsetDateTime.MAX;
}
})
.orElse(OffsetDateTime.MAX);
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy