All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.unboundid.util.PasswordFileReader Maven / Gradle / Ivy

/*
 * Copyright 2019-2022 Ping Identity Corporation
 * All Rights Reserved.
 */
/*
 * Copyright 2019-2022 Ping Identity Corporation
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *    http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
/*
 * Copyright (C) 2019-2022 Ping Identity Corporation
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License (GPLv2 only)
 * or the terms of the GNU Lesser General Public License (LGPLv2.1 only)
 * as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, see .
 */
package com.unboundid.util;



import java.io.BufferedReader;
import java.io.File;
import java.io.FileInputStream;
import java.io.InputStream;
import java.io.IOException;
import java.io.InputStreamReader;
import java.io.PrintStream;
import java.security.GeneralSecurityException;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Collections;
import java.util.List;
import java.util.concurrent.CopyOnWriteArrayList;

import com.unboundid.ldap.sdk.LDAPException;
import com.unboundid.ldap.sdk.ResultCode;
import com.unboundid.ldap.sdk.unboundidds.tools.ToolUtils;

import static com.unboundid.util.UtilityMessages.*;



/**
 * This class provides a mechanism for reading a password from a file.  Password
 * files must contain exactly one line, which must be non-empty, and the entire
 * content of that line will be used as the password.
 * 

* The contents of the file may have optionally been encrypted with the * {@link PassphraseEncryptedOutputStream}, and may have optionally been * compressed with the {@code GZIPOutputStream}. If the data is both compressed * and encrypted, then it must have been compressed before it was encrypted, so * that it is necessary to decrypt the data before it can be decompressed. *

* If the file is encrypted, then the encryption key may be obtained in one of * the following ways: *
    *
  • If this code is running in a tool that is part of a Ping Identity * Directory Server installation (or a related product like the Directory * Proxy Server or Data Synchronization Server, or an alternately branded * version of these products, like the Alcatel-Lucent or Nokia 8661 * versions), and the file was encrypted with a key from that server's * encryption settings database, then the tool will try to get the * key from the corresponding encryption settings definition. In many * cases, this may not require any interaction from the user at all.
  • *
  • The reader maintains a cache of passwords that have been previously * used. If the same password is used to encrypt multiple files, it may * only need to be requested once from the user. The caller can also * manually add passwords to this cache if they are known in advance.
  • *
  • The user can be interactively prompted for the password.
  • *
*/ @ThreadSafety(level=ThreadSafetyLevel.NOT_THREADSAFE) public final class PasswordFileReader { // Indicates whether to allow interactively prompting for a passphrase if the // specified file is encrypted and the key cannot be automatically obtained. private final boolean allowPromptingForPassphrase; // A list of passwords that will be tried as encryption keys if an encrypted // password file is encountered. @NotNull private final CopyOnWriteArrayList encryptionPasswordCache; // The print stream that should be used as standard output of an encrypted // password file is encountered and it is necessary to prompt for the password // used as the encryption key. @NotNull private final PrintStream standardError; // The print stream that should be used as standard output of an encrypted // password file is encountered and it is necessary to prompt for the password // used as the encryption key. @NotNull private final PrintStream standardOutput; /** * Creates a new instance of this password file reader. The JVM-default * standard output and error streams will be used if it is necessary to * interactively prompt the user for an encryption passphrase. */ public PasswordFileReader() { this(true); } /** * Creates a new instance of this password file reader. The JVM-default * standard output and error streams will be used if it is necessary to * interactively prompt the user for an encryption passphrase. * * @param allowPromptingForPassphrase * Indicates whether to allow interactively prompting the end * user for the encryption passphrase if the file is encrypted * and the key cannot be automatically obtained (for example, * from a Ping Identity server's encryption settings database). */ public PasswordFileReader(final boolean allowPromptingForPassphrase) { this(System.out, System.err, allowPromptingForPassphrase); } /** * Creates a new instance of this password file reader using the specified * output and error streams if it is necessary to interactively prompt the * user for an encryption passphrase. * * @param standardOutput The print stream that should be used as standard * output if an encrypted password file is encountered * and it is necessary to prompt for the password * used as the encryption key. This must not be * {@code null}. * @param standardError The print stream that should be used as standard * error if an encrypted password file is encountered * and it is necessary to prompt for the password * used as the encryption key. This must not be * {@code null}. */ public PasswordFileReader(@NotNull final PrintStream standardOutput, @NotNull final PrintStream standardError) { this(standardOutput, standardError, true); } /** * Creates a new instance of this password file reader. * * @param standardOutput * The print stream that should be used as standard output if an * encrypted password file is encountered and it is necessary to * prompt for the password used as the encryption key. This must * not be {@code null}, but the provided stream will not be used * if the tool should not (or does not need to) prompt for an * encryption passphrase. * @param standardError * The print stream that should be used as standard error if an * encrypted password file is encountered and it is necessary to * prompt for the password used as the encryption key. This must * not be {@code null}, but the provided stream will not be used * if the tool should not (or does not need to) prompt for an * encryption passphrase. * @param allowPromptingForPassphrase * Indicates whether to allow interactively prompting the end * user for the encryption passphrase if the file is encrypted * and the key cannot be automatically obtained (for example, * from a Ping Identity server's encryption settings database). */ private PasswordFileReader(@NotNull final PrintStream standardOutput, @NotNull final PrintStream standardError, final boolean allowPromptingForPassphrase) { Validator.ensureNotNullWithMessage(standardOutput, "PasswordFileReader.standardOutput must not be null."); Validator.ensureNotNullWithMessage(standardError, "PasswordFileReader.standardError must not be null."); this.standardOutput = standardOutput; this.standardError = standardError; this.allowPromptingForPassphrase = allowPromptingForPassphrase; encryptionPasswordCache = new CopyOnWriteArrayList<>(); } /** * Attempts to read a password from the specified file. * * @param path The path to the file from which the password should be read. * It must not be {@code null}, and the file must exist. * * @return The characters that comprise the password read from the specified * file. * * @throws IOException If a problem is encountered while trying to read the * password from the file. * * @throws LDAPException If the file does not exist, if it does not contain * exactly one line, or if that line is empty. */ @NotNull() public char[] readPassword(@NotNull final String path) throws IOException, LDAPException { return readPassword(new File(path)); } /** * Attempts to read a password from the specified file. * * @param file The path file from which the password should be read. It * must not be {@code null}, and the file must exist. * * @return The characters that comprise the password read from the specified * file. * * @throws IOException If a problem is encountered while trying to read the * password from the file. * * @throws LDAPException If the file does not exist, if it does not contain * exactly one line, or if that line is empty. */ @NotNull() public char[] readPassword(@NotNull final File file) throws IOException, LDAPException { if (! file.exists()) { throw new IOException(ERR_PW_FILE_READER_FILE_MISSING.get( file.getAbsolutePath())); } if (! file.isFile()) { throw new IOException(ERR_PW_FILE_READER_FILE_NOT_FILE.get( file.getAbsolutePath())); } InputStream inputStream = new FileInputStream(file); try { try { if (allowPromptingForPassphrase) { final ObjectPair encryptedFileData = ToolUtils.getPossiblyPassphraseEncryptedInputStream(inputStream, encryptionPasswordCache, true, INFO_PW_FILE_READER_ENTER_PW_PROMPT .get(file.getAbsolutePath()), ERR_PW_FILE_READER_WRONG_PW.get(file.getAbsolutePath()), standardOutput, standardError); inputStream = encryptedFileData.getFirst(); final char[] encryptionPassword = encryptedFileData.getSecond(); if (encryptionPassword != null) { synchronized (encryptionPasswordCache) { boolean passwordIsAlreadyCached = false; for (final char[] cachedPassword : encryptionPasswordCache) { if (Arrays.equals(encryptionPassword, cachedPassword)) { passwordIsAlreadyCached = true; break; } } if (!passwordIsAlreadyCached) { encryptionPasswordCache.add(encryptionPassword); } } } } else { inputStream = ToolUtils.getPossiblyPassphraseEncryptedInputStream(inputStream); } } catch (final GeneralSecurityException e) { Debug.debugException(e); throw new IOException(e); } inputStream = ToolUtils.getPossiblyGZIPCompressedInputStream(inputStream); try (BufferedReader reader = new BufferedReader(new InputStreamReader(inputStream))) { final String passwordLine = reader.readLine(); if (passwordLine == null) { throw new LDAPException(ResultCode.PARAM_ERROR, ERR_PW_FILE_READER_FILE_EMPTY.get(file.getAbsolutePath())); } final String secondLine = reader.readLine(); if (secondLine != null) { throw new LDAPException(ResultCode.PARAM_ERROR, ERR_PW_FILE_READER_FILE_HAS_MULTIPLE_LINES.get( file.getAbsolutePath())); } if (passwordLine.isEmpty()) { throw new LDAPException(ResultCode.PARAM_ERROR, ERR_PW_FILE_READER_FILE_HAS_EMPTY_LINE.get( file.getAbsolutePath())); } return passwordLine.toCharArray(); } } finally { try { inputStream.close(); } catch (final Exception e) { Debug.debugException(e); } } } /** * Retrieves a list of the encryption passwords currently held in the cache. * * @return A list of the encryption passwords currently held in the cache, or * an empty list if there are no cached passwords. */ @NotNull() public List getCachedEncryptionPasswords() { final ArrayList cacheCopy; synchronized (encryptionPasswordCache) { cacheCopy = new ArrayList<>(encryptionPasswordCache.size()); for (final char[] cachedPassword : encryptionPasswordCache) { cacheCopy.add(Arrays.copyOf(cachedPassword, cachedPassword.length)); } } return Collections.unmodifiableList(cacheCopy); } /** * Adds the provided password to the cache of passwords that will be tried as * potential encryption keys if an encrypted password file is encountered. * * @param encryptionPassword A password to add to the cache of passwords * that will be tried as potential encryption keys * if an encrypted password file is encountered. * It must not be {@code null} or empty. */ public void addToEncryptionPasswordCache( @NotNull final String encryptionPassword) { addToEncryptionPasswordCache(encryptionPassword.toCharArray()); } /** * Adds the provided password to the cache of passwords that will be tried as * potential encryption keys if an encrypted password file is encountered. * * @param encryptionPassword A password to add to the cache of passwords * that will be tried as potential encryption keys * if an encrypted password file is encountered. * It must not be {@code null} or empty. */ public void addToEncryptionPasswordCache( @NotNull final char[] encryptionPassword) { Validator.ensureNotNullWithMessage(encryptionPassword, "PasswordFileReader.addToEncryptionPasswordCache.encryptionPassword " + "must not be null or empty."); Validator.ensureTrue((encryptionPassword.length > 0), "PasswordFileReader.addToEncryptionPasswordCache.encryptionPassword " + "must not be null or empty."); synchronized (encryptionPasswordCache) { for (final char[] cachedPassword : encryptionPasswordCache) { if (Arrays.equals(cachedPassword, encryptionPassword)) { return; } } encryptionPasswordCache.add(encryptionPassword); } } /** * Clears the cache of passwords that will be tried as potential encryption * keys if an encrypted password file is encountered. * * @param zeroArrays Indicates whether to zero out the contents of the * cached passwords before clearing them. If this is * {@code true}, then all of the backing arrays for the * cached passwords will be overwritten with all null * characters to erase the original passwords from memory. */ public void clearEncryptionPasswordCache(final boolean zeroArrays) { synchronized (encryptionPasswordCache) { if (zeroArrays) { for (final char[] cachedPassword : encryptionPasswordCache) { Arrays.fill(cachedPassword, '\u0000'); } } encryptionPasswordCache.clear(); } } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy