All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.cayenne.crypto.key.JceksKeySource Maven / Gradle / Ivy

There is a newer version: 5.0-M1
Show newest version
/*****************************************************************
 *   Licensed to the Apache Software Foundation (ASF) under one
 *  or more contributor license agreements.  See the NOTICE file
 *  distributed with this work for additional information
 *  regarding copyright ownership.  The ASF licenses this file
 *  to you under the Apache License, Version 2.0 (the
 *  "License"); you may not use this file except in compliance
 *  with the License.  You may obtain a copy of the License at
 *
 *    http://www.apache.org/licenses/LICENSE-2.0
 *
 *  Unless required by applicable law or agreed to in writing,
 *  software distributed under the License is distributed on an
 *  "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 *  KIND, either express or implied.  See the License for the
 *  specific language governing permissions and limitations
 *  under the License.
 ****************************************************************/
package org.apache.cayenne.crypto.key;

import java.io.IOException;
import java.io.InputStream;
import java.net.URL;
import java.security.Key;
import java.security.KeyStore;
import java.security.KeyStoreException;
import java.security.NoSuchAlgorithmException;
import java.security.cert.CertificateException;
import java.util.Map;
import java.util.concurrent.ConcurrentHashMap;
import java.util.concurrent.ConcurrentMap;

import org.apache.cayenne.crypto.CayenneCryptoException;
import org.apache.cayenne.crypto.CryptoConstants;
import org.apache.cayenne.di.Inject;

/**
 * A {@link KeySource} based on a Java "jceks" KeyStore. Uses
 * {@link CryptoConstants#KEYSTORE_URL} to locate the keystore and
 * {@link CryptoConstants#KEY_PASSWORD} to read the secret key.
 * 
 * @since 4.0
 */
public class JceksKeySource implements KeySource {

	// this is the only standard keystore type that supports storing secret keys
	private static final String JCEKS_KEYSTORE_TYPE = "jceks";
	private static final Key NULL_KEY = new Key() {

		private static final long serialVersionUID = 4755682444381893880L;

		@Override
		public String getFormat() {
			throw new UnsupportedOperationException();
		}

		@Override
		public byte[] getEncoded() {
			throw new UnsupportedOperationException();
		}

		@Override
		public String getAlgorithm() {
			throw new UnsupportedOperationException();
		}
	};

	private KeyStore keyStore;
	private char[] keyPassword;
	private String defaultKeyAlias;

	// caching the keys may not be a good idea for security reasons, but
	// re-reading the key from KeyStore for every select row creates a huge
	// bottleneck... And considering we are caching keystore password, it
	// probably doesn't make things that much worse
	private ConcurrentMap keyCache;

	public JceksKeySource(@Inject(CryptoConstants.PROPERTIES_MAP) Map properties,
			@Inject(CryptoConstants.CREDENTIALS_MAP) Map credentials) {

		String keyStoreUrl = properties.get(CryptoConstants.KEYSTORE_URL);
		if (keyStoreUrl == null) {
			throw new CayenneCryptoException("KeyStore URL is not set. Property name: " + CryptoConstants.KEYSTORE_URL);
		}

		this.keyPassword = credentials.get(CryptoConstants.KEY_PASSWORD);
		// NULL password is valid, though not secure .. so no NULL validation

		try {
			this.keyStore = createKeyStore(keyStoreUrl);
		} catch (Exception e) {
			throw new CayenneCryptoException("Error loading keystore at " + keyStoreUrl, e);
		}

		this.defaultKeyAlias = properties.get(CryptoConstants.ENCRYPTION_KEY_ALIAS);
		if (defaultKeyAlias == null) {
			throw new CayenneCryptoException("Default key alias is not set. Property name: "
					+ CryptoConstants.ENCRYPTION_KEY_ALIAS);
		}

		this.keyCache = new ConcurrentHashMap<>();
	}

	private KeyStore createKeyStore(String keyStoreUrl) throws KeyStoreException, IOException,
			NoSuchAlgorithmException, CertificateException {

		KeyStore keyStore = KeyStore.getInstance(JCEKS_KEYSTORE_TYPE);

		URL url = new URL(keyStoreUrl);

		try (InputStream in = url.openStream();) {
			keyStore.load(in, null);
		}

		return keyStore;
	}

	@Override
	public Key getKey(String alias) {

		Key key = keyCache.get(alias);
		if (key == null) {

			Key newKey = createKey(alias);
			Key oldKey = keyCache.putIfAbsent(alias, newKey);
			key = oldKey != null ? oldKey : newKey;
		}

		return key == NULL_KEY ? null : key;
	}

	protected Key createKey(String alias) {
		try {
			Key key = keyStore.getKey(alias, keyPassword);
			return key != null ? key : NULL_KEY;
		} catch (Exception e) {
			throw new CayenneCryptoException("Error accessing key for alias: " + alias, e);
		}
	}

	@Override
	public String getDefaultKeyAlias() {
		return defaultKeyAlias;
	}
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy