All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.jclouds.googlecomputeengine.compute.functions.ResetWindowsPassword Maven / Gradle / Ivy

There is a newer version: 2.6.0
Show newest version
/*
 * Licensed to the Apache Software Foundation (ASF) under one or more
 * contributor license agreements.  See the NOTICE file distributed with
 * this work for additional information regarding copyright ownership.
 * The ASF licenses this file to You under the Apache License, Version 2.0
 * (the "License"); you may not use this file except in compliance with
 * the License.  You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package org.jclouds.googlecomputeengine.compute.functions;

import static com.google.common.base.Predicates.notNull;
import static com.google.common.collect.Iterables.filter;
import static com.google.common.collect.Iterables.transform;
import static com.google.common.collect.Iterables.tryFind;

import java.math.BigInteger;
import java.nio.charset.Charset;
import java.security.InvalidKeyException;
import java.security.KeyFactory;
import java.security.KeyPair;
import java.security.NoSuchAlgorithmException;
import java.security.spec.InvalidKeySpecException;
import java.security.spec.RSAPublicKeySpec;
import java.text.SimpleDateFormat;
import java.util.Arrays;
import java.util.Date;
import java.util.List;
import java.util.Map;
import java.util.TimeZone;
import java.util.concurrent.TimeUnit;
import java.util.concurrent.atomic.AtomicReference;

import javax.annotation.Resource;
import javax.crypto.BadPaddingException;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.NoSuchPaddingException;
import javax.inject.Inject;
import javax.inject.Named;

import org.jclouds.compute.reference.ComputeServiceConstants;
import org.jclouds.crypto.Crypto;
import org.jclouds.googlecomputeengine.GoogleComputeEngineApi;
import org.jclouds.googlecomputeengine.domain.Instance;
import org.jclouds.googlecomputeengine.domain.Instance.SerialPortOutput;
import org.jclouds.googlecomputeengine.domain.Metadata;
import org.jclouds.googlecomputeengine.domain.Operation;
import org.jclouds.googlecomputeengine.features.InstanceApi;
import org.jclouds.json.Json;
import org.jclouds.logging.Logger;
import org.jclouds.util.Predicates2;

import com.google.common.base.Function;
import com.google.common.base.Optional;
import com.google.common.base.Predicate;
import com.google.common.base.Splitter;
import com.google.common.base.Throwables;
import com.google.common.collect.ImmutableMap;
import com.google.common.io.BaseEncoding;
import com.google.common.util.concurrent.Atomics;
import com.google.gson.GsonBuilder;
import com.google.inject.TypeLiteral;

/**
 * References:
 * 
 * 
 * In brief, the sequence is:
 * 
    *
  1. Generate a temporary key for encrypting and decrypting the password *
  2. Send the RSA public key to the instance, by settings its metadata *
  3. Retrieve the result from the {@link SerialPortOutput} *
  4. Decode and decrypt the result. *
*/ public class ResetWindowsPassword implements Function, String> { /** * Indicates when the key should expire. Keys are one-time use, so the metadata doesn't need to stay around for long. * 10 minutes chosen to allow for differences between time on the client * and time on the server. */ private static final long EXPIRE_DURATION = 10 * 60 * 1000; @Resource @Named(ComputeServiceConstants.COMPUTE_LOGGER) protected Logger logger = Logger.NULL; private final GoogleComputeEngineApi api; private final Crypto crypto; private final Predicate> operationDone; private final Json json; @Inject protected ResetWindowsPassword(GoogleComputeEngineApi api, Crypto crypto, Predicate> operationDone, Json json) { this.api = api; this.crypto = crypto; this.operationDone = operationDone; this.json = json; } @Override public String apply(Map params) { String zone = (String)params.get("zone"); final AtomicReference instance = (AtomicReference)params.get("instance"); String userName = (String)params.get("userName"); String email = (String)params.get("email"); // Generate the public/private key pair for encryption and decryption. // TODO do we need to explicitly set 2048 bits? Presumably "RSA" is implicit KeyPair keys = crypto.rsaKeyPairGenerator().genKeyPair(); // Update instance's metadata with new "windows-keys" entry, and wait for operation to // complete. logger.debug("Generating windows key for instance %s, by updating metadata", instance.get().name()); final InstanceApi instanceApi = api.instancesInZone(zone); Metadata metadata = instance.get().metadata(); try { // If disableHtmlEscaping is not there, == will be escaped from modulus value metadata.put("windows-keys", new GsonBuilder().disableHtmlEscaping().create().toJson(extractKeyMetadata(keys, userName, email))); } catch (NoSuchAlgorithmException e) { Throwables.propagate(e); } catch (InvalidKeySpecException e) { Throwables.propagate(e); } AtomicReference operation = Atomics.newReference(instanceApi.setMetadata(instance.get().name(), metadata)); operationDone.apply(operation); if (operation.get().httpErrorStatusCode() != null) { logger.warn("Generating windows key for %s failed. Http Error Code: %d HttpError: %s", operation.get().targetId(), operation.get().httpErrorStatusCode(), operation.get().httpErrorMessage()); } try { final AtomicReference encryptedPassword = Atomics.newReference(); boolean passwordRetrieved = Predicates2.retry(new Predicate() { public boolean apply(Instance instance) { String serialPortContents = instanceApi.getSerialPortOutput(instance.name(), 4).contents(); List contentEntries = Splitter.on('\n').splitToList(serialPortContents); Optional retrievedPassword = tryFind( filter(transform(contentEntries, deserializeSerialOutput(json)), notNull()), HasEncryptedPassword) .transform(ExtractEncryptedPassword); if (retrievedPassword.isPresent()) { encryptedPassword.set(retrievedPassword.get()); } return retrievedPassword.isPresent(); } // Notice that timeoutDuration should be less than EXPIRE_DURATION }, 10 * 60, 30, TimeUnit.SECONDS).apply(instance.get()); if (passwordRetrieved) { return decryptPassword(encryptedPassword.get(), keys); } else { throw new IllegalStateException("Did not find the encrypted password in the serial port output"); } } catch (Exception e) { throw Throwables.propagate(e); } } private static Function> deserializeSerialOutput(final Json json) { return new Function>() { @Override public Map apply(String input) { try { return json.fromJson(input, new TypeLiteral>() { }.getType()); } catch (Exception ex) { return null; } } }; } private static final Predicate> HasEncryptedPassword = new Predicate>() { @Override public boolean apply(Map input) { return input.containsKey("encryptedPassword"); } }; private static final Function, String> ExtractEncryptedPassword = new Function, String>() { @Override public String apply(Map input) { return (String) input.get("encryptedPassword"); } }; /** * Decrypts the given password - the encrypted text is base64-encoded. * As per the GCE docs, assumes it was encrypted with algorithm "RSA/NONE/OAEPPadding", and UTF-8. */ protected String decryptPassword(String message, KeyPair keys) throws InvalidKeyException, IllegalBlockSizeException, BadPaddingException { Cipher cipher; try { // Assumes user has configured appropriate crypto guice module. cipher = crypto.cipher("RSA/NONE/OAEPPadding"); } catch (NoSuchAlgorithmException e) { throw new RuntimeException("Problem finding cypher. Try adding bouncycastle dependency.", e); } catch (NoSuchPaddingException e) { throw new RuntimeException("Problem finding cypher. Try adding bouncycastle dependency.", e); } // Add the private key for decryption. cipher.init(Cipher.DECRYPT_MODE, keys.getPrivate()); // Decrypt the text. byte[] rawMessage = BaseEncoding.base64().decode(message); byte[] decryptedText = cipher.doFinal(rawMessage); // The password was encoded using UTF8. Transform into string. return new String(decryptedText, Charset.forName("UTF-8")); } /** * Generates the metadata value for this keypair. * Extracts the public key's the RSA spec's modulus and exponent, encoded as Base-64, and * an expires date. * * @param pair * @return * @throws NoSuchAlgorithmException * @throws InvalidKeySpecException */ protected Map extractKeyMetadata(KeyPair pair, String userName, String email) throws NoSuchAlgorithmException, InvalidKeySpecException { KeyFactory factory = crypto.rsaKeyFactory(); RSAPublicKeySpec pubSpec = factory.getKeySpec(pair.getPublic(), RSAPublicKeySpec.class); BigInteger modulus = pubSpec.getModulus(); BigInteger exponent = pubSpec.getPublicExponent(); // Strip out the leading 0 byte in the modulus. byte[] modulusArr = Arrays.copyOfRange(modulus.toByteArray(), 1, modulus.toByteArray().length); String modulusString = BaseEncoding.base64().encode(modulusArr).replaceAll("\n", ""); String exponentString = BaseEncoding.base64().encode(exponent.toByteArray()).replaceAll("\n", ""); // Create the expire date, formatted as rfc3339 Date expireDate = new Date(System.currentTimeMillis() + EXPIRE_DURATION); SimpleDateFormat rfc3339Format = new SimpleDateFormat("yyyy-MM-dd'T'HH:mm:ss'Z'"); rfc3339Format.setTimeZone(TimeZone.getTimeZone("UTC")); String expireString = rfc3339Format.format(expireDate); return ImmutableMap.builder() .put("modulus", modulusString) .put("exponent", exponentString) .put("expireOn", expireString) .put("userName", userName) .put("email", email) // email of the user should be here. Now it is the username. .build(); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy