All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.opensearch.common.settings.SecureSetting Maven / Gradle / Ivy

There is a newer version: 2.18.0
Show newest version
/*
 * SPDX-License-Identifier: Apache-2.0
 *
 * The OpenSearch Contributors require contributions made to
 * this file be licensed under the Apache-2.0 license or a
 * compatible open source license.
 */

/*
 * Licensed to Elasticsearch under one or more contributor
 * license agreements. See the NOTICE file distributed with
 * this work for additional information regarding copyright
 * ownership. Elasticsearch licenses this file to you under
 * the Apache License, Version 2.0 (the "License"); you may
 * not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing,
 * software distributed under the License is distributed on an
 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 * KIND, either express or implied.  See the License for the
 * specific language governing permissions and limitations
 * under the License.
 */

/*
 * Modifications Copyright OpenSearch Contributors. See
 * GitHub history for details.
 */

package org.opensearch.common.settings;

import org.apache.logging.log4j.LogManager;
import org.apache.logging.log4j.Logger;
import org.opensearch.common.Booleans;
import org.opensearch.common.util.ArrayUtils;
import org.opensearch.core.common.settings.SecureString;

import java.io.InputStream;
import java.security.GeneralSecurityException;
import java.util.EnumSet;
import java.util.Set;

/**
 * A secure setting.
 * 

* This class allows access to settings from the OpenSearch keystore. * * @opensearch.internal */ public abstract class SecureSetting extends Setting { /** Determines whether legacy settings with sensitive values should be allowed. */ private static final boolean ALLOW_INSECURE_SETTINGS = Booleans.parseBoolean( System.getProperty("opensearch.allow_insecure_settings", "false") ); private static final Set ALLOWED_PROPERTIES = EnumSet.of(Property.Deprecated, Property.Consistent); private static final Property[] FIXED_PROPERTIES = { Property.NodeScope }; private SecureSetting(String key, Property... properties) { super(key, (String) null, null, ArrayUtils.concat(properties, FIXED_PROPERTIES, Property.class)); assert assertAllowedProperties(properties); KeyStoreWrapper.validateSettingName(key); } private boolean assertAllowedProperties(Setting.Property... properties) { for (Setting.Property property : properties) { if (ALLOWED_PROPERTIES.contains(property) == false) { return false; } } return true; } @Override public String getDefaultRaw(Settings settings) { throw new UnsupportedOperationException("secure settings are not strings"); } @Override public T getDefault(Settings settings) { throw new UnsupportedOperationException("secure settings are not strings"); } @Override String innerGetRaw(final Settings settings) { throw new UnsupportedOperationException("secure settings are not strings"); } @Override public boolean exists(Settings settings) { final SecureSettings secureSettings = settings.getSecureSettings(); return secureSettings != null && secureSettings.getSettingNames().contains(getKey()); } @Override public T get(Settings settings) { checkDeprecation(settings); final SecureSettings secureSettings = settings.getSecureSettings(); if (secureSettings == null || secureSettings.getSettingNames().contains(getKey()) == false) { if (super.exists(settings)) { throw new IllegalArgumentException( "Setting [" + getKey() + "] is a secure setting" + " and must be stored inside the OpenSearch keystore, but was found inside opensearch.yml" ); } return getFallback(settings); } try { return getSecret(secureSettings); } catch (GeneralSecurityException e) { throw new RuntimeException("failed to read secure setting " + getKey(), e); } } /** * Returns the digest of this secure setting's value or {@code null} if the setting is missing (inside the keystore). This method can be * called even after the {@code SecureSettings} have been closed, unlike {@code #get(Settings)}. The digest is used to check for changes * of the value (by re-reading the {@code SecureSettings}), without actually transmitting the value to compare with. */ public byte[] getSecretDigest(Settings settings) { final SecureSettings secureSettings = settings.getSecureSettings(); if (secureSettings == null || false == secureSettings.getSettingNames().contains(getKey())) { return null; } try { return secureSettings.getSHA256Digest(getKey()); } catch (GeneralSecurityException e) { throw new RuntimeException("failed to read secure setting " + getKey(), e); } } /** Returns the secret setting from the keyStoreReader store. */ abstract T getSecret(SecureSettings secureSettings) throws GeneralSecurityException; /** Returns the value from a fallback setting. Returns null if no fallback exists. */ abstract T getFallback(Settings settings); // TODO: override toXContent /** * Overrides the diff operation to make this a no-op for secure settings as they shouldn't be returned in a diff */ @Override public void diff(Settings.Builder builder, Settings source, Settings defaultSettings) {} /** * A setting which contains a sensitive string. *

* This may be any sensitive string, e.g. a username, a password, an auth token, etc. */ public static Setting secureString(String name, Setting fallback, Property... properties) { return new SecureStringSetting(name, fallback, properties); } /** * A setting which contains a sensitive string, but which for legacy reasons must be found outside secure settings. * @see #secureString(String, Setting, Property...) */ public static Setting insecureString(String name) { return insecureString(name, null, false); } /** * A setting which contains a sensitive string, but usage is logged when found outside secure settings, regardless * of the opensearch.allow_insecure_settings value. Typically. this is used when migrating old legacy settings * to secure variants while preserving existing functionality. * @see #insecureString(String) */ public static Setting insecureString(String name, String secureName, boolean allowWithWarning) { return new InsecureStringSetting(name, secureName, allowWithWarning); } /** * A setting which contains a file. Reading the setting opens an input stream to the file. *

* This may be any sensitive file, e.g. a set of credentials normally in plaintext. */ public static Setting secureFile(String name, Setting fallback, Property... properties) { return new SecureFileSetting(name, fallback, properties); } /** * Setting for a secure string * * @opensearch.internal */ private static class SecureStringSetting extends SecureSetting { private final Setting fallback; private SecureStringSetting(String name, Setting fallback, Property... properties) { super(name, properties); this.fallback = fallback; } @Override protected SecureString getSecret(SecureSettings secureSettings) throws GeneralSecurityException { return secureSettings.getString(getKey()); } @Override SecureString getFallback(Settings settings) { if (fallback != null) { return fallback.get(settings); } return new SecureString(new char[0]); // this means "setting does not exist" } } /** * An insecure string setting * * @opensearch.internal */ private static class InsecureStringSetting extends Setting { private static final Logger LOG = LogManager.getLogger(InsecureStringSetting.class); private final String name; private final String secureName; private final boolean allowWithWarning; private boolean warningLogged; private InsecureStringSetting(String name, String secureName, boolean allowWithWarning) { super(name, "", SecureString::new, Property.Deprecated, Property.Filtered, Property.NodeScope); this.name = name; this.secureName = secureName; this.allowWithWarning = allowWithWarning; } @Override public SecureString get(Settings settings) { if (exists(settings)) { logUsage(); if (ALLOW_INSECURE_SETTINGS == false && this.allowWithWarning == false) { throw new IllegalArgumentException( "Setting [" + name + "] is insecure, " + "but property [allow_insecure_settings] is not set" ); } } return super.get(settings); } private synchronized void logUsage() { if (!this.warningLogged) { LOG.warn("Setting [{}] is insecure, but a secure variant [{}] is advised to be used instead", this.name, this.secureName); this.warningLogged = true; } } } /** * A secure file setting * * @opensearch.internal */ private static class SecureFileSetting extends SecureSetting { private final Setting fallback; private SecureFileSetting(String name, Setting fallback, Property... properties) { super(name, properties); this.fallback = fallback; } @Override protected InputStream getSecret(SecureSettings secureSettings) throws GeneralSecurityException { return secureSettings.getFile(getKey()); } @Override InputStream getFallback(Settings settings) { if (fallback != null) { return fallback.get(settings); } return null; } } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy