/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.solr.security; import java.lang.invoke.MethodHandles; import java.nio.charset.StandardCharsets; import java.security.MessageDigest; import java.security.NoSuchAlgorithmException; import java.security.SecureRandom; import java.util.Collections; import java.util.LinkedHashMap; import java.util.List; import java.util.Map; import java.util.Random; import java.util.Set; import com.google.common.collect.ImmutableSet; import org.apache.commons.codec.binary.Base64; import org.apache.solr.common.util.CommandOperation; import org.apache.solr.common.util.ValidatingJsonMap; import org.apache.solr.api.ApiBag; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import static org.apache.solr.handler.admin.SecurityConfHandler.getMapValue; public class Sha256AuthenticationProvider implements ConfigEditablePlugin, BasicAuthPlugin.AuthenticationProvider { private Map<String, String> credentials; private String realm; private Map<String, String> promptHeader; private static final Logger log = LoggerFactory.getLogger(MethodHandles.lookup().lookupClass()); static void putUser(String user, String pwd, Map credentials) { if (user == null || pwd == null) return; String val = getSaltedHashedValue(pwd); credentials.put(user, val); } public static String getSaltedHashedValue(String pwd) { final Random r = new SecureRandom(); byte[] salt = new byte[32]; r.nextBytes(salt); String saltBase64 = Base64.encodeBase64String(salt); String val = sha256(pwd, saltBase64) + " " + saltBase64; return val; } @Override public void init(Map<String, Object> pluginConfig) { if (pluginConfig.get("realm") != null) this.realm = (String) pluginConfig.get("realm"); else this.realm = "solr"; promptHeader = Collections.unmodifiableMap(Collections.singletonMap("WWW-Authenticate", "Basic realm=\"" + realm + "\"")); credentials = new LinkedHashMap<>(); Map<String,String> users = (Map<String,String>) pluginConfig.get("credentials"); if (users == null) { log.debug("No users configured yet"); return; } for (Map.Entry<String, String> e : users.entrySet()) { String v = e.getValue(); if (v == null) { log.warn("user has no password " + e.getKey()); continue; } credentials.put(e.getKey(), v); } } public boolean authenticate(String username, String password) { String cred = credentials.get(username); if (cred == null || cred.isEmpty()) return false; cred = cred.trim(); String salt = null; if (cred.contains(" ")) { String[] ss = cred.split(" "); if (ss.length > 1 && !ss[1].isEmpty()) { salt = ss[1]; cred = ss[0]; } } return cred.equals(sha256(password, salt)); } @Override public Map<String, String> getPromptHeaders() { return promptHeader; } public static String sha256(String password, String saltKey) { MessageDigest digest; try { digest = MessageDigest.getInstance("SHA-256"); } catch (NoSuchAlgorithmException e) { log.error(e.getMessage(), e); return null;//should not happen } if (saltKey != null) { digest.reset(); digest.update(Base64.decodeBase64(saltKey)); } byte[] btPass = digest.digest(password.getBytes(StandardCharsets.UTF_8)); digest.reset(); btPass = digest.digest(btPass); return Base64.encodeBase64String(btPass); } @Override public Map<String, Object> edit(Map<String, Object> latestConf, List<CommandOperation> commands) { for (CommandOperation cmd : commands) { if (!supported_ops.contains(cmd.name)) { cmd.unknownOperation(); return null; } if (cmd.hasError()) return null; if ("delete-user".equals(cmd.name)) { List<String> names = cmd.getStrs(""); Map map = (Map) latestConf.get("credentials"); if (map == null || !map.keySet().containsAll(names)) { cmd.addError("No such user(s) " +names ); return null; } for (String name : names) map.remove(name); return latestConf; } if ("set-user".equals(cmd.name) ) { Map map = getMapValue(latestConf, "credentials"); Map kv = cmd.getDataMap(); for (Object o : kv.entrySet()) { Map.Entry e = (Map.Entry) o; if(e.getKey() == null || e.getValue() == null){ cmd.addError("name and password must be non-null"); return null; } putUser(String.valueOf(e.getKey()), String.valueOf(e.getValue()), map); } } } return latestConf; } @Override public ValidatingJsonMap getSpec() { return ApiBag.getSpec("cluster.security.BasicAuth.Commands").getSpec(); } static final Set<String> supported_ops = ImmutableSet.of("set-user", "delete-user"); }