001/**
002 * Copyright (C) 2006-2019 Talend Inc. - www.talend.com
003 *
004 * Licensed under the Apache License, Version 2.0 (the "License");
005 * you may not use this file except in compliance with the License.
006 * You may obtain a copy of the License at
007 *
008 * http://www.apache.org/licenses/LICENSE-2.0
009 *
010 * Unless required by applicable law or agreed to in writing, software
011 * distributed under the License is distributed on an "AS IS" BASIS,
012 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
013 * See the License for the specific language governing permissions and
014 * limitations under the License.
015 */
016package org.talend.sdk.component.maven;
017
018import static java.util.Optional.ofNullable;
019
020import java.io.File;
021import java.io.FileInputStream;
022import java.io.IOException;
023import java.io.InputStream;
024import java.nio.charset.StandardCharsets;
025import java.security.MessageDigest;
026import java.util.Base64;
027import java.util.regex.Matcher;
028import java.util.regex.Pattern;
029
030import javax.crypto.Cipher;
031import javax.crypto.spec.IvParameterSpec;
032import javax.crypto.spec.SecretKeySpec;
033import javax.xml.parsers.ParserConfigurationException;
034import javax.xml.parsers.SAXParser;
035import javax.xml.parsers.SAXParserFactory;
036
037import org.xml.sax.Attributes;
038import org.xml.sax.SAXException;
039import org.xml.sax.helpers.DefaultHandler;
040
041import lombok.AllArgsConstructor;
042import lombok.Data;
043
044@Data
045@AllArgsConstructor
046public class MavenDecrypter {
047
048    private final File settings;
049
050    private final File settingsSecurity;
051
052    public MavenDecrypter() {
053        this(new File(getM2(), "settings.xml"), new File(getM2(), "settings-security.xml"));
054    }
055
056    public Server find(final String serverId) {
057        final SAXParserFactory saxParserFactory = SAXParserFactory.newInstance();
058        saxParserFactory.setNamespaceAware(false);
059        saxParserFactory.setValidating(false);
060        final SAXParser parser;
061        try {
062            parser = saxParserFactory.newSAXParser();
063        } catch (final ParserConfigurationException | SAXException e) {
064            throw new IllegalStateException(e);
065        }
066        if (!settings.exists()) {
067            throw new IllegalArgumentException(
068                    "No " + settings + " found, ensure your credentials configuration is valid");
069        }
070
071        final String master;
072        if (settingsSecurity.isFile()) {
073            final MvnMasterExtractor extractor = new MvnMasterExtractor();
074            try (final InputStream is = new FileInputStream(settingsSecurity)) {
075                parser.parse(is, extractor);
076            } catch (final IOException | SAXException e) {
077                throw new IllegalArgumentException(e);
078            }
079            master = extractor.current == null ? null : extractor.current.toString().trim();
080        } else {
081            master = null;
082        }
083
084        final MvnServerExtractor extractor = new MvnServerExtractor(master, serverId);
085        try (final InputStream is = new FileInputStream(settings)) {
086            parser.parse(is, extractor);
087        } catch (final IOException | SAXException e) {
088            throw new IllegalArgumentException(e);
089        }
090        if (extractor.server == null) {
091            throw new IllegalArgumentException("Didn't find " + serverId + " in " + settings);
092        }
093        return extractor.server;
094    }
095
096    private static File getM2() {
097        return ofNullable(System.getProperty("talend.maven.decrypter.m2.location"))
098                .map(File::new)
099                .orElseGet(() -> new File(System.getProperty("user.home"), ".m2"));
100    }
101
102    public static void main(final String[] args) {
103        System.out.println(new MavenDecrypter().find(args[0]));
104    }
105
106    private static class MvnServerExtractor extends DefaultHandler {
107
108        private static final Pattern ENCRYPTED_PATTERN = Pattern.compile(".*?[^\\\\]?\\{(.*?[^\\\\])\\}.*");
109
110        private final String passphrase;
111
112        private final String serverId;
113
114        private Server server;
115
116        private String encryptedPassword;
117
118        private boolean done;
119
120        private StringBuilder current;
121
122        private MvnServerExtractor(final String passphrase, final String serverId) {
123            this.passphrase = doDecrypt(passphrase, "settings.security");
124            this.serverId = serverId;
125        }
126
127        @Override
128        public void startElement(final String uri, final String localName, final String qName,
129                final Attributes attributes) {
130            if ("server".equalsIgnoreCase(qName)) {
131                if (!done) {
132                    server = new Server();
133                }
134            } else if (server != null) {
135                current = new StringBuilder();
136            }
137        }
138
139        @Override
140        public void characters(final char[] ch, final int start, final int length) {
141            if (current != null) {
142                current.append(new String(ch, start, length));
143            }
144        }
145
146        @Override
147        public void endElement(final String uri, final String localName, final String qName) {
148            if (done) {
149                // decrypt password only when the server is found
150                server.setPassword(doDecrypt(encryptedPassword, passphrase));
151                return;
152            }
153            if ("server".equalsIgnoreCase(qName)) {
154                if (server.getId().equals(serverId)) {
155                    done = true;
156                } else if (!done) {
157                    server = null;
158                    encryptedPassword = null;
159                }
160            } else if (server != null && current != null) {
161                switch (qName) {
162                case "id":
163                    server.setId(current.toString());
164                    break;
165                case "username":
166                    try {
167                        server.setUsername(doDecrypt(current.toString(), passphrase));
168                    } catch (final RuntimeException re) {
169                        server.setUsername(current.toString());
170                    }
171                    break;
172                case "password":
173                    encryptedPassword = current.toString();
174                    break;
175                default:
176                }
177                current = null;
178            }
179        }
180
181        private String doDecrypt(final String value, final String pwd) {
182            if (value == null) {
183                return null;
184            }
185
186            final Matcher matcher = ENCRYPTED_PATTERN.matcher(value);
187            if (!matcher.matches() && !matcher.find()) {
188                return value; // not encrypted, just use it
189            }
190
191            final String bare = matcher.group(1);
192            if (value.startsWith("${env.")) {
193                final String key = bare.substring("env.".length());
194                return ofNullable(System.getenv(key)).orElseGet(() -> System.getProperty(bare));
195            }
196            if (value.startsWith("${")) { // all is system prop, no interpolation yet
197                return System.getProperty(bare);
198            }
199
200            if (pwd == null || pwd.isEmpty()) {
201                throw new IllegalArgumentException("Master password can't be null or empty.");
202            }
203
204            if (bare.contains("[") && bare.contains("]") && bare.contains("type=")) {
205                throw new IllegalArgumentException("Unsupported encryption for " + value);
206            }
207
208            final byte[] allEncryptedBytes = Base64.getMimeDecoder().decode(bare);
209            final int totalLen = allEncryptedBytes.length;
210            final byte[] salt = new byte[8];
211            System.arraycopy(allEncryptedBytes, 0, salt, 0, 8);
212            final byte padLen = allEncryptedBytes[8];
213            final byte[] encryptedBytes = new byte[totalLen - 8 - 1 - padLen];
214            System.arraycopy(allEncryptedBytes, 8 + 1, encryptedBytes, 0, encryptedBytes.length);
215
216            try {
217                final MessageDigest digest = MessageDigest.getInstance("SHA-256");
218                byte[] keyAndIv = new byte[16 * 2];
219                byte[] result;
220                int currentPos = 0;
221
222                while (currentPos < keyAndIv.length) {
223                    digest.update(pwd.getBytes(StandardCharsets.UTF_8));
224
225                    digest.update(salt, 0, 8);
226                    result = digest.digest();
227
228                    final int stillNeed = keyAndIv.length - currentPos;
229                    if (result.length > stillNeed) {
230                        final byte[] b = new byte[stillNeed];
231                        System.arraycopy(result, 0, b, 0, b.length);
232                        result = b;
233                    }
234
235                    System.arraycopy(result, 0, keyAndIv, currentPos, result.length);
236
237                    currentPos += result.length;
238                    if (currentPos < keyAndIv.length) {
239                        digest.reset();
240                        digest.update(result);
241                    }
242                }
243
244                final byte[] key = new byte[16];
245                final byte[] iv = new byte[16];
246                System.arraycopy(keyAndIv, 0, key, 0, key.length);
247                System.arraycopy(keyAndIv, key.length, iv, 0, iv.length);
248
249                final Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding");
250                cipher.init(Cipher.DECRYPT_MODE, new SecretKeySpec(key, "AES"), new IvParameterSpec(iv));
251
252                final byte[] clearBytes = cipher.doFinal(encryptedBytes);
253                return new String(clearBytes, StandardCharsets.UTF_8);
254            } catch (final Exception e) {
255                throw new IllegalStateException(e);
256            }
257        }
258    }
259
260    private static class MvnMasterExtractor extends DefaultHandler {
261
262        private StringBuilder current;
263
264        @Override
265        public void startElement(final String uri, final String localName, final String qName,
266                final Attributes attributes) {
267            if ("master".equalsIgnoreCase(qName)) {
268                current = new StringBuilder();
269            }
270        }
271
272        @Override
273        public void characters(final char[] ch, final int start, final int length) {
274            if (current != null) {
275                current.append(new String(ch, start, length));
276            }
277        }
278    }
279}