Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

KNOX-3039 Add error message sanitization to GatewayServlet #914

Open
wants to merge 7 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from 6 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -50,6 +50,9 @@ public class GatewayServlet implements Servlet, Filter {
public static final String GATEWAY_DESCRIPTOR_LOCATION_DEFAULT = "gateway.xml";
public static final String GATEWAY_DESCRIPTOR_LOCATION_PARAM = "gatewayDescriptorLocation";

private static boolean isErrorMessageSanitizationEnabled = true;
private static String errorMessageSanitizationPattern = "\\b(?:\\d{1,3}\\.){3}\\d{1,3}\\b";

private static final GatewayResources res = ResourcesFactory.get( GatewayResources.class );
private static final GatewayMessages LOG = MessagesFactory.get( GatewayMessages.class );

Expand Down Expand Up @@ -83,6 +86,9 @@ public synchronized void setFilter( GatewayFilter filter ) throws ServletExcepti

@Override
public synchronized void init( ServletConfig servletConfig ) throws ServletException {
GatewayConfig gatewayConfig = (GatewayConfig) servletConfig.getServletContext().getAttribute(GatewayConfig.GATEWAY_CONFIG_ATTRIBUTE);
isErrorMessageSanitizationEnabled = gatewayConfig.isErrorMessageSanitizationEnabled();
errorMessageSanitizationPattern = gatewayConfig.getErrorMessageSanitizationPattern();
try {
if( filter == null ) {
filter = createFilter( servletConfig );
Expand All @@ -92,23 +98,24 @@ public synchronized void init( ServletConfig servletConfig ) throws ServletExcep
filter.init( filterConfig );
}
} catch( ServletException | RuntimeException e ) {
LOG.failedToInitializeServletInstace( e );
throw e;
throw logAndSanitizeException(e);
}
}

@Override
public void init( FilterConfig filterConfig ) throws ServletException {
try {
if( filter == null ) {
GatewayConfig gatewayConfig = (GatewayConfig) filterConfig.getServletContext().getAttribute(GatewayConfig.GATEWAY_CONFIG_ATTRIBUTE);
isErrorMessageSanitizationEnabled = gatewayConfig.isErrorMessageSanitizationEnabled();
errorMessageSanitizationPattern = gatewayConfig.getErrorMessageSanitizationPattern();
filter = createFilter( filterConfig );
}
if( filter != null ) {
filter.init( filterConfig );
}
} catch( ServletException | RuntimeException e ) {
LOG.failedToInitializeServletInstace( e );
throw e;
throw logAndSanitizeException(e);
}
}

Expand All @@ -126,8 +133,7 @@ public void service( ServletRequest servletRequest, ServletResponse servletRespo
try {
f.doFilter( servletRequest, servletResponse, null );
} catch( IOException | RuntimeException | ServletException e ) {
LOG.failedToExecuteFilter( e );
throw e;
throw logAndSanitizeException(e);
}
} else {
((HttpServletResponse)servletResponse).setStatus( HttpServletResponse.SC_SERVICE_UNAVAILABLE );
Expand All @@ -153,10 +159,8 @@ public void doFilter( ServletRequest servletRequest, ServletResponse servletResp
//TODO: This should really happen naturally somehow as part of being a filter. This way will cause problems eventually.
chain.doFilter( servletRequest, servletResponse );
}

} catch( IOException | RuntimeException | ServletException e ) {
LOG.failedToExecuteFilter( e );
throw e;
} catch (Exception e) {
throw logAndSanitizeException(e);
}
} else {
((HttpServletResponse)servletResponse).setStatus( HttpServletResponse.SC_SERVICE_UNAVAILABLE );
Expand All @@ -168,7 +172,6 @@ public void doFilter( ServletRequest servletRequest, ServletResponse servletResp
}
}


@Override
public String getServletInfo() {
return res.gatewayServletInfo();
Expand Down Expand Up @@ -277,4 +280,16 @@ public Enumeration<String> getInitParameterNames() {
return config.getInitParameterNames();
}
}

private SanitizedException logAndSanitizeException(Exception e) {
LOG.failedToExecuteFilter(e);
if (e == null || e.getMessage() == null) {
return new SanitizedException(e.getMessage());
}
if (!isErrorMessageSanitizationEnabled || e.getMessage() == null) {
return new SanitizedException(e.getMessage());
}
String sanitizedMessage = e.getMessage().replaceAll(errorMessageSanitizationPattern, "[hidden]");
return new SanitizedException(sanitizedMessage);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why not perform the message sanitization in the SanitizationException class?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@pzampino There are some downsides in moving the logic over to the SanitizationException class. It makes the code less flexible and potentially harder to maintain (e.g. what if other classes want to throw a SanitizedException but with different logic?). It's also a bit of an effort to refactor the tests. We haven't decided yet that this pattern is better than keeping the original Exception type (see my previous comment). Finally, but less important IMO, moving the logic over to SanitizedException can be seen as a violation of the Single Responsibility Principle.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure I agree about the Single Responsibility Principle. What is the responsibility of the SanitizationException if not to provide a sanitized the message? Otherwise, the burden of message sanitization is on all entities that throw it, AND there is no guarantee that a thrower will have sanitized the message.

If there is a need to customize the sanitization, IMO that is what extensions are for. Nothing would prevent the subsequent creation of classes that extends SanitizationException to override the sanitizing logic.

Personally, I don't think level of effort for refactoring counts for much in these types of decisions, especially refactoring of test code.

Copy link
Author

@kardolus kardolus Jun 14, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@pzampino Yeah, I am bummed that I didn't receive any feedback on the tests. This class had none until I wrote some. Refactoring could mean I need tests on both classes, and since we didn't discuss whether this new pattern is actually better than the old one, it seems like wasted work. Feel free to commit a patch if you can. I am going to be a bit busy with some other work over the next couple of weeks.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@pzampino The Single Responsibility Principle would be violated because it would make the SanitizedException class responsible for both defining an exception and performing sanitization logic, thus giving it more than one reason to change.

}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
package org.apache.knox.gateway;
kardolus marked this conversation as resolved.
Show resolved Hide resolved

import javax.servlet.ServletException;

public class SanitizedException extends ServletException {
public SanitizedException(String message) {
super(message);
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -176,6 +176,10 @@ public class GatewayConfigImpl extends Configuration implements GatewayConfig {
public static final String CLUSTER_CONFIG_MONITOR_INTERVAL_SUFFIX = ".interval";
public static final String CLUSTER_CONFIG_MONITOR_ENABLED_SUFFIX = ".enabled";

private static final String ERROR_MESSAGE_SANITIZATION_ENABLED = GATEWAY_CONFIG_FILE_PREFIX + ".error.sanitization.enabled";
private static final boolean ERROR_MESSAGE_SANITIZATION_ENABLED_DEFAULT = true;
private static final String ERROR_MESSAGE_SANITIZATION_PATTERN = GATEWAY_CONFIG_FILE_PREFIX + ".error.sanitization.pattern";
private static final String ERROR_MESSAGE_SANITIZATION_PATTERN_DEFAULT = "\\b(?:\\d{1,3}\\.){3}\\d{1,3}\\b";

// These config property names are not inline with the convention of using the
// GATEWAY_CONFIG_FILE_PREFIX as is done by those above. These are left for
Expand Down Expand Up @@ -933,6 +937,16 @@ public List<String> getGlobalRulesServices() {
return DEFAULT_GLOBAL_RULES_SERVICES;
}

@Override
public boolean isErrorMessageSanitizationEnabled() {
return getBoolean(ERROR_MESSAGE_SANITIZATION_ENABLED, ERROR_MESSAGE_SANITIZATION_ENABLED_DEFAULT);
}

@Override
public String getErrorMessageSanitizationPattern() {
return get(ERROR_MESSAGE_SANITIZATION_PATTERN, ERROR_MESSAGE_SANITIZATION_PATTERN_DEFAULT);
}

@Override
public boolean isMetricsEnabled() {
return Boolean.parseBoolean(get( METRICS_ENABLED, "false" ));
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,131 @@
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.knox.gateway;

import org.apache.knox.gateway.config.GatewayConfig;
import org.easymock.EasyMock;
import org.easymock.IMocksControl;
import org.junit.Before;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.Parameterized;

import javax.servlet.FilterConfig;
import javax.servlet.ServletConfig;
import javax.servlet.ServletContext;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;
import java.util.Arrays;
import java.util.Collection;

import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertNull;

@RunWith(Parameterized.class)
public class GatewayServletTest {

private static final String IP_ADDRESS_PATTERN = "\\b(?:\\d{1,3}\\.){3}\\d{1,3}\\b";
private static final String EMAIL_ADDRESS_PATTERN = "\\b[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\\.[A-Z|a-z]{2,}\\b";
private static final String CREDIT_CARD_PATTERN = "\\b\\d{4}-\\d{4}-\\d{4}-\\d{4}\\b";

@Parameterized.Parameters(name = "{index}: SanitizationEnabled={2}, Pattern={3}, Exception={0}, ExpectedMessage={1}")
public static Collection<Object[]> data() {
return Arrays.asList(new Object[][] {
{ new IOException("Connection to 192.168.1.1 failed"), "Connection to [hidden] failed", true, IP_ADDRESS_PATTERN },
{ new RuntimeException("Connection to 192.168.1.1 failed"), "Connection to [hidden] failed", true, IP_ADDRESS_PATTERN },
{ new NullPointerException(), null, true, IP_ADDRESS_PATTERN },
{ new IOException("General failure"), "General failure", true, IP_ADDRESS_PATTERN },
{ new IOException("Connection to 192.168.1.1 failed"), "Connection to 192.168.1.1 failed", false, IP_ADDRESS_PATTERN },
{ new RuntimeException("Connection to 192.168.1.1 failed"), "Connection to 192.168.1.1 failed", false, IP_ADDRESS_PATTERN },
{ new NullPointerException(), null, false, IP_ADDRESS_PATTERN },
{ new IOException("General failure"), "General failure", false, IP_ADDRESS_PATTERN },
{ new IOException("User email: user@example.com"), "User email: [hidden]", true, EMAIL_ADDRESS_PATTERN },
{ new RuntimeException("Credit card number: 1234-5678-9101-1121"), "Credit card number: [hidden]", true, CREDIT_CARD_PATTERN },
});
}

private final Exception exception;
private final String expectedMessage;
private final boolean isSanitizationEnabled;
private final String sanitizationPattern;

public GatewayServletTest(Exception exception, String expectedMessage, boolean isSanitizationEnabled, String sanitizationPattern) {
this.exception = exception;
this.expectedMessage = expectedMessage;
this.isSanitizationEnabled = isSanitizationEnabled;
this.sanitizationPattern = sanitizationPattern;
}

private IMocksControl mockControl;
private ServletConfig servletConfig;
private ServletContext servletContext;
private GatewayConfig gatewayConfig;
private HttpServletRequest request;
private HttpServletResponse response;
private GatewayFilter filter;

@Before
public void setUp() throws ServletException {
mockControl = EasyMock.createControl();
servletConfig = mockControl.createMock(ServletConfig.class);
servletContext = mockControl.createMock(ServletContext.class);
gatewayConfig = mockControl.createMock(GatewayConfig.class);
request = mockControl.createMock(HttpServletRequest.class);
response = mockControl.createMock(HttpServletResponse.class);
filter = mockControl.createMock(GatewayFilter.class);

EasyMock.expect(servletConfig.getServletName()).andStubReturn("default");
EasyMock.expect(servletConfig.getServletContext()).andStubReturn(servletContext);
EasyMock.expect(servletContext.getAttribute("org.apache.knox.gateway.config")).andStubReturn(gatewayConfig);
}

@Test
public void testExceptionSanitization() throws ServletException, IOException {
GatewayServlet servlet = initializeServletWithSanitization(isSanitizationEnabled, sanitizationPattern);

try {
servlet.service(request, response);
} catch (Exception e) {
if (expectedMessage != null) {
assertEquals(expectedMessage, e.getMessage());
} else {
assertNull(e.getMessage());
}
}

mockControl.verify();
}

private GatewayServlet initializeServletWithSanitization(boolean isErrorMessageSanitizationEnabled, String sanitizationPattern) throws ServletException, IOException {
EasyMock.expect(gatewayConfig.isErrorMessageSanitizationEnabled()).andStubReturn(isErrorMessageSanitizationEnabled);
EasyMock.expect(gatewayConfig.getErrorMessageSanitizationPattern()).andStubReturn(sanitizationPattern);

filter.init(EasyMock.anyObject(FilterConfig.class));
EasyMock.expectLastCall().once();
filter.doFilter(EasyMock.eq(request), EasyMock.eq(response), EasyMock.isNull());
EasyMock.expectLastCall().andThrow(exception).once();

mockControl.replay();

GatewayServlet servlet = new GatewayServlet(filter);
servlet.init(servletConfig);
return servlet;
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -79,6 +79,7 @@ public class GatewayTestConfig extends Configuration implements GatewayConfig {
private ConcurrentMap<String, Integer> topologyPortMapping = new ConcurrentHashMap<>();
private int backupVersionLimit = -1;
private long backupAgeLimit = -1;
private String sanitizationPattern = "sanitizationPattern";

public GatewayTestConfig(Properties props) {
super.getProps().putAll(props);
Expand Down Expand Up @@ -619,6 +620,16 @@ public int getWebsocketMaxWaitBufferCount() {
return DEFAULT_WEBSOCKET_MAX_WAIT_BUFFER_COUNT;
}

@Override
public boolean isErrorMessageSanitizationEnabled() {
return true;
}

@Override
public String getErrorMessageSanitizationPattern() {
return sanitizationPattern;
}

@Override
public boolean isMetricsEnabled() {
return false;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -901,6 +901,16 @@ public interface GatewayConfig {
*/
boolean isAsyncSupported();

/**
* @return true if error message sanitization is enabled; false otherwise (defaults to true)
*/
boolean isErrorMessageSanitizationEnabled();

/**
* @return the error message sanitization pattern
*/
String getErrorMessageSanitizationPattern();

/**
* @return <code>true</code> if the supplied user is allowed to see all tokens
* (i.e. not only tokens where userName or createdBy equals to the
Expand Down
Loading