KeyVault集成 - [致命错误]:1:1:文件过早结束

时间:2015-12-02 16:21:40

标签: java azure azure-java-sdk

我一直在尝试编写一些基本代码来测试Azure KeyVault。目前(正如您从控制台日志中看到的),我可以进行身份​​验证,但 KeyVaultClient 只是失败并出现 [致命错误]:1:1:文件过早结束

与azure-java-sdk相比,微软似乎缺乏一些现实世界的例子,所以我承认我一直在努力解释JavaDocs!

  

16:12:02.391 [主要] DEBUG com.example.cli.Main - 推出!   16:12:02.453 [main] DEBUG e.s.cli.AzureAuthenticationResult -   Authresult getToken

     

16:12:02.491 [pool-1-thread-1] DEBUG   c.m.aad.adal4j.AuthenticationContext - [相关ID:   XXXXXXX-XXX-XXX-XXX-XXXXXXX]使用客户端Http标头:   的X客户SKU = java的X-客户-VER = 1.0.0 X-客户OS = XXXX; X-客户CPU = XXXX;返回客户端请求-ID =真;客户请求-ID = XXXXXXX-XXX-XXX-XXX-XXXXXXX;

     

16:12:02.491 [pool-1-thread-1] INFO   c.m.a.adal4j.AuthenticationAuthority - [相关ID:   XXXXXXX-XXX-XXX-XXX-XXXXXXX]实例发现成功

     

16:12:05.142 [pool-1-thread-1] DEBUG   c.m.aad.adal4j.AuthenticationContext - [相关ID:   XXXXXXX-XXX-XXX-XXX-XXXXXXX]使用哈希访问令牌   ' ZZZZZZZZZZZZZZZZZZZZZZZZ'返回

     

[致命错误]:1:1:提前结束   的文件。

     

16:12:08.135 [main] ERROR com.example.cli.Main - null   java.util.concurrent.ExecutionException:   com.microsoft.windowsazure.exception.ServiceException:
  在   java.util.concurrent.FutureTask.report(FutureTask.java:122)   〜[na:1.8.0_45]

     

在   java.util.concurrent.FutureTask.get(FutureTask.java:192)   〜[NA:1.8.0_45]

     

在   com.microsoft.azure.keyvault.FutureAdapter.get(FutureAdapter.java:53)   〜[天蓝色-keyvault-0.9.0.jar:NA]
  在   com.example.cli.Main.main(Main.java:37)〜[classes /:na]
  在   sun.reflect.NativeMethodAccessorImpl.invoke0(原生方法)   〜[NA:1.8.0_45]
  在   sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)   〜[NA:1.8.0_45]
  在   sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)   〜[NA:1.8.0_45]
  在java.lang.reflect.Method.invoke(Method.java:497)   〜[NA:1.8.0_45]
  在   com.intellij.rt.execution.application.AppMain.main(AppMain.java:144)   [idea_rt.jar:na]

     

引起:   com.microsoft.windowsazure.exception.ServiceException:
  at> com.microsoft.windowsazure.exception.ServiceException.createFromXml(ServiceException.java:216)   〜[天蓝色核-0.9.0.jar:NA]
  在   com.microsoft.azure.keyvault.KeyOperationsImpl.sign(KeyOperationsImpl.java:1524)   〜[天蓝色-keyvault-0.9.0.jar:NA]
  在   com.microsoft.azure.keyvault.KeyOperationsImpl $ 13.call(KeyOperationsImpl.java:1447)   〜[天蓝色-keyvault-0.9.0.jar:NA]     at> com.microsoft.azure.keyvault.KeyOperationsImpl $ 13.call(KeyOperationsImpl.java:1444)   〜[天蓝色-keyvault-0.9.0.jar:NA]
  在   java.util.concurrent.FutureTask.run(FutureTask.java:266)   〜[NA:1.8.0_45]
  在   java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)   〜[NA:1.8.0_45]
  在   java.util.concurrent.ThreadPoolExecutor中的$ Worker.run(ThreadPoolExecutor.java:617)   〜[NA:1.8.0_45]
  在java.lang.Thread.run(Thread.java:745)   〜[NA:1.8.0_45]

     

处理完成,退出代码为0

package com.example.cli;

import com.microsoft.azure.keyvault.KeyVaultClient;
import com.microsoft.azure.keyvault.KeyVaultClientService;
import com.microsoft.azure.keyvault.models.KeyOperationResult;
import com.microsoft.azure.keyvault.webkey.JsonWebKeySignatureAlgorithm;
import com.microsoft.windowsazure.Configuration;

import org.slf4j.Logger;
import org.slf4j.LoggerFactory;


import java.security.*;

import java.util.Random;

import java.util.concurrent.Future;


public class Main {

    public static void main(String[] args) {
        Logger logger = LoggerFactory.getLogger(Main.class);
        logger.debug("Launched !");

        try {
            byte[] plainText = new byte[100];
            new Random(0x1234567L).nextBytes(plainText);
            MessageDigest md = MessageDigest.getInstance("SHA-256");
            md.update(plainText);
            byte[] digest = md.digest();
            Configuration configuration = AzureKVCredentials.createConfiguration();
            KeyVaultClient keyVaultClient = KeyVaultClientService.create(configuration);
            Future<KeyOperationResult> keyOperationPromise;
            KeyOperationResult keyOperationResult;
            keyOperationPromise = keyVaultClient.signAsync("https://XXXXXXX.vault.azure.net/keys/XXXXXXX/XXXXXXX”,JsonWebKeySignatureAlgorithm.RS256,digest);
            keyOperationResult = keyOperationPromise.get();   // <=== THIS IS LINE 37 IN THE STACKTRACE   ;-)   <====
            byte[] res = keyOperationResult.getResult();
            String  b64 = java.util.Base64.getEncoder().encodeToString(res);
            logger.debug(b64);


        } catch (Exception e) {
            logger.error(null,e);
        }
    }
}

2 个答案:

答案 0 :(得分:1)

要使用Azure KeyVault,您可以尝试使用Azure REST API来管理和操作Key Vault。请参阅Key Vault REST文档https://msdn.microsoft.com/en-us/library/azure/dn903630.aspx

Key Vault管理有两套API,Key&amp;秘密操作需要来自不同资源uri的不同访问令牌。

对于管理api,资源uri为https://management.core.windows.net/

对于操作apis,资源uri为https://vault.azure.net。 (注意:请注意uri末尾没有符号/

以下是一个示例代码作为参考。

package aad.keyvault;

import java.io.IOException;
import java.net.MalformedURLException;
import java.net.URL;
import java.util.concurrent.ExecutionException;
import java.util.concurrent.ExecutorService;
import java.util.concurrent.Executors;
import java.util.concurrent.Future;

import javax.naming.ServiceUnavailableException;
import javax.net.ssl.HttpsURLConnection;

import org.apache.commons.io.IOUtils;

import com.microsoft.aad.adal4j.AuthenticationContext;
import com.microsoft.aad.adal4j.AuthenticationResult;
import com.microsoft.aad.adal4j.ClientCredential;

public class RestAPISample {

    private static final String subscriptionId = "<subscription_id>";
    private static final String resourceGroupName = "<resource_group_name>";
    private static final String vaultName = "<vault_name>";
    private static final String apiVersion = "2015-06-01";
    private static final String getKeyVaultInfoUri = String.format(
            "https://management.azure.com/subscriptions/%s/resourceGroups/%s/providers/Microsoft.KeyVault/vaults/%s?api-version=%s",
            subscriptionId, resourceGroupName, vaultName, apiVersion);

    private static final String tenantId = "<tenant_id>";
    private static final String authority = String.format("https://login.windows.net/%s", tenantId);
    private static final String clientId = "<client_id>";
    private static final String clientSecret = "<client_secret_key>";
    private static final String keyName = "<keyvault_key>";
    private static final String getInfoFromAKeyUri = String.format("https://%s.vault.azure.net/keys/%s?api-version=%s",
            vaultName, keyName, apiVersion);

    public static String getAccessToken(String resource)
            throws MalformedURLException, InterruptedException, ExecutionException, ServiceUnavailableException {
        AuthenticationContext context = null;
        AuthenticationResult result = null;
        ExecutorService service = null;
        try {
            service = Executors.newFixedThreadPool(1);
            context = new AuthenticationContext(authority, true, service);
            ClientCredential credential = new ClientCredential(clientId, clientSecret);
            Future<AuthenticationResult> future = context.acquireToken(resource, credential, null);
            result = future.get();
        } finally {
            service.shutdown();
        }
        String accessToken = null;
        if (result == null) {
            throw new ServiceUnavailableException("authentication result was null");
        } else {
            accessToken = result.getAccessToken();
            System.out.println("Access Token: " + accessToken);
        }
        return accessToken;
    }

    public static void getKeyVaultInfo() throws MalformedURLException, IOException, ServiceUnavailableException,
            InterruptedException, ExecutionException {
        System.out.println(getKeyVaultInfoUri);
        HttpsURLConnection conn = (HttpsURLConnection) new URL(getKeyVaultInfoUri).openConnection();
        conn.setRequestProperty("Authorization", "Bearer " + getAccessToken("https://management.core.windows.net/"));
        conn.addRequestProperty("Content-Type", "application/json");
        String resp = IOUtils.toString(conn.getInputStream());
        System.out.println(resp);
    }

    public static void getKeyInfo() throws MalformedURLException, IOException, ServiceUnavailableException, InterruptedException, ExecutionException {
        System.out.println(getInfoFromAKeyUri);
        HttpsURLConnection conn = (HttpsURLConnection) new URL(getInfoFromAKeyUri).openConnection();
        conn.setRequestProperty("Authorization", "Bearer " + getAccessToken("https://vault.azure.net"));
        conn.addRequestProperty("Content-Type", "application/json");
        String resp = IOUtils.toString(conn.getInputStream());
        System.out.println(resp);
    }

    public static void main(String[] args)
            throws InterruptedException, ExecutionException, ServiceUnavailableException, IOException {
        getKeyVaultInfo();
        getKeyInfo();
    }

}

Azure Key Vault操作API需要使用命令set-policy设置的不同权限。例如Get information about a keyhttps://msdn.microsoft.com/en-us/library/azure/dn878080.aspx),需要授权才能通过使用Azure CLI cmd azure keyvault set-policy --vault-name <vault-name> --spn <service-principal-no.> --perms-to-keys '["get"]'向密钥添加权限get来获取密钥/获取权限。

答案 1 :(得分:1)

您的代码适用于我,因此我怀疑您的凭据对象(您未提供)无效。特别是,请确保使用KeyVaultConfiguration实例。

这是我AzureKVCredentials的工作版本:

package com.example.cli;

import java.util.*;
import java.util.concurrent.*;

import com.microsoft.aad.adal4j.*;
import org.apache.http.*;
import org.apache.http.message.*;

import com.microsoft.azure.keyvault.*;
import com.microsoft.azure.keyvault.authentication.*;
import com.microsoft.windowsazure.*;
import com.microsoft.windowsazure.core.pipeline.filter.*;

public class AzureKVCredentials extends KeyVaultCredentials {

    public static Configuration createConfiguration() {
        return KeyVaultConfiguration.configure(null, new AzureKVCredentials()); 
    }

    @Override
    public Header doAuthenticate(ServiceRequestContext request, Map<String, String> challenge) {
        try {
            String authorization = challenge.get("authorization");
            String resource = challenge.get("resource");
            AuthenticationResult authResult = getAccessToken(authorization, resource);
            return new BasicHeader("Authorization", authResult.getAccessTokenType() + " " + authResult.getAccessToken());
        } catch (Exception ex) {
            throw new RuntimeException(ex);
        }
    }

    private static AuthenticationResult getAccessToken(String authorization, String resource) throws Exception {

        String clientId = "<app id of your Azure application>";
        String clientKey = "<application key>";

        AuthenticationResult result = null;
        ExecutorService service = null;
        try {
            service = Executors.newFixedThreadPool(1);
            AuthenticationContext context = new AuthenticationContext(authorization, false, service);
            Future<AuthenticationResult> future = null;
            ClientCredential credentials = new ClientCredential(clientId, clientKey);
            future = context.acquireToken(resource, credentials, null);
            result = future.get();
        } finally {
            service.shutdown();
        }
        if (result == null) {
            throw new RuntimeException("authentication result was null");
        }
        return result;
    }

}

此代码基于azure-sdk-for-java中的these sources