Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Send log messages to log4j systems instead of system out / error #3231

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions build.gradle
Original file line number Diff line number Diff line change
Expand Up @@ -323,6 +323,7 @@ jacocoTestReport {

checkstyle {
configFile file("checkstyle/sun_checks.xml")
configFile file("checkstyle/println_checks.xml")
}

opensearchplugin {
Expand Down
21 changes: 21 additions & 0 deletions checkstyle/println_checks.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
<?xml version="1.0"?>
<!DOCTYPE module PUBLIC
"-//Checkstyle//DTD Checkstyle Configuration 1.3//EN"
"https://checkstyle.org/dtds/configuration_1_3.dtd">

<module name="Checker">
<module name="BeforeExecutionExclusionFileFilter">
<property name="fileNamePattern" value="src/main/java/org/opensearch/security/tools/*"/>
</module>
<module name="BeforeExecutionExclusionFileFilter">
<property name="fileNamePattern" value="src/main/java/com/amazon/dlic/auth/http/kerberos/HTTPSpnegoAuthenticator.java"/>
</module>
<module name="TreeWalker">
<module name="RegexpSinglelineJava">
<property name="format" value="System.out.println"/>
<property name="ignoreCase" value="true"/>
<property name="message" value="Do not use System.out.println" />
<property name="severity" value="error"/>
</module>
</module>
</module>
1 change: 1 addition & 0 deletions checkstyle/sun_checks.xml
Original file line number Diff line number Diff line change
Expand Up @@ -222,4 +222,5 @@
<property name="checkFormat" value="$1"/>
</module>

<module name="PrintlnModule"/>
</module>
Original file line number Diff line number Diff line change
Expand Up @@ -98,8 +98,7 @@ public Void run() {
}
} catch (Throwable e) {
log.error("Unable to enable krb_debug due to ", e);
System.err.println("Unable to enable krb_debug due to " + ExceptionsHelper.stackTrace(e));
System.out.println("Unable to enable krb_debug due to " + ExceptionsHelper.stackTrace(e));
log.debug("Unable to enable krb_debug due to " + ExceptionsHelper.stackTrace(e));
}

System.setProperty(KrbConstants.USE_SUBJECT_CREDS_ONLY_PROP, "false");
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,11 +11,15 @@

package org.opensearch.security.auditlog.sink;

import org.apache.logging.log4j.LogManager;
import org.apache.logging.log4j.Logger;
import org.opensearch.common.settings.Settings;
import org.opensearch.security.auditlog.impl.AuditMessage;

public final class DebugSink extends AuditLogSink {

final Logger log = LogManager.getLogger(DebugSink.class);

public DebugSink(String name, Settings settings, AuditLogSink fallbackSink) {
super(name, settings, null, fallbackSink);
}
Expand All @@ -27,7 +31,7 @@ public boolean isHandlingBackpressure() {

@Override
public boolean doStore(final AuditMessage msg) {
System.out.println("AUDIT_LOG: " + msg.toPrettyString());
log.info("AUDIT_LOG: " + msg.toPrettyString());
return true;
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -244,8 +244,6 @@ public void onChange(Map<CType, SecurityDynamicConfiguration<?>> typeToConfig) {
log.debug("Static roles loaded ({})", staticRoles.getCEntries().size());

if (actionGroups.containsAny(staticActionGroups)) {
System.out.println("static: " + actionGroups.getCEntries());
System.out.println("Static Action Groups:" + staticActionGroups.getCEntries());
throw new StaticResourceException("Cannot override static action groups");
}
if (!actionGroups.add(staticActionGroups) && !staticActionGroups.getCEntries().isEmpty()) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -158,8 +158,6 @@ public Object run() {
final String renegoMsg =
"Client side initiated TLS renegotiation enabled. This can open a vulnerablity for DoS attacks through client side initiated TLS renegotiation.";
log.warn(renegoMsg);
System.out.println(renegoMsg);
System.err.println(renegoMsg);
} else {
if (!rejectClientInitiatedRenegotiation) {

Expand Down Expand Up @@ -225,8 +223,6 @@ public Object run() {

if (!httpSSLEnabled && !transportSSLEnabled) {
log.error("SSL not activated for http and/or transport.");
System.out.println("SSL not activated for http and/or transport.");
System.err.println("SSL not activated for http and/or transport.");
}

if (ExternalSecurityKeyStore.hasExternalSslContext(settings)) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -175,8 +175,7 @@ public Boolean run() {
}
principal = principalExtractor == null ? null : principalExtractor.extractPrincipal(x509Certs[0], Type.HTTP);
} else if (engine.getNeedClientAuth()) {
final OpenSearchException ex = new OpenSearchException("No client certificates found but such are needed (SG 9).");
throw ex;
throw new OpenSearchException("No client certificates found but such are needed (SG 9).");
}

} catch (final SSLPeerUnverifiedException e) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -132,7 +132,6 @@ public static void main(String[] args) {
+ " Please remove the deprecated keys from your opensearch.yml or replace with the generated file after reviewing."
);
} catch (final Exception e) {
e.printStackTrace();
formatter.printHelp("audit_config_migrater.sh", options, true);
System.exit(-1);
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -190,7 +190,6 @@ private static boolean backupAndWrite(File file, SecurityDynamicConfiguration<?>
} catch (Exception e) {
System.out.println("Unable to write " + file.getAbsolutePath() + ". This is unexpected and we will abort migration.");
System.out.println(" Details: " + e.getMessage());
e.printStackTrace();
}

return false;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1657,7 +1657,6 @@ private static int migrate(RestHighLevelClient tc, String index, File backupDir,

} catch (Exception e) {
System.out.println("ERR: Unable to migrate config files due to " + e);
e.printStackTrace();
return -1;
}

Expand Down Expand Up @@ -1890,7 +1889,6 @@ public InputStream openStream() throws IOException {

return value;
} catch (Exception e) {
e.printStackTrace();
return "ERR: Unable to handle response due to " + e;
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,9 +37,7 @@ public static void tearDown() {
if (mockIdpServer != null) {
try {
mockIdpServer.close();
} catch (Exception e) {
e.printStackTrace();
}
} catch (Exception e) {}
}
}

Expand Down Expand Up @@ -314,7 +312,6 @@ public void testNbfInSkew() throws Exception {

long expiringDate = 20 + System.currentTimeMillis() / 1000;
long notBeforeDate = 5 + System.currentTimeMillis() / 1000;
;

AuthCredentials creds = jwtAuth.extractCredentials(
new FakeRestRequest(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -55,9 +55,7 @@ public static void tearDown() {
if (mockIdpServer != null) {
try {
mockIdpServer.close();
} catch (Exception e) {
e.printStackTrace();
}
} catch (Exception ignored) {}
}
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -45,9 +45,7 @@ public void basicTest() throws Exception {
} finally {
try {
mockIdpServer.close();
} catch (Exception e) {
e.printStackTrace();
}
} catch (Exception ignored) {}
}
}

Expand All @@ -69,9 +67,7 @@ public void wrongSigTest() throws Exception {
} finally {
try {
mockIdpServer.close();
} catch (Exception e) {
e.printStackTrace();
}
} catch (Exception ignored) {}
}
}

Expand All @@ -96,9 +92,7 @@ public void noAlgTest() throws Exception {
} finally {
try {
mockIdpServer.close();
} catch (Exception e) {
e.printStackTrace();
}
} catch (Exception ignored) {}
}
}

Expand All @@ -120,9 +114,7 @@ public void mismatchedAlgTest() throws Exception {
} finally {
try {
mockIdpServer.close();
} catch (Exception e) {
e.printStackTrace();
}
} catch (Exception ignored) {}
}
}

Expand Down Expand Up @@ -174,9 +166,7 @@ public void keyExchangeTest() throws Exception {
} finally {
try {
mockIdpServer.close();
} catch (Exception e) {
e.printStackTrace();
}
} catch (Exception e) {}
}

mockIdpServer = new MockIpdServer(TestJwk.Jwks.RSA_2);
Expand All @@ -198,9 +188,7 @@ public void keyExchangeTest() throws Exception {
} finally {
try {
mockIdpServer.close();
} catch (Exception e) {
e.printStackTrace();
}
} catch (Exception ignored) {}
}
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -112,9 +112,7 @@ public void tearDown() {
if (mockSamlIdpServer != null) {
try {
mockSamlIdpServer.close();
} catch (Exception e) {
e.printStackTrace();
}
} catch (Exception ignored) {}
}
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,6 @@ protected String getResourceFolder() {
public void testIntegLdapAuthenticationSSL() throws Exception {
String securityConfigAsYamlString = FileHelper.loadFile("ldap/config.yml");
securityConfigAsYamlString = securityConfigAsYamlString.replace("${ldapsPort}", String.valueOf(ldapsPort));
System.out.println(securityConfigAsYamlString);
setup(Settings.EMPTY, new DynamicSecurityConfig().setConfigAsYamlString(securityConfigAsYamlString), Settings.EMPTY);
final RestHelper rh = nonSslRestHelper();
Assert.assertEquals(HttpStatus.SC_OK, rh.executeGetRequest("", encodeBasicHeader("jacksonm", "secret")).getStatusCode());
Expand All @@ -63,7 +62,6 @@ public void testIntegLdapAuthenticationSSL() throws Exception {
public void testIntegLdapAuthenticationSSLFail() throws Exception {
String securityConfigAsYamlString = FileHelper.loadFile("ldap/config.yml");
securityConfigAsYamlString = securityConfigAsYamlString.replace("${ldapsPort}", String.valueOf(ldapsPort));
System.out.println(securityConfigAsYamlString);
setup(Settings.EMPTY, new DynamicSecurityConfig().setConfigAsYamlString(securityConfigAsYamlString), Settings.EMPTY);
final RestHelper rh = nonSslRestHelper();
Assert.assertEquals(HttpStatus.SC_UNAUTHORIZED, rh.executeGetRequest("", encodeBasicHeader("wrong", "wrong")).getStatusCode());
Expand All @@ -87,7 +85,6 @@ public void testAttributesWithImpersonation() throws Exception {
encodeBasicHeader("spock", "spocksecret")
)).getStatusCode()
);
System.out.println(res.getBody());
Assert.assertTrue(res.getBody().contains("ldap.dn"));
Assert.assertTrue(res.getBody().contains("attr.ldap.entryDN"));
Assert.assertTrue(res.getBody().contains("attr.ldap.subschemaSubentry"));
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1081,7 +1081,6 @@ public void testMultiCn() throws Exception {
);
Assert.assertNotNull(user);
Assert.assertEquals("cn=cabc,ou=people,o=TEST", user.getName());
System.out.println(user.getUserEntry().getAttribute("cn"));
}

@AfterClass
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,6 @@ protected String getResourceFolder() {
public void testIntegLdapAuthenticationSSL() throws Exception {
String securityConfigAsYamlString = FileHelper.loadFile("ldap/config_ldap2.yml");
securityConfigAsYamlString = securityConfigAsYamlString.replace("${ldapsPort}", String.valueOf(ldapsPort));
System.out.println(securityConfigAsYamlString);
setup(Settings.EMPTY, new DynamicSecurityConfig().setConfigAsYamlString(securityConfigAsYamlString), Settings.EMPTY);
final RestHelper rh = nonSslRestHelper();
Assert.assertEquals(HttpStatus.SC_OK, rh.executeGetRequest("", encodeBasicHeader("jacksonm", "secret")).getStatusCode());
Expand All @@ -63,7 +62,6 @@ public void testIntegLdapAuthenticationSSL() throws Exception {
public void testIntegLdapAuthenticationSSLFail() throws Exception {
String securityConfigAsYamlString = FileHelper.loadFile("ldap/config_ldap2.yml");
securityConfigAsYamlString = securityConfigAsYamlString.replace("${ldapsPort}", String.valueOf(ldapsPort));
System.out.println(securityConfigAsYamlString);
setup(Settings.EMPTY, new DynamicSecurityConfig().setConfigAsYamlString(securityConfigAsYamlString), Settings.EMPTY);
final RestHelper rh = nonSslRestHelper();
Assert.assertEquals(HttpStatus.SC_UNAUTHORIZED, rh.executeGetRequest("", encodeBasicHeader("wrong", "wrong")).getStatusCode());
Expand All @@ -87,7 +85,6 @@ public void testAttributesWithImpersonation() throws Exception {
encodeBasicHeader("spock", "spocksecret")
)).getStatusCode()
);
System.out.println(res.getBody());
Assert.assertTrue(res.getBody().contains("ldap.dn"));
Assert.assertTrue(res.getBody().contains("attr.ldap.entryDN"));
Assert.assertTrue(res.getBody().contains("attr.ldap.subschemaSubentry"));
Expand Down
7 changes: 2 additions & 5 deletions src/test/java/org/opensearch/security/AggregationTests.java
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,6 @@ public void testBasicAggregations() throws Exception {
encodeBasicHeader("nagilum", "nagilum")
)).getStatusCode()
);
System.out.println(res.getBody());
assertNotContains(res, "*xception*");
assertNotContains(res, "*erial*");
assertNotContains(res, "*mpty*");
Expand All @@ -134,7 +133,6 @@ public void testBasicAggregations() throws Exception {
encodeBasicHeader("nagilum", "nagilum")
)).getStatusCode()
);
System.out.println(res.getBody());
assertNotContains(res, "*xception*");
assertNotContains(res, "*erial*");
assertNotContains(res, "*mpty*");
Expand All @@ -154,7 +152,6 @@ public void testBasicAggregations() throws Exception {
encodeBasicHeader("worf", "worf")
)).getStatusCode()
);
System.out.println(res.getBody());
assertNotContains(res, "*xception*");
assertNotContains(res, "*erial*");
assertNotContains(res, "*mpty*");
Expand All @@ -168,11 +165,11 @@ public void testBasicAggregations() throws Exception {

Assert.assertEquals(
HttpStatus.SC_FORBIDDEN,
(res = rh.executePostRequest(
rh.executePostRequest(
"_search?pretty",
"{\"size\":0,\"aggs\":{\"myindices\":{\"terms\":{\"field\":\"_index\",\"size\":40}}}}",
encodeBasicHeader("worf", "worf")
)).getStatusCode()
).getStatusCode()
);

}
Expand Down
Loading