From cc5e8b34f73c90f1f4e823b528cc047af6c08aeb Mon Sep 17 00:00:00 2001 From: Kaushik Kumar Mahato Date: Fri, 15 Jun 2018 14:46:46 +0530 Subject: [PATCH 1/4] Update version to 1.9.7 --- src/main/java/net/authorize/util/Constants.java | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/main/java/net/authorize/util/Constants.java b/src/main/java/net/authorize/util/Constants.java index 168ef9af..87590463 100644 --- a/src/main/java/net/authorize/util/Constants.java +++ b/src/main/java/net/authorize/util/Constants.java @@ -35,5 +35,5 @@ public final class Constants { public static final String HTTP_READ_TIME_OUT = "http.ReadTimeout"; public static final int HTTP_READ_TIME_OUT_DEFAULT_VALUE = 30000; - public static final String CLIENT_ID = "sdk-java-1.9.6"; + public static final String CLIENT_ID = "sdk-java-1.9.7"; } From bf1141011f4dfb705724d4ef55c3e9a2e5c6b714 Mon Sep 17 00:00:00 2001 From: Kaushik Kumar Mahato Date: Fri, 15 Jun 2018 14:49:20 +0530 Subject: [PATCH 2/4] [maven-release-plugin] prepare release anet-java-sdk-1.9.7 --- pom.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pom.xml b/pom.xml index 1c09e2ac..d8420df2 100644 --- a/pom.xml +++ b/pom.xml @@ -9,7 +9,7 @@ net.authorize anet-java-sdk jar - 1.9.7-SNAPSHOT + 1.9.7 Authorize.Net Java SDK Authorize.Net SDK includes standard payments, recurring billing, and customer profiles. http://developer.authorize.net From 5addace745f50e25766095d8ea0ae9d784eef376 Mon Sep 17 00:00:00 2001 From: Kaushik Kumar Mahato Date: Fri, 15 Jun 2018 14:50:14 +0530 Subject: [PATCH 3/4] [maven-release-plugin] prepare for next development iteration --- pom.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pom.xml b/pom.xml index d8420df2..c73ffa15 100644 --- a/pom.xml +++ b/pom.xml @@ -9,7 +9,7 @@ net.authorize anet-java-sdk jar - 1.9.7 + 1.9.8-SNAPSHOT Authorize.Net Java SDK Authorize.Net SDK includes standard payments, recurring billing, and customer profiles. http://developer.authorize.net From 89aaf18d4275d931f22d2fb2830255f7233c9ed1 Mon Sep 17 00:00:00 2001 From: vijayabraj Date: Mon, 16 Jul 2018 14:38:53 +0530 Subject: [PATCH 4/4] SensitiveLogger for Java SDK --- pom.xml | 16 +++- .../AuthorizedNetSensitiveTagsConfig.json | 49 +++++++++++ resources/project.properties | 1 + .../java/net/authorize/util/HttpUtility.java | 1 - .../util/SensitiveDataConfigType.java | 24 ++++++ .../authorize/util/SensitiveFilterLayout.java | 86 +++++++++++++++++++ .../java/net/authorize/util/SensitiveTag.java | 50 +++++++++++ .../util/SensitiveTagsDeserializer.java | 35 ++++++++ 8 files changed, 259 insertions(+), 3 deletions(-) create mode 100644 resources/AuthorizedNetSensitiveTagsConfig.json create mode 100644 resources/project.properties create mode 100644 src/main/java/net/authorize/util/SensitiveDataConfigType.java create mode 100644 src/main/java/net/authorize/util/SensitiveFilterLayout.java create mode 100644 src/main/java/net/authorize/util/SensitiveTag.java create mode 100644 src/main/java/net/authorize/util/SensitiveTagsDeserializer.java diff --git a/pom.xml b/pom.xml index c73ffa15..1169b527 100644 --- a/pom.xml +++ b/pom.xml @@ -81,6 +81,11 @@ 1.3 test + + com.google.code.gson + gson + 2.3.1 + UTF-8 @@ -145,16 +150,23 @@ + + resources + true + + **/AuthorizedNetSensitiveTagsConfig.json + + resources false - * + **/*.* log4j.properties - + diff --git a/resources/AuthorizedNetSensitiveTagsConfig.json b/resources/AuthorizedNetSensitiveTagsConfig.json new file mode 100644 index 00000000..cf714311 --- /dev/null +++ b/resources/AuthorizedNetSensitiveTagsConfig.json @@ -0,0 +1,49 @@ +{ + "sensitiveTags": [ + { + "tagName": "cardCode", + "pattern": "", + "replacement": "xxx", + "disableMask": false + }, + { + "tagName": "cardNumber", + "pattern": "(\\p{N}+)(\\p{N}{4})", + "replacement": "xxxx-$2", + "disableMask": false + }, + { + "tagName": "expirationDate", + "pattern": "", + "replacement": "xxx", + "disableMask": false + }, + { + "tagName": "accountNumber", + "pattern": "(\\p{N}+)(\\p{N}{4})", + "replacement": "xxxx-$2", + "disableMask": false + }, + { + "tagName": "nameOnAccount", + "pattern": "", + "replacement": "xxx", + "disableMask": false + }, + { + "tagName": "transactionKey", + "pattern": "", + "replacement": "xxx", + "disableMask": false + } + ], + "sensitiveStringRegexes": [ + "4\\p{N}{3}([\\ \\-]?)\\p{N}{4}\\1\\p{N}{4}\\1\\p{N}{4}", + "4\\p{N}{3}([\\ \\-]?)(?:\\p{N}{4}\\1){2}\\p{N}(?:\\p{N}{3})?", + "5[1-5]\\p{N}{2}([\\ \\-]?)\\p{N}{4}\\1\\p{N}{4}\\1\\p{N}{4}", + "6(?:011|22(?:1(?=[\\ \\-]?(?:2[6-9]|[3-9]))|[2-8]|9(?=[\\ \\-]?(?:[01]|2[0-5])))|4[4-9]\\p{N}|5\\p{N}\\p{N})([\\ \\-]?)\\p{N}{4}\\1\\p{N}{4}\\1\\p{N}{4}", + "35(?:2[89]|[3-8]\\p{N})([\\ \\-]?)\\p{N}{4}\\1\\p{N}{4}\\1\\p{N}{4}", + "3[47]\\p{N}\\p{N}([\\ \\-]?)\\p{N}{6}\\1\\p{N}{5}" + ] +} + diff --git a/resources/project.properties b/resources/project.properties new file mode 100644 index 00000000..3bc87b32 --- /dev/null +++ b/resources/project.properties @@ -0,0 +1 @@ +project.basedir=${basedir} \ No newline at end of file diff --git a/src/main/java/net/authorize/util/HttpUtility.java b/src/main/java/net/authorize/util/HttpUtility.java index ad43a25d..cae21c51 100644 --- a/src/main/java/net/authorize/util/HttpUtility.java +++ b/src/main/java/net/authorize/util/HttpUtility.java @@ -68,7 +68,6 @@ static HttpPost createPostRequest(Environment env, ANetApiRequest request) throw if(null != request) { postUrl = new URI(env.getXmlBaseUrl() + "/xml/v1/request.api"); - logger.debug(String.format("MerchantInfo->LoginId/TransactionKey: '%s':'%s'", request.getMerchantAuthentication().getName(), request.getMerchantAuthentication().getTransactionKey() )); logger.debug(String.format("Posting request to Url: '%s'", postUrl)); httpPost = new HttpPost(postUrl); httpPost.getParams().setBooleanParameter(CoreProtocolPNames.USE_EXPECT_CONTINUE, false); diff --git a/src/main/java/net/authorize/util/SensitiveDataConfigType.java b/src/main/java/net/authorize/util/SensitiveDataConfigType.java new file mode 100644 index 00000000..f61564ae --- /dev/null +++ b/src/main/java/net/authorize/util/SensitiveDataConfigType.java @@ -0,0 +1,24 @@ +package net.authorize.util; + +public class SensitiveDataConfigType { + + public SensitiveTag[] sensitiveTags; + + public SensitiveTag[] getSensitiveTags() { + return sensitiveTags; + } + + public void setSensitiveTags(SensitiveTag[] sensitiveTags) { + this.sensitiveTags = sensitiveTags; + } + + public String[] getSensitiveStringRegexes() { + return sensitiveStringRegexes; + } + + public void setSensitiveStringRegexes(String[] sensitiveStringRegexes) { + this.sensitiveStringRegexes = sensitiveStringRegexes; + } + + public String[] sensitiveStringRegexes; +} diff --git a/src/main/java/net/authorize/util/SensitiveFilterLayout.java b/src/main/java/net/authorize/util/SensitiveFilterLayout.java new file mode 100644 index 00000000..393534f9 --- /dev/null +++ b/src/main/java/net/authorize/util/SensitiveFilterLayout.java @@ -0,0 +1,86 @@ +package net.authorize.util; + +import java.io.BufferedReader; +import java.io.FileNotFoundException; +import java.io.IOException; +import java.io.InputStream; +import java.io.InputStreamReader; +import java.io.UnsupportedEncodingException; +import java.util.regex.Pattern; + +import org.apache.log4j.PatternLayout; +import org.apache.log4j.spi.LoggingEvent; +import org.apache.log4j.Logger; + +import com.google.gson.Gson; +import com.google.gson.GsonBuilder; + +public class SensitiveFilterLayout extends PatternLayout{ + + private static Pattern[] cardPatterns; + + private static Pattern[] tagPatterns; + private static String[] tagReplacements; + private static Gson gson; + + public SensitiveFilterLayout() throws UnsupportedEncodingException, FileNotFoundException, IOException { + GsonBuilder gsonBuilder = new GsonBuilder(); + gsonBuilder.registerTypeAdapter(SensitiveDataConfigType.class, new SensitiveTagsDeserializer()); + gson = gsonBuilder.create(); + + InputStream in = getClass().getResourceAsStream("/AuthorizedNetSensitiveTagsConfig.json"); + BufferedReader reader = new BufferedReader(new InputStreamReader(in)); + SensitiveDataConfigType configType = gson.fromJson(reader, SensitiveDataConfigType.class); + cardPatterns = new Pattern[configType.sensitiveStringRegexes.length]; + + for(int i = 0; i < configType.sensitiveStringRegexes.length; i++) { + cardPatterns[i] = Pattern.compile(configType.sensitiveStringRegexes[i]); + } + + int noOfSensitiveTags = configType.sensitiveTags.length; + tagPatterns = new Pattern[noOfSensitiveTags]; + tagReplacements = new String[noOfSensitiveTags]; + + for(int j=0; j"+pattern+""); + else + tagPatterns[j] = Pattern.compile("<"+tagName+">"+".+"+""); + tagReplacements[j] = "<"+tagName+">"+replacement+""; + } + if(reader!=null) + reader.close(); + } + + @Override + public String format(LoggingEvent event) { + if(event.getMessage() instanceof String) { + String message = event.getRenderedMessage(); + String maskXmlMessage = SensitiveFilterLayout.maskSensitiveXmlString(message); + String maskCardNumber = SensitiveFilterLayout.maskCreditCards(maskXmlMessage); + + Throwable throwable = event.getThrowableInformation() != null ? event.getThrowableInformation().getThrowable() : null; + LoggingEvent maskedEvent = new LoggingEvent(event.fqnOfCategoryClass, Logger.getLogger(event.getLoggerName()), event.timeStamp, event.getLevel(), maskCardNumber, throwable); + return super.format(maskedEvent); + } + return null; + } + + public static String maskCreditCards(String str) { + for (int i = 0; i < cardPatterns.length; i++) { + str = cardPatterns[i].matcher(str).replaceAll("XXXX"); + } + return str; + } + + public static String maskSensitiveXmlString(String str) { + for (int i = 0; i < tagPatterns.length; i++) { + str = tagPatterns[i].matcher(str).replaceAll(tagReplacements[i]); + } + return str; + } +} diff --git a/src/main/java/net/authorize/util/SensitiveTag.java b/src/main/java/net/authorize/util/SensitiveTag.java new file mode 100644 index 00000000..f4d1fdf6 --- /dev/null +++ b/src/main/java/net/authorize/util/SensitiveTag.java @@ -0,0 +1,50 @@ +package net.authorize.util; + +public class SensitiveTag { + + public String tagName; + public String getTagName() { + return tagName; + } + + public void setTagName(String tagName) { + this.tagName = tagName; + } + + public String getPattern() { + return pattern; + } + + public void setPattern(String pattern) { + this.pattern = pattern; + } + + public String getReplacement() { + return replacement; + } + + public void setReplacement(String replacement) { + this.replacement = replacement; + } + + public boolean isDisableMask() { + return disableMask; + } + + public void setDisableMask(boolean disableMask) { + this.disableMask = disableMask; + } + + public String pattern; + public String replacement; + public boolean disableMask; + + public SensitiveTag(String tagName, String pattern, String replacement, boolean disableMask) { + + this.tagName = tagName; + this.pattern = pattern; + this.replacement = replacement; + this.disableMask = disableMask; + } +} + diff --git a/src/main/java/net/authorize/util/SensitiveTagsDeserializer.java b/src/main/java/net/authorize/util/SensitiveTagsDeserializer.java new file mode 100644 index 00000000..b2dee50f --- /dev/null +++ b/src/main/java/net/authorize/util/SensitiveTagsDeserializer.java @@ -0,0 +1,35 @@ +package net.authorize.util; + +import java.lang.reflect.Type; + +import com.google.gson.JsonArray; +import com.google.gson.JsonDeserializationContext; +import com.google.gson.JsonDeserializer; +import com.google.gson.JsonElement; +import com.google.gson.JsonObject; +import com.google.gson.JsonParseException; + +public class SensitiveTagsDeserializer implements JsonDeserializer{ + + public SensitiveDataConfigType deserialize(JsonElement arg0, Type arg1, JsonDeserializationContext arg2) + throws JsonParseException { + final JsonObject jsonObject = arg0.getAsJsonObject(); + + final JsonArray jsonSensitiveRegexesArray = jsonObject.get("sensitiveStringRegexes").getAsJsonArray(); + + final String[] stringRegexes = new String[jsonSensitiveRegexesArray.size()]; + + for (int j=0; j pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy