Setting Java system properties without putting the values on the command line

27,343

Solution 1

You could just read the file somewhere near startup and call System.setProperty(). For a web application use a ServletContextListener so it happens early, see this answer for a quick example.

Update: this is perhaps not early enough for your use case with JBoss loading its configuration files.

Solution 2

If your concern is exposing the value for super.secret.password in clear text but you are not worried about someone invoking your program with the correct value for the password because of you've covered that issue using permissions or some other means, then I think you could simply encrypt the password in your start-up script and have a wrapper class decrypt it.

java -Dsuper.secret.password=BbWvOuliHZVHVwsXudsj14d1iXzo655R gov.fortknox.DecryptWrapper

If the credentials are for a data source, I should also point out other solutions specific to JBoss: SecureIdentityLoginModule which essentially does the above, and PBEUtils which offers a keystore solution when used with SecureIdentityLoginModule. See EncryptingDataSourcePasswords.

And finally, the suggestion by Peter Lawery to use a file is valid too.

Solution 3

You can read it from some file in a static initializer of your class that contains the main method:

    static {
        try {
          FileReader fr = new FileReader(FILE_NAME);
          // read the property
          System.setProperty(property.getName(), property.getValue());
        } catch (final FileNotFoundException ex) {
          logger.log(Level.SEVERE, ex.getMessage(), ex);
        } catch (final IOException ex) {
          logger.log(Level.SEVERE, ex.getMessage(), ex);
        }
    } 
    ...
    public static void main(...){
    ...
    }

Solution 4

'cryptomainia' was written to solve this exact issue. It decrypts main() arguments. https://github.com/birchb1024/cryptomainia

Share:
27,343
Tom Anderson
Author by

Tom Anderson

I tried to go clean from programming, but i'm a recidivist. In the unlikely event of you wanting to hire me, i'm on Careers 2.0.

Updated on January 27, 2020

Comments

  • Tom Anderson
    Tom Anderson over 4 years

    I have some Java code which depends on a system property super.secret.password. I need to set that property when i run my app. The app will be started by a shell script, and the password will be kept in a file with minimal read permissions.

    I really don't want to write:

    java -Dsuper.secret.password=letmein gov.fortknox.MyApp
    

    Because then anyone who can get on to the machine and run ps or top can see what the password is.

    So, is there a good way to set system properties without exposing them on the command line?

    The only generic solution we've come up with is to write a small C program which reads system properties from a file, then starts the JVM using the JNI invocation API. Needless to say, we are not keen to do this.

    If there isn't a way to set them without using the command line, is there a way to hide the command line from prying eyes? We're using Red Hat Enterprise Linux Server 5.5.

    For what it's worth, the app in question is actually JBoss EAP 4.3.0, and we're using the system properties to fill in substitution constructs (${like.this}) in its XML configuration files. There are JBoss-specific solutions - either use the SystemPropertiesService (by default, configured through the properties-service.xml file in the deploy directory) or pass the -P option to run.sh. However, i am interested in the more general case, where this could be any Java program.

  • Tom Anderson
    Tom Anderson about 13 years
    This is new to me. Based on a quick google, it looks like JAVA_TOOL_OPTIONS is used by JVMTI. Could you explain how you think this is helpful here?
  • Dakshinamurthy Karra
    Dakshinamurthy Karra about 13 years
    Whatever is given in the JAVA_TOOL_OPTIONS environment variable is picked up as additional commandline arguments by java command.
  • Tom Anderson
    Tom Anderson about 13 years
    In general, for code that's entirely under the programmer's control, this would be a good solution. But in the context of something like an app server, there's no way to inject the file-reading code near enough to startup. That's why i'm interested in a way to set the properties when i invoke java, rather than in code.
  • Tom Anderson
    Tom Anderson about 13 years
    What would the DecryptWrapper class do?
  • Dakshinamurthy Karra
    Dakshinamurthy Karra about 13 years
    My mistake. Got confused between JAVA_OPTS and JAVA_TOOL_OPTIONS. Both work the same way. JAVA_OPTS is only a convention and used by scripts. But JAVA_TOOL_OPTIONS is read by the JVM.
  • Tom Anderson
    Tom Anderson about 13 years
    There will actually be a few passwords: some for datasources, and some for web services. For datasources, the SecureIdentityLoginModule stuff looks very interesting - thanks. We might be able to find some way to use it for the web services too, where we have some of our own code in the path.
  • Tom Anderson
    Tom Anderson about 13 years
    Everything you write is true. But it doesn't answer the question, which is about how i set the system property so that some arbitrary code (in my case, JBoss) can read it.
  • Tom Anderson
    Tom Anderson over 12 years
    In the end, this is what we did. We subclassed a core component of JBoss which starts up very early, and did our property loading in its initialisation method. Not pretty, and Red Hat support would flip out if they saw it, but it works.