Hi Justin,
Your response is shared to me by Julian Reschke:
=========
What leads you to believe that the data is encrypted? I suppose in theory it
could be encrypted if you have a custom DataStore implementation or there is
encryption done by the JDBC driver, but there's none in the standard
DbDataStore itself.
=========
The data is actually not encrypted, to be specific it is hashed.
Our code interacts with Jack Rabbit API to insert the node key into VER_BUNDLE
table, later the report file data is inserted into DS_JCR_DATASTORE.
Let me share you a piece of code which would be useful for you to understand
the scenario.
===============
String path = uri2xpath(uri);
session = openReadWriteSession();
createContentNode(uri, metadata, session);
Node root = session.getRootNode();
Node newNode = root.getNode(path);
// set the node type to file
//and set the content of the file
Node reportNode = newNode.addNode(FILE_NODE, NodeType.NT_FILE);
Node fileNode = reportNode.addNode(Node.JCR_CONTENT, NodeType.NT_RESOURCE);
ValueFactory valueFactory = session.getValueFactory();
Binary b = valueFactory.createBinary(fileIn);
LOGGER.debug("CONTENT stored id JCR_DATA_STORE ="+b+ " , "+uri);
fileNode.setProperty(Property.JCR_DATA, b);
===============
è reportNode is what we are saving into VER_BUNDLE
è fileNode is the actual file stored into DS_JCR_DATASTORE
We are halted with our analysis as the API belongs to JCR and was not sure how
to extract the data stored in VER_BUNDLE to DATASTORE.
Could you please let us know on how the data is stored from VER_BUNDLE to
DATASTORE.
If you are still unclear on the case, I would like to invite you to a
conference call so that I could loop my product expert as well.
Thanks & Regards,
Dilipkumar S
From: Justin Edelson [mailto:[email protected]]
Sent: Friday, July 14, 2017 9:17 PM
To: [email protected]; [email protected]
Cc: Florence Tournikian-Lalanne <[email protected]>; Subhransu Samant
<[email protected]>; Umamaheswari Jayachandran <[email protected]>;
Dilipkumar S <[email protected]>
Subject: Re: FW: Information on encryption methodology of Jack Rabbit Repository
Hi, I responded to this email already. Did you see my response?
On Fri, Jul 14, 2017 at 9:13 AM Dilipkumar S
<[email protected]<mailto:[email protected]>> wrote:
Hello Users & Dev,
Could someone please assist with the below case.
Thanks & Regards,
Dilipkumar S
From: Dilipkumar S
Sent: Wednesday, July 12, 2017 11:01 AM
To: '[email protected]<mailto:[email protected]>'
<[email protected]<mailto:[email protected]>>;
'[email protected]<mailto:[email protected]>'
<[email protected]<mailto:[email protected]>>
Cc: '[email protected]<mailto:[email protected]>'
<[email protected]<mailto:[email protected]>>; Florence
Tournikian-Lalanne <[email protected]<mailto:[email protected]>>;
'[email protected]<mailto:[email protected]>'
<[email protected]<mailto:[email protected]>>
Subject: Information on encryption methodology of Jack Rabbit Repository
Hello Jack Rabbit,
Am posting this mail to you with comments posted by Julian
Reschke<https://urldefense.proofpoint.com/v2/url?u=https-3A__issues.apache.org_jira_secure_ViewProfile.jspa-3Fname-3Dreschke&d=DwMFaQ&c=U-xfQUIl-0G8P2IcZBeK3A&r=fNhsuJAWxF0tPcVT9_ztXXjtr7KgHfe3fZmWonxucms&m=oJCz9AVI8M4Gh54XCD6xa1hGW3C3iKwdSpKO29W84ZY&s=QIlQ8XKgYAySdlig7zy88i-BGMPiULlqkLSq3A6PsaE&e=>
under below JIRA,
https://issues.apache.org/jira/browse/JCR-4161<https://urldefense.proofpoint.com/v2/url?u=https-3A__issues.apache.org_jira_browse_JCR-2D4161&d=DwMFaQ&c=U-xfQUIl-0G8P2IcZBeK3A&r=fNhsuJAWxF0tPcVT9_ztXXjtr7KgHfe3fZmWonxucms&m=oJCz9AVI8M4Gh54XCD6xa1hGW3C3iKwdSpKO29W84ZY&s=uapdvkwwFpG6TtJhSeDnKRtWIAQ6MSnrEBRM9uGqTXQ&e=>
We require your assistance with reference to Jack Rabbit repository. Here by am
adding the detailed information of the case below:
We have a Front end API using which the reports would be generated and the
records will be stored in Jack Rabbit repository table DS_JCR_DATASTORE.
Currently we are facing an issue under which the report generated with the
Frontend API is not accessible using open/Save mode with below error appended
in the logs:
===========
2017-07-03 15:10:31,462 | ERROR | defaultWIMFileBasedRealm/advisor | | |
WebContainer : 1 | c.o.r.s.ContentRepositoryService | retrieveReport: Exception
from the uderlying repository
javax.jcr.PathNotFoundException: aaa/report/G7893420170703691287
=============
Based on the above error, we would like to perform analysis on whether the
report generated exists or not with the repository table DS_JCR_DATASTORE, but
we are restricted from performing the analysis due to below constraint:
The records generated and stored with DS_JCR_DATASTORE are in encrypted format
To do the analysis we need to map the relation between a session_id from the
API against a record_id in repository table, therefore I request you to let us
know the steps to decrypt the encrypted data in the table.
I've attached the logs & sample data from DS_JCR_DATASTORE for your reference.
Please let me know if you require any additional information.
Thanks & Regards,
Dilipkumar S
The information in this e-mail and any attachments is confidential and may be
legally privileged. It is intended solely for the addressee or addressees. Any
use or disclosure of the contents of this e-mail/attachments by a not intended
recipient is unauthorized and may be unlawful. If you have received this e-mail
in error please notify the sender. Please note that any views or opinions
presented in this e-mail are solely those of the author and do not necessarily
represent those of TEMENOS. We recommend that you check this e-mail and any
attachments against viruses. TEMENOS accepts no liability for any damage caused
by any malicious code or virus transmitted by this e-mail.
The information in this e-mail and any attachments is confidential and may be
legally privileged. It is intended solely for the addressee or addressees. Any
use or disclosure of the contents of this e-mail/attachments by a not intended
recipient is unauthorized and may be unlawful. If you have received this e-mail
in error please notify the sender. Please note that any views or opinions
presented in this e-mail are solely those of the author and do not necessarily
represent those of TEMENOS. We recommend that you check this e-mail and any
attachments against viruses. TEMENOS accepts no liability for any damage caused
by any malicious code or virus transmitted by this e-mail.