| /* |
| * Licensed to the Apache Software Foundation (ASF) under one or more contributor license |
| * agreements. See the NOTICE file distributed with this work for additional information regarding |
| * copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance with the License. You may obtain a |
| * copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software distributed under the License |
| * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express |
| * or implied. See the License for the specific language governing permissions and limitations under |
| * the License. |
| */ |
| |
| package org.apache.geode.management.internal.cli.commands; |
| |
| import static org.apache.geode.distributed.ConfigurationProperties.SSL_CIPHERS; |
| import static org.apache.geode.distributed.ConfigurationProperties.SSL_ENABLED_COMPONENTS; |
| import static org.apache.geode.distributed.ConfigurationProperties.SSL_KEYSTORE; |
| import static org.apache.geode.distributed.ConfigurationProperties.SSL_KEYSTORE_PASSWORD; |
| import static org.apache.geode.distributed.ConfigurationProperties.SSL_KEYSTORE_TYPE; |
| import static org.apache.geode.distributed.ConfigurationProperties.SSL_PROTOCOLS; |
| import static org.apache.geode.distributed.ConfigurationProperties.SSL_TRUSTSTORE; |
| import static org.apache.geode.distributed.ConfigurationProperties.SSL_TRUSTSTORE_PASSWORD; |
| import static org.apache.geode.distributed.ConfigurationProperties.SSL_TRUSTSTORE_TYPE; |
| import static org.apache.geode.test.util.ResourceUtils.createTempFileFromResource; |
| import static org.assertj.core.api.Assertions.assertThat; |
| |
| import java.io.File; |
| import java.io.FileOutputStream; |
| import java.io.OutputStream; |
| import java.util.Properties; |
| |
| import org.junit.Before; |
| import org.junit.ClassRule; |
| import org.junit.Rule; |
| import org.junit.Test; |
| import org.junit.experimental.categories.Category; |
| import org.junit.rules.TemporaryFolder; |
| |
| import org.apache.geode.security.SecurableCommunicationChannels; |
| import org.apache.geode.test.dunit.IgnoredException; |
| import org.apache.geode.test.dunit.rules.CleanupDUnitVMsRule; |
| import org.apache.geode.test.dunit.rules.ClusterStartupRule; |
| import org.apache.geode.test.dunit.rules.MemberVM; |
| import org.apache.geode.test.junit.categories.GfshTest; |
| import org.apache.geode.test.junit.rules.GfshCommandRule; |
| |
| @Category({GfshTest.class}) |
| public class ConnectCommandWithSSLTest { |
| @ClassRule |
| public static CleanupDUnitVMsRule cleanupDUnitVMsRule = new CleanupDUnitVMsRule(); |
| |
| private static final File jks; |
| |
| static { |
| /* |
| * This file was generated with the following command: |
| * keytool -genkey -dname "CN=localhost" -alias self -validity 3650 -keyalg EC \ |
| * -keystore trusted.keystore -keypass password -storepass password \ |
| * -ext san=ip:127.0.0.1 -storetype jks |
| */ |
| |
| jks = new File(createTempFileFromResource(ConnectCommandWithSSLTest.class.getClassLoader(), |
| "ssl/trusted.keystore").getAbsolutePath()); |
| } |
| |
| private static final Properties sslProperties = new Properties() { |
| { |
| setProperty(SSL_ENABLED_COMPONENTS, SecurableCommunicationChannels.ALL); |
| setProperty(SSL_KEYSTORE, jks.getAbsolutePath()); |
| setProperty(SSL_KEYSTORE_PASSWORD, "password"); |
| setProperty(SSL_KEYSTORE_TYPE, "JKS"); |
| setProperty(SSL_TRUSTSTORE, jks.getAbsolutePath()); |
| setProperty(SSL_TRUSTSTORE_PASSWORD, "password"); |
| setProperty(SSL_TRUSTSTORE_TYPE, "JKS"); |
| setProperty(SSL_CIPHERS, "any"); |
| setProperty(SSL_PROTOCOLS, "any"); |
| } |
| }; |
| |
| @SuppressWarnings("deprecation") |
| private static final Properties jmxSslProperties = new Properties() { |
| { |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_ENABLED, |
| "true"); |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_KEYSTORE, |
| jks.getAbsolutePath()); |
| setProperty( |
| org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_KEYSTORE_PASSWORD, |
| "password"); |
| setProperty( |
| org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_KEYSTORE_TYPE, |
| "JKS"); |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_TRUSTSTORE, |
| jks.getAbsolutePath()); |
| setProperty( |
| org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_TRUSTSTORE_PASSWORD, |
| "password"); |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_CIPHERS, |
| "any"); |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_PROTOCOLS, |
| "any"); |
| } |
| }; |
| |
| @SuppressWarnings("deprecation") |
| private static final Properties clusterSslProperties = new Properties() { |
| { |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_ENABLED, "true"); |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_KEYSTORE, |
| jks.getAbsolutePath()); |
| setProperty( |
| org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_KEYSTORE_PASSWORD, |
| "password"); |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_KEYSTORE_TYPE, |
| "JKS"); |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_TRUSTSTORE, |
| jks.getAbsolutePath()); |
| setProperty( |
| org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_TRUSTSTORE_PASSWORD, |
| "password"); |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_CIPHERS, "any"); |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_PROTOCOLS, |
| "any"); |
| } |
| }; |
| |
| @SuppressWarnings("deprecation") |
| private static final Properties httpSslProperties = new Properties() { |
| { |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_ENABLED, |
| "true"); |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_KEYSTORE, |
| jks.getAbsolutePath()); |
| setProperty( |
| org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_KEYSTORE_PASSWORD, |
| "password"); |
| setProperty( |
| org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_KEYSTORE_TYPE, |
| "JKS"); |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_TRUSTSTORE, |
| jks.getAbsolutePath()); |
| setProperty( |
| org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_TRUSTSTORE_PASSWORD, |
| "password"); |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_CIPHERS, |
| "any"); |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_PROTOCOLS, |
| "any"); |
| } |
| }; |
| |
| @SuppressWarnings("deprecation") |
| private static final Properties httpSslPropertiesSkipValidation = new Properties() { |
| { |
| setProperty(org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_ENABLED, |
| "true"); |
| } |
| }; |
| |
| @Rule |
| public TemporaryFolder temporaryFolder = new TemporaryFolder(); |
| |
| @Rule |
| public ClusterStartupRule lsRule = new ClusterStartupRule(); |
| |
| private static MemberVM locator; |
| private OutputStream out = null; |
| private File sslConfigFile = null; |
| |
| @Before |
| public void before() throws Exception { |
| locator = lsRule.startLocatorVM(0, l -> l.withProperties(sslProperties).withHttpService()); |
| IgnoredException.addIgnoredException("javax.net.ssl.SSLException: Unrecognized SSL message"); |
| sslConfigFile = temporaryFolder.newFile("ssl.properties"); |
| out = new FileOutputStream(sslConfigFile); |
| } |
| |
| @Rule |
| public GfshCommandRule gfsh = new GfshCommandRule(); |
| |
| @Test |
| public void connectWithNoSSL() throws Exception { |
| failToConnectWithoutSSLTo(locator.getPort(), GfshCommandRule.PortType.locator); |
| // should fail at connecting to locator stage |
| assertThat(gfsh.getGfshOutput()).doesNotContain("Connecting to Manager at"); |
| assertThat(gfsh.getGfshOutput()).containsPattern( |
| "trying to connect a non-SSL-enabled client to an SSL-enabled locator|Broken pipe \\(Write failed\\)|Connection reset"); |
| |
| failToConnectWithoutSSLTo(locator.getJmxPort(), GfshCommandRule.PortType.jmxManager); |
| assertThat(gfsh.getGfshOutput()).contains("non-JRMP server at remote endpoint"); |
| |
| failToConnectWithoutSSLTo(locator.getHttpPort(), GfshCommandRule.PortType.http); |
| assertThat(gfsh.getGfshOutput()).contains("Unexpected end of file from server"); |
| } |
| |
| @Test |
| public void connectWithSSL() throws Exception { |
| connectWithSSLProperties(sslProperties); |
| } |
| |
| private void connectWithSSLProperties(Properties sslProperties) throws Exception { |
| sslProperties.store(out, null); |
| |
| connectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator); |
| gfsh.disconnect(); |
| |
| connectWithSSLTo(locator.getJmxPort(), GfshCommandRule.PortType.jmxManager); |
| gfsh.disconnect(); |
| |
| connectWithSSLTo(locator.getHttpPort(), GfshCommandRule.PortType.https); |
| } |
| |
| @Test |
| public void connectWithJmxSSL() throws Exception { |
| jmxSslProperties.store(out, null); |
| // can't connect locator |
| failToConnectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator); |
| assertThat(gfsh.getGfshOutput()).doesNotContain("Connecting to Manager at"); |
| assertThat(gfsh.getGfshOutput()).containsPattern( |
| "trying to connect a non-SSL-enabled client to an SSL-enabled locator|Broken pipe \\(Write failed\\)|Connection reset"); |
| |
| |
| // can connect to jmx |
| connectWithSSLTo(locator.getJmxPort(), GfshCommandRule.PortType.jmxManager); |
| gfsh.disconnect(); |
| |
| // can connect to https |
| connectWithSSLTo(locator.getHttpPort(), GfshCommandRule.PortType.https); |
| } |
| |
| @Test |
| /* |
| * apparently cluster-ssl-* configurations are copied to jmx-ssl-* and http-server-ssl-*, so |
| * connection to other channels will succeed as well. see DistributionConfigImpl around line 986: |
| * if (!isConnected) { copySSLPropsToServerSSLProps(); copySSLPropsToJMXSSLProps(); |
| * copyClusterSSLPropsToGatewaySSLProps(); copySSLPropsToHTTPSSLProps(); } |
| */ |
| public void connectWithClusterSSL() throws Exception { |
| connectWithSSLProperties(clusterSslProperties); |
| } |
| |
| @Test |
| public void connectWithHttpSSL() throws Exception { |
| httpSslProperties.store(out, null); |
| // can connect to locator and jmx |
| failToConnectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator); |
| |
| // cannot connect to jmx |
| failToConnectWithSSLTo(locator.getJmxPort(), GfshCommandRule.PortType.jmxManager); |
| |
| // can connect to https |
| connectWithSSLTo(locator.getHttpPort(), GfshCommandRule.PortType.https); |
| } |
| |
| @Test |
| public void connectWithHttpSSLAndDeprecatedUseHttp() throws Exception { |
| httpSslProperties.store(out, null); |
| // can connect to locator and jmx |
| failToConnectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator); |
| |
| // can connect to https |
| gfsh.connect(locator.getHttpPort(), GfshCommandRule.PortType.https, |
| "security-properties-file", |
| sslConfigFile.getAbsolutePath(), "use-http", "true"); |
| assertThat(gfsh.isConnected()).isTrue(); |
| } |
| |
| @Test |
| public void connectWithHttpSSLAndSkipSSLValidation() throws Exception { |
| httpSslPropertiesSkipValidation.store(out, null); |
| // cannot connect to locator and jmx |
| failToConnectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator); |
| |
| // cannot connect to jmx |
| failToConnectWithSSLTo(locator.getJmxPort(), GfshCommandRule.PortType.jmxManager); |
| |
| // cannot connect to https without skip-ssl-validation |
| gfsh.connect(locator.getHttpPort(), GfshCommandRule.PortType.https, "security-properties-file", |
| sslConfigFile.getAbsolutePath(), "skip-ssl-validation", "false"); |
| assertThat(gfsh.isConnected()).isFalse(); |
| assertThat(gfsh.getGfshOutput()) |
| .contains("unable to find valid certification path to requested target"); |
| |
| // can connect to https |
| gfsh.connect(locator.getHttpPort(), GfshCommandRule.PortType.https, "security-properties-file", |
| sslConfigFile.getAbsolutePath(), "skip-ssl-validation", "true"); |
| assertThat(gfsh.isConnected()).isTrue(); |
| } |
| |
| @Test |
| public void connectWithClusterAndJmxSSL() throws Exception { |
| Properties combined = new Properties(); |
| combined.putAll(jmxSslProperties); |
| combined.putAll(clusterSslProperties); |
| combined.store(out, null); |
| |
| // can connect to both locator and jmx |
| connectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator); |
| } |
| |
| @Test |
| public void connectWithSSLAndThenWithNoSSL() throws Exception { |
| sslProperties.store(out, null); |
| |
| // can connect to both locator and jmx |
| connectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator); |
| gfsh.disconnect(); |
| |
| // reconnect again with no SSL should fail |
| failToConnectWithoutSSLTo(locator.getPort(), GfshCommandRule.PortType.locator); |
| // it should fail at connecting to locator, not connecting to manager |
| assertThat(gfsh.getGfshOutput()).doesNotContain("Connecting to Manager at"); |
| } |
| |
| private void connectWithSSLTo(int port, GfshCommandRule.PortType locator) throws Exception { |
| gfsh.connect(port, locator, "security-properties-file", |
| sslConfigFile.getAbsolutePath()); |
| assertThat(gfsh.isConnected()).isTrue(); |
| } |
| |
| private void failToConnectWithSSLTo(int port, GfshCommandRule.PortType locator) throws Exception { |
| gfsh.connect(port, locator, "security-properties-file", |
| sslConfigFile.getAbsolutePath()); |
| assertThat(gfsh.isConnected()).isFalse(); |
| } |
| |
| private void failToConnectWithoutSSLTo(int port, GfshCommandRule.PortType locator) |
| throws Exception { |
| gfsh.connect(port, locator); |
| assertThat(gfsh.isConnected()).isFalse(); |
| } |
| |
| } |