| /* |
| * Licensed to the Apache Software Foundation (ASF) under one or more contributor license |
| * agreements. See the NOTICE file distributed with this work for additional information regarding |
| * copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance with the License. You may obtain a |
| * copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software distributed under the License |
| * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express |
| * or implied. See the License for the specific language governing permissions and limitations under |
| * the License. |
| */ |
| package org.apache.geode.management.internal.cli.commands; |
| |
| import static org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_ENABLED; |
| import static org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_KEYSTORE; |
| import static org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_KEYSTORE_PASSWORD; |
| import static org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_KEYSTORE_TYPE; |
| import static org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_PROTOCOLS; |
| import static org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_REQUIRE_AUTHENTICATION; |
| import static org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_TRUSTSTORE; |
| import static org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_TRUSTSTORE_PASSWORD; |
| import static org.apache.geode.distributed.ConfigurationProperties.MCAST_PORT; |
| import static org.apache.geode.test.util.ResourceUtils.createTempFileFromResource; |
| import static org.junit.Assert.assertEquals; |
| |
| import java.io.File; |
| import java.util.Properties; |
| |
| import org.junit.After; |
| import org.junit.Before; |
| import org.junit.Test; |
| |
| import org.apache.geode.distributed.internal.DistributionConfig; |
| import org.apache.geode.distributed.internal.DistributionConfigImpl; |
| import org.apache.geode.internal.net.SocketCreatorFactory; |
| |
| /** |
| * @since GemFire 8.1 |
| */ |
| public class HTTPServiceSSLSupportJUnitTest { |
| |
| private File jks; |
| |
| |
| @Before |
| public void setUp() throws Exception { |
| jks = findTrustedJKS(); |
| } |
| |
| @After |
| public void tearDown() throws Exception { |
| System.clearProperty(DistributionConfig.GEMFIRE_PREFIX + "javax.net.ssl.keyStore"); |
| System.clearProperty(DistributionConfig.GEMFIRE_PREFIX + "javax.net.ssl.keyStorePassword"); |
| System.clearProperty(DistributionConfig.GEMFIRE_PREFIX + "javax.net.ssl.trustStore"); |
| System.clearProperty(DistributionConfig.GEMFIRE_PREFIX + "javax.net.ssl.trustStorePassword"); |
| System.clearProperty("gemfireSecurityPropertyFile"); |
| SocketCreatorFactory.close(); |
| } |
| |
| private static File findTrustedJKS() { |
| return new File( |
| createTempFileFromResource(HTTPServiceSSLSupportJUnitTest.class, |
| "/ssl/trusted.keystore").getAbsolutePath()); |
| } |
| |
| public static String makePath(String[] strings) { |
| StringBuilder sb = new StringBuilder(); |
| for (int i = 0; i < strings.length; i++) { |
| sb.append(strings[i]); |
| sb.append(File.separator); |
| } |
| return sb.toString(); |
| } |
| |
| // @Ignore("disabled for unknown reason") |
| @Test |
| public void testSSLWithClusterSSL() throws Exception { |
| |
| Properties localProps = new Properties(); |
| localProps.setProperty(MCAST_PORT, "0"); |
| localProps.setProperty(CLUSTER_SSL_ENABLED, "true"); |
| localProps.setProperty(CLUSTER_SSL_KEYSTORE, jks.getCanonicalPath()); |
| localProps.setProperty(CLUSTER_SSL_KEYSTORE_PASSWORD, "password"); |
| localProps.setProperty(CLUSTER_SSL_KEYSTORE_TYPE, "JKS"); |
| localProps.setProperty(CLUSTER_SSL_PROTOCOLS, "SSL"); |
| localProps.setProperty(CLUSTER_SSL_REQUIRE_AUTHENTICATION, "true"); |
| localProps.setProperty(CLUSTER_SSL_TRUSTSTORE, jks.getCanonicalPath()); |
| localProps.setProperty(CLUSTER_SSL_TRUSTSTORE_PASSWORD, "password"); |
| |
| DistributionConfigImpl config = new DistributionConfigImpl(localProps); |
| |
| assertEquals(config.getHttpServiceSSLEnabled(), true); |
| assertEquals(config.getHttpServiceSSLKeyStore(), jks.getCanonicalPath()); |
| assertEquals(config.getHttpServiceSSLKeyStorePassword(), "password"); |
| assertEquals(config.getHttpServiceSSLKeyStoreType(), "JKS"); |
| assertEquals(config.getHttpServiceSSLProtocols(), "SSL"); |
| assertEquals(config.getHttpServiceSSLRequireAuthentication(), true); |
| assertEquals(config.getHttpServiceSSLTrustStore(), jks.getCanonicalPath()); |
| assertEquals(config.getHttpServiceSSLTrustStorePassword(), "password"); |
| } |
| |
| @Test |
| public void testSSLWithDeprecatedClusterSSL_HTTPService() throws Exception { |
| |
| Properties localProps = new Properties(); |
| localProps.setProperty(MCAST_PORT, "0"); |
| localProps.setProperty(CLUSTER_SSL_ENABLED, "true"); |
| System.setProperty(DistributionConfig.GEMFIRE_PREFIX + "javax.net.ssl.keyStore", |
| jks.getCanonicalPath()); |
| System.setProperty(DistributionConfig.GEMFIRE_PREFIX + "javax.net.ssl.keyStorePassword", |
| "password"); |
| |
| localProps.setProperty(CLUSTER_SSL_PROTOCOLS, "SSL"); |
| localProps.setProperty(CLUSTER_SSL_REQUIRE_AUTHENTICATION, "true"); |
| System.setProperty(DistributionConfig.GEMFIRE_PREFIX + "javax.net.ssl.trustStore", |
| jks.getCanonicalPath()); |
| System.setProperty(DistributionConfig.GEMFIRE_PREFIX + "javax.net.ssl.trustStorePassword", |
| "password"); |
| |
| DistributionConfigImpl config = new DistributionConfigImpl(localProps); |
| |
| assertEquals(true, config.getHttpServiceSSLEnabled()); |
| assertEquals("SSL", config.getHttpServiceSSLProtocols()); |
| assertEquals(true, config.getHttpServiceSSLRequireAuthentication()); |
| |
| assertEquals(jks.getCanonicalPath(), |
| config.getHttpServiceSSLProperties().get("javax.net.ssl.keyStore")); |
| assertEquals("password", |
| config.getHttpServiceSSLProperties().get("javax.net.ssl.keyStorePassword")); |
| // assertIndexDetailsEquals(system.getConfig().getHttpServiceSSLKeyStoreType(),"JKS"); |
| assertEquals(jks.getCanonicalPath(), |
| config.getHttpServiceSSLProperties().get("javax.net.ssl.trustStore")); |
| assertEquals("password", |
| config.getHttpServiceSSLProperties().get("javax.net.ssl.trustStorePassword")); |
| |
| } |
| |
| @Test |
| public void testSSLWithDeprecatedClusterSSL_HTTPService_WithSSL_Properties() throws Exception { |
| |
| Properties localProps = new Properties(); |
| localProps.setProperty(MCAST_PORT, "0"); |
| localProps.setProperty(CLUSTER_SSL_ENABLED, "true"); |
| |
| localProps.setProperty(CLUSTER_SSL_PROTOCOLS, "SSL"); |
| localProps.setProperty(CLUSTER_SSL_REQUIRE_AUTHENTICATION, "true"); |
| |
| Properties sslProps = new Properties(); |
| sslProps.setProperty("javax.net.ssl.keyStore", jks.getCanonicalPath()); |
| sslProps.setProperty("javax.net.ssl.keyStorePassword", "password"); |
| sslProps.setProperty("javax.net.ssl.trustStore", jks.getCanonicalPath()); |
| sslProps.setProperty("javax.net.ssl.trustStorePassword", "password"); |
| |
| localProps.putAll(sslProps); |
| |
| DistributionConfigImpl config = new DistributionConfigImpl(localProps); |
| |
| assertEquals(config.getHttpServiceSSLEnabled(), true); |
| assertEquals(config.getHttpServiceSSLProtocols(), "SSL"); |
| assertEquals(config.getHttpServiceSSLRequireAuthentication(), true); |
| |
| assertEquals(jks.getCanonicalPath(), |
| config.getHttpServiceSSLProperties().get("javax.net.ssl.keyStore")); |
| assertEquals("password", |
| config.getHttpServiceSSLProperties().get("javax.net.ssl.keyStorePassword")); |
| assertEquals(jks.getCanonicalPath(), |
| config.getHttpServiceSSLProperties().get("javax.net.ssl.trustStore")); |
| assertEquals("password", |
| config.getHttpServiceSSLProperties().get("javax.net.ssl.trustStorePassword")); |
| |
| } |
| |
| |
| } |