blob: 53a495a33c0a6b0f741ba07c35e6f3a40639156f [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more contributor license
* agreements. See the NOTICE file distributed with this work for additional information regarding
* copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance with the License. You may obtain a
* copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
package org.apache.geode.management.internal.cli.commands;
import static org.apache.geode.distributed.ConfigurationProperties.SSL_CIPHERS;
import static org.apache.geode.distributed.ConfigurationProperties.SSL_ENABLED_COMPONENTS;
import static org.apache.geode.distributed.ConfigurationProperties.SSL_KEYSTORE;
import static org.apache.geode.distributed.ConfigurationProperties.SSL_KEYSTORE_PASSWORD;
import static org.apache.geode.distributed.ConfigurationProperties.SSL_KEYSTORE_TYPE;
import static org.apache.geode.distributed.ConfigurationProperties.SSL_PROTOCOLS;
import static org.apache.geode.distributed.ConfigurationProperties.SSL_TRUSTSTORE;
import static org.apache.geode.distributed.ConfigurationProperties.SSL_TRUSTSTORE_PASSWORD;
import static org.apache.geode.distributed.ConfigurationProperties.SSL_TRUSTSTORE_TYPE;
import static org.apache.geode.test.util.ResourceUtils.createTempFileFromResource;
import static org.assertj.core.api.Assertions.assertThat;
import java.io.File;
import java.io.FileOutputStream;
import java.io.OutputStream;
import java.util.Properties;
import org.junit.Before;
import org.junit.ClassRule;
import org.junit.Rule;
import org.junit.Test;
import org.junit.experimental.categories.Category;
import org.junit.rules.TemporaryFolder;
import org.apache.geode.security.SecurableCommunicationChannels;
import org.apache.geode.test.dunit.IgnoredException;
import org.apache.geode.test.dunit.rules.CleanupDUnitVMsRule;
import org.apache.geode.test.dunit.rules.ClusterStartupRule;
import org.apache.geode.test.dunit.rules.MemberVM;
import org.apache.geode.test.junit.categories.GfshTest;
import org.apache.geode.test.junit.rules.GfshCommandRule;
@Category({GfshTest.class})
public class ConnectCommandWithSSLTest {
@ClassRule
public static CleanupDUnitVMsRule cleanupDUnitVMsRule = new CleanupDUnitVMsRule();
private static final File jks;
static {
/*
* This file was generated with the following command:
* keytool -genkey -dname "CN=localhost" -alias self -validity 3650 -keyalg EC \
* -keystore trusted.keystore -keypass password -storepass password \
* -ext san=ip:127.0.0.1 -storetype jks
*/
jks = new File(createTempFileFromResource(ConnectCommandWithSSLTest.class.getClassLoader(),
"ssl/trusted.keystore").getAbsolutePath());
}
private static final Properties sslProperties = new Properties() {
{
setProperty(SSL_ENABLED_COMPONENTS, SecurableCommunicationChannels.ALL);
setProperty(SSL_KEYSTORE, jks.getAbsolutePath());
setProperty(SSL_KEYSTORE_PASSWORD, "password");
setProperty(SSL_KEYSTORE_TYPE, "JKS");
setProperty(SSL_TRUSTSTORE, jks.getAbsolutePath());
setProperty(SSL_TRUSTSTORE_PASSWORD, "password");
setProperty(SSL_TRUSTSTORE_TYPE, "JKS");
setProperty(SSL_CIPHERS, "any");
setProperty(SSL_PROTOCOLS, "any");
}
};
@SuppressWarnings("deprecation")
private static final Properties jmxSslProperties = new Properties() {
{
setProperty(org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_ENABLED,
"true");
setProperty(org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_KEYSTORE,
jks.getAbsolutePath());
setProperty(
org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_KEYSTORE_PASSWORD,
"password");
setProperty(
org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_KEYSTORE_TYPE,
"JKS");
setProperty(org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_TRUSTSTORE,
jks.getAbsolutePath());
setProperty(
org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_TRUSTSTORE_PASSWORD,
"password");
setProperty(org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_CIPHERS,
"any");
setProperty(org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_SSL_PROTOCOLS,
"any");
}
};
@SuppressWarnings("deprecation")
private static final Properties clusterSslProperties = new Properties() {
{
setProperty(org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_ENABLED, "true");
setProperty(org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_KEYSTORE,
jks.getAbsolutePath());
setProperty(
org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_KEYSTORE_PASSWORD,
"password");
setProperty(org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_KEYSTORE_TYPE,
"JKS");
setProperty(org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_TRUSTSTORE,
jks.getAbsolutePath());
setProperty(
org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_TRUSTSTORE_PASSWORD,
"password");
setProperty(org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_CIPHERS, "any");
setProperty(org.apache.geode.distributed.ConfigurationProperties.CLUSTER_SSL_PROTOCOLS,
"any");
}
};
@SuppressWarnings("deprecation")
private static final Properties httpSslProperties = new Properties() {
{
setProperty(org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_ENABLED,
"true");
setProperty(org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_KEYSTORE,
jks.getAbsolutePath());
setProperty(
org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_KEYSTORE_PASSWORD,
"password");
setProperty(
org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_KEYSTORE_TYPE,
"JKS");
setProperty(org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_TRUSTSTORE,
jks.getAbsolutePath());
setProperty(
org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_TRUSTSTORE_PASSWORD,
"password");
setProperty(org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_CIPHERS,
"any");
setProperty(org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_PROTOCOLS,
"any");
}
};
@SuppressWarnings("deprecation")
private static final Properties httpSslPropertiesSkipValidation = new Properties() {
{
setProperty(org.apache.geode.distributed.ConfigurationProperties.HTTP_SERVICE_SSL_ENABLED,
"true");
}
};
@Rule
public TemporaryFolder temporaryFolder = new TemporaryFolder();
@Rule
public ClusterStartupRule lsRule = new ClusterStartupRule();
private static MemberVM locator;
private OutputStream out = null;
private File sslConfigFile = null;
@Before
public void before() throws Exception {
locator = lsRule.startLocatorVM(0, l -> l.withProperties(sslProperties).withHttpService());
IgnoredException.addIgnoredException("javax.net.ssl.SSLException: Unrecognized SSL message");
sslConfigFile = temporaryFolder.newFile("ssl.properties");
out = new FileOutputStream(sslConfigFile);
}
@Rule
public GfshCommandRule gfsh = new GfshCommandRule();
@Test
public void connectWithNoSSL() throws Exception {
failToConnectWithoutSSLTo(locator.getPort(), GfshCommandRule.PortType.locator);
// should fail at connecting to locator stage
assertThat(gfsh.getGfshOutput()).doesNotContain("Connecting to Manager at");
assertThat(gfsh.getGfshOutput()).containsPattern(
"Server expecting SSL handshake|Read timed out|Broken pipe \\(Write failed\\)|Connection reset");
failToConnectWithoutSSLTo(locator.getJmxPort(), GfshCommandRule.PortType.jmxManager);
assertThat(gfsh.getGfshOutput()).contains("non-JRMP server at remote endpoint");
failToConnectWithoutSSLTo(locator.getHttpPort(), GfshCommandRule.PortType.http);
assertThat(gfsh.getGfshOutput()).contains("Unexpected end of file from server");
}
@Test
public void connectWithSSL() throws Exception {
connectWithSSLProperties(sslProperties);
}
private void connectWithSSLProperties(Properties sslProperties) throws Exception {
sslProperties.store(out, null);
connectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator);
gfsh.disconnect();
connectWithSSLTo(locator.getJmxPort(), GfshCommandRule.PortType.jmxManager);
gfsh.disconnect();
connectWithSSLTo(locator.getHttpPort(), GfshCommandRule.PortType.https);
}
@Test
public void connectWithJmxSSL() throws Exception {
jmxSslProperties.store(out, null);
// can't connect locator
failToConnectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator);
assertThat(gfsh.getGfshOutput()).doesNotContain("Connecting to Manager at");
assertThat(gfsh.getGfshOutput()).containsPattern(
"Server expecting SSL handshake|Read timed out|Broken pipe \\(Write failed\\)|Connection reset");
// can connect to jmx
connectWithSSLTo(locator.getJmxPort(), GfshCommandRule.PortType.jmxManager);
gfsh.disconnect();
// can connect to https
connectWithSSLTo(locator.getHttpPort(), GfshCommandRule.PortType.https);
}
@Test
/*
* apparently cluster-ssl-* configurations are copied to jmx-ssl-* and http-server-ssl-*, so
* connection to other channels will succeed as well. see DistributionConfigImpl around line 986:
* if (!isConnected) { copySSLPropsToServerSSLProps(); copySSLPropsToJMXSSLProps();
* copyClusterSSLPropsToGatewaySSLProps(); copySSLPropsToHTTPSSLProps(); }
*/
public void connectWithClusterSSL() throws Exception {
connectWithSSLProperties(clusterSslProperties);
}
@Test
public void connectWithHttpSSL() throws Exception {
httpSslProperties.store(out, null);
// can connect to locator and jmx
failToConnectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator);
// cannot connect to jmx
failToConnectWithSSLTo(locator.getJmxPort(), GfshCommandRule.PortType.jmxManager);
// can connect to https
connectWithSSLTo(locator.getHttpPort(), GfshCommandRule.PortType.https);
}
@Test
public void connectWithHttpSSLAndDeprecatedUseHttp() throws Exception {
httpSslProperties.store(out, null);
// can connect to locator and jmx
failToConnectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator);
// can connect to https
gfsh.connect(locator.getHttpPort(), GfshCommandRule.PortType.https,
"security-properties-file",
sslConfigFile.getAbsolutePath(), "use-http", "true");
assertThat(gfsh.isConnected()).isTrue();
}
@Test
public void connectWithHttpSSLAndSkipSSLValidation() throws Exception {
httpSslPropertiesSkipValidation.store(out, null);
// cannot connect to locator and jmx
failToConnectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator);
// cannot connect to jmx
failToConnectWithSSLTo(locator.getJmxPort(), GfshCommandRule.PortType.jmxManager);
// cannot connect to https without skip-ssl-validation
gfsh.connect(locator.getHttpPort(), GfshCommandRule.PortType.https, "security-properties-file",
sslConfigFile.getAbsolutePath(), "skip-ssl-validation", "false");
assertThat(gfsh.isConnected()).isFalse();
assertThat(gfsh.getGfshOutput())
.contains("unable to find valid certification path to requested target");
// can connect to https
gfsh.connect(locator.getHttpPort(), GfshCommandRule.PortType.https, "security-properties-file",
sslConfigFile.getAbsolutePath(), "skip-ssl-validation", "true");
assertThat(gfsh.isConnected()).isTrue();
}
@Test
public void connectWithClusterAndJmxSSL() throws Exception {
Properties combined = new Properties();
combined.putAll(jmxSslProperties);
combined.putAll(clusterSslProperties);
combined.store(out, null);
// can connect to both locator and jmx
connectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator);
}
@Test
public void connectWithSSLAndThenWithNoSSL() throws Exception {
sslProperties.store(out, null);
// can connect to both locator and jmx
connectWithSSLTo(locator.getPort(), GfshCommandRule.PortType.locator);
gfsh.disconnect();
// reconnect again with no SSL should fail
failToConnectWithoutSSLTo(locator.getPort(), GfshCommandRule.PortType.locator);
// it should fail at connecting to locator, not connecting to manager
assertThat(gfsh.getGfshOutput()).doesNotContain("Connecting to Manager at");
}
private void connectWithSSLTo(int port, GfshCommandRule.PortType locator) throws Exception {
gfsh.connect(port, locator, "security-properties-file",
sslConfigFile.getAbsolutePath());
assertThat(gfsh.isConnected()).isTrue();
}
private void failToConnectWithSSLTo(int port, GfshCommandRule.PortType locator) throws Exception {
gfsh.connect(port, locator, "security-properties-file",
sslConfigFile.getAbsolutePath());
assertThat(gfsh.isConnected()).isFalse();
}
private void failToConnectWithoutSSLTo(int port, GfshCommandRule.PortType locator)
throws Exception {
gfsh.connect(port, locator);
assertThat(gfsh.isConnected()).isFalse();
}
}