| /* |
| * Licensed to the Apache Software Foundation (ASF) under one or more |
| * contributor license agreements. See the NOTICE file distributed with |
| * this work for additional information regarding copyright ownership. |
| * The ASF licenses this file to You under the Apache License, Version 2.0 |
| * (the "License"); you may not use this file except in compliance with |
| * the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| package org.apache.nifi.ssl; |
| |
| import org.apache.nifi.components.ValidationContext; |
| import org.apache.nifi.components.ValidationResult; |
| import org.apache.nifi.reporting.InitializationException; |
| import org.apache.nifi.security.util.TemporaryKeyStoreBuilder; |
| import org.apache.nifi.security.util.TlsConfiguration; |
| import org.apache.nifi.util.MockProcessContext; |
| import org.apache.nifi.util.MockValidationContext; |
| import org.apache.nifi.util.TestRunner; |
| import org.apache.nifi.util.TestRunners; |
| import org.junit.jupiter.api.BeforeAll; |
| import org.junit.jupiter.api.Test; |
| |
| import java.io.File; |
| import java.io.IOException; |
| import java.nio.file.Files; |
| import java.nio.file.StandardCopyOption; |
| import java.util.Collection; |
| import java.util.HashMap; |
| import java.util.Map; |
| |
| import static org.junit.jupiter.api.Assertions.assertFalse; |
| import static org.junit.jupiter.api.Assertions.assertNotNull; |
| import static org.junit.jupiter.api.Assertions.assertTrue; |
| |
| public class SSLContextServiceTest { |
| private static TlsConfiguration tlsConfiguration; |
| |
| @BeforeAll |
| public static void setTlsConfiguration() { |
| tlsConfiguration = new TemporaryKeyStoreBuilder().build(); |
| } |
| |
| @Test |
| public void testShouldFailToAddControllerServiceWithNoProperties() throws InitializationException { |
| final TestRunner runner = TestRunners.newTestRunner(TestProcessor.class); |
| final SSLContextService service = new StandardSSLContextService(); |
| final Map<String, String> properties = new HashMap<>(); |
| runner.addControllerService("test-no-properties", service, properties); |
| runner.assertNotValid(service); |
| } |
| |
| @Test |
| public void testShouldFailToAddControllerServiceWithoutKeystoreType() throws InitializationException { |
| final TestRunner runner = TestRunners.newTestRunner(TestProcessor.class); |
| final SSLContextService service = new StandardSSLContextService(); |
| final Map<String, String> properties = new HashMap<>(); |
| properties.put(StandardSSLContextService.KEYSTORE.getName(), tlsConfiguration.getKeystorePath()); |
| properties.put(StandardSSLContextService.KEYSTORE_PASSWORD.getName(), tlsConfiguration.getKeystorePassword()); |
| runner.addControllerService("test-no-keystore-type", service, properties); |
| runner.assertNotValid(service); |
| } |
| |
| @Test |
| public void testShouldFailToAddControllerServiceWithOnlyTruststorePath() throws InitializationException { |
| final TestRunner runner = TestRunners.newTestRunner(TestProcessor.class); |
| final SSLContextService service = new StandardSSLContextService(); |
| final Map<String, String> properties = new HashMap<>(); |
| properties.put(StandardSSLContextService.KEYSTORE.getName(), tlsConfiguration.getKeystorePath()); |
| properties.put(StandardSSLContextService.KEYSTORE_PASSWORD.getName(), tlsConfiguration.getKeystorePassword()); |
| properties.put(StandardSSLContextService.KEYSTORE_TYPE.getName(), tlsConfiguration.getKeystoreType().getType()); |
| properties.put(StandardSSLContextService.TRUSTSTORE.getName(), tlsConfiguration.getTruststorePath()); |
| runner.addControllerService("test-no-truststore-password-or-type", service, properties); |
| runner.assertNotValid(service); |
| } |
| |
| @Test |
| public void testShouldFailToAddControllerServiceWithWrongPasswords() throws InitializationException { |
| final TestRunner runner = TestRunners.newTestRunner(TestProcessor.class); |
| final SSLContextService service = new StandardSSLContextService(); |
| final Map<String, String> properties = new HashMap<>(); |
| properties.put(StandardSSLContextService.KEYSTORE.getName(), tlsConfiguration.getKeystorePath()); |
| properties.put(StandardSSLContextService.KEYSTORE_PASSWORD.getName(), String.class.getSimpleName()); |
| properties.put(StandardSSLContextService.KEYSTORE_TYPE.getName(), tlsConfiguration.getKeystoreType().getType()); |
| properties.put(StandardSSLContextService.TRUSTSTORE.getName(), tlsConfiguration.getTruststorePath()); |
| properties.put(StandardSSLContextService.TRUSTSTORE_PASSWORD.getName(), String.class.getSimpleName()); |
| properties.put(StandardSSLContextService.TRUSTSTORE_TYPE.getName(), tlsConfiguration.getTruststoreType().getType()); |
| runner.addControllerService("test-wrong-passwords", service, properties); |
| |
| runner.assertNotValid(service); |
| } |
| |
| @Test |
| public void testShouldFailToAddControllerServiceWithNonExistentFiles() throws InitializationException { |
| final TestRunner runner = TestRunners.newTestRunner(TestProcessor.class); |
| final SSLContextService service = new StandardSSLContextService(); |
| final Map<String, String> properties = new HashMap<>(); |
| properties.put(StandardSSLContextService.KEYSTORE.getName(), "src/test/resources/DOES-NOT-EXIST.jks"); |
| properties.put(StandardSSLContextService.KEYSTORE_PASSWORD.getName(), tlsConfiguration.getTruststorePassword()); |
| properties.put(StandardSSLContextService.KEYSTORE_TYPE.getName(), tlsConfiguration.getKeystoreType().getType()); |
| properties.put(StandardSSLContextService.TRUSTSTORE.getName(), tlsConfiguration.getTruststorePath()); |
| properties.put(StandardSSLContextService.TRUSTSTORE_PASSWORD.getName(), tlsConfiguration.getTruststorePassword()); |
| properties.put(StandardSSLContextService.TRUSTSTORE_TYPE.getName(), tlsConfiguration.getTruststoreType().getType()); |
| runner.addControllerService("test-keystore-file-does-not-exist", service, properties); |
| runner.assertNotValid(service); |
| } |
| |
| @Test |
| public void testGood() throws InitializationException { |
| final TestRunner runner = TestRunners.newTestRunner(TestProcessor.class); |
| SSLContextService service = new StandardSSLContextService(); |
| runner.addControllerService("test-good1", service); |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE.getName(), tlsConfiguration.getKeystorePath()); |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE_PASSWORD.getName(), tlsConfiguration.getKeystorePassword()); |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE_TYPE.getName(), tlsConfiguration.getKeystoreType().getType()); |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE.getName(), tlsConfiguration.getTruststorePath()); |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_PASSWORD.getName(), tlsConfiguration.getTruststorePassword()); |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_TYPE.getName(), tlsConfiguration.getTruststoreType().getType()); |
| runner.enableControllerService(service); |
| |
| runner.setProperty("SSL Context Svc ID", "test-good1"); |
| runner.assertValid(service); |
| service = (SSLContextService) runner.getProcessContext().getControllerServiceLookup().getControllerService("test-good1"); |
| assertNotNull(service); |
| SSLContextService sslService = service; |
| sslService.createContext(); |
| } |
| |
| @Test |
| public void testGoodWithEL() throws InitializationException { |
| final TestRunner runner = TestRunners.newTestRunner(TestProcessor.class); |
| SSLContextService service = new StandardSSLContextService(); |
| runner.addControllerService("test-good1", service); |
| runner.setEnvironmentVariableValue("keystore", tlsConfiguration.getKeystorePath()); |
| runner.setEnvironmentVariableValue("truststore", tlsConfiguration.getTruststorePath()); |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE.getName(), "${keystore}"); |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE_PASSWORD.getName(), tlsConfiguration.getKeystorePassword()); |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE_TYPE.getName(), tlsConfiguration.getKeystoreType().getType()); |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE.getName(), "${truststore}"); |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_PASSWORD.getName(), tlsConfiguration.getTruststorePassword()); |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_TYPE.getName(), tlsConfiguration.getTruststoreType().getType()); |
| runner.enableControllerService(service); |
| |
| runner.setProperty("SSL Context Svc ID", "test-good1"); |
| runner.assertValid(service); |
| service = (SSLContextService) runner.getProcessContext().getControllerServiceLookup().getControllerService("test-good1"); |
| assertNotNull(service); |
| SSLContextService sslService = service; |
| sslService.createContext(); |
| } |
| |
| @Test |
| public void testWithChanges() throws InitializationException { |
| final TestRunner runner = TestRunners.newTestRunner(TestProcessor.class); |
| SSLContextService service = new StandardSSLContextService(); |
| runner.addControllerService("test-good1", service); |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE.getName(), tlsConfiguration.getKeystorePath()); |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE_PASSWORD.getName(), tlsConfiguration.getKeystorePassword()); |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE_TYPE.getName(), tlsConfiguration.getKeystoreType().getType()); |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE.getName(), tlsConfiguration.getTruststorePath()); |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_PASSWORD.getName(), tlsConfiguration.getTruststorePassword()); |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_TYPE.getName(), tlsConfiguration.getTruststoreType().getType()); |
| runner.enableControllerService(service); |
| |
| runner.setProperty("SSL Context Svc ID", "test-good1"); |
| runner.assertValid(service); |
| |
| runner.disableControllerService(service); |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE.getName(), "src/test/resources/DOES-NOT-EXIST.jks"); |
| runner.assertNotValid(service); |
| |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE.getName(), tlsConfiguration.getKeystorePath()); |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_PASSWORD.getName(), String.class.getSimpleName()); |
| runner.assertNotValid(service); |
| |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_PASSWORD.getName(), tlsConfiguration.getTruststorePassword()); |
| runner.enableControllerService(service); |
| runner.assertValid(service); |
| } |
| |
| @Test |
| public void testValidationResultsCacheShouldExpire() throws InitializationException, IOException { |
| // Copy the keystore and truststore to a tmp directory so the originals are not modified |
| File originalKeystore = new File(tlsConfiguration.getKeystorePath()); |
| File originalTruststore = new File(tlsConfiguration.getTruststorePath()); |
| |
| File tmpKeystore = File.createTempFile(getClass().getSimpleName(), ".keystore.p12"); |
| File tmpTruststore = File.createTempFile(getClass().getSimpleName(), ".truststore.p12"); |
| |
| Files.copy(originalKeystore.toPath(), tmpKeystore.toPath(), StandardCopyOption.REPLACE_EXISTING); |
| Files.copy(originalTruststore.toPath(), tmpTruststore.toPath(), StandardCopyOption.REPLACE_EXISTING); |
| |
| final TestRunner runner = TestRunners.newTestRunner(TestProcessor.class); |
| StandardSSLContextService service = new StandardSSLContextService(); |
| final String serviceIdentifier = "test-should-expire"; |
| runner.addControllerService(serviceIdentifier, service); |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE.getName(), tmpKeystore.getAbsolutePath()); |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE_PASSWORD.getName(), tlsConfiguration.getKeystorePassword()); |
| runner.setProperty(service, StandardSSLContextService.KEYSTORE_TYPE.getName(), tlsConfiguration.getKeystoreType().getType()); |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE.getName(), tmpTruststore.getAbsolutePath()); |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_PASSWORD.getName(), tlsConfiguration.getTruststorePassword()); |
| runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_TYPE.getName(), tlsConfiguration.getTruststoreType().getType()); |
| runner.enableControllerService(service); |
| |
| runner.setProperty("SSL Context Svc ID", serviceIdentifier); |
| runner.assertValid(service); |
| |
| // Act |
| assertTrue(tmpKeystore.delete()); |
| assertFalse(tmpKeystore.exists()); |
| |
| // Manually validate the service (expecting cached result to be returned) |
| final MockProcessContext processContext = (MockProcessContext) runner.getProcessContext(); |
| // This service does not use the state manager |
| final ValidationContext validationContext = new MockValidationContext(processContext, null); |
| |
| // Even though the keystore file is no longer present, because no property changed, the cached result is still valid |
| Collection<ValidationResult> validationResults = service.customValidate(validationContext); |
| assertTrue(validationResults.isEmpty(), "validation results is not empty"); |
| |
| // Assert |
| |
| // Have to exhaust the cached result by checking n-1 more times |
| for (int i = 2; i < service.getValidationCacheExpiration(); i++) { |
| validationResults = service.customValidate(validationContext); |
| assertTrue(validationResults.isEmpty(), "validation results is not empty"); |
| } |
| |
| validationResults = service.customValidate(validationContext); |
| assertFalse(validationResults.isEmpty(), "validation results is empty"); |
| } |
| |
| @Test |
| public void testGoodTrustOnly() throws InitializationException { |
| TestRunner runner = TestRunners.newTestRunner(TestProcessor.class); |
| SSLContextService service = new StandardSSLContextService(); |
| HashMap<String, String> properties = new HashMap<>(); |
| properties.put(StandardSSLContextService.TRUSTSTORE.getName(), tlsConfiguration.getTruststorePath()); |
| properties.put(StandardSSLContextService.TRUSTSTORE_PASSWORD.getName(), tlsConfiguration.getTruststorePassword()); |
| properties.put(StandardSSLContextService.TRUSTSTORE_TYPE.getName(), tlsConfiguration.getTruststoreType().getType()); |
| runner.addControllerService("test-good2", service, properties); |
| runner.enableControllerService(service); |
| |
| runner.setProperty("SSL Context Svc ID", "test-good2"); |
| runner.assertValid(); |
| assertNotNull(service); |
| service.createContext(); |
| } |
| } |