blob: f899718768afe182277fbc991f75a015fa1a303e [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.hadoop.crypto.key.kms.server;
import java.io.IOException;
import java.nio.file.Path;
import java.nio.file.Paths;
import java.util.Arrays;
import javax.crypto.Cipher;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.crypto.key.KeyProvider.KeyVersion;
import org.apache.hadoop.crypto.key.KeyProvider.Options;
import org.apache.hadoop.crypto.key.RangerKeyStoreProvider;
import org.junit.jupiter.api.Assertions;
import org.junit.jupiter.api.AfterAll;
import org.junit.jupiter.api.BeforeAll;
import org.junit.jupiter.api.Test;
/**
* A test for the RangerKeyStoreProvider, which is an implementation of the Hadoop KeyProvider interface, which stores keys in a database.
* Apache Derby is used to create the relevant tables to store the keys in for this test.
*/
public class RangerKeyStoreProviderTest {
private static final boolean UNRESTRICTED_POLICIES_INSTALLED;
static {
boolean ok = false;
try {
byte[] data = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07};
SecretKey key192 = new SecretKeySpec(
new byte[] {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17},
"AES");
Cipher c = Cipher.getInstance("AES");
c.init(Cipher.ENCRYPT_MODE, key192);
c.doFinal(data);
ok = true;
} catch (Exception e) {
//
}
UNRESTRICTED_POLICIES_INSTALLED = ok;
}
@BeforeAll
public static void startServers() throws Exception {
if (!UNRESTRICTED_POLICIES_INSTALLED) {
return;
}
DerbyTestUtils.startDerby();
}
@AfterAll
public static void stopServers() throws Exception {
if (UNRESTRICTED_POLICIES_INSTALLED) {
DerbyTestUtils.stopDerby();
}
}
@Test
public void testCreateDeleteKey() throws Throwable {
if (!UNRESTRICTED_POLICIES_INSTALLED) {
return;
}
Path configDir = Paths.get("src/test/resources/kms");
System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath());
Configuration conf = new Configuration();
RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
// Create a key
Options options = new Options(conf);
options.setBitLength(128);
options.setCipher("AES");
KeyVersion keyVersion = keyProvider.createKey("newkey1", options);
Assertions.assertEquals("newkey1", keyVersion.getName());
Assertions.assertEquals(128 / 8, keyVersion.getMaterial().length);
Assertions.assertEquals("newkey1@0", keyVersion.getVersionName());
keyProvider.flush();
Assertions.assertEquals(1, keyProvider.getKeys().size());
keyProvider.deleteKey("newkey1");
keyProvider.flush();
Assertions.assertEquals(0, keyProvider.getKeys().size());
// Try to delete a key that isn't there
try {
keyProvider.deleteKey("newkey2");
Assertions.fail("Failure expected on trying to delete an unknown key");
} catch (IOException ex) {
// expected
}
}
@Test
public void testRolloverKey() throws Throwable {
if (!UNRESTRICTED_POLICIES_INSTALLED) {
return;
}
Path configDir = Paths.get("src/test/resources/kms");
System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath());
Configuration conf = new Configuration();
RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
// Create a key
Options options = new Options(conf);
options.setBitLength(192);
options.setCipher("AES");
KeyVersion keyVersion = keyProvider.createKey("newkey1", options);
Assertions.assertEquals("newkey1", keyVersion.getName());
Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length);
Assertions.assertEquals("newkey1@0", keyVersion.getVersionName());
keyProvider.flush();
// Rollover a new key
byte[] oldKey = keyVersion.getMaterial();
keyVersion = keyProvider.rollNewVersion("newkey1");
Assertions.assertEquals("newkey1", keyVersion.getName());
Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length);
Assertions.assertEquals("newkey1@1", keyVersion.getVersionName());
Assertions.assertFalse(Arrays.equals(oldKey, keyVersion.getMaterial()));
keyProvider.deleteKey("newkey1");
keyProvider.flush();
Assertions.assertEquals(0, keyProvider.getKeys().size());
}
}