HDDS-696. Bootstrap genesis SCM(CA) with self-signed certificate.

Contributed by Anu Engineer.
This commit is contained in:
Anu Engineer 2018-11-27 15:02:07 -08:00 committed by Xiaoyu Yao
parent 825310608b
commit 0c8829a9a1
22 changed files with 1381 additions and 181 deletions

View File

@ -1,19 +1,18 @@
/** /**
* Licensed to the Apache Software Foundation (ASF) under one * Licensed to the Apache Software Foundation (ASF) under one or more
* or more contributor license agreements. See the NOTICE file * contributor license agreements. See the NOTICE file distributed with this
* distributed with this work for additional information * work for additional information regarding copyright ownership. The ASF
* regarding copyright ownership. The ASF licenses this file * licenses this file to you under the Apache License, Version 2.0 (the
* to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance with the License.
* "License"); you may not use this file except in compliance * You may obtain a copy of the License at
* with the License. You may obtain a copy of the License at
* <p> * <p>
* http://www.apache.org/licenses/LICENSE-2.0 * http://www.apache.org/licenses/LICENSE-2.0
* <p> * <p>
* Unless required by applicable law or agreed to in writing, software * Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
* See the License for the specific language governing permissions and * License for the specific language governing permissions and limitations under
* limitations under the License. * the License.
*/ */
package org.apache.hadoop.hdds; package org.apache.hadoop.hdds;
@ -25,61 +24,45 @@ import org.apache.hadoop.utils.db.DBProfile;
*/ */
public final class HddsConfigKeys { public final class HddsConfigKeys {
/**
* Do not instantiate.
*/
private HddsConfigKeys() {
}
public static final String HDDS_HEARTBEAT_INTERVAL = public static final String HDDS_HEARTBEAT_INTERVAL =
"hdds.heartbeat.interval"; "hdds.heartbeat.interval";
public static final String HDDS_HEARTBEAT_INTERVAL_DEFAULT = public static final String HDDS_HEARTBEAT_INTERVAL_DEFAULT =
"30s"; "30s";
public static final String HDDS_NODE_REPORT_INTERVAL = public static final String HDDS_NODE_REPORT_INTERVAL =
"hdds.node.report.interval"; "hdds.node.report.interval";
public static final String HDDS_NODE_REPORT_INTERVAL_DEFAULT = public static final String HDDS_NODE_REPORT_INTERVAL_DEFAULT =
"60s"; "60s";
public static final String HDDS_CONTAINER_REPORT_INTERVAL = public static final String HDDS_CONTAINER_REPORT_INTERVAL =
"hdds.container.report.interval"; "hdds.container.report.interval";
public static final String HDDS_CONTAINER_REPORT_INTERVAL_DEFAULT = public static final String HDDS_CONTAINER_REPORT_INTERVAL_DEFAULT =
"60s"; "60s";
public static final String HDDS_PIPELINE_REPORT_INTERVAL = public static final String HDDS_PIPELINE_REPORT_INTERVAL =
"hdds.pipeline.report.interval"; "hdds.pipeline.report.interval";
public static final String HDDS_PIPELINE_REPORT_INTERVAL_DEFAULT = public static final String HDDS_PIPELINE_REPORT_INTERVAL_DEFAULT =
"60s"; "60s";
public static final String HDDS_COMMAND_STATUS_REPORT_INTERVAL = public static final String HDDS_COMMAND_STATUS_REPORT_INTERVAL =
"hdds.command.status.report.interval"; "hdds.command.status.report.interval";
public static final String HDDS_COMMAND_STATUS_REPORT_INTERVAL_DEFAULT = public static final String HDDS_COMMAND_STATUS_REPORT_INTERVAL_DEFAULT =
"60s"; "60s";
public static final String HDDS_CONTAINER_ACTION_MAX_LIMIT = public static final String HDDS_CONTAINER_ACTION_MAX_LIMIT =
"hdds.container.action.max.limit"; "hdds.container.action.max.limit";
public static final int HDDS_CONTAINER_ACTION_MAX_LIMIT_DEFAULT = public static final int HDDS_CONTAINER_ACTION_MAX_LIMIT_DEFAULT =
20; 20;
public static final String HDDS_PIPELINE_ACTION_MAX_LIMIT = public static final String HDDS_PIPELINE_ACTION_MAX_LIMIT =
"hdds.pipeline.action.max.limit"; "hdds.pipeline.action.max.limit";
public static final int HDDS_PIPELINE_ACTION_MAX_LIMIT_DEFAULT = public static final int HDDS_PIPELINE_ACTION_MAX_LIMIT_DEFAULT =
20; 20;
// Configuration to allow volume choosing policy. // Configuration to allow volume choosing policy.
public static final String HDDS_DATANODE_VOLUME_CHOOSING_POLICY = public static final String HDDS_DATANODE_VOLUME_CHOOSING_POLICY =
"hdds.datanode.volume.choosing.policy"; "hdds.datanode.volume.choosing.policy";
// DB Profiles used by ROCKDB instances. // DB Profiles used by ROCKDB instances.
public static final String HDDS_DB_PROFILE = "hdds.db.profile"; public static final String HDDS_DB_PROFILE = "hdds.db.profile";
public static final DBProfile HDDS_DEFAULT_DB_PROFILE = DBProfile.DISK; public static final DBProfile HDDS_DEFAULT_DB_PROFILE = DBProfile.DISK;
// Once a container usage crosses this threshold, it is eligible for // Once a container usage crosses this threshold, it is eligible for
// closing. // closing.
public static final String HDDS_CONTAINER_CLOSE_THRESHOLD = public static final String HDDS_CONTAINER_CLOSE_THRESHOLD =
"hdds.container.close.threshold"; "hdds.container.close.threshold";
public static final float HDDS_CONTAINER_CLOSE_THRESHOLD_DEFAULT = 0.9f; public static final float HDDS_CONTAINER_CLOSE_THRESHOLD_DEFAULT = 0.9f;
public static final String HDDS_SCM_CHILLMODE_ENABLED = public static final String HDDS_SCM_CHILLMODE_ENABLED =
"hdds.scm.chillmode.enabled"; "hdds.scm.chillmode.enabled";
public static final boolean HDDS_SCM_CHILLMODE_ENABLED_DEFAULT = true; public static final boolean HDDS_SCM_CHILLMODE_ENABLED_DEFAULT = true;
@ -97,11 +80,9 @@ public final class HddsConfigKeys {
public static final String HDDS_SCM_CHILLMODE_THRESHOLD_PCT = public static final String HDDS_SCM_CHILLMODE_THRESHOLD_PCT =
"hdds.scm.chillmode.threshold.pct"; "hdds.scm.chillmode.threshold.pct";
public static final double HDDS_SCM_CHILLMODE_THRESHOLD_PCT_DEFAULT = 0.99; public static final double HDDS_SCM_CHILLMODE_THRESHOLD_PCT_DEFAULT = 0.99;
public static final String HDDS_LOCK_MAX_CONCURRENCY = public static final String HDDS_LOCK_MAX_CONCURRENCY =
"hdds.lock.max.concurrency"; "hdds.lock.max.concurrency";
public static final int HDDS_LOCK_MAX_CONCURRENCY_DEFAULT = 100; public static final int HDDS_LOCK_MAX_CONCURRENCY_DEFAULT = 100;
// This configuration setting is used as a fallback location by all // This configuration setting is used as a fallback location by all
// Ozone/HDDS services for their metadata. It is useful as a single // Ozone/HDDS services for their metadata. It is useful as a single
// config point for test/PoC clusters. // config point for test/PoC clusters.
@ -121,7 +102,6 @@ public final class HddsConfigKeys {
public static final String HDDS_DEFAULT_SECURITY_PROVIDER = "BC"; public static final String HDDS_DEFAULT_SECURITY_PROVIDER = "BC";
public static final String HDDS_KEY_DIR_NAME = "hdds.key.dir.name"; public static final String HDDS_KEY_DIR_NAME = "hdds.key.dir.name";
public static final String HDDS_KEY_DIR_NAME_DEFAULT = "keys"; public static final String HDDS_KEY_DIR_NAME_DEFAULT = "keys";
// TODO : Talk to StorageIO classes and see if they can return a secure // TODO : Talk to StorageIO classes and see if they can return a secure
// storage location for each node. // storage location for each node.
public static final String HDDS_METADATA_DIR_NAME = "hdds.metadata.dir"; public static final String HDDS_METADATA_DIR_NAME = "hdds.metadata.dir";
@ -131,7 +111,6 @@ public final class HddsConfigKeys {
public static final String HDDS_PUBLIC_KEY_FILE_NAME = "hdds.public.key.file" public static final String HDDS_PUBLIC_KEY_FILE_NAME = "hdds.public.key.file"
+ ".name"; + ".name";
public static final String HDDS_PUBLIC_KEY_FILE_NAME_DEFAULT = "public.pem"; public static final String HDDS_PUBLIC_KEY_FILE_NAME_DEFAULT = "public.pem";
/** /**
* Maximum duration of certificates issued by SCM including Self-Signed Roots. * Maximum duration of certificates issued by SCM including Self-Signed Roots.
* The formats accepted are based on the ISO-8601 duration format PnDTnHnMn.nS * The formats accepted are based on the ISO-8601 duration format PnDTnHnMn.nS
@ -140,12 +119,20 @@ public final class HddsConfigKeys {
public static final String HDDS_X509_MAX_DURATION = "hdds.x509.max.duration"; public static final String HDDS_X509_MAX_DURATION = "hdds.x509.max.duration";
// Limit Certificate duration to a max value of 5 years. // Limit Certificate duration to a max value of 5 years.
public static final String HDDS_X509_MAX_DURATION_DEFAULT= "P1865D"; public static final String HDDS_X509_MAX_DURATION_DEFAULT= "P1865D";
public static final String HDDS_X509_SIGNATURE_ALGO = public static final String HDDS_X509_SIGNATURE_ALGO =
"hdds.x509.signature.algorithm"; "hdds.x509.signature.algorithm";
public static final String HDDS_X509_SIGNATURE_ALGO_DEFAULT = "SHA256withRSA"; public static final String HDDS_X509_SIGNATURE_ALGO_DEFAULT = "SHA256withRSA";
public static final String HDDS_GRPC_BLOCK_TOKEN_ENABLED =
public static final String HDDS_GRPC_BLOCK_TOKEN_ENABLED = "hdds.grpc.block" + "hdds.grpc.block.token.enabled";
".token.enabled";
public static final boolean HDDS_GRPC_BLOCK_TOKEN_ENABLED_DEFAULT = false; public static final boolean HDDS_GRPC_BLOCK_TOKEN_ENABLED_DEFAULT = false;
public static final String HDDS_X509_DIR_NAME = "hdds.x509.dir.name";
public static final String HDDS_X509_DIR_NAME_DEFAULT = "certs";
public static final String HDDS_X509_FILE_NAME = "hdds.x509.file.name";
public static final String HDDS_X509_FILE_NAME_DEFAULT = "certificate.crt";
/**
* Do not instantiate.
*/
private HddsConfigKeys() {
}
} }

View File

@ -46,6 +46,10 @@ import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_PRIVATE_KEY_FILE_NAME_D
import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_PUBLIC_KEY_FILE_NAME; import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_PUBLIC_KEY_FILE_NAME;
import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_PUBLIC_KEY_FILE_NAME_DEFAULT; import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_PUBLIC_KEY_FILE_NAME_DEFAULT;
import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_SECURITY_PROVIDER; import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_SECURITY_PROVIDER;
import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_X509_DIR_NAME;
import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_X509_DIR_NAME_DEFAULT;
import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_X509_FILE_NAME;
import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_X509_FILE_NAME_DEFAULT;
import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_X509_MAX_DURATION; import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_X509_MAX_DURATION;
import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_X509_MAX_DURATION_DEFAULT; import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_X509_MAX_DURATION_DEFAULT;
import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_X509_SIGNATURE_ALGO; import static org.apache.hadoop.hdds.HddsConfigKeys.HDDS_X509_SIGNATURE_ALGO;
@ -54,7 +58,7 @@ import static org.apache.hadoop.hdds.HddsConfigKeys.OZONE_METADATA_DIRS;
/** /**
* A class that deals with all Security related configs in HDDS. * A class that deals with all Security related configs in HDDS.
* * <p>
* This class allows security configs to be read and used consistently across * This class allows security configs to be read and used consistently across
* all of security related code base. * all of security related code base.
*/ */
@ -73,6 +77,8 @@ public class SecurityConfig {
private final Duration certDuration; private final Duration certDuration;
private final String x509SignatureAlgo; private final String x509SignatureAlgo;
private final Boolean grpcBlockTokenEnabled; private final Boolean grpcBlockTokenEnabled;
private final String certificateDir;
private final String certificateFileName;
/** /**
* Constructs a SecurityConfig. * Constructs a SecurityConfig.
@ -108,6 +114,10 @@ public class SecurityConfig {
this.certDuration = Duration.parse(durationString); this.certDuration = Duration.parse(durationString);
this.x509SignatureAlgo = this.configuration.get(HDDS_X509_SIGNATURE_ALGO, this.x509SignatureAlgo = this.configuration.get(HDDS_X509_SIGNATURE_ALGO,
HDDS_X509_SIGNATURE_ALGO_DEFAULT); HDDS_X509_SIGNATURE_ALGO_DEFAULT);
this.certificateDir = this.configuration.get(HDDS_X509_DIR_NAME,
HDDS_X509_DIR_NAME_DEFAULT);
this.certificateFileName = this.configuration.get(HDDS_X509_FILE_NAME,
HDDS_X509_FILE_NAME_DEFAULT);
this.grpcBlockTokenEnabled = this.configuration.getBoolean( this.grpcBlockTokenEnabled = this.configuration.getBoolean(
HDDS_GRPC_BLOCK_TOKEN_ENABLED, HDDS_GRPC_BLOCK_TOKEN_ENABLED,
@ -127,8 +137,17 @@ public class SecurityConfig {
} }
/** /**
* Returns the public key file name, This is used for storing the public * Returns the Standard Certificate file name.
* keys on disk. *
* @return String - Name of the Certificate File.
*/
public String getCertificateFileName() {
return certificateFileName;
}
/**
* Returns the public key file name, This is used for storing the public keys
* on disk.
* *
* @return String, File name used for public keys. * @return String, File name used for public keys.
*/ */
@ -137,8 +156,8 @@ public class SecurityConfig {
} }
/** /**
* Returns the private key file name.This is used for storing the private * Returns the private key file name.This is used for storing the private keys
* keys on disk. * on disk.
* *
* @return String, File name used for private keys. * @return String, File name used for private keys.
*/ */
@ -149,16 +168,47 @@ public class SecurityConfig {
/** /**
* Returns the File path to where keys are stored. * Returns the File path to where keys are stored.
* *
* @return String Key location. * @return path Key location.
*/ */
public Path getKeyLocation() { public Path getKeyLocation() {
return Paths.get(metadatDir, keyDir); return Paths.get(metadatDir, keyDir);
} }
/**
* Returns the File path to where keys are stored with an additional component
* name inserted in between.
*
* @param component - Component Name - String.
* @return Path location.
*/
public Path getKeyLocation(String component) {
return Paths.get(metadatDir, component, keyDir);
}
/**
* Returns the File path to where keys are stored.
*
* @return path Key location.
*/
public Path getCertificateLocation() {
return Paths.get(metadatDir, certificateDir);
}
/**
* Returns the File path to where keys are stored with an addition component
* name inserted in between.
*
* @param component - Component Name - String.
* @return Path location.
*/
public Path getCertificateLocation(String component) {
return Paths.get(metadatDir, component, certificateDir);
}
/** /**
* Gets the Key Size, The default key size is 2048, since the default * Gets the Key Size, The default key size is 2048, since the default
* algorithm used is RSA. User can change this by setting the "hdds.key * algorithm used is RSA. User can change this by setting the "hdds.key.len"
* .len" in configuration. * in configuration.
* *
* @return key size. * @return key size.
*/ */
@ -177,8 +227,8 @@ public class SecurityConfig {
} }
/** /**
* Returns the Key generation Algorithm used. User can change this by * Returns the Key generation Algorithm used. User can change this by setting
* setting the "hdds.key.algo" in configuration. * the "hdds.key.algo" in configuration.
* *
* @return String Algo. * @return String Algo.
*/ */
@ -188,8 +238,8 @@ public class SecurityConfig {
/** /**
* Returns the X.509 Signature Algorithm used. This can be changed by setting * Returns the X.509 Signature Algorithm used. This can be changed by setting
* "hdds.x509.signature.algorithm" to the new name. The default algorithm * "hdds.x509.signature.algorithm" to the new name. The default algorithm is
* is SHA256withRSA. * SHA256withRSA.
* *
* @return String * @return String
*/ */
@ -207,11 +257,11 @@ public class SecurityConfig {
} }
/** /**
* Returns the maximum length a certificate can be valid in SCM. The * Returns the maximum length a certificate can be valid in SCM. The default
* default value is 5 years. This can be changed by setting * value is 5 years. This can be changed by setting "hdds.x509.max.duration"
* "hdds.x509.max.duration" in configuration. The formats accepted are * in configuration. The formats accepted are based on the ISO-8601 duration
* based on the ISO-8601 duration format PnDTnHnMn.nS * format PnDTnHnMn.nS
* * <p>
* Default value is 5 years and written as P1865D. * Default value is 5 years and written as P1865D.
* *
* @return Duration. * @return Duration.

View File

@ -20,10 +20,12 @@
package org.apache.hadoop.hdds.security.x509.certificate.authority; package org.apache.hadoop.hdds.security.x509.certificate.authority;
import org.apache.hadoop.hdds.security.exception.SCMSecurityException; import org.apache.hadoop.hdds.security.exception.SCMSecurityException;
import org.apache.hadoop.hdds.security.x509.certificates.CertificateSignRequest;
import org.apache.hadoop.hdds.security.x509.SecurityConfig; import org.apache.hadoop.hdds.security.x509.SecurityConfig;
import org.apache.hadoop.hdds.security.x509.certificates.utils.CertificateSignRequest;
import org.bouncycastle.cert.X509CertificateHolder; import org.bouncycastle.cert.X509CertificateHolder;
import java.io.IOException;
import java.security.cert.CertificateException;
import java.security.cert.X509Certificate; import java.security.cert.X509Certificate;
import java.util.concurrent.Future; import java.util.concurrent.Future;
@ -47,16 +49,19 @@ public interface CertificateServer {
* Returns the CA Certificate for this CA. * Returns the CA Certificate for this CA.
* *
* @return X509CertificateHolder - Certificate for this CA. * @return X509CertificateHolder - Certificate for this CA.
* @throws SCMSecurityException -- usually thrown if this CA is not * @throws CertificateException - usually thrown if this CA is not
* initialized. * initialized.
* @throws IOException - on Error.
*/ */
X509CertificateHolder getCACertificate() X509CertificateHolder getCACertificate()
throws SCMSecurityException; throws CertificateException, IOException;
/** /**
* Request a Certificate based on Certificate Signing Request. * Request a Certificate based on Certificate Signing Request.
* *
* @param csr - Certificate Signing Request. * @param csr - Certificate Signing Request.
* @param approver - An Enum which says what kind of approval process to
* follow.
* @return A future that will have this certificate when this request is * @return A future that will have this certificate when this request is
* approved. * approved.
* @throws SCMSecurityException - on Error. * @throws SCMSecurityException - on Error.

View File

@ -0,0 +1,373 @@
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
package org.apache.hadoop.hdds.security.x509.certificate.authority;
import com.google.common.annotations.VisibleForTesting;
import com.google.common.base.Preconditions;
import org.apache.hadoop.hdds.security.exception.SCMSecurityException;
import org.apache.hadoop.hdds.security.x509.SecurityConfig;
import org.apache.hadoop.hdds.security.x509.certificate.utils.CertificateCodec;
import org.apache.hadoop.hdds.security.x509.certificates.utils.CertificateSignRequest;
import org.apache.hadoop.hdds.security.x509.certificates.utils.SelfSignedCertificate;
import org.apache.hadoop.hdds.security.x509.keys.HDDSKeyGenerator;
import org.apache.hadoop.hdds.security.x509.keys.KeyCodec;
import org.bouncycastle.cert.X509CertificateHolder;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import java.io.IOException;
import java.nio.file.Files;
import java.nio.file.Path;
import java.nio.file.Paths;
import java.security.KeyPair;
import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
import java.security.cert.CertificateException;
import java.security.cert.X509Certificate;
import java.time.LocalDate;
import java.time.LocalDateTime;
import java.time.LocalTime;
import java.util.concurrent.Future;
import java.util.function.Consumer;
/**
* The default CertificateServer used by SCM. This has no dependencies on any
* external system, this allows us to bootstrap a CertificateServer from
* Scratch.
* <p>
* Details =======
* <p>
* The Default CA server is one of the many possible implementations of an SCM
* Certificate Authority.
* <p>
* A certificate authority needs the Root Certificates and its private key to
* operate. The init function of the DefaultCA Server detects four possible
* states the System can be in.
* <p>
* 1. Success - This means that the expected Certificates and Keys are in
* place, and the CA was able to read those files into memory.
* <p>
* 2. Missing Keys - This means that private keys are missing. This is an error
* state which SCM CA cannot recover from. The cluster might have been
* initialized earlier and for some reason, we are not able to find the private
* keys for the CA. Eventually we will have 2 ways to recover from this state,
* first one is to copy the SCM CA private keys from a backup. Second one is to
* rekey the whole cluster. Both of these are improvements we will support in
* future.
* <p>
* 3. Missing Certificate - Similar to Missing Keys, but the root certificates
* are missing.
* <p>
* 4. Initialize - We don't have keys or certificates. DefaultCA assumes that
* this is a system bootup and will generate the keys and certificates
* automatically.
* <p>
* The init() follows the following logic,
* <p>
* 1. Compute the Verification Status -- Success, Missing Keys, Missing Certs or
* Initialize.
* <p>
* 2. ProcessVerificationStatus - Returns a Lambda, based on the Verification
* Status.
* <p>
* 3. Invoke the Lambda function.
* <p>
* At the end of the init function, we have functional CA. This function can be
* invoked as many times since we will regenerate the keys and certs only if
* both of them are missing.
*/
public class DefaultCAServer implements CertificateServer {
private static final Logger LOG =
LoggerFactory.getLogger(DefaultCAServer.class);
private final String subject;
private final String clusterID;
private final String scmID;
private String componentName = Paths.get("scm", "ca").toString();
private Path caKeysPath;
private Path caRootX509Path;
private SecurityConfig config;
/**
* Create an Instance of DefaultCAServer.
*
* @param subject - String Subject
* @param clusterID - String ClusterID
* @param scmID - String SCMID.
*/
public DefaultCAServer(String subject, String clusterID, String scmID) {
this.subject = subject;
this.clusterID = clusterID;
this.scmID = scmID;
}
@Override
public void init(SecurityConfig securityConfig, CAType type)
throws SCMSecurityException {
caKeysPath = securityConfig.getKeyLocation(componentName);
caRootX509Path = securityConfig.getCertificateLocation(componentName);
this.config = securityConfig;
/* In future we will spilt this code to have different kind of CAs.
* Right now, we have only self-signed CertificateServer.
*/
if (type == CAType.SELF_SIGNED_CA) {
VerificationStatus status = verifySelfSignedCA(securityConfig);
Consumer<SecurityConfig> caInitializer =
processVerificationStatus(status);
caInitializer.accept(securityConfig);
return;
}
LOG.error("We support only Self-Signed CAs for now.");
throw new IllegalStateException("Not implemented functionality requested.");
}
@Override
public X509CertificateHolder getCACertificate() throws
CertificateException, IOException {
CertificateCodec certificateCodec =
new CertificateCodec(config, componentName);
return certificateCodec.readCertificate();
}
@Override
public Future<X509CertificateHolder> requestCertificate(
CertificateSignRequest csr, CertificateApprover approver)
throws SCMSecurityException {
return null;
}
@Override
public Future<Boolean> revokeCertificate(X509Certificate certificate,
CertificateApprover approver) throws SCMSecurityException {
return null;
}
/**
* Generates a Self Signed CertificateServer. These are the steps in
* generating a Self-Signed CertificateServer.
* <p>
* 1. Generate a Private/Public Key Pair. 2. Persist to a protected location.
* 3. Generate a SelfSigned Root CertificateServer certificate.
*
* @param securityConfig - Config.
*/
private void generateSelfSignedCA(SecurityConfig securityConfig) throws
NoSuchAlgorithmException, NoSuchProviderException, IOException {
KeyPair keyPair = generateKeys(securityConfig);
generateRootCertificate(securityConfig, keyPair);
}
/**
* Verify Self-Signed CertificateServer. 1. Check if the Certificate exist. 2.
* Check if the key pair exists.
*
* @param securityConfig -- Config
* @return Verification Status
*/
private VerificationStatus verifySelfSignedCA(SecurityConfig securityConfig) {
/*
The following is the truth table for the States.
True means we have that file False means it is missing.
+--------------+--------+--------+--------------+
| Certificates | Keys | Result | Function |
+--------------+--------+--------+--------------+
| True | True | True | Success |
| False | False | True | Initialize |
| True | False | False | Missing Key |
| False | True | False | Missing Cert |
+--------------+--------+--------+--------------+
This truth table maps to ~(certs xor keys) or certs == keys
*/
boolean keyStatus = checkIfKeysExist();
boolean certStatus = checkIfCertificatesExist();
if ((certStatus == keyStatus) && (certStatus)) {
return VerificationStatus.SUCCESS;
}
if ((certStatus == keyStatus) && (!certStatus)) {
return VerificationStatus.INITIALIZE;
}
// At this point certStatus is not equal to keyStatus.
if (certStatus) {
return VerificationStatus.MISSING_KEYS;
}
return VerificationStatus.MISSING_CERTIFICATE;
}
/**
* Returns Keys status.
*
* @return True if the key files exist.
*/
private boolean checkIfKeysExist() {
if (!Files.exists(caKeysPath)) {
return false;
}
if (!Files.exists(Paths.get(caKeysPath.toString(),
this.config.getPrivateKeyFileName()))) {
return false;
}
return true;
}
/**
* Returns certificate Status.
*
* @return True if the Certificate files exist.
*/
private boolean checkIfCertificatesExist() {
if (!Files.exists(caRootX509Path)) {
return false;
}
if (!Files.exists(Paths.get(caRootX509Path.toString(),
this.config.getCertificateFileName()))) {
return false;
}
return true;
}
/**
* Based on the Status of the verification, we return a lambda that gets
* executed by the init function of the CA.
*
* @param status - Verification Status.
*/
@VisibleForTesting
Consumer<SecurityConfig> processVerificationStatus(
VerificationStatus status) {
Consumer<SecurityConfig> consumer = null;
switch (status) {
case SUCCESS:
consumer = (arg) -> LOG.info("CertificateServer validation is " +
"successful");
break;
case MISSING_KEYS:
consumer = (arg) -> {
LOG.error("We have found the Certificate for this CertificateServer, " +
"but keys used by this CertificateServer is missing. This is a " +
"non-recoverable error. Please restart the system after locating " +
"the Keys used by the CertificateServer.");
LOG.error("Exiting due to unrecoverable CertificateServer error.");
throw new IllegalStateException("Missing Keys, cannot continue.");
};
break;
case MISSING_CERTIFICATE:
consumer = (arg) -> {
LOG.error("We found the keys, but the root certificate for this " +
"CertificateServer is missing. Please restart SCM after locating " +
"the " +
"Certificates.");
LOG.error("Exiting due to unrecoverable CertificateServer error.");
throw new IllegalStateException("Missing Root Certs, cannot continue.");
};
break;
case INITIALIZE:
consumer = (arg) -> {
try {
generateSelfSignedCA(arg);
} catch (NoSuchProviderException | NoSuchAlgorithmException
| IOException e) {
LOG.error("Unable to initialize CertificateServer.", e);
}
VerificationStatus newStatus = verifySelfSignedCA(arg);
if (newStatus != VerificationStatus.SUCCESS) {
LOG.error("Unable to initialize CertificateServer, failed in " +
"verification.");
}
};
break;
default:
/* Make CheckStyle happy */
break;
}
return consumer;
}
/**
* Generates a KeyPair for the Certificate.
*
* @param securityConfig - SecurityConfig.
* @return Key Pair.
* @throws NoSuchProviderException - on Error.
* @throws NoSuchAlgorithmException - on Error.
* @throws IOException - on Error.
*/
private KeyPair generateKeys(SecurityConfig securityConfig)
throws NoSuchProviderException, NoSuchAlgorithmException, IOException {
HDDSKeyGenerator keyGenerator = new HDDSKeyGenerator(securityConfig);
KeyPair keys = keyGenerator.generateKey();
KeyCodec keyPEMWriter = new KeyCodec(securityConfig,
componentName);
keyPEMWriter.writeKey(keys);
return keys;
}
/**
* Generates a self-signed Root Certificate for CA.
*
* @param securityConfig - SecurityConfig
* @param key - KeyPair.
* @throws IOException - on Error.
* @throws SCMSecurityException - on Error.
*/
private void generateRootCertificate(SecurityConfig securityConfig,
KeyPair key) throws IOException, SCMSecurityException {
Preconditions.checkNotNull(this.config);
LocalDate beginDate = LocalDate.now().atStartOfDay().toLocalDate();
LocalDateTime temp = LocalDateTime.of(beginDate, LocalTime.MIDNIGHT);
LocalDate endDate =
temp.plus(securityConfig.getMaxCertificateDuration()).toLocalDate();
X509CertificateHolder selfSignedCertificate =
SelfSignedCertificate
.newBuilder()
.setSubject(this.subject)
.setScmID(this.scmID)
.setClusterID(this.clusterID)
.setBeginDate(beginDate)
.setEndDate(endDate)
.makeCA()
.setConfiguration(securityConfig.getConfiguration())
.setKey(key)
.build();
CertificateCodec certCodec =
new CertificateCodec(config, componentName);
certCodec.writeCertificate(selfSignedCertificate);
}
/**
* This represents the verification status of the CA. Based on this enum
* appropriate action is taken in the Init.
*/
@VisibleForTesting
enum VerificationStatus {
SUCCESS, /* All artifacts needed by CertificateServer is present */
MISSING_KEYS, /* Private key is missing, certificate Exists.*/
MISSING_CERTIFICATE, /* Keys exist, but root certificate missing.*/
INITIALIZE /* All artifacts are missing, we should init the system. */
}
}

View File

@ -19,7 +19,7 @@
package org.apache.hadoop.hdds.security.x509.certificate.client; package org.apache.hadoop.hdds.security.x509.certificate.client;
import org.apache.hadoop.hdds.security.x509.certificates.CertificateSignRequest; import org.apache.hadoop.hdds.security.x509.certificates.utils.CertificateSignRequest;
import org.apache.hadoop.hdds.security.x509.exceptions.CertificateException; import org.apache.hadoop.hdds.security.x509.exceptions.CertificateException;
import java.io.InputStream; import java.io.InputStream;
@ -64,7 +64,7 @@ public interface CertificateClient {
/** /**
* Verifies if this certificate is part of a trusted chain. * Verifies if this certificate is part of a trusted chain.
* * @param certificate - certificate.
* @return true if it trusted, false otherwise. * @return true if it trusted, false otherwise.
*/ */
boolean verifyCertificate(X509Certificate certificate); boolean verifyCertificate(X509Certificate certificate);
@ -74,7 +74,9 @@ public interface CertificateClient {
* key. * key.
* *
* @param stream - Data stream to sign. * @param stream - Data stream to sign.
* @param component - name of the component.
* @return byte array - containing the signature. * @return byte array - containing the signature.
* @throws CertificateException - on Error.
*/ */
byte[] signDataStream(InputStream stream, String component) byte[] signDataStream(InputStream stream, String component)
throws CertificateException; throws CertificateException;
@ -82,6 +84,7 @@ public interface CertificateClient {
/** /**
* Verifies a digital Signature, given the signature and the certificate of * Verifies a digital Signature, given the signature and the certificate of
* the signer. * the signer.
*
* @param stream - Data Stream. * @param stream - Data Stream.
* @param signature - Byte Array containing the signature. * @param signature - Byte Array containing the signature.
* @param cert - Certificate of the Signer. * @param cert - Certificate of the Signer.
@ -123,7 +126,7 @@ public interface CertificateClient {
* *
* @param key - private key * @param key - private key
* @param component - name of the component. * @param component - name of the component.
* @throws CertificateException * @throws CertificateException - on Error.
*/ */
void storePrivateKey(PrivateKey key, String component) void storePrivateKey(PrivateKey key, String component)
throws CertificateException; throws CertificateException;
@ -132,7 +135,8 @@ public interface CertificateClient {
* Stores the public key of a specified component. * Stores the public key of a specified component.
* *
* @param key - public key * @param key - public key
* @throws CertificateException * @param component - name of the component.
* @throws CertificateException - on Error.
*/ */
void storePublicKey(PublicKey key, String component) void storePublicKey(PublicKey key, String component)
throws CertificateException; throws CertificateException;
@ -142,7 +146,7 @@ public interface CertificateClient {
* *
* @param certificate - X509 Certificate * @param certificate - X509 Certificate
* @param component - Name of the component. * @param component - Name of the component.
* @throws CertificateException * @throws CertificateException - on Error.
*/ */
void storeCertificate(X509Certificate certificate, String component) void storeCertificate(X509Certificate certificate, String component)
throws CertificateException; throws CertificateException;
@ -152,7 +156,7 @@ public interface CertificateClient {
* *
* @param certStore - Cert Store. * @param certStore - Cert Store.
* @param component - Trust Chain. * @param component - Trust Chain.
* @throws CertificateException * @throws CertificateException - on Error.
*/ */
void storeTrustChain(CertStore certStore, void storeTrustChain(CertStore certStore,
String component) throws CertificateException; String component) throws CertificateException;
@ -162,7 +166,7 @@ public interface CertificateClient {
* *
* @param certificates - List of Certificates. * @param certificates - List of Certificates.
* @param component - String component. * @param component - String component.
* @throws CertificateException * @throws CertificateException - on Error.
*/ */
void storeTrustChain(List<X509Certificate> certificates, void storeTrustChain(List<X509Certificate> certificates,
String component) throws CertificateException; String component) throws CertificateException;

View File

@ -0,0 +1,280 @@
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
package org.apache.hadoop.hdds.security.x509.certificate.utils;
import com.google.common.base.Preconditions;
import org.apache.commons.io.IOUtils;
import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.hdds.security.exception.SCMSecurityException;
import org.apache.hadoop.hdds.security.x509.SecurityConfig;
import org.bouncycastle.cert.X509CertificateHolder;
import org.bouncycastle.cert.jcajce.JcaX509CertificateConverter;
import org.bouncycastle.openssl.jcajce.JcaPEMWriter;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import java.io.File;
import java.io.FileInputStream;
import java.io.FileOutputStream;
import java.io.IOException;
import java.io.InputStream;
import java.io.StringWriter;
import java.nio.file.Files;
import java.nio.file.Path;
import java.nio.file.Paths;
import java.nio.file.attribute.PosixFilePermission;
import java.security.cert.CertificateEncodingException;
import java.security.cert.CertificateException;
import java.security.cert.CertificateFactory;
import java.security.cert.X509Certificate;
import java.util.Set;
import java.util.stream.Collectors;
import java.util.stream.Stream;
import static java.nio.charset.StandardCharsets.UTF_8;
import static java.nio.file.attribute.PosixFilePermission.OWNER_EXECUTE;
import static java.nio.file.attribute.PosixFilePermission.OWNER_READ;
import static java.nio.file.attribute.PosixFilePermission.OWNER_WRITE;
/**
* A class used to read and write X.509 certificates PEM encoded Streams.
*/
public class CertificateCodec {
public static final String BEGIN_CERT = "-----BEGIN CERTIFICATE-----";
public static final String END_CERT = "-----END CERTIFICATE-----";
private static final Logger LOG =
LoggerFactory.getLogger(CertificateCodec.class);
private static final JcaX509CertificateConverter CERTIFICATE_CONVERTER
= new JcaX509CertificateConverter();
private final SecurityConfig securityConfig;
private final Path location;
private Set<PosixFilePermission> permissionSet =
Stream.of(OWNER_READ, OWNER_WRITE, OWNER_EXECUTE)
.collect(Collectors.toSet());
/**
* Creates an CertificateCodec.
*
* @param config - Security Config.
* @param component - Component String.
*/
public CertificateCodec(SecurityConfig config, String component) {
this.securityConfig = config;
this.location = securityConfig.getCertificateLocation(component);
}
/**
* Creates an CertificateCodec.
*
* @param configuration - Configuration
*/
public CertificateCodec(Configuration configuration) {
Preconditions.checkNotNull(configuration, "Config cannot be null");
this.securityConfig = new SecurityConfig(configuration);
this.location = securityConfig.getCertificateLocation();
}
/**
* Returns a X509 Certificate from the Certificate Holder.
*
* @param holder - Holder
* @return X509Certificate.
* @throws CertificateException - on Error.
*/
public static X509Certificate getX509Certificate(X509CertificateHolder holder)
throws CertificateException {
return CERTIFICATE_CONVERTER.getCertificate(holder);
}
/**
* Get Certificate location.
*
* @return Path
*/
public Path getLocation() {
return location;
}
/**
* Returns the Certificate as a PEM encoded String.
*
* @param x509CertHolder - X.509 Certificate Holder.
* @return PEM Encoded Certificate String.
* @throws SCMSecurityException - On failure to create a PEM String.
*/
public String getPEMEncodedString(X509CertificateHolder x509CertHolder)
throws SCMSecurityException {
try {
StringWriter stringWriter = new StringWriter();
try (JcaPEMWriter pemWriter = new JcaPEMWriter(stringWriter)) {
pemWriter.writeObject(getX509Certificate(x509CertHolder));
}
return stringWriter.toString();
} catch (CertificateException | IOException e) {
LOG.error("Error in encoding certificate." + x509CertHolder
.getSubject().toString(), e);
throw new SCMSecurityException("PEM Encoding failed for certificate." +
x509CertHolder.getSubject().toString(), e);
}
}
/**
* Gets the X.509 Certificate from PEM encoded String.
*
* @param pemEncodedString - PEM encoded String.
* @return X509Certificate - Certificate.
* @throws CertificateException - Thrown on Failure.
* @throws IOException - Thrown on Failure.
*/
public X509Certificate getX509Certificate(String pemEncodedString)
throws CertificateException, IOException {
CertificateFactory fact = CertificateFactory.getInstance("X.509");
try (InputStream input = IOUtils.toInputStream(pemEncodedString, UTF_8)) {
return (X509Certificate) fact.generateCertificate(input);
}
}
/**
* Write the Certificate pointed to the location by the configs.
*
* @param xCertificate - Certificate to write.
* @throws SCMSecurityException - on Error.
* @throws IOException - on Error.
*/
public void writeCertificate(X509CertificateHolder xCertificate)
throws SCMSecurityException, IOException {
String pem = getPEMEncodedString(xCertificate);
writeCertificate(location.toAbsolutePath(),
this.securityConfig.getCertificateFileName(), pem, false);
}
/**
* Write the Certificate to the specific file.
*
* @param xCertificate - Certificate to write.
* @param fileName - file name to write to.
* @param overwrite - boolean value, true means overwrite an existing
* certificate.
* @throws SCMSecurityException - On Error.
* @throws IOException - On Error.
*/
public void writeCertificate(X509CertificateHolder xCertificate,
String fileName, boolean overwrite)
throws SCMSecurityException, IOException {
String pem = getPEMEncodedString(xCertificate);
writeCertificate(location.toAbsolutePath(), fileName, pem, overwrite);
}
/**
* Helper function that writes data to the file.
*
* @param basePath - Base Path where the file needs to written to.
* @param fileName - Certificate file name.
* @param pemEncodedCertificate - pemEncoded Certificate file.
* @param force - Overwrite if the file exists.
* @throws IOException - on Error.
*/
public synchronized void writeCertificate(Path basePath, String fileName,
String pemEncodedCertificate, boolean force)
throws IOException {
File certificateFile =
Paths.get(basePath.toString(), fileName).toFile();
if (certificateFile.exists() && !force) {
throw new SCMSecurityException("Specified certificate file already " +
"exists.Please use force option if you want to overwrite it.");
}
if (!basePath.toFile().exists()) {
if (!basePath.toFile().mkdirs()) {
LOG.error("Unable to create file path. Path: {}", basePath);
throw new IOException("Creation of the directories failed."
+ basePath.toString());
}
}
try (FileOutputStream file = new FileOutputStream(certificateFile)) {
IOUtils.write(pemEncodedCertificate, file, UTF_8);
}
Files.setPosixFilePermissions(certificateFile.toPath(), permissionSet);
}
/**
* Rertuns a default certificate using the default paths for this component.
*
* @return X509CertificateHolder.
* @throws SCMSecurityException - on Error.
* @throws CertificateException - on Error.
* @throws IOException - on Error.
*/
public X509CertificateHolder readCertificate() throws
CertificateException, IOException {
return readCertificate(this.location.toAbsolutePath(),
this.securityConfig.getCertificateFileName());
}
/**
* Returns the certificate from the specific PEM encoded file.
*
* @param basePath - base path
* @param fileName - fileName
* @return X%09 Certificate
* @throws IOException - on Error.
* @throws SCMSecurityException - on Error.
* @throws CertificateException - on Error.
*/
public synchronized X509CertificateHolder readCertificate(Path basePath,
String fileName) throws IOException, CertificateException {
File certificateFile = Paths.get(basePath.toString(), fileName).toFile();
return getX509CertificateHolder(certificateFile);
}
/**
* Helper function to read certificate.
*
* @param certificateFile - Full path to certificate file.
* @return X509CertificateHolder
* @throws IOException - On Error.
* @throws CertificateException - On Error.
*/
private X509CertificateHolder getX509CertificateHolder(File certificateFile)
throws IOException, CertificateException {
if (!certificateFile.exists()) {
throw new IOException("Unable to find the requested certificate. Path: "
+ certificateFile.toString());
}
CertificateFactory fact = CertificateFactory.getInstance("X.509");
try (FileInputStream is = new FileInputStream(certificateFile)) {
return getCertificateHolder(
(X509Certificate) fact.generateCertificate(is));
}
}
/**
* Returns the Certificate holder from X509Ceritificate class.
*
* @param x509cert - Certificate class.
* @return X509CertificateHolder
* @throws CertificateEncodingException - on Error.
* @throws IOException - on Error.
*/
public X509CertificateHolder getCertificateHolder(X509Certificate x509cert)
throws CertificateEncodingException, IOException {
return new X509CertificateHolder(x509cert.getEncoded());
}
}

View File

@ -0,0 +1,22 @@
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
/**
* Certificate Utils.
*/
package org.apache.hadoop.hdds.security.x509.certificate.utils;

View File

@ -16,7 +16,7 @@
* limitations under the License. * limitations under the License.
* *
*/ */
package org.apache.hadoop.hdds.security.x509.certificates; package org.apache.hadoop.hdds.security.x509.certificates.utils;
import com.google.common.base.Preconditions; import com.google.common.base.Preconditions;
import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.conf.Configuration;
@ -49,7 +49,7 @@ import java.util.Optional;
/** /**
* A certificate sign request object that wraps operations to build a * A certificate sign request object that wraps operations to build a
* PKCS10CertificationRequest to CA. * PKCS10CertificationRequest to CertificateServer.
*/ */
public final class CertificateSignRequest { public final class CertificateSignRequest {
private final KeyPair keyPair; private final KeyPair keyPair;

View File

@ -17,7 +17,7 @@
* *
*/ */
package org.apache.hadoop.hdds.security.x509.certificates; package org.apache.hadoop.hdds.security.x509.certificates.utils;
import com.google.common.annotations.VisibleForTesting; import com.google.common.annotations.VisibleForTesting;
import com.google.common.base.Preconditions; import com.google.common.base.Preconditions;
@ -27,9 +27,11 @@ import org.apache.hadoop.hdds.security.x509.SecurityConfig;
import org.apache.hadoop.hdds.security.x509.exceptions.CertificateException; import org.apache.hadoop.hdds.security.x509.exceptions.CertificateException;
import org.apache.hadoop.util.Time; import org.apache.hadoop.util.Time;
import org.apache.logging.log4j.util.Strings; import org.apache.logging.log4j.util.Strings;
import org.bouncycastle.asn1.DEROctetString;
import org.bouncycastle.asn1.x500.X500Name; import org.bouncycastle.asn1.x500.X500Name;
import org.bouncycastle.asn1.x509.BasicConstraints; import org.bouncycastle.asn1.x509.BasicConstraints;
import org.bouncycastle.asn1.x509.Extension; import org.bouncycastle.asn1.x509.Extension;
import org.bouncycastle.asn1.x509.KeyUsage;
import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo; import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo;
import org.bouncycastle.cert.CertIOException; import org.bouncycastle.cert.CertIOException;
import org.bouncycastle.cert.X509CertificateHolder; import org.bouncycastle.cert.X509CertificateHolder;
@ -38,28 +40,33 @@ import org.bouncycastle.operator.ContentSigner;
import org.bouncycastle.operator.OperatorCreationException; import org.bouncycastle.operator.OperatorCreationException;
import org.bouncycastle.operator.jcajce.JcaContentSignerBuilder; import org.bouncycastle.operator.jcajce.JcaContentSignerBuilder;
import java.io.IOException;
import java.math.BigInteger; import java.math.BigInteger;
import java.security.KeyPair; import java.security.KeyPair;
import java.time.Duration; import java.time.Duration;
import java.time.LocalDate;
import java.time.LocalTime;
import java.time.ZoneOffset;
import java.util.Date; import java.util.Date;
/** /**
* A Self Signed Certificate with CA basic constraint can be used to boot-strap * A Self Signed Certificate with CertificateServer basic constraint can be used
* a certificate infra-structure, if no external certificate is provided. * to bootstrap a certificate infrastructure, if no external certificate is
* provided.
*/ */
public final class SelfSignedCertificate { public final class SelfSignedCertificate {
private static final String NAME_FORMAT = "CN=%s,OU=%s,O=%s"; private static final String NAME_FORMAT = "CN=%s,OU=%s,O=%s";
private String subject; private String subject;
private String clusterID; private String clusterID;
private String scmID; private String scmID;
private Date beginDate; private LocalDate beginDate;
private Date endDate; private LocalDate endDate;
private KeyPair key; private KeyPair key;
private SecurityConfig config; private SecurityConfig config;
private boolean isCA;
/** /**
* Private Ctor invoked only via Builder Interface. * Private Ctor invoked only via Builder Interface.
*
* @param subject - Subject * @param subject - Subject
* @param scmID - SCM ID * @param scmID - SCM ID
* @param clusterID - Cluster ID * @param clusterID - Cluster ID
@ -67,11 +74,10 @@ public final class SelfSignedCertificate {
* @param endDate - Not After * @param endDate - Not After
* @param configuration - SCM Config * @param configuration - SCM Config
* @param keyPair - KeyPair * @param keyPair - KeyPair
* @param ca - isCA?
*/ */
private SelfSignedCertificate(String subject, String scmID, String clusterID, private SelfSignedCertificate(String subject, String scmID, String clusterID,
Date beginDate, Date endDate, SecurityConfig configuration, LocalDate beginDate, LocalDate endDate, SecurityConfig configuration,
KeyPair keyPair, boolean ca) { KeyPair keyPair) {
this.subject = subject; this.subject = subject;
this.clusterID = clusterID; this.clusterID = clusterID;
this.scmID = scmID; this.scmID = scmID;
@ -79,7 +85,6 @@ public final class SelfSignedCertificate {
this.endDate = endDate; this.endDate = endDate;
config = configuration; config = configuration;
this.key = keyPair; this.key = keyPair;
this.isCA = ca;
} }
@VisibleForTesting @VisibleForTesting
@ -91,8 +96,8 @@ public final class SelfSignedCertificate {
return new Builder(); return new Builder();
} }
private X509CertificateHolder generateCertificate() private X509CertificateHolder generateCertificate(boolean isCA)
throws OperatorCreationException, CertIOException { throws OperatorCreationException, IOException {
// For the Root Certificate we form the name from Subject, SCM ID and // For the Root Certificate we form the name from Subject, SCM ID and
// Cluster ID. // Cluster ID.
String dnName = String.format(getNameFormat(), subject, scmID, clusterID); String dnName = String.format(getNameFormat(), subject, scmID, clusterID);
@ -115,12 +120,27 @@ public final class SelfSignedCertificate {
serial = new BigInteger(Long.toString(Time.monotonicNow())); serial = new BigInteger(Long.toString(Time.monotonicNow()));
} }
ZoneOffset zoneOffset =
beginDate.atStartOfDay(ZoneOffset.systemDefault()).getOffset();
// Valid from the Start of the day when we generate this Certificate.
Date validFrom =
Date.from(beginDate.atTime(LocalTime.MIN).toInstant(zoneOffset));
// Valid till end day finishes.
Date validTill =
Date.from(endDate.atTime(LocalTime.MAX).toInstant(zoneOffset));
X509v3CertificateBuilder builder = new X509v3CertificateBuilder(name, X509v3CertificateBuilder builder = new X509v3CertificateBuilder(name,
serial, beginDate, endDate, name, publicKeyInfo); serial, validFrom, validTill, name, publicKeyInfo);
if (isCA) { if (isCA) {
builder.addExtension(Extension.basicConstraints, true, builder.addExtension(Extension.basicConstraints, true,
new BasicConstraints(true)); new BasicConstraints(true));
int keyUsageFlag = KeyUsage.keyCertSign | KeyUsage.cRLSign;
KeyUsage keyUsage = new KeyUsage(keyUsageFlag);
builder.addExtension(Extension.keyUsage, false,
new DEROctetString(keyUsage));
} }
return builder.build(contentSigner); return builder.build(contentSigner);
} }
@ -132,8 +152,8 @@ public final class SelfSignedCertificate {
private String subject; private String subject;
private String clusterID; private String clusterID;
private String scmID; private String scmID;
private Date beginDate; private LocalDate beginDate;
private Date endDate; private LocalDate endDate;
private KeyPair key; private KeyPair key;
private SecurityConfig config; private SecurityConfig config;
private boolean isCA; private boolean isCA;
@ -163,13 +183,13 @@ public final class SelfSignedCertificate {
return this; return this;
} }
public Builder setBeginDate(Date date) { public Builder setBeginDate(LocalDate date) {
this.beginDate = new Date(date.toInstant().toEpochMilli()); this.beginDate = date;
return this; return this;
} }
public Builder setEndDate(Date date) { public Builder setEndDate(LocalDate date) {
this.endDate = new Date(date.toInstant().toEpochMilli()); this.endDate = date;
return this; return this;
} }
@ -178,7 +198,8 @@ public final class SelfSignedCertificate {
return this; return this;
} }
public X509CertificateHolder build() throws SCMSecurityException { public X509CertificateHolder build()
throws SCMSecurityException, IOException {
Preconditions.checkNotNull(key, "Key cannot be null"); Preconditions.checkNotNull(key, "Key cannot be null");
Preconditions.checkArgument(Strings.isNotBlank(subject), "Subject " + Preconditions.checkArgument(Strings.isNotBlank(subject), "Subject " +
"cannot be blank"); "cannot be blank");
@ -187,22 +208,27 @@ public final class SelfSignedCertificate {
Preconditions.checkArgument(Strings.isNotBlank(scmID), "SCM ID cannot " + Preconditions.checkArgument(Strings.isNotBlank(scmID), "SCM ID cannot " +
"be blank"); "be blank");
Preconditions.checkArgument(beginDate.before(endDate), "Certificate " + Preconditions.checkArgument(beginDate.isBefore(endDate), "Certificate " +
"begin date should be before end date"); "begin date should be before end date");
Duration certDuration = Duration.between(beginDate.toInstant(), // We just read the beginDate and EndDate as Start of the Day and
endDate.toInstant()); // confirm that we do not violate the maxDuration Config.
Preconditions.checkArgument( Duration certDuration = Duration.between(beginDate.atStartOfDay(),
certDuration.compareTo(config.getMaxCertificateDuration()) < 0, endDate.atStartOfDay());
"Certificate life time cannot be greater than max configured value."); Duration maxDuration = config.getMaxCertificateDuration();
if (certDuration.compareTo(maxDuration) > 0) {
throw new SCMSecurityException("The cert duration violates the " +
"maximum configured value. Please check the hdds.x509.max" +
".duration config key. Current Value: " + certDuration +
" config: " + maxDuration);
}
SelfSignedCertificate rootCertificate = SelfSignedCertificate rootCertificate =
new SelfSignedCertificate(this.subject, new SelfSignedCertificate(this.subject,
this.scmID, this.clusterID, this.beginDate, this.endDate, this.scmID, this.clusterID, this.beginDate, this.endDate,
this.config, key, isCA); this.config, key);
try { try {
return rootCertificate.generateCertificate(); return rootCertificate.generateCertificate(isCA);
} catch (OperatorCreationException | CertIOException e) { } catch (OperatorCreationException | CertIOException e) {
throw new CertificateException("Unable to create root certificate.", throw new CertificateException("Unable to create root certificate.",
e.getCause()); e.getCause());

View File

@ -19,4 +19,4 @@
/** /**
* Utils for Certificates. * Utils for Certificates.
*/ */
package org.apache.hadoop.hdds.security.x509.certificates; package org.apache.hadoop.hdds.security.x509.certificates.utils;

View File

@ -28,7 +28,9 @@ import java.security.KeyPairGenerator;
import java.security.NoSuchAlgorithmException; import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException; import java.security.NoSuchProviderException;
/** A class to generate Key Pair for use with Certificates. */ /**
* A class to generate Key Pair for use with Certificates.
*/
public class HDDSKeyGenerator { public class HDDSKeyGenerator {
private static final Logger LOG = private static final Logger LOG =
LoggerFactory.getLogger(HDDSKeyGenerator.class); LoggerFactory.getLogger(HDDSKeyGenerator.class);
@ -43,8 +45,18 @@ public class HDDSKeyGenerator {
this.securityConfig = new SecurityConfig(configuration); this.securityConfig = new SecurityConfig(configuration);
} }
/**
* Constructor that takes a SecurityConfig as the Argument.
*
* @param config - SecurityConfig
*/
public HDDSKeyGenerator(SecurityConfig config) {
this.securityConfig = config;
}
/** /**
* Returns the Security config used for this object. * Returns the Security config used for this object.
*
* @return SecurityConfig * @return SecurityConfig
*/ */
public SecurityConfig getSecurityConfig() { public SecurityConfig getSecurityConfig() {

View File

@ -20,24 +20,33 @@ package org.apache.hadoop.hdds.security.x509.keys;
import com.google.common.annotations.VisibleForTesting; import com.google.common.annotations.VisibleForTesting;
import com.google.common.base.Preconditions; import com.google.common.base.Preconditions;
import java.nio.charset.Charset; import org.apache.commons.io.FileUtils;
import java.nio.charset.StandardCharsets;
import org.apache.commons.io.output.FileWriterWithEncoding; import org.apache.commons.io.output.FileWriterWithEncoding;
import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.hdds.security.x509.SecurityConfig; import org.apache.hadoop.hdds.security.x509.SecurityConfig;
import org.bouncycastle.util.io.pem.PemObject; import org.bouncycastle.util.io.pem.PemObject;
import org.bouncycastle.util.io.pem.PemReader;
import org.bouncycastle.util.io.pem.PemWriter; import org.bouncycastle.util.io.pem.PemWriter;
import org.slf4j.Logger; import org.slf4j.Logger;
import org.slf4j.LoggerFactory; import org.slf4j.LoggerFactory;
import java.io.File; import java.io.File;
import java.io.IOException; import java.io.IOException;
import java.io.StringReader;
import java.nio.charset.Charset;
import java.nio.charset.StandardCharsets;
import java.nio.file.FileSystems; import java.nio.file.FileSystems;
import java.nio.file.Files; import java.nio.file.Files;
import java.nio.file.Path; import java.nio.file.Path;
import java.nio.file.Paths; import java.nio.file.Paths;
import java.nio.file.attribute.PosixFilePermission; import java.nio.file.attribute.PosixFilePermission;
import java.security.KeyFactory;
import java.security.KeyPair; import java.security.KeyPair;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.spec.InvalidKeySpecException;
import java.security.spec.PKCS8EncodedKeySpec;
import java.util.Set; import java.util.Set;
import java.util.function.Supplier; import java.util.function.Supplier;
import java.util.stream.Collectors; import java.util.stream.Collectors;
@ -48,33 +57,44 @@ import static java.nio.file.attribute.PosixFilePermission.OWNER_READ;
import static java.nio.file.attribute.PosixFilePermission.OWNER_WRITE; import static java.nio.file.attribute.PosixFilePermission.OWNER_WRITE;
/** /**
* We store all Key material in good old PEM files. * We store all Key material in good old PEM files. This helps in avoiding
* This helps in avoiding dealing will persistent * dealing will persistent Java KeyStore issues. Also when debugging, general
* Java KeyStore issues. Also when debugging, * tools like OpenSSL can be used to read and decode these files.
* general tools like OpenSSL can be used to read and
* decode these files.
*/ */
public class HDDSKeyPEMWriter { public class KeyCodec {
private static final Logger LOG = public final static String PRIVATE_KEY = "PRIVATE KEY";
LoggerFactory.getLogger(HDDSKeyPEMWriter.class); public final static String PUBLIC_KEY = "PUBLIC KEY";
public final static Charset DEFAULT_CHARSET = StandardCharsets.UTF_8;
private final static Logger LOG =
LoggerFactory.getLogger(KeyCodec.class);
private final Path location; private final Path location;
private final SecurityConfig securityConfig; private final SecurityConfig securityConfig;
private Set<PosixFilePermission> permissionSet = private Set<PosixFilePermission> permissionSet =
Stream.of(OWNER_READ, OWNER_WRITE, OWNER_EXECUTE) Stream.of(OWNER_READ, OWNER_WRITE, OWNER_EXECUTE)
.collect(Collectors.toSet()); .collect(Collectors.toSet());
private Supplier<Boolean> isPosixFileSystem; private Supplier<Boolean> isPosixFileSystem;
public final static String PRIVATE_KEY = "PRIVATE KEY";
public final static String PUBLIC_KEY = "PUBLIC KEY";
public static final Charset DEFAULT_CHARSET = StandardCharsets.UTF_8;
/*
Creates an HDDS Key Writer.
@param configuration - Configuration /**
* Creates an KeyCodec.
*
* @param config - Security Config.
* @param component - Component String.
*/ */
public HDDSKeyPEMWriter(Configuration configuration) throws IOException { public KeyCodec(SecurityConfig config, String component) {
this.securityConfig = config;
isPosixFileSystem = KeyCodec::isPosix;
this.location = securityConfig.getKeyLocation(component);
}
/**
* Creates an HDDS Key Writer.
*
* @param configuration - Configuration
*/
public KeyCodec(Configuration configuration) {
Preconditions.checkNotNull(configuration, "Config cannot be null"); Preconditions.checkNotNull(configuration, "Config cannot be null");
this.securityConfig = new SecurityConfig(configuration); this.securityConfig = new SecurityConfig(configuration);
isPosixFileSystem = HDDSKeyPEMWriter::isPosix; isPosixFileSystem = KeyCodec::isPosix;
this.location = securityConfig.getKeyLocation(); this.location = securityConfig.getKeyLocation();
} }
@ -90,6 +110,7 @@ public class HDDSKeyPEMWriter {
/** /**
* Returns the Permission set. * Returns the Permission set.
*
* @return Set * @return Set
*/ */
@VisibleForTesting @VisibleForTesting
@ -99,6 +120,7 @@ public class HDDSKeyPEMWriter {
/** /**
* Returns the Security config used for this object. * Returns the Security config used for this object.
*
* @return SecurityConfig * @return SecurityConfig
*/ */
public SecurityConfig getSecurityConfig() { public SecurityConfig getSecurityConfig() {
@ -108,8 +130,8 @@ public class HDDSKeyPEMWriter {
/** /**
* This function is used only for testing. * This function is used only for testing.
* *
* @param isPosixFileSystem - Sets a boolean function for mimicking * @param isPosixFileSystem - Sets a boolean function for mimicking files
* files systems that are not posix. * systems that are not posix.
*/ */
@VisibleForTesting @VisibleForTesting
public void setIsPosixFileSystem(Supplier<Boolean> isPosixFileSystem) { public void setIsPosixFileSystem(Supplier<Boolean> isPosixFileSystem) {
@ -153,6 +175,66 @@ public class HDDSKeyPEMWriter {
securityConfig.getPublicKeyFileName(), overwrite); securityConfig.getPublicKeyFileName(), overwrite);
} }
/**
* Reads a Private Key from the PEM Encoded Store.
*
* @param basePath - Base Path, Directory where the Key is stored.
* @param keyFileName - File Name of the private key
* @return PrivateKey Object.
* @throws IOException - on Error.
*/
private PKCS8EncodedKeySpec readKey(Path basePath, String keyFileName)
throws IOException {
File fileName = Paths.get(basePath.toString(), keyFileName).toFile();
String keyData = FileUtils.readFileToString(fileName, DEFAULT_CHARSET);
final byte[] pemContent;
try (PemReader pemReader = new PemReader(new StringReader(keyData))) {
PemObject keyObject = pemReader.readPemObject();
pemContent = keyObject.getContent();
}
return new PKCS8EncodedKeySpec(pemContent);
}
/**
* Returns a Private Key from a PEM encoded file.
*
* @param basePath - base path
* @param privateKeyFileName - private key file name.
* @return PrivateKey
* @throws InvalidKeySpecException - on Error.
* @throws NoSuchAlgorithmException - on Error.
* @throws IOException - on Error.
*/
public PrivateKey readPrivateKey(Path basePath, String privateKeyFileName)
throws InvalidKeySpecException, NoSuchAlgorithmException, IOException {
PKCS8EncodedKeySpec encodedKeySpec = readKey(basePath, privateKeyFileName);
final KeyFactory keyFactory =
KeyFactory.getInstance(securityConfig.getProvider());
final PrivateKey privateKey =
keyFactory.generatePrivate(encodedKeySpec);
return privateKey;
}
/**
* Returns a public key from a PEM encoded file.
*
* @param basePath - base path.
* @param publicKeyFileName - public key file name.
* @return PublicKey
* @throws NoSuchAlgorithmException - on Error.
* @throws InvalidKeySpecException - on Error.
* @throws IOException - on Error.
*/
public PublicKey readPublicKey(Path basePath, String publicKeyFileName)
throws NoSuchAlgorithmException, InvalidKeySpecException, IOException {
PKCS8EncodedKeySpec encodedKeySpec = readKey(basePath, publicKeyFileName);
final KeyFactory keyFactory =
KeyFactory.getInstance(securityConfig.getProvider());
final PublicKey publicKey =
keyFactory.generatePublic(encodedKeySpec);
return publicKey;
}
/** /**
* Helper function that actually writes data to the files. * Helper function that actually writes data to the files.
* *
@ -190,9 +272,9 @@ public class HDDSKeyPEMWriter {
} }
/** /**
* Checks if private and public key file already exists. Throws IOException * Checks if private and public key file already exists. Throws IOException if
* if file exists and force flag is set to false, else will delete the * file exists and force flag is set to false, else will delete the existing
* existing file. * file.
* *
* @param privateKeyFile - Private key file. * @param privateKeyFile - Private key file.
* @param force - forces overwriting the keys. * @param force - forces overwriting the keys.

View File

@ -62,7 +62,7 @@ public class StorageInfo {
* @param cT * @param cT
* Cluster creation Time * Cluster creation Time
* @throws IOException * @throws IOException - on Error.
*/ */
public StorageInfo(NodeType type, String cid, long cT) public StorageInfo(NodeType type, String cid, long cT)
throws IOException { throws IOException {

View File

@ -0,0 +1,118 @@
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
package org.apache.hadoop.hdds.security.x509.certificate.authority;
import org.apache.commons.lang3.RandomStringUtils;
import org.apache.hadoop.hdds.conf.OzoneConfiguration;
import org.apache.hadoop.hdds.security.exception.SCMSecurityException;
import org.apache.hadoop.hdds.security.x509.SecurityConfig;
import org.bouncycastle.cert.X509CertificateHolder;
import org.junit.Before;
import org.junit.Rule;
import org.junit.Test;
import org.junit.rules.TemporaryFolder;
import java.io.IOException;
import java.security.cert.CertificateException;
import java.util.function.Consumer;
import static org.apache.hadoop.hdds.HddsConfigKeys.OZONE_METADATA_DIRS;
import static org.junit.Assert.*;
/**
* Tests the Default CA Server.
*/
public class TestDefaultCAServer {
private static OzoneConfiguration conf = new OzoneConfiguration();
@Rule
public TemporaryFolder temporaryFolder = new TemporaryFolder();
@Before
public void init() throws IOException {
conf.set(OZONE_METADATA_DIRS, temporaryFolder.newFolder().toString());
}
@Test
public void testInit() throws SCMSecurityException, CertificateException,
IOException {
SecurityConfig securityConfig = new SecurityConfig(conf);
CertificateServer testCA = new DefaultCAServer("testCA",
RandomStringUtils.randomAlphabetic(4),
RandomStringUtils.randomAlphabetic(4));
testCA.init(securityConfig, CertificateServer.CAType.SELF_SIGNED_CA);
X509CertificateHolder first = testCA.getCACertificate();
assertNotNull(first);
//Init is idempotent.
testCA.init(securityConfig, CertificateServer.CAType.SELF_SIGNED_CA);
X509CertificateHolder second = testCA.getCACertificate();
assertEquals(first, second);
// we only support Self Signed CA for now.
try {
testCA.init(securityConfig, CertificateServer.CAType.INTERMEDIARY_CA);
fail("code should not reach here, exception should have been thrown.");
} catch (IllegalStateException e) {
// This is a run time exception, hence it is not caught by the junit
// expected Exception.
assertTrue(e.toString().contains("Not implemented"));
}
}
@Test
public void testMissingCertificate() {
SecurityConfig securityConfig = new SecurityConfig(conf);
CertificateServer testCA = new DefaultCAServer("testCA",
RandomStringUtils.randomAlphabetic(4),
RandomStringUtils.randomAlphabetic(4));
Consumer<SecurityConfig> caInitializer =
((DefaultCAServer) testCA).processVerificationStatus(
DefaultCAServer.VerificationStatus.MISSING_CERTIFICATE);
try {
caInitializer.accept(securityConfig);
fail("code should not reach here, exception should have been thrown.");
} catch (IllegalStateException e) {
// This also is a runtime exception. Hence not caught by junit expected
// exception.
assertTrue(e.toString().contains("Missing Root Certs"));
}
}
@Test
public void testMissingKey() {
SecurityConfig securityConfig = new SecurityConfig(conf);
CertificateServer testCA = new DefaultCAServer("testCA",
RandomStringUtils.randomAlphabetic(4),
RandomStringUtils.randomAlphabetic(4));
Consumer<SecurityConfig> caInitializer =
((DefaultCAServer) testCA).processVerificationStatus(
DefaultCAServer.VerificationStatus.MISSING_KEYS);
try {
caInitializer.accept(securityConfig);
fail("code should not reach here, exception should have been thrown.");
} catch (IllegalStateException e) {
// This also is a runtime exception. Hence not caught by junit expected
// exception.
assertTrue(e.toString().contains("Missing Keys"));
}
}
}

View File

@ -0,0 +1,22 @@
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
/**
* Tests for Default CA.
*/
package org.apache.hadoop.hdds.security.x509.certificate.authority;

View File

@ -0,0 +1,218 @@
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
package org.apache.hadoop.hdds.security.x509.certificate.utils;
import org.apache.commons.lang3.RandomStringUtils;
import org.apache.hadoop.hdds.conf.OzoneConfiguration;
import org.apache.hadoop.hdds.security.exception.SCMSecurityException;
import org.apache.hadoop.hdds.security.x509.certificates.utils.SelfSignedCertificate;
import org.apache.hadoop.hdds.security.x509.keys.HDDSKeyGenerator;
import org.bouncycastle.cert.X509CertificateHolder;
import org.junit.Assert;
import org.junit.Before;
import org.junit.Rule;
import org.junit.Test;
import org.junit.rules.TemporaryFolder;
import java.io.File;
import java.io.IOException;
import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
import java.security.cert.CertificateException;
import java.security.cert.X509Certificate;
import java.time.LocalDate;
import java.time.temporal.ChronoUnit;
import static org.apache.hadoop.hdds.HddsConfigKeys.OZONE_METADATA_DIRS;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertNotNull;
import static org.junit.Assert.assertTrue;
/**
* Tests the Certificate codecs.
*/
public class TestCertificateCodec {
private static OzoneConfiguration conf = new OzoneConfiguration();
@Rule
public TemporaryFolder temporaryFolder = new TemporaryFolder();
@Before
public void init() throws IOException {
conf.set(OZONE_METADATA_DIRS, temporaryFolder.newFolder().toString());
}
/**
* This test converts a X509Certificate Holder object to a PEM encoded String,
* then creates a new X509Certificate object to verify that we are able to
* serialize and deserialize correctly. we follow up with converting these
* objects to standard JCA x509Certificate objects.
*
* @throws NoSuchProviderException - on Error.
* @throws NoSuchAlgorithmException - on Error.
* @throws IOException - on Error.
* @throws SCMSecurityException - on Error.
* @throws CertificateException - on Error.
*/
@Test
public void testGetPEMEncodedString()
throws NoSuchProviderException, NoSuchAlgorithmException,
IOException, SCMSecurityException, CertificateException {
HDDSKeyGenerator keyGenerator =
new HDDSKeyGenerator(conf);
X509CertificateHolder cert =
SelfSignedCertificate.newBuilder()
.setSubject(RandomStringUtils.randomAlphabetic(4))
.setClusterID(RandomStringUtils.randomAlphabetic(4))
.setScmID(RandomStringUtils.randomAlphabetic(4))
.setBeginDate(LocalDate.now())
.setEndDate(LocalDate.now().plus(1, ChronoUnit.DAYS))
.setConfiguration(keyGenerator.getSecurityConfig()
.getConfiguration())
.setKey(keyGenerator.generateKey())
.makeCA()
.build();
CertificateCodec codec = new CertificateCodec(conf);
String pemString = codec.getPEMEncodedString(cert);
assertTrue(pemString.startsWith(CertificateCodec.BEGIN_CERT));
assertTrue(pemString.endsWith(CertificateCodec.END_CERT + "\n"));
// Read back the certificate and verify that all the comparisons pass.
X509CertificateHolder newCert =
codec.getCertificateHolder(codec.getX509Certificate(pemString));
assertEquals(cert, newCert);
// Just make sure we can decode both these classes to Java Std. lIb classes.
X509Certificate firstCert = CertificateCodec.getX509Certificate(cert);
X509Certificate secondCert = CertificateCodec.getX509Certificate(newCert);
assertEquals(firstCert, secondCert);
}
/**
* tests writing and reading certificates in PEM encoded form.
*
* @throws NoSuchProviderException - on Error.
* @throws NoSuchAlgorithmException - on Error.
* @throws IOException - on Error.
* @throws SCMSecurityException - on Error.
* @throws CertificateException - on Error.
*/
@Test
public void testwriteCertificate() throws NoSuchProviderException,
NoSuchAlgorithmException, IOException, SCMSecurityException,
CertificateException {
HDDSKeyGenerator keyGenerator =
new HDDSKeyGenerator(conf);
X509CertificateHolder cert =
SelfSignedCertificate.newBuilder()
.setSubject(RandomStringUtils.randomAlphabetic(4))
.setClusterID(RandomStringUtils.randomAlphabetic(4))
.setScmID(RandomStringUtils.randomAlphabetic(4))
.setBeginDate(LocalDate.now())
.setEndDate(LocalDate.now().plus(1, ChronoUnit.DAYS))
.setConfiguration(keyGenerator.getSecurityConfig()
.getConfiguration())
.setKey(keyGenerator.generateKey())
.makeCA()
.build();
CertificateCodec codec = new CertificateCodec(conf);
String pemString = codec.getPEMEncodedString(cert);
File basePath = temporaryFolder.newFolder();
if (!basePath.exists()) {
Assert.assertTrue(basePath.mkdirs());
}
codec.writeCertificate(basePath.toPath(), "pemcertificate.crt",
pemString, false);
X509CertificateHolder certHolder =
codec.readCertificate(basePath.toPath(), "pemcertificate.crt");
assertNotNull(certHolder);
assertEquals(cert.getSerialNumber(), certHolder.getSerialNumber());
}
/**
* Tests reading and writing certificates in DER form.
*
* @throws IOException - on Error.
* @throws SCMSecurityException - on Error.
* @throws CertificateException - on Error.
* @throws NoSuchProviderException - on Error.
* @throws NoSuchAlgorithmException - on Error.
*/
@Test
public void testwriteCertificateDefault()
throws IOException, SCMSecurityException, CertificateException,
NoSuchProviderException, NoSuchAlgorithmException {
HDDSKeyGenerator keyGenerator =
new HDDSKeyGenerator(conf);
X509CertificateHolder cert =
SelfSignedCertificate.newBuilder()
.setSubject(RandomStringUtils.randomAlphabetic(4))
.setClusterID(RandomStringUtils.randomAlphabetic(4))
.setScmID(RandomStringUtils.randomAlphabetic(4))
.setBeginDate(LocalDate.now())
.setEndDate(LocalDate.now().plus(1, ChronoUnit.DAYS))
.setConfiguration(keyGenerator.getSecurityConfig()
.getConfiguration())
.setKey(keyGenerator.generateKey())
.makeCA()
.build();
CertificateCodec codec = new CertificateCodec(conf);
codec.writeCertificate(cert);
X509CertificateHolder certHolder = codec.readCertificate();
assertNotNull(certHolder);
assertEquals(cert.getSerialNumber(), certHolder.getSerialNumber());
}
/**
* Tests writing to non-default certificate file name.
*
* @throws IOException - on Error.
* @throws SCMSecurityException - on Error.
* @throws NoSuchProviderException - on Error.
* @throws NoSuchAlgorithmException - on Error.
* @throws CertificateException - on Error.
*/
@Test
public void writeCertificate2() throws IOException, SCMSecurityException,
NoSuchProviderException, NoSuchAlgorithmException, CertificateException {
HDDSKeyGenerator keyGenerator =
new HDDSKeyGenerator(conf);
X509CertificateHolder cert =
SelfSignedCertificate.newBuilder()
.setSubject(RandomStringUtils.randomAlphabetic(4))
.setClusterID(RandomStringUtils.randomAlphabetic(4))
.setScmID(RandomStringUtils.randomAlphabetic(4))
.setBeginDate(LocalDate.now())
.setEndDate(LocalDate.now().plus(1, ChronoUnit.DAYS))
.setConfiguration(keyGenerator.getSecurityConfig()
.getConfiguration())
.setKey(keyGenerator.generateKey())
.makeCA()
.build();
CertificateCodec codec =
new CertificateCodec(keyGenerator.getSecurityConfig(), "ca");
codec.writeCertificate(cert, "newcert.crt", false);
// Rewrite with force support
codec.writeCertificate(cert, "newcert.crt", true);
X509CertificateHolder x509CertificateHolder =
codec.readCertificate(codec.getLocation(), "newcert.crt");
assertNotNull(x509CertificateHolder);
}
}

View File

@ -1,4 +1,4 @@
/** /*
* Licensed to the Apache Software Foundation (ASF) under one * Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file * or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information * distributed with this work for additional information
@ -6,20 +6,22 @@
* to you under the Apache License, Version 2.0 (the * to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance * "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at * with the License. You may obtain a copy of the License at
* <p> *
* http://www.apache.org/licenses/LICENSE-2.0 * http://www.apache.org/licenses/LICENSE-2.0
* <p> *
* Unless required by applicable law or agreed to in writing, software * Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, * distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and * See the License for the specific language governing permissions and
* limitations under the License. * limitations under the License.
*
*/ */
package org.apache.hadoop.hdds.security.x509.certificates; package org.apache.hadoop.hdds.security.x509.certificate.utils;
import org.apache.hadoop.hdds.conf.OzoneConfiguration; import org.apache.hadoop.hdds.conf.OzoneConfiguration;
import org.apache.hadoop.hdds.security.exception.SCMSecurityException; import org.apache.hadoop.hdds.security.exception.SCMSecurityException;
import org.apache.hadoop.hdds.security.x509.SecurityConfig; import org.apache.hadoop.hdds.security.x509.SecurityConfig;
import org.apache.hadoop.hdds.security.x509.certificates.utils.CertificateSignRequest;
import org.apache.hadoop.hdds.security.x509.keys.HDDSKeyGenerator; import org.apache.hadoop.hdds.security.x509.keys.HDDSKeyGenerator;
import org.apache.hadoop.hdds.security.x509.keys.SecurityUtil; import org.apache.hadoop.hdds.security.x509.keys.SecurityUtil;
import org.bouncycastle.asn1.ASN1Sequence; import org.bouncycastle.asn1.ASN1Sequence;
@ -45,12 +47,15 @@ import java.util.UUID;
import static org.apache.hadoop.hdds.HddsConfigKeys.OZONE_METADATA_DIRS; import static org.apache.hadoop.hdds.HddsConfigKeys.OZONE_METADATA_DIRS;
/**
* Certificate Signing Request.
*/
public class TestCertificateSignRequest { public class TestCertificateSignRequest {
private SecurityConfig securityConfig;
private static OzoneConfiguration conf = new OzoneConfiguration(); private static OzoneConfiguration conf = new OzoneConfiguration();
@Rule @Rule
public TemporaryFolder temporaryFolder = new TemporaryFolder(); public TemporaryFolder temporaryFolder = new TemporaryFolder();
private SecurityConfig securityConfig;
@Before @Before
public void init() throws IOException { public void init() throws IOException {

View File

@ -17,11 +17,12 @@
* *
*/ */
package org.apache.hadoop.hdds.security.x509.certificates; package org.apache.hadoop.hdds.security.x509.certificate.utils;
import org.apache.hadoop.hdds.conf.OzoneConfiguration; import org.apache.hadoop.hdds.conf.OzoneConfiguration;
import org.apache.hadoop.hdds.security.exception.SCMSecurityException; import org.apache.hadoop.hdds.security.exception.SCMSecurityException;
import org.apache.hadoop.hdds.security.x509.SecurityConfig; import org.apache.hadoop.hdds.security.x509.SecurityConfig;
import org.apache.hadoop.hdds.security.x509.certificates.utils.SelfSignedCertificate;
import org.apache.hadoop.hdds.security.x509.keys.HDDSKeyGenerator; import org.apache.hadoop.hdds.security.x509.keys.HDDSKeyGenerator;
import org.bouncycastle.asn1.x509.Extension; import org.bouncycastle.asn1.x509.Extension;
import org.bouncycastle.cert.X509CertificateHolder; import org.bouncycastle.cert.X509CertificateHolder;
@ -41,8 +42,8 @@ import java.security.NoSuchProviderException;
import java.security.SignatureException; import java.security.SignatureException;
import java.security.cert.CertificateException; import java.security.cert.CertificateException;
import java.security.cert.X509Certificate; import java.security.cert.X509Certificate;
import java.time.Duration; import java.time.LocalDate;
import java.time.Instant; import java.time.temporal.ChronoUnit;
import java.util.Date; import java.util.Date;
import java.util.UUID; import java.util.UUID;
@ -52,10 +53,10 @@ import static org.apache.hadoop.hdds.HddsConfigKeys.OZONE_METADATA_DIRS;
* Test Class for Root Certificate generation. * Test Class for Root Certificate generation.
*/ */
public class TestRootCertificate { public class TestRootCertificate {
private SecurityConfig securityConfig;
private static OzoneConfiguration conf = new OzoneConfiguration(); private static OzoneConfiguration conf = new OzoneConfiguration();
@Rule @Rule
public TemporaryFolder temporaryFolder = new TemporaryFolder(); public TemporaryFolder temporaryFolder = new TemporaryFolder();
private SecurityConfig securityConfig;
@Before @Before
public void init() throws IOException { public void init() throws IOException {
@ -67,10 +68,9 @@ public class TestRootCertificate {
public void testAllFieldsAreExpected() public void testAllFieldsAreExpected()
throws SCMSecurityException, NoSuchProviderException, throws SCMSecurityException, NoSuchProviderException,
NoSuchAlgorithmException, CertificateException, NoSuchAlgorithmException, CertificateException,
SignatureException, InvalidKeyException { SignatureException, InvalidKeyException, IOException {
Instant now = Instant.now(); LocalDate notBefore = LocalDate.now();
Date notBefore = Date.from(now); LocalDate notAfter = notBefore.plus(365, ChronoUnit.DAYS);
Date notAfter = Date.from(now.plus(Duration.ofDays(365)));
String clusterID = UUID.randomUUID().toString(); String clusterID = UUID.randomUUID().toString();
String scmID = UUID.randomUUID().toString(); String scmID = UUID.randomUUID().toString();
String subject = "testRootCert"; String subject = "testRootCert";
@ -96,13 +96,15 @@ public class TestRootCertificate {
// Make sure that NotBefore is before the current Date // Make sure that NotBefore is before the current Date
Date invalidDate = Date.from(now.minus(Duration.ofDays(1))); Date invalidDate = java.sql.Date.valueOf(
notBefore.minus(1, ChronoUnit.DAYS));
Assert.assertFalse( Assert.assertFalse(
certificateHolder.getNotBefore() certificateHolder.getNotBefore()
.before(invalidDate)); .before(invalidDate));
//Make sure the end date is honored. //Make sure the end date is honored.
invalidDate = Date.from(now.plus(Duration.ofDays(366))); invalidDate = java.sql.Date.valueOf(
notAfter.plus(1, ChronoUnit.DAYS));
Assert.assertFalse( Assert.assertFalse(
certificateHolder.getNotAfter() certificateHolder.getNotAfter()
.after(invalidDate)); .after(invalidDate));
@ -113,7 +115,8 @@ public class TestRootCertificate {
Assert.assertEquals(certificateHolder.getIssuer().toString(), dnName); Assert.assertEquals(certificateHolder.getIssuer().toString(), dnName);
Assert.assertEquals(certificateHolder.getSubject().toString(), dnName); Assert.assertEquals(certificateHolder.getSubject().toString(), dnName);
// We did not ask for this Certificate to be a CA certificate, hence that // We did not ask for this Certificate to be a CertificateServer
// certificate, hence that
// extension should be null. // extension should be null.
Assert.assertNull( Assert.assertNull(
certificateHolder.getExtension(Extension.basicConstraints)); certificateHolder.getExtension(Extension.basicConstraints));
@ -128,10 +131,9 @@ public class TestRootCertificate {
@Test @Test
public void testCACert() public void testCACert()
throws SCMSecurityException, NoSuchProviderException, throws SCMSecurityException, NoSuchProviderException,
NoSuchAlgorithmException { NoSuchAlgorithmException, IOException {
Instant now = Instant.now(); LocalDate notBefore = LocalDate.now();
Date notBefore = Date.from(now); LocalDate notAfter = notBefore.plus(365, ChronoUnit.DAYS);
Date notAfter = Date.from(now.plus(Duration.ofDays(365)));
String clusterID = UUID.randomUUID().toString(); String clusterID = UUID.randomUUID().toString();
String scmID = UUID.randomUUID().toString(); String scmID = UUID.randomUUID().toString();
String subject = "testRootCert"; String subject = "testRootCert";
@ -151,7 +153,8 @@ public class TestRootCertificate {
.makeCA(); .makeCA();
X509CertificateHolder certificateHolder = builder.build(); X509CertificateHolder certificateHolder = builder.build();
// This time we asked for a CA Certificate, make sure that extension is // This time we asked for a CertificateServer Certificate, make sure that
// extension is
// present and valid. // present and valid.
Extension basicExt = Extension basicExt =
certificateHolder.getExtension(Extension.basicConstraints); certificateHolder.getExtension(Extension.basicConstraints);
@ -167,10 +170,9 @@ public class TestRootCertificate {
@Test @Test
public void testInvalidParamFails() public void testInvalidParamFails()
throws SCMSecurityException, NoSuchProviderException, throws SCMSecurityException, NoSuchProviderException,
NoSuchAlgorithmException { NoSuchAlgorithmException, IOException {
Instant now = Instant.now(); LocalDate notBefore = LocalDate.now();
Date notBefore = Date.from(now); LocalDate notAfter = notBefore.plus(365, ChronoUnit.DAYS);
Date notAfter = Date.from(now.plus(Duration.ofDays(365)));
String clusterID = UUID.randomUUID().toString(); String clusterID = UUID.randomUUID().toString();
String scmID = UUID.randomUUID().toString(); String scmID = UUID.randomUUID().toString();
String subject = "testRootCert"; String subject = "testRootCert";
@ -253,6 +255,4 @@ public class TestRootCertificate {
// Assert that we can create a certificate with all sane params. // Assert that we can create a certificate with all sane params.
Assert.assertNotNull(builder.build()); Assert.assertNotNull(builder.build());
} }
} }

View File

@ -19,4 +19,4 @@
/** /**
* Test classes for Certificate utilities. * Test classes for Certificate utilities.
*/ */
package org.apache.hadoop.hdds.security.x509.certificates; package org.apache.hadoop.hdds.security.x509.certificate.utils;

View File

@ -51,7 +51,7 @@ import org.junit.rules.TemporaryFolder;
/** /**
* Test class for HDDS pem writer. * Test class for HDDS pem writer.
*/ */
public class TestHDDSKeyPEMWriter { public class TestKeyCodec {
@Rule @Rule
public TemporaryFolder temporaryFolder = new TemporaryFolder(); public TemporaryFolder temporaryFolder = new TemporaryFolder();
@ -82,7 +82,7 @@ public class TestHDDSKeyPEMWriter {
throws NoSuchProviderException, NoSuchAlgorithmException, throws NoSuchProviderException, NoSuchAlgorithmException,
IOException, InvalidKeySpecException { IOException, InvalidKeySpecException {
KeyPair keys = keyGenerator.generateKey(); KeyPair keys = keyGenerator.generateKey();
HDDSKeyPEMWriter pemWriter = new HDDSKeyPEMWriter(configuration); KeyCodec pemWriter = new KeyCodec(configuration);
pemWriter.writeKey(keys); pemWriter.writeKey(keys);
// Assert that locations have been created. // Assert that locations have been created.
@ -171,7 +171,7 @@ public class TestHDDSKeyPEMWriter {
public void testReWriteKey() public void testReWriteKey()
throws Exception { throws Exception {
KeyPair kp = keyGenerator.generateKey(); KeyPair kp = keyGenerator.generateKey();
HDDSKeyPEMWriter pemWriter = new HDDSKeyPEMWriter(configuration); KeyCodec pemWriter = new KeyCodec(configuration);
SecurityConfig secConfig = pemWriter.getSecurityConfig(); SecurityConfig secConfig = pemWriter.getSecurityConfig();
pemWriter.writeKey(kp); pemWriter.writeKey(kp);
@ -205,7 +205,7 @@ public class TestHDDSKeyPEMWriter {
public void testWriteKeyInNonPosixFS() public void testWriteKeyInNonPosixFS()
throws Exception { throws Exception {
KeyPair kp = keyGenerator.generateKey(); KeyPair kp = keyGenerator.generateKey();
HDDSKeyPEMWriter pemWriter = new HDDSKeyPEMWriter(configuration); KeyCodec pemWriter = new KeyCodec(configuration);
pemWriter.setIsPosixFileSystem(() -> false); pemWriter.setIsPosixFileSystem(() -> false);
// Assert key rewrite fails in non Posix file system. // Assert key rewrite fails in non Posix file system.

View File

@ -31,7 +31,6 @@ import org.junit.rules.TemporaryFolder;
import java.io.File; import java.io.File;
import java.io.IOException; import java.io.IOException;
import java.nio.charset.StandardCharsets; import java.nio.charset.StandardCharsets;
import java.util.Arrays;
/** /**
* Tests RDBStore creation. * Tests RDBStore creation.
@ -131,7 +130,7 @@ public class TestDBStoreBuilder {
RandomStringUtils.random(9).getBytes(StandardCharsets.UTF_8); RandomStringUtils.random(9).getBytes(StandardCharsets.UTF_8);
firstTable.put(key, value); firstTable.put(key, value);
byte[] temp = firstTable.get(key); byte[] temp = firstTable.get(key);
Assert.assertTrue(Arrays.equals(value, temp)); Assert.assertArrayEquals(value, temp);
} }
try (Table secondTable = dbStore.getTable("Second")) { try (Table secondTable = dbStore.getTable("Second")) {
@ -161,7 +160,7 @@ public class TestDBStoreBuilder {
RandomStringUtils.random(9).getBytes(StandardCharsets.UTF_8); RandomStringUtils.random(9).getBytes(StandardCharsets.UTF_8);
firstTable.put(key, value); firstTable.put(key, value);
byte[] temp = firstTable.get(key); byte[] temp = firstTable.get(key);
Assert.assertTrue(Arrays.equals(value, temp)); Assert.assertArrayEquals(value, temp);
} }
try (Table secondTable = dbStore.getTable("Second")) { try (Table secondTable = dbStore.getTable("Second")) {

View File

@ -46,7 +46,7 @@ import org.apache.hadoop.hdds.scm.server.SCMStorage;
import org.apache.hadoop.hdds.scm.server.StorageContainerManager; import org.apache.hadoop.hdds.scm.server.StorageContainerManager;
import org.apache.hadoop.hdds.security.x509.certificate.client.CertificateClient; import org.apache.hadoop.hdds.security.x509.certificate.client.CertificateClient;
import org.apache.hadoop.hdds.security.x509.keys.HDDSKeyGenerator; import org.apache.hadoop.hdds.security.x509.keys.HDDSKeyGenerator;
import org.apache.hadoop.hdds.security.x509.keys.HDDSKeyPEMWriter; import org.apache.hadoop.hdds.security.x509.keys.KeyCodec;
import org.apache.hadoop.io.Text; import org.apache.hadoop.io.Text;
import org.apache.hadoop.ipc.Client; import org.apache.hadoop.ipc.Client;
import org.apache.hadoop.ipc.RPC; import org.apache.hadoop.ipc.RPC;
@ -88,7 +88,7 @@ public final class TestSecureOzoneCluster {
private static final String TEST_USER = "testUgiUser"; private static final String TEST_USER = "testUgiUser";
private static final int CLIENT_TIMEOUT = 2 * 1000; private static final int CLIENT_TIMEOUT = 2 * 1000;
private Logger LOGGER = LoggerFactory private Logger logger = LoggerFactory
.getLogger(TestSecureOzoneCluster.class); .getLogger(TestSecureOzoneCluster.class);
@Rule @Rule
@ -127,9 +127,9 @@ public final class TestSecureOzoneCluster {
createCredentialsInKDC(conf, miniKdc); createCredentialsInKDC(conf, miniKdc);
generateKeyPair(conf); generateKeyPair(conf);
} catch (IOException e) { } catch (IOException e) {
LOGGER.error("Failed to initialize TestSecureOzoneCluster", e); logger.error("Failed to initialize TestSecureOzoneCluster", e);
} catch (Exception e) { } catch (Exception e) {
LOGGER.error("Failed to initialize TestSecureOzoneCluster", e); logger.error("Failed to initialize TestSecureOzoneCluster", e);
} }
} }
@ -148,7 +148,7 @@ public final class TestSecureOzoneCluster {
} }
FileUtils.deleteQuietly(metaDirPath.toFile()); FileUtils.deleteQuietly(metaDirPath.toFile());
} catch (Exception e) { } catch (Exception e) {
LOGGER.error("Failed to stop TestSecureOzoneCluster", e); logger.error("Failed to stop TestSecureOzoneCluster", e);
} }
} }
@ -452,7 +452,7 @@ public final class TestSecureOzoneCluster {
private void generateKeyPair(OzoneConfiguration config) throws Exception { private void generateKeyPair(OzoneConfiguration config) throws Exception {
HDDSKeyGenerator keyGenerator = new HDDSKeyGenerator(conf); HDDSKeyGenerator keyGenerator = new HDDSKeyGenerator(conf);
keyPair = keyGenerator.generateKey(); keyPair = keyGenerator.generateKey();
HDDSKeyPEMWriter pemWriter = new HDDSKeyPEMWriter(config); KeyCodec pemWriter = new KeyCodec(config);
pemWriter.writeKey(keyPair, true); pemWriter.writeKey(keyPair, true);
} }
@ -463,8 +463,6 @@ public final class TestSecureOzoneCluster {
*/ */
@Test @Test
public void testDelegationTokenRenewal() throws Exception { public void testDelegationTokenRenewal() throws Exception {
// Capture logs for assertions.
LogCapturer logs = LogCapturer.captureLogs(Server.AUDITLOG);
GenericTestUtils GenericTestUtils
.setLogLevel(LoggerFactory.getLogger(Server.class.getName()), INFO); .setLogLevel(LoggerFactory.getLogger(Server.class.getName()), INFO);
@ -480,7 +478,6 @@ public final class TestSecureOzoneCluster {
om.start(); om.start();
UserGroupInformation ugi = UserGroupInformation.getCurrentUser(); UserGroupInformation ugi = UserGroupInformation.getCurrentUser();
String username = ugi.getUserName();
// Get first OM client which will authenticate via Kerberos // Get first OM client which will authenticate via Kerberos
omClient = new OzoneManagerProtocolClientSideTranslatorPB( omClient = new OzoneManagerProtocolClientSideTranslatorPB(