NIFI-3004 Added failing unit test to SSLContextServiceTest to demonstrate that customValidate caches result from previous validation.

NIFI-3004 Added logic to expire StandardSSLContextService customValidate cache after 5 invocations.
Updated unit test to demonstrate this logic.

This closes #1375.

Signed-off-by: Andy LoPresto <alopresto@apache.org>
This commit is contained in:
Andy LoPresto 2017-01-04 19:20:52 -08:00
parent 970c46ccfe
commit 31ec01b5f9
No known key found for this signature in database
GPG Key ID: 3C6EF65B2F7DEF69
2 changed files with 110 additions and 12 deletions

View File

@ -120,6 +120,10 @@ public class StandardSSLContextService extends AbstractControllerService impleme
private ConfigurationContext configContext; private ConfigurationContext configContext;
private boolean isValidated; private boolean isValidated;
// TODO: This can be made configurable if necessary
private static final int VALIDATION_CACHE_EXPIRATION = 5;
private int validationCacheCount = 0;
static { static {
List<PropertyDescriptor> props = new ArrayList<>(); List<PropertyDescriptor> props = new ArrayList<>();
props.add(KEYSTORE); props.add(KEYSTORE);
@ -165,7 +169,7 @@ public class StandardSSLContextService extends AbstractControllerService impleme
@Override @Override
public void onPropertyModified(PropertyDescriptor descriptor, String oldValue, String newValue) { public void onPropertyModified(PropertyDescriptor descriptor, String oldValue, String newValue) {
super.onPropertyModified(descriptor, oldValue, newValue); super.onPropertyModified(descriptor, oldValue, newValue);
isValidated = false; resetValidationCache();
} }
private static Validator createFileExistsAndReadableValidator() { private static Validator createFileExistsAndReadableValidator() {
@ -209,8 +213,13 @@ public class StandardSSLContextService extends AbstractControllerService impleme
final Collection<ValidationResult> results = new ArrayList<>(); final Collection<ValidationResult> results = new ArrayList<>();
if (isValidated) { if (isValidated) {
validationCacheCount++;
if (validationCacheCount > VALIDATION_CACHE_EXPIRATION) {
resetValidationCache();
} else {
return results; return results;
} }
}
results.addAll(validateStore(validationContext.getProperties(), KeystoreValidationGroup.KEYSTORE)); results.addAll(validateStore(validationContext.getProperties(), KeystoreValidationGroup.KEYSTORE));
results.addAll(validateStore(validationContext.getProperties(), KeystoreValidationGroup.TRUSTSTORE)); results.addAll(validateStore(validationContext.getProperties(), KeystoreValidationGroup.TRUSTSTORE));
@ -246,6 +255,15 @@ public class StandardSSLContextService extends AbstractControllerService impleme
return results; return results;
} }
private void resetValidationCache() {
validationCacheCount = 0;
isValidated = false;
}
protected int getValidationCacheExpiration() {
return VALIDATION_CACHE_EXPIRATION;
}
private void verifySslConfig(final ValidationContext validationContext) throws ProcessException { private void verifySslConfig(final ValidationContext validationContext) throws ProcessException {
final String protocol = validationContext.getProperty(SSL_ALGORITHM).getValue(); final String protocol = validationContext.getProperty(SSL_ALGORITHM).getValue();
try { try {
@ -447,7 +465,7 @@ public class StandardSSLContextService extends AbstractControllerService impleme
return count; return count;
} }
public static enum KeystoreValidationGroup { public enum KeystoreValidationGroup {
KEYSTORE, TRUSTSTORE KEYSTORE, TRUSTSTORE
} }

View File

@ -16,17 +16,36 @@
*/ */
package org.apache.nifi.ssl; package org.apache.nifi.ssl;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertTrue;
import java.io.File;
import java.io.IOException;
import java.nio.file.Files;
import java.nio.file.StandardCopyOption;
import java.util.Collection;
import java.util.HashMap; import java.util.HashMap;
import java.util.Map; import java.util.Map;
import org.apache.nifi.components.ValidationContext;
import org.apache.nifi.components.ValidationResult;
import org.apache.nifi.reporting.InitializationException; import org.apache.nifi.reporting.InitializationException;
import org.apache.nifi.ssl.SSLContextService.ClientAuth; import org.apache.nifi.ssl.SSLContextService.ClientAuth;
import org.apache.nifi.util.MockProcessContext;
import org.apache.nifi.util.MockValidationContext;
import org.apache.nifi.util.TestRunner; import org.apache.nifi.util.TestRunner;
import org.apache.nifi.util.TestRunners; import org.apache.nifi.util.TestRunners;
import org.junit.Assert; import org.junit.Assert;
import org.junit.Rule;
import org.junit.Test; import org.junit.Test;
import org.junit.rules.TemporaryFolder;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
public class SSLContextServiceTest { public class SSLContextServiceTest {
private static final Logger logger = LoggerFactory.getLogger(SSLContextServiceTest.class);
@Rule
public TemporaryFolder tmp = new TemporaryFolder(new File("src/test/resources"));
@Test @Test
public void testBad1() throws InitializationException { public void testBad1() throws InitializationException {
@ -144,6 +163,67 @@ public class SSLContextServiceTest {
runner.assertValid(service); runner.assertValid(service);
} }
@Test
public void testValidationResultsCacheShouldExpire() throws InitializationException, IOException {
// Arrange
// Copy the keystore and truststore to a tmp directory so the originals are not modified
File originalKeystore = new File("src/test/resources/localhost-ks.jks");
File originalTruststore = new File("src/test/resources/localhost-ts.jks");
File tmpKeystore = tmp.newFile("keystore-tmp.jks");
File tmpTruststore = tmp.newFile("truststore-tmp.jks");
Files.copy(originalKeystore.toPath(), tmpKeystore.toPath(), StandardCopyOption.REPLACE_EXISTING);
Files.copy(originalTruststore.toPath(), tmpTruststore.toPath(), StandardCopyOption.REPLACE_EXISTING);
final TestRunner runner = TestRunners.newTestRunner(TestProcessor.class);
SSLContextService service = new StandardSSLContextService();
final String serviceIdentifier = "test-should-expire";
runner.addControllerService(serviceIdentifier, service);
runner.setProperty(service, StandardSSLContextService.KEYSTORE.getName(), tmpKeystore.getAbsolutePath());
runner.setProperty(service, StandardSSLContextService.KEYSTORE_PASSWORD.getName(), "localtest");
runner.setProperty(service, StandardSSLContextService.KEYSTORE_TYPE.getName(), "JKS");
runner.setProperty(service, StandardSSLContextService.TRUSTSTORE.getName(), tmpTruststore.getAbsolutePath());
runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_PASSWORD.getName(), "localtest");
runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_TYPE.getName(), "JKS");
runner.enableControllerService(service);
runner.setProperty("SSL Context Svc ID", serviceIdentifier);
runner.assertValid(service);
final StandardSSLContextService sslContextService = (StandardSSLContextService) service;
// Act
boolean isDeleted = tmpKeystore.delete();
assert isDeleted;
assert !tmpKeystore.exists();
logger.info("Deleted keystore file");
// Manually validate the service (expecting cached result to be returned)
final MockProcessContext processContext = (MockProcessContext) runner.getProcessContext();
// This service does not use the state manager or variable registry
final ValidationContext validationContext = new MockValidationContext(processContext, null, null);
// Even though the keystore file is no longer present, because no property changed, the cached result is still valid
Collection<ValidationResult> validationResults = sslContextService.customValidate(validationContext);
assertTrue("validation results is not empty", validationResults.isEmpty());
logger.info("(1) StandardSSLContextService#customValidate() returned true even though the keystore file is no longer available");
// Assert
// Have to exhaust the cached result by checking n-1 more times
for (int i = 2; i < sslContextService.getValidationCacheExpiration(); i++) {
validationResults = sslContextService.customValidate(validationContext);
assertTrue("validation results is not empty", validationResults.isEmpty());
logger.info("(" + i + ") StandardSSLContextService#customValidate() returned true even though the keystore file is no longer available");
}
validationResults = sslContextService.customValidate(validationContext);
assertFalse("validation results is empty", validationResults.isEmpty());
logger.info("(" + sslContextService.getValidationCacheExpiration() + ") StandardSSLContextService#customValidate() returned false because the cache expired");
}
@Test @Test
public void testGoodTrustOnly() { public void testGoodTrustOnly() {
try { try {
@ -159,7 +239,7 @@ public class SSLContextServiceTest {
runner.setProperty("SSL Context Svc ID", "test-good2"); runner.setProperty("SSL Context Svc ID", "test-good2");
runner.assertValid(); runner.assertValid();
Assert.assertNotNull(service); Assert.assertNotNull(service);
Assert.assertTrue(service instanceof StandardSSLContextService); assertTrue(service instanceof StandardSSLContextService);
service.createSSLContext(ClientAuth.NONE); service.createSSLContext(ClientAuth.NONE);
} catch (InitializationException e) { } catch (InitializationException e) {
} }
@ -180,7 +260,7 @@ public class SSLContextServiceTest {
runner.setProperty("SSL Context Svc ID", "test-good3"); runner.setProperty("SSL Context Svc ID", "test-good3");
runner.assertValid(); runner.assertValid();
Assert.assertNotNull(service); Assert.assertNotNull(service);
Assert.assertTrue(service instanceof StandardSSLContextService); assertTrue(service instanceof StandardSSLContextService);
SSLContextService sslService = service; SSLContextService sslService = service;
sslService.createSSLContext(ClientAuth.NONE); sslService.createSSLContext(ClientAuth.NONE);
} catch (Exception e) { } catch (Exception e) {
@ -205,7 +285,7 @@ public class SSLContextServiceTest {
runner.setProperty("SSL Context Svc ID", "test-diff-keys"); runner.setProperty("SSL Context Svc ID", "test-diff-keys");
runner.assertValid(); runner.assertValid();
Assert.assertNotNull(service); Assert.assertNotNull(service);
Assert.assertTrue(service instanceof StandardSSLContextService); assertTrue(service instanceof StandardSSLContextService);
SSLContextService sslService = service; SSLContextService sslService = service;
sslService.createSSLContext(ClientAuth.NONE); sslService.createSSLContext(ClientAuth.NONE);
} catch (Exception e) { } catch (Exception e) {