mirror of https://github.com/apache/nifi.git
NIFI-3004 Added failing unit test to SSLContextServiceTest to demonstrate that customValidate caches result from previous validation.
NIFI-3004 Added logic to expire StandardSSLContextService customValidate cache after 5 invocations. Updated unit test to demonstrate this logic. This closes #1375. Signed-off-by: Andy LoPresto <alopresto@apache.org>
This commit is contained in:
parent
970c46ccfe
commit
31ec01b5f9
|
@ -120,6 +120,10 @@ public class StandardSSLContextService extends AbstractControllerService impleme
|
||||||
private ConfigurationContext configContext;
|
private ConfigurationContext configContext;
|
||||||
private boolean isValidated;
|
private boolean isValidated;
|
||||||
|
|
||||||
|
// TODO: This can be made configurable if necessary
|
||||||
|
private static final int VALIDATION_CACHE_EXPIRATION = 5;
|
||||||
|
private int validationCacheCount = 0;
|
||||||
|
|
||||||
static {
|
static {
|
||||||
List<PropertyDescriptor> props = new ArrayList<>();
|
List<PropertyDescriptor> props = new ArrayList<>();
|
||||||
props.add(KEYSTORE);
|
props.add(KEYSTORE);
|
||||||
|
@ -165,7 +169,7 @@ public class StandardSSLContextService extends AbstractControllerService impleme
|
||||||
@Override
|
@Override
|
||||||
public void onPropertyModified(PropertyDescriptor descriptor, String oldValue, String newValue) {
|
public void onPropertyModified(PropertyDescriptor descriptor, String oldValue, String newValue) {
|
||||||
super.onPropertyModified(descriptor, oldValue, newValue);
|
super.onPropertyModified(descriptor, oldValue, newValue);
|
||||||
isValidated = false;
|
resetValidationCache();
|
||||||
}
|
}
|
||||||
|
|
||||||
private static Validator createFileExistsAndReadableValidator() {
|
private static Validator createFileExistsAndReadableValidator() {
|
||||||
|
@ -209,8 +213,13 @@ public class StandardSSLContextService extends AbstractControllerService impleme
|
||||||
final Collection<ValidationResult> results = new ArrayList<>();
|
final Collection<ValidationResult> results = new ArrayList<>();
|
||||||
|
|
||||||
if (isValidated) {
|
if (isValidated) {
|
||||||
|
validationCacheCount++;
|
||||||
|
if (validationCacheCount > VALIDATION_CACHE_EXPIRATION) {
|
||||||
|
resetValidationCache();
|
||||||
|
} else {
|
||||||
return results;
|
return results;
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
results.addAll(validateStore(validationContext.getProperties(), KeystoreValidationGroup.KEYSTORE));
|
results.addAll(validateStore(validationContext.getProperties(), KeystoreValidationGroup.KEYSTORE));
|
||||||
results.addAll(validateStore(validationContext.getProperties(), KeystoreValidationGroup.TRUSTSTORE));
|
results.addAll(validateStore(validationContext.getProperties(), KeystoreValidationGroup.TRUSTSTORE));
|
||||||
|
@ -246,6 +255,15 @@ public class StandardSSLContextService extends AbstractControllerService impleme
|
||||||
return results;
|
return results;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private void resetValidationCache() {
|
||||||
|
validationCacheCount = 0;
|
||||||
|
isValidated = false;
|
||||||
|
}
|
||||||
|
|
||||||
|
protected int getValidationCacheExpiration() {
|
||||||
|
return VALIDATION_CACHE_EXPIRATION;
|
||||||
|
}
|
||||||
|
|
||||||
private void verifySslConfig(final ValidationContext validationContext) throws ProcessException {
|
private void verifySslConfig(final ValidationContext validationContext) throws ProcessException {
|
||||||
final String protocol = validationContext.getProperty(SSL_ALGORITHM).getValue();
|
final String protocol = validationContext.getProperty(SSL_ALGORITHM).getValue();
|
||||||
try {
|
try {
|
||||||
|
@ -447,7 +465,7 @@ public class StandardSSLContextService extends AbstractControllerService impleme
|
||||||
return count;
|
return count;
|
||||||
}
|
}
|
||||||
|
|
||||||
public static enum KeystoreValidationGroup {
|
public enum KeystoreValidationGroup {
|
||||||
|
|
||||||
KEYSTORE, TRUSTSTORE
|
KEYSTORE, TRUSTSTORE
|
||||||
}
|
}
|
||||||
|
|
|
@ -16,17 +16,36 @@
|
||||||
*/
|
*/
|
||||||
package org.apache.nifi.ssl;
|
package org.apache.nifi.ssl;
|
||||||
|
|
||||||
|
import static org.junit.Assert.assertFalse;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
|
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.nio.file.Files;
|
||||||
|
import java.nio.file.StandardCopyOption;
|
||||||
|
import java.util.Collection;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
import org.apache.nifi.components.ValidationContext;
|
||||||
|
import org.apache.nifi.components.ValidationResult;
|
||||||
import org.apache.nifi.reporting.InitializationException;
|
import org.apache.nifi.reporting.InitializationException;
|
||||||
import org.apache.nifi.ssl.SSLContextService.ClientAuth;
|
import org.apache.nifi.ssl.SSLContextService.ClientAuth;
|
||||||
|
import org.apache.nifi.util.MockProcessContext;
|
||||||
|
import org.apache.nifi.util.MockValidationContext;
|
||||||
import org.apache.nifi.util.TestRunner;
|
import org.apache.nifi.util.TestRunner;
|
||||||
import org.apache.nifi.util.TestRunners;
|
import org.apache.nifi.util.TestRunners;
|
||||||
import org.junit.Assert;
|
import org.junit.Assert;
|
||||||
|
import org.junit.Rule;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
|
import org.junit.rules.TemporaryFolder;
|
||||||
|
import org.slf4j.Logger;
|
||||||
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
public class SSLContextServiceTest {
|
public class SSLContextServiceTest {
|
||||||
|
private static final Logger logger = LoggerFactory.getLogger(SSLContextServiceTest.class);
|
||||||
|
|
||||||
|
@Rule
|
||||||
|
public TemporaryFolder tmp = new TemporaryFolder(new File("src/test/resources"));
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testBad1() throws InitializationException {
|
public void testBad1() throws InitializationException {
|
||||||
|
@ -144,6 +163,67 @@ public class SSLContextServiceTest {
|
||||||
runner.assertValid(service);
|
runner.assertValid(service);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testValidationResultsCacheShouldExpire() throws InitializationException, IOException {
|
||||||
|
// Arrange
|
||||||
|
|
||||||
|
// Copy the keystore and truststore to a tmp directory so the originals are not modified
|
||||||
|
File originalKeystore = new File("src/test/resources/localhost-ks.jks");
|
||||||
|
File originalTruststore = new File("src/test/resources/localhost-ts.jks");
|
||||||
|
|
||||||
|
File tmpKeystore = tmp.newFile("keystore-tmp.jks");
|
||||||
|
File tmpTruststore = tmp.newFile("truststore-tmp.jks");
|
||||||
|
|
||||||
|
Files.copy(originalKeystore.toPath(), tmpKeystore.toPath(), StandardCopyOption.REPLACE_EXISTING);
|
||||||
|
Files.copy(originalTruststore.toPath(), tmpTruststore.toPath(), StandardCopyOption.REPLACE_EXISTING);
|
||||||
|
|
||||||
|
final TestRunner runner = TestRunners.newTestRunner(TestProcessor.class);
|
||||||
|
SSLContextService service = new StandardSSLContextService();
|
||||||
|
final String serviceIdentifier = "test-should-expire";
|
||||||
|
runner.addControllerService(serviceIdentifier, service);
|
||||||
|
runner.setProperty(service, StandardSSLContextService.KEYSTORE.getName(), tmpKeystore.getAbsolutePath());
|
||||||
|
runner.setProperty(service, StandardSSLContextService.KEYSTORE_PASSWORD.getName(), "localtest");
|
||||||
|
runner.setProperty(service, StandardSSLContextService.KEYSTORE_TYPE.getName(), "JKS");
|
||||||
|
runner.setProperty(service, StandardSSLContextService.TRUSTSTORE.getName(), tmpTruststore.getAbsolutePath());
|
||||||
|
runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_PASSWORD.getName(), "localtest");
|
||||||
|
runner.setProperty(service, StandardSSLContextService.TRUSTSTORE_TYPE.getName(), "JKS");
|
||||||
|
runner.enableControllerService(service);
|
||||||
|
|
||||||
|
runner.setProperty("SSL Context Svc ID", serviceIdentifier);
|
||||||
|
runner.assertValid(service);
|
||||||
|
|
||||||
|
final StandardSSLContextService sslContextService = (StandardSSLContextService) service;
|
||||||
|
|
||||||
|
// Act
|
||||||
|
boolean isDeleted = tmpKeystore.delete();
|
||||||
|
assert isDeleted;
|
||||||
|
assert !tmpKeystore.exists();
|
||||||
|
logger.info("Deleted keystore file");
|
||||||
|
|
||||||
|
// Manually validate the service (expecting cached result to be returned)
|
||||||
|
final MockProcessContext processContext = (MockProcessContext) runner.getProcessContext();
|
||||||
|
// This service does not use the state manager or variable registry
|
||||||
|
final ValidationContext validationContext = new MockValidationContext(processContext, null, null);
|
||||||
|
|
||||||
|
// Even though the keystore file is no longer present, because no property changed, the cached result is still valid
|
||||||
|
Collection<ValidationResult> validationResults = sslContextService.customValidate(validationContext);
|
||||||
|
assertTrue("validation results is not empty", validationResults.isEmpty());
|
||||||
|
logger.info("(1) StandardSSLContextService#customValidate() returned true even though the keystore file is no longer available");
|
||||||
|
|
||||||
|
// Assert
|
||||||
|
|
||||||
|
// Have to exhaust the cached result by checking n-1 more times
|
||||||
|
for (int i = 2; i < sslContextService.getValidationCacheExpiration(); i++) {
|
||||||
|
validationResults = sslContextService.customValidate(validationContext);
|
||||||
|
assertTrue("validation results is not empty", validationResults.isEmpty());
|
||||||
|
logger.info("(" + i + ") StandardSSLContextService#customValidate() returned true even though the keystore file is no longer available");
|
||||||
|
}
|
||||||
|
|
||||||
|
validationResults = sslContextService.customValidate(validationContext);
|
||||||
|
assertFalse("validation results is empty", validationResults.isEmpty());
|
||||||
|
logger.info("(" + sslContextService.getValidationCacheExpiration() + ") StandardSSLContextService#customValidate() returned false because the cache expired");
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testGoodTrustOnly() {
|
public void testGoodTrustOnly() {
|
||||||
try {
|
try {
|
||||||
|
@ -159,7 +239,7 @@ public class SSLContextServiceTest {
|
||||||
runner.setProperty("SSL Context Svc ID", "test-good2");
|
runner.setProperty("SSL Context Svc ID", "test-good2");
|
||||||
runner.assertValid();
|
runner.assertValid();
|
||||||
Assert.assertNotNull(service);
|
Assert.assertNotNull(service);
|
||||||
Assert.assertTrue(service instanceof StandardSSLContextService);
|
assertTrue(service instanceof StandardSSLContextService);
|
||||||
service.createSSLContext(ClientAuth.NONE);
|
service.createSSLContext(ClientAuth.NONE);
|
||||||
} catch (InitializationException e) {
|
} catch (InitializationException e) {
|
||||||
}
|
}
|
||||||
|
@ -180,7 +260,7 @@ public class SSLContextServiceTest {
|
||||||
runner.setProperty("SSL Context Svc ID", "test-good3");
|
runner.setProperty("SSL Context Svc ID", "test-good3");
|
||||||
runner.assertValid();
|
runner.assertValid();
|
||||||
Assert.assertNotNull(service);
|
Assert.assertNotNull(service);
|
||||||
Assert.assertTrue(service instanceof StandardSSLContextService);
|
assertTrue(service instanceof StandardSSLContextService);
|
||||||
SSLContextService sslService = service;
|
SSLContextService sslService = service;
|
||||||
sslService.createSSLContext(ClientAuth.NONE);
|
sslService.createSSLContext(ClientAuth.NONE);
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
|
@ -205,7 +285,7 @@ public class SSLContextServiceTest {
|
||||||
runner.setProperty("SSL Context Svc ID", "test-diff-keys");
|
runner.setProperty("SSL Context Svc ID", "test-diff-keys");
|
||||||
runner.assertValid();
|
runner.assertValid();
|
||||||
Assert.assertNotNull(service);
|
Assert.assertNotNull(service);
|
||||||
Assert.assertTrue(service instanceof StandardSSLContextService);
|
assertTrue(service instanceof StandardSSLContextService);
|
||||||
SSLContextService sslService = service;
|
SSLContextService sslService = service;
|
||||||
sslService.createSSLContext(ClientAuth.NONE);
|
sslService.createSSLContext(ClientAuth.NONE);
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
|
|
Loading…
Reference in New Issue