Skip to content

Commit 781b4c4

Browse files
authoredMay 30, 2024··
security: Stabilize AdvancedTlsX509KeyManager. (#11139)
* Clean up and de-experimentalization of KeyManager * Unit tests for API validity.
1 parent df8cfe9 commit 781b4c4

File tree

3 files changed

+202
-40
lines changed

3 files changed

+202
-40
lines changed
 

‎netty/src/test/java/io/grpc/netty/AdvancedTlsTest.java

+14-17
Original file line numberDiff line numberDiff line change
@@ -45,14 +45,11 @@
4545
import io.grpc.util.CertificateUtils;
4646
import java.io.Closeable;
4747
import java.io.File;
48-
import java.io.IOException;
4948
import java.net.Socket;
5049
import java.security.GeneralSecurityException;
51-
import java.security.NoSuchAlgorithmException;
5250
import java.security.PrivateKey;
5351
import java.security.cert.CertificateException;
5452
import java.security.cert.X509Certificate;
55-
import java.security.spec.InvalidKeySpecException;
5653
import java.util.concurrent.Executors;
5754
import java.util.concurrent.ScheduledExecutorService;
5855
import java.util.concurrent.TimeUnit;
@@ -65,13 +62,13 @@
6562

6663
@RunWith(JUnit4.class)
6764
public class AdvancedTlsTest {
68-
public static final String SERVER_0_KEY_FILE = "server0.key";
69-
public static final String SERVER_0_PEM_FILE = "server0.pem";
70-
public static final String CLIENT_0_KEY_FILE = "client.key";
71-
public static final String CLIENT_0_PEM_FILE = "client.pem";
72-
public static final String CA_PEM_FILE = "ca.pem";
73-
public static final String SERVER_BAD_KEY_FILE = "badserver.key";
74-
public static final String SERVER_BAD_PEM_FILE = "badserver.pem";
65+
private static final String SERVER_0_KEY_FILE = "server0.key";
66+
private static final String SERVER_0_PEM_FILE = "server0.pem";
67+
private static final String CLIENT_0_KEY_FILE = "client.key";
68+
private static final String CLIENT_0_PEM_FILE = "client.pem";
69+
private static final String CA_PEM_FILE = "ca.pem";
70+
private static final String SERVER_BAD_KEY_FILE = "badserver.key";
71+
private static final String SERVER_BAD_PEM_FILE = "badserver.pem";
7572

7673
private ScheduledExecutorService executor;
7774
private Server server;
@@ -92,7 +89,7 @@ public class AdvancedTlsTest {
9289

9390
@Before
9491
public void setUp()
95-
throws NoSuchAlgorithmException, IOException, CertificateException, InvalidKeySpecException {
92+
throws Exception {
9693
executor = Executors.newSingleThreadScheduledExecutor();
9794
caCertFile = TestUtils.loadCert(CA_PEM_FILE);
9895
serverKey0File = TestUtils.loadCert(SERVER_0_KEY_FILE);
@@ -285,11 +282,11 @@ public void trustManagerInsecurelySkipAllTest() throws Exception {
285282
new SslSocketAndEnginePeerVerifier() {
286283
@Override
287284
public void verifyPeerCertificate(X509Certificate[] peerCertChain, String authType,
288-
Socket socket) throws CertificateException { }
285+
Socket socket) { }
289286

290287
@Override
291288
public void verifyPeerCertificate(X509Certificate[] peerCertChain, String authType,
292-
SSLEngine engine) throws CertificateException { }
289+
SSLEngine engine) { }
293290
})
294291
.build();
295292
serverTrustManager.updateTrustCredentials(caCert);
@@ -310,11 +307,11 @@ public void verifyPeerCertificate(X509Certificate[] peerCertChain, String authTy
310307
new SslSocketAndEnginePeerVerifier() {
311308
@Override
312309
public void verifyPeerCertificate(X509Certificate[] peerCertChain, String authType,
313-
Socket socket) throws CertificateException { }
310+
Socket socket) { }
314311

315312
@Override
316313
public void verifyPeerCertificate(X509Certificate[] peerCertChain, String authType,
317-
SSLEngine engine) throws CertificateException { }
314+
SSLEngine engine) { }
318315
})
319316
.build();
320317
clientTrustManager.updateTrustCredentials(caCert);
@@ -419,7 +416,7 @@ public void onFileLoadingKeyManagerTrustManagerTest() throws Exception {
419416
}
420417

421418
@Test
422-
public void onFileReloadingKeyManagerBadInitialContentTest() throws Exception {
419+
public void onFileReloadingKeyManagerBadInitialContentTest() {
423420
AdvancedTlsX509KeyManager keyManager = new AdvancedTlsX509KeyManager();
424421
// We swap the order of key and certificates to intentionally create an exception.
425422
assertThrows(GeneralSecurityException.class,
@@ -439,7 +436,7 @@ public void onFileReloadingTrustManagerBadInitialContentTest() throws Exception
439436
}
440437

441438
@Test
442-
public void keyManagerAliasesTest() throws Exception {
439+
public void keyManagerAliasesTest() {
443440
AdvancedTlsX509KeyManager km = new AdvancedTlsX509KeyManager();
444441
assertArrayEquals(
445442
new String[] {"default"}, km.getClientAliases("", null));

‎util/src/main/java/io/grpc/util/AdvancedTlsX509KeyManager.java

+23-23
Original file line numberDiff line numberDiff line change
@@ -18,15 +18,13 @@
1818

1919
import static com.google.common.base.Preconditions.checkNotNull;
2020

21-
import io.grpc.ExperimentalApi;
2221
import java.io.File;
2322
import java.io.FileInputStream;
2423
import java.io.IOException;
2524
import java.net.Socket;
2625
import java.security.GeneralSecurityException;
2726
import java.security.Principal;
2827
import java.security.PrivateKey;
29-
import java.security.cert.CertificateException;
3028
import java.security.cert.X509Certificate;
3129
import java.util.Arrays;
3230
import java.util.concurrent.ScheduledExecutorService;
@@ -39,20 +37,15 @@
3937

4038
/**
4139
* AdvancedTlsX509KeyManager is an {@code X509ExtendedKeyManager} that allows users to configure
42-
* advanced TLS features, such as private key and certificate chain reloading, etc.
40+
* advanced TLS features, such as private key and certificate chain reloading.
4341
*/
44-
@ExperimentalApi("https://github.com/grpc/grpc-java/issues/8024")
4542
public final class AdvancedTlsX509KeyManager extends X509ExtendedKeyManager {
4643
private static final Logger log = Logger.getLogger(AdvancedTlsX509KeyManager.class.getName());
47-
48-
// The credential information sent to peers to prove our identity.
44+
// Minimum allowed period for refreshing files with credential information.
45+
private static final int MINIMUM_REFRESH_PERIOD_IN_MINUTES = 1 ;
46+
// The credential information to be sent to peers to prove our identity.
4947
private volatile KeyInfo keyInfo;
5048

51-
/**
52-
* Constructs an AdvancedTlsX509KeyManager.
53-
*/
54-
public AdvancedTlsX509KeyManager() throws CertificateException { }
55-
5649
@Override
5750
public PrivateKey getPrivateKey(String alias) {
5851
if (alias.equals("default")) {
@@ -107,14 +100,17 @@ public String chooseEngineServerAlias(String keyType, Principal[] issuers,
107100
* @param certs the certificate chain that is going to be used
108101
*/
109102
public void updateIdentityCredentials(PrivateKey key, X509Certificate[] certs) {
110-
// TODO(ZhenLian): explore possibilities to do a crypto check here.
111103
this.keyInfo = new KeyInfo(checkNotNull(key, "key"), checkNotNull(certs, "certs"));
112104
}
113105

114106
/**
115107
* Schedules a {@code ScheduledExecutorService} to read private key and certificate chains from
116108
* the local file paths periodically, and update the cached identity credentials if they are both
117-
* updated.
109+
* updated. You must close the returned Closeable before calling this method again or other update
110+
* methods ({@link AdvancedTlsX509KeyManager#updateIdentityCredentials}, {@link
111+
* AdvancedTlsX509KeyManager#updateIdentityCredentialsFromFile(File, File)}).
112+
* Before scheduling the task, the method synchronously executes {@code readAndUpdate} once. The
113+
* minimum refresh period of 1 minute is enforced.
118114
*
119115
* @param keyFile the file on disk holding the private key
120116
* @param certFile the file on disk holding the certificate chain
@@ -131,14 +127,17 @@ public Closeable updateIdentityCredentialsFromFile(File keyFile, File certFile,
131127
throw new GeneralSecurityException(
132128
"Files were unmodified before their initial update. Probably a bug.");
133129
}
130+
if (checkNotNull(unit, "unit").toMinutes(period) < MINIMUM_REFRESH_PERIOD_IN_MINUTES) {
131+
log.log(Level.FINE,
132+
"Provided refresh period of {0} {1} is too small. Default value of {2} minute(s) "
133+
+ "will be used.", new Object[] {period, unit.name(), MINIMUM_REFRESH_PERIOD_IN_MINUTES});
134+
period = MINIMUM_REFRESH_PERIOD_IN_MINUTES;
135+
unit = TimeUnit.MINUTES;
136+
}
134137
final ScheduledFuture<?> future =
135-
executor.scheduleWithFixedDelay(
138+
checkNotNull(executor, "executor").scheduleWithFixedDelay(
136139
new LoadFilePathExecution(keyFile, certFile), period, period, unit);
137-
return new Closeable() {
138-
@Override public void close() {
139-
future.cancel(false);
140-
}
141-
};
140+
return () -> future.cancel(false);
142141
}
143142

144143
/**
@@ -190,8 +189,9 @@ public void run() {
190189
this.currentCertTime = newResult.certTime;
191190
}
192191
} catch (IOException | GeneralSecurityException e) {
193-
log.log(Level.SEVERE, "Failed refreshing private key and certificate chain from files. "
194-
+ "Using previous ones", e);
192+
log.log(Level.SEVERE, e, () -> String.format("Failed refreshing private key and certificate"
193+
+ " chain from files. Using previous ones (keyFile lastModified = %s, certFile "
194+
+ "lastModified = %s)", keyFile.lastModified(), certFile.lastModified()));
195195
}
196196
}
197197
}
@@ -220,8 +220,8 @@ public UpdateResult(boolean success, long keyTime, long certTime) {
220220
*/
221221
private UpdateResult readAndUpdate(File keyFile, File certFile, long oldKeyTime, long oldCertTime)
222222
throws IOException, GeneralSecurityException {
223-
long newKeyTime = keyFile.lastModified();
224-
long newCertTime = certFile.lastModified();
223+
long newKeyTime = checkNotNull(keyFile, "keyFile").lastModified();
224+
long newCertTime = checkNotNull(certFile, "certFile").lastModified();
225225
// We only update when both the key and the certs are updated.
226226
if (newKeyTime != oldKeyTime && newCertTime != oldCertTime) {
227227
FileInputStream keyInputStream = new FileInputStream(keyFile);
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,165 @@
1+
/*
2+
* Copyright 2024 The gRPC Authors
3+
*
4+
* Licensed under the Apache License, Version 2.0 (the "License");
5+
* you may not use this file except in compliance with the License.
6+
* You may obtain a copy of the License at
7+
*
8+
* http://www.apache.org/licenses/LICENSE-2.0
9+
*
10+
* Unless required by applicable law or agreed to in writing, software
11+
* distributed under the License is distributed on an "AS IS" BASIS,
12+
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13+
* See the License for the specific language governing permissions and
14+
* limitations under the License.
15+
*/
16+
17+
package io.grpc.util;
18+
19+
import static org.junit.Assert.assertArrayEquals;
20+
import static org.junit.Assert.assertEquals;
21+
import static org.junit.Assert.assertThrows;
22+
import static org.junit.Assert.assertTrue;
23+
import static org.junit.Assert.fail;
24+
25+
import io.grpc.internal.FakeClock;
26+
import io.grpc.internal.testing.TestUtils;
27+
import io.grpc.testing.TlsTesting;
28+
import java.io.File;
29+
import java.security.PrivateKey;
30+
import java.security.cert.X509Certificate;
31+
import java.util.ArrayList;
32+
import java.util.List;
33+
import java.util.concurrent.ScheduledExecutorService;
34+
import java.util.concurrent.TimeUnit;
35+
import java.util.logging.Handler;
36+
import java.util.logging.Level;
37+
import java.util.logging.LogRecord;
38+
import java.util.logging.Logger;
39+
import org.junit.Before;
40+
import org.junit.Test;
41+
import org.junit.runner.RunWith;
42+
import org.junit.runners.JUnit4;
43+
44+
/** Unit tests for {@link AdvancedTlsX509KeyManager}. */
45+
@RunWith(JUnit4.class)
46+
public class AdvancedTlsX509KeyManagerTest {
47+
private static final String SERVER_0_KEY_FILE = "server0.key";
48+
private static final String SERVER_0_PEM_FILE = "server0.pem";
49+
private static final String CLIENT_0_KEY_FILE = "client.key";
50+
private static final String CLIENT_0_PEM_FILE = "client.pem";
51+
private static final String ALIAS = "default";
52+
53+
private ScheduledExecutorService executor;
54+
55+
private File serverKey0File;
56+
private File serverCert0File;
57+
private File clientKey0File;
58+
private File clientCert0File;
59+
60+
private PrivateKey serverKey0;
61+
private X509Certificate[] serverCert0;
62+
private PrivateKey clientKey0;
63+
private X509Certificate[] clientCert0;
64+
65+
@Before
66+
public void setUp() throws Exception {
67+
executor = new FakeClock().getScheduledExecutorService();
68+
serverKey0File = TestUtils.loadCert(SERVER_0_KEY_FILE);
69+
serverCert0File = TestUtils.loadCert(SERVER_0_PEM_FILE);
70+
clientKey0File = TestUtils.loadCert(CLIENT_0_KEY_FILE);
71+
clientCert0File = TestUtils.loadCert(CLIENT_0_PEM_FILE);
72+
serverKey0 = CertificateUtils.getPrivateKey(TlsTesting.loadCert(SERVER_0_KEY_FILE));
73+
serverCert0 = CertificateUtils.getX509Certificates(TlsTesting.loadCert(SERVER_0_PEM_FILE));
74+
clientKey0 = CertificateUtils.getPrivateKey(TlsTesting.loadCert(CLIENT_0_KEY_FILE));
75+
clientCert0 = CertificateUtils.getX509Certificates(TlsTesting.loadCert(CLIENT_0_PEM_FILE));
76+
}
77+
78+
@Test
79+
public void credentialSetting() throws Exception {
80+
// Overall happy path checking of public API.
81+
AdvancedTlsX509KeyManager serverKeyManager = new AdvancedTlsX509KeyManager();
82+
serverKeyManager.updateIdentityCredentials(serverKey0, serverCert0);
83+
assertEquals(serverKey0, serverKeyManager.getPrivateKey(ALIAS));
84+
assertArrayEquals(serverCert0, serverKeyManager.getCertificateChain(ALIAS));
85+
86+
serverKeyManager.updateIdentityCredentialsFromFile(clientKey0File, clientCert0File);
87+
assertEquals(clientKey0, serverKeyManager.getPrivateKey(ALIAS));
88+
assertArrayEquals(clientCert0, serverKeyManager.getCertificateChain(ALIAS));
89+
90+
serverKeyManager.updateIdentityCredentialsFromFile(serverKey0File, serverCert0File, 1,
91+
TimeUnit.MINUTES, executor);
92+
assertEquals(serverKey0, serverKeyManager.getPrivateKey(ALIAS));
93+
assertArrayEquals(serverCert0, serverKeyManager.getCertificateChain(ALIAS));
94+
}
95+
96+
@Test
97+
public void credentialSettingParameterValidity() throws Exception {
98+
// Checking edge cases of public API parameter setting.
99+
AdvancedTlsX509KeyManager serverKeyManager = new AdvancedTlsX509KeyManager();
100+
NullPointerException npe = assertThrows(NullPointerException.class, () -> serverKeyManager
101+
.updateIdentityCredentials(null, serverCert0));
102+
assertEquals("key", npe.getMessage());
103+
104+
npe = assertThrows(NullPointerException.class, () -> serverKeyManager
105+
.updateIdentityCredentials(serverKey0, null));
106+
assertEquals("certs", npe.getMessage());
107+
108+
npe = assertThrows(NullPointerException.class, () -> serverKeyManager
109+
.updateIdentityCredentialsFromFile(null, serverCert0File));
110+
assertEquals("keyFile", npe.getMessage());
111+
112+
npe = assertThrows(NullPointerException.class, () -> serverKeyManager
113+
.updateIdentityCredentialsFromFile(serverKey0File, null));
114+
assertEquals("certFile", npe.getMessage());
115+
116+
npe = assertThrows(NullPointerException.class, () -> serverKeyManager
117+
.updateIdentityCredentialsFromFile(serverKey0File, serverCert0File, 1, null,
118+
executor));
119+
assertEquals("unit", npe.getMessage());
120+
121+
npe = assertThrows(NullPointerException.class, () -> serverKeyManager
122+
.updateIdentityCredentialsFromFile(serverKey0File, serverCert0File, 1,
123+
TimeUnit.MINUTES, null));
124+
assertEquals("executor", npe.getMessage());
125+
126+
Logger log = Logger.getLogger(AdvancedTlsX509KeyManager.class.getName());
127+
TestHandler handler = new TestHandler();
128+
log.addHandler(handler);
129+
log.setUseParentHandlers(false);
130+
log.setLevel(Level.FINE);
131+
serverKeyManager.updateIdentityCredentialsFromFile(serverKey0File, serverCert0File, -1,
132+
TimeUnit.SECONDS, executor);
133+
log.removeHandler(handler);
134+
for (LogRecord record : handler.getRecords()) {
135+
if (record.getMessage().contains("Default value of ")) {
136+
assertTrue(true);
137+
return;
138+
}
139+
}
140+
fail("Log message related to setting default values not found");
141+
}
142+
143+
144+
private static class TestHandler extends Handler {
145+
private final List<LogRecord> records = new ArrayList<>();
146+
147+
@Override
148+
public void publish(LogRecord record) {
149+
records.add(record);
150+
}
151+
152+
@Override
153+
public void flush() {
154+
}
155+
156+
@Override
157+
public void close() throws SecurityException {
158+
}
159+
160+
public List<LogRecord> getRecords() {
161+
return records;
162+
}
163+
}
164+
165+
}

0 commit comments

Comments
 (0)
Please sign in to comment.