You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@qpid.apache.org by rg...@apache.org on 2014/08/19 18:13:23 UTC

svn commit: r1618892 - in /qpid/trunk/qpid/java/broker-core/src: main/java/org/apache/qpid/server/security/encryption/ test/java/org/apache/qpid/server/security/encryption/

Author: rgodfrey
Date: Tue Aug 19 16:13:22 2014
New Revision: 1618892

URL: http://svn.apache.org/r1618892
Log:
QPID-6017 : [Java Broker] add tests for AESKeyFileEncrypterFactory

Added:
    qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterFactoryTest.java
    qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterTest.java
      - copied, changed from r1618840, qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESFileEncrypterTest.java
Removed:
    qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESFileEncrypterTest.java
Modified:
    qpid/trunk/qpid/java/broker-core/src/main/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterFactory.java

Modified: qpid/trunk/qpid/java/broker-core/src/main/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterFactory.java
URL: http://svn.apache.org/viewvc/qpid/trunk/qpid/java/broker-core/src/main/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterFactory.java?rev=1618892&r1=1618891&r2=1618892&view=diff
==============================================================================
--- qpid/trunk/qpid/java/broker-core/src/main/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterFactory.java (original)
+++ qpid/trunk/qpid/java/broker-core/src/main/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterFactory.java Tue Aug 19 16:13:22 2014
@@ -46,7 +46,7 @@ import org.apache.qpid.server.plugin.Plu
 @PluggableService
 public class AESKeyFileEncrypterFactory implements ConfigurationSecretEncrypterFactory
 {
-    private static final String ENCRYPTER_KEY_FILE = "encrypter.key.file";
+    static final String ENCRYPTER_KEY_FILE = "encrypter.key.file";
 
     private static final int AES_KEY_SIZE_BITS = 256;
     private static final int AES_KEY_SIZE_BYTES = AES_KEY_SIZE_BITS / 8;
@@ -54,6 +54,8 @@ public class AESKeyFileEncrypterFactory 
 
     public static final String TYPE = "AESKeyFile";
 
+    static final String DEFAULT_KEYS_SUBDIR_NAME = ".keys";
+
     @Override
     public ConfigurationSecretEncrypter createEncrypter(final ConfiguredObject<?> object)
     {
@@ -66,7 +68,7 @@ public class AESKeyFileEncrypterFactory 
         {
 
             fileLocation = object.getContextValue(String.class, BrokerOptions.QPID_WORK_DIR)
-                           + File.separator + ".keys" + File.separator
+                           + File.separator + DEFAULT_KEYS_SUBDIR_NAME + File.separator
                            + object.getCategoryClass().getSimpleName() + "_"
                            + object.getName() + ".key";
 
@@ -94,14 +96,14 @@ public class AESKeyFileEncrypterFactory 
                 || permissions.contains(PosixFilePermission.GROUP_WRITE)
                 || permissions.contains(PosixFilePermission.OTHERS_WRITE))
             {
-                throw new IllegalStateException("Key file '"
+                throw new IllegalArgumentException("Key file '"
                                                 + fileLocation
                                                 + "' has incorrect permissions.  Only the owner "
                                                 + "should be able to read or write this file.");
             }
             if(Files.size(file.toPath()) != AES_KEY_SIZE_BYTES)
             {
-                throw new IllegalConfigurationException("Key file '" + fileLocation + "' contains an incorrect about of data");
+                throw new IllegalArgumentException("Key file '" + fileLocation + "' contains an incorrect about of data");
             }
 
             try(FileInputStream inputStream = new FileInputStream(file))
@@ -151,7 +153,7 @@ public class AESKeyFileEncrypterFactory 
         }
         catch (NoSuchAlgorithmException | IOException e)
         {
-            throw new IllegalConfigurationException("Cannot create key file: " + e.getMessage(), e);
+            throw new IllegalArgumentException("Cannot create key file: " + e.getMessage(), e);
         }
 
     }

Added: qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterFactoryTest.java
URL: http://svn.apache.org/viewvc/qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterFactoryTest.java?rev=1618892&view=auto
==============================================================================
--- qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterFactoryTest.java (added)
+++ qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterFactoryTest.java Tue Aug 19 16:13:22 2014
@@ -0,0 +1,313 @@
+/*
+ *
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ *
+ */
+package org.apache.qpid.server.security.encryption;
+
+import static org.mockito.Matchers.anyMap;
+import static org.mockito.Matchers.eq;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.when;
+
+import java.io.File;
+import java.io.FileOutputStream;
+import java.io.IOException;
+import java.nio.charset.StandardCharsets;
+import java.nio.file.FileVisitResult;
+import java.nio.file.Files;
+import java.nio.file.Path;
+import java.nio.file.Paths;
+import java.nio.file.SimpleFileVisitor;
+import java.nio.file.attribute.BasicFileAttributes;
+import java.nio.file.attribute.PosixFilePermission;
+import java.util.Collections;
+import java.util.EnumSet;
+import java.util.Map;
+import java.util.UUID;
+
+import org.mockito.ArgumentCaptor;
+import org.mockito.invocation.InvocationOnMock;
+import org.mockito.stubbing.Answer;
+
+import org.apache.qpid.server.BrokerOptions;
+import org.apache.qpid.server.model.Broker;
+import org.apache.qpid.test.utils.QpidTestCase;
+
+public class AESKeyFileEncrypterFactoryTest extends QpidTestCase
+{
+    private Broker _broker;
+    private Path _tmpDir;
+    private AESKeyFileEncrypterFactory _factory;
+
+    @Override
+    public void setUp() throws Exception
+    {
+        super.setUp();
+        _broker = mock(Broker.class);
+        _tmpDir = Files.createTempDirectory(getTestName());
+
+        when(_broker.getContextKeys(eq(false))).thenReturn(Collections.<String>emptySet());
+        when(_broker.getContextValue(eq(String.class), eq(BrokerOptions.QPID_WORK_DIR))).thenReturn(_tmpDir.toString());
+        when(_broker.getCategoryClass()).thenReturn(Broker.class);
+        when(_broker.getName()).thenReturn(getName());
+        final ArgumentCaptor<Map> contextCaptor = ArgumentCaptor.forClass(Map.class);
+
+        when(_broker.setAttribute(eq("context"), anyMap(), contextCaptor.capture() )).thenAnswer(new Answer<Void>() {
+
+            @Override
+            public Void answer(final InvocationOnMock invocationOnMock) throws Throwable
+            {
+                Map replacementContext = contextCaptor.getValue();
+                when(_broker.getContext()).thenReturn(replacementContext);
+                return null;
+            }
+        });
+
+        _factory = new AESKeyFileEncrypterFactory();
+    }
+
+    public void testCreateKeyInDefaultLocation() throws Exception
+    {
+        ConfigurationSecretEncrypter encrypter = _factory.createEncrypter(_broker);
+
+        KeyFilePathChecker keyFilePathChecker = new KeyFilePathChecker();
+
+        doChecks(encrypter, keyFilePathChecker);
+
+        String pathName = (String) _broker.getContext().get(AESKeyFileEncrypterFactory.ENCRYPTER_KEY_FILE);
+
+        // check the context variable was set
+        assertEquals(keyFilePathChecker.getKeyFile().toString(), pathName);
+    }
+
+    private void doChecks(final ConfigurationSecretEncrypter encrypter,
+                          final KeyFilePathChecker keyFilePathChecker) throws IOException
+    {
+        // walk the directory to find the file
+        Files.walkFileTree(_tmpDir, keyFilePathChecker);
+
+        // check the file was actually found
+        assertNotNull(keyFilePathChecker.getKeyFile());
+
+        String secret = "notasecret";
+
+        // check the encrypter works
+        assertEquals(secret, encrypter.decrypt(encrypter.encrypt(secret)));
+
+    }
+
+    public void testSettingContextKeyLeadsToFileCreation() throws Exception
+    {
+        String filename = UUID.randomUUID().toString() + ".key";
+        String subdirName = getTestName() + File.separator + "test";
+        String fileLocation = _tmpDir.toString() + File.separator + subdirName + File.separator + filename;
+
+        when(_broker.getContextKeys(eq(false))).thenReturn(Collections.singleton(AESKeyFileEncrypterFactory.ENCRYPTER_KEY_FILE));
+        when(_broker.getContextValue(eq(String.class), eq(AESKeyFileEncrypterFactory.ENCRYPTER_KEY_FILE))).thenReturn(fileLocation);
+
+        ConfigurationSecretEncrypter encrypter = _factory.createEncrypter(_broker);
+
+        KeyFilePathChecker keyFilePathChecker = new KeyFilePathChecker(subdirName, filename);
+
+        doChecks(encrypter, keyFilePathChecker);
+
+    }
+
+
+    public void testUnableToCreateFileInSpecifiedLocation() throws Exception
+    {
+        String filename = UUID.randomUUID().toString() + ".key";
+        String subdirName = getTestName() + File.separator + "test";
+        String fileLocation = _tmpDir.toString() + File.separator + subdirName + File.separator + filename;
+
+        when(_broker.getContextKeys(eq(false))).thenReturn(Collections.singleton(AESKeyFileEncrypterFactory.ENCRYPTER_KEY_FILE));
+        when(_broker.getContextValue(eq(String.class), eq(AESKeyFileEncrypterFactory.ENCRYPTER_KEY_FILE))).thenReturn(fileLocation);
+
+        Files.createDirectories(Paths.get(fileLocation));
+
+        try
+        {
+            ConfigurationSecretEncrypter encrypter = _factory.createEncrypter(_broker);
+            fail("should not be able to create a key file where a directory currently is");
+        }
+        catch(IllegalArgumentException e)
+        {
+            // pass
+        }
+    }
+
+
+    public void testPermissionsAreChecked() throws Exception
+    {
+        String filename = UUID.randomUUID().toString() + ".key";
+        String subdirName = getTestName() + File.separator + "test";
+        String fileLocation = _tmpDir.toString() + File.separator + subdirName + File.separator + filename;
+
+        when(_broker.getContextKeys(eq(false))).thenReturn(Collections.singleton(AESKeyFileEncrypterFactory.ENCRYPTER_KEY_FILE));
+        when(_broker.getContextValue(eq(String.class), eq(AESKeyFileEncrypterFactory.ENCRYPTER_KEY_FILE))).thenReturn(fileLocation);
+
+        Files.createDirectories(Paths.get(_tmpDir.toString(), subdirName));
+
+        File file = new File(fileLocation);
+        file.createNewFile();
+        Files.setPosixFilePermissions(file.toPath(), EnumSet.of(PosixFilePermission.OWNER_READ,PosixFilePermission.GROUP_READ));
+
+        try
+        {
+            ConfigurationSecretEncrypter encrypter = _factory.createEncrypter(_broker);
+            fail("should not be able to create a key file where the file is readable");
+        }
+        catch(IllegalArgumentException e)
+        {
+            // pass
+        }
+    }
+
+    public void testInvalidKey() throws Exception
+    {
+        String filename = UUID.randomUUID().toString() + ".key";
+        String subdirName = getTestName() + File.separator + "test";
+        String fileLocation = _tmpDir.toString() + File.separator + subdirName + File.separator + filename;
+
+        when(_broker.getContextKeys(eq(false))).thenReturn(Collections.singleton(AESKeyFileEncrypterFactory.ENCRYPTER_KEY_FILE));
+        when(_broker.getContextValue(eq(String.class), eq(AESKeyFileEncrypterFactory.ENCRYPTER_KEY_FILE))).thenReturn(fileLocation);
+
+        Files.createDirectories(Paths.get(_tmpDir.toString(), subdirName));
+
+        File file = new File(fileLocation);
+        try(FileOutputStream fos = new FileOutputStream(file))
+        {
+            fos.write("This is not an AES key.  It is a string saying it is not an AES key".getBytes(StandardCharsets.US_ASCII));
+        }
+        Files.setPosixFilePermissions(file.toPath(), EnumSet.of(PosixFilePermission.OWNER_READ));
+
+        try
+        {
+            ConfigurationSecretEncrypter encrypter = _factory.createEncrypter(_broker);
+            fail("should not be able to start where the key is not a valid key");
+        }
+        catch(IllegalArgumentException e)
+        {
+            // pass
+        }
+    }
+
+    @Override
+    public void tearDown() throws Exception
+    {
+        Files.walkFileTree(_tmpDir,
+                           new SimpleFileVisitor<Path>()
+                           {
+                               @Override
+                               public FileVisitResult visitFile(final Path file, final BasicFileAttributes attrs)
+                                       throws IOException
+                               {
+                                   Files.delete(file);
+                                   return FileVisitResult.CONTINUE;
+                               }
+
+                               @Override
+                               public FileVisitResult postVisitDirectory(final Path dir, final IOException exc)
+                                       throws IOException
+                               {
+                                   Files.delete(dir);
+                                   return FileVisitResult.CONTINUE;
+                               }
+                           });
+        super.tearDown();
+    }
+
+    private class KeyFilePathChecker extends SimpleFileVisitor<Path>
+    {
+
+        private final String _fileName;
+        private final String _subdirName;
+        private Path _keyFile;
+        private boolean _inKeysSubdir;
+
+        public KeyFilePathChecker()
+        {
+            this(AESKeyFileEncrypterFactory.DEFAULT_KEYS_SUBDIR_NAME, "Broker_" + AESKeyFileEncrypterFactoryTest.this.getName() + ".key");
+        }
+
+        public KeyFilePathChecker(final String subdirName, final String fileName)
+        {
+            _subdirName = subdirName;
+            _fileName = fileName;
+        }
+
+        @Override
+        public FileVisitResult preVisitDirectory(final Path dir, final BasicFileAttributes attrs) throws IOException
+        {
+            if(!_inKeysSubdir && dir.endsWith(_subdirName))
+            {
+                _inKeysSubdir = true;
+                assertFalse(Files.getPosixFilePermissions(dir).contains(PosixFilePermission.OTHERS_READ));
+                assertFalse(Files.getPosixFilePermissions(dir).contains(PosixFilePermission.OTHERS_WRITE));
+                assertFalse(Files.getPosixFilePermissions(dir).contains(PosixFilePermission.OTHERS_EXECUTE));
+
+                assertFalse(Files.getPosixFilePermissions(dir).contains(PosixFilePermission.GROUP_READ));
+                assertFalse(Files.getPosixFilePermissions(dir).contains(PosixFilePermission.GROUP_WRITE));
+                assertFalse(Files.getPosixFilePermissions(dir).contains(PosixFilePermission.GROUP_EXECUTE));
+                return FileVisitResult.CONTINUE;
+            }
+            else
+            {
+                return _inKeysSubdir ? FileVisitResult.SKIP_SUBTREE : FileVisitResult.CONTINUE;
+            }
+
+        }
+
+        @Override
+        public FileVisitResult visitFile(final Path file, final BasicFileAttributes attrs) throws IOException
+        {
+            if(_inKeysSubdir)
+            {
+                if(file.endsWith(_fileName))
+                {
+                    _keyFile = file;
+
+                    assertFalse(Files.getPosixFilePermissions(file).contains(PosixFilePermission.OTHERS_READ));
+                    assertFalse(Files.getPosixFilePermissions(file).contains(PosixFilePermission.OTHERS_WRITE));
+                    assertFalse(Files.getPosixFilePermissions(file).contains(PosixFilePermission.OTHERS_EXECUTE));
+
+                    assertFalse(Files.getPosixFilePermissions(file).contains(PosixFilePermission.GROUP_READ));
+                    assertFalse(Files.getPosixFilePermissions(file).contains(PosixFilePermission.GROUP_WRITE));
+                    assertFalse(Files.getPosixFilePermissions(file).contains(PosixFilePermission.GROUP_EXECUTE));
+
+                    return FileVisitResult.TERMINATE;
+                }
+            }
+            return FileVisitResult.CONTINUE;
+        }
+
+        @Override
+        public FileVisitResult postVisitDirectory(final Path dir, final IOException exc) throws IOException
+        {
+            _inKeysSubdir = false;
+            return FileVisitResult.CONTINUE;
+        }
+
+        public Path getKeyFile()
+        {
+            return _keyFile;
+        }
+
+    }
+}

Copied: qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterTest.java (from r1618840, qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESFileEncrypterTest.java)
URL: http://svn.apache.org/viewvc/qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterTest.java?p2=qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterTest.java&p1=qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESFileEncrypterTest.java&r1=1618840&r2=1618892&rev=1618892&view=diff
==============================================================================
--- qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESFileEncrypterTest.java (original)
+++ qpid/trunk/qpid/java/broker-core/src/test/java/org/apache/qpid/server/security/encryption/AESKeyFileEncrypterTest.java Tue Aug 19 16:13:22 2014
@@ -32,7 +32,7 @@ import javax.crypto.spec.SecretKeySpec;
 
 import org.apache.qpid.test.utils.QpidTestCase;
 
-public class AESFileEncrypterTest extends QpidTestCase
+public class AESKeyFileEncrypterTest extends QpidTestCase
 {
     private final SecureRandom _random = new SecureRandom();
     public static final String PLAINTEXT = "notaverygoodpassword";



---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@qpid.apache.org
For additional commands, e-mail: commits-help@qpid.apache.org