This is an automated email from the ASF dual-hosted git repository.

clebertsuconic pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/activemq-artemis.git


The following commit(s) were added to refs/heads/main by this push:
     new 6ee27224a5 ARTEMIS-4352 Avod Deadlock in case the SecurityManager is 
reusing the Netty executor.
6ee27224a5 is described below

commit 6ee27224a57d3c5ad7b293497d3bfc892a72a8b0
Author: Clebert Suconic <clebertsuco...@apache.org>
AuthorDate: Fri Jul 7 12:27:06 2023 -0400

    ARTEMIS-4352 Avod Deadlock in case the SecurityManager is reusing the Netty 
executor.
    
    If the Security Manager is using Netty, and in particular the same Netty 
connection,
    you could run into a deadlock / starvation.
    
    This is particularly true in the Wildfly case where they reuse the same 
connection for everything via XNIO.
---
 .../protocol/core/impl/ActiveMQPacketHandler.java  |   9 ++
 .../security/RecursiveNettySecurityTest.java       | 116 +++++++++++++++++++++
 2 files changed, 125 insertions(+)

diff --git 
a/artemis-server/src/main/java/org/apache/activemq/artemis/core/protocol/core/impl/ActiveMQPacketHandler.java
 
b/artemis-server/src/main/java/org/apache/activemq/artemis/core/protocol/core/impl/ActiveMQPacketHandler.java
index 28c53c4602..b3077f8cd7 100644
--- 
a/artemis-server/src/main/java/org/apache/activemq/artemis/core/protocol/core/impl/ActiveMQPacketHandler.java
+++ 
b/artemis-server/src/main/java/org/apache/activemq/artemis/core/protocol/core/impl/ActiveMQPacketHandler.java
@@ -48,6 +48,7 @@ import 
org.apache.activemq.artemis.core.server.ActiveMQServerLogger;
 import org.apache.activemq.artemis.core.server.ServerSession;
 import org.apache.activemq.artemis.core.version.Version;
 import org.apache.activemq.artemis.logs.AuditLogger;
+import org.apache.activemq.artemis.utils.actors.Actor;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 import java.lang.invoke.MethodHandles;
@@ -67,6 +68,8 @@ public class ActiveMQPacketHandler implements ChannelHandler {
 
    private final CoreProtocolManager protocolManager;
 
+   private final Actor<Packet> packetActor;
+
    public ActiveMQPacketHandler(final CoreProtocolManager protocolManager,
                                 final ActiveMQServer server,
                                 final Channel channel1,
@@ -78,10 +81,16 @@ public class ActiveMQPacketHandler implements 
ChannelHandler {
       this.channel1 = channel1;
 
       this.connection = connection;
+
+      packetActor = new Actor<>(server.getExecutorFactory().getExecutor(), 
this::internalHandler);
    }
 
    @Override
    public void handlePacket(final Packet packet) {
+      packetActor.act(packet);
+   }
+
+   private void internalHandler(final Packet packet) {
       byte type = packet.getType();
 
       if (AuditLogger.isAnyLoggingEnabled()) {
diff --git 
a/tests/integration-tests/src/test/java/org/apache/activemq/artemis/tests/integration/security/RecursiveNettySecurityTest.java
 
b/tests/integration-tests/src/test/java/org/apache/activemq/artemis/tests/integration/security/RecursiveNettySecurityTest.java
new file mode 100644
index 0000000000..aa925e177f
--- /dev/null
+++ 
b/tests/integration-tests/src/test/java/org/apache/activemq/artemis/tests/integration/security/RecursiveNettySecurityTest.java
@@ -0,0 +1,116 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.activemq.artemis.tests.integration.security;
+
+import javax.jms.Connection;
+import javax.jms.ConnectionFactory;
+import javax.jms.JMSException;
+import javax.security.auth.Subject;
+import java.lang.invoke.MethodHandles;
+import java.lang.management.ManagementFactory;
+import java.util.Set;
+import java.util.concurrent.CountDownLatch;
+import java.util.concurrent.TimeUnit;
+
+import org.apache.activemq.artemis.core.remoting.impl.netty.NettyConnection;
+import org.apache.activemq.artemis.core.security.CheckType;
+import org.apache.activemq.artemis.core.security.Role;
+import org.apache.activemq.artemis.core.server.ActiveMQServer;
+import org.apache.activemq.artemis.core.server.ActiveMQServers;
+import org.apache.activemq.artemis.spi.core.protocol.RemotingConnection;
+import org.apache.activemq.artemis.spi.core.security.ActiveMQSecurityManager5;
+import 
org.apache.activemq.artemis.spi.core.security.jaas.NoCacheLoginException;
+import org.apache.activemq.artemis.tests.util.ActiveMQTestBase;
+import org.apache.activemq.artemis.tests.util.CFUtil;
+import org.junit.Assert;
+import org.junit.Before;
+import org.junit.Test;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+public class RecursiveNettySecurityTest extends ActiveMQTestBase {
+
+   private static final Logger logger = 
LoggerFactory.getLogger(MethodHandles.lookup().lookupClass());
+
+   /*
+    * create session tests
+    */
+   private static final String addressA = "addressA";
+
+   private static final String queueA = "queueA";
+
+   @Override
+   @Before
+   public void setUp() throws Exception {
+      super.setUp();
+   }
+
+   @Test
+   public void testRecursiveSecurity() throws Exception {
+      RecursiveNettySecurityManager securityManager = new 
RecursiveNettySecurityManager();
+      ActiveMQServer server = 
addServer(ActiveMQServers.newActiveMQServer(createDefaultNettyConfig().setSecurityEnabled(true),
 ManagementFactory.getPlatformMBeanServer(), securityManager, false));
+      server.start();
+
+      ConnectionFactory connectionFactory = 
CFUtil.createConnectionFactory("CORE", "tcp://localhost:61616");
+
+      try {
+         Connection connection = connectionFactory.createConnection("first", 
"secret");
+         connection.close();
+      } catch (JMSException e) {
+         e.printStackTrace();
+         Assert.fail("should not throw exception");
+      }
+   }
+
+   class RecursiveNettySecurityManager implements ActiveMQSecurityManager5 {
+
+      @Override
+      public boolean validateUser(String user, String password) {
+         return false;
+      }
+
+      @Override
+      public boolean validateUserAndRole(String user, String password, 
Set<Role> roles, CheckType checkType) {
+         return false;
+      }
+
+      @Override
+      public Subject authenticate(String user,
+                                  String password,
+                                  RemotingConnection remotingConnection,
+                                  String securityDomain) throws 
NoCacheLoginException {
+         NettyConnection nettyConnection = (NettyConnection) 
remotingConnection.getTransportConnection();
+         CountDownLatch latch = new CountDownLatch(1);
+         nettyConnection.getChannel().eventLoop().execute(latch::countDown);
+         try {
+            if (!latch.await(10, TimeUnit.SECONDS)) {
+               logger.warn("Cannot complete oepration in time", new 
Exception("timeout"));
+               throw new NoCacheLoginException("Can't complete operation in 
time");
+            }
+         } catch (InterruptedException e) {
+            logger.warn(e.getMessage(), e);
+            throw new NoCacheLoginException(e.getMessage());
+         }
+         return new Subject();
+      }
+
+      @Override
+      public boolean authorize(Subject subject, Set<Role> roles, CheckType 
checkType, String address) {
+         return true;
+      }
+   }
+}
\ No newline at end of file

Reply via email to