Github user sohami commented on a diff in the pull request: https://github.com/apache/drill/pull/950#discussion_r140593112 --- Diff: exec/java-exec/src/test/java/org/apache/drill/exec/rpc/user/security/TestUserBitSSLServer.java --- @@ -0,0 +1,126 @@ +/* + * Licensed to the Apache Software Foundation (ASF) under one + * or more contributor license agreements. See the NOTICE file + * distributed with this work for additional information + * regarding copyright ownership. The ASF licenses this file + * to you under the Apache License, Version 2.0 (the + * "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +package org.apache.drill.exec.rpc.user.security; + +import com.typesafe.config.ConfigValueFactory; +import junit.framework.TestCase; +import org.apache.drill.BaseTestQuery; +import org.apache.drill.common.config.DrillConfig; +import org.apache.drill.common.config.DrillProperties; +import org.apache.drill.exec.ExecConstants; +import org.apache.hadoop.conf.Configuration; +import org.apache.hadoop.security.ssl.SSLFactory; +import org.junit.AfterClass; +import org.junit.BeforeClass; +import org.junit.Test; + +import java.io.File; +import java.text.MessageFormat; +import java.util.Properties; + +import static org.apache.drill.exec.ssl.SSLConfig.HADOOP_SSL_CONF_TPL_KEY; +import static org.junit.Assert.assertEquals; + +public class TestUserBitSSLServer extends BaseTestQuery { + private static final org.slf4j.Logger logger = + org.slf4j.LoggerFactory.getLogger(TestUserBitSSLServer.class); + + private static DrillConfig sslConfig; + private static Properties initProps; // initial client properties + private static ClassLoader classLoader; + private static String ksPath; + private static String tsPath; + private static String emptyTSPath; + + @BeforeClass + public static void setupTest() throws Exception { + + classLoader = TestUserBitSSLServer.class.getClassLoader(); + ksPath = new File(classLoader.getResource("ssl/keystore.ks").getFile()).getAbsolutePath(); + tsPath = new File(classLoader.getResource("ssl/truststore.ks").getFile()).getAbsolutePath(); + emptyTSPath = new File(classLoader.getResource("ssl/emptytruststore.ks").getFile()).getAbsolutePath(); + sslConfig = new DrillConfig(DrillConfig.create(cloneDefaultTestConfigProperties()) + .withValue(ExecConstants.USER_SSL_ENABLED, ConfigValueFactory.fromAnyRef(true)) + .withValue(ExecConstants.SSL_KEYSTORE_TYPE, ConfigValueFactory.fromAnyRef("JKS")) + .withValue(ExecConstants.SSL_KEYSTORE_PATH, ConfigValueFactory.fromAnyRef(ksPath)) + .withValue(ExecConstants.SSL_KEYSTORE_PASSWORD, ConfigValueFactory.fromAnyRef("drill123")) + .withValue(ExecConstants.SSL_KEY_PASSWORD, ConfigValueFactory.fromAnyRef("drill123")) + .withValue(ExecConstants.SSL_PROTOCOL, ConfigValueFactory.fromAnyRef("TLSv1.2")), false); + initProps = new Properties(); + initProps.setProperty(DrillProperties.ENABLE_TLS, "true"); + initProps.setProperty(DrillProperties.TRUSTSTORE_PATH, tsPath); + initProps.setProperty(DrillProperties.TRUSTSTORE_PASSWORD, "drill123"); + initProps.setProperty(DrillProperties.DISABLE_HOST_VERIFICATION, "true"); + } + + @AfterClass + public static void cleanTest() throws Exception { + DrillConfig restoreConfig = + new DrillConfig(DrillConfig.create(cloneDefaultTestConfigProperties()), false); + updateTestCluster(1, restoreConfig); + } + + @Test + public void testInvalidKeystorePath() throws Exception { + DrillConfig testConfig = new DrillConfig(DrillConfig.create(sslConfig) + .withValue(ExecConstants.SSL_KEYSTORE_PATH, ConfigValueFactory.fromAnyRef("/bad/path")), + false); + + // Start an SSL enabled cluster + boolean failureCaught = false; + try { + updateTestCluster(1, testConfig, initProps); + } catch (Exception e) { + failureCaught = true; + } + assertEquals(failureCaught, true); + } + + @Test + public void testInvalidKeystorePassword() throws Exception { + DrillConfig testConfig = new DrillConfig(DrillConfig.create(sslConfig) + .withValue(ExecConstants.SSL_KEYSTORE_PASSWORD, ConfigValueFactory.fromAnyRef("badpassword")), + false); + + // Start an SSL enabled cluster + boolean failureCaught = false; + try { + updateTestCluster(1, testConfig, initProps); + } catch (Exception e) { + failureCaught = true; + } + assertEquals(failureCaught, true); + } + + @Test + public void testInvalidKeyPassword() throws Exception { + DrillConfig testConfig = new DrillConfig(DrillConfig.create(sslConfig) + .withValue(ExecConstants.SSL_KEY_PASSWORD, ConfigValueFactory.fromAnyRef("badpassword")), + false); + + // Start an SSL enabled cluster + boolean failureCaught = false; + try { + updateTestCluster(1, testConfig, initProps); + } catch (Exception e) { + failureCaught = true; + } + assertEquals(failureCaught, true); + } + --- End diff -- How about adding a test for default keyPasword being same as keyStorePassword ? Your configs are already generated with that :)
---