diff options
author | Jim Hahn <jrh3@att.com> | 2021-03-17 18:55:15 -0400 |
---|---|---|
committer | Jim Hahn <jrh3@att.com> | 2021-03-18 10:33:31 -0400 |
commit | 760d81ae99aa1efce122304047a2e677c0b48074 (patch) | |
tree | 950e74425e86a14ac7c32957570d52c02c9e2f4e /utils-test/src/main | |
parent | efe3b4350af4ea9b39e2afa51e07455c34f21703 (diff) |
Add utility to generate keystore for testing
Added a class that will generate a keystore containing a self-signed
certificate.
Issue-ID: POLICY-3147
Change-Id: I25e7307c2e73dbacae24c8fce616bf2ada93df9f
Signed-off-by: Jim Hahn <jrh3@att.com>
Diffstat (limited to 'utils-test/src/main')
-rw-r--r-- | utils-test/src/main/java/org/onap/policy/common/utils/security/SelfSignedKeyStore.java | 124 | ||||
-rw-r--r-- | utils-test/src/main/resources/keystore_san.txt | 15 |
2 files changed, 139 insertions, 0 deletions
diff --git a/utils-test/src/main/java/org/onap/policy/common/utils/security/SelfSignedKeyStore.java b/utils-test/src/main/java/org/onap/policy/common/utils/security/SelfSignedKeyStore.java new file mode 100644 index 00000000..cc0fed07 --- /dev/null +++ b/utils-test/src/main/java/org/onap/policy/common/utils/security/SelfSignedKeyStore.java @@ -0,0 +1,124 @@ +/*- + * ============LICENSE_START======================================================= + * ONAP + * ================================================================================ + * Copyright (C) 2021 AT&T Intellectual Property. All rights reserved. + * ================================================================================ + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * ============LICENSE_END========================================================= + */ + +package org.onap.policy.common.utils.security; + +import java.io.File; +import java.io.FileNotFoundException; +import java.io.IOException; +import java.lang.ProcessBuilder.Redirect; +import java.nio.file.Files; +import java.util.concurrent.TimeUnit; +import lombok.Getter; +import org.onap.policy.common.utils.resources.ResourceUtils; + +/** + * Keystore, containing a self-signed certificate, valid for one day (see the argument to + * the "-valid" flag below). For use in junit tests. + */ +public class SelfSignedKeyStore { + public static final String KEYSTORE_PASSWORD = "Pol1cy_0nap"; + public static final String PRIVATE_KEY_PASSWORD = KEYSTORE_PASSWORD; + public static final String RELATIVE_PATH = "target/test-classes/policy-keystore"; + + /** + * File containing subject-alternative names (i.e., list of servers that may use this + * keystore). + */ + private static final String KEYSTORE_SAN = "keystore_san.txt"; + + @Getter + private final String keystoreName; + + + /** + * Generates the keystore, if it does not exist or if it's more than a few hours old. + * + * @throws IOException if an I/O error occurs + * @throws InterruptedException if an interrupt occurs + */ + public SelfSignedKeyStore() throws IOException, InterruptedException { + this(RELATIVE_PATH); + } + + /** + * Generates the keystore, if it does not exist or if it's more than a few hours old. + * + * @param relativePath path to the keystore, relative to the "user.dir" system + * property + * @throws IOException if an I/O error occurs + * @throws InterruptedException if an interrupt occurs + */ + public SelfSignedKeyStore(String relativePath) throws IOException, InterruptedException { + keystoreName = System.getProperty("user.dir") + "/" + relativePath; + + // use existing file if it isn't too old + File keystore = new File(keystoreName); + if (keystore.exists()) { + if (System.currentTimeMillis() < keystore.lastModified() + + TimeUnit.MILLISECONDS.convert(5, TimeUnit.HOURS)) { + return; + } + + Files.delete(keystore.toPath()); + } + + /* + * Read the list of subject-alternative names, joining the lines with commas, and + * dropping the trailing comma. + */ + String sanName = getKeystoreSanName(); + String subAltNames = ResourceUtils.getResourceAsString(sanName); + if (subAltNames == null) { + throw new FileNotFoundException(sanName); + } + + subAltNames = subAltNames.replace("\r", "").replace("\n", ","); + subAltNames = "SAN=" + subAltNames.substring(0, subAltNames.length() - 1); + + // build up the "keytool" command + + // @formatter:off + ProcessBuilder builder = new ProcessBuilder("keytool", "-genkeypair", + "-alias", "policy@policy.onap.org", + "-validity", "1", + "-keyalg", "RSA", + "-dname", "C=US, O=ONAP, OU=OSAAF, OU=policy@policy.onap.org:DEV, CN=policy", + "-keystore", keystoreName, + "-keypass", PRIVATE_KEY_PASSWORD, + "-storepass", KEYSTORE_PASSWORD, + "-ext", subAltNames); + // @formatter:on + + Process proc = builder.redirectOutput(Redirect.INHERIT).redirectError(Redirect.INHERIT).start(); + proc.waitFor(); + + int exitCode = proc.exitValue(); + if (exitCode != 0) { + throw new IOException("keytool exited with " + exitCode); + } + } + + // may be overridden by junit tests + + protected String getKeystoreSanName() { + return KEYSTORE_SAN; + } +} diff --git a/utils-test/src/main/resources/keystore_san.txt b/utils-test/src/main/resources/keystore_san.txt new file mode 100644 index 00000000..38428ea0 --- /dev/null +++ b/utils-test/src/main/resources/keystore_san.txt @@ -0,0 +1,15 @@ +DNS:policy +DNS:drools +DNS:drools.onap +DNS:policy-apex-pdp +DNS:policy-apex-pdp.onap +DNS:policy-api +DNS:policy-api.onap +DNS:policy-distribution +DNS:policy-distribution.onap +DNS:policy-pap +DNS:policy-pap.onap +DNS:policy-xacml-pdp +DNS:policy-xacml-pdp.onap +DNS:policy.api.simpledemo.onap.org +DNS:policy-sim |