ticket47536_test.py 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421
  1. # --- BEGIN COPYRIGHT BLOCK ---
  2. # Copyright (C) 2016 Red Hat, Inc.
  3. # All rights reserved.
  4. #
  5. # License: GPL (version 3 or any later version).
  6. # See LICENSE for details.
  7. # --- END COPYRIGHT BLOCK ---
  8. #
  9. import base64
  10. import pytest
  11. from lib389.tasks import *
  12. from lib389.utils import *
  13. from lib389.topologies import topology_m2
  14. pytestmark = pytest.mark.skipif(ds_is_older('1.3.5'), reason="Not implemented")
  15. logging.getLogger(__name__).setLevel(logging.DEBUG)
  16. log = logging.getLogger(__name__)
  17. CONFIG_DN = 'cn=config'
  18. ENCRYPTION_DN = 'cn=encryption,%s' % CONFIG_DN
  19. RSA = 'RSA'
  20. RSA_DN = 'cn=%s,%s' % (RSA, ENCRYPTION_DN)
  21. ISSUER = 'cn=CAcert'
  22. CACERT = 'CAcertificate'
  23. M1SERVERCERT = 'Server-Cert1'
  24. M2SERVERCERT = 'Server-Cert2'
  25. M1LDAPSPORT = '41636'
  26. M2LDAPSPORT = '42636'
  27. M1SUBJECT = 'CN={},OU=389 Directory Server'.format(HOST_MASTER_1)
  28. M2SUBJECT = 'CN={},OU=390 Directory Server'.format(HOST_MASTER_2)
  29. def add_entry(server, name, rdntmpl, start, num):
  30. log.info("\n######################### Adding %d entries to %s ######################\n" % (num, name))
  31. for i in range(num):
  32. ii = start + i
  33. dn = '%s%d,%s' % (rdntmpl, ii, DEFAULT_SUFFIX)
  34. server.add_s(Entry((dn, {'objectclass': 'top person extensibleObject'.split(),
  35. 'uid': '%s%d' % (rdntmpl, ii),
  36. 'cn': '%s user%d' % (name, ii),
  37. 'sn': 'user%d' % (ii)})))
  38. def enable_ssl(server, ldapsport, mycert):
  39. log.info("\n######################### Enabling SSL LDAPSPORT %s ######################\n" % ldapsport)
  40. server.simple_bind_s(DN_DM, PASSWORD)
  41. server.modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'nsSSL3', 'off'),
  42. (ldap.MOD_REPLACE, 'nsTLS1', 'on'),
  43. (ldap.MOD_REPLACE, 'nsSSLClientAuth', 'allowed'),
  44. (ldap.MOD_REPLACE, 'nsSSL3Ciphers', '+all')])
  45. server.modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-security', 'on'),
  46. (ldap.MOD_REPLACE, 'nsslapd-ssl-check-hostname', 'off'),
  47. (ldap.MOD_REPLACE, 'nsslapd-secureport', ldapsport)])
  48. server.add_s(Entry((RSA_DN, {'objectclass': "top nsEncryptionModule".split(),
  49. 'cn': RSA,
  50. 'nsSSLPersonalitySSL': mycert,
  51. 'nsSSLToken': 'internal (software)',
  52. 'nsSSLActivation': 'on'})))
  53. def check_pems(confdir, mycacert, myservercert, myserverkey, notexist):
  54. log.info("\n######################### Check PEM files (%s, %s, %s)%s in %s ######################\n"
  55. % (mycacert, myservercert, myserverkey, notexist, confdir))
  56. global cacert
  57. cacert = '%s/%s.pem' % (confdir, mycacert)
  58. if os.path.isfile(cacert):
  59. if notexist == "":
  60. log.info('%s is successfully generated.' % cacert)
  61. else:
  62. log.info('%s is incorrecly generated.' % cacert)
  63. assert False
  64. else:
  65. if notexist == "":
  66. log.fatal('%s is not generated.' % cacert)
  67. assert False
  68. else:
  69. log.info('%s is correctly not generated.' % cacert)
  70. servercert = '%s/%s.pem' % (confdir, myservercert)
  71. if os.path.isfile(servercert):
  72. if notexist == "":
  73. log.info('%s is successfully generated.' % servercert)
  74. else:
  75. log.info('%s is incorrecly generated.' % servercert)
  76. assert False
  77. else:
  78. if notexist == "":
  79. log.fatal('%s was not generated.' % servercert)
  80. assert False
  81. else:
  82. log.info('%s is correctly not generated.' % servercert)
  83. serverkey = '%s/%s.pem' % (confdir, myserverkey)
  84. if os.path.isfile(serverkey):
  85. if notexist == "":
  86. log.info('%s is successfully generated.' % serverkey)
  87. else:
  88. log.info('%s is incorrectly generated.' % serverkey)
  89. assert False
  90. else:
  91. if notexist == "":
  92. log.fatal('%s was not generated.' % serverkey)
  93. assert False
  94. else:
  95. log.info('%s is correctly not generated.' % serverkey)
  96. def doAndPrintIt(cmdline):
  97. proc = subprocess.Popen(cmdline, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
  98. log.info(" OUT:")
  99. while True:
  100. l = proc.stdout.readline()
  101. if l == "":
  102. break
  103. log.info(" %s" % l)
  104. log.info(" ERR:")
  105. while True:
  106. l = proc.stderr.readline()
  107. if l == "" or l == "\n":
  108. break
  109. log.info(" <%s>" % l)
  110. assert False
  111. def create_keys_certs(topology_m2):
  112. log.info("\n######################### Creating SSL Keys and Certs ######################\n")
  113. global m1confdir
  114. m1confdir = topology_m2.ms["master1"].confdir
  115. global m2confdir
  116. m2confdir = topology_m2.ms["master2"].confdir
  117. log.info("##### shutdown master1")
  118. topology_m2.ms["master1"].stop(timeout=10)
  119. log.info("##### Creating a password file")
  120. pwdfile = '%s/pwdfile.txt' % (m1confdir)
  121. os.system('rm -f %s' % pwdfile)
  122. opasswd = os.popen("(ps -ef ; w ) | sha1sum | awk '{print $1}'", "r")
  123. passwd = opasswd.readline()
  124. pwdfd = open(pwdfile, "w")
  125. pwdfd.write(passwd)
  126. pwdfd.close()
  127. log.info("##### create the pin file")
  128. m1pinfile = '%s/pin.txt' % (m1confdir)
  129. m2pinfile = '%s/pin.txt' % (m2confdir)
  130. os.system('rm -f %s' % m1pinfile)
  131. os.system('rm -f %s' % m2pinfile)
  132. pintxt = 'Internal (Software) Token:%s' % passwd
  133. pinfd = open(m1pinfile, "w")
  134. pinfd.write(pintxt)
  135. pinfd.close()
  136. os.system('chmod 400 %s' % m1pinfile)
  137. log.info("##### Creating a noise file")
  138. noisefile = '%s/noise.txt' % (m1confdir)
  139. noise = os.popen("(w ; ps -ef ; date ) | sha1sum | awk '{print $1}'", "r")
  140. noisewdfd = open(noisefile, "w")
  141. noisewdfd.write(noise.readline())
  142. noisewdfd.close()
  143. time.sleep(1)
  144. cmdline = ['certutil', '-N', '-d', m1confdir, '-f', pwdfile]
  145. log.info("##### Create key3.db and cert8.db database (master1): %s" % cmdline)
  146. doAndPrintIt(cmdline)
  147. cmdline = ['certutil', '-G', '-d', m1confdir, '-z', noisefile, '-f', pwdfile]
  148. log.info("##### Creating encryption key for CA (master1): %s" % cmdline)
  149. # os.system('certutil -G -d %s -z %s -f %s' % (m1confdir, noisefile, pwdfile))
  150. doAndPrintIt(cmdline)
  151. time.sleep(2)
  152. log.info("##### Creating self-signed CA certificate (master1) -- nickname %s" % CACERT)
  153. os.system(
  154. '( echo y ; echo ; echo y ) | certutil -S -n "%s" -s "%s" -x -t "CT,," -m 1000 -v 120 -d %s -z %s -f %s -2' % (
  155. CACERT, ISSUER, m1confdir, noisefile, pwdfile))
  156. global M1SUBJECT
  157. cmdline = ['certutil', '-S', '-n', M1SERVERCERT, '-s', M1SUBJECT, '-c', CACERT, '-t', ',,', '-m', '1001', '-v',
  158. '120', '-d', m1confdir, '-z', noisefile, '-f', pwdfile]
  159. log.info("##### Creating Server certificate -- nickname %s: %s" % (M1SERVERCERT, cmdline))
  160. doAndPrintIt(cmdline)
  161. time.sleep(2)
  162. global M2SUBJECT
  163. cmdline = ['certutil', '-S', '-n', M2SERVERCERT, '-s', M2SUBJECT, '-c', CACERT, '-t', ',,', '-m', '1002', '-v',
  164. '120', '-d', m1confdir, '-z', noisefile, '-f', pwdfile]
  165. log.info("##### Creating Server certificate -- nickname %s: %s" % (M2SERVERCERT, cmdline))
  166. doAndPrintIt(cmdline)
  167. time.sleep(2)
  168. log.info("##### start master1")
  169. topology_m2.ms["master1"].start(timeout=10)
  170. log.info("##### enable SSL in master1 with all ciphers")
  171. enable_ssl(topology_m2.ms["master1"], M1LDAPSPORT, M1SERVERCERT)
  172. cmdline = ['certutil', '-L', '-d', m1confdir]
  173. log.info("##### Check the cert db: %s" % cmdline)
  174. doAndPrintIt(cmdline)
  175. log.info("##### restart master1")
  176. topology_m2.ms["master1"].restart(timeout=10)
  177. log.info("##### Check PEM files of master1 (before setting nsslapd-extract-pemfiles")
  178. check_pems(m1confdir, CACERT, M1SERVERCERT, M1SERVERCERT + '-Key', " not")
  179. log.info("##### Set on to nsslapd-extract-pemfiles")
  180. topology_m2.ms["master1"].modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-extract-pemfiles', 'on')])
  181. log.info("##### restart master1")
  182. topology_m2.ms["master1"].restart(timeout=10)
  183. log.info("##### Check PEM files of master1 (after setting nsslapd-extract-pemfiles")
  184. check_pems(m1confdir, CACERT, M1SERVERCERT, M1SERVERCERT + '-Key', "")
  185. global mytmp
  186. mytmp = '/tmp'
  187. m2pk12file = '%s/%s.pk12' % (mytmp, M2SERVERCERT)
  188. cmd = 'pk12util -o %s -n "%s" -d %s -w %s -k %s' % (m2pk12file, M2SERVERCERT, m1confdir, pwdfile, pwdfile)
  189. log.info("##### Extract PK12 file for master2: %s" % cmd)
  190. os.system(cmd)
  191. log.info("##### Check PK12 files")
  192. if os.path.isfile(m2pk12file):
  193. log.info('%s is successfully extracted.' % m2pk12file)
  194. else:
  195. log.fatal('%s was not extracted.' % m2pk12file)
  196. assert False
  197. log.info("##### stop master2")
  198. topology_m2.ms["master2"].stop(timeout=10)
  199. log.info("##### Initialize Cert DB for master2")
  200. cmdline = ['certutil', '-N', '-d', m2confdir, '-f', pwdfile]
  201. log.info("##### Create key3.db and cert8.db database (master2): %s" % cmdline)
  202. doAndPrintIt(cmdline)
  203. log.info("##### Import certs to master2")
  204. log.info('Importing %s' % CACERT)
  205. global cacert
  206. os.system('certutil -A -n "%s" -t "CT,," -f %s -d %s -a -i %s' % (CACERT, pwdfile, m2confdir, cacert))
  207. cmd = 'pk12util -i %s -n "%s" -d %s -w %s -k %s' % (m2pk12file, M2SERVERCERT, m2confdir, pwdfile, pwdfile)
  208. log.info('##### Importing %s to master2: %s' % (M2SERVERCERT, cmd))
  209. os.system(cmd)
  210. log.info('copy %s to %s' % (m1pinfile, m2pinfile))
  211. os.system('cp %s %s' % (m1pinfile, m2pinfile))
  212. os.system('chmod 400 %s' % m2pinfile)
  213. log.info("##### start master2")
  214. topology_m2.ms["master2"].start(timeout=10)
  215. log.info("##### enable SSL in master2 with all ciphers")
  216. enable_ssl(topology_m2.ms["master2"], M2LDAPSPORT, M2SERVERCERT)
  217. log.info("##### restart master2")
  218. topology_m2.ms["master2"].restart(timeout=10)
  219. log.info("##### Check PEM files of master2 (before setting nsslapd-extract-pemfiles")
  220. check_pems(m2confdir, CACERT, M2SERVERCERT, M2SERVERCERT + '-Key', " not")
  221. log.info("##### Set on to nsslapd-extract-pemfiles")
  222. topology_m2.ms["master2"].modify_s(CONFIG_DN, [(ldap.MOD_REPLACE, 'nsslapd-extract-pemfiles', 'on')])
  223. log.info("##### restart master2")
  224. topology_m2.ms["master2"].restart(timeout=10)
  225. log.info("##### Check PEM files of master2 (after setting nsslapd-extract-pemfiles")
  226. check_pems(m2confdir, CACERT, M2SERVERCERT, M2SERVERCERT + '-Key', "")
  227. log.info("##### restart master1")
  228. topology_m2.ms["master1"].restart(timeout=10)
  229. log.info("\n######################### Creating SSL Keys and Certs Done ######################\n")
  230. def config_tls_agreements(topology_m2):
  231. log.info("######################### Configure SSL/TLS agreements ######################")
  232. log.info("######################## master1 -- startTLS -> master2 #####################")
  233. log.info("##################### master1 <- tls_clientAuth -- master2 ##################")
  234. log.info("##### Update the agreement of master1")
  235. m1_m2_agmt = topology_m2.ms["master1_agmts"]["m1_m2"]
  236. topology_m2.ms["master1"].modify_s(m1_m2_agmt, [(ldap.MOD_REPLACE, 'nsDS5ReplicaTransportInfo', 'TLS')])
  237. log.info("##### Add the cert to the repl manager on master1")
  238. global mytmp
  239. global m2confdir
  240. m2servercert = '%s/%s.pem' % (m2confdir, M2SERVERCERT)
  241. m2sc = open(m2servercert, "r")
  242. m2servercertstr = ''
  243. for l in m2sc.readlines():
  244. if ((l == "") or l.startswith('This file is auto-generated') or
  245. l.startswith('Do not edit') or l.startswith('Issuer:') or
  246. l.startswith('Subject:') or l.startswith('-----')):
  247. continue
  248. m2servercertstr = "%s%s" % (m2servercertstr, l.rstrip())
  249. m2sc.close()
  250. log.info('##### master2 Server Cert in base64 format: %s' % m2servercertstr)
  251. replmgr = defaultProperties[REPLICATION_BIND_DN]
  252. rentry = topology_m2.ms["master1"].search_s(replmgr, ldap.SCOPE_BASE, 'objectclass=*')
  253. log.info('##### Replication manager on master1: %s' % replmgr)
  254. oc = 'ObjectClass'
  255. log.info(' %s:' % oc)
  256. if rentry:
  257. for val in rentry[0].getValues(oc):
  258. log.info(' : %s' % val)
  259. topology_m2.ms["master1"].modify_s(replmgr, [(ldap.MOD_ADD, oc, 'extensibleObject')])
  260. global M2SUBJECT
  261. topology_m2.ms["master1"].modify_s(replmgr,
  262. [(ldap.MOD_ADD, 'userCertificate;binary', base64.b64decode(m2servercertstr)),
  263. (ldap.MOD_ADD, 'description', M2SUBJECT)])
  264. log.info("##### Modify the certmap.conf on master1")
  265. m1certmap = '%s/certmap.conf' % (m1confdir)
  266. os.system('chmod 660 %s' % m1certmap)
  267. m1cm = open(m1certmap, "w")
  268. m1cm.write('certmap Example %s\n' % ISSUER)
  269. m1cm.write('Example:DNComps cn\n')
  270. m1cm.write('Example:FilterComps\n')
  271. m1cm.write('Example:verifycert on\n')
  272. m1cm.write('Example:CmapLdapAttr description')
  273. m1cm.close()
  274. os.system('chmod 440 %s' % m1certmap)
  275. log.info("##### Update the agreement of master2")
  276. m2_m1_agmt = topology_m2.ms["master2_agmts"]["m2_m1"]
  277. topology_m2.ms["master2"].modify_s(m2_m1_agmt, [(ldap.MOD_REPLACE, 'nsDS5ReplicaTransportInfo', 'TLS'),
  278. (ldap.MOD_REPLACE, 'nsDS5ReplicaBindMethod', 'SSLCLIENTAUTH')])
  279. topology_m2.ms["master1"].stop(10)
  280. topology_m2.ms["master2"].stop(10)
  281. topology_m2.ms["master1"].start(10)
  282. topology_m2.ms["master2"].start(10)
  283. log.info("\n######################### Configure SSL/TLS agreements Done ######################\n")
  284. def relocate_pem_files(topology_m2):
  285. log.info("######################### Relocate PEM files on master1 ######################")
  286. mycacert = 'MyCA'
  287. topology_m2.ms["master1"].modify_s(ENCRYPTION_DN, [(ldap.MOD_REPLACE, 'CACertExtractFile', mycacert)])
  288. myservercert = 'MyServerCert1'
  289. myserverkey = 'MyServerKey1'
  290. topology_m2.ms["master1"].modify_s(RSA_DN, [(ldap.MOD_REPLACE, 'ServerCertExtractFile', myservercert),
  291. (ldap.MOD_REPLACE, 'ServerKeyExtractFile', myserverkey)])
  292. log.info("##### restart master1")
  293. topology_m2.ms["master1"].restart(timeout=10)
  294. check_pems(m1confdir, mycacert, myservercert, myserverkey, "")
  295. def test_ticket47536(topology_m2):
  296. """
  297. Set up 2way MMR:
  298. master_1 ----- startTLS -----> master_2
  299. master_1 <-- TLS_clientAuth -- master_2
  300. Check CA cert, Server-Cert and Key are retrieved as PEM from cert db
  301. when the server is started. First, the file names are not specified
  302. and the default names derived from the cert nicknames. Next, the
  303. file names are specified in the encryption config entries.
  304. Each time add 5 entries to master 1 and 2 and check they are replicated.
  305. """
  306. log.info("Ticket 47536 - Allow usage of OpenLDAP libraries that don't use NSS for crypto")
  307. create_keys_certs(topology_m2)
  308. config_tls_agreements(topology_m2)
  309. add_entry(topology_m2.ms["master1"], 'master1', 'uid=m1user', 0, 5)
  310. add_entry(topology_m2.ms["master2"], 'master2', 'uid=m2user', 0, 5)
  311. time.sleep(1)
  312. log.info('##### Searching for entries on master1...')
  313. entries = topology_m2.ms["master1"].search_s(DEFAULT_SUFFIX, ldap.SCOPE_SUBTREE, '(uid=*)')
  314. assert 10 == len(entries)
  315. log.info('##### Searching for entries on master2...')
  316. entries = topology_m2.ms["master2"].search_s(DEFAULT_SUFFIX, ldap.SCOPE_SUBTREE, '(uid=*)')
  317. assert 10 == len(entries)
  318. relocate_pem_files(topology_m2)
  319. add_entry(topology_m2.ms["master1"], 'master1', 'uid=m1user', 10, 5)
  320. add_entry(topology_m2.ms["master2"], 'master2', 'uid=m2user', 10, 5)
  321. time.sleep(10)
  322. log.info('##### Searching for entries on master1...')
  323. entries = topology_m2.ms["master1"].search_s(DEFAULT_SUFFIX, ldap.SCOPE_SUBTREE, '(uid=*)')
  324. assert 20 == len(entries)
  325. log.info('##### Searching for entries on master2...')
  326. entries = topology_m2.ms["master2"].search_s(DEFAULT_SUFFIX, ldap.SCOPE_SUBTREE, '(uid=*)')
  327. assert 20 == len(entries)
  328. db2ldifpl = '%s/db2ldif.pl' % topology_m2.ms["master1"].get_sbin_dir()
  329. cmdline = [db2ldifpl, '-n', 'userRoot', '-Z', SERVERID_MASTER_1, '-D', DN_DM, '-w', PASSWORD]
  330. log.info("##### db2ldif.pl -- %s" % (cmdline))
  331. doAndPrintIt(cmdline)
  332. log.info("Ticket 47536 - PASSED")
  333. if __name__ == '__main__':
  334. # Run isolated
  335. # -s for DEBUG mode
  336. CURRENT_FILE = os.path.realpath(__file__)
  337. pytest.main("-s %s" % CURRENT_FILE)