8281658: Add a security category to the java -XshowSettings option

Reviewed-by: rriggs, mullan
This commit is contained in:
Sean Coffey 2023-07-14 07:31:09 +00:00
parent 43099a85b1
commit 2e12a123c9
5 changed files with 318 additions and 6 deletions

View File

@ -47,8 +47,8 @@ import java.lang.module.ModuleDescriptor.Requires;
import java.lang.module.ModuleFinder;
import java.lang.module.ModuleReference;
import java.lang.module.ResolvedModule;
import java.lang.reflect.InvocationTargetException;
import java.lang.reflect.Constructor;
import java.lang.reflect.InvocationTargetException;
import java.lang.reflect.Method;
import java.lang.reflect.Modifier;
import java.math.BigDecimal;
@ -78,7 +78,6 @@ import java.util.jar.Manifest;
import java.util.stream.Collectors;
import java.util.stream.Stream;
import jdk.internal.util.OperatingSystem;
import jdk.internal.misc.MainMethodFinder;
import jdk.internal.misc.PreviewFeatures;
import jdk.internal.misc.VM;
@ -86,6 +85,7 @@ import jdk.internal.module.ModuleBootstrap;
import jdk.internal.module.Modules;
import jdk.internal.platform.Container;
import jdk.internal.platform.Metrics;
import jdk.internal.util.OperatingSystem;
import sun.util.calendar.ZoneInfoFile;
/**
@ -172,6 +172,10 @@ public final class LauncherHelper {
case "locale":
printLocale();
break;
case "security":
var opt = opts.length > 2 ? opts[2].trim() : "all";
SecuritySettings.printSecuritySettings(opt, ostream);
break;
case "system":
if (OperatingSystem.isLinux()) {
printSystemMetrics();
@ -181,6 +185,7 @@ public final class LauncherHelper {
printVmSettings(initialHeapSize, maxHeapSize, stackSize);
printProperties();
printLocale();
SecuritySettings.printSecuritySummarySettings(ostream);
if (OperatingSystem.isLinux()) {
printSystemMetrics();
}
@ -318,9 +323,10 @@ public final class LauncherHelper {
ostream.print(INDENT + INDENT);
}
}
ostream.println();
}
public static void printSystemMetrics() {
private static void printSystemMetrics() {
Metrics c = Container.metrics();
ostream.println("Operating System Metrics:");

View File

@ -0,0 +1,217 @@
/*
* Copyright (c) 2023, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation. Oracle designates this
* particular file as subject to the "Classpath" exception as provided
* by Oracle in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
package sun.launcher;
import javax.net.ssl.SSLContext;
import javax.net.ssl.SSLSocket;
import java.io.IOException;
import java.io.PrintStream;
import java.security.NoSuchAlgorithmException;
import java.security.Provider;
import java.security.Security;
import java.util.Collections;
import java.util.Comparator;
import java.util.List;
import java.util.Properties;
import java.util.Set;
import java.util.stream.Collectors;
import jdk.internal.access.SharedSecrets;
/**
* A utility class for security libs functionality
* in the -XshowSettings:security output
*/
public final class SecuritySettings {
private static final String INDENT = " ";
private static final String TWOINDENT = INDENT + INDENT;
private static final String THREEINDENT = TWOINDENT + INDENT;
private static final String PROV_INFO_STRING = "Provider information: ";
private static PrintStream ostream = null;
static void printSecuritySettings(String arg, PrintStream stream) {
ostream = stream;
switch (arg) {
case "properties" -> printSecurityProperties();
case "providers" -> printSecurityProviderConfig(true);
case "tls" -> printSecurityTLSConfig(true);
case "all" -> printAllSecurityConfig();
default -> ostream.println(
"\nUnrecognized security subcommand. Valid values are " +
"\"all\", \"properties\", \"providers\", \"tls\". See \"java -X\"\n");
}
}
// A non-verbose description of some core security configuration settings
static void printSecuritySummarySettings(PrintStream stream) {
ostream = stream;
ostream.println("Security settings summary: " + "\n" +
INDENT + "See \"java -X\" for verbose security settings options");
printSecurityProviderConfig(false);
printSecurityTLSConfig(false);
}
static void printAllSecurityConfig() {
ostream.println("Security settings:");
printSecurityProperties();
printSecurityProviderConfig(true);
printSecurityTLSConfig(true);
}
private static void printSecurityProperties() {
ostream.println(INDENT + "Security properties:");
Properties p = SharedSecrets.getJavaSecurityPropertiesAccess().getInitialProperties();
for (String key : p.stringPropertyNames().stream().sorted().toList()) {
String val = p.getProperty(key);
if (val.length() > 60) {
splitLongPropertyLines(key, val);
} else {
ostream.println(TWOINDENT + key + "=" + val);
}
}
ostream.println();
}
private static void splitLongPropertyLines(String key, String val) {
// split long property values which use well known separator
if (val.contains(",") || val.contains(";")) {
String separator = (val.contains(",")) ? "," : ";";
ostream.println(TWOINDENT + key + "=");
String[] values = val.split(separator);
String lastValue = values[values.length -1].trim();
List.of(values).forEach(
s -> ostream.println(THREEINDENT + s.trim() +
(s.trim().equals(lastValue) ? "" : separator)));
} else {
ostream.println(TWOINDENT + key + "=" + val);
}
}
private static void printSecurityTLSConfig(boolean verbose) {
SSLSocket ssls;
SSLContext sslContext;
try {
sslContext = SSLContext.getDefault();
ssls = (SSLSocket)sslContext.getSocketFactory().createSocket();
} catch (IOException | NoSuchAlgorithmException e) {
ostream.println(INDENT + "Failed to create SSL socket");
ostream.println(INDENT + e + "\n");
return;
}
ostream.println(INDENT + "Security TLS configuration (" +
sslContext.getProvider().getName() + " provider):");
ostream.println(TWOINDENT + "Enabled Protocols:");
for (String s : ssls.getEnabledProtocols()) {
ostream.println(THREEINDENT + s);
}
if (verbose) {
ostream.println("\n" + TWOINDENT + "Enabled Cipher Suites:");
for (String s : ssls.getEnabledCipherSuites()) {
ostream.println(THREEINDENT + s);
}
}
ostream.println();
}
private static void printSecurityProviderConfig(boolean verbose) {
ostream.println(INDENT + "Security provider static configuration: (in order of preference)");
for (Provider p : Security.getProviders()) {
if (verbose) {
// separate the views out
ostream.println(TWOINDENT + "-".repeat(40));
}
ostream.println(TWOINDENT + "Provider name: " + p.getName());
if (verbose) {
ostream.println(wrappedString(PROV_INFO_STRING + p.getInfo(), 80,
TWOINDENT, THREEINDENT));
ostream.println(TWOINDENT + "Provider services: (type : algorithm)");
Set<Provider.Service> services = p.getServices();
Set<String> keys = Collections.list(p.keys())
.stream()
.map(String.class::cast)
.filter(s -> s.startsWith("Alg.Alias."))
.collect(Collectors.toSet());
if (!services.isEmpty()) {
services.stream()
.sorted(Comparator.comparing(Provider.Service::getType)
.thenComparing(Provider.Service::getAlgorithm))
.forEach(ps -> {
ostream.println(THREEINDENT +
ps.getType() + "." + ps.getAlgorithm());
List<String> aliases = keys
.stream()
.filter(s -> s.startsWith("Alg.Alias." + ps.getType()))
.filter(s -> p.getProperty(s).equals(ps.getAlgorithm()))
.map(s -> s.substring(("Alg.Alias." + ps.getType() + ".").length()))
.toList();
if (!aliases.isEmpty()) {
ostream.println(wrappedString(
aliases.stream()
.collect(Collectors.joining(", ", INDENT + " aliases: [", "]")),
80, " " + TWOINDENT, INDENT + THREEINDENT));
}
});
} else {
ostream.println(THREEINDENT + "<none>");
}
}
}
if (verbose) {
ostream.println();
}
}
// return a string split across multiple lines which aims to limit max length
private static String wrappedString(String orig, int limit,
String initIndent, String successiveIndent) {
if (orig == null || orig.isEmpty() || limit <= 0) {
// bad input
return orig;
}
StringBuilder sb = new StringBuilder();
int widthCount = 0;
for (String s : orig.split(" ")) {
if (widthCount == 0) {
// first iteration only
sb.append(initIndent + s);
widthCount = s.length() + initIndent.length();
} else {
if (widthCount + s.length() > limit) {
sb.append("\n" + successiveIndent + s);
widthCount = s.length() + successiveIndent.length();
} else {
sb.append(" " + s);
widthCount += s.length() + 1;
}
}
}
return sb.toString();
}
}

View File

@ -170,6 +170,16 @@ java.launcher.X.usage=\n\
\ show all property settings and continue\n\
\ -XshowSettings:vm\n\
\ show all vm related settings and continue\n\
\ -XshowSettings:security\n\
\ show all security settings and continue\n\
\ -XshowSettings:security:all\n\
\ show all security settings and continue\n\
\ -XshowSettings:security:properties\n\
\ show security properties and continue\n\
\ -XshowSettings:security:providers\n\
\ show static security provider settings and continue\n\
\ -XshowSettings:security:tls\n\
\ show TLS related security settings and continue\n\
\ -XshowSettings:system\n\
\ (Linux Only) show host system or container\n\
\ configuration and continue\n\

View File

@ -1,5 +1,5 @@
/*
* Copyright (c) 2022, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2022, 2023, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@ -36,7 +36,7 @@ import java.util.Optional;
/*
* @test
* @summary Throw error if default java.security file is missing
* @bug 8155246 8292297 8292177
* @bug 8155246 8292297 8292177 8281658
* @library /test/lib
* @run main ConfigFileTest
*/
@ -71,6 +71,10 @@ public class ConfigFileTest {
copyJDK(jdkTestDir, copyJdkDir);
String extraPropsFile = Path.of(System.getProperty("test.src"), "override.props").toString();
// sanity test -XshowSettings:security option
exerciseShowSettingsSecurity(copiedJava.toString(), "-cp", System.getProperty("test.classes"),
"-Djava.security.debug=all", "-XshowSettings:security", "ConfigFileTest", "runner");
// exercise some debug flags while we're here
// regular JDK install - should expect success
exerciseSecurity(0, "java",
@ -136,6 +140,16 @@ public class ConfigFileTest {
}
}
// exercise the -XshowSettings:security launcher
private static void exerciseShowSettingsSecurity(String... args) throws Exception {
ProcessBuilder process = new ProcessBuilder(args);
OutputAnalyzer oa = ProcessTools.executeProcess(process);
oa.shouldHaveExitValue(0)
.shouldContain("Security properties:")
.shouldContain("Security provider static configuration:")
.shouldContain("Security TLS configuration");
}
private static void copyJDK(Path src, Path dst) throws Exception {
Files.walk(src)
.skip(1)

View File

@ -25,7 +25,7 @@ import java.io.IOException;
/*
* @test
* @bug 6994753 7123582 8305950
* @bug 6994753 7123582 8305950 8281658
* @summary tests -XshowSettings options
* @modules jdk.compiler
* jdk.zipfs
@ -67,6 +67,13 @@ public class Settings extends TestHelper {
private static final String VM_SETTINGS = "VM settings:";
private static final String PROP_SETTINGS = "Property settings:";
private static final String LOCALE_SETTINGS = "Locale settings:";
private static final String SEC_PROPS_SETTINGS = "Security properties:";
private static final String SEC_SUMMARY_PROPS_SETTINGS =
"Security settings summary:";
private static final String SEC_PROVIDER_SETTINGS =
"Security provider static configuration:";
private static final String SEC_TLS_SETTINGS = "Security TLS configuration";
private static final String BAD_SEC_OPTION_MSG = "Unrecognized security subcommand";
private static final String SYSTEM_SETTINGS = "Operating System Metrics:";
private static final String STACKSIZE_SETTINGS = "Stack Size:";
private static final String TZDATA_SETTINGS = "tzdata version";
@ -75,6 +82,11 @@ public class Settings extends TestHelper {
checkContains(tr, VM_SETTINGS);
checkContains(tr, PROP_SETTINGS);
checkContains(tr, LOCALE_SETTINGS);
// no verbose security settings unless "security" used
checkNotContains(tr, SEC_PROPS_SETTINGS);
checkContains(tr, SEC_SUMMARY_PROPS_SETTINGS);
checkContains(tr, SEC_PROVIDER_SETTINGS);
checkContains(tr, SEC_TLS_SETTINGS);
checkContains(tr, TZDATA_SETTINGS);
if (System.getProperty("os.name").contains("Linux")) {
checkContains(tr, SYSTEM_SETTINGS);
@ -144,6 +156,54 @@ public class Settings extends TestHelper {
checkContains(tr, TZDATA_SETTINGS);
}
static void runTestOptionSecurity() throws IOException {
TestResult tr = doExec(javaCmd, "-XshowSettings:security");
checkNotContains(tr, VM_SETTINGS);
checkNotContains(tr, PROP_SETTINGS);
checkContains(tr, SEC_PROPS_SETTINGS);
checkContains(tr, SEC_PROVIDER_SETTINGS);
checkContains(tr, SEC_TLS_SETTINGS);
}
static void runTestOptionSecurityProps() throws IOException {
TestResult tr = doExec(javaCmd, "-XshowSettings:security:properties");
checkContains(tr, SEC_PROPS_SETTINGS);
checkNotContains(tr, SEC_PROVIDER_SETTINGS);
checkNotContains(tr, SEC_TLS_SETTINGS);
// test a well known property for sanity
checkContains(tr, "keystore.type=pkcs12");
}
static void runTestOptionSecurityProv() throws IOException {
TestResult tr = doExec(javaCmd, "-XshowSettings:security:providers");
checkNotContains(tr, SEC_PROPS_SETTINGS);
checkContains(tr, SEC_PROVIDER_SETTINGS);
checkNotContains(tr, SEC_TLS_SETTINGS);
// test a well known Provider for sanity
checkContains(tr, "Provider name: SUN");
// test for a well known alias (SunJCE: AlgorithmParameterGenerator.DiffieHellman)
checkContains(tr, "aliases: [1.2.840.113549.1.3.1, " +
"DH, OID.1.2.840.113549.1.3.1]");
}
static void runTestOptionSecurityTLS() throws IOException {
TestResult tr = doExec(javaCmd, "-XshowSettings:security:tls");
checkNotContains(tr, SEC_PROPS_SETTINGS);
checkNotContains(tr, SEC_PROVIDER_SETTINGS);
checkContains(tr, SEC_TLS_SETTINGS);
// test a well known TLS config for sanity
checkContains(tr, "TLSv1.2");
}
// ensure error message is printed when unrecognized option used
static void runTestOptionBadSecurityOption() throws IOException {
TestResult tr = doExec(javaCmd, "-XshowSettings:security:bad");
checkContains(tr, BAD_SEC_OPTION_MSG);
// we print all security settings in such scenario
checkNotContains(tr, SEC_PROPS_SETTINGS);
checkNotContains(tr, SEC_PROVIDER_SETTINGS);
checkNotContains(tr, SEC_TLS_SETTINGS);
}
static void runTestOptionSystem() throws IOException {
TestResult tr = doExec(javaCmd, "-XshowSettings:system");
if (System.getProperty("os.name").contains("Linux")) {
@ -181,6 +241,11 @@ public class Settings extends TestHelper {
runTestOptionVM();
runTestOptionProperty();
runTestOptionLocale();
runTestOptionSecurity();
runTestOptionSecurityProps();
runTestOptionSecurityProv();
runTestOptionSecurityTLS();
runTestOptionBadSecurityOption();
runTestOptionSystem();
runTestBadOptions();
runTest7123582();