8281658: Add a security category to the java -XshowSettings option

Reviewed-by: rriggs, mullan
This commit is contained in:
Sean Coffey 2023-07-14 07:31:09 +00:00
parent 43099a85b1
commit 2e12a123c9
5 changed files with 318 additions and 6 deletions

View file

@ -47,8 +47,8 @@ import java.lang.module.ModuleDescriptor.Requires;
import java.lang.module.ModuleFinder; import java.lang.module.ModuleFinder;
import java.lang.module.ModuleReference; import java.lang.module.ModuleReference;
import java.lang.module.ResolvedModule; import java.lang.module.ResolvedModule;
import java.lang.reflect.InvocationTargetException;
import java.lang.reflect.Constructor; import java.lang.reflect.Constructor;
import java.lang.reflect.InvocationTargetException;
import java.lang.reflect.Method; import java.lang.reflect.Method;
import java.lang.reflect.Modifier; import java.lang.reflect.Modifier;
import java.math.BigDecimal; import java.math.BigDecimal;
@ -78,7 +78,6 @@ import java.util.jar.Manifest;
import java.util.stream.Collectors; import java.util.stream.Collectors;
import java.util.stream.Stream; import java.util.stream.Stream;
import jdk.internal.util.OperatingSystem;
import jdk.internal.misc.MainMethodFinder; import jdk.internal.misc.MainMethodFinder;
import jdk.internal.misc.PreviewFeatures; import jdk.internal.misc.PreviewFeatures;
import jdk.internal.misc.VM; import jdk.internal.misc.VM;
@ -86,6 +85,7 @@ import jdk.internal.module.ModuleBootstrap;
import jdk.internal.module.Modules; import jdk.internal.module.Modules;
import jdk.internal.platform.Container; import jdk.internal.platform.Container;
import jdk.internal.platform.Metrics; import jdk.internal.platform.Metrics;
import jdk.internal.util.OperatingSystem;
import sun.util.calendar.ZoneInfoFile; import sun.util.calendar.ZoneInfoFile;
/** /**
@ -172,6 +172,10 @@ public final class LauncherHelper {
case "locale": case "locale":
printLocale(); printLocale();
break; break;
case "security":
var opt = opts.length > 2 ? opts[2].trim() : "all";
SecuritySettings.printSecuritySettings(opt, ostream);
break;
case "system": case "system":
if (OperatingSystem.isLinux()) { if (OperatingSystem.isLinux()) {
printSystemMetrics(); printSystemMetrics();
@ -181,6 +185,7 @@ public final class LauncherHelper {
printVmSettings(initialHeapSize, maxHeapSize, stackSize); printVmSettings(initialHeapSize, maxHeapSize, stackSize);
printProperties(); printProperties();
printLocale(); printLocale();
SecuritySettings.printSecuritySummarySettings(ostream);
if (OperatingSystem.isLinux()) { if (OperatingSystem.isLinux()) {
printSystemMetrics(); printSystemMetrics();
} }
@ -318,9 +323,10 @@ public final class LauncherHelper {
ostream.print(INDENT + INDENT); ostream.print(INDENT + INDENT);
} }
} }
ostream.println();
} }
public static void printSystemMetrics() { private static void printSystemMetrics() {
Metrics c = Container.metrics(); Metrics c = Container.metrics();
ostream.println("Operating System Metrics:"); ostream.println("Operating System Metrics:");

View file

@ -0,0 +1,217 @@
/*
* Copyright (c) 2023, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation. Oracle designates this
* particular file as subject to the "Classpath" exception as provided
* by Oracle in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
package sun.launcher;
import javax.net.ssl.SSLContext;
import javax.net.ssl.SSLSocket;
import java.io.IOException;
import java.io.PrintStream;
import java.security.NoSuchAlgorithmException;
import java.security.Provider;
import java.security.Security;
import java.util.Collections;
import java.util.Comparator;
import java.util.List;
import java.util.Properties;
import java.util.Set;
import java.util.stream.Collectors;
import jdk.internal.access.SharedSecrets;
/**
* A utility class for security libs functionality
* in the -XshowSettings:security output
*/
public final class SecuritySettings {
private static final String INDENT = " ";
private static final String TWOINDENT = INDENT + INDENT;
private static final String THREEINDENT = TWOINDENT + INDENT;
private static final String PROV_INFO_STRING = "Provider information: ";
private static PrintStream ostream = null;
static void printSecuritySettings(String arg, PrintStream stream) {
ostream = stream;
switch (arg) {
case "properties" -> printSecurityProperties();
case "providers" -> printSecurityProviderConfig(true);
case "tls" -> printSecurityTLSConfig(true);
case "all" -> printAllSecurityConfig();
default -> ostream.println(
"\nUnrecognized security subcommand. Valid values are " +
"\"all\", \"properties\", \"providers\", \"tls\". See \"java -X\"\n");
}
}
// A non-verbose description of some core security configuration settings
static void printSecuritySummarySettings(PrintStream stream) {
ostream = stream;
ostream.println("Security settings summary: " + "\n" +
INDENT + "See \"java -X\" for verbose security settings options");
printSecurityProviderConfig(false);
printSecurityTLSConfig(false);
}
static void printAllSecurityConfig() {
ostream.println("Security settings:");
printSecurityProperties();
printSecurityProviderConfig(true);
printSecurityTLSConfig(true);
}
private static void printSecurityProperties() {
ostream.println(INDENT + "Security properties:");
Properties p = SharedSecrets.getJavaSecurityPropertiesAccess().getInitialProperties();
for (String key : p.stringPropertyNames().stream().sorted().toList()) {
String val = p.getProperty(key);
if (val.length() > 60) {
splitLongPropertyLines(key, val);
} else {
ostream.println(TWOINDENT + key + "=" + val);
}
}
ostream.println();
}
private static void splitLongPropertyLines(String key, String val) {
// split long property values which use well known separator
if (val.contains(",") || val.contains(";")) {
String separator = (val.contains(",")) ? "," : ";";
ostream.println(TWOINDENT + key + "=");
String[] values = val.split(separator);
String lastValue = values[values.length -1].trim();
List.of(values).forEach(
s -> ostream.println(THREEINDENT + s.trim() +
(s.trim().equals(lastValue) ? "" : separator)));
} else {
ostream.println(TWOINDENT + key + "=" + val);
}
}
private static void printSecurityTLSConfig(boolean verbose) {
SSLSocket ssls;
SSLContext sslContext;
try {
sslContext = SSLContext.getDefault();
ssls = (SSLSocket)sslContext.getSocketFactory().createSocket();
} catch (IOException | NoSuchAlgorithmException e) {
ostream.println(INDENT + "Failed to create SSL socket");
ostream.println(INDENT + e + "\n");
return;
}
ostream.println(INDENT + "Security TLS configuration (" +
sslContext.getProvider().getName() + " provider):");
ostream.println(TWOINDENT + "Enabled Protocols:");
for (String s : ssls.getEnabledProtocols()) {
ostream.println(THREEINDENT + s);
}
if (verbose) {
ostream.println("\n" + TWOINDENT + "Enabled Cipher Suites:");
for (String s : ssls.getEnabledCipherSuites()) {
ostream.println(THREEINDENT + s);
}
}
ostream.println();
}
private static void printSecurityProviderConfig(boolean verbose) {
ostream.println(INDENT + "Security provider static configuration: (in order of preference)");
for (Provider p : Security.getProviders()) {
if (verbose) {
// separate the views out
ostream.println(TWOINDENT + "-".repeat(40));
}
ostream.println(TWOINDENT + "Provider name: " + p.getName());
if (verbose) {
ostream.println(wrappedString(PROV_INFO_STRING + p.getInfo(), 80,
TWOINDENT, THREEINDENT));
ostream.println(TWOINDENT + "Provider services: (type : algorithm)");
Set<Provider.Service> services = p.getServices();
Set<String> keys = Collections.list(p.keys())
.stream()
.map(String.class::cast)
.filter(s -> s.startsWith("Alg.Alias."))
.collect(Collectors.toSet());
if (!services.isEmpty()) {
services.stream()
.sorted(Comparator.comparing(Provider.Service::getType)
.thenComparing(Provider.Service::getAlgorithm))
.forEach(ps -> {
ostream.println(THREEINDENT +
ps.getType() + "." + ps.getAlgorithm());
List<String> aliases = keys
.stream()
.filter(s -> s.startsWith("Alg.Alias." + ps.getType()))
.filter(s -> p.getProperty(s).equals(ps.getAlgorithm()))
.map(s -> s.substring(("Alg.Alias." + ps.getType() + ".").length()))
.toList();
if (!aliases.isEmpty()) {
ostream.println(wrappedString(
aliases.stream()
.collect(Collectors.joining(", ", INDENT + " aliases: [", "]")),
80, " " + TWOINDENT, INDENT + THREEINDENT));
}
});
} else {
ostream.println(THREEINDENT + "<none>");
}
}
}
if (verbose) {
ostream.println();
}
}
// return a string split across multiple lines which aims to limit max length
private static String wrappedString(String orig, int limit,
String initIndent, String successiveIndent) {
if (orig == null || orig.isEmpty() || limit <= 0) {
// bad input
return orig;
}
StringBuilder sb = new StringBuilder();
int widthCount = 0;
for (String s : orig.split(" ")) {
if (widthCount == 0) {
// first iteration only
sb.append(initIndent + s);
widthCount = s.length() + initIndent.length();
} else {
if (widthCount + s.length() > limit) {
sb.append("\n" + successiveIndent + s);
widthCount = s.length() + successiveIndent.length();
} else {
sb.append(" " + s);
widthCount += s.length() + 1;
}
}
}
return sb.toString();
}
}

View file

@ -170,6 +170,16 @@ java.launcher.X.usage=\n\
\ show all property settings and continue\n\ \ show all property settings and continue\n\
\ -XshowSettings:vm\n\ \ -XshowSettings:vm\n\
\ show all vm related settings and continue\n\ \ show all vm related settings and continue\n\
\ -XshowSettings:security\n\
\ show all security settings and continue\n\
\ -XshowSettings:security:all\n\
\ show all security settings and continue\n\
\ -XshowSettings:security:properties\n\
\ show security properties and continue\n\
\ -XshowSettings:security:providers\n\
\ show static security provider settings and continue\n\
\ -XshowSettings:security:tls\n\
\ show TLS related security settings and continue\n\
\ -XshowSettings:system\n\ \ -XshowSettings:system\n\
\ (Linux Only) show host system or container\n\ \ (Linux Only) show host system or container\n\
\ configuration and continue\n\ \ configuration and continue\n\

View file

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2022, Oracle and/or its affiliates. All rights reserved. * Copyright (c) 2022, 2023, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
* *
* This code is free software; you can redistribute it and/or modify it * This code is free software; you can redistribute it and/or modify it
@ -36,7 +36,7 @@ import java.util.Optional;
/* /*
* @test * @test
* @summary Throw error if default java.security file is missing * @summary Throw error if default java.security file is missing
* @bug 8155246 8292297 8292177 * @bug 8155246 8292297 8292177 8281658
* @library /test/lib * @library /test/lib
* @run main ConfigFileTest * @run main ConfigFileTest
*/ */
@ -71,6 +71,10 @@ public class ConfigFileTest {
copyJDK(jdkTestDir, copyJdkDir); copyJDK(jdkTestDir, copyJdkDir);
String extraPropsFile = Path.of(System.getProperty("test.src"), "override.props").toString(); String extraPropsFile = Path.of(System.getProperty("test.src"), "override.props").toString();
// sanity test -XshowSettings:security option
exerciseShowSettingsSecurity(copiedJava.toString(), "-cp", System.getProperty("test.classes"),
"-Djava.security.debug=all", "-XshowSettings:security", "ConfigFileTest", "runner");
// exercise some debug flags while we're here // exercise some debug flags while we're here
// regular JDK install - should expect success // regular JDK install - should expect success
exerciseSecurity(0, "java", exerciseSecurity(0, "java",
@ -136,6 +140,16 @@ public class ConfigFileTest {
} }
} }
// exercise the -XshowSettings:security launcher
private static void exerciseShowSettingsSecurity(String... args) throws Exception {
ProcessBuilder process = new ProcessBuilder(args);
OutputAnalyzer oa = ProcessTools.executeProcess(process);
oa.shouldHaveExitValue(0)
.shouldContain("Security properties:")
.shouldContain("Security provider static configuration:")
.shouldContain("Security TLS configuration");
}
private static void copyJDK(Path src, Path dst) throws Exception { private static void copyJDK(Path src, Path dst) throws Exception {
Files.walk(src) Files.walk(src)
.skip(1) .skip(1)

View file

@ -25,7 +25,7 @@ import java.io.IOException;
/* /*
* @test * @test
* @bug 6994753 7123582 8305950 * @bug 6994753 7123582 8305950 8281658
* @summary tests -XshowSettings options * @summary tests -XshowSettings options
* @modules jdk.compiler * @modules jdk.compiler
* jdk.zipfs * jdk.zipfs
@ -67,6 +67,13 @@ public class Settings extends TestHelper {
private static final String VM_SETTINGS = "VM settings:"; private static final String VM_SETTINGS = "VM settings:";
private static final String PROP_SETTINGS = "Property settings:"; private static final String PROP_SETTINGS = "Property settings:";
private static final String LOCALE_SETTINGS = "Locale settings:"; private static final String LOCALE_SETTINGS = "Locale settings:";
private static final String SEC_PROPS_SETTINGS = "Security properties:";
private static final String SEC_SUMMARY_PROPS_SETTINGS =
"Security settings summary:";
private static final String SEC_PROVIDER_SETTINGS =
"Security provider static configuration:";
private static final String SEC_TLS_SETTINGS = "Security TLS configuration";
private static final String BAD_SEC_OPTION_MSG = "Unrecognized security subcommand";
private static final String SYSTEM_SETTINGS = "Operating System Metrics:"; private static final String SYSTEM_SETTINGS = "Operating System Metrics:";
private static final String STACKSIZE_SETTINGS = "Stack Size:"; private static final String STACKSIZE_SETTINGS = "Stack Size:";
private static final String TZDATA_SETTINGS = "tzdata version"; private static final String TZDATA_SETTINGS = "tzdata version";
@ -75,6 +82,11 @@ public class Settings extends TestHelper {
checkContains(tr, VM_SETTINGS); checkContains(tr, VM_SETTINGS);
checkContains(tr, PROP_SETTINGS); checkContains(tr, PROP_SETTINGS);
checkContains(tr, LOCALE_SETTINGS); checkContains(tr, LOCALE_SETTINGS);
// no verbose security settings unless "security" used
checkNotContains(tr, SEC_PROPS_SETTINGS);
checkContains(tr, SEC_SUMMARY_PROPS_SETTINGS);
checkContains(tr, SEC_PROVIDER_SETTINGS);
checkContains(tr, SEC_TLS_SETTINGS);
checkContains(tr, TZDATA_SETTINGS); checkContains(tr, TZDATA_SETTINGS);
if (System.getProperty("os.name").contains("Linux")) { if (System.getProperty("os.name").contains("Linux")) {
checkContains(tr, SYSTEM_SETTINGS); checkContains(tr, SYSTEM_SETTINGS);
@ -144,6 +156,54 @@ public class Settings extends TestHelper {
checkContains(tr, TZDATA_SETTINGS); checkContains(tr, TZDATA_SETTINGS);
} }
static void runTestOptionSecurity() throws IOException {
TestResult tr = doExec(javaCmd, "-XshowSettings:security");
checkNotContains(tr, VM_SETTINGS);
checkNotContains(tr, PROP_SETTINGS);
checkContains(tr, SEC_PROPS_SETTINGS);
checkContains(tr, SEC_PROVIDER_SETTINGS);
checkContains(tr, SEC_TLS_SETTINGS);
}
static void runTestOptionSecurityProps() throws IOException {
TestResult tr = doExec(javaCmd, "-XshowSettings:security:properties");
checkContains(tr, SEC_PROPS_SETTINGS);
checkNotContains(tr, SEC_PROVIDER_SETTINGS);
checkNotContains(tr, SEC_TLS_SETTINGS);
// test a well known property for sanity
checkContains(tr, "keystore.type=pkcs12");
}
static void runTestOptionSecurityProv() throws IOException {
TestResult tr = doExec(javaCmd, "-XshowSettings:security:providers");
checkNotContains(tr, SEC_PROPS_SETTINGS);
checkContains(tr, SEC_PROVIDER_SETTINGS);
checkNotContains(tr, SEC_TLS_SETTINGS);
// test a well known Provider for sanity
checkContains(tr, "Provider name: SUN");
// test for a well known alias (SunJCE: AlgorithmParameterGenerator.DiffieHellman)
checkContains(tr, "aliases: [1.2.840.113549.1.3.1, " +
"DH, OID.1.2.840.113549.1.3.1]");
}
static void runTestOptionSecurityTLS() throws IOException {
TestResult tr = doExec(javaCmd, "-XshowSettings:security:tls");
checkNotContains(tr, SEC_PROPS_SETTINGS);
checkNotContains(tr, SEC_PROVIDER_SETTINGS);
checkContains(tr, SEC_TLS_SETTINGS);
// test a well known TLS config for sanity
checkContains(tr, "TLSv1.2");
}
// ensure error message is printed when unrecognized option used
static void runTestOptionBadSecurityOption() throws IOException {
TestResult tr = doExec(javaCmd, "-XshowSettings:security:bad");
checkContains(tr, BAD_SEC_OPTION_MSG);
// we print all security settings in such scenario
checkNotContains(tr, SEC_PROPS_SETTINGS);
checkNotContains(tr, SEC_PROVIDER_SETTINGS);
checkNotContains(tr, SEC_TLS_SETTINGS);
}
static void runTestOptionSystem() throws IOException { static void runTestOptionSystem() throws IOException {
TestResult tr = doExec(javaCmd, "-XshowSettings:system"); TestResult tr = doExec(javaCmd, "-XshowSettings:system");
if (System.getProperty("os.name").contains("Linux")) { if (System.getProperty("os.name").contains("Linux")) {
@ -181,6 +241,11 @@ public class Settings extends TestHelper {
runTestOptionVM(); runTestOptionVM();
runTestOptionProperty(); runTestOptionProperty();
runTestOptionLocale(); runTestOptionLocale();
runTestOptionSecurity();
runTestOptionSecurityProps();
runTestOptionSecurityProv();
runTestOptionSecurityTLS();
runTestOptionBadSecurityOption();
runTestOptionSystem(); runTestOptionSystem();
runTestBadOptions(); runTestBadOptions();
runTest7123582(); runTest7123582();