Skip to content

Commit 7afc7fc

Browse files
committed
[FEATURE] Built-in secure transports support
Signed-off-by: Andriy Redko <andriy.redko@aiven.io>
1 parent 87ac374 commit 7afc7fc

File tree

12 files changed

+1051
-0
lines changed

12 files changed

+1051
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,149 @@
1+
/*
2+
* Copyright 2015-2017 floragunn GmbH
3+
*
4+
* Licensed under the Apache License, Version 2.0 (the "License");
5+
* you may not use this file except in compliance with the License.
6+
* You may obtain a copy of the License at
7+
*
8+
* http://www.apache.org/licenses/LICENSE-2.0
9+
*
10+
* Unless required by applicable law or agreed to in writing, software
11+
* distributed under the License is distributed on an "AS IS" BASIS,
12+
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13+
* See the License for the specific language governing permissions and
14+
* limitations under the License.
15+
*
16+
*/
17+
18+
package org.opensearch.http.netty4.ssl;
19+
20+
import org.apache.logging.log4j.LogManager;
21+
import org.apache.logging.log4j.Logger;
22+
import org.opensearch.common.network.NetworkService;
23+
import org.opensearch.common.settings.ClusterSettings;
24+
import org.opensearch.common.settings.Settings;
25+
import org.opensearch.common.util.BigArrays;
26+
import org.opensearch.core.xcontent.NamedXContentRegistry;
27+
import org.opensearch.http.HttpChannel;
28+
import org.opensearch.http.HttpHandlingSettings;
29+
import org.opensearch.http.netty4.Netty4HttpChannel;
30+
import org.opensearch.http.netty4.Netty4HttpServerTransport;
31+
import org.opensearch.plugins.SecureSettingProvider;
32+
import org.opensearch.telemetry.tracing.Tracer;
33+
import org.opensearch.threadpool.ThreadPool;
34+
import org.opensearch.transport.SharedGroupFactory;
35+
36+
import javax.net.ssl.SSLContext;
37+
import javax.net.ssl.SSLEngine;
38+
39+
import io.netty.channel.Channel;
40+
import io.netty.channel.ChannelHandler;
41+
import io.netty.channel.ChannelHandlerContext;
42+
import io.netty.handler.codec.DecoderException;
43+
import io.netty.handler.ssl.ApplicationProtocolNames;
44+
import io.netty.handler.ssl.ApplicationProtocolNegotiationHandler;
45+
import io.netty.handler.ssl.SslHandler;
46+
47+
public class SecureNetty4HttpServerTransport extends Netty4HttpServerTransport {
48+
private static final Logger logger = LogManager.getLogger(SecureNetty4HttpServerTransport.class);
49+
private final SecureSettingProvider ssp;
50+
51+
public SecureNetty4HttpServerTransport(
52+
final Settings settings,
53+
final NetworkService networkService,
54+
final BigArrays bigArrays,
55+
final ThreadPool threadPool,
56+
final NamedXContentRegistry namedXContentRegistry,
57+
final Dispatcher dispatcher,
58+
final ClusterSettings clusterSettings,
59+
final SharedGroupFactory sharedGroupFactory,
60+
final SecureSettingProvider ssp,
61+
final Tracer tracer
62+
) {
63+
super(
64+
settings,
65+
networkService,
66+
bigArrays,
67+
threadPool,
68+
namedXContentRegistry,
69+
dispatcher,
70+
clusterSettings,
71+
sharedGroupFactory,
72+
tracer
73+
);
74+
this.ssp = ssp;
75+
}
76+
77+
@Override
78+
public ChannelHandler configureServerChannelHandler() {
79+
return new SslHttpChannelHandler(this, handlingSettings);
80+
}
81+
82+
@Override
83+
public void onException(HttpChannel channel, Exception cause0) {
84+
Throwable cause = cause0;
85+
86+
if (cause0 instanceof DecoderException && cause0 != null) {
87+
cause = cause0.getCause();
88+
}
89+
90+
logger.error("Exception during establishing a SSL connection: " + cause, cause);
91+
super.onException(channel, cause0);
92+
}
93+
94+
protected class SslHttpChannelHandler extends Netty4HttpServerTransport.HttpChannelHandler {
95+
/**
96+
* Application negotiation handler to select either HTTP 1.1 or HTTP 2 protocol, based
97+
* on client/server ALPN negotiations.
98+
*/
99+
private class Http2OrHttpHandler extends ApplicationProtocolNegotiationHandler {
100+
protected Http2OrHttpHandler() {
101+
super(ApplicationProtocolNames.HTTP_1_1);
102+
}
103+
104+
@Override
105+
protected void configurePipeline(ChannelHandlerContext ctx, String protocol) throws Exception {
106+
if (ApplicationProtocolNames.HTTP_2.equals(protocol)) {
107+
configureDefaultHttp2Pipeline(ctx.pipeline());
108+
} else if (ApplicationProtocolNames.HTTP_1_1.equals(protocol)) {
109+
configureDefaultHttpPipeline(ctx.pipeline());
110+
} else {
111+
throw new IllegalStateException("Unknown application protocol: " + protocol);
112+
}
113+
}
114+
115+
@Override
116+
public void exceptionCaught(ChannelHandlerContext ctx, Throwable cause) throws Exception {
117+
super.exceptionCaught(ctx, cause);
118+
Netty4HttpChannel channel = ctx.channel().attr(HTTP_CHANNEL_KEY).get();
119+
if (channel != null) {
120+
if (cause instanceof Error) {
121+
onException(channel, new Exception(cause));
122+
} else {
123+
onException(channel, (Exception) cause);
124+
}
125+
}
126+
}
127+
}
128+
129+
protected SslHttpChannelHandler(final Netty4HttpServerTransport transport, final HttpHandlingSettings handlingSettings) {
130+
super(transport, handlingSettings);
131+
}
132+
133+
@Override
134+
protected void initChannel(Channel ch) throws Exception {
135+
super.initChannel(ch);
136+
137+
final SSLEngine sslEngine = ssp.buildSecureHttpEngine(settings, SecureNetty4HttpServerTransport.this)
138+
.orElseGet(SSLContext.getDefault()::createSSLEngine);
139+
140+
final SslHandler sslHandler = new SslHandler(sslEngine);
141+
ch.pipeline().addFirst("ssl_http", sslHandler);
142+
}
143+
144+
@Override
145+
protected void configurePipeline(Channel ch) {
146+
ch.pipeline().addLast(new Http2OrHttpHandler());
147+
}
148+
}
149+
}

modules/transport-netty4/src/main/java/org/opensearch/transport/Netty4ModulePlugin.java

+64
Original file line numberDiff line numberDiff line change
@@ -46,11 +46,14 @@
4646
import org.opensearch.core.xcontent.NamedXContentRegistry;
4747
import org.opensearch.http.HttpServerTransport;
4848
import org.opensearch.http.netty4.Netty4HttpServerTransport;
49+
import org.opensearch.http.netty4.ssl.SecureNetty4HttpServerTransport;
4950
import org.opensearch.plugins.NetworkPlugin;
5051
import org.opensearch.plugins.Plugin;
52+
import org.opensearch.plugins.SecureSettingProvider;
5153
import org.opensearch.telemetry.tracing.Tracer;
5254
import org.opensearch.threadpool.ThreadPool;
5355
import org.opensearch.transport.netty4.Netty4Transport;
56+
import org.opensearch.transport.netty4.ssl.SecureNetty4ServerTransport;
5457

5558
import java.util.Arrays;
5659
import java.util.Collections;
@@ -61,7 +64,9 @@
6164
public class Netty4ModulePlugin extends Plugin implements NetworkPlugin {
6265

6366
public static final String NETTY_TRANSPORT_NAME = "netty4";
67+
public static final String NETTY_SECURE_TRANSPORT_NAME = "netty4-secure";
6468
public static final String NETTY_HTTP_TRANSPORT_NAME = "netty4";
69+
public static final String NETTY_SECURE_HTTP_TRANSPORT_NAME = "netty4-secure";
6570

6671
private final SetOnce<SharedGroupFactory> groupFactory = new SetOnce<>();
6772

@@ -144,6 +149,65 @@ public Map<String, Supplier<HttpServerTransport>> getHttpTransports(
144149
);
145150
}
146151

152+
@Override
153+
public Map<String, Supplier<HttpServerTransport>> getSecureHttpTransports(
154+
Settings settings,
155+
ThreadPool threadPool,
156+
BigArrays bigArrays,
157+
PageCacheRecycler pageCacheRecycler,
158+
CircuitBreakerService circuitBreakerService,
159+
NamedXContentRegistry xContentRegistry,
160+
NetworkService networkService,
161+
HttpServerTransport.Dispatcher dispatcher,
162+
ClusterSettings clusterSettings,
163+
SecureSettingProvider ssp,
164+
Tracer tracer
165+
) {
166+
return Collections.singletonMap(
167+
NETTY_SECURE_HTTP_TRANSPORT_NAME,
168+
() -> new SecureNetty4HttpServerTransport(
169+
settings,
170+
networkService,
171+
bigArrays,
172+
threadPool,
173+
xContentRegistry,
174+
dispatcher,
175+
clusterSettings,
176+
getSharedGroupFactory(settings),
177+
ssp,
178+
tracer
179+
)
180+
);
181+
}
182+
183+
@Override
184+
public Map<String, Supplier<Transport>> getSecureTransports(
185+
Settings settings,
186+
ThreadPool threadPool,
187+
PageCacheRecycler pageCacheRecycler,
188+
CircuitBreakerService circuitBreakerService,
189+
NamedWriteableRegistry namedWriteableRegistry,
190+
NetworkService networkService,
191+
SecureSettingProvider ssp,
192+
Tracer tracer
193+
) {
194+
return Collections.singletonMap(
195+
NETTY_SECURE_TRANSPORT_NAME,
196+
() -> new SecureNetty4ServerTransport(
197+
settings,
198+
Version.CURRENT,
199+
threadPool,
200+
networkService,
201+
pageCacheRecycler,
202+
namedWriteableRegistry,
203+
circuitBreakerService,
204+
getSharedGroupFactory(settings),
205+
ssp,
206+
tracer
207+
)
208+
);
209+
}
210+
147211
SharedGroupFactory getSharedGroupFactory(Settings settings) {
148212
SharedGroupFactory groupFactory = this.groupFactory.get();
149213
if (groupFactory != null) {
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,101 @@
1+
/*
2+
* SPDX-License-Identifier: Apache-2.0
3+
*
4+
* The OpenSearch Contributors require contributions made to
5+
* this file be licensed under the Apache-2.0 license or a
6+
* compatible open source license.
7+
*
8+
* Modifications Copyright OpenSearch Contributors. See
9+
* GitHub history for details.
10+
*/
11+
package org.opensearch.transport.netty4.ssl;
12+
13+
import org.apache.logging.log4j.LogManager;
14+
import org.apache.logging.log4j.Logger;
15+
import org.opensearch.common.settings.Settings;
16+
import org.opensearch.plugins.SecureSettingProvider;
17+
import org.opensearch.transport.TcpTransport;
18+
19+
import javax.net.ssl.SSLContext;
20+
import javax.net.ssl.SSLEngine;
21+
import javax.net.ssl.SSLException;
22+
23+
import java.nio.charset.StandardCharsets;
24+
import java.security.NoSuchAlgorithmException;
25+
import java.util.List;
26+
27+
import io.netty.buffer.ByteBuf;
28+
import io.netty.buffer.Unpooled;
29+
import io.netty.channel.ChannelFutureListener;
30+
import io.netty.channel.ChannelHandlerContext;
31+
import io.netty.channel.ChannelPipeline;
32+
import io.netty.handler.codec.ByteToMessageDecoder;
33+
import io.netty.handler.ssl.SslHandler;
34+
35+
/**
36+
* Modifies the current pipeline dynamically to enable TLS
37+
*/
38+
public class DualModeSslHandler extends ByteToMessageDecoder {
39+
40+
private static final Logger logger = LogManager.getLogger(DualModeSslHandler.class);
41+
private final Settings settings;
42+
private final SecureSettingProvider ssp;
43+
private final TcpTransport transport;
44+
private final SslHandler providedSSLHandler;
45+
46+
public DualModeSslHandler(final Settings settings, final SecureSettingProvider ssp, final TcpTransport transport) {
47+
this(settings, ssp, transport, null);
48+
}
49+
50+
protected DualModeSslHandler(
51+
final Settings settings,
52+
final SecureSettingProvider ssp,
53+
final TcpTransport transport,
54+
SslHandler providedSSLHandler
55+
) {
56+
this.settings = settings;
57+
this.ssp = ssp;
58+
this.transport = transport;
59+
this.providedSSLHandler = providedSSLHandler;
60+
}
61+
62+
@Override
63+
protected void decode(ChannelHandlerContext ctx, ByteBuf in, List<Object> out) throws Exception {
64+
// Will use the first six bytes to detect a protocol.
65+
if (in.readableBytes() < 6) {
66+
return;
67+
}
68+
int offset = in.readerIndex();
69+
if (in.getCharSequence(offset, 6, StandardCharsets.UTF_8).equals(SecureConnectionTestUtil.DUAL_MODE_CLIENT_HELLO_MSG)) {
70+
logger.debug("Received DualSSL Client Hello message");
71+
ByteBuf responseBuffer = Unpooled.buffer(6);
72+
responseBuffer.writeCharSequence(SecureConnectionTestUtil.DUAL_MODE_SERVER_HELLO_MSG, StandardCharsets.UTF_8);
73+
ctx.writeAndFlush(responseBuffer).addListener(ChannelFutureListener.CLOSE);
74+
return;
75+
}
76+
77+
if (SslUtils.isTLS(in)) {
78+
logger.debug("Identified request as SSL request");
79+
enableSsl(ctx);
80+
} else {
81+
logger.debug("Identified request as non SSL request, running in HTTP mode as dual mode is enabled");
82+
ctx.pipeline().remove(this);
83+
}
84+
}
85+
86+
private void enableSsl(ChannelHandlerContext ctx) throws SSLException, NoSuchAlgorithmException {
87+
final SSLEngine sslEngine = ssp.buildSecureServerTransportEngine(settings, transport)
88+
.orElseGet(SSLContext.getDefault()::createSSLEngine);
89+
90+
SslHandler sslHandler;
91+
if (providedSSLHandler != null) {
92+
sslHandler = providedSSLHandler;
93+
} else {
94+
sslHandler = new SslHandler(sslEngine);
95+
}
96+
ChannelPipeline p = ctx.pipeline();
97+
p.addAfter("port_unification_handler", "ssl_server", sslHandler);
98+
p.remove(this);
99+
logger.debug("Removed port unification handler and added SSL handler as incoming request is SSL");
100+
}
101+
}

0 commit comments

Comments
 (0)