Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

More parameters for tls layer in protocols #63985

Open
wants to merge 14 commits into
base: master
Choose a base branch
from

Conversation

ianton-ru
Copy link
Contributor

@ianton-ru ianton-ru commented May 16, 2024

Changelog category (leave one):

  • Improvement

Changelog entry (a user-readable short description of the changes that goes to CHANGELOG.md):

In composable protocols TLS layer accepted only certificateFile and privateKeyFile parameters.
https://clickhouse.com/docs/en/operations/settings/composable-protocols

This PR adds other parameters:

  • caConfig
  • verificationMode
  • verificationDepth
  • loadDefaultCAFile
  • cipherList/cypherList
  • requireTLSv1, requireTLSv1_1, requireTLSv1_2
  • dhParamsFile
  • ecdhCurve
  • disableProtocols
  • extendedVerification
  • preferServerCiphers

For backwards compatibility parameters used only when both certificateFile and privateKeyFile present, caConfig by default from defaultServerContext, other parameters empty by default.

Also added reusing Context for additional ports instead of recreate on each request and support in CertificateReloader.

@antaljanosbenjamin antaljanosbenjamin added the can be tested Allows running workflows for external contributors label May 16, 2024
@robot-ch-test-poll4 robot-ch-test-poll4 added the pr-improvement Pull request with some product improvements label May 16, 2024
@robot-ch-test-poll4
Copy link
Contributor

robot-ch-test-poll4 commented May 16, 2024

This is an automated comment for commit 983fa64 with description of existing statuses. It's updated for the latest CI running

❌ Click here to open a full report in a separate page

Check nameDescriptionStatus
A SyncThere's no description for the check yet, please add it to tests/ci/ci_config.py:CHECK_DESCRIPTIONS⏳ pending
CI runningA meta-check that indicates the running CI. Normally, it's in success or pending state. The failed status indicates some problems with the PR⏳ pending
Mergeable CheckChecks if all other necessary checks are successful❌ failure
Stateful testsRuns stateful functional tests for ClickHouse binaries built in various configurations -- release, debug, with sanitizers, etc❌ failure
Stateless testsRuns stateless functional tests for ClickHouse binaries built in various configurations -- release, debug, with sanitizers, etc❌ failure
Stress testRuns stateless functional tests concurrently from several clients to detect concurrency-related errors❌ failure
Upgrade checkRuns stress tests on server version from last release and then tries to upgrade it to the version from the PR. It checks if the new server can successfully startup without any errors, crashes or sanitizer asserts❌ failure
Successful checks
Check nameDescriptionStatus
AST fuzzerRuns randomly generated queries to catch program errors. The build type is optionally given in parenthesis. If it fails, ask a maintainer for help✅ success
ClickBenchRuns [ClickBench](https://github.com/ClickHouse/ClickBench/) with instant-attach table✅ success
ClickHouse build checkBuilds ClickHouse in various configurations for use in further steps. You have to fix the builds that fail. Build logs often has enough information to fix the error, but you might have to reproduce the failure locally. The cmake options can be found in the build log, grepping for cmake. Use these options and follow the general build process✅ success
Compatibility checkChecks that clickhouse binary runs on distributions with old libc versions. If it fails, ask a maintainer for help✅ success
Docker keeper imageThe check to build and optionally push the mentioned image to docker hub✅ success
Docker server imageThe check to build and optionally push the mentioned image to docker hub✅ success
Docs checkBuilds and tests the documentation✅ success
Fast testNormally this is the first check that is ran for a PR. It builds ClickHouse and runs most of stateless functional tests, omitting some. If it fails, further checks are not started until it is fixed. Look at the report to see which tests fail, then reproduce the failure locally as described here✅ success
Flaky testsChecks if new added or modified tests are flaky by running them repeatedly, in parallel, with more randomization. Functional tests are run 100 times with address sanitizer, and additional randomization of thread scheduling. Integration tests are run up to 10 times. If at least once a new test has failed, or was too long, this check will be red. We don't allow flaky tests, read the doc✅ success
Install packagesChecks that the built packages are installable in a clear environment✅ success
Integration testsThe integration tests report. In parenthesis the package type is given, and in square brackets are the optional part/total tests✅ success
PR CheckThere's no description for the check yet, please add it to tests/ci/ci_config.py:CHECK_DESCRIPTIONS✅ success
Performance ComparisonMeasure changes in query performance. The performance test report is described in detail here. In square brackets are the optional part/total tests✅ success
Style checkRuns a set of checks to keep the code style clean. If some of tests failed, see the related log from the report✅ success
Unit testsRuns the unit tests for different release types✅ success

, stack_data(stack_data_)
{
#if USE_SSL
params.privateKeyFile = config.getString(prefix + SSLManager::CFG_PRIV_KEY_FILE, "");
Copy link
Contributor Author

@ianton-ru ianton-ru May 17, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The same logic as in Poco::Net::SSLManager::initDefaultContext method.

Possible that better use settings for default context everywhere as default (as for caLocation), but this breaks backwards compatibility for everyone who already uses tls protocol.

@@ -258,6 +258,40 @@ namespace Net
static const std::string CFG_SERVER_PREFIX;
static const std::string CFG_CLIENT_PREFIX;

static const std::string CFG_PRIV_KEY_FILE;
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Move from private to public section to use same names in TLSHandler.

@@ -84,6 +101,49 @@ def test_connections():

assert execute_query_https(server.ip_address, 8444, "SELECT 1") == "1\n"

warnings.filterwarnings("ignore", category=DeprecationWarning)
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suppress python warning about deprecated tls versions (TLSv1_1 and older)

@@ -84,6 +101,49 @@ def test_connections():

assert execute_query_https(server.ip_address, 8444, "SELECT 1") == "1\n"

warnings.filterwarnings("ignore", category=DeprecationWarning)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't check how OpenSSL works, only that it gets new parameters.

@ianton-ru
Copy link
Contributor Author

ianton-ru commented May 17, 2024

Can't understand, what wrong with style in marked lines.
https://github.com/ClickHouse/ClickHouse/actions/runs/9128220719/job/25100164305?pr=63985

UPD. Tabs instead of spaces...

@ianton-ru ianton-ru force-pushed the protocols-tls-extend-params branch from d2fa977 to e5fe443 Compare May 22, 2024 11:49
@ianton-ru ianton-ru force-pushed the protocols-tls-extend-params branch 3 times, most recently from 5bf6534 to a946f4f Compare May 22, 2024 16:18
auto* ctx = Poco::Net::SSLManager::instance().defaultServerContext()->sslContext();
SSL_CTX_set_cert_cb(ctx, callSetCertificate, nullptr);
init_was_not_made = false;
SSL_CTX_set_cert_cb(ctx, callSetCertificate, reinterpret_cast<void *>(pdata));
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

MultiData object must not moved after creation, so pointer can be passed as callback parameter.

void CertificateReloader::tryReloadAll(const Poco::Util::AbstractConfiguration & config)
{
std::unique_lock<std::mutex> lock(data_mutex);
for (auto & item : data_index)
Copy link
Contributor Author

@ianton-ru ianton-ru May 22, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Default server context is keeped here with openSSL.server. as key. Customs contexts - with protocols.<name>. names.

@ianton-ru ianton-ru force-pushed the protocols-tls-extend-params branch 2 times, most recently from ac6d792 to ddad7cf Compare May 23, 2024 12:33
@ianton-ru ianton-ru force-pushed the protocols-tls-extend-params branch from ddad7cf to 983fa64 Compare May 23, 2024 15:53
@CheSema CheSema self-assigned this May 24, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
can be tested Allows running workflows for external contributors pr-improvement Pull request with some product improvements
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants