1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233
|
#
# Validate that Group Replication SSL mode does not work with TLS v1.3 when
# an invalid configuration is set at server runtime.
#
# Steps:
# 0. Configure members to use encryption and save defaults.
# 1. 2 members group with OpenSSL 1.1.1
# Verify that it is not possible to start group replication when :
# * TLS version is 1.3
# * Intersection of the allowed TLS chipersuites for all the members is
# empty.
# server1: --tls-version='TLSv1.3'
# server1: --tls-ciphersuites='TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384'
# server2: --tls-version='TLSv1.3'
# server2: --tls-ciphersuites='TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_CCM_SHA256'
# Outcome: group will not work.
# 2. 2 members group with OpenSSL 1.1.1
# Verify that it is not possible to join a node to a group when
# TLS v1.3 is allowed but there is no compatible ciphersuite :
# * TLS chipersuite of the node is incompatible with the group, therefore
# TLS v1.3 is not supported
# * SLL cipher of the node is compatible with the group
# --tls-version='TLSv1.3'
# server1: --tls-ciphersuites='TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384'
# server1: --ssl-cipher='ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384'
# server2: --tls-ciphersuites='TLS_AES_128_CCM_SHA256'
# server2: --ssl-cipher='DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384'
# Outcome: group will not work.
# 3. Clean up.
#
--source include/big_test.inc
--source include/have_tlsv13.inc
--source include/have_group_replication_plugin.inc
--let $rpl_server_count= 2
--source include/force_restart.inc
--let $rpl_skip_group_replication_start= 1
--source include/group_replication.inc
#check which stack are we using
--let $have_mysql_stack= `SELECT @@group_replication_communication_stack LIKE 'MySQL'`
--echo
--echo ############################################################
--echo # 0. Configure members to use encryption and save defaults.
--let $rpl_connection_name= server1
--source include/rpl_connection.inc
SET @tls_version_save= @@GLOBAL.tls_version;
SET @tls_ciphersuites_save= @@GLOBAL.tls_ciphersuites;
SET @ssl_cipher_save= @@GLOBAL.ssl_cipher;
SET @group_replication_ssl_mode_save= @@GLOBAL.group_replication_ssl_mode;
SET @@GLOBAL.group_replication_ssl_mode= REQUIRED;
if($have_mysql_stack) {
SET @tls_version_recovery_save= @@GLOBAL.group_replication_recovery_tls_version;
SET @tls_ciphersuites_recovery_save= @@GLOBAL.group_replication_recovery_tls_ciphersuites;
SET @ssl_cipher_recovery_save= @@GLOBAL.group_replication_recovery_ssl_cipher;
}
--let $rpl_connection_name= server2
--source include/rpl_connection.inc
SET @tls_version_save= @@GLOBAL.tls_version;
SET @tls_ciphersuites_save= @@GLOBAL.tls_ciphersuites;
SET @ssl_cipher_save= @@GLOBAL.ssl_cipher;
SET @group_replication_ssl_mode_save= @@GLOBAL.group_replication_ssl_mode;
SET @@GLOBAL.group_replication_ssl_mode= REQUIRED;
if($have_mysql_stack) {
SET @tls_version_recovery_save= @@GLOBAL.group_replication_recovery_tls_version;
SET @tls_ciphersuites_recovery_save= @@GLOBAL.group_replication_recovery_tls_ciphersuites;
SET @ssl_cipher_recovery_save= @@GLOBAL.group_replication_recovery_ssl_cipher;
}
SET SESSION sql_log_bin= 0;
call mtr.add_suppression("\\[GCS\\] Error connecting to all peers. Member join failed. Local port:*");
call mtr.add_suppression("\\[GCS\\] The member was unable to join the group.*");
call mtr.add_suppression("Timeout on wait for view after joining group");
call mtr.add_suppression("Error connecting to the local group communication engine instance");
SET SESSION sql_log_bin= 1;
--echo
--echo ############################################################
--echo # 1. 2 members group with OpenSSL 1.1.1
--echo # Verify that it is not possible to start group replication when :
--echo # * TLS version is 1.3
--echo # * Intersection of the allowed TLS chipersuites for all the members
--echo # is empty.
--echo # server1: --tls-version='TLSv1.3'
--echo # server1: --tls-ciphersuites='TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384'
--echo # server2: --tls-version='TLSv1.3'
--echo # server2: --tls-ciphersuites='TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_CCM_SHA256'
--echo # Outcome: group will not work.
--let $rpl_connection_name= server1
--source include/rpl_connection.inc
SET @@GLOBAL.tls_version= 'TLSv1.3';
SET @@GLOBAL.tls_ciphersuites= 'TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384';
if($have_mysql_stack) {
SET @@GLOBAL.group_replication_recovery_tls_version= 'TLSv1.3';
SET @@GLOBAL.group_replication_recovery_tls_ciphersuites= 'TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384';
}
ALTER INSTANCE RELOAD TLS;
--source include/start_and_bootstrap_group_replication.inc
# Try to add 2nd server
--let $rpl_connection_name= server2
--source include/rpl_connection.inc
--replace_result $group_replication_group_name GROUP_REPLICATION_GROUP_NAME
--eval SET GLOBAL group_replication_group_name= "$group_replication_group_name"
SET @@GLOBAL.tls_version= 'TLSv1.3';
SET @@GLOBAL.tls_ciphersuites= 'TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_CCM_SHA256';
if($have_mysql_stack) {
SET @@GLOBAL.group_replication_recovery_tls_version= 'TLSv1.3';
SET @@GLOBAL.group_replication_recovery_tls_ciphersuites= 'TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_CCM_SHA256';
}
ALTER INSTANCE RELOAD TLS;
--error ER_GROUP_REPLICATION_CONFIGURATION
START GROUP_REPLICATION;
if(!$have_mysql_stack) {
--let $assert_file = $MYSQLTEST_VARDIR/tmp/gr_ssl_tls13_runtime_invalid_configuration.2.err
--let $assert_only_after= .*XCom initialized and ready to accept incoming connections.*
--let $assert_select =.*Error connecting using SSL.*
--let $assert_match =.*Error connecting using SSL.*
--let $assert_text = Found the expected error line in the server log.
--source include/assert_grep.inc
}
--let $rpl_connection_name= server1
--source include/rpl_connection.inc
--source include/stop_group_replication.inc
--echo
--echo ############################################################
--echo # 2. 2 members group with OpenSSL 1.1.1
--echo # Verify that it is not possible to join a node to a group when
--echo # TLS v1.3 is allowed but there is no compatible ciphersuite :
--echo # * TLS chipersuite of the node is incompatible with the group,
--echo # therefore TLS v1.3 is not supported
--echo # * SLL cipher of the node is compatible with the group
--echo # --tls-version='TLSv1.3'
--echo # server1: --tls-ciphersuites='TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384'
--echo # server1: --ssl-cipher='ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384'
--echo # server2: --tls-ciphersuites='TLS_AES_128_CCM_SHA256'
--echo # server2: --ssl-cipher='DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384'
--echo # Outcome: group will not work.
--let $rpl_connection_name= server1
--source include/rpl_connection.inc
SET @@GLOBAL.tls_version= 'TLSv1.3';
SET @@GLOBAL.ssl_cipher= 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384';
SET @@GLOBAL.tls_ciphersuites= 'TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384';
if($have_mysql_stack) {
SET @@GLOBAL.group_replication_recovery_tls_version= 'TLSv1.3';
SET @@GLOBAL.group_replication_recovery_ssl_cipher= 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384';
SET @@GLOBAL.group_replication_recovery_tls_ciphersuites= 'TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384';
}
ALTER INSTANCE RELOAD TLS;
--source include/start_and_bootstrap_group_replication.inc
# Try to add 2nd server
--let $rpl_connection_name= server2
--source include/rpl_connection.inc
--replace_result $group_replication_group_name GROUP_REPLICATION_GROUP_NAME
--eval SET GLOBAL group_replication_group_name= "$group_replication_group_name"
SET @@GLOBAL.tls_version= 'TLSv1.3';
SET @@GLOBAL.ssl_cipher= 'DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384';
SET @@GLOBAL.tls_ciphersuites = 'TLS_AES_128_CCM_SHA256';
if($have_mysql_stack) {
SET @@GLOBAL.group_replication_recovery_tls_version= 'TLSv1.3';
SET @@GLOBAL.group_replication_recovery_ssl_cipher= 'DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384';
SET @@GLOBAL.group_replication_recovery_tls_ciphersuites= 'TLS_AES_128_CCM_SHA256';
}
ALTER INSTANCE RELOAD TLS;
--error ER_GROUP_REPLICATION_CONFIGURATION
START GROUP_REPLICATION;
if(!$have_mysql_stack) {
--let $assert_file = $MYSQLTEST_VARDIR/tmp/gr_ssl_tls13_runtime_invalid_configuration.2.err
--let $assert_only_after= .*XCom initialized and ready to accept incoming connections.*
--let $assert_select =.*Error connecting using SSL.*
--let $assert_match =.*Error connecting using SSL.*
--let $assert_text = Found the expected error line in the server log.
--source include/assert_grep.inc
}
--let $rpl_connection_name= server1
--source include/rpl_connection.inc
--source include/stop_group_replication.inc
--echo
--echo ############################################################
--echo # 3. Clean up.
--let $rpl_connection_name= server1
--source include/rpl_connection.inc
SET @@GLOBAL.group_replication_ssl_mode= @group_replication_ssl_mode_save;
SET @@GLOBAL.tls_version= @tls_version_save;
SET @@GLOBAL.tls_ciphersuites= @tls_ciphersuites_save;
SET @@GLOBAL.ssl_cipher = @ssl_cipher_save;
if($have_mysql_stack) {
SET @@GLOBAL.group_replication_recovery_tls_version= @tls_version_recovery_save;
SET @@GLOBAL.group_replication_recovery_tls_ciphersuites= @tls_ciphersuites_recovery_save;
SET @@GLOBAL.group_replication_recovery_ssl_cipher= @ssl_cipher_recovery_save;
}
ALTER INSTANCE RELOAD TLS;
--let $rpl_connection_name= server2
--source include/rpl_connection.inc
SET @@GLOBAL.group_replication_ssl_mode= @group_replication_ssl_mode_save;
SET @@GLOBAL.tls_version= @tls_version_save;
SET @@GLOBAL.tls_ciphersuites= @tls_ciphersuites_save;
SET @@GLOBAL.ssl_cipher = @ssl_cipher_save;
if($have_mysql_stack) {
SET @@GLOBAL.group_replication_recovery_tls_version= @tls_version_recovery_save;
SET @@GLOBAL.group_replication_recovery_tls_ciphersuites= @tls_ciphersuites_recovery_save;
SET @@GLOBAL.group_replication_recovery_ssl_cipher= @ssl_cipher_recovery_save;
}
ALTER INSTANCE RELOAD TLS;
--source include/group_replication_end.inc
|