ctl_v3_auth_test.go 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package e2e
  15. import (
  16. "fmt"
  17. "testing"
  18. )
  19. func TestCtlV3AuthEnable(t *testing.T) { testCtl(t, authEnableTest) }
  20. func TestCtlV3AuthDisable(t *testing.T) { testCtl(t, authDisableTest) }
  21. func TestCtlV3AuthWriteKey(t *testing.T) { testCtl(t, authCredWriteKeyTest) }
  22. func TestCtlV3AuthRoleUpdate(t *testing.T) { testCtl(t, authRoleUpdateTest) }
  23. func TestCtlV3AuthUserDeleteDuringOps(t *testing.T) { testCtl(t, authUserDeleteDuringOpsTest) }
  24. func authEnableTest(cx ctlCtx) {
  25. if err := authEnable(cx); err != nil {
  26. cx.t.Fatal(err)
  27. }
  28. }
  29. func authEnable(cx ctlCtx) error {
  30. // create root user with root role
  31. if err := ctlV3User(cx, []string{"add", "root", "--interactive=false"}, "User root created", []string{"root"}); err != nil {
  32. return fmt.Errorf("failed to create root user %v", err)
  33. }
  34. if err := ctlV3User(cx, []string{"grant-role", "root", "root"}, "Role root is granted to user root", nil); err != nil {
  35. return fmt.Errorf("failed to grant root user root role %v", err)
  36. }
  37. if err := ctlV3AuthEnable(cx); err != nil {
  38. return fmt.Errorf("authEnableTest ctlV3AuthEnable error (%v)", err)
  39. }
  40. return nil
  41. }
  42. func ctlV3AuthEnable(cx ctlCtx) error {
  43. cmdArgs := append(cx.PrefixArgs(), "auth", "enable")
  44. return spawnWithExpect(cmdArgs, "Authentication Enabled")
  45. }
  46. func authDisableTest(cx ctlCtx) {
  47. if err := ctlV3AuthDisable(cx); err != nil {
  48. cx.t.Fatalf("authDisableTest ctlV3AuthDisable error (%v)", err)
  49. }
  50. }
  51. func ctlV3AuthDisable(cx ctlCtx) error {
  52. cmdArgs := append(cx.PrefixArgs(), "auth", "disable")
  53. return spawnWithExpect(cmdArgs, "Authentication Disabled")
  54. }
  55. func authCredWriteKeyTest(cx ctlCtx) {
  56. // baseline key to check for failed puts
  57. if err := ctlV3Put(cx, "foo", "a", ""); err != nil {
  58. cx.t.Fatal(err)
  59. }
  60. if err := authEnable(cx); err != nil {
  61. cx.t.Fatal(err)
  62. }
  63. cx.user, cx.pass = "root", "root"
  64. authSetupTestUser(cx)
  65. // confirm root role doesn't grant access to all keys
  66. if err := ctlV3PutFailPerm(cx, "foo", "bar"); err != nil {
  67. cx.t.Fatal(err)
  68. }
  69. if err := ctlV3GetFailPerm(cx, "foo"); err != nil {
  70. cx.t.Fatal(err)
  71. }
  72. // try invalid user
  73. cx.user, cx.pass = "a", "b"
  74. if err := ctlV3PutFailAuth(cx, "foo", "bar"); err != nil {
  75. cx.t.Fatal(err)
  76. }
  77. // confirm put failed
  78. cx.user, cx.pass = "test-user", "pass"
  79. if err := ctlV3Get(cx, []string{"foo"}, []kv{{"foo", "a"}}...); err != nil {
  80. cx.t.Fatal(err)
  81. }
  82. // try good user
  83. cx.user, cx.pass = "test-user", "pass"
  84. if err := ctlV3Put(cx, "foo", "bar", ""); err != nil {
  85. cx.t.Fatal(err)
  86. }
  87. // confirm put succeeded
  88. if err := ctlV3Get(cx, []string{"foo"}, []kv{{"foo", "bar"}}...); err != nil {
  89. cx.t.Fatal(err)
  90. }
  91. // try bad password
  92. cx.user, cx.pass = "test-user", "badpass"
  93. if err := ctlV3PutFailAuth(cx, "foo", "baz"); err != nil {
  94. cx.t.Fatal(err)
  95. }
  96. // confirm put failed
  97. cx.user, cx.pass = "test-user", "pass"
  98. if err := ctlV3Get(cx, []string{"foo"}, []kv{{"foo", "bar"}}...); err != nil {
  99. cx.t.Fatal(err)
  100. }
  101. }
  102. func authRoleUpdateTest(cx ctlCtx) {
  103. if err := ctlV3Put(cx, "foo", "bar", ""); err != nil {
  104. cx.t.Fatal(err)
  105. }
  106. if err := authEnable(cx); err != nil {
  107. cx.t.Fatal(err)
  108. }
  109. cx.user, cx.pass = "root", "root"
  110. authSetupTestUser(cx)
  111. // try put to not granted key
  112. cx.user, cx.pass = "test-user", "pass"
  113. if err := ctlV3PutFailPerm(cx, "hoo", "bar"); err != nil {
  114. cx.t.Fatal(err)
  115. }
  116. // grant a new key
  117. cx.user, cx.pass = "root", "root"
  118. if err := ctlV3RoleGrantPermission(cx, "test-role", grantingPerm{true, true, "hoo", ""}); err != nil {
  119. cx.t.Fatal(err)
  120. }
  121. // try a newly granted key
  122. cx.user, cx.pass = "test-user", "pass"
  123. if err := ctlV3Put(cx, "hoo", "bar", ""); err != nil {
  124. cx.t.Fatal(err)
  125. }
  126. // confirm put succeeded
  127. if err := ctlV3Get(cx, []string{"hoo"}, []kv{{"hoo", "bar"}}...); err != nil {
  128. cx.t.Fatal(err)
  129. }
  130. // revoke the newly granted key
  131. cx.user, cx.pass = "root", "root"
  132. if err := ctlV3RoleRevokePermission(cx, "test-role", "hoo", ""); err != nil {
  133. cx.t.Fatal(err)
  134. }
  135. // try put to the revoked key
  136. cx.user, cx.pass = "test-user", "pass"
  137. if err := ctlV3PutFailPerm(cx, "hoo", "bar"); err != nil {
  138. cx.t.Fatal(err)
  139. }
  140. // confirm a key still granted can be accessed
  141. if err := ctlV3Get(cx, []string{"foo"}, []kv{{"foo", "bar"}}...); err != nil {
  142. cx.t.Fatal(err)
  143. }
  144. }
  145. func authUserDeleteDuringOpsTest(cx ctlCtx) {
  146. if err := ctlV3Put(cx, "foo", "bar", ""); err != nil {
  147. cx.t.Fatal(err)
  148. }
  149. if err := authEnable(cx); err != nil {
  150. cx.t.Fatal(err)
  151. }
  152. cx.user, cx.pass = "root", "root"
  153. authSetupTestUser(cx)
  154. // create a key
  155. cx.user, cx.pass = "test-user", "pass"
  156. if err := ctlV3Put(cx, "foo", "bar", ""); err != nil {
  157. cx.t.Fatal(err)
  158. }
  159. // confirm put succeeded
  160. if err := ctlV3Get(cx, []string{"foo"}, []kv{{"foo", "bar"}}...); err != nil {
  161. cx.t.Fatal(err)
  162. }
  163. // delete the user
  164. cx.user, cx.pass = "root", "root"
  165. err := ctlV3User(cx, []string{"delete", "test-user"}, "User test-user deleted", []string{})
  166. if err != nil {
  167. cx.t.Fatal(err)
  168. }
  169. // check the user is deleted
  170. cx.user, cx.pass = "test-user", "pass"
  171. if err := ctlV3PutFailAuth(cx, "foo", "baz"); err != nil {
  172. cx.t.Fatal(err)
  173. }
  174. }
  175. func ctlV3PutFailAuth(cx ctlCtx, key, val string) error {
  176. return spawnWithExpect(append(cx.PrefixArgs(), "put", key, val), "authentication failed")
  177. }
  178. func ctlV3PutFailPerm(cx ctlCtx, key, val string) error {
  179. return spawnWithExpect(append(cx.PrefixArgs(), "put", key, val), "permission denied")
  180. }
  181. func ctlV3GetFailPerm(cx ctlCtx, key string) error {
  182. return spawnWithExpect(append(cx.PrefixArgs(), "get", key), "permission denied")
  183. }
  184. func authSetupTestUser(cx ctlCtx) {
  185. if err := ctlV3User(cx, []string{"add", "test-user", "--interactive=false"}, "User test-user created", []string{"pass"}); err != nil {
  186. cx.t.Fatal(err)
  187. }
  188. if err := spawnWithExpect(append(cx.PrefixArgs(), "role", "add", "test-role"), "Role test-role created"); err != nil {
  189. cx.t.Fatal(err)
  190. }
  191. if err := ctlV3User(cx, []string{"grant-role", "test-user", "test-role"}, "Role test-role is granted to user test-user", nil); err != nil {
  192. cx.t.Fatal(err)
  193. }
  194. cmd := append(cx.PrefixArgs(), "role", "grant-permission", "test-role", "readwrite", "foo")
  195. if err := spawnWithExpect(cmd, "Role test-role updated"); err != nil {
  196. cx.t.Fatal(err)
  197. }
  198. }