v3_auth_test.go 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272
  1. // Copyright 2017 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package integration
  15. import (
  16. "testing"
  17. "time"
  18. "golang.org/x/net/context"
  19. "github.com/coreos/etcd/auth/authpb"
  20. "github.com/coreos/etcd/clientv3"
  21. "github.com/coreos/etcd/etcdserver/api/v3rpc/rpctypes"
  22. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  23. "github.com/coreos/etcd/pkg/testutil"
  24. )
  25. // TestV3AuthEmptyUserGet ensures that a get with an empty user will return an empty user error.
  26. func TestV3AuthEmptyUserGet(t *testing.T) {
  27. defer testutil.AfterTest(t)
  28. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  29. defer clus.Terminate(t)
  30. ctx, cancel := context.WithTimeout(context.TODO(), 30*time.Second)
  31. defer cancel()
  32. api := toGRPC(clus.Client(0))
  33. authSetupRoot(t, api.Auth)
  34. _, err := api.KV.Range(ctx, &pb.RangeRequest{Key: []byte("abc")})
  35. if !eqErrGRPC(err, rpctypes.ErrUserEmpty) {
  36. t.Fatalf("got %v, expected %v", err, rpctypes.ErrUserEmpty)
  37. }
  38. }
  39. // TestV3AuthTokenWithDisable tests that auth won't crash if
  40. // given a valid token when authentication is disabled
  41. func TestV3AuthTokenWithDisable(t *testing.T) {
  42. defer testutil.AfterTest(t)
  43. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  44. defer clus.Terminate(t)
  45. authSetupRoot(t, toGRPC(clus.Client(0)).Auth)
  46. c, cerr := clientv3.New(clientv3.Config{Endpoints: clus.Client(0).Endpoints(), Username: "root", Password: "123"})
  47. if cerr != nil {
  48. t.Fatal(cerr)
  49. }
  50. defer c.Close()
  51. rctx, cancel := context.WithCancel(context.TODO())
  52. donec := make(chan struct{})
  53. go func() {
  54. defer close(donec)
  55. for rctx.Err() == nil {
  56. c.Put(rctx, "abc", "def")
  57. }
  58. }()
  59. time.Sleep(10 * time.Millisecond)
  60. if _, err := c.AuthDisable(context.TODO()); err != nil {
  61. t.Fatal(err)
  62. }
  63. time.Sleep(10 * time.Millisecond)
  64. cancel()
  65. <-donec
  66. }
  67. func TestV3AuthRevision(t *testing.T) {
  68. defer testutil.AfterTest(t)
  69. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  70. defer clus.Terminate(t)
  71. api := toGRPC(clus.Client(0))
  72. ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
  73. presp, perr := api.KV.Put(ctx, &pb.PutRequest{Key: []byte("foo"), Value: []byte("bar")})
  74. cancel()
  75. if perr != nil {
  76. t.Fatal(perr)
  77. }
  78. rev := presp.Header.Revision
  79. ctx, cancel = context.WithTimeout(context.Background(), 5*time.Second)
  80. aresp, aerr := api.Auth.UserAdd(ctx, &pb.AuthUserAddRequest{Name: "root", Password: "123"})
  81. cancel()
  82. if aerr != nil {
  83. t.Fatal(aerr)
  84. }
  85. if aresp.Header.Revision != rev {
  86. t.Fatalf("revision expected %d, got %d", rev, aresp.Header.Revision)
  87. }
  88. }
  89. type user struct {
  90. name string
  91. password string
  92. role string
  93. key string
  94. end string
  95. }
  96. func TestV3AuthWithLeaseRevoke(t *testing.T) {
  97. defer testutil.AfterTest(t)
  98. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  99. defer clus.Terminate(t)
  100. users := []user{
  101. {
  102. name: "user1",
  103. password: "user1-123",
  104. role: "role1",
  105. key: "k1",
  106. end: "k2",
  107. },
  108. }
  109. authSetupUsers(t, toGRPC(clus.Client(0)).Auth, users)
  110. authSetupRoot(t, toGRPC(clus.Client(0)).Auth)
  111. rootc, cerr := clientv3.New(clientv3.Config{Endpoints: clus.Client(0).Endpoints(), Username: "root", Password: "123"})
  112. if cerr != nil {
  113. t.Fatal(cerr)
  114. }
  115. defer rootc.Close()
  116. leaseResp, err := rootc.Grant(context.TODO(), 90)
  117. if err != nil {
  118. t.Fatal(err)
  119. }
  120. leaseID := leaseResp.ID
  121. // permission of k3 isn't granted to user1
  122. _, err = rootc.Put(context.TODO(), "k3", "val", clientv3.WithLease(leaseID))
  123. if err != nil {
  124. t.Fatal(err)
  125. }
  126. userc, cerr := clientv3.New(clientv3.Config{Endpoints: clus.Client(0).Endpoints(), Username: "user1", Password: "user1-123"})
  127. if cerr != nil {
  128. t.Fatal(cerr)
  129. }
  130. defer userc.Close()
  131. _, err = userc.Revoke(context.TODO(), leaseID)
  132. if err == nil {
  133. t.Fatal("revoking from user1 should be failed with permission denied")
  134. }
  135. }
  136. func TestV3AuthWithLeaseAttach(t *testing.T) {
  137. defer testutil.AfterTest(t)
  138. clus := NewClusterV3(t, &ClusterConfig{Size: 1})
  139. defer clus.Terminate(t)
  140. users := []user{
  141. {
  142. name: "user1",
  143. password: "user1-123",
  144. role: "role1",
  145. key: "k1",
  146. end: "k3",
  147. },
  148. {
  149. name: "user2",
  150. password: "user2-123",
  151. role: "role2",
  152. key: "k2",
  153. end: "k4",
  154. },
  155. }
  156. authSetupUsers(t, toGRPC(clus.Client(0)).Auth, users)
  157. authSetupRoot(t, toGRPC(clus.Client(0)).Auth)
  158. user1c, cerr := clientv3.New(clientv3.Config{Endpoints: clus.Client(0).Endpoints(), Username: "user1", Password: "user1-123"})
  159. if cerr != nil {
  160. t.Fatal(cerr)
  161. }
  162. defer user1c.Close()
  163. user2c, cerr := clientv3.New(clientv3.Config{Endpoints: clus.Client(0).Endpoints(), Username: "user2", Password: "user2-123"})
  164. if cerr != nil {
  165. t.Fatal(cerr)
  166. }
  167. defer user2c.Close()
  168. leaseResp, err := user1c.Grant(context.TODO(), 90)
  169. if err != nil {
  170. t.Fatal(err)
  171. }
  172. leaseID := leaseResp.ID
  173. // permission of k2 is also granted to user2
  174. _, err = user1c.Put(context.TODO(), "k2", "val", clientv3.WithLease(leaseID))
  175. if err != nil {
  176. t.Fatal(err)
  177. }
  178. _, err = user2c.Revoke(context.TODO(), leaseID)
  179. if err != nil {
  180. t.Fatal(err)
  181. }
  182. leaseResp, err = user1c.Grant(context.TODO(), 90)
  183. if err != nil {
  184. t.Fatal(err)
  185. }
  186. leaseID = leaseResp.ID
  187. // permission of k1 isn't granted to user2
  188. _, err = user1c.Put(context.TODO(), "k1", "val", clientv3.WithLease(leaseID))
  189. if err != nil {
  190. t.Fatal(err)
  191. }
  192. _, err = user2c.Revoke(context.TODO(), leaseID)
  193. if err == nil {
  194. t.Fatal("revoking from user2 should be failed with permission denied")
  195. }
  196. }
  197. func authSetupUsers(t *testing.T, auth pb.AuthClient, users []user) {
  198. for _, user := range users {
  199. if _, err := auth.UserAdd(context.TODO(), &pb.AuthUserAddRequest{Name: user.name, Password: user.password}); err != nil {
  200. t.Fatal(err)
  201. }
  202. if _, err := auth.RoleAdd(context.TODO(), &pb.AuthRoleAddRequest{Name: user.role}); err != nil {
  203. t.Fatal(err)
  204. }
  205. if _, err := auth.UserGrantRole(context.TODO(), &pb.AuthUserGrantRoleRequest{User: user.name, Role: user.role}); err != nil {
  206. t.Fatal(err)
  207. }
  208. if len(user.key) == 0 {
  209. continue
  210. }
  211. perm := &authpb.Permission{
  212. PermType: authpb.READWRITE,
  213. Key: []byte(user.key),
  214. RangeEnd: []byte(user.end),
  215. }
  216. if _, err := auth.RoleGrantPermission(context.TODO(), &pb.AuthRoleGrantPermissionRequest{Name: user.role, Perm: perm}); err != nil {
  217. t.Fatal(err)
  218. }
  219. }
  220. }
  221. func authSetupRoot(t *testing.T, auth pb.AuthClient) {
  222. root := []user{
  223. {
  224. name: "root",
  225. password: "123",
  226. role: "root",
  227. key: "",
  228. },
  229. }
  230. authSetupUsers(t, auth, root)
  231. if _, err := auth.AuthEnable(context.TODO(), &pb.AuthEnableRequest{}); err != nil {
  232. t.Fatal(err)
  233. }
  234. }