auth_test.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678
  1. // Copyright 2015 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package v2auth
  15. import (
  16. "context"
  17. "reflect"
  18. "testing"
  19. "time"
  20. "go.etcd.io/etcd/etcdserver"
  21. "go.etcd.io/etcd/etcdserver/api/v2error"
  22. "go.etcd.io/etcd/etcdserver/api/v2store"
  23. "go.etcd.io/etcd/etcdserver/etcdserverpb"
  24. "go.uber.org/zap"
  25. )
  26. type fakeDoer struct{}
  27. func (fakeDoer) Do(context.Context, etcdserverpb.Request) (etcdserver.Response, error) {
  28. return etcdserver.Response{}, nil
  29. }
  30. func TestCheckPassword(t *testing.T) {
  31. st := NewStore(zap.NewExample(), fakeDoer{}, 5*time.Second)
  32. u := User{Password: "$2a$10$I3iddh1D..EIOXXQtsra4u8AjOtgEa2ERxVvYGfXFBJDo1omXwP.q"}
  33. matched := st.CheckPassword(u, "foo")
  34. if matched {
  35. t.Fatalf("expected false, got %v", matched)
  36. }
  37. }
  38. const testTimeout = time.Millisecond
  39. func TestMergeUser(t *testing.T) {
  40. tbl := []struct {
  41. input User
  42. merge User
  43. expect User
  44. iserr bool
  45. }{
  46. {
  47. User{User: "foo"},
  48. User{User: "bar"},
  49. User{},
  50. true,
  51. },
  52. {
  53. User{User: "foo"},
  54. User{User: "foo"},
  55. User{User: "foo", Roles: []string{}},
  56. false,
  57. },
  58. {
  59. User{User: "foo"},
  60. User{User: "foo", Grant: []string{"role1"}},
  61. User{User: "foo", Roles: []string{"role1"}},
  62. false,
  63. },
  64. {
  65. User{User: "foo", Roles: []string{"role1"}},
  66. User{User: "foo", Grant: []string{"role1"}},
  67. User{},
  68. true,
  69. },
  70. {
  71. User{User: "foo", Roles: []string{"role1"}},
  72. User{User: "foo", Revoke: []string{"role2"}},
  73. User{},
  74. true,
  75. },
  76. {
  77. User{User: "foo", Roles: []string{"role1"}},
  78. User{User: "foo", Grant: []string{"role2"}},
  79. User{User: "foo", Roles: []string{"role1", "role2"}},
  80. false,
  81. },
  82. { // empty password will not overwrite the previous password
  83. User{User: "foo", Password: "foo", Roles: []string{}},
  84. User{User: "foo", Password: ""},
  85. User{User: "foo", Password: "foo", Roles: []string{}},
  86. false,
  87. },
  88. }
  89. for i, tt := range tbl {
  90. out, err := tt.input.merge(zap.NewExample(), tt.merge, passwordStore{})
  91. if err != nil && !tt.iserr {
  92. t.Fatalf("Got unexpected error on item %d", i)
  93. }
  94. if !tt.iserr {
  95. if !reflect.DeepEqual(out, tt.expect) {
  96. t.Errorf("Unequal merge expectation on item %d: got: %#v, expect: %#v", i, out, tt.expect)
  97. }
  98. }
  99. }
  100. }
  101. func TestMergeRole(t *testing.T) {
  102. tbl := []struct {
  103. input Role
  104. merge Role
  105. expect Role
  106. iserr bool
  107. }{
  108. {
  109. Role{Role: "foo"},
  110. Role{Role: "bar"},
  111. Role{},
  112. true,
  113. },
  114. {
  115. Role{Role: "foo"},
  116. Role{Role: "foo", Grant: &Permissions{KV: RWPermission{Read: []string{"/foodir"}, Write: []string{"/foodir"}}}},
  117. Role{Role: "foo", Permissions: Permissions{KV: RWPermission{Read: []string{"/foodir"}, Write: []string{"/foodir"}}}},
  118. false,
  119. },
  120. {
  121. Role{Role: "foo", Permissions: Permissions{KV: RWPermission{Read: []string{"/foodir"}, Write: []string{"/foodir"}}}},
  122. Role{Role: "foo", Revoke: &Permissions{KV: RWPermission{Read: []string{"/foodir"}, Write: []string{"/foodir"}}}},
  123. Role{Role: "foo", Permissions: Permissions{KV: RWPermission{Read: []string{}, Write: []string{}}}},
  124. false,
  125. },
  126. {
  127. Role{Role: "foo", Permissions: Permissions{KV: RWPermission{Read: []string{"/bardir"}}}},
  128. Role{Role: "foo", Revoke: &Permissions{KV: RWPermission{Read: []string{"/foodir"}}}},
  129. Role{},
  130. true,
  131. },
  132. }
  133. for i, tt := range tbl {
  134. out, err := tt.input.merge(zap.NewExample(), tt.merge)
  135. if err != nil && !tt.iserr {
  136. t.Fatalf("Got unexpected error on item %d", i)
  137. }
  138. if !tt.iserr {
  139. if !reflect.DeepEqual(out, tt.expect) {
  140. t.Errorf("Unequal merge expectation on item %d: got: %#v, expect: %#v", i, out, tt.expect)
  141. }
  142. }
  143. }
  144. }
  145. type testDoer struct {
  146. get []etcdserver.Response
  147. put []etcdserver.Response
  148. getindex int
  149. putindex int
  150. explicitlyEnabled bool
  151. }
  152. func (td *testDoer) Do(_ context.Context, req etcdserverpb.Request) (etcdserver.Response, error) {
  153. if td.explicitlyEnabled && (req.Path == StorePermsPrefix+"/enabled") {
  154. t := "true"
  155. return etcdserver.Response{
  156. Event: &v2store.Event{
  157. Action: v2store.Get,
  158. Node: &v2store.NodeExtern{
  159. Key: StorePermsPrefix + "/users/cat",
  160. Value: &t,
  161. },
  162. },
  163. }, nil
  164. }
  165. if (req.Method == "GET" || req.Method == "QGET") && td.get != nil {
  166. res := td.get[td.getindex]
  167. if res.Event == nil {
  168. td.getindex++
  169. return etcdserver.Response{}, &v2error.Error{
  170. ErrorCode: v2error.EcodeKeyNotFound,
  171. }
  172. }
  173. td.getindex++
  174. return res, nil
  175. }
  176. if req.Method == "PUT" && td.put != nil {
  177. res := td.put[td.putindex]
  178. if res.Event == nil {
  179. td.putindex++
  180. return etcdserver.Response{}, &v2error.Error{
  181. ErrorCode: v2error.EcodeNodeExist,
  182. }
  183. }
  184. td.putindex++
  185. return res, nil
  186. }
  187. return etcdserver.Response{}, nil
  188. }
  189. func TestAllUsers(t *testing.T) {
  190. d := &testDoer{
  191. get: []etcdserver.Response{
  192. {
  193. Event: &v2store.Event{
  194. Action: v2store.Get,
  195. Node: &v2store.NodeExtern{
  196. Nodes: v2store.NodeExterns([]*v2store.NodeExtern{
  197. {
  198. Key: StorePermsPrefix + "/users/cat",
  199. },
  200. {
  201. Key: StorePermsPrefix + "/users/dog",
  202. },
  203. }),
  204. },
  205. },
  206. },
  207. },
  208. }
  209. expected := []string{"cat", "dog"}
  210. s := store{lg: zap.NewExample(), server: d, timeout: testTimeout, ensuredOnce: false}
  211. users, err := s.AllUsers()
  212. if err != nil {
  213. t.Error("Unexpected error", err)
  214. }
  215. if !reflect.DeepEqual(users, expected) {
  216. t.Error("AllUsers doesn't match given store. Got", users, "expected", expected)
  217. }
  218. }
  219. func TestGetAndDeleteUser(t *testing.T) {
  220. data := `{"user": "cat", "roles" : ["animal"]}`
  221. d := &testDoer{
  222. get: []etcdserver.Response{
  223. {
  224. Event: &v2store.Event{
  225. Action: v2store.Get,
  226. Node: &v2store.NodeExtern{
  227. Key: StorePermsPrefix + "/users/cat",
  228. Value: &data,
  229. },
  230. },
  231. },
  232. },
  233. explicitlyEnabled: true,
  234. }
  235. expected := User{User: "cat", Roles: []string{"animal"}}
  236. s := store{lg: zap.NewExample(), server: d, timeout: testTimeout, ensuredOnce: false}
  237. out, err := s.GetUser("cat")
  238. if err != nil {
  239. t.Error("Unexpected error", err)
  240. }
  241. if !reflect.DeepEqual(out, expected) {
  242. t.Error("GetUser doesn't match given store. Got", out, "expected", expected)
  243. }
  244. err = s.DeleteUser("cat")
  245. if err != nil {
  246. t.Error("Unexpected error", err)
  247. }
  248. }
  249. func TestAllRoles(t *testing.T) {
  250. d := &testDoer{
  251. get: []etcdserver.Response{
  252. {
  253. Event: &v2store.Event{
  254. Action: v2store.Get,
  255. Node: &v2store.NodeExtern{
  256. Nodes: v2store.NodeExterns([]*v2store.NodeExtern{
  257. {
  258. Key: StorePermsPrefix + "/roles/animal",
  259. },
  260. {
  261. Key: StorePermsPrefix + "/roles/human",
  262. },
  263. }),
  264. },
  265. },
  266. },
  267. },
  268. explicitlyEnabled: true,
  269. }
  270. expected := []string{"animal", "human", "root"}
  271. s := store{lg: zap.NewExample(), server: d, timeout: testTimeout, ensuredOnce: false}
  272. out, err := s.AllRoles()
  273. if err != nil {
  274. t.Error("Unexpected error", err)
  275. }
  276. if !reflect.DeepEqual(out, expected) {
  277. t.Error("AllRoles doesn't match given store. Got", out, "expected", expected)
  278. }
  279. }
  280. func TestGetAndDeleteRole(t *testing.T) {
  281. data := `{"role": "animal"}`
  282. d := &testDoer{
  283. get: []etcdserver.Response{
  284. {
  285. Event: &v2store.Event{
  286. Action: v2store.Get,
  287. Node: &v2store.NodeExtern{
  288. Key: StorePermsPrefix + "/roles/animal",
  289. Value: &data,
  290. },
  291. },
  292. },
  293. },
  294. explicitlyEnabled: true,
  295. }
  296. expected := Role{Role: "animal"}
  297. s := store{lg: zap.NewExample(), server: d, timeout: testTimeout, ensuredOnce: false}
  298. out, err := s.GetRole("animal")
  299. if err != nil {
  300. t.Error("Unexpected error", err)
  301. }
  302. if !reflect.DeepEqual(out, expected) {
  303. t.Error("GetRole doesn't match given store. Got", out, "expected", expected)
  304. }
  305. err = s.DeleteRole("animal")
  306. if err != nil {
  307. t.Error("Unexpected error", err)
  308. }
  309. }
  310. func TestEnsure(t *testing.T) {
  311. d := &testDoer{
  312. get: []etcdserver.Response{
  313. {
  314. Event: &v2store.Event{
  315. Action: v2store.Set,
  316. Node: &v2store.NodeExtern{
  317. Key: StorePermsPrefix,
  318. Dir: true,
  319. },
  320. },
  321. },
  322. {
  323. Event: &v2store.Event{
  324. Action: v2store.Set,
  325. Node: &v2store.NodeExtern{
  326. Key: StorePermsPrefix + "/users/",
  327. Dir: true,
  328. },
  329. },
  330. },
  331. {
  332. Event: &v2store.Event{
  333. Action: v2store.Set,
  334. Node: &v2store.NodeExtern{
  335. Key: StorePermsPrefix + "/roles/",
  336. Dir: true,
  337. },
  338. },
  339. },
  340. },
  341. }
  342. s := store{lg: zap.NewExample(), server: d, timeout: testTimeout, ensuredOnce: false}
  343. err := s.ensureAuthDirectories()
  344. if err != nil {
  345. t.Error("Unexpected error", err)
  346. }
  347. }
  348. type fastPasswordStore struct {
  349. }
  350. func (fastPasswordStore) CheckPassword(user User, password string) bool {
  351. return user.Password == password
  352. }
  353. func (fastPasswordStore) HashPassword(password string) (string, error) { return password, nil }
  354. func TestCreateAndUpdateUser(t *testing.T) {
  355. olduser := `{"user": "cat", "roles" : ["animal"]}`
  356. newuser := `{"user": "cat", "roles" : ["animal", "pet"]}`
  357. d := &testDoer{
  358. get: []etcdserver.Response{
  359. {
  360. Event: nil,
  361. },
  362. {
  363. Event: &v2store.Event{
  364. Action: v2store.Get,
  365. Node: &v2store.NodeExtern{
  366. Key: StorePermsPrefix + "/users/cat",
  367. Value: &olduser,
  368. },
  369. },
  370. },
  371. {
  372. Event: &v2store.Event{
  373. Action: v2store.Get,
  374. Node: &v2store.NodeExtern{
  375. Key: StorePermsPrefix + "/users/cat",
  376. Value: &olduser,
  377. },
  378. },
  379. },
  380. },
  381. put: []etcdserver.Response{
  382. {
  383. Event: &v2store.Event{
  384. Action: v2store.Update,
  385. Node: &v2store.NodeExtern{
  386. Key: StorePermsPrefix + "/users/cat",
  387. Value: &olduser,
  388. },
  389. },
  390. },
  391. {
  392. Event: &v2store.Event{
  393. Action: v2store.Update,
  394. Node: &v2store.NodeExtern{
  395. Key: StorePermsPrefix + "/users/cat",
  396. Value: &newuser,
  397. },
  398. },
  399. },
  400. },
  401. explicitlyEnabled: true,
  402. }
  403. user := User{User: "cat", Password: "meow", Roles: []string{"animal"}}
  404. update := User{User: "cat", Grant: []string{"pet"}}
  405. expected := User{User: "cat", Roles: []string{"animal", "pet"}}
  406. s := store{lg: zap.NewExample(), server: d, timeout: testTimeout, ensuredOnce: true, PasswordStore: fastPasswordStore{}}
  407. out, created, err := s.CreateOrUpdateUser(user)
  408. if !created {
  409. t.Error("Should have created user, instead updated?")
  410. }
  411. if err != nil {
  412. t.Error("Unexpected error", err)
  413. }
  414. out.Password = "meow"
  415. if !reflect.DeepEqual(out, user) {
  416. t.Error("UpdateUser doesn't match given update. Got", out, "expected", expected)
  417. }
  418. out, created, err = s.CreateOrUpdateUser(update)
  419. if created {
  420. t.Error("Should have updated user, instead created?")
  421. }
  422. if err != nil {
  423. t.Error("Unexpected error", err)
  424. }
  425. if !reflect.DeepEqual(out, expected) {
  426. t.Error("UpdateUser doesn't match given update. Got", out, "expected", expected)
  427. }
  428. }
  429. func TestUpdateRole(t *testing.T) {
  430. oldrole := `{"role": "animal", "permissions" : {"kv": {"read": ["/animal"], "write": []}}}`
  431. newrole := `{"role": "animal", "permissions" : {"kv": {"read": ["/animal"], "write": ["/animal"]}}}`
  432. d := &testDoer{
  433. get: []etcdserver.Response{
  434. {
  435. Event: &v2store.Event{
  436. Action: v2store.Get,
  437. Node: &v2store.NodeExtern{
  438. Key: StorePermsPrefix + "/roles/animal",
  439. Value: &oldrole,
  440. },
  441. },
  442. },
  443. },
  444. put: []etcdserver.Response{
  445. {
  446. Event: &v2store.Event{
  447. Action: v2store.Update,
  448. Node: &v2store.NodeExtern{
  449. Key: StorePermsPrefix + "/roles/animal",
  450. Value: &newrole,
  451. },
  452. },
  453. },
  454. },
  455. explicitlyEnabled: true,
  456. }
  457. update := Role{Role: "animal", Grant: &Permissions{KV: RWPermission{Read: []string{}, Write: []string{"/animal"}}}}
  458. expected := Role{Role: "animal", Permissions: Permissions{KV: RWPermission{Read: []string{"/animal"}, Write: []string{"/animal"}}}}
  459. s := store{lg: zap.NewExample(), server: d, timeout: testTimeout, ensuredOnce: true}
  460. out, err := s.UpdateRole(update)
  461. if err != nil {
  462. t.Error("Unexpected error", err)
  463. }
  464. if !reflect.DeepEqual(out, expected) {
  465. t.Error("UpdateRole doesn't match given update. Got", out, "expected", expected)
  466. }
  467. }
  468. func TestCreateRole(t *testing.T) {
  469. role := `{"role": "animal", "permissions" : {"kv": {"read": ["/animal"], "write": []}}}`
  470. d := &testDoer{
  471. put: []etcdserver.Response{
  472. {
  473. Event: &v2store.Event{
  474. Action: v2store.Create,
  475. Node: &v2store.NodeExtern{
  476. Key: StorePermsPrefix + "/roles/animal",
  477. Value: &role,
  478. },
  479. },
  480. },
  481. {
  482. Event: nil,
  483. },
  484. },
  485. explicitlyEnabled: true,
  486. }
  487. r := Role{Role: "animal", Permissions: Permissions{KV: RWPermission{Read: []string{"/animal"}, Write: []string{}}}}
  488. s := store{lg: zap.NewExample(), server: d, timeout: testTimeout, ensuredOnce: true}
  489. err := s.CreateRole(Role{Role: "root"})
  490. if err == nil {
  491. t.Error("Should error creating root role")
  492. }
  493. err = s.CreateRole(r)
  494. if err != nil {
  495. t.Error("Unexpected error", err)
  496. }
  497. err = s.CreateRole(r)
  498. if err == nil {
  499. t.Error("Creating duplicate role, should error")
  500. }
  501. }
  502. func TestEnableAuth(t *testing.T) {
  503. rootUser := `{"user": "root", "password": ""}`
  504. guestRole := `{"role": "guest", "permissions" : {"kv": {"read": ["*"], "write": ["*"]}}}`
  505. trueval := "true"
  506. falseval := "false"
  507. d := &testDoer{
  508. get: []etcdserver.Response{
  509. {
  510. Event: &v2store.Event{
  511. Action: v2store.Get,
  512. Node: &v2store.NodeExtern{
  513. Key: StorePermsPrefix + "/enabled",
  514. Value: &falseval,
  515. },
  516. },
  517. },
  518. {
  519. Event: &v2store.Event{
  520. Action: v2store.Get,
  521. Node: &v2store.NodeExtern{
  522. Key: StorePermsPrefix + "/user/root",
  523. Value: &rootUser,
  524. },
  525. },
  526. },
  527. {
  528. Event: nil,
  529. },
  530. },
  531. put: []etcdserver.Response{
  532. {
  533. Event: &v2store.Event{
  534. Action: v2store.Create,
  535. Node: &v2store.NodeExtern{
  536. Key: StorePermsPrefix + "/roles/guest",
  537. Value: &guestRole,
  538. },
  539. },
  540. },
  541. {
  542. Event: &v2store.Event{
  543. Action: v2store.Update,
  544. Node: &v2store.NodeExtern{
  545. Key: StorePermsPrefix + "/enabled",
  546. Value: &trueval,
  547. },
  548. },
  549. },
  550. },
  551. explicitlyEnabled: false,
  552. }
  553. s := store{lg: zap.NewExample(), server: d, timeout: testTimeout, ensuredOnce: true}
  554. err := s.EnableAuth()
  555. if err != nil {
  556. t.Error("Unexpected error", err)
  557. }
  558. }
  559. func TestDisableAuth(t *testing.T) {
  560. trueval := "true"
  561. falseval := "false"
  562. d := &testDoer{
  563. get: []etcdserver.Response{
  564. {
  565. Event: &v2store.Event{
  566. Action: v2store.Get,
  567. Node: &v2store.NodeExtern{
  568. Key: StorePermsPrefix + "/enabled",
  569. Value: &falseval,
  570. },
  571. },
  572. },
  573. {
  574. Event: &v2store.Event{
  575. Action: v2store.Get,
  576. Node: &v2store.NodeExtern{
  577. Key: StorePermsPrefix + "/enabled",
  578. Value: &trueval,
  579. },
  580. },
  581. },
  582. },
  583. put: []etcdserver.Response{
  584. {
  585. Event: &v2store.Event{
  586. Action: v2store.Update,
  587. Node: &v2store.NodeExtern{
  588. Key: StorePermsPrefix + "/enabled",
  589. Value: &falseval,
  590. },
  591. },
  592. },
  593. },
  594. explicitlyEnabled: false,
  595. }
  596. s := store{lg: zap.NewExample(), server: d, timeout: testTimeout, ensuredOnce: true}
  597. err := s.DisableAuth()
  598. if err == nil {
  599. t.Error("Expected error; already disabled")
  600. }
  601. err = s.DisableAuth()
  602. if err != nil {
  603. t.Error("Unexpected error", err)
  604. }
  605. }
  606. func TestSimpleMatch(t *testing.T) {
  607. role := Role{Role: "foo", Permissions: Permissions{KV: RWPermission{Read: []string{"/foodir/*", "/fookey"}, Write: []string{"/bardir/*", "/barkey"}}}}
  608. if !role.HasKeyAccess("/foodir/foo/bar", false) {
  609. t.Fatal("role lacks expected access")
  610. }
  611. if !role.HasKeyAccess("/fookey", false) {
  612. t.Fatal("role lacks expected access")
  613. }
  614. if !role.HasRecursiveAccess("/foodir/*", false) {
  615. t.Fatal("role lacks expected access")
  616. }
  617. if !role.HasRecursiveAccess("/foodir/foo*", false) {
  618. t.Fatal("role lacks expected access")
  619. }
  620. if !role.HasRecursiveAccess("/bardir/*", true) {
  621. t.Fatal("role lacks expected access")
  622. }
  623. if !role.HasKeyAccess("/bardir/bar/foo", true) {
  624. t.Fatal("role lacks expected access")
  625. }
  626. if !role.HasKeyAccess("/barkey", true) {
  627. t.Fatal("role lacks expected access")
  628. }
  629. if role.HasKeyAccess("/bardir/bar/foo", false) {
  630. t.Fatal("role has unexpected access")
  631. }
  632. if role.HasKeyAccess("/barkey", false) {
  633. t.Fatal("role has unexpected access")
  634. }
  635. if role.HasKeyAccess("/foodir/foo/bar", true) {
  636. t.Fatal("role has unexpected access")
  637. }
  638. if role.HasKeyAccess("/fookey", true) {
  639. t.Fatal("role has unexpected access")
  640. }
  641. }