| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| package org.apache.cassandra.auth; |
| |
| |
| import java.nio.charset.StandardCharsets; |
| import java.util.Map; |
| |
| import org.junit.Assert; |
| import org.junit.Before; |
| import org.junit.BeforeClass; |
| import org.junit.Test; |
| |
| import org.apache.cassandra.distributed.shared.WithProperties; |
| import org.mindrot.jbcrypt.BCrypt; |
| |
| import com.datastax.driver.core.Authenticator; |
| import com.datastax.driver.core.EndPoint; |
| import com.datastax.driver.core.PlainTextAuthProvider; |
| import org.apache.cassandra.SchemaLoader; |
| import org.apache.cassandra.config.DatabaseDescriptor; |
| import org.apache.cassandra.cql3.CQLTester; |
| import org.apache.cassandra.db.ColumnFamilyStore; |
| import org.apache.cassandra.exceptions.AuthenticationException; |
| import org.apache.cassandra.exceptions.ConfigurationException; |
| import org.apache.cassandra.schema.SchemaConstants; |
| import org.apache.cassandra.service.StorageService; |
| |
| import static org.apache.cassandra.auth.AuthTestUtils.ALL_ROLES; |
| import static org.apache.cassandra.auth.CassandraRoleManager.DEFAULT_SUPERUSER_PASSWORD; |
| import static org.apache.cassandra.auth.CassandraRoleManager.getGensaltLogRounds; |
| import static org.apache.cassandra.auth.PasswordAuthenticator.SaslNegotiator; |
| import static org.apache.cassandra.auth.PasswordAuthenticator.checkpw; |
| import static org.apache.cassandra.config.CassandraRelevantProperties.AUTH_BCRYPT_GENSALT_LOG2_ROUNDS; |
| import static org.junit.Assert.assertEquals; |
| import static org.junit.Assert.assertFalse; |
| import static org.junit.Assert.assertTrue; |
| import static org.mindrot.jbcrypt.BCrypt.gensalt; |
| import static org.mindrot.jbcrypt.BCrypt.hashpw; |
| |
| public class PasswordAuthenticatorTest extends CQLTester |
| { |
| private final static PasswordAuthenticator authenticator = new PasswordAuthenticator(); |
| |
| @BeforeClass |
| public static void setupClass() throws Exception |
| { |
| SchemaLoader.loadSchema(); |
| DatabaseDescriptor.daemonInitialization(); |
| StorageService.instance.initServer(0); |
| } |
| |
| @Before |
| public void setup() throws Exception |
| { |
| ColumnFamilyStore.getIfExists(SchemaConstants.AUTH_KEYSPACE_NAME, AuthKeyspace.ROLES).truncateBlocking(); |
| ColumnFamilyStore.getIfExists(SchemaConstants.AUTH_KEYSPACE_NAME, AuthKeyspace.ROLE_MEMBERS).truncateBlocking(); |
| } |
| |
| @Test |
| public void testCheckpw() |
| { |
| // Valid and correct |
| assertTrue(checkpw(DEFAULT_SUPERUSER_PASSWORD, hashpw(DEFAULT_SUPERUSER_PASSWORD, gensalt(getGensaltLogRounds())))); |
| assertTrue(checkpw(DEFAULT_SUPERUSER_PASSWORD, hashpw(DEFAULT_SUPERUSER_PASSWORD, gensalt(4)))); |
| assertTrue(checkpw(DEFAULT_SUPERUSER_PASSWORD, hashpw(DEFAULT_SUPERUSER_PASSWORD, gensalt(12)))); |
| |
| // Valid but incorrect hashes |
| assertFalse(checkpw(DEFAULT_SUPERUSER_PASSWORD, hashpw("incorrect0", gensalt(4)))); |
| assertFalse(checkpw(DEFAULT_SUPERUSER_PASSWORD, hashpw("incorrect1", gensalt(10)))); |
| assertFalse(checkpw(DEFAULT_SUPERUSER_PASSWORD, hashpw("incorrect2", gensalt(12)))); |
| |
| // Invalid hash values, the jBCrypt library implementation |
| // throws an exception which we catch and treat as a failure |
| assertFalse(checkpw(DEFAULT_SUPERUSER_PASSWORD, "")); |
| assertFalse(checkpw(DEFAULT_SUPERUSER_PASSWORD, "0")); |
| assertFalse(checkpw(DEFAULT_SUPERUSER_PASSWORD, |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX")); |
| |
| // Format is structurally right, but actually invalid |
| // bad salt version |
| assertFalse(checkpw(DEFAULT_SUPERUSER_PASSWORD, "$5x$10$abcdefghijklmnopqrstuvABCDEFGHIJKLMNOPQRSTUVWXYZ01234")); |
| // invalid number of rounds, multiple salt versions but it's the rounds that are incorrect |
| assertFalse(checkpw(DEFAULT_SUPERUSER_PASSWORD, "$2$02$abcdefghijklmnopqrstuvABCDEFGHIJKLMNOPQRSTUVWXYZ01234")); |
| assertFalse(checkpw(DEFAULT_SUPERUSER_PASSWORD, "$2a$02$abcdefghijklmnopqrstuvABCDEFGHIJKLMNOPQRSTUVWXYZ01234")); |
| assertFalse(checkpw(DEFAULT_SUPERUSER_PASSWORD, "$2$99$abcdefghijklmnopqrstuvABCDEFGHIJKLMNOPQRSTUVWXYZ01234")); |
| assertFalse(checkpw(DEFAULT_SUPERUSER_PASSWORD, "$2a$99$abcdefghijklmnopqrstuvABCDEFGHIJKLMNOPQRSTUVWXYZ01234")); |
| // unpadded rounds |
| assertFalse(checkpw(DEFAULT_SUPERUSER_PASSWORD, "$2$6$abcdefghijklmnopqrstuvABCDEFGHIJKLMNOPQRSTUVWXYZ01234")); |
| assertFalse(checkpw(DEFAULT_SUPERUSER_PASSWORD, "$2a$6$abcdefghijklmnopqrstuvABCDEFGHIJKLMNOPQRSTUVWXYZ01234")); |
| } |
| |
| @Test(expected = ConfigurationException.class) |
| public void testInvalidUpperBoundHashingRoundsValue() |
| { |
| executeSaltRoundsPropertyTest(31); |
| } |
| |
| @Test(expected = ConfigurationException.class) |
| public void testInvalidLowerBoundHashingRoundsValue() |
| { |
| executeSaltRoundsPropertyTest(3); |
| } |
| |
| private void executeSaltRoundsPropertyTest(Integer rounds) |
| { |
| try (WithProperties properties = new WithProperties().set(AUTH_BCRYPT_GENSALT_LOG2_ROUNDS, rounds)) |
| { |
| getGensaltLogRounds(); |
| Assert.fail("Property " + AUTH_BCRYPT_GENSALT_LOG2_ROUNDS.getKey() + " must be in interval [4,30]"); |
| } |
| } |
| |
| @Test(expected = AuthenticationException.class) |
| public void testEmptyUsername() |
| { |
| testDecodeIllegalUserAndPwd("", "pwd"); |
| } |
| |
| @Test(expected = AuthenticationException.class) |
| public void testEmptyPassword() |
| { |
| testDecodeIllegalUserAndPwd("user", ""); |
| } |
| |
| @Test(expected = AuthenticationException.class) |
| public void testNULUsername0() |
| { |
| byte[] user = {'u', 's', PasswordAuthenticator.NUL, 'e', 'r'}; |
| testDecodeIllegalUserAndPwd(new String(user, StandardCharsets.UTF_8), "pwd"); |
| } |
| |
| @Test(expected = AuthenticationException.class) |
| public void testNULUsername1() |
| { |
| testDecodeIllegalUserAndPwd(new String(new byte[4]), "pwd"); |
| } |
| |
| @Test(expected = AuthenticationException.class) |
| public void testNULPassword0() |
| { |
| byte[] pwd = {'p', 'w', PasswordAuthenticator.NUL, 'd'}; |
| testDecodeIllegalUserAndPwd("user", new String(pwd, StandardCharsets.UTF_8)); |
| } |
| |
| @Test(expected = AuthenticationException.class) |
| public void testNULPassword1() |
| { |
| testDecodeIllegalUserAndPwd("user", new String(new byte[4])); |
| } |
| |
| private void testDecodeIllegalUserAndPwd(String username, String password) |
| { |
| SaslNegotiator negotiator = authenticator.newSaslNegotiator(null); |
| Authenticator clientAuthenticator = (new PlainTextAuthProvider(username, password)) |
| .newAuthenticator((EndPoint) null, null); |
| |
| negotiator.evaluateResponse(clientAuthenticator.initialResponse()); |
| negotiator.getAuthenticatedUser(); |
| } |
| |
| @Test |
| public void warmCacheLoadsAllEntriesFromTables() |
| { |
| IRoleManager roleManager = new AuthTestUtils.LocalCassandraRoleManager(); |
| roleManager.setup(); |
| for (RoleResource r : ALL_ROLES) |
| { |
| RoleOptions options = new RoleOptions(); |
| options.setOption(IRoleManager.Option.PASSWORD, "hash_for_" + r.getRoleName()); |
| roleManager.createRole(AuthenticatedUser.ANONYMOUS_USER, r, options); |
| } |
| |
| Map<String, String> cacheEntries = authenticator.bulkLoader().get(); |
| |
| assertEquals(ALL_ROLES.length, cacheEntries.size()); |
| cacheEntries.forEach((username, hash) -> assertTrue(BCrypt.checkpw("hash_for_" + username, hash))); |
| } |
| |
| @Test |
| public void warmCacheWithEmptyTable() |
| { |
| Map<String, String> cacheEntries = authenticator.bulkLoader().get(); |
| assertTrue(cacheEntries.isEmpty()); |
| } |
| } |