blob: ad25217a6e126dc1490708780759ea5efdfbc019 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.drill.exec.rpc.user.security;
import com.bettercloud.vault.Vault;
import com.bettercloud.vault.VaultConfig;
import com.bettercloud.vault.response.AuthResponse;
import org.apache.drill.categories.SecurityTest;
import org.apache.drill.common.config.DrillProperties;
import org.apache.drill.exec.ExecConstants;
import org.apache.drill.test.ClientFixture;
import org.apache.drill.test.ClusterFixture;
import org.apache.drill.test.ClusterTest;
import org.junit.BeforeClass;
import org.junit.ClassRule;
import org.junit.Test;
import org.junit.experimental.categories.Category;
import org.testcontainers.utility.DockerImageName;
import org.testcontainers.vault.VaultContainer;
import org.testcontainers.vault.VaultLogLevel;
import java.util.Arrays;
import java.util.List;
import static org.junit.Assert.fail;
@Category(SecurityTest.class)
public class TestVaultUserAuthenticator extends ClusterTest {
private static final String VAULT_ROOT_TOKEN = "vault-token";
private static String vaultAddr;
@ClassRule
public static final VaultContainer<?> vaultContainer =
new VaultContainer<>(DockerImageName.parse("vault").withTag("1.10.3"))
.withLogLevel(VaultLogLevel.Debug)
.withVaultToken(VAULT_ROOT_TOKEN)
.withInitCommand(
"auth enable userpass",
"write auth/userpass/users/alice password=pass1 policies=admins",
"write auth/userpass/users/bob password=buzzkill policies=admins"
);
@BeforeClass
public static void init() throws Exception {
vaultAddr = String.format(
"http://%s:%d",
vaultContainer.getHost(),
vaultContainer.getMappedPort(8200)
);
}
@Test
public void testUserPassAuth() throws Exception {
cluster = ClusterFixture.bareBuilder(dirTestWatcher)
.clusterSize(3)
.configProperty(ExecConstants.ALLOW_LOOPBACK_ADDRESS_BINDING, true)
.configProperty(ExecConstants.USER_AUTHENTICATION_ENABLED, true)
.configProperty(ExecConstants.USER_AUTHENTICATOR_IMPL, "vault")
.configProperty(VaultUserAuthenticator.VAULT_ADDRESS, vaultAddr)
.configProperty(
VaultUserAuthenticator.VAULT_AUTH_METHOD,
VaultUserAuthenticator.VaultAuthMethod.USER_PASS
)
.build();
tryCredentials("notalice", "pass1", cluster, false);
tryCredentials("notbob", "buzzkill", cluster, false);
tryCredentials("alice", "wrong", cluster, false);
tryCredentials("bob", "incorrect", cluster, false);
tryCredentials("alice", "pass1", cluster, true);
tryCredentials("bob", "buzzkill", cluster, true);
}
@Test
public void testVaultTokenAuth() throws Exception {
// Use the Vault client lib to obtain Vault tokens for our test users.
VaultConfig vaultConfig = new VaultConfig()
.address(vaultAddr)
.token(VAULT_ROOT_TOKEN)
.build();
Vault vault = new Vault(vaultConfig);
AuthResponse aliceResp = vault.auth().loginByUserPass("alice", "pass1");
String aliceAuthToken = aliceResp.getAuthClientToken();
AuthResponse bobResp = vault.auth().loginByUserPass("bob", "buzzkill");
String bobAuthToken = bobResp.getAuthClientToken();
// set up a new cluster with a config option selecting Vault token auth
cluster = ClusterFixture.bareBuilder(dirTestWatcher)
.clusterSize(3)
.configProperty(ExecConstants.ALLOW_LOOPBACK_ADDRESS_BINDING, true)
.configProperty(ExecConstants.USER_AUTHENTICATION_ENABLED, true)
.configProperty(ExecConstants.USER_AUTHENTICATOR_IMPL, "vault")
.configProperty(VaultUserAuthenticator.VAULT_ADDRESS, vaultAddr)
.configProperty(
VaultUserAuthenticator.VAULT_AUTH_METHOD,
VaultUserAuthenticator.VaultAuthMethod.VAULT_TOKEN
)
.build();
tryCredentials("notalice", aliceAuthToken, cluster, false);
tryCredentials("notbob", bobAuthToken, cluster, false);
tryCredentials("alice", "wrong", cluster, false);
tryCredentials("bob", "incorrect", cluster, false);
tryCredentials("alice", aliceAuthToken, cluster, true);
tryCredentials("bob", bobAuthToken, cluster, true);
}
private static void tryCredentials(String user, String password, ClusterFixture cluster, boolean shouldSucceed) throws Exception {
try {
ClientFixture client = cluster.clientBuilder()
.property(DrillProperties.USER, user)
.property(DrillProperties.PASSWORD, password)
.build();
// Run few queries using the new client
List<String> queries = Arrays.asList(
"SHOW SCHEMAS",
"USE INFORMATION_SCHEMA",
"SHOW TABLES",
"SELECT * FROM INFORMATION_SCHEMA.`TABLES` WHERE TABLE_NAME LIKE 'COLUMNS'",
"SELECT * FROM cp.`region.json` LIMIT 5");
for (String query : queries) {
client.queryBuilder().sql(query).run();
}
if (!shouldSucceed) {
fail("Expected connect to fail because of incorrect username / password combination, but it succeeded");
}
} catch (IllegalStateException e) {
if (shouldSucceed) {
throw e;
}
}
}
}