This is an automated email from the ASF dual-hosted git repository.
andor pushed a commit to branch branch-3.4
in repository https://gitbox.apache.org/repos/asf/zookeeper.git
The following commit(s) were added to refs/heads/branch-3.4 by this push:
new 5ff19e3 ZOOKEEPER-1392: Request READ or ADMIN permission for getAcl()
5ff19e3 is described below
commit 5ff19e3672987bdde2843a3f031e2bf0010e35f1
Author: Andor Molnar <[email protected]>
AuthorDate: Wed Jan 9 17:22:40 2019 +0100
ZOOKEEPER-1392: Request READ or ADMIN permission for getAcl()
---
.../resources/markdown/zookeeperProgrammers.md | 8 +-
.../zookeeper/server/FinalRequestProcessor.java | 33 ++-
.../server/FinalRequestProcessorTest.java | 230 +++++++++++++++++++++
3 files changed, 267 insertions(+), 4 deletions(-)
diff --git a/zookeeper-docs/src/main/resources/markdown/zookeeperProgrammers.md
b/zookeeper-docs/src/main/resources/markdown/zookeeperProgrammers.md
index 8db4b97..d0a003f 100644
--- a/zookeeper-docs/src/main/resources/markdown/zookeeperProgrammers.md
+++ b/zookeeper-docs/src/main/resources/markdown/zookeeperProgrammers.md
@@ -637,6 +637,11 @@ node, but nothing more. (The problem is, if you want to
call
zoo_exists() on a node that doesn't exist, there is no
permission to check.)
+_ADMIN_ permission also has a special role in terms of ACLs:
+in order to retrieve ACLs of a znode user has to have _READ_ or _ADMIN_
+ permission, but without _ADMIN_ permission, digest hash values will be
+masked out.
+
<a name="sc_BuiltinACLSchemes"></a>
#### Builtin ACL Schemes
@@ -746,7 +751,8 @@ node must have the CREATE permission bit set.
\*path,_struct_ ACL_vector
\*acl, _struct_ Stat \*stat);
-This operation returns a node’s ACL info.
+This operation returns a node’s ACL info. The node must have READ or ADMIN
+permission set. Without ADMIN permission, the digest hash values will be
masked out.
* _int_ _zoo_set_acl_
(zhandle_t \*zh, _const_ _char_
diff --git
a/zookeeper-server/src/main/java/org/apache/zookeeper/server/FinalRequestProcessor.java
b/zookeeper-server/src/main/java/org/apache/zookeeper/server/FinalRequestProcessor.java
index 65f7ac0..a492708 100644
---
a/zookeeper-server/src/main/java/org/apache/zookeeper/server/FinalRequestProcessor.java
+++
b/zookeeper-server/src/main/java/org/apache/zookeeper/server/FinalRequestProcessor.java
@@ -20,10 +20,12 @@ package org.apache.zookeeper.server;
import java.io.IOException;
import java.nio.ByteBuffer;
+import java.util.ArrayList;
import java.util.List;
import org.apache.jute.Record;
import org.apache.zookeeper.common.Time;
+import org.apache.zookeeper.data.Id;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.apache.zookeeper.KeeperException;
@@ -309,10 +311,35 @@ public class FinalRequestProcessor implements
RequestProcessor {
GetACLRequest getACLRequest = new GetACLRequest();
ByteBufferInputStream.byteBuffer2Record(request.request,
getACLRequest);
+ DataNode n =
zks.getZKDatabase().getNode(getACLRequest.getPath());
+ if (n == null) {
+ throw new KeeperException.NoNodeException();
+ }
+ PrepRequestProcessor.checkACL(zks,
zks.getZKDatabase().aclForNode(n),
+ ZooDefs.Perms.READ | ZooDefs.Perms.ADMIN,
+ request.authInfo);
+
Stat stat = new Stat();
- List<ACL> acl =
- zks.getZKDatabase().getACL(getACLRequest.getPath(), stat);
- rsp = new GetACLResponse(acl, stat);
+ List<ACL> acl =
+ zks.getZKDatabase().getACL(getACLRequest.getPath(),
stat);
+ try {
+ PrepRequestProcessor.checkACL(zks,
zks.getZKDatabase().aclForNode(n),
+ ZooDefs.Perms.ADMIN,
+ request.authInfo);
+ rsp = new GetACLResponse(acl, stat);
+ } catch (KeeperException.NoAuthException e) {
+ List<ACL> acl1 = new ArrayList<ACL>(acl.size());
+ for (ACL a : acl) {
+ if ("digest".equals(a.getId().getScheme())) {
+ Id id = a.getId();
+ Id id1 = new Id(id.getScheme(),
id.getId().replaceAll(":.*", ":x"));
+ acl1.add(new ACL(a.getPerms(), id1));
+ } else {
+ acl1.add(a);
+ }
+ }
+ rsp = new GetACLResponse(acl1, stat);
+ }
break;
}
case OpCode.getChildren: {
diff --git
a/zookeeper-server/src/test/java/org/apache/zookeeper/server/FinalRequestProcessorTest.java
b/zookeeper-server/src/test/java/org/apache/zookeeper/server/FinalRequestProcessorTest.java
new file mode 100644
index 0000000..c34d7c9
--- /dev/null
+++
b/zookeeper-server/src/test/java/org/apache/zookeeper/server/FinalRequestProcessorTest.java
@@ -0,0 +1,230 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.apache.zookeeper.server;
+
+import org.apache.jute.BinaryOutputArchive;
+import org.apache.jute.Record;
+import org.apache.zookeeper.KeeperException;
+import org.apache.zookeeper.ZooDefs;
+import org.apache.zookeeper.data.ACL;
+import org.apache.zookeeper.data.Id;
+import org.apache.zookeeper.data.Stat;
+import org.apache.zookeeper.proto.GetACLRequest;
+import org.apache.zookeeper.proto.GetACLResponse;
+import org.apache.zookeeper.proto.ReplyHeader;
+import org.junit.Before;
+import org.junit.Test;
+import org.mockito.invocation.InvocationOnMock;
+import org.mockito.stubbing.Answer;
+
+import java.io.ByteArrayOutputStream;
+import java.io.IOException;
+import java.nio.ByteBuffer;
+import java.util.ArrayList;
+import java.util.Arrays;
+import java.util.List;
+
+import static org.hamcrest.Matchers.equalTo;
+import static org.junit.Assert.assertThat;
+import static org.junit.Assert.assertTrue;
+import static org.mockito.Matchers.any;
+import static org.mockito.Matchers.anyString;
+import static org.mockito.Matchers.eq;
+import static org.mockito.Mockito.doAnswer;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.when;
+
+public class FinalRequestProcessorTest {
+ private List<ACL> testACLs = new ArrayList<ACL>();
+ private final Record[] responseRecord = new Record[1];
+ private final ReplyHeader[] replyHeaders = new ReplyHeader[1];
+
+ private ServerCnxn cnxn;
+ private ByteBuffer bb;
+ private FinalRequestProcessor processor;
+
+ @Before
+ public void setUp() throws KeeperException.NoNodeException, IOException {
+ testACLs.clear();
+ testACLs.addAll(Arrays.asList(
+ new ACL(ZooDefs.Perms.ALL, new Id("digest",
"user:secrethash")),
+ new ACL(ZooDefs.Perms.ADMIN, new Id("digest",
"adminuser:adminsecret")),
+ new ACL(ZooDefs.Perms.READ, new Id("world", "anyone"))
+ ));
+
+ ZooKeeperServer zks = new ZooKeeperServer();
+ ZKDatabase db = mock(ZKDatabase.class);
+ String testPath = "/testPath";
+ when(db.getNode(eq(testPath))).thenReturn(new DataNode());
+ when(db.getACL(eq(testPath), any(Stat.class))).thenReturn(testACLs);
+ when(db.aclForNode(any(DataNode.class))).thenReturn(testACLs);
+ zks.setZKDatabase(db);
+ processor = new FinalRequestProcessor(zks);
+
+ cnxn = mock(ServerCnxn.class);
+ doAnswer(new Answer() {
+ @Override
+ public Object answer(InvocationOnMock invocationOnMock) {
+ replyHeaders[0] = (ReplyHeader)
invocationOnMock.getArguments()[0];
+ responseRecord[0] = (Record)
invocationOnMock.getArguments()[1];
+ return null;
+ }
+ }).when(cnxn).sendResponse(any(ReplyHeader.class), any(Record.class),
anyString());
+
+ GetACLRequest getACLRequest = new GetACLRequest();
+ getACLRequest.setPath(testPath);
+ ByteArrayOutputStream baos = new ByteArrayOutputStream();
+ BinaryOutputArchive boa = BinaryOutputArchive.getArchive(baos);
+ getACLRequest.serialize(boa, "request");
+ baos.close();
+ bb = ByteBuffer.wrap(baos.toByteArray());
+ }
+
+ @Test
+ public void testACLDigestHashHiding_NoAuth_WorldCanRead() {
+ // Arrange
+
+ // Act
+ Request r = new Request(cnxn, 0, 0, ZooDefs.OpCode.getACL, bb, new
ArrayList<Id>());
+ processor.processRequest(r);
+
+ // Assert
+ assertMasked(true);
+ }
+
+ @Test
+ public void testACLDigestHashHiding_NoAuth_NoWorld() {
+ // Arrange
+ testACLs.remove(2);
+
+ // Act
+ Request r = new Request(cnxn, 0, 0, ZooDefs.OpCode.getACL, bb, new
ArrayList<Id>());
+ processor.processRequest(r);
+
+ // Assert
+ assertThat(KeeperException.Code.get(replyHeaders[0].getErr()),
equalTo(KeeperException.Code.NOAUTH));
+ }
+
+ @Test
+ public void testACLDigestHashHiding_UserCanRead() {
+ // Arrange
+ List<Id> authInfo = new ArrayList<Id>();
+ authInfo.add(new Id("digest", "otheruser:somesecrethash"));
+
+ // Act
+ Request r = new Request(cnxn, 0, 0, ZooDefs.OpCode.getACL, bb,
authInfo);
+ processor.processRequest(r);
+
+ // Assert
+ assertMasked(true);
+ }
+
+ @Test
+ public void testACLDigestHashHiding_UserCanAll() {
+ // Arrange
+ List<Id> authInfo = new ArrayList<Id>();
+ authInfo.add(new Id("digest", "user:secrethash"));
+
+ // Act
+ Request r = new Request(cnxn, 0, 0, ZooDefs.OpCode.getACL, bb,
authInfo);
+ processor.processRequest(r);
+
+ // Assert
+ assertMasked(false);
+ }
+
+ @Test
+ public void testACLDigestHashHiding_AdminUser() {
+ // Arrange
+ List<Id> authInfo = new ArrayList<Id>();
+ authInfo.add(new Id("digest", "adminuser:adminsecret"));
+
+ // Act
+ Request r = new Request(cnxn, 0, 0, ZooDefs.OpCode.getACL, bb,
authInfo);
+ processor.processRequest(r);
+
+ // Assert
+ assertMasked(false);
+ }
+
+ @Test
+ public void testACLDigestHashHiding_OnlyAdmin() {
+ // Arrange
+ testACLs.clear();
+ testACLs.addAll(Arrays.asList(
+ new ACL(ZooDefs.Perms.READ, new Id("digest",
"user:secrethash")),
+ new ACL(ZooDefs.Perms.ADMIN, new Id("digest",
"adminuser:adminsecret"))
+ ));
+ List<Id> authInfo = new ArrayList<Id>();
+ authInfo.add(new Id("digest", "adminuser:adminsecret"));
+
+ // Act
+ Request r = new Request(cnxn, 0, 0, ZooDefs.OpCode.getACL, bb,
authInfo);
+ processor.processRequest(r);
+
+ // Assert
+ assertTrue("Not a GetACL response. Auth failed?", responseRecord[0]
instanceof GetACLResponse);
+ GetACLResponse rsp = (GetACLResponse)responseRecord[0];
+ assertThat("Number of ACLs in the response are different",
rsp.getAcl().size(), equalTo(2));
+
+ // Verify ACLs in the response
+ assertThat("Password hash mismatch in the response",
rsp.getAcl().get(0).getId().getId(), equalTo("user:secrethash"));
+ assertThat("Password hash mismatch in the response",
rsp.getAcl().get(1).getId().getId(), equalTo("adminuser:adminsecret"));
+ }
+
+ private void assertMasked(boolean masked) {
+ assertTrue("Not a GetACL response. Auth failed?", responseRecord[0]
instanceof GetACLResponse);
+ GetACLResponse rsp = (GetACLResponse)responseRecord[0];
+ assertThat("Number of ACLs in the response are different",
rsp.getAcl().size(), equalTo(3));
+
+ // Verify ACLs in the response
+ assertThat("Invalid ACL list in the response",
rsp.getAcl().get(0).getPerms(), equalTo(ZooDefs.Perms.ALL));
+ assertThat("Invalid ACL list in the response",
rsp.getAcl().get(0).getId().getScheme(), equalTo("digest"));
+ if (masked) {
+ assertThat("Password hash is not masked in the response",
rsp.getAcl().get(0).getId().getId(), equalTo("user:x"));
+ } else {
+ assertThat("Password hash mismatch in the response",
rsp.getAcl().get(0).getId().getId(), equalTo("user:secrethash"));
+ }
+
+ assertThat("Invalid ACL list in the response",
rsp.getAcl().get(1).getPerms(), equalTo(ZooDefs.Perms.ADMIN));
+ assertThat("Invalid ACL list in the response",
rsp.getAcl().get(1).getId().getScheme(), equalTo("digest"));
+ if (masked) {
+ assertThat("Password hash is not masked in the response",
rsp.getAcl().get(1).getId().getId(), equalTo("adminuser:x"));
+ } else {
+ assertThat("Password hash mismatch in the response",
rsp.getAcl().get(1).getId().getId(), equalTo("adminuser:adminsecret"));
+ }
+
+ assertThat("Invalid ACL list in the response",
rsp.getAcl().get(2).getPerms(), equalTo(ZooDefs.Perms.READ));
+ assertThat("Invalid ACL list in the response",
rsp.getAcl().get(2).getId().getScheme(), equalTo("world"));
+ assertThat("Invalid ACL list in the response",
rsp.getAcl().get(2).getId().getId(), equalTo("anyone"));
+
+ // Verify that FinalRequestProcessor hasn't changed the original ACL
objects
+ assertThat("Original ACL list has been modified",
testACLs.get(0).getPerms(), equalTo(ZooDefs.Perms.ALL));
+ assertThat("Original ACL list has been modified",
testACLs.get(0).getId().getScheme(), equalTo("digest"));
+ assertThat("Original ACL list has been modified",
testACLs.get(0).getId().getId(), equalTo("user:secrethash"));
+
+ assertThat("Original ACL list has been modified",
testACLs.get(1).getPerms(), equalTo(ZooDefs.Perms.ADMIN));
+ assertThat("Original ACL list has been modified",
testACLs.get(1).getId().getScheme(), equalTo("digest"));
+ assertThat("Original ACL list has been modified",
testACLs.get(1).getId().getId(), equalTo("adminuser:adminsecret"));
+
+ assertThat("Original ACL list has been modified",
testACLs.get(2).getPerms(), equalTo(ZooDefs.Perms.READ));
+ assertThat("Original ACL list has been modified",
testACLs.get(2).getId().getScheme(), equalTo("world"));
+ assertThat("Original ACL list has been modified",
testACLs.get(2).getId().getId(), equalTo("anyone"));
+ }
+}