Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[PoC] Support ::failures selector and access to failure store with CCS #125448

Closed
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -72,16 +72,32 @@ public void testResolveExpression() {
// === Corner Cases
// Empty index name is not necessarily disallowed, but will be filtered out in the next steps of resolution
assertThat(resolve(selectorsAllowed, "::data"), equalTo(new ResolvedExpression("", DATA)));
assertThat(resolve(selectorsAllowed, "::failures"), equalTo(new ResolvedExpression("", FAILURES)));
// Remote cluster syntax is respected, even if code higher up the call stack is likely to already have handled it already
assertThat(resolve(selectorsAllowed, "cluster:index::data"), equalTo(new ResolvedExpression("cluster:index", DATA)));
// CCS with an empty index name is not necessarily disallowed, though other code in the resolution logic will likely throw
assertThat(resolve(selectorsAllowed, "cluster:::data"), equalTo(new ResolvedExpression("cluster:", DATA)));
// Same for empty cluster and index names
assertThat(resolve(selectorsAllowed, ":::data"), equalTo(new ResolvedExpression(":", DATA)));
assertThat(resolve(selectorsAllowed, ":::failures"), equalTo(new ResolvedExpression(":", FAILURES)));
// Any more prefix colon characters will trigger the multiple separators error logic
expectThrows(InvalidIndexNameException.class, () -> resolve(selectorsAllowed, "::::data"));
expectThrows(InvalidIndexNameException.class, () -> resolve(selectorsAllowed, "::::failures"));
expectThrows(InvalidIndexNameException.class, () -> resolve(selectorsAllowed, ":::::failures"));
// Suffix case is not supported because there is no component named with the empty string
expectThrows(InvalidIndexNameException.class, () -> resolve(selectorsAllowed, "index::"));

assertThat(resolve(selectorsAllowed, "cluster:index::failures"), equalTo(new ResolvedExpression("cluster:index", FAILURES)));
expectThrows(IllegalArgumentException.class, () -> resolve(noSelectors, "cluster:index::failures"));
assertThat(resolve(selectorsAllowed, "cluster-*:index::failures"), equalTo(new ResolvedExpression("cluster-*:index", FAILURES)));
assertThat(
resolve(selectorsAllowed, "cluster-*:index-*::failures"),
equalTo(new ResolvedExpression("cluster-*:index-*", FAILURES))
);
assertThat(resolve(selectorsAllowed, "cluster-*:*::failures"), equalTo(new ResolvedExpression("cluster-*:*", FAILURES)));
assertThat(resolve(selectorsAllowed, "*:index-*::failures"), equalTo(new ResolvedExpression("*:index-*", FAILURES)));
assertThat(resolve(selectorsAllowed, "*:*::failures"), equalTo(new ResolvedExpression("*:*", FAILURES)));
assertThat(resolve(selectorsAllowed, "cluster:::failures"), equalTo(new ResolvedExpression("cluster:", FAILURES)));
}

public void testResolveMatchAllToSelectors() {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,11 @@ public class CrossClusterApiKeyRoleDescriptorBuilder {
Arrays.stream(CCS_CLUSTER_PRIVILEGE_NAMES),
Arrays.stream(CCR_CLUSTER_PRIVILEGE_NAMES)
).toArray(String[]::new);
public static final String[] CCS_INDICES_PRIVILEGE_NAMES = { "read", "read_cross_cluster", "view_index_metadata" };
public static final String[] CCS_INDICES_PRIVILEGE_NAMES = {
"read",
"read_cross_cluster",
"view_index_metadata",
"read_failure_store" };
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

read_failure_store must be granted to cross-cluster API keys

public static final String[] CCR_INDICES_PRIVILEGE_NAMES = { "cross_cluster_replication", "cross_cluster_replication_internal" };
public static final String ROLE_DESCRIPTOR_NAME = "cross_cluster";

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,6 @@
import org.elasticsearch.xpack.core.security.authz.RoleDescriptor;
import org.elasticsearch.xpack.core.security.authz.privilege.ApplicationPrivilege;
import org.elasticsearch.xpack.core.security.authz.privilege.ClusterPrivilegeResolver;
import org.elasticsearch.xpack.core.security.authz.privilege.IndexComponentSelectorPredicate;
import org.elasticsearch.xpack.core.security.authz.privilege.IndexPrivilege;
import org.elasticsearch.xpack.core.security.authz.restriction.WorkflowResolver;
import org.elasticsearch.xpack.core.security.support.MetadataUtils;
Expand Down Expand Up @@ -61,13 +60,7 @@ public static ActionRequestValidationException validate(
validationException = addValidationError("remote index cluster alias cannot be an empty string", validationException);
}
try {
Set<IndexPrivilege> privileges = IndexPrivilege.resolveBySelectorAccess(Set.of(ridp.indicesPrivileges().getPrivileges()));
if (privileges.stream().anyMatch(p -> p.getSelectorPredicate() == IndexComponentSelectorPredicate.FAILURES)) {
validationException = addValidationError(
"remote index privileges cannot contain privileges that grant access to the failure store",
validationException
);
}
IndexPrivilege.resolveBySelectorAccess(Set.of(ridp.indicesPrivileges().getPrivileges()));
} catch (IllegalArgumentException ile) {
validationException = addValidationError(ile.getMessage(), validationException);
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -188,7 +188,11 @@ public final class IndexPrivilege extends Privilege {
public static final IndexPrivilege NONE = new IndexPrivilege("none", Automatons.EMPTY);
public static final IndexPrivilege ALL = new IndexPrivilege("all", ALL_AUTOMATON, IndexComponentSelectorPredicate.ALL);
public static final IndexPrivilege READ = new IndexPrivilege("read", READ_AUTOMATON);
public static final IndexPrivilege READ_CROSS_CLUSTER = new IndexPrivilege("read_cross_cluster", READ_CROSS_CLUSTER_AUTOMATON);
public static final IndexPrivilege READ_CROSS_CLUSTER = new IndexPrivilege(
"read_cross_cluster",
READ_CROSS_CLUSTER_AUTOMATON,
IndexComponentSelectorPredicate.ALL
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is the key part: making the read_cross_cluster authorize both data and failure selectors for cross cluster search.

);
public static final IndexPrivilege CREATE = new IndexPrivilege("create", CREATE_AUTOMATON);
public static final IndexPrivilege INDEX = new IndexPrivilege("index", INDEX_AUTOMATON);
public static final IndexPrivilege DELETE = new IndexPrivilege("delete", DELETE_AUTOMATON);
Expand Down Expand Up @@ -383,6 +387,9 @@ private static Set<IndexPrivilege> resolve(Set<String> name) {
dataSelectorAccessPrivileges.add(indexPrivilege);
} else if (indexPrivilege.selectorPredicate == IndexComponentSelectorPredicate.FAILURES) {
failuresSelectorAccessPrivileges.add(indexPrivilege);
} else if (indexPrivilege.selectorPredicate == IndexComponentSelectorPredicate.ALL) {
failuresSelectorAccessPrivileges.add(indexPrivilege);
dataSelectorAccessPrivileges.add(indexPrivilege);
} else {
String errorMessage = "unexpected selector [" + indexPrivilege.selectorPredicate + "]";
assert false : errorMessage;
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,139 @@
/*
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
* or more contributor license agreements. Licensed under the Elastic License
* 2.0; you may not use this file except in compliance with the Elastic License
* 2.0.
*/

package org.elasticsearch.xpack.remotecluster;

import org.elasticsearch.action.search.SearchResponse;
import org.elasticsearch.client.Request;
import org.elasticsearch.client.RequestOptions;
import org.elasticsearch.client.Response;
import org.elasticsearch.common.xcontent.support.XContentMapValues;
import org.elasticsearch.core.Tuple;
import org.elasticsearch.search.SearchHit;
import org.elasticsearch.search.SearchResponseUtils;

import java.io.IOException;
import java.util.Arrays;
import java.util.Collections;
import java.util.List;
import java.util.Map;
import java.util.stream.Collectors;

import static org.hamcrest.Matchers.containsInAnyOrder;
import static org.hamcrest.Matchers.equalTo;

abstract class AbstractRemoteClusterSecurityFailureStoreRestIT extends AbstractRemoteClusterSecurityTestCase {

protected void assertSearchResponseContainsIndices(Response response, String... expectedIndices) throws IOException {
assertOK(response);
final SearchResponse searchResponse = SearchResponseUtils.parseSearchResponse(responseAsParser(response));
try {
final List<String> actualIndices = Arrays.stream(searchResponse.getHits().getHits())
.map(SearchHit::getIndex)
.collect(Collectors.toList());
assertThat(actualIndices, containsInAnyOrder(expectedIndices));
} finally {
searchResponse.decRef();
}
}

protected void setupTestDataStreamOnFulfillingCluster() throws IOException {
// Create data stream and index some documents
final Request createComponentTemplate = new Request("PUT", "/_component_template/component1");
createComponentTemplate.setJsonEntity("""
{
"template": {
"mappings": {
"properties": {
"@timestamp": {
"type": "date"
},
"age": {
"type": "integer"
},
"email": {
"type": "keyword"
},
"name": {
"type": "text"
}
}
},
"data_stream_options": {
"failure_store": {
"enabled": true
}
}
}
}""");
assertOK(performRequestAgainstFulfillingCluster(createComponentTemplate));

final Request createTemplate = new Request("PUT", "/_index_template/template1");
createTemplate.setJsonEntity("""
{
"index_patterns": ["test*"],
"data_stream": {},
"priority": 500,
"composed_of": ["component1"]
}""");
assertOK(performRequestAgainstFulfillingCluster(createTemplate));

final Request createDoc1 = new Request("PUT", "/test1/_doc/1?refresh=true&op_type=create");
createDoc1.setJsonEntity("""
{
"@timestamp": 1,
"age" : 1,
"name" : "jack",
"email" : "[email protected]"
}""");
assertOK(performRequestAgainstFulfillingCluster(createDoc1));

final Request createDoc2 = new Request("PUT", "/test1/_doc/2?refresh=true&op_type=create");
createDoc2.setJsonEntity("""
{
"@timestamp": 2,
"age" : "this should be an int",
"name" : "jack",
"email" : "[email protected]"
}""");
assertOK(performRequestAgainstFulfillingCluster(createDoc2));
}

protected Response performRequestWithRemoteSearchUser(final Request request) throws IOException {
request.setOptions(
RequestOptions.DEFAULT.toBuilder().addHeader("Authorization", headerFromRandomAuthMethod(REMOTE_SEARCH_USER, PASS))
);
return client().performRequest(request);
}

protected Response performRequestWithUser(final String user, final Request request) throws IOException {
request.setOptions(RequestOptions.DEFAULT.toBuilder().addHeader("Authorization", headerFromRandomAuthMethod(user, PASS)));
return client().performRequest(request);
}

@SuppressWarnings("unchecked")
protected Tuple<List<String>, List<String>> getDataAndFailureIndices(String dataStreamName) throws IOException {
Request dataStream = new Request("GET", "/_data_stream/" + dataStreamName);
Response response = performRequestAgainstFulfillingCluster(dataStream);
Map<String, Object> dataStreams = entityAsMap(response);
assertEquals(Collections.singletonList("test1"), XContentMapValues.extractValue("data_streams.name", dataStreams));
List<String> dataIndexNames = (List<String>) XContentMapValues.extractValue("data_streams.indices.index_name", dataStreams);
List<String> failureIndexNames = (List<String>) XContentMapValues.extractValue(
"data_streams.failure_store.indices.index_name",
dataStreams
);
return new Tuple<>(dataIndexNames, failureIndexNames);
}

protected Tuple<String, String> getSingleDataAndFailureIndices(String dataStreamName) throws IOException {
Tuple<List<String>, List<String>> indices = getDataAndFailureIndices(dataStreamName);
assertThat(indices.v1().size(), equalTo(1));
assertThat(indices.v2().size(), equalTo(1));
return new Tuple<>(indices.v1().get(0), indices.v2().get(0));
}

}
Loading