Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
import org.apache.logging.log4j.Logger;
import org.elasticsearch.action.ActionListener;
import org.elasticsearch.action.support.DestructiveOperations;
import org.elasticsearch.common.util.concurrent.ListenableFuture;
import org.elasticsearch.common.util.concurrent.ThreadContext;
import org.elasticsearch.license.LicenseUtils;
import org.elasticsearch.license.XPackLicenseState;
Expand Down Expand Up @@ -71,27 +72,25 @@ final class CrossClusterAccessServerTransportFilter extends ServerTransportFilte
}

@Override
protected void authenticate(
final String securityAction,
final TransportRequest request,
final ActionListener<Authentication> authenticationListener
) {
protected ListenableFuture<Authentication> authenticate(final String securityAction, final TransportRequest request) {
final ListenableFuture<Authentication> listener = new ListenableFuture<>();
if (false == Security.ADVANCED_REMOTE_CLUSTER_SECURITY_FEATURE.check(licenseState)) {
onFailureWithDebugLog(
securityAction,
request,
authenticationListener,
listener,
LicenseUtils.newComplianceException(Security.ADVANCED_REMOTE_CLUSTER_SECURITY_FEATURE.getName())
);
} else {
try {
validateHeaders();
} catch (Exception ex) {
onFailureWithDebugLog(securityAction, request, authenticationListener, ex);
return;
onFailureWithDebugLog(securityAction, request, listener, ex);
return listener;
}
crossClusterAccessAuthcService.authenticate(securityAction, request, authenticationListener);
crossClusterAccessAuthcService.authenticate(securityAction, request, listener);
}
return listener;
}

private void validateHeaders() {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@
import org.elasticsearch.action.admin.indices.delete.TransportDeleteIndexAction;
import org.elasticsearch.action.admin.indices.open.OpenIndexAction;
import org.elasticsearch.action.support.DestructiveOperations;
import org.elasticsearch.common.util.concurrent.ListenableFuture;
import org.elasticsearch.common.util.concurrent.ThreadContext;
import org.elasticsearch.transport.TaskTransportChannel;
import org.elasticsearch.transport.TcpChannel;
Expand Down Expand Up @@ -102,29 +103,44 @@ requests from all the nodes are attached with a user (either a serialize
}

TransportVersion version = transportChannel.getVersion();
authenticate(securityAction, request, listener.delegateFailureAndWrap((l, authentication) -> {
if (authentication != null) {
if (securityAction.equals(TransportService.HANDSHAKE_ACTION_NAME)
&& SystemUser.is(authentication.getEffectiveSubject().getUser()) == false) {
securityContext.executeAsSystemUser(version, original -> {
final Authentication replaced = securityContext.getAuthentication();
authzService.authorize(replaced, securityAction, request, l);
});
} else {
authzService.authorize(authentication, securityAction, request, l);
}
var authFuture = authenticate(securityAction, request);
if (authFuture.isSuccess()) {
handleAuthentication(request, listener, authFuture.result(), securityAction, version);
} else {
authFuture.addListener(
listener.delegateFailureAndWrap(
(l, authentication) -> handleAuthentication(request, l, authentication, securityAction, version)
)
);
}
}

private void handleAuthentication(
TransportRequest request,
ActionListener<Void> listener,
Authentication authentication,
String securityAction,
TransportVersion version
) {
if (authentication != null) {
if (securityAction.equals(TransportService.HANDSHAKE_ACTION_NAME)
&& SystemUser.is(authentication.getEffectiveSubject().getUser()) == false) {
securityContext.executeAsSystemUser(version, original -> {
final Authentication replaced = securityContext.getAuthentication();
authzService.authorize(replaced, securityAction, request, listener);
});
} else {
l.onFailure(new IllegalStateException("no authentication present but auth is allowed"));
authzService.authorize(authentication, securityAction, request, listener);
}
}));
} else {
listener.onFailure(new IllegalStateException("no authentication present but auth is allowed"));
}
}

protected void authenticate(
final String securityAction,
final TransportRequest request,
final ActionListener<Authentication> authenticationListener
) {
authcService.authenticate(securityAction, request, true, authenticationListener);
protected ListenableFuture<Authentication> authenticate(final String securityAction, final TransportRequest request) {
final ListenableFuture<Authentication> listener = new ListenableFuture<>();
authcService.authenticate(securityAction, request, true, listener);
return listener;
}

protected final ThreadContext getThreadContext() {
Expand Down