Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -15,17 +15,28 @@
import org.elasticsearch.common.settings.IndexScopedSettings;
import org.elasticsearch.common.settings.Settings;
import org.elasticsearch.common.settings.SettingsFilter;
import org.elasticsearch.env.Environment;
import org.elasticsearch.features.NodeFeature;
import org.elasticsearch.plugins.ActionPlugin;
import org.elasticsearch.plugins.Plugin;
import org.elasticsearch.rest.RestController;
import org.elasticsearch.rest.RestHandler;

import java.util.Collection;
import java.util.List;
import java.util.function.Predicate;
import java.util.function.Supplier;

public class EntitlementTestPlugin extends Plugin implements ActionPlugin {

private Environment environment;

@Override
public Collection<?> createComponents(PluginServices services) {
environment = services.environment();
return super.createComponents(services);
}

@Override
public List<RestHandler> getRestHandlers(
final Settings settings,
Expand All @@ -38,6 +49,6 @@ public List<RestHandler> getRestHandlers(
final Supplier<DiscoveryNodes> nodesInCluster,
Predicate<NodeFeature> clusterSupportsFeature
) {
return List.of(new RestEntitlementsCheckAction());
return List.of(new RestEntitlementsCheckAction(environment));
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@
import org.elasticsearch.core.CheckedRunnable;
import org.elasticsearch.core.SuppressForbidden;
import org.elasticsearch.entitlement.qa.entitled.EntitledActions;
import org.elasticsearch.env.Environment;

import java.io.File;
import java.io.FileDescriptor;
Expand All @@ -22,9 +23,11 @@
import java.io.FileWriter;
import java.io.IOException;
import java.io.RandomAccessFile;
import java.net.URISyntaxException;
import java.net.http.HttpRequest;
import java.net.http.HttpResponse;
import java.nio.charset.StandardCharsets;
import java.nio.file.Files;
import java.nio.file.Path;
import java.nio.file.Paths;
import java.security.GeneralSecurityException;
Expand All @@ -43,6 +46,7 @@
import static java.util.zip.ZipFile.OPEN_DELETE;
import static java.util.zip.ZipFile.OPEN_READ;
import static org.elasticsearch.entitlement.qa.entitled.EntitledActions.createTempFileForWrite;
import static org.elasticsearch.entitlement.qa.test.EntitlementTest.ExpectedAccess.ALWAYS_ALLOWED;
import static org.elasticsearch.entitlement.qa.test.EntitlementTest.ExpectedAccess.ALWAYS_DENIED;
import static org.elasticsearch.entitlement.qa.test.EntitlementTest.ExpectedAccess.PLUGINS;

Expand Down Expand Up @@ -563,6 +567,30 @@ static void httpResponseBodySubscribersOfFile_FileOpenOptions_readOnly() {
HttpResponse.BodySubscribers.ofFile(readFile(), CREATE, WRITE);
}

@EntitlementTest(expectedAccess = ALWAYS_ALLOWED)
static void readAccessConfigDirectory(Environment environment) {
Files.exists(environment.configDir());
}

@EntitlementTest(expectedAccess = ALWAYS_DENIED)
static void writeAccessConfigDirectory(Environment environment) throws IOException {
var file = environment.configDir().resolve("to_create");
Files.createFile(file);
}

@EntitlementTest(expectedAccess = ALWAYS_ALLOWED)
static void readAccessSourcePath() throws URISyntaxException {
var sourcePath = Paths.get(EntitlementTestPlugin.class.getProtectionDomain().getCodeSource().getLocation().toURI());
Files.exists(sourcePath);
}

@EntitlementTest(expectedAccess = ALWAYS_DENIED)
static void writeAccessSourcePath() throws IOException, URISyntaxException {
var sourcePath = Paths.get(EntitlementTestPlugin.class.getProtectionDomain().getCodeSource().getLocation().toURI());
var file = sourcePath.getParent().resolve("to_create");
Files.createFile(file);
}

@EntitlementTest(expectedAccess = ALWAYS_DENIED)
static void javaDesktopFileAccess() throws Exception {
// Test file access from a java.desktop class. We explicitly exclude that module from the "system modules", so we expect
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,9 +11,11 @@

import org.elasticsearch.client.internal.node.NodeClient;
import org.elasticsearch.common.Strings;
import org.elasticsearch.core.CheckedConsumer;
import org.elasticsearch.core.CheckedRunnable;
import org.elasticsearch.core.SuppressForbidden;
import org.elasticsearch.entitlement.runtime.api.NotEntitledException;
import org.elasticsearch.env.Environment;
import org.elasticsearch.logging.LogManager;
import org.elasticsearch.logging.Logger;
import org.elasticsearch.rest.BaseRestHandler;
Expand Down Expand Up @@ -70,7 +72,7 @@ public class RestEntitlementsCheckAction extends BaseRestHandler {
private static final Logger logger = LogManager.getLogger(RestEntitlementsCheckAction.class);

record CheckAction(
CheckedRunnable<Exception> action,
CheckedConsumer<Environment, Exception> action,
EntitlementTest.ExpectedAccess expectedAccess,
Class<? extends Exception> expectedExceptionIfDenied,
Integer fromJavaVersion
Expand All @@ -79,15 +81,15 @@ record CheckAction(
* These cannot be granted to plugins, so our test plugins cannot test the "allowed" case.
*/
static CheckAction deniedToPlugins(CheckedRunnable<Exception> action) {
return new CheckAction(action, SERVER_ONLY, NotEntitledException.class, null);
return new CheckAction(env -> action.run(), SERVER_ONLY, NotEntitledException.class, null);
}

static CheckAction forPlugins(CheckedRunnable<Exception> action) {
return new CheckAction(action, PLUGINS, NotEntitledException.class, null);
return new CheckAction(env -> action.run(), PLUGINS, NotEntitledException.class, null);
}

static CheckAction alwaysDenied(CheckedRunnable<Exception> action) {
return new CheckAction(action, ALWAYS_DENIED, NotEntitledException.class, null);
return new CheckAction(env -> action.run(), ALWAYS_DENIED, NotEntitledException.class, null);
}
}

Expand Down Expand Up @@ -135,7 +137,7 @@ static CheckAction alwaysDenied(CheckedRunnable<Exception> action) {
entry(
"createInetAddressResolverProvider",
new CheckAction(
VersionSpecificNetworkChecks::createInetAddressResolverProvider,
env -> VersionSpecificNetworkChecks.createInetAddressResolverProvider(),
SERVER_ONLY,
NotEntitledException.class,
18
Expand Down Expand Up @@ -215,6 +217,12 @@ static CheckAction alwaysDenied(CheckedRunnable<Exception> action) {
.filter(entry -> entry.getValue().fromJavaVersion() == null || Runtime.version().feature() >= entry.getValue().fromJavaVersion())
.collect(Collectors.toUnmodifiableMap(Entry::getKey, Entry::getValue));

private final Environment environment;

public RestEntitlementsCheckAction(Environment environment) {
this.environment = environment;
}

@SuppressForbidden(reason = "Need package private methods so we don't have to make them all public")
private static Method[] getDeclaredMethods(Class<?> clazz) {
return clazz.getDeclaredMethods();
Expand All @@ -230,13 +238,10 @@ private static Stream<Entry<String, CheckAction>> getTestEntries(Class<?> action
if (Modifier.isStatic(method.getModifiers()) == false) {
throw new AssertionError("Entitlement test method [" + method + "] must be static");
}
if (method.getParameterTypes().length != 0) {
throw new AssertionError("Entitlement test method [" + method + "] must not have parameters");
}

CheckedRunnable<Exception> runnable = () -> {
final CheckedConsumer<Environment, Exception> call = createConsumerForMethod(method);
CheckedConsumer<Environment, Exception> runnable = env -> {
try {
method.invoke(null);
call.accept(env);
} catch (IllegalAccessException e) {
throw new AssertionError(e);
} catch (InvocationTargetException e) {
Expand All @@ -258,6 +263,17 @@ private static Stream<Entry<String, CheckAction>> getTestEntries(Class<?> action
return entries.stream();
}

private static CheckedConsumer<Environment, Exception> createConsumerForMethod(Method method) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is pretty neat. Your own tiny DI framework!

Class<?>[] parameters = method.getParameterTypes();
if (parameters.length == 0) {
return env -> method.invoke(null);
}
if (parameters.length == 1 && parameters[0].equals(Environment.class)) {
return env -> method.invoke(null, env);
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(If we ever acquire a second injectable parameter here, I'd probably change this to loop over the parameters, building the argument list based on the parameter types, much like a real DI framework would.)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

++
But for now all the "extra" info we use is in the environment (e.g. dirs).
But yes, if we need to add more, we can either do that or have "fixed" patterns (either arg-less, or all the additional args in the right order).

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't really see the value in forcing the args to be in a certain order. Like, what if I want to inject A and C? Do I need to declare B for no reason just so I have the right args in the right order? Also, why is (A, C) ok but (C, A) is not?

It will not surprise you that I'd prefer just to have DI. 😂

throw new AssertionError("Entitlement test method [" + method + "] must have no parameters or 1 parameter (Environment)");
}

private static void createURLStreamHandlerProvider() {
var x = new URLStreamHandlerProvider() {
@Override
Expand Down Expand Up @@ -421,6 +437,14 @@ public static Set<String> getCheckActionsAllowedInPlugins() {
.collect(Collectors.toSet());
}

public static Set<String> getAlwaysAllowedCheckActions() {
return checkActions.entrySet()
.stream()
.filter(kv -> kv.getValue().expectedAccess().equals(ALWAYS_ALLOWED))
.map(Entry::getKey)
.collect(Collectors.toSet());
}

public static Set<String> getDeniableCheckActions() {
return checkActions.entrySet()
.stream()
Expand Down Expand Up @@ -455,7 +479,7 @@ protected RestChannelConsumer prepareRequest(RestRequest request, NodeClient cli
logger.info("Calling check action [{}]", actionName);
RestResponse response;
try {
checkAction.action().run();
checkAction.action().accept(environment);
response = new RestResponse(RestStatus.OK, Strings.format("Succesfully executed action [%s]", actionName));
} catch (Exception e) {
var statusCode = checkAction.expectedExceptionIfDenied.isInstance(e)
Expand All @@ -468,5 +492,4 @@ protected RestChannelConsumer prepareRequest(RestRequest request, NodeClient cli
channel.sendResponse(response);
};
}

}
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
/*
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
* or more contributor license agreements. Licensed under the "Elastic License
* 2.0", the "GNU Affero General Public License v3.0 only", and the "Server Side
* Public License v 1"; you may not use this file except in compliance with, at
* your election, the "Elastic License 2.0", the "GNU Affero General Public
* License v3.0 only", or the "Server Side Public License, v 1".
*/

package org.elasticsearch.entitlement.qa;

import com.carrotsearch.randomizedtesting.annotations.Name;
import com.carrotsearch.randomizedtesting.annotations.ParametersFactory;

import org.elasticsearch.entitlement.qa.test.RestEntitlementsCheckAction;
import org.junit.ClassRule;

public class EntitlementsAlwaysAllowedIT extends AbstractEntitlementsIT {

@ClassRule
public static EntitlementsTestRule testRule = new EntitlementsTestRule(true, null);

public EntitlementsAlwaysAllowedIT(@Name("actionName") String actionName) {
super(actionName, true);
}

@ParametersFactory
public static Iterable<Object[]> data() {
return RestEntitlementsCheckAction.getAlwaysAllowedCheckActions().stream().map(action -> new Object[] { action }).toList();
}

@Override
protected String getTestRestCluster() {
return testRule.cluster.getHttpAddresses();
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
/*
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
* or more contributor license agreements. Licensed under the "Elastic License
* 2.0", the "GNU Affero General Public License v3.0 only", and the "Server Side
* Public License v 1"; you may not use this file except in compliance with, at
* your election, the "Elastic License 2.0", the "GNU Affero General Public
* License v3.0 only", or the "Server Side Public License, v 1".
*/

package org.elasticsearch.entitlement.qa;

import com.carrotsearch.randomizedtesting.annotations.Name;
import com.carrotsearch.randomizedtesting.annotations.ParametersFactory;

import org.elasticsearch.entitlement.qa.test.RestEntitlementsCheckAction;
import org.junit.ClassRule;

public class EntitlementsAlwaysAllowedNonModularIT extends AbstractEntitlementsIT {

@ClassRule
public static EntitlementsTestRule testRule = new EntitlementsTestRule(false, null);

public EntitlementsAlwaysAllowedNonModularIT(@Name("actionName") String actionName) {
super(actionName, true);
}

@ParametersFactory
public static Iterable<Object[]> data() {
return RestEntitlementsCheckAction.getAlwaysAllowedCheckActions().stream().map(action -> new Object[] { action }).toList();
}

@Override
protected String getTestRestCluster() {
return testRule.cluster.getHttpAddresses();
}
}