mongo/jstests/auth/speculative-auth-replset.js

173 lines
6.3 KiB
JavaScript

// Verify that replica sets can speculatively authenticate
// to each other during intra-cluster communication.
// @tags: [requires_replication]
import {ReplSetTest} from "jstests/libs/replsettest.js";
const kAuthenticationSuccessfulLogId = 5286306;
const kAuthenticationFailedLogId = 5286307;
function countAuthInLog(conn) {
let logCounts = {speculative: 0, cluster: 0, speculativeCluster: 0};
cat(conn.fullOptions.logFile)
.trim()
.split("\n")
.forEach((line) => {
// Iterate through the log and verify our auth.
const entry = JSON.parse(line);
if (entry.id === kAuthenticationSuccessfulLogId) {
// Successful auth.
if (entry.attr.isSpeculative) {
logCounts.speculative += 1;
}
if (entry.attr.isClusterMember) {
logCounts.cluster += 1;
}
if (entry.attr.isSpeculative && entry.attr.isClusterMember) {
logCounts.speculativeCluster += 1;
}
} else if (entry.id === kAuthenticationFailedLogId) {
// Authentication can fail legitimately because the secondary abandons the connection
// during shutdown - if we do encounter an authentication failure in the log, make sure
// that it is only of this type, fail anything else
assert.eq(entry.attr.result, ErrorCodes.AuthenticationAbandoned);
} else {
// Irrelevant.
return;
}
});
print(`Found log entries for authentication in the following amounts: ${tojson(logCounts)}`);
return logCounts;
}
const rst = new ReplSetTest({
nodes: 1,
nodeOptions: {
setParameter: {
// Disable heartbeat logging to prevent exceeding the maximum log lines in checklog.
logComponentVerbosity: tojson({replication: {heartbeats: 0}}),
"failpoint.disableQueryAnalysisSampler": tojson({mode: "alwaysOn"}),
},
useLogFiles: true,
},
keyFile: "jstests/libs/key1",
});
rst.startSet();
rst.initiate();
rst.awaitReplication();
const admin = rst.getPrimary().getDB("admin");
admin.createUser({user: "admin", pwd: "pwd", roles: ["root"]});
admin.auth("admin", "pwd");
assert.commandWorked(admin.setLogLevel(3, "accessControl"));
function getMechStats(db) {
return assert.commandWorked(db.runCommand({serverStatus: 1})).security.authentication.mechanisms;
}
// Capture statistics after a fresh instantiation of a 1-node replica set.
// initialMechStats contains stats state for the test setup (e.g. shell authentication) actions
// that will have incremented the internal counters but are not relevant to the functionality under
// test
const initialMechStats = getMechStats(admin);
printjson(initialMechStats);
assert(initialMechStats["SCRAM-SHA-256"] !== undefined);
// We've made no client connections for which speculation was possible,
// because we authenticated as `admin` using the shell helpers.
// Because of the simple cluster topology, we should have no intracluster authentication attempts.
Object.keys(initialMechStats).forEach(function (mech) {
const specStats = initialMechStats[mech].speculativeAuthenticate;
const clusterStats = initialMechStats[mech].clusterAuthenticate;
// No speculation has occured
assert.eq(specStats.received, 0);
// Statistics should be consistent for all mechanisms
assert.eq(specStats.received, specStats.successful);
assert.eq(clusterStats.received, clusterStats.successful);
});
{
// Add and remove a node to force intra-cluster traffic, and authentication attempts.
// Removal will require force-reconfig because the original node will not constitute a
// "majority" of the resulting two node replicaset.
const singleNodeConfig = rst.getReplSetConfigFromNode();
const newNode = rst.add({});
rst.reInitiate();
rst.awaitSecondaryNodes(null, [newNode]);
rst.awaitReplication();
rst.stop(newNode);
rst.remove(newNode);
admin.auth("admin", "pwd");
singleNodeConfig.version = rst.getReplSetConfigFromNode(0).version + 1;
assert.commandWorked(admin.runCommand({replSetReconfig: singleNodeConfig, force: true}));
rst.awaitReplication();
}
{
// Capture new statistics, and assert that they're consistent.
let newMechStats = getMechStats(admin);
printjson(newMechStats);
// Speculative and cluster statistics should be incremented by intracluster auth.
assert.gt(
newMechStats["SCRAM-SHA-256"].speculativeAuthenticate.successful,
initialMechStats["SCRAM-SHA-256"].speculativeAuthenticate.successful,
);
assert.gt(
newMechStats["SCRAM-SHA-256"].clusterAuthenticate.successful,
initialMechStats["SCRAM-SHA-256"].clusterAuthenticate.successful,
);
// Speculative and cluster auth counts should align with the authentication
// events in the server log.
let logCounts = countAuthInLog(admin.getMongo());
assert.eq(
logCounts.speculative,
newMechStats["SCRAM-SHA-256"].speculativeAuthenticate.successful -
initialMechStats["SCRAM-SHA-256"].speculativeAuthenticate.successful,
);
assert.gt(
logCounts.speculativeCluster,
0,
"Expected to observe at least one speculative cluster authentication attempt",
);
// Retry cluster count a few times since random intracluster auth may surprise us.
const kClusterCountNumRetries = 5;
const kClusterCountRetryIntervalMS = 5 * 1000;
assert.retry(
function () {
const logCount = logCounts.cluster;
const mechStatCount = newMechStats["SCRAM-SHA-256"].clusterAuthenticate.successful;
if (logCount == mechStatCount) {
return true;
}
// Cluster count does not match.
// Possible that a background cluster-auth happened between getMechStats and countAuthInLog.
// Repoll values for a retry.
jsTest.log("Cluster counts mismatched: " + logCount + " != " + mechStatCount);
newMechStats = getMechStats(admin);
logCounts = countAuthInLog(admin.getMongo());
return false;
},
"Cluster counts never stabilized",
kClusterCountNumRetries,
kClusterCountRetryIntervalMS,
);
}
admin.logout();
rst.stopSet();