mongo/jstests/sslSpecial/x509_cluster_auth_rollover.js

122 lines
4.0 KiB
JavaScript

/**
* This test does a full rollover of the X509 auth for cluster membership. After the rollover,
* the cluster will have a new CA and the dn components used to determine cluster membership
* will have changed;
*
* @tags: [requires_persistence, requires_replication]
*/
import {ReplSetTest} from "jstests/libs/replsettest.js";
const rst = new ReplSetTest({
nodes: 3,
waitForKeys: false,
nodeOptions: {
tlsMode: "preferTLS",
clusterAuthMode: "x509",
tlsCertificateKeyFile: "jstests/libs/server.pem",
tlsCAFile: "jstests/libs/ca.pem",
tlsAllowInvalidHostnames: "",
},
});
rst.startSet();
rst.initiate(
Object.extend(rst.getReplSetConfig(), {
writeConcernMajorityJournalDefault: true,
}),
null,
{initiateWithDefaultElectionTimeout: true, allNodesAuthorizedToRunRSGetStatus: false},
);
// Create a user to login as when auth is enabled later
rst.getPrimary()
.getDB("admin")
.createUser({user: "root", pwd: "root", roles: ["root"]}, {w: 3});
rst.nodes.forEach((node) => {
assert(node.getDB("admin").auth("root", "root"));
});
// Future connections should authenticate immediately on connecting so that replSet actions succeed.
const originalAwaitConnection = MongoRunner.awaitConnection;
MongoRunner.awaitConnection = function (args) {
const conn = originalAwaitConnection(args);
assert(conn.getDB("admin").auth("root", "root"));
return conn;
};
// All the certificates' DNs share this base
const dnBase = "C=US, ST=New York, L=New York,";
// This is the DN of the rollover certificate.
const rolloverDN = dnBase + " O=MongoDB Inc. (Rollover), OU=Kernel (Rollover), CN=server";
// This is the DN of the original certificate
const originalDN = dnBase + " O=MongoDB, OU=Kernel, CN=server";
// This will rollover the cluster to a new config in a rolling fashion. It will return when
// there is a primary and we are able to write to it.
const rolloverConfig = function (newConfig) {
const restart = function (node) {
const nodeId = rst.getNodeId(node);
rst.stop(nodeId);
const configId = "n" + nodeId;
rst.nodeOptions[configId] = Object.merge(rst.nodeOptions[configId], newConfig, true);
rst.start(nodeId, {}, true, true);
rst.awaitSecondaryNodes();
};
rst.nodes.forEach(function (node) {
restart(node);
});
assert.soon(() => {
let primary = rst.getPrimary();
assert.commandWorked(primary.getDB("admin").runCommand({hello: 1}));
assert.commandWorked(primary.getDB("test").a.insert({a: 1, str: "TESTTESTTEST"}));
// Start a shell that connects to the server with the current CA/cert configuration
// and ensure that it's able to connect and authenticate with x509.
const shellArgs = [
"mongo",
primary.name,
"--eval",
";",
"--ssl",
"--tlsAllowInvalidHostnames",
"--tlsCAFile",
newConfig["tlsCAFile"],
"--tlsCertificateKeyFile",
newConfig["tlsCertificateKeyFile"],
"--authenticationDatabase=$external",
"--authenticationMechanism=MONGODB-X509",
];
assert.eq(_runMongoProgram.apply(null, shellArgs), 0);
return true;
});
};
jsTestLog("Rolling over CA certificate to combined old and new CA's");
rolloverConfig({
tlsCertificateKeyFile: "jstests/libs/server.pem",
tlsCAFile: "jstests/libs/rollover_ca_merged.pem",
setParameter: {
tlsX509ClusterAuthDNOverride: rolloverDN,
},
});
jsTestLog("Rolling over to new certificate with new cluster DN and new CA");
rolloverConfig({
tlsCertificateKeyFile: "jstests/libs/rollover_server.pem",
tlsCAFile: "jstests/libs/rollover_ca_merged.pem",
setParameter: {
tlsX509ClusterAuthDNOverride: originalDN,
},
});
jsTestLog("Rolling over to new CA only");
rolloverConfig({
tlsCertificateKeyFile: "jstests/libs/rollover_server.pem",
tlsCAFile: "jstests/libs/rollover_ca.pem",
});
rst.stopSet();