|
99 | 99 | import java.util.concurrent.atomic.AtomicBoolean;
|
100 | 100 | import java.util.function.Consumer;
|
101 | 101 |
|
| 102 | +import static org.elasticsearch.index.seqno.SequenceNumbers.UNASSIGNED_PRIMARY_TERM; |
102 | 103 | import static org.elasticsearch.test.SecurityTestsUtils.assertAuthenticationException;
|
103 | 104 | import static org.elasticsearch.xpack.core.security.support.Exceptions.authenticationError;
|
104 | 105 | import static org.elasticsearch.xpack.security.authc.TokenServiceTests.mockGetTokenFromId;
|
@@ -744,6 +745,59 @@ public void testAuthenticateTamperedUser() throws Exception {
|
744 | 745 | }
|
745 | 746 | }
|
746 | 747 |
|
| 748 | + public void testWrongTokenDoesNotFallbackToAnonymous() { |
| 749 | + String username = randomBoolean() ? AnonymousUser.DEFAULT_ANONYMOUS_USERNAME : "user1"; |
| 750 | + Settings.Builder builder = Settings.builder() |
| 751 | + .putList(AnonymousUser.ROLES_SETTING.getKey(), "r1", "r2", "r3"); |
| 752 | + if (username.equals(AnonymousUser.DEFAULT_ANONYMOUS_USERNAME) == false) { |
| 753 | + builder.put(AnonymousUser.USERNAME_SETTING.getKey(), username); |
| 754 | + } |
| 755 | + Settings anonymousEnabledSettings = builder.build(); |
| 756 | + final AnonymousUser anonymousUser = new AnonymousUser(anonymousEnabledSettings); |
| 757 | + service = new AuthenticationService(anonymousEnabledSettings, realms, auditTrail, |
| 758 | + new DefaultAuthenticationFailureHandler(Collections.emptyMap()), threadPool, anonymousUser, tokenService, apiKeyService); |
| 759 | + |
| 760 | + try (ThreadContext.StoredContext ignore = threadContext.stashContext()) { |
| 761 | + final String reqId = AuditUtil.getOrGenerateRequestId(threadContext); |
| 762 | + threadContext.putHeader("Authorization", "Bearer thisisaninvalidtoken"); |
| 763 | + ElasticsearchSecurityException e = |
| 764 | + expectThrows(ElasticsearchSecurityException.class, () -> authenticateBlocking("_action", message, null)); |
| 765 | + verify(auditTrail).anonymousAccessDenied(reqId, "_action", message); |
| 766 | + verifyNoMoreInteractions(auditTrail); |
| 767 | + assertAuthenticationException(e); |
| 768 | + } |
| 769 | + } |
| 770 | + |
| 771 | + public void testWrongApiKeyDoesNotFallbackToAnonymous() { |
| 772 | + String username = randomBoolean() ? AnonymousUser.DEFAULT_ANONYMOUS_USERNAME : "user1"; |
| 773 | + Settings.Builder builder = Settings.builder() |
| 774 | + .putList(AnonymousUser.ROLES_SETTING.getKey(), "r1", "r2", "r3"); |
| 775 | + if (username.equals(AnonymousUser.DEFAULT_ANONYMOUS_USERNAME) == false) { |
| 776 | + builder.put(AnonymousUser.USERNAME_SETTING.getKey(), username); |
| 777 | + } |
| 778 | + Settings anonymousEnabledSettings = builder.build(); |
| 779 | + final AnonymousUser anonymousUser = new AnonymousUser(anonymousEnabledSettings); |
| 780 | + service = new AuthenticationService(anonymousEnabledSettings, realms, auditTrail, |
| 781 | + new DefaultAuthenticationFailureHandler(Collections.emptyMap()), threadPool, anonymousUser, tokenService, apiKeyService); |
| 782 | + doAnswer(invocationOnMock -> { |
| 783 | + final GetRequest request = (GetRequest) invocationOnMock.getArguments()[0]; |
| 784 | + final ActionListener<GetResponse> listener = (ActionListener<GetResponse>) invocationOnMock.getArguments()[1]; |
| 785 | + listener.onResponse(new GetResponse(new GetResult(request.index(), request.id(), |
| 786 | + SequenceNumbers.UNASSIGNED_SEQ_NO, UNASSIGNED_PRIMARY_TERM, -1L, false, null, |
| 787 | + Collections.emptyMap(), Collections.emptyMap()))); |
| 788 | + return Void.TYPE; |
| 789 | + }).when(client).get(any(GetRequest.class), any(ActionListener.class)); |
| 790 | + try (ThreadContext.StoredContext ignore = threadContext.stashContext()) { |
| 791 | + final String reqId = AuditUtil.getOrGenerateRequestId(threadContext); |
| 792 | + threadContext.putHeader("Authorization", "ApiKey dGhpc2lzYW5pbnZhbGlkaWQ6dGhpc2lzYW5pbnZhbGlkc2VjcmV0"); |
| 793 | + ElasticsearchSecurityException e = |
| 794 | + expectThrows(ElasticsearchSecurityException.class, () -> authenticateBlocking("_action", message, null)); |
| 795 | + verify(auditTrail).anonymousAccessDenied(reqId, "_action", message); |
| 796 | + verifyNoMoreInteractions(auditTrail); |
| 797 | + assertAuthenticationException(e); |
| 798 | + } |
| 799 | + } |
| 800 | + |
747 | 801 | public void testAnonymousUserRest() throws Exception {
|
748 | 802 | String username = randomBoolean() ? AnonymousUser.DEFAULT_ANONYMOUS_USERNAME : "user1";
|
749 | 803 | Settings.Builder builder = Settings.builder()
|
|
0 commit comments