Skip to content

Commit

Permalink
Fix verbose get data stream API not requiring extra privileges
Browse files Browse the repository at this point in the history
When a user uses the `GET /_data_stream?verbose` API to retrieve the verbose version of the response (which includes the `maximum_timestamp`, as added in elastic#112303), the response object should be performed with the same privilege-checking as the get-data-stream API, meaning that no extra priveleges should be required return the field.

This commit makes the Transport action use an entitled client so that extra privileges are not required, and adds a test to ensure that it works.
  • Loading branch information
dakrone committed Sep 16, 2024
1 parent a016f78 commit 3d6c7e4
Show file tree
Hide file tree
Showing 3 changed files with 98 additions and 1 deletion.
Original file line number Diff line number Diff line change
@@ -0,0 +1,90 @@
/*
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
* or more contributor license agreements. Licensed under the "Elastic License
* 2.0", the "GNU Affero General Public License v3.0 only", and the "Server Side
* Public License v 1"; you may not use this file except in compliance with, at
* your election, the "Elastic License 2.0", the "GNU Affero General Public
* License v3.0 only", or the "Server Side Public License, v 1".
*/

package org.elasticsearch.datastreams;

import org.apache.http.HttpHost;
import org.elasticsearch.client.Request;
import org.elasticsearch.common.settings.SecureString;
import org.elasticsearch.common.settings.Settings;
import org.elasticsearch.common.util.concurrent.ThreadContext;
import org.elasticsearch.test.cluster.ElasticsearchCluster;
import org.elasticsearch.test.cluster.FeatureFlag;
import org.elasticsearch.test.cluster.local.distribution.DistributionType;
import org.elasticsearch.test.cluster.util.resource.Resource;
import org.elasticsearch.test.rest.ESRestTestCase;
import org.junit.ClassRule;

public class DataStreamWithSecurityIT extends ESRestTestCase {

private static final String PASSWORD = "secret-test-password";
private static final String DATA_STREAM_NAME = "my-ds";

@ClassRule
public static ElasticsearchCluster cluster = ElasticsearchCluster.local()
.distribution(DistributionType.DEFAULT)
.feature(FeatureFlag.FAILURE_STORE_ENABLED)
.setting("xpack.watcher.enabled", "false")
.setting("xpack.ml.enabled", "false")
.setting("xpack.security.enabled", "true")
.setting("xpack.security.transport.ssl.enabled", "false")
.setting("xpack.security.http.ssl.enabled", "false")
.user("test_admin", PASSWORD, "superuser", false)
.user("limited_user", PASSWORD, "only_get", false)
.rolesFile(Resource.fromClasspath("roles.yml"))
.build();

@Override
protected String getTestRestCluster() {
return cluster.getHttpAddresses();
}

@Override
protected Settings restClientSettings() {
// If this test is running in a test framework that handles its own authorization, we don't want to overwrite it.
if (super.restClientSettings().keySet().contains(ThreadContext.PREFIX + ".Authorization")) {
return super.restClientSettings();
} else {
// Note: We use the admin user because the other one is too unprivileged, so it breaks the initialization of the test
String token = basicAuthHeaderValue("test_admin", new SecureString(PASSWORD.toCharArray()));
return Settings.builder().put(ThreadContext.PREFIX + ".Authorization", token).build();
}
}

private Settings simpleUserRestClientSettings() {
// Note: This user is assigned the role "only_get". That role is defined in roles.yml.
String token = basicAuthHeaderValue("limited_user", new SecureString(PASSWORD.toCharArray()));
return Settings.builder().put(super.restClientSettings()).put(ThreadContext.PREFIX + ".Authorization", token).build();
}

public void testGetDataStreamWithoutPermission() throws Exception {
Request putComposableIndexTemplateRequest = new Request("POST", "/_index_template/my-ds-template");
putComposableIndexTemplateRequest.setJsonEntity("""
{
"index_patterns": ["my-ds*"],
"data_stream": {}
}
""");
assertOK(adminClient().performRequest(putComposableIndexTemplateRequest));
assertOK(adminClient().performRequest(new Request("PUT", "/_data_stream/" + DATA_STREAM_NAME)));
Request createDocRequest = new Request("POST", "/" + DATA_STREAM_NAME + "/_doc");
createDocRequest.setJsonEntity("{ \"@timestamp\": \"2022-01-01\", \"message\": \"foo\" }");
assertOK(adminClient().performRequest(createDocRequest));

// Both the verbose and non-verbose versions should work with the "simple" user
try (var simpleUserClient = buildClient(simpleUserRestClientSettings(), getClusterHosts().toArray(new HttpHost[0]))) {
Request getDs = new Request("GET", "/_data_stream");
assertOK(simpleUserClient.performRequest(getDs));

Request getDsVerbose = new Request("GET", "/_data_stream?verbose=true");
assertOK(simpleUserClient.performRequest(getDsVerbose));
}
}

}
6 changes: 6 additions & 0 deletions modules/data-streams/src/javaRestTest/resources/roles.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,4 +16,10 @@ under_privilged:
- read
- write
- view_index_metadata
only_get:
indices:
- names: [ 'my-ds*' ]
privileges:
- read
- view_index_metadata
no_privilege:
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@
import org.elasticsearch.action.support.ActionFilters;
import org.elasticsearch.action.support.master.TransportMasterNodeReadAction;
import org.elasticsearch.client.internal.Client;
import org.elasticsearch.client.internal.OriginSettingClient;
import org.elasticsearch.cluster.ClusterState;
import org.elasticsearch.cluster.block.ClusterBlockException;
import org.elasticsearch.cluster.block.ClusterBlockLevel;
Expand Down Expand Up @@ -90,7 +91,7 @@ public TransportGetDataStreamsAction(
this.systemIndices = systemIndices;
this.globalRetentionSettings = globalRetentionSettings;
clusterSettings = clusterService.getClusterSettings();
this.client = client;
this.client = new OriginSettingClient(client, "stack");
}

@Override
Expand Down

0 comments on commit 3d6c7e4

Please sign in to comment.