Skip to content

Commit

Permalink
Remove Transport Auth auditlog categories (opensearch-project#1578)
Browse files Browse the repository at this point in the history
Signed-off-by: Jochen Kressin <jkressin@floragunn.com>
  • Loading branch information
jochenkressin authored and peternied committed Apr 7, 2022
1 parent 779c09f commit 600f129
Show file tree
Hide file tree
Showing 8 changed files with 1 addition and 97 deletions.
2 changes: 0 additions & 2 deletions src/main/java/org/opensearch/security/auditlog/AuditLog.java
Original file line number Diff line number Diff line change
Expand Up @@ -48,9 +48,7 @@
public interface AuditLog extends Closeable {

//login
void logFailedLogin(String effectiveUser, boolean securityadmin, String initiatingUser, TransportRequest request, Task task);
void logFailedLogin(String effectiveUser, boolean securityadmin, String initiatingUser, RestRequest request);
void logSucceededLogin(String effectiveUser, boolean securityadmin, String initiatingUser, TransportRequest request, String action, Task task);
void logSucceededLogin(String effectiveUser, boolean securityadmin, String initiatingUser, RestRequest request);

//privs
Expand Down
10 changes: 0 additions & 10 deletions src/main/java/org/opensearch/security/auditlog/NullAuditLog.java
Original file line number Diff line number Diff line change
Expand Up @@ -52,21 +52,11 @@ public void close() throws IOException {
//noop, intentionally left empty
}

@Override
public void logFailedLogin(String effectiveUser, boolean securityadmin, String initiatingUser, TransportRequest request, Task task) {
//noop, intentionally left empty
}

@Override
public void logFailedLogin(String effectiveUser, boolean securityadmin, String initiatingUser, RestRequest request) {
//noop, intentionally left empty
}

@Override
public void logSucceededLogin(String effectiveUser, boolean securityadmin, String initiatingUser, TransportRequest request, String action, Task task) {
//noop, intentionally left empty
}

@Override
public void logSucceededLogin(String effectiveUser, boolean securityadmin, String initiatingUser, RestRequest request) {
//noop, intentionally left empty
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -133,23 +133,6 @@ public ComplianceConfig getComplianceConfig() {
return this.complianceConfig;
}

@Override
public void logFailedLogin(String effectiveUser, boolean securityadmin, String initiatingUser, TransportRequest request, Task task) {
final String action = null;

if(!checkTransportFilter(AuditCategory.FAILED_LOGIN, action, effectiveUser, request)) {
return;
}

final TransportAddress remoteAddress = getRemoteAddress();
final List<AuditMessage> msgs = RequestResolver.resolve(AuditCategory.FAILED_LOGIN, getOrigin(), action, null, effectiveUser, securityadmin, initiatingUser, remoteAddress, request, getThreadContextHeaders(), task, resolver, clusterService, settings, auditConfigFilter.shouldLogRequestBody(), auditConfigFilter.shouldResolveIndices(), auditConfigFilter.shouldResolveBulkRequests(), securityIndex, auditConfigFilter.shouldExcludeSensitiveHeaders(), null);

for(AuditMessage msg: msgs) {
save(msg);
}
}


@Override
public void logFailedLogin(String effectiveUser, boolean securityadmin, String initiatingUser, RestRequest request) {

Expand All @@ -168,21 +151,6 @@ public void logFailedLogin(String effectiveUser, boolean securityadmin, String i
save(msg);
}

@Override
public void logSucceededLogin(String effectiveUser, boolean securityadmin, String initiatingUser, TransportRequest request, String action, Task task) {

if(!checkTransportFilter(AuditCategory.AUTHENTICATED, action, effectiveUser, request)) {
return;
}

final TransportAddress remoteAddress = getRemoteAddress();
final List<AuditMessage> msgs = RequestResolver.resolve(AuditCategory.AUTHENTICATED, getOrigin(), action, null, effectiveUser, securityadmin, initiatingUser,remoteAddress, request, getThreadContextHeaders(), task, resolver, clusterService, settings, auditConfigFilter.shouldLogRequestBody(), auditConfigFilter.shouldResolveIndices(), auditConfigFilter.shouldResolveBulkRequests(), securityIndex, auditConfigFilter.shouldExcludeSensitiveHeaders(), null);

for(AuditMessage msg: msgs) {
save(msg);
}
}

@Override
public void logSucceededLogin(String effectiveUser, boolean securityadmin, String initiatingUser, RestRequest request) {

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -128,27 +128,13 @@ protected void save(final AuditMessage msg) {
}
}

@Override
public void logFailedLogin(String effectiveUser, boolean securityAdmin, String initiatingUser, TransportRequest request, Task task) {
if (enabled) {
super.logFailedLogin(effectiveUser, securityAdmin, initiatingUser, request, task);
}
}

@Override
public void logFailedLogin(String effectiveUser, boolean securityAdmin, String initiatingUser, RestRequest request) {
if (enabled) {
super.logFailedLogin(effectiveUser, securityAdmin, initiatingUser, request);
}
}

@Override
public void logSucceededLogin(String effectiveUser, boolean securityAdmin, String initiatingUser, TransportRequest request, String action, Task task) {
if (enabled) {
super.logSucceededLogin(effectiveUser, securityAdmin, initiatingUser, request, action, task);
}
}

@Override
public void logSucceededLogin(String effectiveUser, boolean securityAdmin, String initiatingUser, RestRequest request) {
if (enabled) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -82,6 +82,5 @@ private void addUser(final User user, final TransportRequest transportRequest,
return;

threadContext.putTransient(ConfigConstants.OPENDISTRO_SECURITY_USER, user);
auditLog.logSucceededLogin(user.getName(), false, null, transportRequest, action, task);
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -99,18 +99,6 @@ public Set<AuthorizationBackend> getRestAuthorizers() {
return Collections.unmodifiableSet(restAuthorizers);
}
@Override
public SortedSet<AuthDomain> getTransportAuthDomains() {
return Collections.unmodifiableSortedSet(transportAuthDomains);
}
@Override
public Set<AuthorizationBackend> getTransportAuthorizers() {
return Collections.unmodifiableSet(transportAuthorizers);
}
@Override
public String getTransportUsernameAttribute() {
return config.dynamic.transport_userrname_attribute;
}
@Override
public boolean isAnonymousAuthenticationEnabled() {
return config.dynamic.http.anonymous_auth_enabled;
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -99,18 +99,6 @@ public Set<AuthorizationBackend> getRestAuthorizers() {
return Collections.unmodifiableSet(restAuthorizers);
}
@Override
public SortedSet<AuthDomain> getTransportAuthDomains() {
return Collections.unmodifiableSortedSet(transportAuthDomains);
}
@Override
public Set<AuthorizationBackend> getTransportAuthorizers() {
return Collections.unmodifiableSet(transportAuthorizers);
}
@Override
public String getTransportUsernameAttribute() {
return config.dynamic.transport_userrname_attribute;
}
@Override
public boolean isAnonymousAuthenticationEnabled() {
return config.dynamic.http.anonymous_auth_enabled;
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -116,10 +116,8 @@ public void enableAllCategoryTest() throws Exception {

Assert.assertTrue(AuditCategory.values()+"#"+result, categoriesPresentInLog(result, filterComplianceCategories(AuditCategory.values())));

Assert.assertThat(result, containsString("testuser.transport.succeededlogin"));
Assert.assertThat(result, containsString("testuser.rest.succeededlogin"));
Assert.assertThat(result, containsString("testuser.rest.failedlogin"));
Assert.assertThat(result, containsString("testuser.transport.failedlogin"));
Assert.assertThat(result, containsString("privilege.missing"));
Assert.assertThat(result, containsString("action.indexattempt"));
Assert.assertThat(result, containsString("action.transport.ssl"));
Expand Down Expand Up @@ -195,7 +193,7 @@ protected boolean categoriesPresentInLog(String result, AuditCategory... categor
}

protected void logAll(AuditLog auditLog) {
//11 requests
//10 requests
logRestFailedLogin(auditLog);
logRestBadHeaders(auditLog);
logRestSSLException(auditLog);
Expand All @@ -207,8 +205,6 @@ protected void logAll(AuditLog auditLog) {

logTransportSSLException(auditLog);
logTransportBadHeaders(auditLog);
logTransportFailedLogin(auditLog);
logTransportSucceededLogin(auditLog);

logIndexEvent(auditLog);
}
Expand All @@ -217,19 +213,10 @@ protected void logRestSucceededLogin(AuditLog auditLog) {
auditLog.logSucceededLogin("testuser.rest.succeededlogin", false, "testuser.rest.succeededlogin", new MockRestRequest());
}

protected void logTransportSucceededLogin(AuditLog auditLog) {
auditLog.logSucceededLogin("testuser.transport.succeededlogin", false, "testuser.transport.succeededlogin", new TransportRequest.Empty(), "test/action", new Task(0, "x", "ac", "", null, null));
}


protected void logRestFailedLogin(AuditLog auditLog) {
auditLog.logFailedLogin("testuser.rest.failedlogin", false, "testuser.rest.failedlogin", new MockRestRequest());
}

protected void logTransportFailedLogin(AuditLog auditLog) {
auditLog.logFailedLogin("testuser.transport.failedlogin", false, "testuser.transport.failedlogin", new TransportRequest.Empty(), null);
}

protected void logMissingPrivileges(AuditLog auditLog) {
auditLog.logMissingPrivileges("privilege.missing", new TransportRequest.Empty(), null);
}
Expand Down

0 comments on commit 600f129

Please sign in to comment.