forked from mongodb/mongo
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmongos_cache_invalidation.js
317 lines (251 loc) · 12.3 KB
/
mongos_cache_invalidation.js
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
/**
* This tests that updates to user and role definitions made on one mongos propagate properly
* to other mongoses.
* @tags: [requires_sharding]
*/
import {ShardingTest} from "jstests/libs/shardingtest.js";
var authzErrorCode = 13;
var hasAuthzError = function(result) {
assert(result instanceof WriteCommandError);
assert.eq(authzErrorCode, result.code);
};
var st = new ShardingTest({
shards: 2,
config: 3,
mongos: [
{},
{setParameter: {userCacheInvalidationIntervalSecs: 5}},
{setParameter: {userCacheInvalidationIntervalSecs: 600}}
],
keyFile: 'jstests/libs/key1'
});
st.s1.getDB('admin').createUser({user: 'root', pwd: 'pwd', roles: ['__system']});
st.s1.getDB('admin').auth('root', 'pwd');
var res = st.s1.getDB('admin').runCommand({setParameter: 1, userCacheInvalidationIntervalSecs: 0});
assert.commandFailed(res, "Setting the invalidation interval to an disallowed value should fail");
res = st.s1.getDB('admin').runCommand({setParameter: 1, userCacheInvalidationIntervalSecs: 100000});
assert.commandFailed(res, "Setting the invalidation interval to an disallowed value should fail");
res = st.s1.getDB('admin').runCommand({getParameter: 1, userCacheInvalidationIntervalSecs: 1});
assert.eq(5, res.userCacheInvalidationIntervalSecs);
assert.commandWorked(st.s1.getDB('test').foo.insert({a: 1})); // initial data
assert.commandWorked(st.s1.getDB('test').bar.insert({a: 1})); // initial data
st.s1.getDB('admin').createUser({user: 'admin', pwd: 'pwd', roles: ['userAdminAnyDatabase']});
st.s1.getDB('admin').logout();
st.s0.getDB('admin').auth('admin', 'pwd');
st.s0.getDB('admin').createRole({
role: 'myRole',
roles: [],
privileges: [{
resource: {cluster: true},
actions: ['invalidateUserCache', 'getParameter', 'setParameter', 'getLog', 'dbStats']
}]
});
st.s0.getDB('test').createUser({
user: 'spencer',
pwd: 'pwd',
roles: ['read', {role: 'myRole', db: 'admin'}, {role: 'userAdminAnyDatabase', db: 'admin'}]
});
st.s0.getDB('admin').logout();
const db1 = st.s0.getDB('test');
assert(db1.auth('spencer', 'pwd'));
const db2 = st.s1.getDB('test');
assert(db2.auth('spencer', 'pwd'));
const db3 = st.s2.getDB('test');
assert(db3.auth('spencer', 'pwd'));
/**
* At this point we have 3 handles to the "test" database, each of which are on connections to
* different mongoses. "db1", "db2", and "db3" are all auth'd as spencer@test and will be used
* to verify that user and role data changes get propaged to their mongoses.
* "db2" is connected to a mongos with a 5 second user cache invalidation interval,
* while "db3" is connected to a mongos with a 10 minute cache invalidation interval.
*/
(function testChangingInvalidationInterval() {
jsTestLog("Test that changing the invalidation interval takes effect immediately");
assert.commandFailedWithCode(db3.bar.runCommand("drop"), authzErrorCode);
assert.eq(1, db3.bar.findOne().a);
db1.getSiblingDB('admin').grantPrivilegesToRole(
"myRole", [{resource: {db: 'test', collection: ''}, actions: ['dropCollection']}]);
// At first db3 should still think we're unauthorized because it hasn't invalidated it's cache.
assert.commandFailedWithCode(db3.bar.runCommand('drop'), authzErrorCode);
// Changing the value of the invalidation interval should make it invalidate its cache quickly.
assert.commandWorked(db3.adminCommand({setParameter: 1, userCacheInvalidationIntervalSecs: 1}));
sleep(2000);
assert.commandWorked(db3.bar.runCommand('drop'));
assert.eq(0, db3.bar.count());
// Set the invalidation interval back for the rest of the tests
db3.adminCommand({setParameter: 1, userCacheInvalidationIntervalSecs: 600});
})();
(function testGrantingPrivileges() {
jsTestLog("Testing propagation of granting privileges");
hasAuthzError(db1.foo.update({}, {$inc: {a: 1}}));
hasAuthzError(db2.foo.update({}, {$inc: {a: 1}}));
hasAuthzError(db3.foo.update({}, {$inc: {a: 1}}));
assert.eq(1, db1.foo.findOne().a);
assert.eq(1, db2.foo.findOne().a);
assert.eq(1, db3.foo.findOne().a);
db1.getSiblingDB('admin').grantPrivilegesToRole(
"myRole", [{resource: {db: 'test', collection: ''}, actions: ['update']}]);
// s0/db1 should update its cache instantly
assert.commandWorked(db1.foo.update({}, {$inc: {a: 1}}));
assert.eq(2, db1.foo.findOne().a);
// s1/db2 should update its cache in 10 seconds.
sleep(10000);
assert.soon(
function() {
var res = db2.foo.update({}, {$inc: {a: 1}});
if (res instanceof WriteCommandError) {
return false;
}
return db2.foo.findOne().a == 3;
},
"Mongos did not update its user cache after 10 seconds",
5 * 1000 /* Additional 5 seconds of buffer in case of slow update */);
// We manually invalidate the cache on s2/db3.
db3.adminCommand("invalidateUserCache");
assert.commandWorked(db3.foo.update({}, {$inc: {a: 1}}));
assert.eq(4, db3.foo.findOne().a);
})();
(function testRevokingPrivileges() {
jsTestLog("Testing propagation of revoking privileges");
db1.getSiblingDB('admin').revokePrivilegesFromRole(
"myRole", [{resource: {db: 'test', collection: ''}, actions: ['update']}]);
// s0/db1 should update its cache instantly
hasAuthzError(db1.foo.update({}, {$inc: {a: 1}}));
jsTest.log("Beginning wait for s1/db2 cache update.");
// s1/db2 should update its cache in 10 seconds.
sleep(10000);
assert.soon(
function() {
var res = db2.foo.update({}, {$inc: {a: 1}});
return res instanceof WriteCommandError && res.code == authzErrorCode;
},
"Mongos did not update its user cache after 10 seconds",
5 * 1000 /* Additional 5 seconds of buffer in case of slow update */);
// We manually invalidate the cache on s1/db3.
db3.adminCommand("invalidateUserCache");
hasAuthzError(db3.foo.update({}, {$inc: {a: 1}}));
})();
/**
* Test we do not flush the cache and generate a new userCacheGeneration if there are no user
* changes.
*/
(function testKeepingCacheIfNoChange() {
jsTestLog(
"Testing cache generation stays the same and the user cache is not flushed if there are no changes");
const cacheIntervalBeforeTest =
assert
.commandWorked(
db1.adminCommand({getParameter: 1, userCacheInvalidationIntervalSecs: 1}))
.userCacheInvalidationIntervalSecs;
// Set the invalidation interval for 5 seconds
assert.commandWorked(db1.adminCommand({setParameter: 1, userCacheInvalidationIntervalSecs: 5}));
// Get current cache generation
const cfg1 = st.configRS.getPrimary().getDB('admin');
assert(cfg1.auth('root', 'pwd'));
const genBeforeChange = assert.commandWorked(cfg1.runCommand({_getUserCacheGeneration: 1}));
// Update user role so cacheGeneration gets updated and grab current time
let currentTime = Date.now();
db1.getSiblingDB('admin').revokePrivilegesFromRole(
"myRole", [{resource: {db: 'test', collection: ''}, actions: ['dbStats']}]);
// Look for cache generation change that happened after currentTime
let genAfterChange;
assert.soon(() => {
genAfterChange = assert.commandWorked(cfg1.runCommand({_getUserCacheGeneration: 1}));
return genBeforeChange.cacheGeneration != genAfterChange.cacheGeneration;
});
// Set userCacheInvalidationIntervalSecs to 1 second and check current cache generation does not
// change after no user changes
currentTime = Date.now();
assert.commandWorked(db1.adminCommand({setParameter: 1, userCacheInvalidationIntervalSecs: 1}));
// Sleep 3 seconds to give enough time for the userCacheInvalidator job to run
sleep(3000);
const genAfterNoChange = assert.commandWorked(cfg1.runCommand({_getUserCacheGeneration: 1}));
assert.eq(genAfterChange.cacheGeneration,
genAfterNoChange.cacheGeneration,
"User cache generation changed after no user change.");
cfg1.logout();
// Set userCacheInvalidationInterval back to value before the test
assert.commandWorked(db1.adminCommand(
{setParameter: 1, userCacheInvalidationIntervalSecs: cacheIntervalBeforeTest}));
})();
(function testModifyingUser() {
jsTestLog("Testing propagation modifications to a user, rather than to a role");
hasAuthzError(db1.foo.update({}, {$inc: {a: 1}}));
hasAuthzError(db2.foo.update({}, {$inc: {a: 1}}));
hasAuthzError(db3.foo.update({}, {$inc: {a: 1}}));
db1.getSiblingDB('test').grantRolesToUser("spencer", ['readWrite']);
// s0/db1 should update its cache instantly
assert.commandWorked(db1.foo.update({}, {$inc: {a: 1}}));
// s1/db2 should update its cache in 10 seconds.
sleep(10000);
assert.soon(
function() {
return !(db2.foo.update({}, {$inc: {a: 1}}) instanceof WriteCommandError);
},
"Mongos did not update its user cache after 10 seconds",
5 * 1000 /* Additional 5 seconds of buffer in case of slow update */);
// We manually invalidate the cache on s1/db3.
db3.adminCommand("invalidateUserCache");
assert.commandWorked(db3.foo.update({}, {$inc: {a: 1}}));
})();
(function testConcurrentUserModification() {
jsTestLog("Testing having 2 mongoses modify the same user at the same time"); // SERVER-13850
assert.commandWorked(db1.foo.update({}, {$inc: {a: 1}}));
assert.commandWorked(db3.foo.update({}, {$inc: {a: 1}}));
db1.getSiblingDB('test').revokeRolesFromUser("spencer", ['readWrite']);
// At this point db3 still thinks "spencer" has readWrite. Use it to add a different role
// and make sure it doesn't add back readWrite
hasAuthzError(db1.foo.update({}, {$inc: {a: 1}}));
assert.commandWorked(db3.foo.update({}, {$inc: {a: 1}}));
db3.getSiblingDB('test').grantRolesToUser("spencer", ['dbAdmin']);
hasAuthzError(db1.foo.update({}, {$inc: {a: 1}}));
// modifying "spencer" should force db3 to update its cache entry for "spencer"
hasAuthzError(db3.foo.update({}, {$inc: {a: 1}}));
// Make sure nothing changes from invalidating the cache
db1.adminCommand('invalidateUserCache');
db3.adminCommand('invalidateUserCache');
hasAuthzError(db1.foo.update({}, {$inc: {a: 1}}));
hasAuthzError(db3.foo.update({}, {$inc: {a: 1}}));
})();
(function testDroppingUser() {
jsTestLog("Testing propagation of dropping users");
assert.commandWorked(db1.foo.runCommand("collStats"));
assert.commandWorked(db2.foo.runCommand("collStats"));
assert.commandWorked(db3.foo.runCommand("collStats"));
db1.dropUser('spencer');
// s0/db1 should update its cache instantly
assert.commandFailedWithCode(db1.foo.runCommand("collStats"), authzErrorCode);
// s1/db2 should update its cache in 10 seconds.
sleep(10000);
assert.soon(
function() {
return db2.foo.runCommand("collStats").code == authzErrorCode;
},
"Mongos did not update its user cache after 10 seconds",
5 * 1000 /* Additional 5 seconds of buffer in case of slow update */);
// We manually invalidate the cache on s2/db3.
db3.adminCommand("invalidateUserCache");
assert.commandFailedWithCode(db3.foo.runCommand("collStats"), authzErrorCode);
})();
(function testStaticCacheGeneration() {
jsTestLog("Testing that cache generations stay static across config server authentication");
const cfg1 = st.configRS.getPrimary().getDB('admin');
assert(cfg1.auth('root', 'pwd'));
// Create a previously unauthenticated user which is not in the authorization cached
assert.commandWorked(
cfg1.runCommand({createUser: "previouslyUncached", pwd: "pwd", roles: []}));
const oldRes = assert.commandWorked(cfg1.runCommand({_getUserCacheGeneration: 1}));
// Authenticate as the uncached user
cfg1.logout();
assert(cfg1.auth("previouslyUncached", "pwd"));
cfg1.logout();
assert(cfg1.auth('root', 'pwd'));
const newRes = assert.commandWorked(cfg1.runCommand({_getUserCacheGeneration: 1}));
assert.eq(oldRes.cacheGeneration,
newRes.cacheGeneration,
"User cache generation supriously incremented on config servers");
// Put connection to config server back into default state before shutdown
cfg1.logout();
})();
st.stop();
print("SUCCESS Completed mongos_cache_invalidation.js");