-
Notifications
You must be signed in to change notification settings - Fork 18
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
pkg/auth/badgerauth: add admin service for managing badger records
Updates #190 Change-Id: Ia87619a4d325e7b809a0086f7b7ffd4ecd310e76
- Loading branch information
Showing
17 changed files
with
1,264 additions
and
35 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,115 @@ | ||
// Copyright (C) 2022 Storj Labs, Inc. | ||
// See LICENSE for copying information. | ||
|
||
package badgerauth | ||
|
||
import ( | ||
"context" | ||
"time" | ||
|
||
badger "github.com/outcaste-io/badger/v3" | ||
"github.com/zeebo/errs" | ||
|
||
"storj.io/common/rpc/rpcstatus" | ||
"storj.io/gateway-mt/pkg/auth/authdb" | ||
"storj.io/gateway-mt/pkg/auth/badgerauth/pb" | ||
) | ||
|
||
// Admin represents a service that allows managing database records directly. | ||
type Admin struct { | ||
db *DB | ||
} | ||
|
||
var _ pb.DRPCAdminServiceServer = (*Admin)(nil) | ||
|
||
// NewAdmin creates a new instance of Admin. | ||
func NewAdmin(db *DB) *Admin { | ||
return &Admin{db: db} | ||
} | ||
|
||
// GetRecord gets a database record. | ||
func (admin *Admin) GetRecord(ctx context.Context, req *pb.GetRecordRequest) (_ *pb.GetRecordResponse, err error) { | ||
defer mon.Task()(&ctx)(&err) | ||
|
||
var resp pb.GetRecordResponse | ||
|
||
var keyHash authdb.KeyHash | ||
if err = keyHash.SetBytes(req.Key); err != nil { | ||
return nil, errToRPCStatusErr(err) | ||
} | ||
|
||
resp.Record, err = admin.db.lookupRecord(ctx, keyHash) | ||
if err != nil { | ||
return nil, errToRPCStatusErr(err) | ||
} | ||
|
||
return &resp, nil | ||
} | ||
|
||
// InvalidateRecord invalidates a record. | ||
func (admin *Admin) InvalidateRecord(ctx context.Context, req *pb.InvalidateRecordRequest) (_ *pb.InvalidateRecordResponse, err error) { | ||
defer mon.Task()(&ctx)(&err) | ||
|
||
var resp pb.InvalidateRecordResponse | ||
|
||
if req.Reason == "" { | ||
return nil, rpcstatus.Error(rpcstatus.InvalidArgument, "missing reason") | ||
} | ||
|
||
var keyHash authdb.KeyHash | ||
if err = keyHash.SetBytes(req.Key); err != nil { | ||
return nil, errToRPCStatusErr(err) | ||
} | ||
|
||
return &resp, errToRPCStatusErr(admin.db.updateRecord(ctx, keyHash, func(record *pb.Record) { | ||
record.InvalidatedAtUnix = time.Now().Unix() | ||
record.InvalidationReason = req.Reason | ||
})) | ||
} | ||
|
||
// UnpublishRecord unpublishes a record. | ||
func (admin *Admin) UnpublishRecord(ctx context.Context, req *pb.UnpublishRecordRequest) (_ *pb.UnpublishRecordResponse, err error) { | ||
defer mon.Task()(&ctx)(&err) | ||
|
||
var resp pb.UnpublishRecordResponse | ||
|
||
var keyHash authdb.KeyHash | ||
if err = keyHash.SetBytes(req.Key); err != nil { | ||
return nil, errToRPCStatusErr(err) | ||
} | ||
|
||
return &resp, errToRPCStatusErr(admin.db.updateRecord(ctx, keyHash, func(record *pb.Record) { | ||
record.Public = false | ||
})) | ||
} | ||
|
||
// DeleteRecord deletes a database record. | ||
func (admin *Admin) DeleteRecord(ctx context.Context, req *pb.DeleteRecordRequest) (_ *pb.DeleteRecordResponse, err error) { | ||
defer mon.Task()(&ctx)(&err) | ||
|
||
var resp pb.DeleteRecordResponse | ||
|
||
var keyHash authdb.KeyHash | ||
if err = keyHash.SetBytes(req.Key); err != nil { | ||
return nil, errToRPCStatusErr(err) | ||
} | ||
|
||
return &resp, errToRPCStatusErr(admin.db.deleteRecord(ctx, keyHash)) | ||
} | ||
|
||
func errToRPCStatusErr(err error) error { | ||
switch { | ||
case err == nil: | ||
return nil | ||
case ProtoError.Has(err), | ||
authdb.KeyHashError.Has(err), | ||
errs.Is(err, badger.ErrInvalidKey), | ||
errs.Is(err, badger.ErrBannedKey), | ||
errs.Is(err, badger.ErrEmptyKey): | ||
return rpcstatus.Error(rpcstatus.InvalidArgument, err.Error()) | ||
case errs.Is(err, badger.ErrKeyNotFound): | ||
return rpcstatus.Error(rpcstatus.NotFound, err.Error()) | ||
default: | ||
return rpcstatus.Error(rpcstatus.Internal, err.Error()) | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,151 @@ | ||
// Copyright (C) 2022 Storj Labs, Inc. | ||
// See LICENSE for copying information. | ||
|
||
package badgerauth_test | ||
|
||
import ( | ||
"testing" | ||
|
||
"github.com/stretchr/testify/require" | ||
|
||
"storj.io/common/rpc/rpcstatus" | ||
"storj.io/common/testcontext" | ||
"storj.io/gateway-mt/pkg/auth/badgerauth" | ||
"storj.io/gateway-mt/pkg/auth/badgerauth/badgerauthtest" | ||
"storj.io/gateway-mt/pkg/auth/badgerauth/pb" | ||
) | ||
|
||
func TestNodeAdmin_GetRecord(t *testing.T) { | ||
badgerauthtest.RunSingleNode(t, badgerauth.Config{ | ||
ID: badgerauth.NodeID{'a', 'd', 'm', 'g', 'e', 't'}, | ||
}, func(ctx *testcontext.Context, t *testing.T, node *badgerauth.Node) { | ||
admin := badgerauth.NewAdmin(node.DB) | ||
records, keys, _ := badgerauthtest.CreateFullRecords(ctx, t, node, 2) | ||
|
||
_, err := admin.GetRecord(ctx, &pb.GetRecordRequest{Key: []byte{}}) | ||
require.Equal(t, rpcstatus.Code(err), rpcstatus.NotFound) | ||
|
||
_, err = admin.GetRecord(ctx, &pb.GetRecordRequest{Key: []byte{'a'}}) | ||
require.Equal(t, rpcstatus.Code(err), rpcstatus.NotFound) | ||
|
||
_, err = admin.GetRecord(ctx, &pb.GetRecordRequest{Key: make([]byte, 33)}) | ||
require.Equal(t, rpcstatus.Code(err), rpcstatus.InvalidArgument) | ||
|
||
resp, err := admin.GetRecord(ctx, &pb.GetRecordRequest{Key: keys[0].Bytes()}) | ||
require.NoError(t, err) | ||
require.Equal(t, records[keys[0]].EncryptedAccessGrant, resp.Record.EncryptedAccessGrant) | ||
|
||
resp, err = admin.GetRecord(ctx, &pb.GetRecordRequest{Key: keys[1].Bytes()}) | ||
require.NoError(t, err) | ||
require.Equal(t, records[keys[1]].EncryptedAccessGrant, resp.Record.EncryptedAccessGrant) | ||
}) | ||
} | ||
|
||
func TestNodeAdmin_InvalidateRecord(t *testing.T) { | ||
badgerauthtest.RunSingleNode(t, badgerauth.Config{ | ||
ID: badgerauth.NodeID{'a', 'd', 'm', 'i', 'n', 'v'}, | ||
}, func(ctx *testcontext.Context, t *testing.T, node *badgerauth.Node) { | ||
admin := badgerauth.NewAdmin(node.DB) | ||
records, keys, _ := badgerauthtest.CreateFullRecords(ctx, t, node, 2) | ||
|
||
_, err := admin.InvalidateRecord(ctx, &pb.InvalidateRecordRequest{Reason: "test"}) | ||
require.Equal(t, rpcstatus.Code(err), rpcstatus.NotFound) | ||
|
||
_, err = admin.InvalidateRecord(ctx, &pb.InvalidateRecordRequest{ | ||
Key: make([]byte, 33), | ||
Reason: "something", | ||
}) | ||
require.Equal(t, rpcstatus.Code(err), rpcstatus.InvalidArgument) | ||
|
||
_, err = admin.InvalidateRecord(ctx, &pb.InvalidateRecordRequest{ | ||
Key: []byte{'a'}, | ||
Reason: "something", | ||
}) | ||
require.Equal(t, rpcstatus.Code(err), rpcstatus.NotFound) | ||
|
||
_, err = admin.InvalidateRecord(ctx, &pb.InvalidateRecordRequest{ | ||
Key: keys[0].Bytes(), | ||
Reason: "", | ||
}) | ||
require.Equal(t, rpcstatus.Code(err), rpcstatus.InvalidArgument) | ||
|
||
_, err = admin.InvalidateRecord(ctx, &pb.InvalidateRecordRequest{ | ||
Key: keys[0].Bytes(), | ||
Reason: "your key is disabled", | ||
}) | ||
require.NoError(t, err) | ||
|
||
resp, err := admin.GetRecord(ctx, &pb.GetRecordRequest{Key: keys[0].Bytes()}) | ||
require.NoError(t, err) | ||
require.Equal(t, records[keys[0]].EncryptedAccessGrant, resp.Record.EncryptedAccessGrant) | ||
require.Equal(t, "your key is disabled", resp.Record.InvalidationReason) | ||
require.NotZero(t, resp.Record.InvalidatedAtUnix) | ||
|
||
resp, err = admin.GetRecord(ctx, &pb.GetRecordRequest{Key: keys[1].Bytes()}) | ||
require.NoError(t, err) | ||
require.Equal(t, records[keys[1]].EncryptedAccessGrant, resp.Record.EncryptedAccessGrant) | ||
require.Equal(t, "", resp.Record.InvalidationReason) | ||
require.Zero(t, resp.Record.InvalidatedAtUnix) | ||
}) | ||
} | ||
|
||
func TestNodeAdmin_UnpublishRecord(t *testing.T) { | ||
badgerauthtest.RunSingleNode(t, badgerauth.Config{ | ||
ID: badgerauth.NodeID{'a', 'd', 'm', 'p', 'u', 'b'}, | ||
}, func(ctx *testcontext.Context, t *testing.T, node *badgerauth.Node) { | ||
admin := badgerauth.NewAdmin(node.DB) | ||
records, keys, _ := badgerauthtest.CreateFullRecords(ctx, t, node, 2) | ||
|
||
_, err := admin.UnpublishRecord(ctx, &pb.UnpublishRecordRequest{}) | ||
require.Equal(t, rpcstatus.Code(err), rpcstatus.NotFound) | ||
|
||
_, err = admin.UnpublishRecord(ctx, &pb.UnpublishRecordRequest{Key: make([]byte, 33)}) | ||
require.Equal(t, rpcstatus.Code(err), rpcstatus.InvalidArgument) | ||
|
||
_, err = admin.UnpublishRecord(ctx, &pb.UnpublishRecordRequest{Key: keys[0].Bytes()}) | ||
require.NoError(t, err) | ||
|
||
resp, err := admin.GetRecord(ctx, &pb.GetRecordRequest{Key: keys[0].Bytes()}) | ||
require.NoError(t, err) | ||
require.Equal(t, records[keys[0]].EncryptedAccessGrant, resp.Record.EncryptedAccessGrant) | ||
require.False(t, resp.Record.Public) | ||
|
||
resp, err = admin.GetRecord(ctx, &pb.GetRecordRequest{Key: keys[1].Bytes()}) | ||
require.NoError(t, err) | ||
require.Equal(t, records[keys[1]].EncryptedAccessGrant, resp.Record.EncryptedAccessGrant) | ||
require.True(t, resp.Record.Public) | ||
}) | ||
} | ||
|
||
func TestNodeAdmin_DeleteRecord(t *testing.T) { | ||
badgerauthtest.RunSingleNode(t, badgerauth.Config{ | ||
ID: badgerauth.NodeID{'a', 'd', 'm', 'd', 'e', 'l'}, | ||
}, func(ctx *testcontext.Context, t *testing.T, node *badgerauth.Node) { | ||
admin := badgerauth.NewAdmin(node.DB) | ||
records, keys, entries := badgerauthtest.CreateFullRecords(ctx, t, node, 2) | ||
|
||
badgerauthtest.VerifyReplicationLog{ | ||
Entries: entries, | ||
}.Check(ctx, t, node.UnderlyingDB().UnderlyingDB()) | ||
|
||
_, err := admin.DeleteRecord(ctx, &pb.DeleteRecordRequest{Key: []byte{'a'}}) | ||
require.Equal(t, rpcstatus.Code(err), rpcstatus.NotFound) | ||
|
||
_, err = admin.DeleteRecord(ctx, &pb.DeleteRecordRequest{Key: keys[0].Bytes()}) | ||
require.NoError(t, err) | ||
|
||
_, err = admin.DeleteRecord(ctx, &pb.DeleteRecordRequest{Key: make([]byte, 33)}) | ||
require.Equal(t, rpcstatus.Code(err), rpcstatus.InvalidArgument) | ||
|
||
badgerauthtest.VerifyReplicationLog{ | ||
Entries: []badgerauthtest.ReplicationLogEntryWithTTL{entries[1]}, | ||
}.Check(ctx, t, node.UnderlyingDB().UnderlyingDB()) | ||
|
||
_, err = admin.GetRecord(ctx, &pb.GetRecordRequest{Key: keys[0].Bytes()}) | ||
require.Equal(t, rpcstatus.Code(err), rpcstatus.NotFound) | ||
|
||
resp, err := admin.GetRecord(ctx, &pb.GetRecordRequest{Key: keys[1].Bytes()}) | ||
require.NoError(t, err) | ||
require.Equal(t, resp.Record.EncryptedAccessGrant, records[keys[1]].EncryptedAccessGrant) | ||
}) | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.