summaryrefslogtreecommitdiff
path: root/jstests/auth/logs_include_client_info.js
blob: efd8bf512829a3fcd2ccd2d3358ea4875e508cc8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
// This test just checks that the success/failure messages for authentication include the IP
// address of the client attempting to authenticate.
load("jstests/libs/logv2_helpers.js");

(function() {
const conn = MongoRunner.runMongod({auth: ""});
const admin = conn.getDB("admin");

admin.createUser({
    user: "root",
    pwd: "root",
    roles: ["root"],
});

assert(admin.auth("root", "root"));

const failConn = new Mongo(conn.host);
failConn.getDB("admin").auth("root", "toot");

const log = assert.commandWorked(admin.runCommand({getLog: "global"})).log;

if (isJsonLog(conn)) {
    function checkAuthSuccess(element, index, array) {
        const log = JSON.parse(element);

        return log.id === 20250 && log.attr.principalName === "root" &&
            log.attr.authenticationDatabase === "admin" &&
            /(?:\d{1,3}\.){3}\d{1,3}:\d+/.test(log.attr.remote);
    }

    function checkSCRAMfail(element, index, array) {
        const log = JSON.parse(element);

        return log.id === 20249 && /SCRAM-SHA-\d+/.test(log.attr.mechanism) &&
            log.attr.principalName === "root" && log.attr.authenticationDatabase === "admin" &&
            /(?:\d{1,3}\.){3}\d{1,3}:\d+/.test(log.attr.remote);
    }

    assert(log.some(checkAuthSuccess));
    assert(log.some(checkSCRAMfail));
} else {
    const successRegex =
        /Successfully authenticated as principal root on admin from client (?:\d{1,3}\.){3}\d{1,3}:\d+/;
    const failRegex =
        /SASL SCRAM-SHA-\d+ authentication failed for root on admin from client (?:\d{1,3}\.){3}\d{1,3}:\d+/;

    assert(log.some((line) => successRegex.test(line)));
    assert(log.some((line) => failRegex.test(line)));
}

MongoRunner.stopMongod(conn);
})();