summaryrefslogtreecommitdiff
path: root/jstests/replsets/auth2.js
blob: 92d1c10e23a96c10d13ebe43605ae87688ddf02f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
// Tests authentication with replica sets using key files.
//
// This test requires users to persist across a restart.
// @tags: [requires_persistence]

// We turn off gossiping the mongo shell's clusterTime because this test connects to replica sets
// and sharded clusters as a user other than __system. Attempting to advance the clusterTime while
// it has been signed with a dummy key results in an authorization error.
TestData.skipGossipingClusterTime = true;

(function() {
    var testInvalidAuthStates = function(replSetTest) {
        print("check that 0 is in recovering");
        replSetTest.waitForState(replSetTest.nodes[0], ReplSetTest.State.RECOVERING);

        print("shut down 1, 0 still in recovering.");
        replSetTest.stop(1);
        sleep(5);

        replSetTest.waitForState(replSetTest.nodes[0], ReplSetTest.State.RECOVERING);

        print("shut down 2, 0 becomes a secondary.");
        replSetTest.stop(2);

        replSetTest.waitForState(replSetTest.nodes[0], ReplSetTest.State.SECONDARY);

        replSetTest.restart(1, {"keyFile": key1});
        replSetTest.restart(2, {"keyFile": key1});
    };

    var name = "rs_auth2";
    var path = "jstests/libs/";

    // These keyFiles have their permissions set to 600 later in the test.
    var key1 = path + "key1";
    var key2 = path + "key2";

    var replSetTest = new ReplSetTest({name: name, nodes: 3, waitForKeys: true});
    var nodes = replSetTest.startSet();
    var hostnames = replSetTest.nodeList();
    replSetTest.initiate({
        "_id": name,
        "members": [
            {"_id": 0, "host": hostnames[0], "priority": 2},
            {"_id": 1, "host": hostnames[1], priority: 0},
            {"_id": 2, "host": hostnames[2], priority: 0}
        ]
    });

    var master = replSetTest.getPrimary();

    print("add an admin user");
    master.getDB("admin").createUser({user: "foo", pwd: "bar", roles: jsTest.adminUserRoles},
                                     {w: 3, wtimeout: replSetTest.kDefaultTimeoutMS});
    var m = replSetTest.nodes[0];

    print("starting 1 and 2 with key file");
    replSetTest.stop(1);
    replSetTest.restart(1, {"keyFile": key1});
    replSetTest.stop(2);
    replSetTest.restart(2, {"keyFile": key1});

    // auth to all nodes with auth
    replSetTest.nodes[1].getDB("admin").auth("foo", "bar");
    replSetTest.nodes[2].getDB("admin").auth("foo", "bar");
    testInvalidAuthStates(replSetTest);

    print("restart mongod with bad keyFile");

    replSetTest.stop(0);
    m = replSetTest.restart(0, {"keyFile": key2});

    // auth to all nodes
    replSetTest.nodes[0].getDB("admin").auth("foo", "bar");
    replSetTest.nodes[1].getDB("admin").auth("foo", "bar");
    replSetTest.nodes[2].getDB("admin").auth("foo", "bar");
    testInvalidAuthStates(replSetTest);

    replSetTest.stop(0);
    m = replSetTest.restart(0, {"keyFile": key1});

    replSetTest.stopSet();
}());