org.elasticsearch.xpack.security.authc.CrossClusterAccessAuthenticationService Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of x-pack-security Show documentation
Show all versions of x-pack-security Show documentation
Elasticsearch Expanded Pack Plugin - Security
/*
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
* or more contributor license agreements. Licensed under the Elastic License
* 2.0; you may not use this file except in compliance with the Elastic License
* 2.0.
*/
package org.elasticsearch.xpack.security.authc;
import org.apache.logging.log4j.LogManager;
import org.apache.logging.log4j.Logger;
import org.elasticsearch.ElasticsearchSecurityException;
import org.elasticsearch.TransportVersion;
import org.elasticsearch.action.ActionListener;
import org.elasticsearch.action.support.ContextPreservingActionListener;
import org.elasticsearch.cluster.service.ClusterService;
import org.elasticsearch.common.util.concurrent.ThreadContext;
import org.elasticsearch.transport.TransportRequest;
import org.elasticsearch.xpack.core.ClientHelper;
import org.elasticsearch.xpack.core.security.action.apikey.ApiKey;
import org.elasticsearch.xpack.core.security.authc.Authentication;
import org.elasticsearch.xpack.core.security.authc.AuthenticationResult;
import org.elasticsearch.xpack.core.security.authc.CrossClusterAccessSubjectInfo;
import org.elasticsearch.xpack.core.security.support.Exceptions;
import java.util.Collections;
import java.util.List;
import java.util.Map;
import java.util.Objects;
import java.util.function.Supplier;
import static org.elasticsearch.core.Strings.format;
import static org.elasticsearch.transport.RemoteClusterPortSettings.TRANSPORT_VERSION_ADVANCED_REMOTE_CLUSTER_SECURITY;
import static org.elasticsearch.xpack.core.security.authc.CrossClusterAccessSubjectInfo.CROSS_CLUSTER_ACCESS_SUBJECT_INFO_HEADER_KEY;
import static org.elasticsearch.xpack.security.authc.CrossClusterAccessHeaders.CROSS_CLUSTER_ACCESS_CREDENTIALS_HEADER_KEY;
public class CrossClusterAccessAuthenticationService {
private static final Logger logger = LogManager.getLogger(CrossClusterAccessAuthenticationService.class);
private final ClusterService clusterService;
private final ApiKeyService apiKeyService;
private final AuthenticationService authenticationService;
public CrossClusterAccessAuthenticationService(
ClusterService clusterService,
ApiKeyService apiKeyService,
AuthenticationService authenticationService
) {
this.clusterService = clusterService;
this.apiKeyService = apiKeyService;
this.authenticationService = authenticationService;
}
public void authenticate(final String action, final TransportRequest request, final ActionListener listener) {
final ThreadContext threadContext = clusterService.threadPool().getThreadContext();
final CrossClusterAccessHeaders crossClusterAccessHeaders;
final Authenticator.Context authcContext;
try {
// parse and add as authentication token as early as possible so that failure events in audit log include API key ID
crossClusterAccessHeaders = CrossClusterAccessHeaders.readFromContext(threadContext);
final ApiKeyService.ApiKeyCredentials apiKeyCredentials = crossClusterAccessHeaders.credentials();
assert ApiKey.Type.CROSS_CLUSTER == apiKeyCredentials.getExpectedType();
// authn must verify only the provided api key and not try to extract any other credential from the thread context
authcContext = authenticationService.newContext(action, request, apiKeyCredentials);
} catch (Exception ex) {
withRequestProcessingFailure(authenticationService.newContext(action, request, null), ex, listener);
return;
}
try {
apiKeyService.ensureEnabled();
} catch (Exception ex) {
withRequestProcessingFailure(authcContext, ex, listener);
return;
}
// This check is to ensure all nodes understand cross_cluster_access subject type
if (getMinTransportVersion().before(TRANSPORT_VERSION_ADVANCED_REMOTE_CLUSTER_SECURITY)) {
withRequestProcessingFailure(
authcContext,
new IllegalArgumentException(
"all nodes must have version ["
+ TRANSPORT_VERSION_ADVANCED_REMOTE_CLUSTER_SECURITY.toReleaseVersion()
+ "] or higher to support cross cluster requests through the dedicated remote cluster port"
),
listener
);
return;
}
// This is ensured by CrossClusterAccessServerTransportFilter -- validating for internal consistency here
assert threadContext.getHeaders().keySet().stream().noneMatch(ClientHelper.SECURITY_HEADER_FILTERS::contains);
try (
ThreadContext.StoredContext ignored = threadContext.newStoredContext(
Collections.emptyList(),
// drop cross cluster access authentication headers since we've read their values, and we want to maintain the invariant
// that either the cross cluster access subject info header is in the context, or the authentication header, but not both
List.of(CROSS_CLUSTER_ACCESS_CREDENTIALS_HEADER_KEY, CROSS_CLUSTER_ACCESS_SUBJECT_INFO_HEADER_KEY)
)
) {
final Supplier storedContextSupplier = threadContext.newRestorableContext(false);
authenticationService.authenticate(
authcContext,
new ContextPreservingActionListener<>(storedContextSupplier, ActionListener.wrap(authentication -> {
assert authentication.isApiKey() : "initial authentication for cross cluster access must be by API key";
assert false == authentication.isRunAs() : "initial authentication for cross cluster access cannot be run-as";
// try-catch so any failure here is wrapped by `withRequestProcessingFailure`, whereas `authenticate` failures are not
// we should _not_ wrap `authenticate` failures since this produces duplicate audit events
try {
final CrossClusterAccessSubjectInfo subjectInfo = crossClusterAccessHeaders.getCleanAndValidatedSubjectInfo();
writeAuthToContext(authcContext, authentication.toCrossClusterAccess(subjectInfo), listener);
} catch (Exception ex) {
withRequestProcessingFailure(authcContext, ex, listener);
}
}, listener::onFailure))
);
}
}
public void tryAuthenticate(Map headers, ActionListener listener) {
final ApiKeyService.ApiKeyCredentials credentials;
try {
credentials = extractApiKeyCredentialsFromHeaders(headers);
} catch (Exception e) {
listener.onFailure(e);
return;
}
tryAuthenticate(credentials, listener);
}
public void tryAuthenticate(ApiKeyService.ApiKeyCredentials credentials, ActionListener listener) {
Objects.requireNonNull(credentials);
apiKeyService.tryAuthenticate(clusterService.threadPool().getThreadContext(), credentials, ActionListener.wrap(authResult -> {
if (authResult.isAuthenticated()) {
logger.trace("Cross cluster credentials authentication successful for [{}]", credentials.principal());
listener.onResponse(null);
return;
}
if (authResult.getStatus() == AuthenticationResult.Status.TERMINATE) {
Exception e = (authResult.getException() != null)
? authResult.getException()
: Exceptions.authenticationError(authResult.getMessage());
logger.debug(() -> "API key service terminated authentication", e);
listener.onFailure(e);
} else {
if (authResult.getMessage() != null) {
if (authResult.getException() != null) {
logger.warn(
() -> format("Authentication using apikey failed - %s", authResult.getMessage()),
authResult.getException()
);
} else {
logger.warn("Authentication using apikey failed - {}", authResult.getMessage());
}
}
listener.onFailure(Exceptions.authenticationError(authResult.getMessage(), authResult.getException()));
}
}, e -> listener.onFailure(Exceptions.authenticationError("failed to authenticate cross cluster credentials", e))));
}
public ApiKeyService.ApiKeyCredentials extractApiKeyCredentialsFromHeaders(Map headers) {
try {
apiKeyService.ensureEnabled();
final String credentials = headers == null ? null : headers.get(CROSS_CLUSTER_ACCESS_CREDENTIALS_HEADER_KEY);
if (credentials == null) {
throw requiredHeaderMissingException(CROSS_CLUSTER_ACCESS_CREDENTIALS_HEADER_KEY);
}
return CrossClusterAccessHeaders.parseCredentialsHeader(credentials);
} catch (Exception ex) {
throw Exceptions.authenticationError("failed to extract credentials from headers", ex);
}
}
public static IllegalArgumentException requiredHeaderMissingException(String headerKey) {
return new IllegalArgumentException(
"Cross cluster requests through the dedicated remote cluster server port require transport header ["
+ headerKey
+ "] but none found. "
+ "Please ensure you have configured remote cluster credentials on the cluster originating the request."
);
}
public AuthenticationService getAuthenticationService() {
return authenticationService;
}
private TransportVersion getMinTransportVersion() {
return clusterService.state().getMinTransportVersion();
}
private static void withRequestProcessingFailure(
final Authenticator.Context context,
final Exception ex,
final ActionListener listener
) {
logger.debug(() -> format("Failed to authenticate cross cluster access for request [%s]", context.getRequest()), ex);
final ElasticsearchSecurityException ese = context.getRequest()
.exceptionProcessingRequest(ex, context.getMostRecentAuthenticationToken());
context.addUnsuccessfulMessageToMetadata(ese);
listener.onFailure(ese);
}
private static void writeAuthToContext(
final Authenticator.Context context,
final Authentication authentication,
final ActionListener listener
) {
try {
authentication.writeToContext(context.getThreadContext());
context.getRequest().authenticationSuccess(authentication);
} catch (Exception e) {
logger.debug(
() -> format("Failed to store authentication [%s] for cross cluster request [%s]", authentication, context.getRequest()),
e
);
withRequestProcessingFailure(context, e, listener);
return;
}
logger.trace("Established authentication [{}] for cross cluster request [{}]", authentication, context.getRequest());
listener.onResponse(authentication);
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy