Skip to content

Commit

Permalink
add endpoint validation to create data source API (opensearch-project…
Browse files Browse the repository at this point in the history
  • Loading branch information
opensearch-trigger-bot[bot] authored Apr 26, 2024
1 parent 25fb473 commit 7dbb5a0
Show file tree
Hide file tree
Showing 6 changed files with 120 additions and 19 deletions.
16 changes: 16 additions & 0 deletions src/plugins/data_source/server/data_source_service.mock.ts
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
/*
* Copyright OpenSearch Contributors
* SPDX-License-Identifier: Apache-2.0
*/
// eslint-disable-next-line @osd/eslint/no-restricted-paths
import { opensearchClientMock } from '../../../../src/core/server/opensearch/client/mocks';
import { DataSourceServiceSetup } from './data_source_service';

const dataSourceClient = opensearchClientMock.createInternalClient();
const create = () =>
(({
getDataSourceClient: jest.fn(() => Promise.resolve(dataSourceClient)),
getDataSourceLegacyClient: jest.fn(),
} as unknown) as jest.Mocked<DataSourceServiceSetup>);

export const dataSourceServiceSetupMock = { create };
25 changes: 13 additions & 12 deletions src/plugins/data_source/server/plugin.ts
Original file line number Diff line number Diff line change
Expand Up @@ -61,16 +61,26 @@ export class DataSourcePlugin implements Plugin<DataSourcePluginSetup, DataSourc
const cryptographyServiceSetup: CryptographyServiceSetup = this.cryptographyService.setup(
config
);
const dataSourceServiceSetup: DataSourceServiceSetup = await this.dataSourceService.setup(
config
);

const authRegistryPromise = core.getStartServices().then(([, , selfStart]) => {
const dataSourcePluginStart = selfStart as DataSourcePluginStart;
return dataSourcePluginStart.getAuthenticationMethodRegistry();
});
const auditTrailPromise = core.getStartServices().then(([coreStart]) => coreStart.auditTrail);
const customApiSchemaRegistryPromise = core.getStartServices().then(([, , selfStart]) => {
const dataSourcePluginStart = selfStart as DataSourcePluginStart;
return dataSourcePluginStart.getCustomApiSchemaRegistry();
});

const dataSourceSavedObjectsClientWrapper = new DataSourceSavedObjectsClientWrapper(
dataSourceServiceSetup,
cryptographyServiceSetup,
this.logger.get('data-source-saved-objects-client-wrapper-factory'),
authRegistryPromise,
customApiSchemaRegistryPromise,
config.endpointDeniedIPs
);

Expand Down Expand Up @@ -104,20 +114,12 @@ export class DataSourcePlugin implements Plugin<DataSourcePluginSetup, DataSourc
},
};
core.auditTrail.register(auditorFactory);
const auditTrailPromise = core.getStartServices().then(([coreStart]) => coreStart.auditTrail);

const dataSourceService: DataSourceServiceSetup = await this.dataSourceService.setup(config);

const customApiSchemaRegistryPromise = core.getStartServices().then(([, , selfStart]) => {
const dataSourcePluginStart = selfStart as DataSourcePluginStart;
return dataSourcePluginStart.getCustomApiSchemaRegistry();
});

// Register data source plugin context to route handler context
core.http.registerRouteHandlerContext(
'dataSource',
this.createDataSourceRouteHandlerContext(
dataSourceService,
dataSourceServiceSetup,
cryptographyServiceSetup,
this.logger,
auditTrailPromise,
Expand All @@ -129,14 +131,14 @@ export class DataSourcePlugin implements Plugin<DataSourcePluginSetup, DataSourc
const router = core.http.createRouter();
registerTestConnectionRoute(
router,
dataSourceService,
dataSourceServiceSetup,
cryptographyServiceSetup,
authRegistryPromise,
customApiSchemaRegistryPromise
);
registerFetchDataSourceMetaDataRoute(
router,
dataSourceService,
dataSourceServiceSetup,
cryptographyServiceSetup,
authRegistryPromise,
customApiSchemaRegistryPromise
Expand Down Expand Up @@ -174,7 +176,6 @@ export class DataSourcePlugin implements Plugin<DataSourcePluginSetup, DataSourc
private createDataSourceRouteHandlerContext = (
dataSourceService: DataSourceServiceSetup,
cryptography: CryptographyServiceSetup,
logger: Logger,
auditTrailPromise: Promise<AuditorFactory>,
authRegistryPromise: Promise<IAuthenticationMethodRegistry>,
customApiSchemaRegistryPromise: Promise<CustomApiSchemaRegistry>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@ import { registerFetchDataSourceMetaDataRoute } from './fetch_data_source_metada
import { AuthType } from '../../common/data_sources';
// eslint-disable-next-line @osd/eslint/no-restricted-paths
import { opensearchClientMock } from '../../../../../src/core/server/opensearch/client/mocks';
import { index } from 'mathjs';

type SetupServerReturn = UnwrapPromise<ReturnType<typeof setupServer>>;

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,10 @@ import { AuthType } from '../../common/data_sources';
import { cryptographyServiceSetupMock } from '../cryptography_service.mocks';
import { DataSourceSavedObjectsClientWrapper } from './data_source_saved_objects_client_wrapper';
import { SavedObject } from 'opensearch-dashboards/public';
import { dataSourceServiceSetupMock } from '../data_source_service.mock';
import { CustomApiSchemaRegistry } from '../schema_registry';
import { DataSourceConnectionValidator } from '../routes/data_source_connection_validator';
import { DATA_SOURCE_TITLE_LENGTH_LIMIT } from '../util/constants';

describe('DataSourceSavedObjectsClientWrapper', () => {
const customAuthName = 'role_based_auth';
Expand All @@ -33,11 +37,17 @@ describe('DataSourceSavedObjectsClientWrapper', () => {
const cryptographyMock = cryptographyServiceSetupMock.create();
const logger = loggingSystemMock.createLogger();
const authRegistryPromise = Promise.resolve(authRegistry);
const customApiSchemaRegistry = new CustomApiSchemaRegistry();
const customApiSchemaRegistryPromise = Promise.resolve(customApiSchemaRegistry);
const dataSourceServiceSetup = dataSourceServiceSetupMock.create();
const wrapperInstance = new DataSourceSavedObjectsClientWrapper(
dataSourceServiceSetup,
cryptographyMock,
logger,
authRegistryPromise
authRegistryPromise,
customApiSchemaRegistryPromise
);

const mockedClient = savedObjectsClientMock.create();
const wrapperClient = wrapperInstance.wrapperFactory({
client: mockedClient,
Expand Down Expand Up @@ -69,13 +79,17 @@ describe('DataSourceSavedObjectsClientWrapper', () => {
describe('createWithCredentialsEncryption', () => {
beforeEach(() => {
mockedClient.create.mockClear();
jest
.spyOn(DataSourceConnectionValidator.prototype, 'validate')
.mockResolvedValue(Promise.resolve() as Promise<any>);
});
it('should create data source when auth type is NO_AUTH', async () => {
const mockDataSourceAttributesWithNoAuth = attributes({
auth: {
type: AuthType.NoAuth,
},
});

await wrapperClient.create(
DATA_SOURCE_SAVED_OBJECT_TYPE,
mockDataSourceAttributesWithNoAuth,
Expand Down Expand Up @@ -200,6 +214,17 @@ describe('DataSourceSavedObjectsClientWrapper', () => {
).rejects.toThrowError(`"title" attribute must be a non-empty string`);
});

it(`should throw error when title is longer than ${DATA_SOURCE_TITLE_LENGTH_LIMIT} characters`, async () => {
const mockDataSourceAttributes = attributes({
title: 'a'.repeat(33),
});
await expect(
wrapperClient.create(DATA_SOURCE_SAVED_OBJECT_TYPE, mockDataSourceAttributes, {})
).rejects.toThrowError(
`"title" attribute is limited to ${DATA_SOURCE_TITLE_LENGTH_LIMIT} characters`
);
});

it('should throw error when endpoint is not valid', async () => {
const mockDataSourceAttributes = attributes({
endpoint: 'asasasasas',
Expand All @@ -209,6 +234,23 @@ describe('DataSourceSavedObjectsClientWrapper', () => {
).rejects.toThrowError(`"endpoint" attribute is not valid or allowed`);
});

it('should throw error when endpoint is not valid OpenSearch endpoint', async () => {
const mockDataSourceAttributes = attributes({
auth: {
type: AuthType.NoAuth,
},
});
jest
.spyOn(DataSourceConnectionValidator.prototype, 'validate')
.mockImplementationOnce(() => {
throw new Error();
});

await expect(
wrapperClient.create(DATA_SOURCE_SAVED_OBJECT_TYPE, mockDataSourceAttributes, {})
).rejects.toThrowError(`endpoint is not valid OpenSearch endpoint: Bad Request`);
});

it('should throw error when auth is not present', async () => {
await expect(
wrapperClient.create(DATA_SOURCE_SAVED_OBJECT_TYPE, attributes(), {})
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@
*/

import {
OpenSearchClient,
SavedObjectsBulkCreateObject,
SavedObjectsBulkResponse,
SavedObjectsBulkUpdateObject,
Expand All @@ -26,6 +27,10 @@ import {
import { EncryptionContext, CryptographyServiceSetup } from '../cryptography_service';
import { isValidURL } from '../util/endpoint_validator';
import { IAuthenticationMethodRegistry } from '../auth_registry';
import { DataSourceServiceSetup } from '../data_source_service';
import { CustomApiSchemaRegistry } from '../schema_registry';
import { DataSourceConnectionValidator } from '../routes/data_source_connection_validator';
import { DATA_SOURCE_TITLE_LENGTH_LIMIT } from '../util/constants';

/**
* Describes the Credential Saved Objects Client Wrapper class,
Expand Down Expand Up @@ -139,9 +144,11 @@ export class DataSourceSavedObjectsClientWrapper {
};

constructor(
private dataSourcesService: DataSourceServiceSetup,
private cryptography: CryptographyServiceSetup,
private logger: Logger,
private authRegistryPromise: Promise<IAuthenticationMethodRegistry>,
private customApiSchemaRegistryPromise: Promise<CustomApiSchemaRegistry>,
private endpointBlockedIps?: string[]
) {}

Expand Down Expand Up @@ -252,26 +259,56 @@ export class DataSourceSavedObjectsClientWrapper {

private async validateAttributes<T = unknown>(attributes: T) {
const { title, endpoint, auth } = attributes;
if (!title?.trim?.().length) {

this.validateTitle(title);
await this.validateEndpoint(endpoint, attributes as DataSourceAttributes);
await this.validateAuth(auth);
}

private validateTitle(title: string) {
if (!title.trim().length) {
throw SavedObjectsErrorHelpers.createBadRequestError(
'"title" attribute must be a non-empty string'
);
}

if (title.length > DATA_SOURCE_TITLE_LENGTH_LIMIT) {
throw SavedObjectsErrorHelpers.createBadRequestError(
`"title" attribute is limited to ${DATA_SOURCE_TITLE_LENGTH_LIMIT} characters`
);
}
}

private async validateEndpoint(endpoint: string, attributes: DataSourceAttributes) {
if (!isValidURL(endpoint, this.endpointBlockedIps)) {
throw SavedObjectsErrorHelpers.createBadRequestError(
'"endpoint" attribute is not valid or allowed'
);
}
try {
const dataSourceClient: OpenSearchClient = await this.dataSourcesService.getDataSourceClient({
savedObjects: {} as any,
cryptography: this.cryptography,
testClientDataSourceAttr: attributes as DataSourceAttributes,
authRegistry: await this.authRegistryPromise,
customApiSchemaRegistryPromise: this.customApiSchemaRegistryPromise,
});

if (!auth) {
throw SavedObjectsErrorHelpers.createBadRequestError('"auth" attribute is required');
}
const dataSourceValidator = new DataSourceConnectionValidator(dataSourceClient, attributes);

await this.validateAuth(auth);
await dataSourceValidator.validate();
} catch (err: any) {
throw SavedObjectsErrorHelpers.createBadRequestError(
`endpoint is not valid OpenSearch endpoint`
);
}
}

private async validateAuth<T = unknown>(auth: T) {
if (!auth) {
throw SavedObjectsErrorHelpers.createBadRequestError('"auth" attribute is required');
}

const { type, credentials } = auth;

if (!type) {
Expand Down
6 changes: 6 additions & 0 deletions src/plugins/data_source/server/util/constants.ts
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
/*
* Copyright OpenSearch Contributors
* SPDX-License-Identifier: Apache-2.0
*/

export const DATA_SOURCE_TITLE_LENGTH_LIMIT = 32;

0 comments on commit 7dbb5a0

Please sign in to comment.