Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fail loading an ACL config if the provided file is empty and enforceTableACLConfig is true #17274

Open
wants to merge 4 commits into
base: main
Choose a base branch
from

Conversation

garfthoffman
Copy link

Description

When the ACL file is loaded, add a check to verify that the config is not empty and fail execution if the --enforce-tableacl-config flag has been provided.

Related Issue(s)

closes #17273

Checklist

  • "Backport to:" labels have been added if this change should be back-ported to release branches
  • If this change is to be back-ported to previous releases, a justification is included in the PR description
  • Tests were added or are not required
  • Did the new or modified tests pass consistently locally and on CI?
  • Documentation was added or is not required

Deployment Notes

Copy link
Contributor

vitess-bot bot commented Nov 22, 2024

Review Checklist

Hello reviewers! 👋 Please follow this checklist when reviewing this Pull Request.

General

  • Ensure that the Pull Request has a descriptive title.
  • Ensure there is a link to an issue (except for internal cleanup and flaky test fixes), new features should have an RFC that documents use cases and test cases.

Tests

  • Bug fixes should have at least one unit or end-to-end test, enhancement and new features should have a sufficient number of tests.

Documentation

  • Apply the release notes (needs details) label if users need to know about this change.
  • New features should be documented.
  • There should be some code comments as to why things are implemented the way they are.
  • There should be a comment at the top of each new or modified test to explain what the test does.

New flags

  • Is this flag really necessary?
  • Flag names must be clear and intuitive, use dashes (-), and have a clear help text.

If a workflow is added or modified:

  • Each item in Jobs should be named in order to mark it as required.
  • If the workflow needs to be marked as required, the maintainer team must be notified.

Backward compatibility

  • Protobuf changes should be wire-compatible.
  • Changes to _vt tables and RPCs need to be backward compatible.
  • RPC changes should be compatible with vitess-operator
  • If a flag is removed, then it should also be removed from vitess-operator and arewefastyet, if used there.
  • vtctl command output order should be stable and awk-able.

@vitess-bot vitess-bot bot added NeedsBackportReason If backport labels have been applied to a PR, a justification is required NeedsDescriptionUpdate The description is not clear or comprehensive enough, and needs work NeedsIssue A linked issue is missing for this Pull Request NeedsWebsiteDocsUpdate What it says labels Nov 22, 2024
@github-actions github-actions bot added this to the v22.0.0 milestone Nov 22, 2024
@@ -367,7 +367,8 @@ func (tsv *TabletServer) initACL(tableACLConfigFile string, enforceTableACLConfi
tsv.ClearQueryPlanCache()
},
)
if err != nil {
// Log failure if either there was a problem loading the ACL, or if the ACL is empty
if err != nil || tableacl.GetCurrentConfig().String() == "" {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure if this is the correct place to perform this validation. I think a config file containing an empty JSON object should be treated as "valid", but a truncated file seems like a pretty clear configuration mistake. 🤔

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Addressed in eca5d61

Copy link

codecov bot commented Nov 23, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 67.37%. Comparing base (0b51839) to head (d47a37b).
Report is 100 commits behind head on main.

Additional details and impacted files
@@           Coverage Diff           @@
##             main   #17274   +/-   ##
=======================================
  Coverage   67.37%   67.37%           
=======================================
  Files        1573     1573           
  Lines      253113   253116    +3     
=======================================
+ Hits       170538   170544    +6     
+ Misses      82575    82572    -3     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Copy link
Contributor

This PR is being marked as stale because it has been open for 30 days with no activity. To rectify, you may do any of the following:

  • Push additional commits to the associated branch.
  • Remove the stale label.
  • Add a comment indicating why it is not stale.

If no action is taken within 7 days, this PR will be closed.

@github-actions github-actions bot added Stale Marks PRs as stale after a period of inactivity, which are then closed after a grace period. and removed Stale Marks PRs as stale after a period of inactivity, which are then closed after a grace period. labels Dec 24, 2024
@mattlord
Copy link
Contributor

@garfthoffman did you want to move forward with this? If so, let's mark it ready for review and go from there. Thanks!

@arthurschreiber arthurschreiber marked this pull request as ready for review December 26, 2024 23:27
@arthurschreiber arthurschreiber added Component: VTTablet and removed NeedsIssue A linked issue is missing for this Pull Request labels Jan 8, 2025
@arthurschreiber
Copy link
Contributor

@mattlord Can you take another look?

@mattlord mattlord added Type: Enhancement Logical improvement (somewhere between a bug and feature) and removed NeedsBackportReason If backport labels have been applied to a PR, a justification is required labels Jan 11, 2025
Copy link
Contributor

@mattlord mattlord left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

From the issue, the problem you're trying to solve seems to be more about whether or not the file contains a valid JSON document. Is that not correct? Unless I'm missing something, we should instead validate that the file contains a valid JSON document rather than just checking that it's empty (which would also be an invalid JSON doc as an empty doc would be "{}").

So instead of:

	if len(data) == 0 {
		return errors.New("tableACL config file is empty")
	}

It would be:

	if !json.Valid(data) {
		return errors.New("tableACL config file is invalid")
	}

I don't have a problem with the current code, but it doesn't seem like it resolves the issue as I read it.

}
defer os.Remove(f.Name())
if err := f.Close(); err != nil {
t.Fatal(err)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should use require/assert in new tests. So e.g. here it would be:

err := f.Close()
require.NoError(t, err)

Or even just: require.NoError(t, f.Close())

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Component: VTTablet NeedsDescriptionUpdate The description is not clear or comprehensive enough, and needs work NeedsWebsiteDocsUpdate What it says Type: Enhancement Logical improvement (somewhere between a bug and feature)
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Bug Report: Empty/truncated file considered valid when enforceTableACLConfig is set
3 participants