Commit Graph

26 Commits (dac2c10ce9df2c1ba3670224606beebdad8a3b8e)

Author SHA1 Message Date
Hitoshi Mitake 881903b6d3 e2e: add a new test case for protecting watch with auth 2017-05-20 11:34:45 +09:00
Hitoshi Mitake e1306bff8f *: simply ignore ErrAuthNotEnabled in clientv3 if auth is not enabled
Fix https://github.com/coreos/etcd/issues/7724
2017-04-19 11:27:14 +09:00
Hitoshi Mitake a204b14503 e2e: add a test case for the --open-ended option 2017-04-04 17:28:59 +09:00
Xiang Li 54928f5deb Merge pull request #7524 from mitake/del-and-revoke-role
auth: changes of managing roles and users
2017-03-23 15:10:10 -07:00
Hitoshi Mitake 8d0d942c47 e2e: add a test case for invalid management of root user and role 2017-03-23 16:47:58 +09:00
Hitoshi Mitake 0c87467f69 e2e: add a test case role delete and revoke 2017-03-23 16:47:44 +09:00
Hitoshi Mitake 5594f695bc e2e, etcdserver: fix wrong usages of ordinal
They must be "ordinary".
2017-03-21 23:50:16 +09:00
Anthony Romano 21ac657e67 e2e: force endpoint for member removal
e2e tests use different invocations of etcdctl, so the endpoint used to get
the member list will not necessarily be the same to make the remove call.
Instead, select an endpoint that is not being remove, and connect with that.
2017-03-17 16:24:54 -07:00
Anthony Romano 13e36f963d e2e: don't remove member used to connect to etcd cluster
Fixes #7204
2017-03-08 15:58:45 -08:00
Hitoshi Mitake cd9f0a1721 e2e: add a case for CommonName auth of v3 API 2017-01-31 17:22:12 +09:00
Xiang Li 78540c5e7b e2e: do not remove the member we connect to 2017-01-26 15:43:27 -08:00
Xiang Li 35fd5dc9fc Merge pull request #6903 from mitake/auth-member
protect membership change RPCs with auth
2016-12-15 08:04:31 -08:00
Hitoshi Mitake d46b753186 e2e: test cases of protecting membership change with auth 2016-12-15 22:54:20 +09:00
Gyu-Ho Lee 3512f114e4 e2e: remove unused 'ctlV3GetFailPerm' 2016-12-12 10:07:14 -08:00
Hitoshi Mitake 4e2b09a7ca etcdctl: an option for granting permission with key prefix
This commit adds a new option --prefix to "role grant-permission"
command. If the option is passed, the command interprets the key as a
prefix of range permission.

Example of usage:
$ ETCDCTL_API=3 bin/etcdctl --user root:p role grant-permission --prefix r1 readwrite /dir/
Role r1 updated
$ ETCDCTL_API=3 bin/etcdctl --user root:p role get r1
Role r1
KV Read:
        [/dir/, /dir0)
        [k1, k5)
KV Write:
        [/dir/, /dir0)
        [k1, k5)
$ ETCDCTL_API=3 bin/etcdctl --user u1:p put /dir/key val
OK
2016-09-14 12:54:14 +09:00
Hitoshi Mitake bc5d7bbe03 auth, e2e, clientv3: the root role should be granted access to every key
This commit changes the semantics of the root role. The role should be
able to access to every key.

Partially fixes https://github.com/coreos/etcd/issues/6355
2016-09-06 16:10:28 +09:00
Hitoshi Mitake 3d5d3b90e9 e2e: a test case for txn and permission
This commit adds a new test case for checking the permission mechanism
can work well in txn requests.
2016-08-22 12:06:19 +09:00
Hitoshi Mitake 745e1e2cf9 e2e: enhance the test case of auth disabling 2016-06-29 11:31:42 +09:00
Hitoshi Mitake 4106e56d91 e2e: check role revoking during operations 2016-06-21 15:52:36 +09:00
Hitoshi Mitake 68bcbdc84e e2e: check user deletion during operations 2016-06-21 15:03:04 +09:00
Hitoshi Mitake 6fe4d9d30a e2e: check runtime permission changing
This commit adds extends the test for checking runtime permission
grant/revoke.
2016-06-21 11:55:09 +09:00
Anthony Romano 1e22137a9a e2e: test auth is respected for Puts 2016-06-10 11:43:06 -07:00
Xiang Li da2f2a5189 auth: add root user and root role 2016-06-08 19:55:08 -07:00
Gyu-Ho Lee ef44f71da9 *: update LICENSE header 2016-05-12 20:51:48 -07:00
Ajit Yagaty adc981c53d auth: Adding support for "auth disable" command.
Added support for the auth disable command in the server, added the
etcdctl command and a respective testcase.
2016-05-07 19:21:49 -07:00
Gyu-Ho Lee fefb58dc90 e2e: clean up, add more tests 2016-04-14 11:42:57 -07:00