File: renameSystemCollections.js

package info (click to toggle)
mongodb 1%3A2.4.10-5
  • links: PTS, VCS
  • area: main
  • in suites: jessie-kfreebsd
  • size: 82,464 kB
  • sloc: cpp: 740,225; ansic: 152,098; sh: 13,820; python: 11,864; makefile: 1,012; perl: 922; pascal: 617; java: 452; lisp: 222; asm: 174
file content (87 lines) | stat: -rw-r--r-- 3,228 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
// SERVER-8623: Test that renameCollection can't be used to bypass auth checks on system namespaces
var conn = MongoRunner.runMongod({auth : ""});

var adminDB = conn.getDB("admin");
var testDB = conn.getDB("testdb");
var testDB2 = conn.getDB("testdb2");

testDB.addUser({user:'spencer',
                pwd:'password',
                roles:['readWrite']});

adminDB.addUser({user:'userAdmin',
                 pwd:'password',
                 roles:['userAdminAnyDatabase']});

var userAdminConn = new Mongo(conn.host);
userAdminConn.getDB('admin').auth('userAdmin', 'password');
userAdminConn.getDB('admin').addUser({user:'readWriteAdmin',
                                      pwd:'password',
                                      roles:['readWriteAnyDatabase']});


// Test that a readWrite user can't rename system.profile to something they can read.
testDB.auth('spencer', 'password');
res = testDB.system.profile.renameCollection("profile");
assert.eq(0, res.ok);
assert.eq("unauthorized", res.errmsg);


// Test that a readWrite user can't rename system.users to something they can read.
var res = testDB.system.users.renameCollection("users");
assert.eq(0, res.ok);
assert.eq("unauthorized", res.errmsg);
assert.eq(0, testDB.users.count());


// Test that a readWrite user can't use renameCollection to override system.users
testDB.users.insert({user:'backdoor',
                     pwd:'hashedpassword',
                     roles:'userAdmin'});
res = testDB.users.renameCollection("system.users", true);
assert.eq(0, res.ok);
assert.eq("unauthorized", res.errmsg);
assert.eq(null, userAdminConn.getDB('testdb').system.users.findOne({user:'backdoor'}));


// Test that a readWrite user can't create system.users using renameCollection
adminDB.auth('readWriteAdmin', 'password');
testDB2.users.insert({user:'backdoor',
                      pwd:'hashedpassword',
                      roles:'userAdmin'});
res = testDB2.users.renameCollection("system.users");
assert.eq(0, res.ok);
assert.eq("unauthorized", res.errmsg);
assert.eq(0, userAdminConn.getDB('testdb2').system.users.count());


// Test that you can't rename system.users across databases
testDB2.users.drop();
var res = adminDB.runCommand({renameCollection:'testdb.system.users', to:'testdb2.users'});
assert.eq(0, res.ok);
assert.eq("unauthorized", res.errmsg);
assert.eq(0, testDB2.users.count());


// Test that a userAdmin can't rename system.users without readWrite
testDB.users.drop();
var res = userAdminConn.getDB('testdb').system.users.renameCollection("users");
assert.eq(0, res.ok);
assert.eq("unauthorized", res.errmsg);
assert.eq(0, testDB.users.count());


// Test that with userAdmin AND dbAdmin you CAN rename to/from system.users
adminDB.auth('userAdmin', 'password');
var res = testDB.system.users.renameCollection("users");
assert.eq(1, res.ok);
assert.eq(1, testDB.users.count());

testDB.users.drop();
testDB.users.insert({user:'newUser',
                     pwd:'hashedPassword',
                     roles:['readWrite']});
var res = testDB.users.renameCollection("system.users");
assert.eq(1, res.ok);
assert.neq(null, testDB.system.users.findOne({user:'newUser'}));
assert.eq(null, testDB.system.users.findOne({user:'spencer'}));