示例#1
0
 def test_multiple_root_secrets_with_invalid_secret(self):
     conf = {'encryption_root_secret': base64.b64encode(os.urandom(32)),
             # too short...
             'encryption_root_secret_22': base64.b64encode(os.urandom(31))}
     with self.assertRaises(ValueError) as err:
         keymaster.KeyMaster(self.swift, conf)
     self.assertEqual(
         'encryption_root_secret_22 option in proxy-server.conf '
         'must be a base64 encoding of at least 32 raw bytes',
         str(err.exception))
示例#2
0
 def do_test(bad_option):
     conf = {
         'encryption_root_secret': base64.b64encode(os.urandom(32)),
         bad_option: base64.b64encode(os.urandom(32))
     }
     with self.assertRaises(ValueError) as err:
         keymaster.KeyMaster(self.swift, conf)
     self.assertEqual(
         'Malformed root secret option name %s' % bad_option,
         str(err.exception))
示例#3
0
 def test_can_only_configure_secret_in_one_place(self):
     conf = {
         'encryption_root_secret': 'a' * 44,
         'keymaster_config_path': '/ets/swift/keymaster.conf'
     }
     with self.assertRaises(ValueError) as err:
         keymaster.KeyMaster(self.swift, conf)
     self.assertEqual(
         'keymaster_config_path is set, but there are '
         'other config options specified!', err.exception.message)
示例#4
0
    def test_keys_cached(self):
        secrets = {None: os.urandom(32),
                   '22': os.urandom(33),
                   'my_secret_id': os.urandom(50)}
        conf = {}
        for secret_id, secret in secrets.items():
            opt = ('encryption_root_secret%s' %
                   (('_%s' % secret_id) if secret_id else ''))
            conf[opt] = base64.b64encode(secret)
        conf['active_root_secret_id'] = '22'
        self.app = keymaster.KeyMaster(self.swift, conf)
        orig_create_key = self.app.create_key
        calls = []

        def mock_create_key(path, secret_id=None):
            calls.append((path, secret_id))
            return orig_create_key(path, secret_id)

        context = keymaster.KeyMasterContext(self.app, 'a', 'c', 'o')
        with mock.patch.object(self.app, 'create_key', mock_create_key):
            keys = context.fetch_crypto_keys()
        expected_keys = {
            'container': hmac.new(secrets['22'], b'/a/c',
                                  digestmod=hashlib.sha256).digest(),
            'object': hmac.new(secrets['22'], b'/a/c/o',
                               digestmod=hashlib.sha256).digest(),
            'id': {'path': '/a/c/o', 'secret_id': '22', 'v': '1'},
            'all_ids': [
                {'path': '/a/c/o', 'v': '1'},
                {'path': '/a/c/o', 'secret_id': '22', 'v': '1'},
                {'path': '/a/c/o', 'secret_id': 'my_secret_id', 'v': '1'}]}
        self.assertEqual(expected_keys, keys)
        self.assertEqual([('/a/c', '22'), ('/a/c/o', '22')], calls)
        with mock.patch.object(self.app, 'create_key', mock_create_key):
            keys = context.fetch_crypto_keys()
        # no more calls to create_key
        self.assertEqual([('/a/c', '22'), ('/a/c/o', '22')], calls)
        self.assertEqual(expected_keys, keys)
        with mock.patch.object(self.app, 'create_key', mock_create_key):
            keys = context.fetch_crypto_keys(key_id={'secret_id': None})
        expected_keys = {
            'container': hmac.new(secrets[None], b'/a/c',
                                  digestmod=hashlib.sha256).digest(),
            'object': hmac.new(secrets[None], b'/a/c/o',
                               digestmod=hashlib.sha256).digest(),
            'id': {'path': '/a/c/o', 'v': '1'},
            'all_ids': [
                {'path': '/a/c/o', 'v': '1'},
                {'path': '/a/c/o', 'secret_id': '22', 'v': '1'},
                {'path': '/a/c/o', 'secret_id': 'my_secret_id', 'v': '1'}]}
        self.assertEqual(expected_keys, keys)
        self.assertEqual([('/a/c', '22'), ('/a/c/o', '22'),
                          ('/a/c', None), ('/a/c/o', None)],
                         calls)
示例#5
0
    def test_correct_root_secret_used(self):
        secrets = {None: os.urandom(32),
                   '22': os.urandom(33),
                   'my_secret_id': os.urandom(50)}

        # no active_root_secret_id configured
        conf = {}
        for secret_id, secret in secrets.items():
            opt = ('encryption_root_secret%s' %
                   (('_%s' % secret_id) if secret_id else ''))
            conf[opt] = base64.b64encode(secret)
        self.app = keymaster.KeyMaster(self.swift, conf)
        keys = self.verify_keys_for_path('/a/c/o', ('container', 'object'))
        expected_keys = {
            'container': hmac.new(secrets[None], b'/a/c',
                                  digestmod=hashlib.sha256).digest(),
            'object': hmac.new(secrets[None], b'/a/c/o',
                               digestmod=hashlib.sha256).digest()}
        self.assertEqual(expected_keys, keys)

        # active_root_secret_id configured
        conf['active_root_secret_id'] = '22'
        self.app = keymaster.KeyMaster(self.swift, conf)
        keys = self.verify_keys_for_path('/a/c/o', ('container', 'object'))
        expected_keys = {
            'container': hmac.new(secrets['22'], b'/a/c',
                                  digestmod=hashlib.sha256).digest(),
            'object': hmac.new(secrets['22'], b'/a/c/o',
                               digestmod=hashlib.sha256).digest()}
        self.assertEqual(expected_keys, keys)

        # secret_id passed to fetch_crypto_keys callback
        for secret_id in ('my_secret_id', None):
            keys = self.verify_keys_for_path('/a/c/o', ('container', 'object'),
                                             key_id={'secret_id': secret_id})
            expected_keys = {
                'container': hmac.new(secrets[secret_id], b'/a/c',
                                      digestmod=hashlib.sha256).digest(),
                'object': hmac.new(secrets[secret_id], b'/a/c/o',
                                   digestmod=hashlib.sha256).digest()}
            self.assertEqual(expected_keys, keys)
示例#6
0
 def test_can_only_configure_secret_in_one_place(self):
     conf = {
         'encryption_root_secret': 'a' * 44,
         'keymaster_config_path': '/ets/swift/keymaster.conf'
     }
     with self.assertRaises(ValueError) as err:
         keymaster.KeyMaster(self.swift, conf)
     expected_message = ('keymaster_config_path is set, but there are '
                         'other config options specified:')
     self.assertTrue(
         err.exception.message.startswith(expected_message),
         "Error message does not start with '%s'" % expected_message)
 def test_root_secret(self):
     for secret in (os.urandom(32), os.urandom(33), os.urandom(50)):
         encoded_secret = base64.b64encode(secret)
         for conf_val in (bytes(encoded_secret), unicode(encoded_secret),
                          encoded_secret[:30] + '\n' + encoded_secret[30:]):
             try:
                 app = keymaster.KeyMaster(
                     self.swift, {'encryption_root_secret': conf_val,
                                  'encryption_root_secret_path': ''})
                 self.assertEqual(secret, app.root_secret)
             except AssertionError as err:
                 self.fail(str(err) + ' for secret %r' % conf_val)
示例#8
0
    def test_multiple_root_secrets(self):
        secrets = {None: os.urandom(32),
                   '22': os.urandom(33),
                   'my_secret_id': os.urandom(50)}

        conf = {}
        for secret_id, secret in secrets.items():
            opt = ('encryption_root_secret%s' %
                   (('_%s' % secret_id) if secret_id else ''))
            conf[opt] = base64.b64encode(secret)
        app = keymaster.KeyMaster(self.swift, conf)
        self.assertEqual(secrets, app._root_secrets)
        self.assertEqual([None, '22', 'my_secret_id'], app.root_secret_ids)
示例#9
0
 def _setup_crypto_app(self, disable_encryption=False, root_secret_id=None):
     # Set up a pipeline of crypto middleware ending in the proxy app so
     # that tests can make requests to either the proxy server directly or
     # via the crypto middleware. Make a fresh instance for each test to
     # avoid any state coupling.
     conf = {'disable_encryption': disable_encryption}
     self.encryption = crypto.filter_factory(conf)(self.proxy_app)
     self.encryption.logger = self.proxy_app.logger
     km_conf = dict(TEST_KEYMASTER_CONF)
     if root_secret_id is not None:
         km_conf['active_root_secret_id'] = root_secret_id
     self.km = keymaster.KeyMaster(self.encryption, km_conf)
     self.crypto_app = self.km  # for clarity
     self.crypto_app.logger = self.encryption.logger
 def test_invalid_root_secret(self):
     for secret in (bytes(base64.b64encode(os.urandom(31))),  # too short
                    unicode(base64.b64encode(os.urandom(31))),
                    u'a' * 44 + u'????', b'a' * 44 + b'????',  # not base64
                    u'a' * 45, b'a' * 45,  # bad padding
                    99, None):
         conf = {'encryption_root_secret': secret}
         try:
             with self.assertRaises(ValueError) as err:
                 keymaster.KeyMaster(self.swift, conf)
             self.assertEqual(
                 'encryption_root_secret option in proxy-server.conf '
                 'must be a base64 encoding of at least 32 raw bytes',
                 err.exception.message)
         except AssertionError as err:
             self.fail(str(err) + ' for conf %s' % str(conf))
示例#11
0
 def do_test(dflt_id):
     for secret in (os.urandom(32), os.urandom(33), os.urandom(50)):
         encoded_secret = base64.b64encode(secret)
         self.assertIsInstance(encoded_secret, bytes)
         for conf_val in (
                 encoded_secret,
                 encoded_secret.decode('ascii'),
                 encoded_secret[:30] + b'\n' + encoded_secret[30:],
                 (encoded_secret[:30] + b'\n' +
                  encoded_secret[30:]).decode('ascii')):
             try:
                 app = keymaster.KeyMaster(
                     self.swift, {'encryption_root_secret': conf_val,
                                  'active_root_secret_id': dflt_id,
                                  'keymaster_config_path': ''})
                 self.assertEqual(secret, app.root_secret)
             except AssertionError as err:
                 self.fail(str(err) + ' for secret %r' % conf_val)
示例#12
0
    def test_keymaster_config_path(self, mock_readconf):
        for secret in (os.urandom(32), os.urandom(33), os.urandom(50)):
            enc_secret = base64.b64encode(secret)
            for conf_val in (bytes(enc_secret), unicode(enc_secret),
                             enc_secret[:30] + '\n' + enc_secret[30:],
                             enc_secret[:30] + '\r\n' + enc_secret[30:]):
                mock_readconf.reset_mock()
                mock_readconf.return_value = {
                    'encryption_root_secret': conf_val}

                app = keymaster.KeyMaster(self.swift, {
                    'keymaster_config_path': '/some/path'})
                try:
                    self.assertEqual(secret, app.root_secret)
                    self.assertEqual(mock_readconf.mock_calls, [
                        mock.call('/some/path', 'keymaster')])
                except AssertionError as err:
                    self.fail(str(err) + ' for secret %r' % secret)
    def test_root_secret_path_invalid_secret(self, mock_readconf):
        for secret in (bytes(base64.b64encode(os.urandom(31))),  # too short
                       unicode(base64.b64encode(os.urandom(31))),
                       u'a' * 44 + u'????', b'a' * 44 + b'????',  # not base64
                       u'a' * 45, b'a' * 45,  # bad padding
                       99, None):
            mock_readconf.reset_mock()
            mock_readconf.return_value = {'encryption_root_secret': secret}

            try:
                with self.assertRaises(ValueError) as err:
                    keymaster.KeyMaster(self.swift, {
                        'keymaster_config_path': '/some/other/path'})
                self.assertEqual(
                    'encryption_root_secret option in /some/other/path '
                    'must be a base64 encoding of at least 32 raw bytes',
                    err.exception.message)
                self.assertEqual(mock_readconf.mock_calls, [
                    mock.call('/some/other/path', 'keymaster')])
            except AssertionError as err:
                self.fail(str(err) + ' for secret %r' % secret)
示例#14
0
 def setUp(self):
     super(TestKeymaster, self).setUp()
     self.swift = FakeSwift()
     self.app = keymaster.KeyMaster(self.swift, TEST_KEYMASTER_CONF)
示例#15
0
    def test_chained_keymasters(self):
        conf_inner = {'active_root_secret_id': '22'}
        conf_inner.update(
            ('encryption_root_secret_%s' % secret_id, base64.b64encode(secret))
            for secret_id, secret in [(
                '22', os.urandom(33)), ('my_secret_id', os.urandom(50))])
        conf_outer = {
            'encryption_root_secret': base64.b64encode(os.urandom(32))
        }
        app = keymaster.KeyMaster(keymaster.KeyMaster(self.swift, conf_inner),
                                  conf_outer)

        self.swift.register('GET', '/v1/a/c', swob.HTTPOk, {}, b'')
        req = Request.blank('/v1/a/c')
        start_response, calls = capture_start_response()
        app(req.environ, start_response)
        self.assertEqual(1, len(calls))
        self.assertNotIn('swift.crypto.override', req.environ)
        self.assertIn(CRYPTO_KEY_CALLBACK, req.environ,
                      '%s not set in env' % CRYPTO_KEY_CALLBACK)
        keys = copy.deepcopy(req.environ[CRYPTO_KEY_CALLBACK](key_id=None))
        self.assertIn('id', keys)
        self.assertEqual(keys.pop('id'), {
            'v': '2',
            'path': '/a/c',
            'secret_id': '22',
        })
        # Inner-most active root secret wins
        root_key = base64.b64decode(conf_inner['encryption_root_secret_22'])
        self.assertIn('container', keys)
        self.assertEqual(
            keys.pop('container'),
            hmac.new(root_key, b'/a/c', digestmod=hashlib.sha256).digest())
        self.assertIn('all_ids', keys)
        all_keys = set()
        at_least_one_old_style_id = False
        for key_id in keys.pop('all_ids'):
            # Can get key material for each key_id
            all_keys.add(
                req.environ[CRYPTO_KEY_CALLBACK](key_id=key_id)['container'])

            if 'secret_id' in key_id:
                self.assertIn(key_id.pop('secret_id'), {'22', 'my_secret_id'})
            else:
                at_least_one_old_style_id = True
            self.assertEqual(key_id, {
                'path': '/a/c',
                'v': '2',
            })
        self.assertTrue(at_least_one_old_style_id)
        self.assertEqual(len(all_keys), 3)
        self.assertFalse(keys)

        # Also all works for objects
        self.swift.register('GET', '/v1/a/c/o', swob.HTTPOk, {}, b'')
        req = Request.blank('/v1/a/c/o')
        start_response, calls = capture_start_response()
        app(req.environ, start_response)
        self.assertEqual(1, len(calls))
        self.assertNotIn('swift.crypto.override', req.environ)
        self.assertIn(CRYPTO_KEY_CALLBACK, req.environ,
                      '%s not set in env' % CRYPTO_KEY_CALLBACK)
        keys = req.environ.get(CRYPTO_KEY_CALLBACK)(key_id=None)
        self.assertIn('id', keys)
        self.assertEqual(keys.pop('id'), {
            'v': '2',
            'path': '/a/c/o',
            'secret_id': '22',
        })
        root_key = base64.b64decode(conf_inner['encryption_root_secret_22'])
        self.assertIn('container', keys)
        self.assertEqual(
            keys.pop('container'),
            hmac.new(root_key, b'/a/c', digestmod=hashlib.sha256).digest())
        self.assertIn('object', keys)
        self.assertEqual(
            keys.pop('object'),
            hmac.new(root_key, b'/a/c/o', digestmod=hashlib.sha256).digest())
        self.assertIn('all_ids', keys)
        at_least_one_old_style_id = False
        for key_id in keys.pop('all_ids'):
            if 'secret_id' not in key_id:
                at_least_one_old_style_id = True
            else:
                self.assertIn(key_id.pop('secret_id'), {'22', 'my_secret_id'})
            self.assertEqual(key_id, {
                'path': '/a/c/o',
                'v': '2',
            })
        self.assertTrue(at_least_one_old_style_id)
        self.assertEqual(len(all_keys), 3)
        self.assertFalse(keys)
示例#16
0
 def test_no_root_secret(self):
     with self.assertRaises(ValueError) as cm:
         keymaster.KeyMaster(self.swift, {})
     self.assertEqual('No secret loaded for active_root_secret_id None',
                      str(cm.exception))
示例#17
0
 def test_app_exception(self):
     app = keymaster.KeyMaster(FakeAppThatExcepts(), TEST_KEYMASTER_CONF)
     req = Request.blank('/', environ={'REQUEST_METHOD': 'PUT'})
     start_response, _ = capture_start_response()
     self.assertRaises(Exception, app, req.environ, start_response)
示例#18
0
    def test_v2_keys(self):
        secrets = {None: os.urandom(32), '22': os.urandom(33)}
        conf = {}
        for secret_id, secret in secrets.items():
            opt = ('encryption_root_secret%s' %
                   (('_%s' % secret_id) if secret_id else ''))
            conf[opt] = base64.b64encode(secret)
        conf['active_root_secret_id'] = '22'
        self.app = keymaster.KeyMaster(self.swift, conf)
        orig_create_key = self.app.create_key
        calls = []

        def mock_create_key(path, secret_id=None):
            calls.append((path, secret_id))
            return orig_create_key(path, secret_id)

        container = u'\N{SNOWMAN}'
        obj = u'\N{SNOWFLAKE}'
        if six.PY2:
            container = container.encode('utf-8')
            obj = obj.encode('utf-8')
        good_con_path = '/a/%s' % container
        good_path = '/a/%s/%s' % (container, obj)

        if six.PY2:
            mangled_con_path = ('/a/%s' %
                                container).decode('latin-1').encode('utf-8')
            mangled_path = ('/a/%s/%s' %
                            (container, obj)).decode('latin-1').encode('utf-8')
        else:
            mangled_con_path = ('/a/%s' %
                                container).encode('utf-8').decode('latin-1')
            mangled_path = ('/a/%s/%s' %
                            (container, obj)).encode('utf-8').decode('latin-1')

        context = keymaster.KeyMasterContext(self.app, 'a', container, obj)
        for version in ('1', '2', '3'):
            with mock.patch.object(self.app, 'create_key', mock_create_key):
                keys = context.fetch_crypto_keys(key_id={
                    'v': version,
                    'path': good_path
                })
            key_id_path = (good_path
                           if version == '3' or six.PY2 else mangled_path)
            expected_keys = {
                'container':
                hmac.new(secrets[None],
                         b'/a/\xe2\x98\x83',
                         digestmod=hashlib.sha256).digest(),
                'object':
                hmac.new(secrets[None],
                         b'/a/\xe2\x98\x83/\xe2\x9d\x84',
                         digestmod=hashlib.sha256).digest(),
                'id': {
                    'path': key_id_path,
                    'v': version
                },
                'all_ids': [{
                    'path': key_id_path,
                    'v': version
                }, {
                    'path': key_id_path,
                    'secret_id': '22',
                    'v': version
                }]
            }
            self.assertEqual(expected_keys, keys)
            self.assertEqual([(good_con_path, None), (good_path, None)], calls)
            del calls[:]

        context = keymaster.KeyMasterContext(self.app, 'a', container, obj)
        for version in ('1', '2'):
            with mock.patch.object(self.app, 'create_key', mock_create_key):
                keys = context.fetch_crypto_keys(key_id={
                    'v': version,
                    'path': mangled_path
                })
            key_id_path = (good_path if six.PY2 else mangled_path)
            expected_keys = {
                'container':
                hmac.new(secrets[None],
                         b'/a/\xe2\x98\x83',
                         digestmod=hashlib.sha256).digest(),
                'object':
                hmac.new(secrets[None],
                         b'/a/\xe2\x98\x83/\xe2\x9d\x84',
                         digestmod=hashlib.sha256).digest(),
                'id': {
                    'path': key_id_path,
                    'v': version
                },
                'all_ids': [{
                    'path': key_id_path,
                    'v': version
                }, {
                    'path': key_id_path,
                    'secret_id': '22',
                    'v': version
                }]
            }
            self.assertEqual(expected_keys, keys)
            self.assertEqual([(good_con_path, None), (good_path, None)], calls)
            del calls[:]

        # If v3, we know to trust the meta -- presumably, data was PUT with
        # the mojibake path then COPYed to the right path (but with bad
        # pipeline placement for copy)
        with mock.patch.object(self.app, 'create_key', mock_create_key):
            keys = context.fetch_crypto_keys(key_id={
                'v': '3',
                'path': mangled_path
            })
        expected_keys = {
            'container':
            hmac.new(secrets[None],
                     b'/a/\xc3\xa2\xc2\x98\xc2\x83',
                     digestmod=hashlib.sha256).digest(),
            'object':
            hmac.new(secrets[None],
                     b'/a/\xc3\xa2\xc2\x98\xc2\x83/\xc3\xa2\xc2\x9d\xc2\x84',
                     digestmod=hashlib.sha256).digest(),
            'id': {
                'path': mangled_path,
                'v': '3'
            },
            'all_ids': [{
                'path': mangled_path,
                'v': '3'
            }, {
                'path': mangled_path,
                'secret_id': '22',
                'v': '3'
            }]
        }
        self.assertEqual(expected_keys, keys)
        self.assertEqual([(mangled_con_path, None), (mangled_path, None)],
                         calls)
        del calls[:]
示例#19
0
    def test_v1_keys_with_weird_paths(self):
        secrets = {None: os.urandom(32), '22': os.urandom(33)}
        conf = {}
        for secret_id, secret in secrets.items():
            opt = ('encryption_root_secret%s' %
                   (('_%s' % secret_id) if secret_id else ''))
            conf[opt] = base64.b64encode(secret)
        conf['active_root_secret_id'] = '22'
        self.app = keymaster.KeyMaster(self.swift, conf)
        orig_create_key = self.app.create_key
        calls = []

        def mock_create_key(path, secret_id=None):
            calls.append((path, secret_id))
            return orig_create_key(path, secret_id)

        # request path doesn't match stored path -- this could happen if you
        # misconfigured your proxy to have copy right of encryption
        context = keymaster.KeyMasterContext(self.app, 'a', 'not-c', 'not-o')
        for version in ('1', '2'):
            with mock.patch.object(self.app, 'create_key', mock_create_key):
                keys = context.fetch_crypto_keys(key_id={
                    'v': version,
                    'path': '/a/c/o'
                })
            expected_keys = {
                'container':
                hmac.new(secrets[None], b'/a/c',
                         digestmod=hashlib.sha256).digest(),
                'object':
                hmac.new(secrets[None], b'/a/c/o',
                         digestmod=hashlib.sha256).digest(),
                'id': {
                    'path': '/a/c/o',
                    'v': version
                },
                'all_ids': [{
                    'path': '/a/c/o',
                    'v': version
                }, {
                    'path': '/a/c/o',
                    'secret_id': '22',
                    'v': version
                }]
            }
            self.assertEqual(expected_keys, keys)
            self.assertEqual([('/a/c', None), ('/a/c/o', None)], calls)
            del calls[:]

        context = keymaster.KeyMasterContext(self.app, 'not-a', 'not-c',
                                             '/not-o')
        with mock.patch.object(self.app, 'create_key', mock_create_key):
            keys = context.fetch_crypto_keys(key_id={'v': '1', 'path': '/o'})
        expected_keys = {
            'container':
            hmac.new(secrets[None], b'/not-a/not-c',
                     digestmod=hashlib.sha256).digest(),
            'object':
            hmac.new(secrets[None], b'/o', digestmod=hashlib.sha256).digest(),
            'id': {
                'path': '/o',
                'v': '1'
            },
            'all_ids': [{
                'path': '/o',
                'v': '1'
            }, {
                'path': '/o',
                'secret_id': '22',
                'v': '1'
            }]
        }
        self.assertEqual(expected_keys, keys)
        self.assertEqual([('/not-a/not-c', None), ('/o', None)], calls)
        del calls[:]

        context = keymaster.KeyMasterContext(self.app, 'not-a', 'not-c',
                                             '/not-o')
        with mock.patch.object(self.app, 'create_key', mock_create_key):
            keys = context.fetch_crypto_keys(key_id={
                'v': '2',
                'path': '/a/c//o'
            })
        expected_keys = {
            'container':
            hmac.new(secrets[None], b'/a/c',
                     digestmod=hashlib.sha256).digest(),
            'object':
            hmac.new(secrets[None], b'/a/c//o',
                     digestmod=hashlib.sha256).digest(),
            'id': {
                'path': '/a/c//o',
                'v': '2'
            },
            'all_ids': [{
                'path': '/a/c//o',
                'v': '2'
            }, {
                'path': '/a/c//o',
                'secret_id': '22',
                'v': '2'
            }]
        }
        self.assertEqual(expected_keys, keys)
        self.assertEqual([('/a/c', None), ('/a/c//o', None)], calls)