2016-08-24 02:03:11 +02:00
|
|
|
# -*- coding: utf-8 -*-
|
2014-10-21 20:27:01 +02:00
|
|
|
# (c) 2012-2014, Michael DeHaan <michael.dehaan@gmail.com>
|
2016-09-13 16:30:17 +02:00
|
|
|
# (c) 2016, Toshio Kuratomi <tkuratomi@ansible.com>
|
2014-10-21 20:27:01 +02:00
|
|
|
#
|
|
|
|
# This file is part of Ansible
|
|
|
|
#
|
|
|
|
# Ansible is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# Ansible is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
# Make coding more python3-ish
|
|
|
|
from __future__ import (absolute_import, division, print_function)
|
|
|
|
__metaclass__ = type
|
|
|
|
|
2016-08-24 02:03:11 +02:00
|
|
|
import binascii
|
|
|
|
import io
|
|
|
|
import os
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
import tempfile
|
2016-08-24 02:03:11 +02:00
|
|
|
|
2014-10-21 20:27:01 +02:00
|
|
|
from binascii import hexlify
|
2017-06-27 15:00:15 +02:00
|
|
|
import pytest
|
2014-10-21 20:27:01 +02:00
|
|
|
|
|
|
|
from ansible.compat.tests import unittest
|
2017-08-10 15:34:57 +02:00
|
|
|
from ansible.compat.tests.mock import patch, MagicMock
|
2014-10-21 20:27:01 +02:00
|
|
|
|
|
|
|
from ansible import errors
|
2017-03-23 21:35:05 +01:00
|
|
|
from ansible.module_utils import six
|
|
|
|
from ansible.module_utils._text import to_bytes, to_text
|
2016-08-24 02:03:11 +02:00
|
|
|
from ansible.parsing import vault
|
2016-09-07 07:54:17 +02:00
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
from units.mock.loader import DictDataLoader
|
|
|
|
from units.mock.vault_helper import TextVaultSecret
|
|
|
|
|
|
|
|
|
Better handling of malformed vault data envelope (#32515)
* Better handling of malformed vault data envelope
If an embedded vaulted variable ('!vault' in yaml)
had an invalid format, it would eventually cause
an error for seemingly unrelated reasons.
"Invalid" meaning not valid hexlify (extra chars,
non-hex chars, etc).
For ex, if a host_vars file had invalid vault format
variables, on py2, it would cause an error like:
'ansible.vars.hostvars.HostVars object' has no
attribute u'broken.example.com'
Depending on where the invalid vault is, it could
also cause "VARIABLE IS NOT DEFINED!". The behavior
can also change if ansible-playbook is py2 or py3.
Root cause is errors from binascii.unhexlify() not
being handled consistently.
Fix is to add a AnsibleVaultFormatError exception and
raise it on any unhexlify() errors and to handle it
properly elsewhere.
Add a _unhexlify() that try/excepts around a binascii.unhexlify()
and raises an AnsibleVaultFormatError on invalid vault data.
This is so the same exception type is always raised for this
case. Previous it was different between py2 and py3.
binascii.unhexlify() raises a binascii.Error if the hexlified
blobs in a vault data blob are invalid.
On py2, binascii.Error is a subclass of Exception.
On py3, binascii.Error is a subclass of TypeError
When decrypting content of vault encrypted variables,
if a binascii.Error is raised it propagates up to
playbook.base.Base.post_validate(). post_validate()
handles exceptions for TypeErrors but not for
base Exception subclasses (like py2 binascii.Error).
* Add a display.warning on vault format errors
* Unit tests for _unhexlify, parse_vaulttext*
* Add intg test cases for invalid vault formats
Fixes #28038
2017-11-10 20:24:56 +01:00
|
|
|
class TestUnhexlify(unittest.TestCase):
|
|
|
|
def test(self):
|
|
|
|
b_plain_data = b'some text to hexlify'
|
|
|
|
b_data = hexlify(b_plain_data)
|
|
|
|
res = vault._unhexlify(b_data)
|
|
|
|
self.assertEquals(res, b_plain_data)
|
|
|
|
|
|
|
|
def test_odd_length(self):
|
|
|
|
b_data = b'123456789abcdefghijklmnopqrstuvwxyz'
|
|
|
|
|
|
|
|
self.assertRaisesRegexp(vault.AnsibleVaultFormatError,
|
|
|
|
'.*Vault format unhexlify error.*',
|
|
|
|
vault._unhexlify,
|
|
|
|
b_data)
|
|
|
|
|
|
|
|
def test_nonhex(self):
|
|
|
|
b_data = b'6z36316566653264333665333637623064303639353237620a636366633565663263336335656532'
|
|
|
|
|
|
|
|
self.assertRaisesRegexp(vault.AnsibleVaultFormatError,
|
|
|
|
'.*Vault format unhexlify error.*Non-hexadecimal digit found',
|
|
|
|
vault._unhexlify,
|
|
|
|
b_data)
|
|
|
|
|
|
|
|
|
|
|
|
class TestParseVaulttext(unittest.TestCase):
|
|
|
|
def test(self):
|
|
|
|
vaulttext_envelope = u'''$ANSIBLE_VAULT;1.1;AES256
|
|
|
|
33363965326261303234626463623963633531343539616138316433353830356566396130353436
|
|
|
|
3562643163366231316662386565383735653432386435610a306664636137376132643732393835
|
|
|
|
63383038383730306639353234326630666539346233376330303938323639306661313032396437
|
|
|
|
6233623062366136310a633866373936313238333730653739323461656662303864663666653563
|
|
|
|
3138'''
|
|
|
|
|
|
|
|
b_vaulttext_envelope = to_bytes(vaulttext_envelope, errors='strict', encoding='utf-8')
|
|
|
|
b_vaulttext, b_version, cipher_name, vault_id = vault.parse_vaulttext_envelope(b_vaulttext_envelope)
|
|
|
|
res = vault.parse_vaulttext(b_vaulttext)
|
|
|
|
self.assertIsInstance(res[0], bytes)
|
|
|
|
self.assertIsInstance(res[1], bytes)
|
|
|
|
self.assertIsInstance(res[2], bytes)
|
|
|
|
|
|
|
|
def test_non_hex(self):
|
|
|
|
vaulttext_envelope = u'''$ANSIBLE_VAULT;1.1;AES256
|
|
|
|
3336396J326261303234626463623963633531343539616138316433353830356566396130353436
|
|
|
|
3562643163366231316662386565383735653432386435610a306664636137376132643732393835
|
|
|
|
63383038383730306639353234326630666539346233376330303938323639306661313032396437
|
|
|
|
6233623062366136310a633866373936313238333730653739323461656662303864663666653563
|
|
|
|
3138'''
|
|
|
|
|
|
|
|
b_vaulttext_envelope = to_bytes(vaulttext_envelope, errors='strict', encoding='utf-8')
|
|
|
|
b_vaulttext, b_version, cipher_name, vault_id = vault.parse_vaulttext_envelope(b_vaulttext_envelope)
|
|
|
|
self.assertRaisesRegexp(vault.AnsibleVaultFormatError,
|
|
|
|
'.*Vault format unhexlify error.*Non-hexadecimal digit found',
|
|
|
|
vault.parse_vaulttext,
|
|
|
|
b_vaulttext_envelope)
|
|
|
|
|
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
class TestVaultSecret(unittest.TestCase):
|
|
|
|
def test(self):
|
|
|
|
secret = vault.VaultSecret()
|
|
|
|
secret.load()
|
|
|
|
self.assertIsNone(secret._bytes)
|
|
|
|
|
|
|
|
def test_bytes(self):
|
|
|
|
some_text = u'私はガラスを食べられます。それは私を傷つけません。'
|
|
|
|
_bytes = to_bytes(some_text)
|
|
|
|
secret = vault.VaultSecret(_bytes)
|
|
|
|
secret.load()
|
|
|
|
self.assertEqual(secret.bytes, _bytes)
|
|
|
|
|
|
|
|
|
|
|
|
class TestPromptVaultSecret(unittest.TestCase):
|
|
|
|
def test_empty_prompt_formats(self):
|
|
|
|
secret = vault.PromptVaultSecret(vault_id='test_id', prompt_formats=[])
|
|
|
|
secret.load()
|
|
|
|
self.assertIsNone(secret._bytes)
|
|
|
|
|
2017-08-10 15:34:57 +02:00
|
|
|
@patch('ansible.parsing.vault.display.prompt', return_value='the_password')
|
|
|
|
def test_prompt_formats_none(self, mock_display_prompt):
|
|
|
|
secret = vault.PromptVaultSecret(vault_id='test_id')
|
|
|
|
secret.load()
|
|
|
|
self.assertEqual(secret._bytes, b'the_password')
|
|
|
|
|
|
|
|
@patch('ansible.parsing.vault.display.prompt', return_value='the_password')
|
|
|
|
def test_custom_prompt(self, mock_display_prompt):
|
|
|
|
secret = vault.PromptVaultSecret(vault_id='test_id',
|
|
|
|
prompt_formats=['The cow flies at midnight: '])
|
|
|
|
secret.load()
|
|
|
|
self.assertEqual(secret._bytes, b'the_password')
|
|
|
|
|
|
|
|
@patch('ansible.parsing.vault.display.prompt', side_effect=EOFError)
|
|
|
|
def test_prompt_eoferror(self, mock_display_prompt):
|
|
|
|
secret = vault.PromptVaultSecret(vault_id='test_id')
|
2017-08-15 17:01:46 +02:00
|
|
|
self.assertRaisesRegexp(vault.AnsibleVaultError,
|
|
|
|
'EOFError.*test_id',
|
|
|
|
secret.load)
|
2017-08-10 15:34:57 +02:00
|
|
|
|
|
|
|
@patch('ansible.parsing.vault.display.prompt', side_effect=['first_password', 'second_password'])
|
|
|
|
def test_prompt_passwords_dont_match(self, mock_display_prompt):
|
|
|
|
secret = vault.PromptVaultSecret(vault_id='test_id',
|
|
|
|
prompt_formats=['Vault password: ',
|
|
|
|
'Confirm Vault password: '])
|
|
|
|
self.assertRaisesRegexp(errors.AnsibleError,
|
|
|
|
'Passwords do not match',
|
|
|
|
secret.load)
|
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
|
|
|
|
class TestFileVaultSecret(unittest.TestCase):
|
2018-01-20 20:56:18 +01:00
|
|
|
def setUp(self):
|
|
|
|
self.vault_password = "test-vault-password"
|
|
|
|
text_secret = TextVaultSecret(self.vault_password)
|
|
|
|
self.vault_secrets = [('foo', text_secret)]
|
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
def test(self):
|
|
|
|
secret = vault.FileVaultSecret()
|
|
|
|
self.assertIsNone(secret._bytes)
|
|
|
|
self.assertIsNone(secret._text)
|
|
|
|
|
|
|
|
def test_repr_empty(self):
|
|
|
|
secret = vault.FileVaultSecret()
|
|
|
|
self.assertEqual(repr(secret), "FileVaultSecret()")
|
|
|
|
|
|
|
|
def test_repr(self):
|
|
|
|
tmp_file = tempfile.NamedTemporaryFile(delete=False)
|
|
|
|
fake_loader = DictDataLoader({tmp_file.name: 'sdfadf'})
|
|
|
|
|
|
|
|
secret = vault.FileVaultSecret(loader=fake_loader, filename=tmp_file.name)
|
|
|
|
filename = tmp_file.name
|
|
|
|
tmp_file.close()
|
|
|
|
self.assertEqual(repr(secret), "FileVaultSecret(filename='%s')" % filename)
|
|
|
|
|
|
|
|
def test_empty_bytes(self):
|
|
|
|
secret = vault.FileVaultSecret()
|
|
|
|
self.assertIsNone(secret.bytes)
|
|
|
|
|
|
|
|
def test_file(self):
|
|
|
|
password = 'some password'
|
|
|
|
|
|
|
|
tmp_file = tempfile.NamedTemporaryFile(delete=False)
|
|
|
|
tmp_file.write(to_bytes(password))
|
|
|
|
tmp_file.close()
|
|
|
|
|
|
|
|
fake_loader = DictDataLoader({tmp_file.name: 'sdfadf'})
|
|
|
|
|
|
|
|
secret = vault.FileVaultSecret(loader=fake_loader, filename=tmp_file.name)
|
|
|
|
secret.load()
|
|
|
|
|
|
|
|
os.unlink(tmp_file.name)
|
|
|
|
|
|
|
|
self.assertEqual(secret.bytes, to_bytes(password))
|
|
|
|
|
2017-08-15 17:01:46 +02:00
|
|
|
def test_file_empty(self):
|
|
|
|
|
|
|
|
tmp_file = tempfile.NamedTemporaryFile(delete=False)
|
|
|
|
tmp_file.write(to_bytes(''))
|
|
|
|
tmp_file.close()
|
|
|
|
|
|
|
|
fake_loader = DictDataLoader({tmp_file.name: ''})
|
|
|
|
|
|
|
|
secret = vault.FileVaultSecret(loader=fake_loader, filename=tmp_file.name)
|
|
|
|
self.assertRaisesRegexp(vault.AnsibleVaultPasswordError,
|
|
|
|
'Invalid vault password was provided from file.*%s' % tmp_file.name,
|
|
|
|
secret.load)
|
|
|
|
|
|
|
|
os.unlink(tmp_file.name)
|
|
|
|
|
2018-01-20 20:56:18 +01:00
|
|
|
def test_file_encrypted(self):
|
|
|
|
vault_password = "test-vault-password"
|
|
|
|
text_secret = TextVaultSecret(vault_password)
|
|
|
|
vault_secrets = [('foo', text_secret)]
|
|
|
|
|
|
|
|
password = 'some password'
|
|
|
|
# 'some password' encrypted with 'test-ansible-password'
|
|
|
|
|
|
|
|
password_file_content = '''$ANSIBLE_VAULT;1.1;AES256
|
|
|
|
61393863643638653437313566313632306462383837303132346434616433313438353634613762
|
|
|
|
3334363431623364386164616163326537366333353663650a663634306232363432626162353665
|
|
|
|
39623061353266373631636331643761306665343731376633623439313138396330346237653930
|
|
|
|
6432643864346136640a653364386634666461306231353765636662316335613235383565306437
|
|
|
|
3737
|
|
|
|
'''
|
|
|
|
|
|
|
|
tmp_file = tempfile.NamedTemporaryFile(delete=False)
|
|
|
|
tmp_file.write(to_bytes(password_file_content))
|
|
|
|
tmp_file.close()
|
|
|
|
|
|
|
|
fake_loader = DictDataLoader({tmp_file.name: 'sdfadf'})
|
|
|
|
fake_loader._vault.secrets = vault_secrets
|
|
|
|
|
|
|
|
secret = vault.FileVaultSecret(loader=fake_loader, filename=tmp_file.name)
|
|
|
|
secret.load()
|
|
|
|
|
|
|
|
os.unlink(tmp_file.name)
|
|
|
|
|
|
|
|
self.assertEqual(secret.bytes, to_bytes(password))
|
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
def test_file_not_a_directory(self):
|
|
|
|
filename = '/dev/null/foobar'
|
|
|
|
fake_loader = DictDataLoader({filename: 'sdfadf'})
|
|
|
|
|
|
|
|
secret = vault.FileVaultSecret(loader=fake_loader, filename=filename)
|
|
|
|
self.assertRaisesRegexp(errors.AnsibleError,
|
|
|
|
'.*Could not read vault password file.*/dev/null/foobar.*Not a directory',
|
|
|
|
secret.load)
|
|
|
|
|
|
|
|
def test_file_not_found(self):
|
|
|
|
tmp_file = tempfile.NamedTemporaryFile()
|
|
|
|
filename = tmp_file.name
|
|
|
|
tmp_file.close()
|
|
|
|
|
|
|
|
fake_loader = DictDataLoader({filename: 'sdfadf'})
|
|
|
|
|
|
|
|
secret = vault.FileVaultSecret(loader=fake_loader, filename=filename)
|
|
|
|
self.assertRaisesRegexp(errors.AnsibleError,
|
|
|
|
'.*Could not read vault password file.*%s.*' % filename,
|
|
|
|
secret.load)
|
|
|
|
|
|
|
|
|
|
|
|
class TestScriptVaultSecret(unittest.TestCase):
|
|
|
|
def test(self):
|
|
|
|
secret = vault.ScriptVaultSecret()
|
|
|
|
self.assertIsNone(secret._bytes)
|
|
|
|
self.assertIsNone(secret._text)
|
|
|
|
|
2017-08-10 15:34:57 +02:00
|
|
|
def _mock_popen(self, mock_popen, return_code=0, stdout=b'', stderr=b''):
|
|
|
|
def communicate():
|
|
|
|
return stdout, stderr
|
|
|
|
mock_popen.return_value = MagicMock(returncode=return_code)
|
|
|
|
mock_popen_instance = mock_popen.return_value
|
|
|
|
mock_popen_instance.communicate = communicate
|
|
|
|
|
|
|
|
@patch('ansible.parsing.vault.subprocess.Popen')
|
|
|
|
def test_read_file(self, mock_popen):
|
2017-08-15 17:01:46 +02:00
|
|
|
self._mock_popen(mock_popen, stdout=b'some_password')
|
2017-08-10 15:34:57 +02:00
|
|
|
secret = vault.ScriptVaultSecret()
|
|
|
|
with patch.object(secret, 'loader') as mock_loader:
|
|
|
|
mock_loader.is_executable = MagicMock(return_value=True)
|
|
|
|
secret.load()
|
|
|
|
|
2017-08-15 17:01:46 +02:00
|
|
|
@patch('ansible.parsing.vault.subprocess.Popen')
|
|
|
|
def test_read_file_empty(self, mock_popen):
|
|
|
|
self._mock_popen(mock_popen, stdout=b'')
|
|
|
|
secret = vault.ScriptVaultSecret()
|
|
|
|
with patch.object(secret, 'loader') as mock_loader:
|
|
|
|
mock_loader.is_executable = MagicMock(return_value=True)
|
|
|
|
self.assertRaisesRegexp(vault.AnsibleVaultPasswordError,
|
|
|
|
'Invalid vault password was provided from script',
|
|
|
|
secret.load)
|
|
|
|
|
2017-08-10 15:34:57 +02:00
|
|
|
@patch('ansible.parsing.vault.subprocess.Popen')
|
|
|
|
def test_read_file_os_error(self, mock_popen):
|
|
|
|
self._mock_popen(mock_popen)
|
|
|
|
mock_popen.side_effect = OSError('That is not an executable')
|
|
|
|
secret = vault.ScriptVaultSecret()
|
|
|
|
with patch.object(secret, 'loader') as mock_loader:
|
|
|
|
mock_loader.is_executable = MagicMock(return_value=True)
|
|
|
|
self.assertRaisesRegexp(errors.AnsibleError,
|
|
|
|
'Problem running vault password script.*',
|
|
|
|
secret.load)
|
|
|
|
|
|
|
|
@patch('ansible.parsing.vault.subprocess.Popen')
|
|
|
|
def test_read_file_not_executable(self, mock_popen):
|
|
|
|
self._mock_popen(mock_popen)
|
|
|
|
secret = vault.ScriptVaultSecret()
|
|
|
|
with patch.object(secret, 'loader') as mock_loader:
|
|
|
|
mock_loader.is_executable = MagicMock(return_value=False)
|
|
|
|
self.assertRaisesRegexp(vault.AnsibleVaultError,
|
|
|
|
'The vault password script .* was not executable',
|
|
|
|
secret.load)
|
|
|
|
|
|
|
|
@patch('ansible.parsing.vault.subprocess.Popen')
|
|
|
|
def test_read_file_non_zero_return_code(self, mock_popen):
|
|
|
|
stderr = b'That did not work for a random reason'
|
|
|
|
rc = 37
|
|
|
|
|
|
|
|
self._mock_popen(mock_popen, return_code=rc, stderr=stderr)
|
|
|
|
secret = vault.ScriptVaultSecret(filename='/dev/null/some_vault_secret')
|
|
|
|
with patch.object(secret, 'loader') as mock_loader:
|
|
|
|
mock_loader.is_executable = MagicMock(return_value=True)
|
|
|
|
self.assertRaisesRegexp(errors.AnsibleError,
|
2017-11-21 04:08:30 +01:00
|
|
|
r'Vault password script.*returned non-zero \(%s\): %s' % (rc, stderr),
|
2017-08-10 15:34:57 +02:00
|
|
|
secret.load)
|
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
|
2017-10-13 21:23:08 +02:00
|
|
|
class TestScriptIsClient(unittest.TestCase):
|
|
|
|
def test_randomname(self):
|
|
|
|
filename = 'randomname'
|
|
|
|
res = vault.script_is_client(filename)
|
|
|
|
self.assertFalse(res)
|
|
|
|
|
|
|
|
def test_something_dash_client(self):
|
|
|
|
filename = 'something-client'
|
|
|
|
res = vault.script_is_client(filename)
|
|
|
|
self.assertTrue(res)
|
|
|
|
|
|
|
|
def test_something_dash_client_somethingelse(self):
|
|
|
|
filename = 'something-client-somethingelse'
|
|
|
|
res = vault.script_is_client(filename)
|
|
|
|
self.assertFalse(res)
|
|
|
|
|
|
|
|
def test_something_dash_client_py(self):
|
|
|
|
filename = 'something-client.py'
|
|
|
|
res = vault.script_is_client(filename)
|
|
|
|
self.assertTrue(res)
|
|
|
|
|
|
|
|
def test_full_path_something_dash_client_py(self):
|
|
|
|
filename = '/foo/bar/something-client.py'
|
|
|
|
res = vault.script_is_client(filename)
|
|
|
|
self.assertTrue(res)
|
|
|
|
|
|
|
|
def test_full_path_something_dash_client(self):
|
|
|
|
filename = '/foo/bar/something-client'
|
|
|
|
res = vault.script_is_client(filename)
|
|
|
|
self.assertTrue(res)
|
|
|
|
|
|
|
|
def test_full_path_something_dash_client_in_dir(self):
|
|
|
|
filename = '/foo/bar/something-client/but/not/filename'
|
|
|
|
res = vault.script_is_client(filename)
|
|
|
|
self.assertFalse(res)
|
|
|
|
|
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
class TestGetFileVaultSecret(unittest.TestCase):
|
|
|
|
def test_file(self):
|
|
|
|
password = 'some password'
|
|
|
|
|
|
|
|
tmp_file = tempfile.NamedTemporaryFile(delete=False)
|
|
|
|
tmp_file.write(to_bytes(password))
|
|
|
|
tmp_file.close()
|
|
|
|
|
|
|
|
fake_loader = DictDataLoader({tmp_file.name: 'sdfadf'})
|
|
|
|
|
|
|
|
secret = vault.get_file_vault_secret(filename=tmp_file.name, loader=fake_loader)
|
|
|
|
secret.load()
|
|
|
|
|
|
|
|
os.unlink(tmp_file.name)
|
|
|
|
|
|
|
|
self.assertEqual(secret.bytes, to_bytes(password))
|
|
|
|
|
|
|
|
def test_file_not_a_directory(self):
|
|
|
|
filename = '/dev/null/foobar'
|
|
|
|
fake_loader = DictDataLoader({filename: 'sdfadf'})
|
|
|
|
|
|
|
|
self.assertRaisesRegexp(errors.AnsibleError,
|
|
|
|
'.*The vault password file %s was not found.*' % filename,
|
|
|
|
vault.get_file_vault_secret,
|
|
|
|
filename=filename,
|
|
|
|
loader=fake_loader)
|
|
|
|
|
|
|
|
def test_file_not_found(self):
|
|
|
|
tmp_file = tempfile.NamedTemporaryFile()
|
|
|
|
filename = tmp_file.name
|
|
|
|
tmp_file.close()
|
|
|
|
|
|
|
|
fake_loader = DictDataLoader({filename: 'sdfadf'})
|
|
|
|
|
|
|
|
self.assertRaisesRegexp(errors.AnsibleError,
|
|
|
|
'.*The vault password file %s was not found.*' % filename,
|
|
|
|
vault.get_file_vault_secret,
|
|
|
|
filename=filename,
|
|
|
|
loader=fake_loader)
|
|
|
|
|
2014-10-21 20:27:01 +02:00
|
|
|
|
2016-08-24 02:03:11 +02:00
|
|
|
class TestVaultIsEncrypted(unittest.TestCase):
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_bytes_not_encrypted(self):
|
|
|
|
b_data = b"foobar"
|
2016-08-24 02:03:11 +02:00
|
|
|
self.assertFalse(vault.is_encrypted(b_data))
|
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_bytes_encrypted(self):
|
|
|
|
b_data = b"$ANSIBLE_VAULT;9.9;TEST\n%s" % hexlify(b"ansible")
|
2016-08-24 02:03:11 +02:00
|
|
|
self.assertTrue(vault.is_encrypted(b_data))
|
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_text_not_encrypted(self):
|
|
|
|
b_data = to_text(b"foobar")
|
2016-08-24 02:03:11 +02:00
|
|
|
self.assertFalse(vault.is_encrypted(b_data))
|
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_text_encrypted(self):
|
|
|
|
b_data = to_text(b"$ANSIBLE_VAULT;9.9;TEST\n%s" % hexlify(b"ansible"))
|
2016-08-24 02:03:11 +02:00
|
|
|
self.assertTrue(vault.is_encrypted(b_data))
|
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_invalid_text_not_ascii(self):
|
2017-05-30 19:05:19 +02:00
|
|
|
data = u"$ANSIBLE_VAULT;9.9;TEST\n%s" % u"ァ ア ィ イ ゥ ウ ェ エ ォ オ カ ガ キ ギ ク グ ケ "
|
2016-08-24 02:03:11 +02:00
|
|
|
self.assertFalse(vault.is_encrypted(data))
|
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_invalid_bytes_not_ascii(self):
|
2017-05-30 19:05:19 +02:00
|
|
|
data = u"$ANSIBLE_VAULT;9.9;TEST\n%s" % u"ァ ア ィ イ ゥ ウ ェ エ ォ オ カ ガ キ ギ ク グ ケ "
|
2016-09-13 16:30:17 +02:00
|
|
|
b_data = to_bytes(data, encoding='utf-8')
|
|
|
|
self.assertFalse(vault.is_encrypted(b_data))
|
2016-08-24 02:03:11 +02:00
|
|
|
|
|
|
|
|
|
|
|
class TestVaultIsEncryptedFile(unittest.TestCase):
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_binary_file_handle_not_encrypted(self):
|
|
|
|
b_data = b"foobar"
|
2016-08-24 02:03:11 +02:00
|
|
|
b_data_fo = io.BytesIO(b_data)
|
|
|
|
self.assertFalse(vault.is_encrypted_file(b_data_fo))
|
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_text_file_handle_not_encrypted(self):
|
|
|
|
data = u"foobar"
|
|
|
|
data_fo = io.StringIO(data)
|
|
|
|
self.assertFalse(vault.is_encrypted_file(data_fo))
|
|
|
|
|
|
|
|
def test_binary_file_handle_encrypted(self):
|
|
|
|
b_data = b"$ANSIBLE_VAULT;9.9;TEST\n%s" % hexlify(b"ansible")
|
2016-08-24 02:03:11 +02:00
|
|
|
b_data_fo = io.BytesIO(b_data)
|
|
|
|
self.assertTrue(vault.is_encrypted_file(b_data_fo))
|
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_text_file_handle_encrypted(self):
|
|
|
|
data = u"$ANSIBLE_VAULT;9.9;TEST\n%s" % to_text(hexlify(b"ansible"))
|
|
|
|
data_fo = io.StringIO(data)
|
|
|
|
self.assertTrue(vault.is_encrypted_file(data_fo))
|
|
|
|
|
|
|
|
def test_binary_file_handle_invalid(self):
|
|
|
|
data = u"$ANSIBLE_VAULT;9.9;TEST\n%s" % u"ァ ア ィ イ ゥ ウ ェ エ ォ オ カ ガ キ ギ ク グ ケ "
|
|
|
|
b_data = to_bytes(data)
|
2016-08-24 02:03:11 +02:00
|
|
|
b_data_fo = io.BytesIO(b_data)
|
|
|
|
self.assertFalse(vault.is_encrypted_file(b_data_fo))
|
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_text_file_handle_invalid(self):
|
|
|
|
data = u"$ANSIBLE_VAULT;9.9;TEST\n%s" % u"ァ ア ィ イ ゥ ウ ェ エ ォ オ カ ガ キ ギ ク グ ケ "
|
|
|
|
data_fo = io.StringIO(data)
|
|
|
|
self.assertFalse(vault.is_encrypted_file(data_fo))
|
|
|
|
|
|
|
|
def test_file_already_read_from_finds_header(self):
|
|
|
|
b_data = b"$ANSIBLE_VAULT;9.9;TEST\n%s" % hexlify(b"ansible\ntesting\nfile pos")
|
2016-08-24 02:03:11 +02:00
|
|
|
b_data_fo = io.BytesIO(b_data)
|
2016-09-13 16:30:17 +02:00
|
|
|
b_data_fo.read(42) # Arbitrary number
|
2016-08-24 02:03:11 +02:00
|
|
|
self.assertTrue(vault.is_encrypted_file(b_data_fo))
|
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_file_already_read_from_saves_file_pos(self):
|
|
|
|
b_data = b"$ANSIBLE_VAULT;9.9;TEST\n%s" % hexlify(b"ansible\ntesting\nfile pos")
|
|
|
|
b_data_fo = io.BytesIO(b_data)
|
|
|
|
b_data_fo.read(69) # Arbitrary number
|
|
|
|
vault.is_encrypted_file(b_data_fo)
|
|
|
|
self.assertEqual(b_data_fo.tell(), 69)
|
|
|
|
|
|
|
|
def test_file_with_offset(self):
|
|
|
|
b_data = b"JUNK$ANSIBLE_VAULT;9.9;TEST\n%s" % hexlify(b"ansible\ntesting\nfile pos")
|
|
|
|
b_data_fo = io.BytesIO(b_data)
|
|
|
|
self.assertTrue(vault.is_encrypted_file(b_data_fo, start_pos=4))
|
|
|
|
|
|
|
|
def test_file_with_count(self):
|
|
|
|
b_data = b"$ANSIBLE_VAULT;9.9;TEST\n%s" % hexlify(b"ansible\ntesting\nfile pos")
|
|
|
|
vault_length = len(b_data)
|
|
|
|
b_data = b_data + u'ァ ア'.encode('utf-8')
|
|
|
|
b_data_fo = io.BytesIO(b_data)
|
|
|
|
self.assertTrue(vault.is_encrypted_file(b_data_fo, count=vault_length))
|
|
|
|
|
|
|
|
def test_file_with_offset_and_count(self):
|
|
|
|
b_data = b"$ANSIBLE_VAULT;9.9;TEST\n%s" % hexlify(b"ansible\ntesting\nfile pos")
|
|
|
|
vault_length = len(b_data)
|
|
|
|
b_data = b'JUNK' + b_data + u'ァ ア'.encode('utf-8')
|
|
|
|
b_data_fo = io.BytesIO(b_data)
|
|
|
|
self.assertTrue(vault.is_encrypted_file(b_data_fo, start_pos=4, count=vault_length))
|
|
|
|
|
2016-08-24 02:03:11 +02:00
|
|
|
|
2017-06-27 15:00:15 +02:00
|
|
|
@pytest.mark.skipif(not vault.HAS_CRYPTOGRAPHY,
|
|
|
|
reason="Skipping cryptography tests because cryptography is not installed")
|
2016-08-24 02:03:11 +02:00
|
|
|
class TestVaultCipherAes256(unittest.TestCase):
|
2016-09-13 16:30:17 +02:00
|
|
|
def setUp(self):
|
|
|
|
self.vault_cipher = vault.VaultAES256()
|
|
|
|
|
2016-08-24 02:03:11 +02:00
|
|
|
def test(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
self.assertIsInstance(self.vault_cipher, vault.VaultAES256)
|
2016-08-24 02:03:11 +02:00
|
|
|
|
|
|
|
# TODO: tag these as slow tests
|
2017-06-27 15:00:15 +02:00
|
|
|
def test_create_key_cryptography(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
b_password = b'hunter42'
|
2016-08-24 02:03:11 +02:00
|
|
|
b_salt = os.urandom(32)
|
2017-06-27 15:00:15 +02:00
|
|
|
b_key_cryptography = self.vault_cipher._create_key_cryptography(b_password, b_salt, key_length=32, iv_length=16)
|
|
|
|
self.assertIsInstance(b_key_cryptography, six.binary_type)
|
|
|
|
|
|
|
|
@pytest.mark.skipif(not vault.HAS_PYCRYPTO, reason='Not testing pycrypto key as pycrypto is not installed')
|
|
|
|
def test_create_key_pycrypto(self):
|
|
|
|
b_password = b'hunter42'
|
|
|
|
b_salt = os.urandom(32)
|
|
|
|
|
|
|
|
b_key_pycrypto = self.vault_cipher._create_key_pycrypto(b_password, b_salt, key_length=32, iv_length=16)
|
|
|
|
self.assertIsInstance(b_key_pycrypto, six.binary_type)
|
|
|
|
|
|
|
|
@pytest.mark.skipif(not vault.HAS_PYCRYPTO,
|
|
|
|
reason='Not comparing cryptography key to pycrypto key as pycrypto is not installed')
|
|
|
|
def test_compare_new_keys(self):
|
|
|
|
b_password = b'hunter42'
|
|
|
|
b_salt = os.urandom(32)
|
|
|
|
b_key_cryptography = self.vault_cipher._create_key_cryptography(b_password, b_salt, key_length=32, iv_length=16)
|
|
|
|
|
|
|
|
b_key_pycrypto = self.vault_cipher._create_key_pycrypto(b_password, b_salt, key_length=32, iv_length=16)
|
|
|
|
self.assertEqual(b_key_cryptography, b_key_pycrypto)
|
|
|
|
|
|
|
|
def test_create_key_known_cryptography(self):
|
|
|
|
b_password = b'hunter42'
|
|
|
|
|
|
|
|
# A fixed salt
|
|
|
|
b_salt = b'q' * 32 # q is the most random letter.
|
|
|
|
b_key_1 = self.vault_cipher._create_key_cryptography(b_password, b_salt, key_length=32, iv_length=16)
|
|
|
|
self.assertIsInstance(b_key_1, six.binary_type)
|
2016-08-24 02:03:11 +02:00
|
|
|
|
2017-06-27 15:00:15 +02:00
|
|
|
# verify we get the same answer
|
|
|
|
# we could potentially run a few iterations of this and time it to see if it's roughly constant time
|
|
|
|
# and or that it exceeds some minimal time, but that would likely cause unreliable fails, esp in CI
|
|
|
|
b_key_2 = self.vault_cipher._create_key_cryptography(b_password, b_salt, key_length=32, iv_length=16)
|
|
|
|
self.assertIsInstance(b_key_2, six.binary_type)
|
|
|
|
self.assertEqual(b_key_1, b_key_2)
|
|
|
|
|
|
|
|
# And again with pycrypto
|
|
|
|
b_key_3 = self.vault_cipher._create_key_pycrypto(b_password, b_salt, key_length=32, iv_length=16)
|
|
|
|
self.assertIsInstance(b_key_3, six.binary_type)
|
|
|
|
|
|
|
|
# verify we get the same answer
|
|
|
|
# we could potentially run a few iterations of this and time it to see if it's roughly constant time
|
|
|
|
# and or that it exceeds some minimal time, but that would likely cause unreliable fails, esp in CI
|
|
|
|
b_key_4 = self.vault_cipher._create_key_pycrypto(b_password, b_salt, key_length=32, iv_length=16)
|
|
|
|
self.assertIsInstance(b_key_4, six.binary_type)
|
|
|
|
self.assertEqual(b_key_3, b_key_4)
|
|
|
|
self.assertEqual(b_key_1, b_key_4)
|
|
|
|
|
|
|
|
def test_create_key_known_pycrypto(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
b_password = b'hunter42'
|
2016-08-24 02:03:11 +02:00
|
|
|
|
|
|
|
# A fixed salt
|
|
|
|
b_salt = b'q' * 32 # q is the most random letter.
|
2017-06-27 15:00:15 +02:00
|
|
|
b_key_3 = self.vault_cipher._create_key_pycrypto(b_password, b_salt, key_length=32, iv_length=16)
|
|
|
|
self.assertIsInstance(b_key_3, six.binary_type)
|
2016-08-24 02:03:11 +02:00
|
|
|
|
|
|
|
# verify we get the same answer
|
|
|
|
# we could potentially run a few iterations of this and time it to see if it's roughly constant time
|
|
|
|
# and or that it exceeds some minimal time, but that would likely cause unreliable fails, esp in CI
|
2017-06-27 15:00:15 +02:00
|
|
|
b_key_4 = self.vault_cipher._create_key_pycrypto(b_password, b_salt, key_length=32, iv_length=16)
|
|
|
|
self.assertIsInstance(b_key_4, six.binary_type)
|
|
|
|
self.assertEqual(b_key_3, b_key_4)
|
2016-08-24 02:03:11 +02:00
|
|
|
|
|
|
|
def test_is_equal_is_equal(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
self.assertTrue(self.vault_cipher._is_equal(b'abcdefghijklmnopqrstuvwxyz', b'abcdefghijklmnopqrstuvwxyz'))
|
2016-08-24 02:03:11 +02:00
|
|
|
|
|
|
|
def test_is_equal_unequal_length(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
self.assertFalse(self.vault_cipher._is_equal(b'abcdefghijklmnopqrstuvwxyz', b'abcdefghijklmnopqrstuvwx and sometimes y'))
|
2016-08-24 02:03:11 +02:00
|
|
|
|
|
|
|
def test_is_equal_not_equal(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
self.assertFalse(self.vault_cipher._is_equal(b'abcdefghijklmnopqrstuvwxyz', b'AbcdefghijKlmnopQrstuvwxZ'))
|
2016-08-24 02:03:11 +02:00
|
|
|
|
|
|
|
def test_is_equal_empty(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
self.assertTrue(self.vault_cipher._is_equal(b'', b''))
|
2016-08-24 02:03:11 +02:00
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_is_equal_non_ascii_equal(self):
|
|
|
|
utf8_data = to_bytes(u'私はガラスを食べられます。それは私を傷つけません。')
|
|
|
|
self.assertTrue(self.vault_cipher._is_equal(utf8_data, utf8_data))
|
2016-08-24 02:03:11 +02:00
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_is_equal_non_ascii_unequal(self):
|
|
|
|
utf8_data = to_bytes(u'私はガラスを食べられます。それは私を傷つけません。')
|
|
|
|
utf8_data2 = to_bytes(u'Pot să mănânc sticlă și ea nu mă rănește.')
|
2016-08-24 02:03:11 +02:00
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
# Test for the len optimization path
|
|
|
|
self.assertFalse(self.vault_cipher._is_equal(utf8_data, utf8_data2))
|
|
|
|
# Test for the slower, char by char comparison path
|
|
|
|
self.assertFalse(self.vault_cipher._is_equal(utf8_data, utf8_data[:-1] + b'P'))
|
2016-08-24 02:03:11 +02:00
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_is_equal_non_bytes(self):
|
|
|
|
""" Anything not a byte string should raise a TypeError """
|
|
|
|
self.assertRaises(TypeError, self.vault_cipher._is_equal, u"One fish", b"two fish")
|
|
|
|
self.assertRaises(TypeError, self.vault_cipher._is_equal, b"One fish", u"two fish")
|
|
|
|
self.assertRaises(TypeError, self.vault_cipher._is_equal, 1, b"red fish")
|
|
|
|
self.assertRaises(TypeError, self.vault_cipher._is_equal, b"blue fish", 2)
|
2014-10-21 20:27:01 +02:00
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
|
2017-06-27 15:00:15 +02:00
|
|
|
@pytest.mark.skipif(not vault.HAS_PYCRYPTO,
|
|
|
|
reason="Skipping Pycrypto tests because pycrypto is not installed")
|
|
|
|
class TestVaultCipherAes256PyCrypto(TestVaultCipherAes256):
|
|
|
|
def setUp(self):
|
|
|
|
self.has_cryptography = vault.HAS_CRYPTOGRAPHY
|
|
|
|
vault.HAS_CRYPTOGRAPHY = False
|
|
|
|
super(TestVaultCipherAes256PyCrypto, self).setUp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
vault.HAS_CRYPTOGRAPHY = self.has_cryptography
|
|
|
|
super(TestVaultCipherAes256PyCrypto, self).tearDown()
|
|
|
|
|
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
class TestMatchSecrets(unittest.TestCase):
|
|
|
|
def test_empty_tuple(self):
|
|
|
|
secrets = [tuple()]
|
|
|
|
vault_ids = ['vault_id_1']
|
|
|
|
self.assertRaises(ValueError,
|
|
|
|
vault.match_secrets,
|
|
|
|
secrets, vault_ids)
|
|
|
|
|
|
|
|
def test_empty_secrets(self):
|
|
|
|
matches = vault.match_secrets([], ['vault_id_1'])
|
|
|
|
self.assertEqual(matches, [])
|
|
|
|
|
|
|
|
def test_single_match(self):
|
|
|
|
secret = TextVaultSecret('password')
|
|
|
|
matches = vault.match_secrets([('default', secret)], ['default'])
|
|
|
|
self.assertEquals(matches, [('default', secret)])
|
|
|
|
|
|
|
|
def test_no_matches(self):
|
|
|
|
secret = TextVaultSecret('password')
|
|
|
|
matches = vault.match_secrets([('default', secret)], ['not_default'])
|
|
|
|
self.assertEquals(matches, [])
|
|
|
|
|
|
|
|
def test_multiple_matches(self):
|
|
|
|
secrets = [('vault_id1', TextVaultSecret('password1')),
|
|
|
|
('vault_id2', TextVaultSecret('password2')),
|
|
|
|
('vault_id1', TextVaultSecret('password3')),
|
|
|
|
('vault_id4', TextVaultSecret('password4'))]
|
|
|
|
vault_ids = ['vault_id1', 'vault_id4']
|
|
|
|
matches = vault.match_secrets(secrets, vault_ids)
|
|
|
|
|
|
|
|
self.assertEqual(len(matches), 3)
|
|
|
|
expected = [('vault_id1', TextVaultSecret('password1')),
|
|
|
|
('vault_id1', TextVaultSecret('password3')),
|
|
|
|
('vault_id4', TextVaultSecret('password4'))]
|
|
|
|
self.assertEqual([x for x, y in matches],
|
|
|
|
[a for a, b in expected])
|
|
|
|
|
|
|
|
|
2017-06-27 15:00:15 +02:00
|
|
|
@pytest.mark.skipif(not vault.HAS_CRYPTOGRAPHY,
|
|
|
|
reason="Skipping cryptography tests because cryptography is not installed")
|
2016-09-13 16:30:17 +02:00
|
|
|
class TestVaultLib(unittest.TestCase):
|
|
|
|
def setUp(self):
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
self.vault_password = "test-vault-password"
|
|
|
|
text_secret = TextVaultSecret(self.vault_password)
|
|
|
|
self.vault_secrets = [('default', text_secret),
|
|
|
|
('test_id', text_secret)]
|
|
|
|
self.v = vault.VaultLib(self.vault_secrets)
|
|
|
|
|
|
|
|
def _vault_secrets(self, vault_id, secret):
|
|
|
|
return [(vault_id, secret)]
|
|
|
|
|
|
|
|
def _vault_secrets_from_password(self, vault_id, password):
|
|
|
|
return [(vault_id, TextVaultSecret(password))]
|
2014-10-21 20:27:01 +02:00
|
|
|
|
2016-08-24 02:03:11 +02:00
|
|
|
def test_encrypt(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
plaintext = u'Some text to encrypt in a café'
|
|
|
|
b_vaulttext = self.v.encrypt(plaintext)
|
2016-08-24 02:03:11 +02:00
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
self.assertIsInstance(b_vaulttext, six.binary_type)
|
2016-08-24 02:03:11 +02:00
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
b_header = b'$ANSIBLE_VAULT;1.1;AES256\n'
|
|
|
|
self.assertEqual(b_vaulttext[:len(b_header)], b_header)
|
2016-08-24 02:03:11 +02:00
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
def test_encrypt_vault_id(self):
|
|
|
|
plaintext = u'Some text to encrypt in a café'
|
|
|
|
b_vaulttext = self.v.encrypt(plaintext, vault_id='test_id')
|
|
|
|
|
|
|
|
self.assertIsInstance(b_vaulttext, six.binary_type)
|
|
|
|
|
|
|
|
b_header = b'$ANSIBLE_VAULT;1.2;AES256;test_id\n'
|
|
|
|
self.assertEqual(b_vaulttext[:len(b_header)], b_header)
|
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_encrypt_bytes(self):
|
|
|
|
|
|
|
|
plaintext = to_bytes(u'Some text to encrypt in a café')
|
|
|
|
b_vaulttext = self.v.encrypt(plaintext)
|
|
|
|
|
|
|
|
self.assertIsInstance(b_vaulttext, six.binary_type)
|
|
|
|
|
|
|
|
b_header = b'$ANSIBLE_VAULT;1.1;AES256\n'
|
|
|
|
self.assertEqual(b_vaulttext[:len(b_header)], b_header)
|
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
def test_encrypt_no_secret_empty_secrets(self):
|
|
|
|
vault_secrets = []
|
|
|
|
v = vault.VaultLib(vault_secrets)
|
|
|
|
|
|
|
|
plaintext = u'Some text to encrypt in a café'
|
|
|
|
self.assertRaisesRegexp(vault.AnsibleVaultError,
|
|
|
|
'.*A vault password must be specified to encrypt data.*',
|
|
|
|
v.encrypt,
|
|
|
|
plaintext)
|
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
def test_is_encrypted(self):
|
|
|
|
self.assertFalse(self.v.is_encrypted(b"foobar"), msg="encryption check on plaintext yielded false positive")
|
|
|
|
b_data = b"$ANSIBLE_VAULT;9.9;TEST\n%s" % hexlify(b"ansible")
|
|
|
|
self.assertTrue(self.v.is_encrypted(b_data), msg="encryption check on headered text failed")
|
2014-10-21 20:27:01 +02:00
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
def test_format_vaulttext_envelope(self):
|
|
|
|
cipher_name = "TEST"
|
2016-09-13 16:30:17 +02:00
|
|
|
b_ciphertext = b"ansible"
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
b_vaulttext = vault.format_vaulttext_envelope(b_ciphertext,
|
|
|
|
cipher_name,
|
|
|
|
version=self.v.b_version,
|
|
|
|
vault_id='default')
|
2016-09-13 16:30:17 +02:00
|
|
|
b_lines = b_vaulttext.split(b'\n')
|
|
|
|
self.assertGreater(len(b_lines), 1, msg="failed to properly add header")
|
|
|
|
|
|
|
|
b_header = b_lines[0]
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
# self.assertTrue(b_header.endswith(b';TEST'), msg="header does not end with cipher name")
|
2016-09-13 16:30:17 +02:00
|
|
|
|
|
|
|
b_header_parts = b_header.split(b';')
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
self.assertEqual(len(b_header_parts), 4, msg="header has the wrong number of parts")
|
2016-09-13 16:30:17 +02:00
|
|
|
self.assertEqual(b_header_parts[0], b'$ANSIBLE_VAULT', msg="header does not start with $ANSIBLE_VAULT")
|
|
|
|
self.assertEqual(b_header_parts[1], self.v.b_version, msg="header version is incorrect")
|
|
|
|
self.assertEqual(b_header_parts[2], b'TEST', msg="header does not end with cipher name")
|
2014-10-21 20:27:01 +02:00
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
# And just to verify, lets parse the results and compare
|
|
|
|
b_ciphertext2, b_version2, cipher_name2, vault_id2 = \
|
|
|
|
vault.parse_vaulttext_envelope(b_vaulttext)
|
|
|
|
self.assertEqual(b_ciphertext, b_ciphertext2)
|
|
|
|
self.assertEqual(self.v.b_version, b_version2)
|
|
|
|
self.assertEqual(cipher_name, cipher_name2)
|
|
|
|
self.assertEqual('default', vault_id2)
|
|
|
|
|
|
|
|
def test_parse_vaulttext_envelope(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
b_vaulttext = b"$ANSIBLE_VAULT;9.9;TEST\nansible"
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
b_ciphertext, b_version, cipher_name, vault_id = vault.parse_vaulttext_envelope(b_vaulttext)
|
2016-09-13 16:30:17 +02:00
|
|
|
b_lines = b_ciphertext.split(b'\n')
|
|
|
|
self.assertEqual(b_lines[0], b"ansible", msg="Payload was not properly split from the header")
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
self.assertEqual(cipher_name, u'TEST', msg="cipher name was not properly set")
|
|
|
|
self.assertEqual(b_version, b"9.9", msg="version was not properly set")
|
2014-10-21 20:27:01 +02:00
|
|
|
|
2017-08-02 00:53:22 +02:00
|
|
|
def test_parse_vaulttext_envelope_crlf(self):
|
|
|
|
b_vaulttext = b"$ANSIBLE_VAULT;9.9;TEST\r\nansible"
|
|
|
|
b_ciphertext, b_version, cipher_name, vault_id = vault.parse_vaulttext_envelope(b_vaulttext)
|
|
|
|
b_lines = b_ciphertext.split(b'\n')
|
|
|
|
self.assertEqual(b_lines[0], b"ansible", msg="Payload was not properly split from the header")
|
|
|
|
self.assertEqual(cipher_name, u'TEST', msg="cipher name was not properly set")
|
|
|
|
self.assertEqual(b_version, b"9.9", msg="version was not properly set")
|
|
|
|
|
2014-10-21 20:27:01 +02:00
|
|
|
def test_encrypt_decrypt_aes(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
self.v.cipher_name = u'AES'
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
vault_secrets = self._vault_secrets_from_password('default', 'ansible')
|
|
|
|
self.v.secrets = vault_secrets
|
2015-08-27 15:06:05 +02:00
|
|
|
# AES encryption code has been removed, so this is old output for
|
|
|
|
# AES-encrypted 'foobar' with password 'ansible'.
|
2016-09-13 16:30:17 +02:00
|
|
|
b_vaulttext = b'''$ANSIBLE_VAULT;1.1;AES
|
|
|
|
53616c7465645f5fc107ce1ef4d7b455e038a13b053225776458052f8f8f332d554809d3f150bfa3
|
|
|
|
fe3db930508b65e0ff5947e4386b79af8ab094017629590ef6ba486814cf70f8e4ab0ed0c7d2587e
|
|
|
|
786a5a15efeb787e1958cbdd480d076c
|
|
|
|
'''
|
|
|
|
b_plaintext = self.v.decrypt(b_vaulttext)
|
|
|
|
self.assertEqual(b_plaintext, b"foobar", msg="decryption failed")
|
2014-10-21 20:27:01 +02:00
|
|
|
|
|
|
|
def test_encrypt_decrypt_aes256(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
self.v.cipher_name = u'AES256'
|
|
|
|
plaintext = u"foobar"
|
|
|
|
b_vaulttext = self.v.encrypt(plaintext)
|
|
|
|
b_plaintext = self.v.decrypt(b_vaulttext)
|
|
|
|
self.assertNotEqual(b_vaulttext, b"foobar", msg="encryption failed")
|
|
|
|
self.assertEqual(b_plaintext, b"foobar", msg="decryption failed")
|
2014-10-21 20:27:01 +02:00
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
def test_encrypt_decrypt_aes256_none_secrets(self):
|
|
|
|
vault_secrets = self._vault_secrets_from_password('default', 'ansible')
|
|
|
|
v = vault.VaultLib(vault_secrets)
|
|
|
|
|
|
|
|
plaintext = u"foobar"
|
|
|
|
b_vaulttext = v.encrypt(plaintext)
|
|
|
|
|
|
|
|
# VaultLib will default to empty {} if secrets is None
|
|
|
|
v_none = vault.VaultLib(None)
|
|
|
|
# so set secrets None explicitly
|
|
|
|
v_none.secrets = None
|
|
|
|
self.assertRaisesRegexp(vault.AnsibleVaultError,
|
|
|
|
'.*A vault password must be specified to decrypt data.*',
|
|
|
|
v_none.decrypt,
|
|
|
|
b_vaulttext)
|
|
|
|
|
|
|
|
def test_encrypt_decrypt_aes256_empty_secrets(self):
|
|
|
|
vault_secrets = self._vault_secrets_from_password('default', 'ansible')
|
|
|
|
v = vault.VaultLib(vault_secrets)
|
|
|
|
|
|
|
|
plaintext = u"foobar"
|
|
|
|
b_vaulttext = v.encrypt(plaintext)
|
|
|
|
|
|
|
|
vault_secrets_empty = []
|
|
|
|
v_none = vault.VaultLib(vault_secrets_empty)
|
|
|
|
|
|
|
|
self.assertRaisesRegexp(vault.AnsibleVaultError,
|
|
|
|
'.*Attempting to decrypt but no vault secrets found.*',
|
|
|
|
v_none.decrypt,
|
|
|
|
b_vaulttext)
|
|
|
|
|
|
|
|
def test_encrypt_decrypt_aes256_multiple_secrets_all_wrong(self):
|
|
|
|
plaintext = u'Some text to encrypt in a café'
|
|
|
|
b_vaulttext = self.v.encrypt(plaintext)
|
|
|
|
|
|
|
|
vault_secrets = [('default', TextVaultSecret('another-wrong-password')),
|
|
|
|
('wrong-password', TextVaultSecret('wrong-password'))]
|
|
|
|
|
|
|
|
v_multi = vault.VaultLib(vault_secrets)
|
|
|
|
self.assertRaisesRegexp(errors.AnsibleError,
|
|
|
|
'.*Decryption failed.*',
|
|
|
|
v_multi.decrypt,
|
|
|
|
b_vaulttext,
|
|
|
|
filename='/dev/null/fake/filename')
|
|
|
|
|
|
|
|
def test_encrypt_decrypt_aes256_multiple_secrets_one_valid(self):
|
|
|
|
plaintext = u'Some text to encrypt in a café'
|
|
|
|
b_vaulttext = self.v.encrypt(plaintext)
|
|
|
|
|
|
|
|
correct_secret = TextVaultSecret(self.vault_password)
|
|
|
|
wrong_secret = TextVaultSecret('wrong-password')
|
|
|
|
|
|
|
|
vault_secrets = [('default', wrong_secret),
|
|
|
|
('corect_secret', correct_secret),
|
|
|
|
('wrong_secret', wrong_secret)]
|
|
|
|
|
|
|
|
v_multi = vault.VaultLib(vault_secrets)
|
|
|
|
b_plaintext = v_multi.decrypt(b_vaulttext)
|
|
|
|
self.assertNotEqual(b_vaulttext, to_bytes(plaintext), msg="encryption failed")
|
|
|
|
self.assertEqual(b_plaintext, to_bytes(plaintext), msg="decryption failed")
|
|
|
|
|
2016-08-24 02:03:11 +02:00
|
|
|
def test_encrypt_decrypt_aes256_existing_vault(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
self.v.cipher_name = u'AES256'
|
|
|
|
b_orig_plaintext = b"Setec Astronomy"
|
|
|
|
vaulttext = u'''$ANSIBLE_VAULT;1.1;AES256
|
2016-08-24 02:03:11 +02:00
|
|
|
33363965326261303234626463623963633531343539616138316433353830356566396130353436
|
|
|
|
3562643163366231316662386565383735653432386435610a306664636137376132643732393835
|
|
|
|
63383038383730306639353234326630666539346233376330303938323639306661313032396437
|
|
|
|
6233623062366136310a633866373936313238333730653739323461656662303864663666653563
|
|
|
|
3138'''
|
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
b_plaintext = self.v.decrypt(vaulttext)
|
|
|
|
self.assertEqual(b_plaintext, b_plaintext, msg="decryption failed")
|
|
|
|
|
|
|
|
b_vaulttext = to_bytes(vaulttext, encoding='ascii', errors='strict')
|
|
|
|
b_plaintext = self.v.decrypt(b_vaulttext)
|
|
|
|
self.assertEqual(b_plaintext, b_orig_plaintext, msg="decryption failed")
|
2016-08-24 02:03:11 +02:00
|
|
|
|
2017-06-27 15:00:15 +02:00
|
|
|
# FIXME This test isn't working quite yet.
|
|
|
|
@pytest.mark.skip(reason='This test is not ready yet')
|
2016-08-24 02:03:11 +02:00
|
|
|
def test_encrypt_decrypt_aes256_bad_hmac(self):
|
|
|
|
|
2016-09-13 16:30:17 +02:00
|
|
|
self.v.cipher_name = 'AES256'
|
2016-08-24 02:03:11 +02:00
|
|
|
# plaintext = "Setec Astronomy"
|
|
|
|
enc_data = '''$ANSIBLE_VAULT;1.1;AES256
|
|
|
|
33363965326261303234626463623963633531343539616138316433353830356566396130353436
|
|
|
|
3562643163366231316662386565383735653432386435610a306664636137376132643732393835
|
|
|
|
63383038383730306639353234326630666539346233376330303938323639306661313032396437
|
|
|
|
6233623062366136310a633866373936313238333730653739323461656662303864663666653563
|
|
|
|
3138'''
|
|
|
|
b_data = to_bytes(enc_data, errors='strict', encoding='utf-8')
|
2016-09-13 16:30:17 +02:00
|
|
|
b_data = self.v._split_header(b_data)
|
2016-08-24 02:03:11 +02:00
|
|
|
foo = binascii.unhexlify(b_data)
|
|
|
|
lines = foo.splitlines()
|
|
|
|
# line 0 is salt, line 1 is hmac, line 2+ is ciphertext
|
|
|
|
b_salt = lines[0]
|
|
|
|
b_hmac = lines[1]
|
|
|
|
b_ciphertext_data = b'\n'.join(lines[2:])
|
|
|
|
|
|
|
|
b_ciphertext = binascii.unhexlify(b_ciphertext_data)
|
|
|
|
# b_orig_ciphertext = b_ciphertext[:]
|
|
|
|
|
|
|
|
# now muck with the text
|
|
|
|
# b_munged_ciphertext = b_ciphertext[:10] + b'\x00' + b_ciphertext[11:]
|
|
|
|
# b_munged_ciphertext = b_ciphertext
|
|
|
|
# assert b_orig_ciphertext != b_munged_ciphertext
|
|
|
|
|
|
|
|
b_ciphertext_data = binascii.hexlify(b_ciphertext)
|
|
|
|
b_payload = b'\n'.join([b_salt, b_hmac, b_ciphertext_data])
|
|
|
|
# reformat
|
2016-09-13 16:30:17 +02:00
|
|
|
b_invalid_ciphertext = self.v._format_output(b_payload)
|
2016-08-24 02:03:11 +02:00
|
|
|
|
|
|
|
# assert we throw an error
|
2016-09-13 16:30:17 +02:00
|
|
|
self.v.decrypt(b_invalid_ciphertext)
|
2016-08-24 02:03:11 +02:00
|
|
|
|
Support multiple vault passwords (#22756)
Fixes #13243
** Add --vault-id to name/identify multiple vault passwords
Use --vault-id to indicate id and path/type
--vault-id=prompt # prompt for default vault id password
--vault-id=myorg@prompt # prompt for a vault_id named 'myorg'
--vault-id=a_password_file # load ./a_password_file for default id
--vault-id=myorg@a_password_file # load file for 'myorg' vault id
vault_id's are created implicitly for existing --vault-password-file
and --ask-vault-pass options.
Vault ids are just for UX purposes and bookkeeping. Only the vault
payload and the password bytestring is needed to decrypt a
vault blob.
Replace passing password around everywhere with
a VaultSecrets object.
If we specify a vault_id, mention that in password prompts
Specifying multiple -vault-password-files will
now try each until one works
** Rev vault format in a backwards compatible way
The 1.2 vault format adds the vault_id to the header line
of the vault text. This is backwards compatible with older
versions of ansible. Old versions will just ignore it and
treat it as the default (and only) vault id.
Note: only 2.4+ supports multiple vault passwords, so while
earlier ansible versions can read the vault-1.2 format, it
does not make them magically support multiple vault passwords.
use 1.1 format for 'default' vault_id
Vaulted items that need to include a vault_id will be
written in 1.2 format.
If we set a new DEFAULT_VAULT_IDENTITY, then the default will
use version 1.2
vault will only use a vault_id if one is specified. So if none
is specified and C.DEFAULT_VAULT_IDENTITY is 'default'
we use the old format.
** Changes/refactors needed to implement multiple vault passwords
raise exceptions on decrypt fail, check vault id early
split out parsing the vault plaintext envelope (with the
sha/original plaintext) to _split_plaintext_envelope()
some cli fixups for specifying multiple paths in
the unfrack_paths optparse callback
fix py3 dict.keys() 'dict_keys object is not indexable' error
pluralize cli.options.vault_password_file -> vault_password_files
pluralize cli.options.new_vault_password_file -> new_vault_password_files
pluralize cli.options.vault_id -> cli.options.vault_ids
** Add a config option (vault_id_match) to force vault id matching.
With 'vault_id_match=True' and an ansible
vault that provides a vault_id, then decryption will require
that a matching vault_id is required. (via
--vault-id=my_vault_id@password_file, for ex).
In other words, if the config option is true, then only
the vault secrets with matching vault ids are candidates for
decrypting a vault. If option is false (the default), then
all of the provided vault secrets will be selected.
If a user doesn't want all vault secrets to be tried to
decrypt any vault content, they can enable this option.
Note: The vault id used for the match is not encrypted or
cryptographically signed. It is just a label/id/nickname used
for referencing a specific vault secret.
2017-07-28 21:20:58 +02:00
|
|
|
def test_decrypt_non_default_1_2(self):
|
|
|
|
b_expected_plaintext = to_bytes('foo bar\n')
|
|
|
|
vaulttext = '''$ANSIBLE_VAULT;1.2;AES256;ansible_devel
|
|
|
|
65616435333934613466373335363332373764363365633035303466643439313864663837393234
|
|
|
|
3330656363343637313962633731333237313636633534630a386264363438363362326132363239
|
|
|
|
39363166646664346264383934393935653933316263333838386362633534326664646166663736
|
|
|
|
6462303664383765650a356637643633366663643566353036303162386237336233393065393164
|
|
|
|
6264'''
|
|
|
|
|
|
|
|
vault_secrets = self._vault_secrets_from_password('default', 'ansible')
|
|
|
|
v = vault.VaultLib(vault_secrets)
|
|
|
|
|
|
|
|
b_vaulttext = to_bytes(vaulttext)
|
|
|
|
|
|
|
|
b_plaintext = v.decrypt(b_vaulttext)
|
|
|
|
self.assertEqual(b_expected_plaintext, b_plaintext)
|
|
|
|
|
|
|
|
b_ciphertext, b_version, cipher_name, vault_id = vault.parse_vaulttext_envelope(b_vaulttext)
|
|
|
|
self.assertEqual('ansible_devel', vault_id)
|
|
|
|
self.assertEqual(b'1.2', b_version)
|
|
|
|
|
2014-10-21 20:27:01 +02:00
|
|
|
def test_encrypt_encrypted(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
self.v.cipher_name = u'AES'
|
|
|
|
b_vaulttext = b"$ANSIBLE_VAULT;9.9;TEST\n%s" % hexlify(b"ansible")
|
|
|
|
vaulttext = to_text(b_vaulttext, errors='strict')
|
|
|
|
self.assertRaises(errors.AnsibleError, self.v.encrypt, b_vaulttext)
|
|
|
|
self.assertRaises(errors.AnsibleError, self.v.encrypt, vaulttext)
|
2014-10-21 20:27:01 +02:00
|
|
|
|
|
|
|
def test_decrypt_decrypted(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
plaintext = u"ansible"
|
|
|
|
self.assertRaises(errors.AnsibleError, self.v.decrypt, plaintext)
|
|
|
|
|
|
|
|
b_plaintext = b"ansible"
|
|
|
|
self.assertRaises(errors.AnsibleError, self.v.decrypt, b_plaintext)
|
2014-10-21 20:27:01 +02:00
|
|
|
|
|
|
|
def test_cipher_not_set(self):
|
2016-09-13 16:30:17 +02:00
|
|
|
plaintext = u"ansible"
|
|
|
|
self.v.encrypt(plaintext)
|
|
|
|
self.assertEquals(self.v.cipher_name, "AES256")
|
2017-06-27 15:00:15 +02:00
|
|
|
|
|
|
|
|
|
|
|
@pytest.mark.skipif(not vault.HAS_PYCRYPTO,
|
|
|
|
reason="Skipping Pycrypto tests because pycrypto is not installed")
|
|
|
|
class TestVaultLibPyCrypto(TestVaultLib):
|
|
|
|
def setUp(self):
|
|
|
|
self.has_cryptography = vault.HAS_CRYPTOGRAPHY
|
|
|
|
vault.HAS_CRYPTOGRAPHY = False
|
|
|
|
super(TestVaultLibPyCrypto, self).setUp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
vault.HAS_CRYPTOGRAPHY = self.has_cryptography
|
|
|
|
super(TestVaultLibPyCrypto, self).tearDown()
|