mirror of
https://github.com/ansible/awx.git
synced 2026-02-22 13:36:02 -03:30
add utf-8 support to utils.common.encrypt_field/decrypt_field
This commit is contained in:
@@ -1,24 +1,37 @@
|
|||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
|
# Copyright (c) 2017 Ansible, Inc.
|
||||||
|
# All Rights Reserved.
|
||||||
|
|
||||||
from awx.conf.models import Setting
|
from awx.conf.models import Setting
|
||||||
from awx.main.utils import common
|
from awx.main.utils import common
|
||||||
|
|
||||||
|
|
||||||
def test_encrypt_field():
|
def test_encrypt_field():
|
||||||
field = Setting(pk=123, value='ANSIBLE')
|
field = Setting(pk=123, value='ANSIBLE')
|
||||||
encrypted = common.encrypt_field(field, 'value')
|
encrypted = field.value = common.encrypt_field(field, 'value')
|
||||||
assert encrypted == '$encrypted$AES$Ey83gcmMuBBT1OEq2lepnw=='
|
assert encrypted == '$encrypted$AES$Ey83gcmMuBBT1OEq2lepnw=='
|
||||||
assert common.decrypt_field(field, 'value') == 'ANSIBLE'
|
assert common.decrypt_field(field, 'value') == 'ANSIBLE'
|
||||||
|
|
||||||
|
|
||||||
def test_encrypt_field_without_pk():
|
def test_encrypt_field_without_pk():
|
||||||
field = Setting(value='ANSIBLE')
|
field = Setting(value='ANSIBLE')
|
||||||
encrypted = common.encrypt_field(field, 'value')
|
encrypted = field.value = common.encrypt_field(field, 'value')
|
||||||
assert encrypted == '$encrypted$AES$8uIzEoGyY6QJwoTWbMFGhw=='
|
assert encrypted == '$encrypted$AES$8uIzEoGyY6QJwoTWbMFGhw=='
|
||||||
assert common.decrypt_field(field, 'value') == 'ANSIBLE'
|
assert common.decrypt_field(field, 'value') == 'ANSIBLE'
|
||||||
|
|
||||||
|
|
||||||
|
def test_encrypt_field_with_unicode_string():
|
||||||
|
value = u'Iñtërnâtiônàlizætiøn'
|
||||||
|
field = Setting(value=value)
|
||||||
|
encrypted = field.value = common.encrypt_field(field, 'value')
|
||||||
|
assert encrypted == '$encrypted$UTF8$AES$AESQbqOefpYcLC7x8yZ2aWG4FlXlS66JgavLbDp/DSM='
|
||||||
|
assert common.decrypt_field(field, 'value') == value
|
||||||
|
|
||||||
|
|
||||||
def test_encrypt_subfield():
|
def test_encrypt_subfield():
|
||||||
field = Setting(value={'name': 'ANSIBLE'})
|
field = Setting(value={'name': 'ANSIBLE'})
|
||||||
encrypted = common.encrypt_field(field, 'value', subfield='name')
|
encrypted = field.value = common.encrypt_field(field, 'value', subfield='name')
|
||||||
assert encrypted == '$encrypted$AES$8uIzEoGyY6QJwoTWbMFGhw=='
|
assert encrypted == '$encrypted$AES$8uIzEoGyY6QJwoTWbMFGhw=='
|
||||||
assert common.decrypt_field(field, 'value', subfield='name') == 'ANSIBLE'
|
assert common.decrypt_field(field, 'value', subfield='name') == 'ANSIBLE'
|
||||||
|
|
||||||
|
|||||||
@@ -21,6 +21,8 @@ import tempfile
|
|||||||
# Decorator
|
# Decorator
|
||||||
from decorator import decorator
|
from decorator import decorator
|
||||||
|
|
||||||
|
import six
|
||||||
|
|
||||||
# Django
|
# Django
|
||||||
from django.utils.translation import ugettext_lazy as _
|
from django.utils.translation import ugettext_lazy as _
|
||||||
from django.db.models import ManyToManyField
|
from django.db.models import ManyToManyField
|
||||||
@@ -190,6 +192,7 @@ def encrypt_field(instance, field_name, ask=False, subfield=None):
|
|||||||
value = value[subfield]
|
value = value[subfield]
|
||||||
if not value or value.startswith('$encrypted$') or (ask and value == 'ASK'):
|
if not value or value.startswith('$encrypted$') or (ask and value == 'ASK'):
|
||||||
return value
|
return value
|
||||||
|
utf8 = type(value) == six.text_type
|
||||||
value = smart_str(value)
|
value = smart_str(value)
|
||||||
key = get_encryption_key(field_name, getattr(instance, 'pk', None))
|
key = get_encryption_key(field_name, getattr(instance, 'pk', None))
|
||||||
cipher = AES.new(key, AES.MODE_ECB)
|
cipher = AES.new(key, AES.MODE_ECB)
|
||||||
@@ -197,17 +200,31 @@ def encrypt_field(instance, field_name, ask=False, subfield=None):
|
|||||||
value += '\x00'
|
value += '\x00'
|
||||||
encrypted = cipher.encrypt(value)
|
encrypted = cipher.encrypt(value)
|
||||||
b64data = base64.b64encode(encrypted)
|
b64data = base64.b64encode(encrypted)
|
||||||
return '$encrypted$%s$%s' % ('AES', b64data)
|
tokens = ['$encrypted', 'AES', b64data]
|
||||||
|
if utf8:
|
||||||
|
# If the value to encrypt is utf-8, we need to add a marker so we
|
||||||
|
# know to decode the data when it's decrypted later
|
||||||
|
tokens.insert(1, 'UTF8')
|
||||||
|
return '$'.join(tokens)
|
||||||
|
|
||||||
|
|
||||||
def decrypt_value(encryption_key, value):
|
def decrypt_value(encryption_key, value):
|
||||||
algo, b64data = value[len('$encrypted$'):].split('$', 1)
|
raw_data = value[len('$encrypted$'):]
|
||||||
|
# If the encrypted string contains a UTF8 marker, discard it
|
||||||
|
utf8 = raw_data.startswith('UTF8$')
|
||||||
|
if utf8:
|
||||||
|
raw_data = raw_data[len('UTF8$'):]
|
||||||
|
algo, b64data = raw_data.split('$', 1)
|
||||||
if algo != 'AES':
|
if algo != 'AES':
|
||||||
raise ValueError('unsupported algorithm: %s' % algo)
|
raise ValueError('unsupported algorithm: %s' % algo)
|
||||||
encrypted = base64.b64decode(b64data)
|
encrypted = base64.b64decode(b64data)
|
||||||
cipher = AES.new(encryption_key, AES.MODE_ECB)
|
cipher = AES.new(encryption_key, AES.MODE_ECB)
|
||||||
value = cipher.decrypt(encrypted)
|
value = cipher.decrypt(encrypted)
|
||||||
return value.rstrip('\x00')
|
value = value.rstrip('\x00')
|
||||||
|
# If the encrypted string contained a UTF8 marker, decode the data
|
||||||
|
if utf8:
|
||||||
|
value = value.decode('utf-8')
|
||||||
|
return value
|
||||||
|
|
||||||
|
|
||||||
def decrypt_field(instance, field_name, subfield=None):
|
def decrypt_field(instance, field_name, subfield=None):
|
||||||
|
|||||||
Reference in New Issue
Block a user