* Draft adding kms providers * Rename defaultProvider to currentProvider * Add getting current provider from config * Remove comments * Make current provider service struct field * Add methods to secrets service * Test getting current provider * Implements missing methods for fake secrets service * Remove accidental changes * Fix linter issue * Update configuration examples * Rename CurrentProvider method * Split service interface * Update wire Co-authored-by: spinillos <selenepinillos@gmail.com>
187 lines
5.6 KiB
Go
187 lines
5.6 KiB
Go
package manager
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/grafana/grafana/pkg/bus"
|
|
"github.com/grafana/grafana/pkg/services/encryption/ossencryption"
|
|
"github.com/grafana/grafana/pkg/services/secrets"
|
|
"github.com/grafana/grafana/pkg/services/secrets/database"
|
|
"github.com/grafana/grafana/pkg/services/sqlstore"
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"gopkg.in/ini.v1"
|
|
)
|
|
|
|
func TestSecretsService_EnvelopeEncryption(t *testing.T) {
|
|
store := database.ProvideSecretsStore(sqlstore.InitTestDB(t))
|
|
svc := SetupTestService(t, store)
|
|
ctx := context.Background()
|
|
|
|
t.Run("encrypting with no entity_id should create DEK", func(t *testing.T) {
|
|
plaintext := []byte("very secret string")
|
|
|
|
encrypted, err := svc.Encrypt(context.Background(), plaintext, secrets.WithoutScope())
|
|
require.NoError(t, err)
|
|
|
|
decrypted, err := svc.Decrypt(context.Background(), encrypted)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, plaintext, decrypted)
|
|
|
|
keys, err := store.GetAllDataKeys(ctx)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, len(keys), 1)
|
|
})
|
|
t.Run("encrypting another secret with no entity_id should use the same DEK", func(t *testing.T) {
|
|
plaintext := []byte("another very secret string")
|
|
|
|
encrypted, err := svc.Encrypt(context.Background(), plaintext, secrets.WithoutScope())
|
|
require.NoError(t, err)
|
|
|
|
decrypted, err := svc.Decrypt(context.Background(), encrypted)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, plaintext, decrypted)
|
|
|
|
keys, err := store.GetAllDataKeys(ctx)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, len(keys), 1)
|
|
})
|
|
t.Run("encrypting with entity_id provided should create a new DEK", func(t *testing.T) {
|
|
plaintext := []byte("some test data")
|
|
|
|
encrypted, err := svc.Encrypt(context.Background(), plaintext, secrets.WithScope("user:100"))
|
|
require.NoError(t, err)
|
|
|
|
decrypted, err := svc.Decrypt(context.Background(), encrypted)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, plaintext, decrypted)
|
|
|
|
keys, err := store.GetAllDataKeys(ctx)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, len(keys), 2)
|
|
})
|
|
|
|
t.Run("decrypting empty payload should return error", func(t *testing.T) {
|
|
_, err := svc.Decrypt(context.Background(), []byte(""))
|
|
require.Error(t, err)
|
|
|
|
assert.Equal(t, "unable to decrypt empty payload", err.Error())
|
|
})
|
|
|
|
t.Run("decrypting legacy secret encrypted with secret key from settings", func(t *testing.T) {
|
|
expected := "grafana"
|
|
encrypted := []byte{122, 56, 53, 113, 101, 117, 73, 89, 20, 254, 36, 112, 112, 16, 128, 232, 227, 52, 166, 108, 192, 5, 28, 125, 126, 42, 197, 190, 251, 36, 94}
|
|
decrypted, err := svc.Decrypt(context.Background(), encrypted)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, expected, string(decrypted))
|
|
})
|
|
}
|
|
|
|
func TestSecretsService_DataKeys(t *testing.T) {
|
|
store := database.ProvideSecretsStore(sqlstore.InitTestDB(t))
|
|
ctx := context.Background()
|
|
|
|
dataKey := secrets.DataKey{
|
|
Active: true,
|
|
Name: "test1",
|
|
Provider: "test",
|
|
EncryptedData: []byte{0x62, 0xAF, 0xA1, 0x1A},
|
|
}
|
|
|
|
t.Run("querying for a DEK that does not exist", func(t *testing.T) {
|
|
res, err := store.GetDataKey(ctx, dataKey.Name)
|
|
assert.ErrorIs(t, secrets.ErrDataKeyNotFound, err)
|
|
assert.Nil(t, res)
|
|
})
|
|
|
|
t.Run("creating an active DEK", func(t *testing.T) {
|
|
err := store.CreateDataKey(ctx, dataKey)
|
|
require.NoError(t, err)
|
|
|
|
res, err := store.GetDataKey(ctx, dataKey.Name)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, dataKey.EncryptedData, res.EncryptedData)
|
|
assert.Equal(t, dataKey.Provider, res.Provider)
|
|
assert.Equal(t, dataKey.Name, res.Name)
|
|
assert.True(t, dataKey.Active)
|
|
})
|
|
|
|
t.Run("creating an inactive DEK", func(t *testing.T) {
|
|
k := secrets.DataKey{
|
|
Active: false,
|
|
Name: "test2",
|
|
Provider: "test",
|
|
EncryptedData: []byte{0x62, 0xAF, 0xA1, 0x1A},
|
|
}
|
|
|
|
err := store.CreateDataKey(ctx, k)
|
|
require.Error(t, err)
|
|
|
|
res, err := store.GetDataKey(ctx, k.Name)
|
|
assert.Equal(t, secrets.ErrDataKeyNotFound, err)
|
|
assert.Nil(t, res)
|
|
})
|
|
|
|
t.Run("deleting DEK when no name provided must fail", func(t *testing.T) {
|
|
beforeDelete, err := store.GetAllDataKeys(ctx)
|
|
require.NoError(t, err)
|
|
err = store.DeleteDataKey(ctx, "")
|
|
require.Error(t, err)
|
|
|
|
afterDelete, err := store.GetAllDataKeys(ctx)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, beforeDelete, afterDelete)
|
|
})
|
|
|
|
t.Run("deleting a DEK", func(t *testing.T) {
|
|
err := store.DeleteDataKey(ctx, dataKey.Name)
|
|
require.NoError(t, err)
|
|
|
|
res, err := store.GetDataKey(ctx, dataKey.Name)
|
|
assert.Equal(t, secrets.ErrDataKeyNotFound, err)
|
|
assert.Nil(t, res)
|
|
})
|
|
}
|
|
|
|
func TestSecretsService_GetCurrentProvider(t *testing.T) {
|
|
t.Run("When encryption_provider is not specified explicitly, should use 'secretKey' as a current provider", func(t *testing.T) {
|
|
cfg := `[security]
|
|
secret_key = sdDkslslld`
|
|
|
|
raw, err := ini.Load([]byte(cfg))
|
|
require.NoError(t, err)
|
|
settings := &setting.OSSImpl{Cfg: &setting.Cfg{Raw: raw}}
|
|
|
|
svc := ProvideSecretsService(
|
|
database.ProvideSecretsStore(sqlstore.InitTestDB(t)),
|
|
bus.New(),
|
|
ossencryption.ProvideService(),
|
|
settings,
|
|
)
|
|
|
|
assert.Equal(t, "secretKey", svc.currentProvider)
|
|
})
|
|
|
|
t.Run("When encryption_provider value is set, should use it as a current provider", func(t *testing.T) {
|
|
cfg := `[security]
|
|
secret_key = sdDkslslld
|
|
encryption_provider = awskms.second_key`
|
|
|
|
raw, err := ini.Load([]byte(cfg))
|
|
require.NoError(t, err)
|
|
settings := &setting.OSSImpl{Cfg: &setting.Cfg{Raw: raw}}
|
|
|
|
svc := ProvideSecretsService(
|
|
database.ProvideSecretsStore(sqlstore.InitTestDB(t)),
|
|
bus.New(),
|
|
ossencryption.ProvideService(),
|
|
settings,
|
|
)
|
|
|
|
assert.Equal(t, "awskms.second_key", svc.currentProvider)
|
|
})
|
|
}
|