Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 24 additions & 2 deletions cmd/config-gen.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,8 @@
package cmd

import (
"encoding/base64"
"errors"
"fmt"
"os"
"regexp"
Expand Down Expand Up @@ -111,9 +113,11 @@ var generateConfig = &cobra.Command{
FlagErrorHandling: cobra.ExitOnError,
RunE: func(cmd *cobra.Command, args []string) error {
var templateConfig []byte
var err error

encryptedPassphrase = memguard.NewEnclave([]byte(opts.passphrase))
err := validateGenConfigOptions()
if err != nil {
return fmt.Errorf("failed to validate options [%s]", err.Error())
}

templateConfig, err = os.ReadFile(opts.configFilePath)
if err != nil {
Expand Down Expand Up @@ -152,6 +156,24 @@ var generateConfig = &cobra.Command{
},
}

func validateGenConfigOptions() error {
if opts.passphrase == "" {
opts.passphrase = os.Getenv(SecureConfigEnvName)
if opts.passphrase == "" {
return errors.New("provide the passphrase as a cli parameter or configure the CLOUDFUSE_SECURE_CONFIG_PASSPHRASE environment variable")
}
}

_, err := base64.StdEncoding.DecodeString(string(opts.passphrase))
if err != nil {
return fmt.Errorf("passphrase is not valid base64 encoded [%s]", err.Error())
}

encryptedPassphrase = memguard.NewEnclave([]byte(opts.passphrase))

return nil
}

func init() {
rootCmd.AddCommand(generateTestConfig)
generateTestConfig.Flags().StringVar(&opts.configFilePath, "config-file", "", "Input config file.")
Expand Down
55 changes: 55 additions & 0 deletions cmd/secure_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -130,6 +130,27 @@ func (suite *secureConfigTestSuite) TestSecureConfigEncrypt() {
suite.assert.NoFileExists(confFile.Name())
}

func (suite *secureConfigTestSuite) TestSecureConfigEncrypt2() {
defer suite.cleanupTest()
confFile, _ := os.CreateTemp("", "conf*.yaml")
outFile, _ := os.CreateTemp("", "conf*.yaml")
passphrase := "hvHlJUKlmZql3gLAcP6Ho41Js5rm8zUAKnwGb1lIffg="

defer os.Remove(confFile.Name())
defer os.Remove(outFile.Name())

_, err := confFile.WriteString(testPlainTextConfig)
suite.assert.NoError(err)

confFile.Close()

_, err = executeCommandSecure(rootCmd, "secure", "encrypt", fmt.Sprintf("--config-file=%s", confFile.Name()), fmt.Sprintf("--passphrase=%s", passphrase), fmt.Sprintf("--output-file=%s", outFile.Name()))
suite.assert.NoError(err)

// Config file should be deleted
suite.assert.NoFileExists(confFile.Name())
}

func (suite *secureConfigTestSuite) TestSecureConfigEncryptNoOutfile() {
defer suite.cleanupTest()
confFile, _ := os.CreateTemp("", "conf*.yaml")
Expand Down Expand Up @@ -237,6 +258,40 @@ func (suite *secureConfigTestSuite) TestSecureConfigDecrypt() {
os.Remove(confFile.Name() + "." + SecureConfigExtension)
}

func (suite *secureConfigTestSuite) TestSecureConfigDecrypt2() {
defer suite.cleanupTest()
confFile, _ := os.CreateTemp("", "conf*.yaml")
outFile, _ := os.CreateTemp("", "conf*.yaml")
passphrase := "hvHlJUKlmZql3gLAcP6Ho41Js5rm8zUAKnwGb1lIffg="
fmt.Println(passphrase)

defer os.Remove(confFile.Name())
defer os.Remove(outFile.Name())

_, err := confFile.WriteString(testPlainTextConfig)
suite.assert.NoError(err)

confFile.Close()
outFile.Close()

_, err = executeCommandSecure(rootCmd, "secure", "encrypt", fmt.Sprintf("--config-file=%s", confFile.Name()), fmt.Sprintf("--passphrase=%s", passphrase), fmt.Sprintf("--output-file=%s", outFile.Name()))
suite.assert.NoError(err)

// Config file should be deleted
suite.assert.NoFileExists(confFile.Name())

_, err = executeCommandSecure(rootCmd, "secure", "decrypt", fmt.Sprintf("--config-file=%s", outFile.Name()), fmt.Sprintf("--passphrase=%s", passphrase), fmt.Sprintf("--output-file=./tmp.yaml"))
suite.assert.NoError(err)

data, err := os.ReadFile("./tmp.yaml")
suite.assert.NoError(err)

suite.assert.Equal(testPlainTextConfig, string(data))

os.Remove("./tmp.yaml")
os.Remove(confFile.Name() + "." + SecureConfigExtension)
}

func (suite *secureConfigTestSuite) TestSecureConfigDecryptNoOutputFile() {
defer suite.cleanupTest()
confFile, _ := os.CreateTemp("", "conf*.yaml")
Expand Down
33 changes: 31 additions & 2 deletions common/util.go
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,7 @@ import (
"crypto/aes"
"crypto/cipher"
"crypto/rand"
"encoding/base64"
"errors"
"fmt"
"io"
Expand Down Expand Up @@ -245,10 +246,24 @@ func EncryptData(plainData []byte, key *memguard.Enclave) ([]byte, error) {
}
defer secretKey.Destroy()

block, err := aes.NewCipher(secretKey.Data())
// A base64 encode of a key of length 32 will be at maximum a length of 44 bytes
if len(secretKey.Bytes()) > 44 {
return nil, errors.New("Provided decoded base64 key is longer than 32 bytes. Decoded key " +
"length shall be 16 (AES-128), 24 (AES-192), or 32 (AES-256) bytes in length.")
}

decodedKey := make([]byte, 32) // Valid key can't be longer than 32 bytes
_, err = base64.StdEncoding.Decode(decodedKey, secretKey.Bytes())
if err != nil {
return nil, err
}
decodedKey = bytes.Trim(decodedKey, "\x00") // trim any null bytes if key is 16, or 24 bytes

block, err := aes.NewCipher(decodedKey)
if err != nil {
return nil, err
}
clear(decodedKey)

gcm, err := cipher.NewGCM(block)
if err != nil {
Expand Down Expand Up @@ -276,10 +291,24 @@ func DecryptData(cipherData []byte, key *memguard.Enclave) ([]byte, error) {
}
defer secretKey.Destroy()

block, err := aes.NewCipher(secretKey.Data())
// A base64 encode of a key of length 32 will be at maximum a length of 44 bytes
if len(secretKey.Bytes()) > 44 {
return nil, errors.New("Provided decoded base64 key is longer than 32 bytes. Decoded key " +
"length shall be 16 (AES-128), 24 (AES-192), or 32 (AES-256) bytes in length.")
}

decodedKey := make([]byte, 32) // Valid key can't be longer than 32 bytes
_, err = base64.StdEncoding.Decode(decodedKey, secretKey.Bytes())
if err != nil {
return nil, err
}
decodedKey = bytes.Trim(decodedKey, "\x00") // trim any null bytes if key is 16, or 24 bytes

block, err := aes.NewCipher(decodedKey)
if err != nil {
return nil, err
}
clear(decodedKey)

gcm, err := cipher.NewGCM(block)
if err != nil {
Expand Down
57 changes: 50 additions & 7 deletions common/util_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,7 @@ package common

import (
"crypto/rand"
"encoding/base64"
"fmt"
"os"
"path/filepath"
Expand Down Expand Up @@ -77,12 +78,14 @@ func (suite *typesTestSuite) TestDirectoryDoesNotExist() {
suite.assert.False(exists)
}

func (suite *typesTestSuite) TestEncryptBadKey() {
func (suite *typesTestSuite) TestEncryptBadKeyTooSmall() {
// Generate a random key
key := make([]byte, 20)
encodedKey := make([]byte, 28)
rand.Read(key)
base64.StdEncoding.Encode(encodedKey, key)

encryptedPassphrase := memguard.NewEnclave(key)
encryptedPassphrase := memguard.NewEnclave(encodedKey)

data := make([]byte, 1024)
rand.Read(data)
Expand All @@ -91,12 +94,46 @@ func (suite *typesTestSuite) TestEncryptBadKey() {
suite.assert.Error(err)
}

func (suite *typesTestSuite) TestDecryptBadKey() {
func (suite *typesTestSuite) TestDecryptBadKeyTooSmall() {
// Generate a random key
key := make([]byte, 20)
encodedKey := make([]byte, 28)
rand.Read(key)
base64.StdEncoding.Encode(encodedKey, key)

encryptedPassphrase := memguard.NewEnclave(key)
encryptedPassphrase := memguard.NewEnclave(encodedKey)

data := make([]byte, 1024)
rand.Read(data)

_, err := DecryptData(data, encryptedPassphrase)
suite.assert.Error(err)
}

func (suite *typesTestSuite) TestEncryptBadKeyTooLong() {
// Generate a random key
key := make([]byte, 36)
encodedKey := make([]byte, 48)
rand.Read(key)
base64.StdEncoding.Encode(encodedKey, key)

encryptedPassphrase := memguard.NewEnclave(encodedKey)

data := make([]byte, 1024)
rand.Read(data)

_, err := EncryptData(data, encryptedPassphrase)
suite.assert.Error(err)
}

func (suite *typesTestSuite) TestDecryptBadKeyTooLong() {
// Generate a random key
key := make([]byte, 36)
encodedKey := make([]byte, 48)
rand.Read(key)
base64.StdEncoding.Encode(encodedKey, key)

encryptedPassphrase := memguard.NewEnclave(encodedKey)

data := make([]byte, 1024)
rand.Read(data)
Expand All @@ -108,9 +145,11 @@ func (suite *typesTestSuite) TestDecryptBadKey() {
func (suite *typesTestSuite) TestEncryptDecrypt16() {
// Generate a random key
key := make([]byte, 16)
encodedKey := make([]byte, 24)
rand.Read(key)
base64.StdEncoding.Encode(encodedKey, key)

encryptedPassphrase := memguard.NewEnclave(key)
encryptedPassphrase := memguard.NewEnclave(encodedKey)

data := make([]byte, 1024)
rand.Read(data)
Expand All @@ -126,9 +165,11 @@ func (suite *typesTestSuite) TestEncryptDecrypt16() {
func (suite *typesTestSuite) TestEncryptDecrypt24() {
// Generate a random key
key := make([]byte, 24)
encodedKey := make([]byte, 32)
rand.Read(key)
base64.StdEncoding.Encode(encodedKey, key)

encryptedPassphrase := memguard.NewEnclave(key)
encryptedPassphrase := memguard.NewEnclave(encodedKey)

data := make([]byte, 1024)
rand.Read(data)
Expand All @@ -144,9 +185,11 @@ func (suite *typesTestSuite) TestEncryptDecrypt24() {
func (suite *typesTestSuite) TestEncryptDecrypt32() {
// Generate a random key
key := make([]byte, 32)
encodedKey := make([]byte, 44)
rand.Read(key)
base64.StdEncoding.Encode(encodedKey, key)

encryptedPassphrase := memguard.NewEnclave(key)
encryptedPassphrase := memguard.NewEnclave(encodedKey)

data := make([]byte, 1024)
rand.Read(data)
Expand Down
Loading