mirror of https://github.com/grafana/grafana.git
449 lines
15 KiB
Go
449 lines
15 KiB
Go
package manager
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"go.opentelemetry.io/otel/trace/noop"
|
|
"gopkg.in/ini.v1"
|
|
|
|
"github.com/grafana/grafana/pkg/infra/db"
|
|
"github.com/grafana/grafana/pkg/infra/usagestats"
|
|
"github.com/grafana/grafana/pkg/registry/apis/secret/contracts"
|
|
"github.com/grafana/grafana/pkg/registry/apis/secret/encryption"
|
|
"github.com/grafana/grafana/pkg/services/featuremgmt"
|
|
"github.com/grafana/grafana/pkg/services/sqlstore"
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
"github.com/grafana/grafana/pkg/storage/secret/database"
|
|
encryptionstorage "github.com/grafana/grafana/pkg/storage/secret/encryption"
|
|
"github.com/grafana/grafana/pkg/storage/secret/migrator"
|
|
"github.com/grafana/grafana/pkg/tests/testsuite"
|
|
"github.com/grafana/grafana/pkg/util"
|
|
)
|
|
|
|
func TestMain(m *testing.M) {
|
|
testsuite.Run(m)
|
|
}
|
|
|
|
func TestEncryptionService_EnvelopeEncryption(t *testing.T) {
|
|
svc := setupTestService(t)
|
|
ctx := context.Background()
|
|
namespace := "test-namespace"
|
|
|
|
t.Run("encrypting should create DEK", func(t *testing.T) {
|
|
plaintext := []byte("very secret string")
|
|
|
|
encrypted, err := svc.Encrypt(context.Background(), namespace, plaintext)
|
|
require.NoError(t, err)
|
|
|
|
decrypted, err := svc.Decrypt(context.Background(), namespace, encrypted)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, plaintext, decrypted)
|
|
|
|
keys, err := svc.store.GetAllDataKeys(ctx, namespace)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, len(keys), 1)
|
|
})
|
|
|
|
t.Run("encrypting another secret should use the same DEK", func(t *testing.T) {
|
|
plaintext := []byte("another very secret string")
|
|
|
|
encrypted, err := svc.Encrypt(context.Background(), namespace, plaintext)
|
|
require.NoError(t, err)
|
|
|
|
decrypted, err := svc.Decrypt(context.Background(), namespace, encrypted)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, plaintext, decrypted)
|
|
|
|
keys, err := svc.store.GetAllDataKeys(ctx, namespace)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, len(keys), 1)
|
|
})
|
|
|
|
t.Run("usage stats should be registered", func(t *testing.T) {
|
|
reports, err := svc.usageStats.GetUsageReport(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, 1, reports.Metrics["stats.secrets_manager.encryption.current_provider.secretKey.count"])
|
|
assert.Equal(t, 1, reports.Metrics["stats.secrets_manager.encryption.providers.secretKey.count"])
|
|
})
|
|
}
|
|
|
|
func TestEncryptionService_DataKeys(t *testing.T) {
|
|
// Initialize data key storage with a fake db
|
|
testDB := sqlstore.NewTestStore(t, sqlstore.WithMigrator(migrator.New()))
|
|
features := featuremgmt.WithFeatures(featuremgmt.FlagGrafanaAPIServerWithExperimentalAPIs, featuremgmt.FlagSecretsManagementAppPlatform)
|
|
tracer := noop.NewTracerProvider().Tracer("test")
|
|
store, err := encryptionstorage.ProvideDataKeyStorage(database.ProvideDatabase(testDB, tracer), tracer, features)
|
|
require.NoError(t, err)
|
|
|
|
ctx := context.Background()
|
|
namespace := "test-namespace"
|
|
|
|
dataKey := &contracts.SecretDataKey{
|
|
UID: util.GenerateShortUID(),
|
|
Label: "test1",
|
|
Active: true,
|
|
Provider: "test",
|
|
EncryptedData: []byte{0x62, 0xAF, 0xA1, 0x1A},
|
|
Namespace: namespace,
|
|
}
|
|
|
|
t.Run("querying for a DEK that does not exist", func(t *testing.T) {
|
|
res, err := store.GetDataKey(ctx, namespace, dataKey.UID)
|
|
assert.ErrorIs(t, contracts.ErrDataKeyNotFound, err)
|
|
assert.Nil(t, res)
|
|
})
|
|
|
|
t.Run("creating an active DEK", func(t *testing.T) {
|
|
err := store.CreateDataKey(ctx, dataKey)
|
|
require.NoError(t, err)
|
|
|
|
res, err := store.GetDataKey(ctx, namespace, dataKey.UID)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, dataKey.EncryptedData, res.EncryptedData)
|
|
assert.Equal(t, dataKey.Provider, res.Provider)
|
|
assert.Equal(t, dataKey.Label, res.Label)
|
|
assert.Equal(t, dataKey.UID, res.UID)
|
|
assert.True(t, dataKey.Active)
|
|
|
|
current, err := store.GetCurrentDataKey(ctx, namespace, dataKey.Label)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, dataKey.EncryptedData, current.EncryptedData)
|
|
assert.Equal(t, dataKey.Provider, current.Provider)
|
|
assert.Equal(t, dataKey.Label, current.Label)
|
|
assert.Equal(t, dataKey.UID, current.UID)
|
|
assert.True(t, current.Active)
|
|
})
|
|
|
|
t.Run("creating an inactive DEK", func(t *testing.T) {
|
|
k := &contracts.SecretDataKey{
|
|
UID: util.GenerateShortUID(),
|
|
Namespace: namespace,
|
|
Active: false,
|
|
Label: "test2",
|
|
Provider: "test",
|
|
EncryptedData: []byte{0x62, 0xAF, 0xA1, 0x1A},
|
|
}
|
|
|
|
err := store.CreateDataKey(ctx, k)
|
|
require.Error(t, err)
|
|
|
|
res, err := store.GetDataKey(ctx, namespace, k.UID)
|
|
assert.Equal(t, contracts.ErrDataKeyNotFound, err)
|
|
assert.Nil(t, res)
|
|
})
|
|
|
|
t.Run("deleting DEK when no id provided must fail", func(t *testing.T) {
|
|
beforeDelete, err := store.GetAllDataKeys(ctx, namespace)
|
|
require.NoError(t, err)
|
|
err = store.DeleteDataKey(ctx, namespace, "")
|
|
require.Error(t, err)
|
|
|
|
afterDelete, err := store.GetAllDataKeys(ctx, namespace)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, beforeDelete, afterDelete)
|
|
})
|
|
|
|
t.Run("deleting a DEK", func(t *testing.T) {
|
|
err := store.DeleteDataKey(ctx, namespace, dataKey.UID)
|
|
require.NoError(t, err)
|
|
|
|
res, err := store.GetDataKey(ctx, namespace, dataKey.UID)
|
|
assert.Equal(t, contracts.ErrDataKeyNotFound, err)
|
|
assert.Nil(t, res)
|
|
})
|
|
}
|
|
|
|
func TestEncryptionService_UseCurrentProvider(t *testing.T) {
|
|
t.Run("When encryption_provider is not specified explicitly, should use 'secretKey' as a current provider", func(t *testing.T) {
|
|
svc := setupTestService(t)
|
|
assert.Equal(t, encryption.ProviderID("secretKey.v1"), svc.currentProviderID)
|
|
})
|
|
|
|
t.Run("Should use encrypt/decrypt methods of the current encryption provider", func(t *testing.T) {
|
|
rawCfg := `
|
|
[secrets_manager.encryption.fakeProvider.v1]
|
|
`
|
|
|
|
raw, err := ini.Load([]byte(rawCfg))
|
|
require.NoError(t, err)
|
|
|
|
cfg := &setting.Cfg{
|
|
Raw: raw,
|
|
SecretsManagement: setting.SecretsManagerSettings{
|
|
SecretKey: "sdDkslslld",
|
|
EncryptionProvider: "secretKey.v1",
|
|
},
|
|
}
|
|
|
|
features := featuremgmt.WithFeatures(featuremgmt.FlagGrafanaAPIServerWithExperimentalAPIs, featuremgmt.FlagSecretsManagementAppPlatform)
|
|
testDB := sqlstore.NewTestStore(t, sqlstore.WithMigrator(migrator.New()))
|
|
tracer := noop.NewTracerProvider().Tracer("test")
|
|
encryptionStore, err := encryptionstorage.ProvideDataKeyStorage(database.ProvideDatabase(testDB, tracer), tracer, features)
|
|
require.NoError(t, err)
|
|
|
|
encMgr, err := ProvideEncryptionManager(
|
|
tracer,
|
|
encryptionStore,
|
|
cfg,
|
|
&usagestats.UsageStatsMock{T: t},
|
|
encryption.ProvideThirdPartyProviderMap(),
|
|
)
|
|
require.NoError(t, err)
|
|
|
|
encryptionManager := encMgr.(*EncryptionManager)
|
|
|
|
//override default provider with fake, and register the fake separately
|
|
fake := &fakeProvider{}
|
|
encryptionManager.providers[encryption.ProviderID("fakeProvider.v1")] = fake
|
|
encryptionManager.currentProviderID = "fakeProvider.v1"
|
|
|
|
namespace := "test-namespace"
|
|
encrypted, _ := encryptionManager.Encrypt(context.Background(), namespace, []byte{})
|
|
assert.True(t, fake.encryptCalled)
|
|
assert.False(t, fake.decryptCalled)
|
|
|
|
// encryption manager tries to find a DEK in a cache first before calling provider's decrypt
|
|
// to bypass the cache, we set up one more secrets service to test decrypting
|
|
svcDecryptMgr, err := ProvideEncryptionManager(
|
|
tracer,
|
|
encryptionStore,
|
|
cfg,
|
|
&usagestats.UsageStatsMock{T: t},
|
|
encryption.ProvideThirdPartyProviderMap(),
|
|
)
|
|
require.NoError(t, err)
|
|
|
|
svcDecrypt := svcDecryptMgr.(*EncryptionManager)
|
|
svcDecrypt.providers[encryption.ProviderID("fakeProvider.v1")] = fake
|
|
svcDecrypt.currentProviderID = "fakeProvider.v1"
|
|
|
|
_, _ = svcDecrypt.Decrypt(context.Background(), namespace, encrypted)
|
|
assert.True(t, fake.decryptCalled, "fake provider's decrypt should be called")
|
|
})
|
|
}
|
|
|
|
type fakeProvider struct {
|
|
encryptCalled bool
|
|
decryptCalled bool
|
|
}
|
|
|
|
func (p *fakeProvider) Encrypt(_ context.Context, _ []byte) ([]byte, error) {
|
|
p.encryptCalled = true
|
|
return []byte{}, nil
|
|
}
|
|
|
|
func (p *fakeProvider) Decrypt(_ context.Context, _ []byte) ([]byte, error) {
|
|
p.decryptCalled = true
|
|
return []byte{}, nil
|
|
}
|
|
|
|
func TestEncryptionService_Decrypt(t *testing.T) {
|
|
ctx := context.Background()
|
|
namespace := "test-namespace"
|
|
|
|
t.Run("empty payload should fail", func(t *testing.T) {
|
|
svc := setupTestService(t)
|
|
_, err := svc.Decrypt(context.Background(), namespace, []byte(""))
|
|
require.Error(t, err)
|
|
|
|
assert.Equal(t, "unable to decrypt empty payload", err.Error())
|
|
})
|
|
|
|
t.Run("ee encrypted payload with ee enabled should work", func(t *testing.T) {
|
|
svc := setupTestService(t)
|
|
ciphertext, err := svc.Encrypt(ctx, namespace, []byte("grafana"))
|
|
require.NoError(t, err)
|
|
|
|
plaintext, err := svc.Decrypt(ctx, namespace, ciphertext)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, []byte("grafana"), plaintext)
|
|
})
|
|
}
|
|
|
|
func TestIntegration_SecretsService(t *testing.T) {
|
|
if testing.Short() {
|
|
t.Skip("skipping integration test")
|
|
}
|
|
|
|
ctx := context.Background()
|
|
someData := []byte(`some-data`)
|
|
namespace := "test-namespace"
|
|
|
|
tcs := map[string]func(*testing.T, db.DB, contracts.EncryptionManager){
|
|
"regular": func(t *testing.T, _ db.DB, svc contracts.EncryptionManager) {
|
|
// We encrypt some data normally, no transactions implied.
|
|
_, err := svc.Encrypt(ctx, namespace, someData)
|
|
require.NoError(t, err)
|
|
},
|
|
"within successful InTransaction": func(t *testing.T, store db.DB, svc contracts.EncryptionManager) {
|
|
require.NoError(t, store.InTransaction(ctx, func(ctx context.Context) error {
|
|
// We encrypt some data within a transaction that shares the db session.
|
|
_, err := svc.Encrypt(ctx, namespace, someData)
|
|
require.NoError(t, err)
|
|
|
|
// And the transition succeeds.
|
|
return nil
|
|
}))
|
|
},
|
|
"within unsuccessful InTransaction": func(t *testing.T, store db.DB, svc contracts.EncryptionManager) {
|
|
require.NotNil(t, store.InTransaction(ctx, func(ctx context.Context) error {
|
|
// We encrypt some data within a transaction that shares the db session.
|
|
_, err := svc.Encrypt(ctx, namespace, someData)
|
|
require.NoError(t, err)
|
|
|
|
// But the transaction fails.
|
|
return errors.New("error")
|
|
}))
|
|
},
|
|
"within unsuccessful InTransaction (plus forced db fetch)": func(t *testing.T, store db.DB, svc contracts.EncryptionManager) {
|
|
require.NotNil(t, store.InTransaction(ctx, func(ctx context.Context) error {
|
|
// We encrypt some data within a transaction that shares the db session.
|
|
encrypted, err := svc.Encrypt(ctx, namespace, someData)
|
|
require.NoError(t, err)
|
|
|
|
// At this point the data key is not cached yet because
|
|
// the transaction haven't been committed yet,
|
|
// and won't, so we do a decrypt operation within the
|
|
// transaction to force the data key to be
|
|
// (potentially) cached (it shouldn't to prevent issues).
|
|
decrypted, err := svc.Decrypt(ctx, namespace, encrypted)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, someData, decrypted)
|
|
|
|
// But the transaction fails.
|
|
return errors.New("error")
|
|
}))
|
|
},
|
|
"within successful WithTransactionalDbSession": func(t *testing.T, store db.DB, svc contracts.EncryptionManager) {
|
|
require.NoError(t, store.WithTransactionalDbSession(ctx, func(sess *sqlstore.DBSession) error {
|
|
// We encrypt some data within a transaction that does not share the db session.
|
|
_, err := svc.Encrypt(ctx, namespace, someData)
|
|
require.NoError(t, err)
|
|
|
|
// And the transition succeeds.
|
|
return nil
|
|
}))
|
|
},
|
|
"within unsuccessful WithTransactionalDbSession": func(t *testing.T, store db.DB, svc contracts.EncryptionManager) {
|
|
require.NotNil(t, store.WithTransactionalDbSession(ctx, func(sess *sqlstore.DBSession) error {
|
|
// We encrypt some data within a transaction that does not share the db session.
|
|
_, err := svc.Encrypt(ctx, namespace, someData)
|
|
require.NoError(t, err)
|
|
|
|
// But the transaction fails.
|
|
return errors.New("error")
|
|
}))
|
|
},
|
|
"within unsuccessful WithTransactionalDbSession (plus forced db fetch)": func(t *testing.T, store db.DB, svc contracts.EncryptionManager) {
|
|
require.NotNil(t, store.WithTransactionalDbSession(ctx, func(sess *sqlstore.DBSession) error {
|
|
// We encrypt some data within a transaction that does not share the db session.
|
|
encrypted, err := svc.Encrypt(ctx, namespace, someData)
|
|
require.NoError(t, err)
|
|
|
|
// At this point the data key is not cached yet because
|
|
// the transaction haven't been committed yet,
|
|
// and won't, so we do a decrypt operation within the
|
|
// transaction to force the data key to be
|
|
// (potentially) cached (it shouldn't to prevent issues).
|
|
decrypted, err := svc.Decrypt(ctx, namespace, encrypted)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, someData, decrypted)
|
|
|
|
// But the transaction fails.
|
|
return errors.New("error")
|
|
}))
|
|
},
|
|
}
|
|
|
|
for name, tc := range tcs {
|
|
t.Run(name, func(t *testing.T) {
|
|
testDB := sqlstore.NewTestStore(t, sqlstore.WithMigrator(migrator.New()))
|
|
tracer := noop.NewTracerProvider().Tracer("test")
|
|
|
|
features := featuremgmt.WithFeatures(featuremgmt.FlagGrafanaAPIServerWithExperimentalAPIs, featuremgmt.FlagSecretsManagementAppPlatform)
|
|
defaultKey := "SdlklWklckeLS"
|
|
|
|
cfg := &setting.Cfg{
|
|
SecretsManagement: setting.SecretsManagerSettings{
|
|
SecretKey: defaultKey,
|
|
EncryptionProvider: "secretKey.v1",
|
|
},
|
|
}
|
|
store, err := encryptionstorage.ProvideDataKeyStorage(database.ProvideDatabase(testDB, tracer), tracer, features)
|
|
require.NoError(t, err)
|
|
|
|
usageStats := &usagestats.UsageStatsMock{T: t}
|
|
|
|
svc, err := ProvideEncryptionManager(
|
|
tracer,
|
|
store,
|
|
cfg,
|
|
usageStats,
|
|
encryption.ProvideThirdPartyProviderMap(),
|
|
)
|
|
require.NoError(t, err)
|
|
|
|
ctx := context.Background()
|
|
namespace := "test-namespace"
|
|
|
|
// Here's what actually matters and varies on each test: look at the test case name.
|
|
//
|
|
// For historical reasons, and in an old implementation, when a successful encryption
|
|
// operation happened within an unsuccessful transaction, the data key was used to be
|
|
// cached in memory for the next encryption operations, which caused some data to be
|
|
// encrypted with a data key that haven't actually been persisted into the database.
|
|
tc(t, testDB, svc)
|
|
// Therefore, the data encrypted after this point, become unrecoverable after a restart.
|
|
// So, the different test cases here are there to prevent that from happening again
|
|
// in the future, whatever it is what happens.
|
|
|
|
// So, we proceed with an encryption operation:
|
|
toEncrypt := []byte(`data-to-encrypt`)
|
|
encrypted, err := svc.Encrypt(ctx, namespace, toEncrypt)
|
|
require.NoError(t, err)
|
|
|
|
// And then, we MUST still be able to decrypt the previously encrypted data:
|
|
decrypted, err := svc.Decrypt(ctx, namespace, encrypted)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, toEncrypt, decrypted)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestEncryptionService_ReInitReturnsError(t *testing.T) {
|
|
svc := setupTestService(t)
|
|
err := svc.InitProviders(encryption.ProviderMap{
|
|
"fakeProvider.v1": &fakeProvider{},
|
|
})
|
|
require.Error(t, err)
|
|
}
|
|
|
|
func TestEncryptionService_ThirdPartyProviders(t *testing.T) {
|
|
cfg := &setting.Cfg{
|
|
SecretsManagement: setting.SecretsManagerSettings{
|
|
SecretKey: "SdlklWklckeLS",
|
|
EncryptionProvider: "secretKey.v1",
|
|
},
|
|
}
|
|
|
|
svc, err := ProvideEncryptionManager(
|
|
nil,
|
|
nil,
|
|
cfg,
|
|
&usagestats.UsageStatsMock{},
|
|
encryption.ProviderMap{
|
|
"fakeProvider.v1": &fakeProvider{},
|
|
},
|
|
)
|
|
require.NoError(t, err)
|
|
|
|
encMgr := svc.(*EncryptionManager)
|
|
require.Len(t, encMgr.providers, 2)
|
|
require.Contains(t, encMgr.providers, encryption.ProviderID("fakeProvider.v1"))
|
|
}
|