You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
ansible/test/units/utils/test_encrypt.py

252 lines
8.8 KiB
Python

# (c) 2018, Matthias Fuchs <matthias.s.fuchs@gmail.com>
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
import warnings
import pytest
from ansible.errors import AnsibleError
from ansible.plugins.filter.core import get_encrypted_password
from ansible.utils import encrypt
def assert_hash(expected, secret, algorithm, **settings):
if isinstance(expected, tuple):
expected_crypt, expected_passlib = expected
else:
expected_crypt = expected_passlib = expected
if encrypt.HAS_CRYPT and algorithm in encrypt.CryptHash.algorithms:
assert encrypt.CryptHash(algorithm).hash(secret, **settings) == expected_crypt
if encrypt.PASSLIB_AVAILABLE:
assert encrypt.PasslibHash(algorithm).hash(secret, **settings) == expected_passlib
@pytest.mark.parametrize(
("algorithm", "ident", "salt", "rounds", "expected"),
[
pytest.param(
"bcrypt",
None,
"1234567890123456789012",
None,
(
"$2b$12$KRGxLBS0Lxe3KBCwKxOzLe6odk8yM9lJBgNtLuDQxUkLDkpGI6twK",
"$2b$12$123456789012345678901ugbM1PeTfRQ0t6dCJu5lQA8hwrZOYgDu",
),
id="bcrypt_default",
),
pytest.param(
"bcrypt",
"2",
"1234567890123456789012",
None,
"$2$12$123456789012345678901ufd3hZRrev.WXCbemqGIV/gmWaTGLImm",
id="bcrypt_ident_2",
marks=pytest.mark.xfail(reason="crypt_gensalt rejects old bcrypt ident '2', unlike passlib"),
),
pytest.param(
"bcrypt",
"2y",
"1234567890123456789012",
None,
(
"$2y$12$KRGxLBS0Lxe3KBCwKxOzLe6odk8yM9lJBgNtLuDQxUkLDkpGI6twK",
"$2y$12$123456789012345678901ugbM1PeTfRQ0t6dCJu5lQA8hwrZOYgDu",
),
id="bcrypt_ident_2y",
),
pytest.param(
"bcrypt",
"2a",
"1234567890123456789012",
None,
(
"$2a$12$KRGxLBS0Lxe3KBCwKxOzLe6odk8yM9lJBgNtLuDQxUkLDkpGI6twK",
"$2a$12$123456789012345678901ugbM1PeTfRQ0t6dCJu5lQA8hwrZOYgDu",
),
id="bcrypt_ident_2a",
),
pytest.param(
"bcrypt",
"2b",
"1234567890123456789012",
None,
(
"$2b$12$KRGxLBS0Lxe3KBCwKxOzLe6odk8yM9lJBgNtLuDQxUkLDkpGI6twK",
"$2b$12$123456789012345678901ugbM1PeTfRQ0t6dCJu5lQA8hwrZOYgDu",
),
id="bcrypt_ident_2b",
),
pytest.param(
"sha256_crypt",
"invalid_ident",
"12345678",
5000,
"$5$l6nAoIXB$HtZrcvuIcvGwySXwnxGHuwyIha2FvzAt4QebHp43Wq4",
id="sha256_crypt_invalid_ident",
marks=pytest.mark.xfail(reason="crypt_gensalt rejects invalid idents, unlike passlib"),
),
pytest.param(
"crypt16",
None,
"12",
None,
"12pELHK2ME3McUFlHxel6uMM",
id="crypt16_no_ident",
),
],
)
@pytest.mark.skipif(not encrypt.PASSLIB_AVAILABLE, reason='passlib must be installed to run this test')
def test_encrypt_with_ident(algorithm, ident, salt, rounds, expected):
assert_hash(expected, secret="123", algorithm=algorithm, salt=salt, rounds=rounds, ident=ident)
@pytest.mark.parametrize(
("algorithm", "rounds", "expected"),
[
pytest.param(
"sha256_crypt",
None,
(
"$5$rounds=535000$l6nAoIXB$A2HBLoxGx60mfezwjZ6VFd9vI1.V4oKpd.iwYU4n776",
"$5$rounds=535000$12345678$uy3TurUPaY71aioJi58HvUY8jkbhSQU8HepbyaNngv.",
),
id="sha256_crypt_default_rounds",
),
pytest.param(
"sha256_crypt",
5000,
("$5$l6nAoIXB$HtZrcvuIcvGwySXwnxGHuwyIha2FvzAt4QebHp43Wq4", "$5$12345678$uAZsE3BenI2G.nA8DpTl.9Dc8JiqacI53pEqRr5ppT7"),
id="sha256_crypt_rounds_5000",
),
pytest.param(
"sha256_crypt",
10000,
(
"$5$rounds=10000$l6nAoIXB$//KYvMXLmzwUUYyWJmAJAeZuP7rsroMayX9hUhpwRC.",
"$5$rounds=10000$12345678$JBinliYMFEcBeAXKZnLjenhgEhTmJBvZn3aR8l70Oy/",
),
id="sha256_crypt_rounds_10000",
),
pytest.param(
"sha512_crypt",
None,
(
"$6$rounds=656000$l6nAoIXB$wDP2gGfore3TlBdPvi0wqot7zj8oodeHnEPerC1blJBRGEodsNewNfzxM5nYdfPMkvCh5Af/w82wvG2U3PpCT0",
"$6$rounds=656000$12345678$InMy49UwxyCh2pGJU1NpOhVSElDDzKeyuC6n6E9O34BCUGVNYADnI.rcA3m.Vro9BiZpYmjEoNhpREqQcbvQ80",
),
id="sha512_crypt_default_rounds",
),
pytest.param(
"sha512_crypt",
5000,
(
"$6$l6nAoIXB$Zva3RkTY95C0FM0fV9WhLyrQO7/jMt1sICo8bQZvpbRIhDYcgiNdL7IzdlGxG6j6CdkWdqeAk4/W49qkAuv/h/",
"$6$12345678$LcV9LQiaPekQxZ.OfkMADjFdSO2k9zfbDQrHPVcYjSLqSdjLYpsgqviYvTEP/R41yPmhH3CCeEDqVhW1VHr3L.",
),
id="sha512_crypt_rounds_5000",
),
pytest.param(
"md5_crypt",
None,
("$1$l6nAoIXB$FCE6sRsviKJtqJWkAK6ff0", "$1$12345678$tRy4cXc3kmcfRZVj4iFXr/"),
id="md5_crypt_default_rounds",
),
],
)
@pytest.mark.skipif(not encrypt.PASSLIB_AVAILABLE, reason='passlib must be installed to run this test')
def test_encrypt_with_rounds(algorithm, rounds, expected):
assert_hash(expected, secret="123", algorithm=algorithm, salt="12345678", rounds=rounds)
@pytest.mark.skipif(not encrypt.PASSLIB_AVAILABLE, reason='passlib must be installed to run this test')
def test_password_hash_filter_passlib_with_exception():
with pytest.raises(AnsibleError):
get_encrypted_password("123", "sha257", salt="12345678")
@pytest.mark.parametrize(
("algorithm", "rounds", "expected_hash"),
[
pytest.param(
"sha256",
None,
"$5$rounds=535000$l6nAoIXB$A2HBLoxGx60mfezwjZ6VFd9vI1.V4oKpd.iwYU4n776",
id="sha256_default_rounds",
),
pytest.param(
"sha256",
5000,
"$5$l6nAoIXB$HtZrcvuIcvGwySXwnxGHuwyIha2FvzAt4QebHp43Wq4",
id="sha256_rounds_5000",
),
pytest.param(
"sha256",
10000,
"$5$rounds=10000$l6nAoIXB$//KYvMXLmzwUUYyWJmAJAeZuP7rsroMayX9hUhpwRC.",
id="sha256_rounds_10000",
),
pytest.param(
"sha512",
5000,
"$6$l6nAoIXB$Zva3RkTY95C0FM0fV9WhLyrQO7/jMt1sICo8bQZvpbRIhDYcgiNdL7IzdlGxG6j6CdkWdqeAk4/W49qkAuv/h/",
id="sha512_rounds_5000",
),
pytest.param(
"sha512",
6000,
"$6$rounds=6000$l6nAoIXB$DMD7Me00a9FHa5hF22mKek6.Hf7dD6UvJBuRLKus7K//G2kRwcKx5pkp5vGDk5E/MEQgR0yaEsv6ooq3iGRqp/",
id="sha512_rounds_6000",
),
],
)
@pytest.mark.skipif(not encrypt.PASSLIB_AVAILABLE, reason='passlib must be installed to run this test')
def test_password_hash_filter_passlib(algorithm, rounds, expected_hash):
assert get_encrypted_password("123", algorithm, salt="12345678", rounds=rounds) == expected_hash
@pytest.mark.skipif(not encrypt.PASSLIB_AVAILABLE, reason='passlib must be installed to run this test')
def test_do_encrypt_passlib_with_exception():
with pytest.raises(AnsibleError):
encrypt.do_encrypt("123", "sha257_crypt", salt="12345678")
def test_random_salt():
res = encrypt.random_salt()
expected_salt_candidate_chars = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789./'
assert len(res) == 8
for res_char in res:
assert res_char in expected_salt_candidate_chars
def test_passlib_bcrypt_salt(recwarn):
# deprecated: description='warning suppression only required for Python 3.12 and earlier' python_version='3.12'
with warnings.catch_warnings():
warnings.filterwarnings('ignore', message="'crypt' is deprecated and slated for removal in Python 3.13", category=DeprecationWarning)
passlib_exc = pytest.importorskip("passlib.exc")
secret = 'foo'
salt = '1234567890123456789012'
repaired_salt = '123456789012345678901u'
expected = '$2b$12$123456789012345678901uMv44x.2qmQeefEGb3bcIRc1mLuO7bqa'
ident = '2b'
passlib_obj = encrypt.PasslibHash('bcrypt')
result = passlib_obj.hash(secret, salt=salt, ident=ident)
passlib_warnings = [w.message for w in recwarn if isinstance(w.message, passlib_exc.PasslibHashWarning)]
assert len(passlib_warnings) == 0
assert result == expected
recwarn.clear()
result = passlib_obj.hash(secret, salt=repaired_salt, ident=ident)
assert result == expected