You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
ansible/test/units/utils/test_encrypt.py

312 lines
12 KiB
Python

# (c) 2018, Matthias Fuchs <matthias.s.fuchs@gmail.com>
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
import warnings
import pytest
from pytest_mock import MockerFixture
from ansible.errors import AnsibleError
from ansible.plugins.filter.core import get_encrypted_password
from ansible.utils import encrypt
def assert_hash(expected, secret, algorithm, **settings):
if isinstance(expected, tuple):
expected_crypt, expected_passlib = expected
else:
expected_crypt = expected_passlib = expected
if encrypt.HAS_CRYPT and algorithm in encrypt.CryptHash.algorithms:
assert encrypt.CryptHash(algorithm).hash(secret, **settings) == expected_crypt
if encrypt.PASSLIB_AVAILABLE:
assert encrypt.PasslibHash(algorithm).hash(secret, **settings) == expected_passlib
@pytest.mark.parametrize(
("algorithm", "ident", "salt", "rounds", "expected"),
[
pytest.param(
"bcrypt",
None,
"1234567890123456789012",
None,
(
"$2b$12$KRGxLBS0Lxe3KBCwKxOzLe6odk8yM9lJBgNtLuDQxUkLDkpGI6twK",
"$2b$12$123456789012345678901ugbM1PeTfRQ0t6dCJu5lQA8hwrZOYgDu",
),
id="bcrypt_default",
),
pytest.param(
"bcrypt",
"2",
"1234567890123456789012",
None,
"$2$12$123456789012345678901ufd3hZRrev.WXCbemqGIV/gmWaTGLImm",
id="bcrypt_ident_2",
marks=pytest.mark.xfail(reason="crypt_gensalt rejects old bcrypt ident '2', unlike passlib"),
),
pytest.param(
"bcrypt",
"2y",
"1234567890123456789012",
None,
(
"$2y$12$KRGxLBS0Lxe3KBCwKxOzLe6odk8yM9lJBgNtLuDQxUkLDkpGI6twK",
"$2y$12$123456789012345678901ugbM1PeTfRQ0t6dCJu5lQA8hwrZOYgDu",
),
id="bcrypt_ident_2y",
),
pytest.param(
"bcrypt",
"2a",
"1234567890123456789012",
None,
(
"$2a$12$KRGxLBS0Lxe3KBCwKxOzLe6odk8yM9lJBgNtLuDQxUkLDkpGI6twK",
"$2a$12$123456789012345678901ugbM1PeTfRQ0t6dCJu5lQA8hwrZOYgDu",
),
id="bcrypt_ident_2a",
),
pytest.param(
"bcrypt",
"2b",
"1234567890123456789012",
None,
(
"$2b$12$KRGxLBS0Lxe3KBCwKxOzLe6odk8yM9lJBgNtLuDQxUkLDkpGI6twK",
"$2b$12$123456789012345678901ugbM1PeTfRQ0t6dCJu5lQA8hwrZOYgDu",
),
id="bcrypt_ident_2b",
),
pytest.param(
"sha256_crypt",
"invalid_ident",
"12345678",
5000,
"$5$l6nAoIXB$HtZrcvuIcvGwySXwnxGHuwyIha2FvzAt4QebHp43Wq4",
id="sha256_crypt_invalid_ident",
marks=pytest.mark.xfail(reason="crypt_gensalt rejects invalid idents, unlike passlib"),
),
pytest.param(
"crypt16",
None,
"12",
None,
"12pELHK2ME3McUFlHxel6uMM",
id="crypt16_no_ident",
),
],
)
@pytest.mark.skipif(not encrypt.PASSLIB_AVAILABLE, reason='passlib must be installed to run this test')
def test_encrypt_with_ident(algorithm, ident, salt, rounds, expected):
assert_hash(expected, secret="123", algorithm=algorithm, salt=salt, rounds=rounds, ident=ident)
@pytest.mark.parametrize(
("algorithm", "rounds", "expected"),
[
pytest.param(
"sha256_crypt",
None,
(
"$5$rounds=535000$l6nAoIXB$A2HBLoxGx60mfezwjZ6VFd9vI1.V4oKpd.iwYU4n776",
"$5$rounds=535000$12345678$uy3TurUPaY71aioJi58HvUY8jkbhSQU8HepbyaNngv.",
),
id="sha256_crypt_default_rounds",
),
pytest.param(
"sha256_crypt",
5000,
("$5$l6nAoIXB$HtZrcvuIcvGwySXwnxGHuwyIha2FvzAt4QebHp43Wq4", "$5$12345678$uAZsE3BenI2G.nA8DpTl.9Dc8JiqacI53pEqRr5ppT7"),
id="sha256_crypt_rounds_5000",
),
pytest.param(
"sha256_crypt",
10000,
(
"$5$rounds=10000$l6nAoIXB$//KYvMXLmzwUUYyWJmAJAeZuP7rsroMayX9hUhpwRC.",
"$5$rounds=10000$12345678$JBinliYMFEcBeAXKZnLjenhgEhTmJBvZn3aR8l70Oy/",
),
id="sha256_crypt_rounds_10000",
),
pytest.param(
"sha512_crypt",
None,
(
"$6$rounds=656000$l6nAoIXB$wDP2gGfore3TlBdPvi0wqot7zj8oodeHnEPerC1blJBRGEodsNewNfzxM5nYdfPMkvCh5Af/w82wvG2U3PpCT0",
"$6$rounds=656000$12345678$InMy49UwxyCh2pGJU1NpOhVSElDDzKeyuC6n6E9O34BCUGVNYADnI.rcA3m.Vro9BiZpYmjEoNhpREqQcbvQ80",
),
id="sha512_crypt_default_rounds",
),
pytest.param(
"sha512_crypt",
5000,
(
"$6$l6nAoIXB$Zva3RkTY95C0FM0fV9WhLyrQO7/jMt1sICo8bQZvpbRIhDYcgiNdL7IzdlGxG6j6CdkWdqeAk4/W49qkAuv/h/",
"$6$12345678$LcV9LQiaPekQxZ.OfkMADjFdSO2k9zfbDQrHPVcYjSLqSdjLYpsgqviYvTEP/R41yPmhH3CCeEDqVhW1VHr3L.",
),
id="sha512_crypt_rounds_5000",
),
pytest.param(
"md5_crypt",
None,
("$1$l6nAoIXB$FCE6sRsviKJtqJWkAK6ff0", "$1$12345678$tRy4cXc3kmcfRZVj4iFXr/"),
id="md5_crypt_default_rounds",
),
],
)
@pytest.mark.skipif(not encrypt.PASSLIB_AVAILABLE, reason='passlib must be installed to run this test')
def test_encrypt_with_rounds(algorithm, rounds, expected):
assert_hash(expected, secret="123", algorithm=algorithm, salt="12345678", rounds=rounds)
@pytest.mark.skipif(not encrypt.PASSLIB_AVAILABLE, reason='passlib must be installed to run this test')
def test_password_hash_filter_passlib_with_exception():
with pytest.raises(AnsibleError):
get_encrypted_password("123", "sha257", salt="12345678")
@pytest.mark.parametrize(
("algorithm", "rounds", "expected_hash"),
[
pytest.param(
"sha256",
None,
"$5$rounds=535000$l6nAoIXB$A2HBLoxGx60mfezwjZ6VFd9vI1.V4oKpd.iwYU4n776",
id="sha256_default_rounds",
),
pytest.param(
"sha256",
5000,
"$5$l6nAoIXB$HtZrcvuIcvGwySXwnxGHuwyIha2FvzAt4QebHp43Wq4",
id="sha256_rounds_5000",
),
pytest.param(
"sha256",
10000,
"$5$rounds=10000$l6nAoIXB$//KYvMXLmzwUUYyWJmAJAeZuP7rsroMayX9hUhpwRC.",
id="sha256_rounds_10000",
),
pytest.param(
"sha512",
5000,
"$6$l6nAoIXB$Zva3RkTY95C0FM0fV9WhLyrQO7/jMt1sICo8bQZvpbRIhDYcgiNdL7IzdlGxG6j6CdkWdqeAk4/W49qkAuv/h/",
id="sha512_rounds_5000",
),
pytest.param(
"sha512",
6000,
"$6$rounds=6000$l6nAoIXB$DMD7Me00a9FHa5hF22mKek6.Hf7dD6UvJBuRLKus7K//G2kRwcKx5pkp5vGDk5E/MEQgR0yaEsv6ooq3iGRqp/",
id="sha512_rounds_6000",
),
],
)
@pytest.mark.skipif(not encrypt.PASSLIB_AVAILABLE, reason='passlib must be installed to run this test')
def test_password_hash_filter_passlib(algorithm, rounds, expected_hash):
assert get_encrypted_password("123", algorithm, salt="12345678", rounds=rounds) == expected_hash
@pytest.mark.skipif(not encrypt.PASSLIB_AVAILABLE, reason='passlib must be installed to run this test')
def test_do_encrypt_passlib_with_exception():
with pytest.raises(AnsibleError):
encrypt.do_encrypt("123", "sha257_crypt", salt="12345678")
def test_random_salt():
res = encrypt.random_salt()
expected_salt_candidate_chars = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789./'
assert len(res) == 8
for res_char in res:
assert res_char in expected_salt_candidate_chars
def test_passlib_bcrypt_salt(recwarn):
# deprecated: description='warning suppression only required for Python 3.12 and earlier' python_version='3.12'
with warnings.catch_warnings():
warnings.filterwarnings('ignore', message="'crypt' is deprecated and slated for removal in Python 3.13", category=DeprecationWarning)
passlib_exc = pytest.importorskip("passlib.exc")
secret = 'foo'
salt = '1234567890123456789012'
repaired_salt = '123456789012345678901u'
expected = '$2b$12$123456789012345678901uMv44x.2qmQeefEGb3bcIRc1mLuO7bqa'
ident = '2b'
passlib_obj = encrypt.PasslibHash('bcrypt')
result = passlib_obj.hash(secret, salt=salt, ident=ident)
passlib_warnings = [w.message for w in recwarn if isinstance(w.message, passlib_exc.PasslibHashWarning)]
assert len(passlib_warnings) == 0
assert result == expected
recwarn.clear()
result = passlib_obj.hash(secret, salt=repaired_salt, ident=ident)
assert result == expected
def test_do_encrypt_no_lib(mocker: MockerFixture) -> None:
"""Test AnsibleError is raised when no encryption library is installed."""
mocker.patch('ansible.utils.encrypt.HAS_CRYPT', False)
mocker.patch('ansible.utils.encrypt.PASSLIB_AVAILABLE', False)
with pytest.raises(AnsibleError, match=r"Unable to encrypt nor hash, either libxcrypt \(recommended\), crypt, or passlib must be installed\."):
encrypt.do_encrypt("123", "sha256_crypt", salt="12345678")
class TestCryptHash:
"""
Tests for the CryptHash class.
These tests are hitting code paths that are otherwise impossible to reach
through integration tests, but necessary for more complete code coverage.
"""
def test_invalid_instantiation(self, mocker: MockerFixture) -> None:
"""Should not be able to instantiate a CryptHash class without libxcrypt/libcrypt."""
mocker.patch('ansible.utils.encrypt.HAS_CRYPT', False)
with pytest.raises(AnsibleError, match=r"crypt cannot be used as the 'libxcrypt' library is not installed or is unusable\."):
encrypt.CryptHash("sha256_crypt")
def test_ansible_unsupported_algorithm(self) -> None:
"""Test AnsibleError is raised when Ansible does not support requested algorithm."""
with pytest.raises(AnsibleError, match=r"crypt does not support 'foo' algorithm"):
encrypt.CryptHash("foo")
def test_library_unsupported_algorithm(self, mocker: MockerFixture) -> None:
"""Test AnsibleError is raised when crypt library does not support an Ansible supported algorithm."""
# Pretend we have a crypt lib that doesn't like our algo
mocker.patch('ansible.utils.encrypt.HAS_CRYPT', True)
mocker.patch('ansible._internal._encryption._crypt.crypt', side_effect=ValueError)
# instantiate with an Ansible supported algo
crypt_hash = encrypt.CryptHash("sha256_crypt")
with pytest.raises(AnsibleError, match=r"crypt does not support 'sha256_crypt' algorithm"):
crypt_hash.hash("123", salt="12345678")
class TestPasslibHash:
"""
Tests for the PasslibHash class.
These tests are hitting code paths that are otherwise impossible to reach
through integration tests, but necessary for more complete code coverage.
"""
def test_invalid_instantiation(self, mocker: MockerFixture) -> None:
"""Should not be able to instantiate a PasslibHash class without passlib."""
mocker.patch('ansible.utils.encrypt.PASSLIB_AVAILABLE', False)
with pytest.raises(AnsibleError, match=r"The passlib Python package must be installed to hash with the 'sha256_crypt' algorithm\."):
encrypt.PasslibHash("sha256_crypt")