2017-07-09 08:06:36 -04:00
|
|
|
# frozen_string_literal: true
|
2017-07-10 09:39:13 -04:00
|
|
|
|
2018-09-29 20:50:43 -04:00
|
|
|
require_relative "abstract_unit"
|
2016-08-06 12:03:25 -04:00
|
|
|
require "openssl"
|
|
|
|
require "active_support/time"
|
|
|
|
require "active_support/json"
|
2017-07-06 11:23:22 -04:00
|
|
|
require_relative "metadata/shared_metadata_tests"
|
2008-11-25 14:27:54 -05:00
|
|
|
|
2011-09-15 15:51:30 -04:00
|
|
|
class MessageEncryptorTest < ActiveSupport::TestCase
|
2011-09-15 13:15:21 -04:00
|
|
|
class JSONSerializer
|
|
|
|
def dump(value)
|
|
|
|
ActiveSupport::JSON.encode(value)
|
|
|
|
end
|
2011-11-09 16:48:56 -05:00
|
|
|
|
2011-09-15 13:15:21 -04:00
|
|
|
def load(value)
|
|
|
|
ActiveSupport::JSON.decode(value)
|
|
|
|
end
|
|
|
|
end
|
2011-11-09 16:48:56 -05:00
|
|
|
|
2008-11-25 14:27:54 -05:00
|
|
|
def setup
|
2016-05-29 14:07:22 -04:00
|
|
|
@secret = SecureRandom.random_bytes(32)
|
2016-08-06 13:38:33 -04:00
|
|
|
@verifier = ActiveSupport::MessageVerifier.new(@secret, serializer: ActiveSupport::MessageEncryptor::NullSerializer)
|
2011-11-09 16:48:56 -05:00
|
|
|
@encryptor = ActiveSupport::MessageEncryptor.new(@secret)
|
2016-08-06 13:38:33 -04:00
|
|
|
@data = { some: "data", now: Time.local(2010) }
|
2008-11-25 14:27:54 -05:00
|
|
|
end
|
2010-08-14 01:13:00 -04:00
|
|
|
|
2008-11-25 14:27:54 -05:00
|
|
|
def test_encrypting_twice_yields_differing_cipher_text
|
2013-01-09 16:32:35 -05:00
|
|
|
first_message = @encryptor.encrypt_and_sign(@data).split("--").first
|
2011-11-09 16:48:56 -05:00
|
|
|
second_message = @encryptor.encrypt_and_sign(@data).split("--").first
|
2013-01-09 16:32:35 -05:00
|
|
|
assert_not_equal first_message, second_message
|
2008-11-25 14:27:54 -05:00
|
|
|
end
|
2010-08-14 01:13:00 -04:00
|
|
|
|
2011-11-09 16:48:56 -05:00
|
|
|
def test_messing_with_either_encrypted_values_causes_failure
|
|
|
|
text, iv = @verifier.verify(@encryptor.encrypt_and_sign(@data)).split("--")
|
2008-11-25 14:27:54 -05:00
|
|
|
assert_not_decrypted([iv, text] * "--")
|
|
|
|
assert_not_decrypted([text, munge(iv)] * "--")
|
|
|
|
assert_not_decrypted([munge(text), iv] * "--")
|
|
|
|
assert_not_decrypted([munge(text), munge(iv)] * "--")
|
|
|
|
end
|
2010-08-14 01:13:00 -04:00
|
|
|
|
2011-11-09 16:48:56 -05:00
|
|
|
def test_messing_with_verified_values_causes_failures
|
|
|
|
text, iv = @encryptor.encrypt_and_sign(@data).split("--")
|
|
|
|
assert_not_verified([iv, text] * "--")
|
|
|
|
assert_not_verified([text, munge(iv)] * "--")
|
|
|
|
assert_not_verified([munge(text), iv] * "--")
|
|
|
|
assert_not_verified([munge(text), munge(iv)] * "--")
|
|
|
|
end
|
|
|
|
|
2008-11-25 14:27:54 -05:00
|
|
|
def test_signed_round_tripping
|
|
|
|
message = @encryptor.encrypt_and_sign(@data)
|
|
|
|
assert_equal @data, @encryptor.decrypt_and_verify(message)
|
|
|
|
end
|
2011-11-09 16:48:56 -05:00
|
|
|
|
2016-07-09 07:03:43 -04:00
|
|
|
def test_backwards_compat_for_64_bytes_key
|
|
|
|
# 64 bit key
|
2016-07-09 18:51:56 -04:00
|
|
|
secret = ["3942b1bf81e622559ed509e3ff274a780784fe9e75b065866bd270438c74da822219de3156473cc27df1fd590e4baf68c95eeb537b6e4d4c5a10f41635b5597e"].pack("H*")
|
2016-07-09 07:03:43 -04:00
|
|
|
# Encryptor with 32 bit key, 64 bit secret for verifier
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(secret[0..31], secret)
|
|
|
|
# Message generated with 64 bit key
|
|
|
|
message = "eHdGeExnZEwvMSt3U3dKaFl1WFo0TjVvYzA0eGpjbm5WSkt5MXlsNzhpZ0ZnbWhBWFlQZTRwaXE1bVJCS2oxMDZhYVp2dVN3V0lNZUlWQ3c2eVhQbnhnVjFmeVVubmhRKzF3WnZyWHVNMDg9LS1HSisyakJVSFlPb05ISzRMaXRzcFdBPT0=--831a1d54a3cda8a0658dc668a03dedcbce13b5ca"
|
2016-07-09 18:51:56 -04:00
|
|
|
assert_equal "data", encryptor.decrypt_and_verify(message)[:some]
|
2016-07-09 07:03:43 -04:00
|
|
|
end
|
|
|
|
|
2011-09-15 08:28:53 -04:00
|
|
|
def test_alternative_serialization_method
|
2013-05-03 18:37:18 -04:00
|
|
|
prev = ActiveSupport.use_standard_json_time_format
|
|
|
|
ActiveSupport.use_standard_json_time_format = true
|
2016-08-06 13:38:33 -04:00
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(SecureRandom.random_bytes(32), SecureRandom.random_bytes(128), serializer: JSONSerializer.new)
|
2019-09-03 19:49:36 -04:00
|
|
|
message = encryptor.encrypt_and_sign({ :foo => 123, "bar" => Time.utc(2010) })
|
2013-11-07 10:35:49 -05:00
|
|
|
exp = { "foo" => 123, "bar" => "2010-01-01T00:00:00.000Z" }
|
2013-05-03 18:37:18 -04:00
|
|
|
assert_equal exp, encryptor.decrypt_and_verify(message)
|
|
|
|
ensure
|
|
|
|
ActiveSupport.use_standard_json_time_format = prev
|
2011-09-15 08:28:53 -04:00
|
|
|
end
|
2010-08-14 01:13:00 -04:00
|
|
|
|
2013-05-15 10:11:04 -04:00
|
|
|
def test_message_obeys_strict_encoding
|
|
|
|
bad_encoding_characters = "\n!@#"
|
2016-10-28 23:05:58 -04:00
|
|
|
message, iv = @encryptor.encrypt_and_sign("This is a very \n\nhumble string" + bad_encoding_characters)
|
2013-05-15 10:11:04 -04:00
|
|
|
|
|
|
|
assert_not_decrypted("#{::Base64.encode64 message.to_s}--#{::Base64.encode64 iv.to_s}")
|
|
|
|
assert_not_verified("#{::Base64.encode64 message.to_s}--#{::Base64.encode64 iv.to_s}")
|
|
|
|
|
|
|
|
assert_not_decrypted([iv, message] * bad_encoding_characters)
|
|
|
|
assert_not_verified([iv, message] * bad_encoding_characters)
|
|
|
|
end
|
|
|
|
|
2016-07-18 07:48:58 -04:00
|
|
|
def test_aead_mode_encryption
|
2016-08-06 12:03:25 -04:00
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret, cipher: "aes-256-gcm")
|
2016-07-18 07:48:58 -04:00
|
|
|
message = encryptor.encrypt_and_sign(@data)
|
|
|
|
assert_equal @data, encryptor.decrypt_and_verify(message)
|
|
|
|
end
|
|
|
|
|
2017-05-15 04:45:14 -04:00
|
|
|
def test_aead_mode_with_hmac_cbc_cipher_text
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret, cipher: "aes-256-gcm")
|
|
|
|
|
2017-05-15 04:55:46 -04:00
|
|
|
assert_aead_not_decrypted(encryptor, "eHdGeExnZEwvMSt3U3dKaFl1WFo0TjVvYzA0eGpjbm5WSkt5MXlsNzhpZ0ZnbWhBWFlQZTRwaXE1bVJCS2oxMDZhYVp2dVN3V0lNZUlWQ3c2eVhQbnhnVjFmeVVubmhRKzF3WnZyWHVNMDg9LS1HSisyakJVSFlPb05ISzRMaXRzcFdBPT0=--831a1d54a3cda8a0658dc668a03dedcbce13b5ca")
|
2017-05-15 04:45:14 -04:00
|
|
|
end
|
|
|
|
|
2016-07-18 07:48:58 -04:00
|
|
|
def test_messing_with_aead_values_causes_failures
|
2016-08-06 12:03:25 -04:00
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret, cipher: "aes-256-gcm")
|
2016-07-18 07:48:58 -04:00
|
|
|
text, iv, auth_tag = encryptor.encrypt_and_sign(@data).split("--")
|
2017-05-15 04:55:46 -04:00
|
|
|
assert_aead_not_decrypted(encryptor, [iv, text, auth_tag] * "--")
|
|
|
|
assert_aead_not_decrypted(encryptor, [munge(text), iv, auth_tag] * "--")
|
|
|
|
assert_aead_not_decrypted(encryptor, [text, munge(iv), auth_tag] * "--")
|
|
|
|
assert_aead_not_decrypted(encryptor, [text, iv, munge(auth_tag)] * "--")
|
|
|
|
assert_aead_not_decrypted(encryptor, [munge(text), munge(iv), munge(auth_tag)] * "--")
|
|
|
|
assert_aead_not_decrypted(encryptor, [text, iv] * "--")
|
|
|
|
assert_aead_not_decrypted(encryptor, [text, iv, auth_tag[0..-2]] * "--")
|
2016-07-18 07:48:58 -04:00
|
|
|
end
|
|
|
|
|
2017-07-06 11:23:22 -04:00
|
|
|
def test_backwards_compatibility_decrypt_previously_encrypted_messages_without_metadata
|
|
|
|
secret = "\xB7\xF0\xBCW\xB1\x18`\xAB\xF0\x81\x10\xA4$\xF44\xEC\xA1\xDC\xC1\xDDD\xAF\xA9\xB8\x14\xCD\x18\x9A\x99 \x80)"
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(secret, cipher: "aes-256-gcm")
|
|
|
|
encrypted_message = "9cVnFs2O3lL9SPvIJuxBOLS51nDiBMw=--YNI5HAfHEmZ7VDpl--ddFJ6tXA0iH+XGcCgMINYQ=="
|
|
|
|
|
|
|
|
assert_equal "Ruby on Rails", encryptor.decrypt_and_verify(encrypted_message)
|
|
|
|
end
|
2011-11-09 16:48:56 -05:00
|
|
|
|
2017-09-24 14:06:38 -04:00
|
|
|
def test_rotating_secret
|
|
|
|
old_message = ActiveSupport::MessageEncryptor.new(secrets[:old], cipher: "aes-256-gcm").encrypt_and_sign("old")
|
2017-09-23 17:16:21 -04:00
|
|
|
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret, cipher: "aes-256-gcm")
|
2017-09-24 14:06:38 -04:00
|
|
|
encryptor.rotate secrets[:old]
|
2017-09-23 17:16:21 -04:00
|
|
|
|
2017-09-24 14:06:38 -04:00
|
|
|
assert_equal "old", encryptor.decrypt_and_verify(old_message)
|
2017-09-23 17:16:21 -04:00
|
|
|
end
|
|
|
|
|
2017-09-24 13:46:10 -04:00
|
|
|
def test_rotating_serializer
|
2017-09-24 14:06:38 -04:00
|
|
|
old_message = ActiveSupport::MessageEncryptor.new(secrets[:old], cipher: "aes-256-gcm", serializer: JSON).
|
2019-09-03 19:49:36 -04:00
|
|
|
encrypt_and_sign({ ahoy: :hoy })
|
2017-09-24 13:46:10 -04:00
|
|
|
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret, cipher: "aes-256-gcm", serializer: JSON)
|
2017-09-24 14:06:38 -04:00
|
|
|
encryptor.rotate secrets[:old]
|
2017-09-24 13:46:10 -04:00
|
|
|
|
|
|
|
assert_equal({ "ahoy" => "hoy" }, encryptor.decrypt_and_verify(old_message))
|
|
|
|
end
|
|
|
|
|
2017-09-24 14:06:38 -04:00
|
|
|
def test_rotating_aes_cbc_secrets
|
|
|
|
old_encryptor = ActiveSupport::MessageEncryptor.new(secrets[:old], "old sign", cipher: "aes-256-cbc")
|
|
|
|
old_message = old_encryptor.encrypt_and_sign("old")
|
2017-09-23 17:16:21 -04:00
|
|
|
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret)
|
2017-09-24 14:06:38 -04:00
|
|
|
encryptor.rotate secrets[:old], "old sign", cipher: "aes-256-cbc"
|
2017-09-23 17:16:21 -04:00
|
|
|
|
2017-09-24 14:06:38 -04:00
|
|
|
assert_equal "old", encryptor.decrypt_and_verify(old_message)
|
2017-09-23 17:16:21 -04:00
|
|
|
end
|
|
|
|
|
2017-09-24 14:06:38 -04:00
|
|
|
def test_multiple_rotations
|
|
|
|
older_message = ActiveSupport::MessageEncryptor.new(secrets[:older], "older sign").encrypt_and_sign("older")
|
|
|
|
old_message = ActiveSupport::MessageEncryptor.new(secrets[:old], "old sign").encrypt_and_sign("old")
|
2017-09-23 17:16:21 -04:00
|
|
|
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret)
|
2017-09-24 14:06:38 -04:00
|
|
|
encryptor.rotate secrets[:old], "old sign"
|
|
|
|
encryptor.rotate secrets[:older], "older sign"
|
2017-09-23 17:16:21 -04:00
|
|
|
|
2017-09-24 14:06:38 -04:00
|
|
|
assert_equal "new", encryptor.decrypt_and_verify(encryptor.encrypt_and_sign("new"))
|
|
|
|
assert_equal "old", encryptor.decrypt_and_verify(old_message)
|
|
|
|
assert_equal "older", encryptor.decrypt_and_verify(older_message)
|
2017-09-23 17:16:21 -04:00
|
|
|
end
|
|
|
|
|
2017-09-24 14:06:38 -04:00
|
|
|
def test_on_rotation_is_called_and_returns_modified_messages
|
2019-09-03 19:49:36 -04:00
|
|
|
older_message = ActiveSupport::MessageEncryptor.new(secrets[:older], "older sign").encrypt_and_sign({ encoded: "message" })
|
2017-09-23 17:16:21 -04:00
|
|
|
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret)
|
2017-09-24 14:06:38 -04:00
|
|
|
encryptor.rotate secrets[:old]
|
|
|
|
encryptor.rotate secrets[:older], "older sign"
|
2017-09-23 17:16:21 -04:00
|
|
|
|
2017-09-24 14:06:38 -04:00
|
|
|
rotated = false
|
|
|
|
message = encryptor.decrypt_and_verify(older_message, on_rotation: proc { rotated = true })
|
2017-09-23 17:16:21 -04:00
|
|
|
|
|
|
|
assert_equal({ encoded: "message" }, message)
|
2017-09-24 14:06:38 -04:00
|
|
|
assert rotated
|
2017-09-23 17:16:21 -04:00
|
|
|
end
|
|
|
|
|
2019-05-13 10:02:38 -04:00
|
|
|
def test_on_rotation_can_be_passed_at_the_constructor_level
|
2019-09-03 19:49:36 -04:00
|
|
|
older_message = ActiveSupport::MessageEncryptor.new(secrets[:older], "older sign").encrypt_and_sign({ encoded: "message" })
|
2019-05-13 10:02:38 -04:00
|
|
|
|
2019-07-26 23:56:39 -04:00
|
|
|
rotated = rotated = false # double assigning to suppress "assigned but unused variable" warning
|
2019-05-13 10:02:38 -04:00
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret, on_rotation: proc { rotated = true })
|
|
|
|
encryptor.rotate secrets[:older], "older sign"
|
|
|
|
|
|
|
|
assert_changes(:rotated, from: false, to: true) do
|
|
|
|
message = encryptor.decrypt_and_verify(older_message)
|
|
|
|
|
|
|
|
assert_equal({ encoded: "message" }, message)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def test_on_rotation_option_takes_precedence_over_the_one_given_in_constructor
|
2019-09-03 19:49:36 -04:00
|
|
|
older_message = ActiveSupport::MessageEncryptor.new(secrets[:older], "older sign").encrypt_and_sign({ encoded: "message" })
|
2019-05-13 10:02:38 -04:00
|
|
|
|
2019-07-26 23:56:39 -04:00
|
|
|
rotated = rotated = false # double assigning to suppress "assigned but unused variable" warning
|
2019-05-13 10:02:38 -04:00
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret, on_rotation: proc { rotated = true })
|
|
|
|
encryptor.rotate secrets[:older], "older sign"
|
|
|
|
|
|
|
|
assert_changes(:rotated, from: false, to: "Yes") do
|
|
|
|
message = encryptor.decrypt_and_verify(older_message, on_rotation: proc { rotated = "Yes" })
|
|
|
|
|
|
|
|
assert_equal({ encoded: "message" }, message)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-09-23 17:16:21 -04:00
|
|
|
def test_with_rotated_metadata
|
2017-09-24 14:06:38 -04:00
|
|
|
old_message = ActiveSupport::MessageEncryptor.new(secrets[:old], cipher: "aes-256-gcm").
|
|
|
|
encrypt_and_sign("metadata", purpose: :rotation)
|
2017-09-23 17:16:21 -04:00
|
|
|
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret, cipher: "aes-256-gcm")
|
2017-09-24 14:06:38 -04:00
|
|
|
encryptor.rotate secrets[:old]
|
2017-09-23 17:16:21 -04:00
|
|
|
|
2017-09-24 14:06:38 -04:00
|
|
|
assert_equal "metadata", encryptor.decrypt_and_verify(old_message, purpose: :rotation)
|
2017-09-23 17:16:21 -04:00
|
|
|
end
|
|
|
|
|
2017-07-06 11:23:22 -04:00
|
|
|
private
|
2017-05-15 04:55:46 -04:00
|
|
|
def assert_aead_not_decrypted(encryptor, value)
|
|
|
|
assert_raise(ActiveSupport::MessageEncryptor::InvalidMessage) do
|
|
|
|
encryptor.decrypt_and_verify(value)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-08-06 13:55:02 -04:00
|
|
|
def assert_not_decrypted(value)
|
|
|
|
assert_raise(ActiveSupport::MessageEncryptor::InvalidMessage) do
|
|
|
|
@encryptor.decrypt_and_verify(@verifier.generate(value))
|
|
|
|
end
|
2008-11-25 14:27:54 -05:00
|
|
|
end
|
2010-08-14 01:13:00 -04:00
|
|
|
|
2016-08-06 13:55:02 -04:00
|
|
|
def assert_not_verified(value)
|
|
|
|
assert_raise(ActiveSupport::MessageVerifier::InvalidSignature) do
|
|
|
|
@encryptor.decrypt_and_verify(value)
|
|
|
|
end
|
2008-11-25 14:27:54 -05:00
|
|
|
end
|
2010-05-01 08:40:02 -04:00
|
|
|
|
2017-09-24 14:06:38 -04:00
|
|
|
def secrets
|
2017-09-25 08:00:07 -04:00
|
|
|
@secrets ||= Hash.new { |h, k| h[k] = SecureRandom.random_bytes(32) }
|
2017-09-24 14:06:38 -04:00
|
|
|
end
|
|
|
|
|
2016-08-06 13:55:02 -04:00
|
|
|
def munge(base64_string)
|
|
|
|
bits = ::Base64.strict_decode64(base64_string)
|
|
|
|
bits.reverse!
|
|
|
|
::Base64.strict_encode64(bits)
|
|
|
|
end
|
2010-05-01 08:40:02 -04:00
|
|
|
end
|
2017-07-06 11:23:22 -04:00
|
|
|
|
2021-07-20 11:24:51 -04:00
|
|
|
class MessageEncryptorWithHybridSerializerAndMarshalDumpTest < MessageEncryptorTest
|
|
|
|
def setup
|
|
|
|
@secret = SecureRandom.random_bytes(32)
|
|
|
|
@verifier = ActiveSupport::MessageVerifier.new(@secret, serializer: ActiveSupport::MessageEncryptor::NullSerializer)
|
|
|
|
@data = { some: "data", now: Time.local(2010) }
|
|
|
|
@encryptor = ActiveSupport::MessageEncryptor.new(@secret)
|
|
|
|
@default_message_encryptor_serializer = ActiveSupport::MessageEncryptor.default_message_encryptor_serializer
|
|
|
|
@default_fallback_to_marshal_deserialization = ActiveSupport::JsonWithMarshalFallback.fallback_to_marshal_deserialization
|
|
|
|
ActiveSupport::MessageEncryptor.default_message_encryptor_serializer = :hybrid
|
|
|
|
end
|
|
|
|
|
|
|
|
def teardown
|
|
|
|
ActiveSupport::MessageEncryptor.default_message_encryptor_serializer = @default_message_encryptor_serializer
|
|
|
|
ActiveSupport::JsonWithMarshalFallback.fallback_to_marshal_deserialization = @default_fallback_to_marshal_deserialization
|
|
|
|
super
|
|
|
|
end
|
|
|
|
|
|
|
|
def test_backwards_compatibility_decrypt_previously_marshal_serialized_messages_when_fallback_to_marshal_deserialization_is_true
|
|
|
|
secret = "\xB7\xF0\xBCW\xB1\x18`\xAB\xF0\x81\x10\xA4$\xF44\xEC\xA1\xDC\xC1\xDDD\xAF\xA9\xB8\x14\xCD\x18\x9A\x99 \x80)"
|
|
|
|
data = "this_is_data"
|
|
|
|
marshal_message = ActiveSupport::MessageEncryptor.new(secret, cipher: "aes-256-gcm", serializer: Marshal).encrypt_and_sign(data)
|
|
|
|
assert_equal data, ActiveSupport::MessageEncryptor.new(secret, cipher: "aes-256-gcm").decrypt_and_verify(marshal_message)
|
|
|
|
end
|
|
|
|
|
|
|
|
def test_failure_to_decrypt_marshal_serialized_messages_when_fallback_to_marshal_deserialization_is_false
|
|
|
|
ActiveSupport::JsonWithMarshalFallback.fallback_to_marshal_deserialization = false
|
|
|
|
secret = "\xB7\xF0\xBCW\xB1\x18`\xAB\xF0\x81\x10\xA4$\xF44\xEC\xA1\xDC\xC1\xDDD\xAF\xA9\xB8\x14\xCD\x18\x9A\x99 \x80)"
|
|
|
|
data = "this_is_data"
|
|
|
|
marshal_message = ActiveSupport::MessageEncryptor.new(secret, cipher: "aes-256-gcm", serializer: Marshal).encrypt_and_sign(data)
|
|
|
|
assert_raise(ActiveSupport::MessageEncryptor::InvalidMessage) do
|
|
|
|
ActiveSupport::MessageEncryptor.new(secret, cipher: "aes-256-gcm").decrypt_and_verify(marshal_message)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
class MessageEncryptorWithJsonSerializerTest < MessageEncryptorTest
|
|
|
|
def setup
|
|
|
|
@secret = SecureRandom.random_bytes(32)
|
|
|
|
@verifier = ActiveSupport::MessageVerifier.new(@secret, serializer: ActiveSupport::MessageEncryptor::NullSerializer)
|
|
|
|
@data = { "some" => "data", "now" => Time.local(2010) }
|
|
|
|
@encryptor = ActiveSupport::MessageEncryptor.new(@secret)
|
|
|
|
@default_message_encryptor_serializer = ActiveSupport::MessageEncryptor.default_message_encryptor_serializer
|
|
|
|
ActiveSupport::MessageEncryptor.default_message_encryptor_serializer = :json
|
|
|
|
end
|
|
|
|
|
|
|
|
def teardown
|
|
|
|
ActiveSupport::MessageEncryptor.default_message_encryptor_serializer = @default_message_encryptor_serializer
|
|
|
|
super
|
|
|
|
end
|
|
|
|
|
|
|
|
def test_backwards_compat_for_64_bytes_key
|
|
|
|
# 64 bit key
|
|
|
|
secret = ["3942b1bf81e622559ed509e3ff274a780784fe9e75b065866bd270438c74da822219de3156473cc27df1fd590e4baf68c95eeb537b6e4d4c5a10f41635b5597e"].pack("H*")
|
|
|
|
# Encryptor with 32 bit key, 64 bit secret for verifier
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(secret[0..31], secret)
|
|
|
|
# Message generated with 64 bit key using the JSON serializer
|
|
|
|
message = "YWZPOVBzcS8ycGZpVWpjWWU5NXZoanRtRGkzTVRjZk16UUpuRE9wa0pNNGI0dGxMRU5RdC94ZVhiQzUwYktFL2NEUjBnUm1QSlRDQ1RrMGlvakVZcGc9PS0tbXROMVdDUnNxWlRxMXA4dEtjWi9oZz09--3489b03e85aa14d8ed8cdd455507246f2e2884ae"
|
|
|
|
assert_equal "data", encryptor.decrypt_and_verify(message)["some"]
|
|
|
|
end
|
|
|
|
|
|
|
|
def test_backwards_compatibility_decrypt_previously_encrypted_messages_without_metadata
|
|
|
|
secret = "\xB7\xF0\xBCW\xB1\x18`\xAB\xF0\x81\x10\xA4$\xF44\xEC\xA1\xDC\xC1\xDDD\xAF\xA9\xB8\x14\xCD\x18\x9A\x99 \x80)"
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(secret, cipher: "aes-256-gcm")
|
|
|
|
# Message generated with MessageEncryptor given JSON as the serializer.
|
|
|
|
encrypted_message = "NIevxlF4gFUETmYTm3GJ--SIlwA5xxwpqNtiiv--woA9eLuVMbmapIDGDj7HQQ=="
|
|
|
|
|
|
|
|
assert_equal "Ruby on Rails", encryptor.decrypt_and_verify(encrypted_message)
|
|
|
|
end
|
|
|
|
|
|
|
|
def test_on_rotation_is_called_and_returns_modified_messages
|
|
|
|
older_message = ActiveSupport::MessageEncryptor.new(secrets[:older], "older sign").encrypt_and_sign({ encoded: "message" })
|
|
|
|
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret)
|
|
|
|
encryptor.rotate secrets[:old]
|
|
|
|
encryptor.rotate secrets[:older], "older sign"
|
|
|
|
|
|
|
|
rotated = false
|
|
|
|
message = encryptor.decrypt_and_verify(older_message, on_rotation: proc { rotated = true })
|
|
|
|
|
|
|
|
assert_equal({ "encoded" => "message" }, message)
|
|
|
|
assert rotated
|
|
|
|
end
|
|
|
|
|
|
|
|
def test_on_rotation_can_be_passed_at_the_constructor_level
|
|
|
|
older_message = ActiveSupport::MessageEncryptor.new(secrets[:older], "older sign").encrypt_and_sign({ encoded: "message" })
|
|
|
|
|
|
|
|
rotated = rotated = false # double assigning to suppress "assigned but unused variable" warning
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret, on_rotation: proc { rotated = true })
|
|
|
|
encryptor.rotate secrets[:older], "older sign"
|
|
|
|
|
|
|
|
assert_changes(:rotated, from: false, to: true) do
|
|
|
|
message = encryptor.decrypt_and_verify(older_message)
|
|
|
|
|
|
|
|
assert_equal({ "encoded" => "message" }, message)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def test_on_rotation_option_takes_precedence_over_the_one_given_in_constructor
|
|
|
|
older_message = ActiveSupport::MessageEncryptor.new(secrets[:older], "older sign").encrypt_and_sign({ encoded: "message" })
|
|
|
|
|
|
|
|
rotated = rotated = false # double assigning to suppress "assigned but unused variable" warning
|
|
|
|
encryptor = ActiveSupport::MessageEncryptor.new(@secret, on_rotation: proc { rotated = true })
|
|
|
|
encryptor.rotate secrets[:older], "older sign"
|
|
|
|
|
|
|
|
assert_changes(:rotated, from: false, to: "Yes") do
|
|
|
|
message = encryptor.decrypt_and_verify(older_message, on_rotation: proc { rotated = "Yes" })
|
|
|
|
|
|
|
|
assert_equal({ "encoded" => "message" }, message)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
class MessageEncryptorWithHybridSerializerAndWithoutMarshalDumpTest < MessageEncryptorWithJsonSerializerTest
|
|
|
|
def setup
|
|
|
|
@secret = SecureRandom.random_bytes(32)
|
|
|
|
@verifier = ActiveSupport::MessageVerifier.new(@secret, serializer: ActiveSupport::MessageEncryptor::NullSerializer)
|
|
|
|
@data = { "some" => "data", "now" => Time.local(2010) }
|
|
|
|
@encryptor = ActiveSupport::MessageEncryptor.new(@secret)
|
|
|
|
@default_message_encryptor_serializer = ActiveSupport::MessageEncryptor.default_message_encryptor_serializer
|
|
|
|
@default_use_marshal_serialization = ActiveSupport::JsonWithMarshalFallback.use_marshal_serialization
|
|
|
|
ActiveSupport::MessageEncryptor.default_message_encryptor_serializer = :hybrid
|
|
|
|
ActiveSupport::JsonWithMarshalFallback.use_marshal_serialization = false
|
|
|
|
end
|
|
|
|
|
|
|
|
def teardown
|
|
|
|
ActiveSupport::MessageEncryptor.default_message_encryptor_serializer = @default_message_encryptor_serializer
|
|
|
|
ActiveSupport::JsonWithMarshalFallback.use_marshal_serialization = @default_use_marshal_serialization
|
|
|
|
super
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-07-06 11:23:22 -04:00
|
|
|
class MessageEncryptorMetadataTest < ActiveSupport::TestCase
|
|
|
|
include SharedMessageMetadataTests
|
|
|
|
|
|
|
|
setup do
|
|
|
|
@secret = SecureRandom.random_bytes(32)
|
2019-09-08 05:46:30 -04:00
|
|
|
@encryptor = ActiveSupport::MessageEncryptor.new(@secret, **encryptor_options)
|
2017-07-06 11:23:22 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
def generate(message, **options)
|
2019-09-03 04:05:59 -04:00
|
|
|
@encryptor.encrypt_and_sign(message, **options)
|
2017-07-06 11:23:22 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def parse(data, **options)
|
2019-09-03 04:05:59 -04:00
|
|
|
@encryptor.decrypt_and_verify(data, **options)
|
2017-07-06 11:23:22 -04:00
|
|
|
end
|
|
|
|
|
2019-09-08 05:46:30 -04:00
|
|
|
def encryptor_options; {} end
|
2017-07-06 11:23:22 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
class MessageEncryptorMetadataMarshalTest < MessageEncryptorMetadataTest
|
|
|
|
private
|
|
|
|
def encryptor_options
|
|
|
|
{ serializer: Marshal }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
class MessageEncryptorMetadataJSONTest < MessageEncryptorMetadataTest
|
|
|
|
private
|
|
|
|
def encryptor_options
|
|
|
|
{ serializer: MessageEncryptorTest::JSONSerializer.new }
|
|
|
|
end
|
|
|
|
end
|
2021-07-20 11:24:51 -04:00
|
|
|
|
|
|
|
class MessageEncryptorMetadataJsonWithMarshalFallbackTest < MessageEncryptorMetadataTest
|
|
|
|
private
|
|
|
|
def encryptor_options
|
|
|
|
{ serializer: ActiveSupport::JsonWithMarshalFallback }
|
|
|
|
end
|
|
|
|
end
|