73 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			73 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			Ruby
		
	
	
	
# Copyright 2019 Google LLC
 | 
						|
#
 | 
						|
# Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
# you may not use this file except in compliance with the License.
 | 
						|
# You may obtain a copy of the License at
 | 
						|
#
 | 
						|
#      http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
#
 | 
						|
# Unless required by applicable law or agreed to in writing, software
 | 
						|
# distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
# See the License for the specific language governing permissions and
 | 
						|
# limitations under the License.
 | 
						|
 | 
						|
require 'spec_helper'
 | 
						|
require 'google/apis/cloudkms_v1'
 | 
						|
require 'googleauth'
 | 
						|
require "logger"
 | 
						|
 | 
						|
Cloudkms = Google::Apis::CloudkmsV1
 | 
						|
 | 
						|
RSpec.describe Google::Apis::CloudkmsV1, :if => run_integration_tests? do
 | 
						|
 | 
						|
  before(:context) do
 | 
						|
    # Note: the service account running this test must have
 | 
						|
    # roles/cloudkms.cryptoKeyEncrypterDecrypter permissions.
 | 
						|
    WebMock.allow_net_connect!
 | 
						|
    @kms = Cloudkms::CloudKMSService.new
 | 
						|
    @kms.authorization = Google::Auth.get_application_default([Cloudkms::AUTH_CLOUDKMS])
 | 
						|
 | 
						|
    @project = ENV["GOOGLE_PROJECT_ID"]
 | 
						|
    @suffix = Time.now.utc.strftime("%Y%m%d%H%M%S-") + rand(36**8).to_s(36)
 | 
						|
    @parent_name = "projects/#{@project}/locations/us-central1"
 | 
						|
    @ring_name = @kms.create_project_location_key_ring(@parent_name, key_ring_id: "ring-#{@suffix}").name
 | 
						|
    key_object = Cloudkms::CryptoKey.new
 | 
						|
    key_object.purpose = "ENCRYPT_DECRYPT"
 | 
						|
    @key_name = @kms.create_project_location_key_ring_crypto_key(@ring_name, key_object, crypto_key_id: "key-#{@suffix}").name
 | 
						|
 | 
						|
    @old_logger = Google::Apis.logger
 | 
						|
    @logio = StringIO.new
 | 
						|
    Google::Apis.logger = ::Logger.new(@logio)
 | 
						|
    Google::Apis.logger.level = ::Logger::DEBUG
 | 
						|
  end
 | 
						|
 | 
						|
  it 'should not log secrets in plain text' do
 | 
						|
    request = Cloudkms::EncryptRequest.new(plaintext: "secretabcde")
 | 
						|
    response = @kms.encrypt_crypto_key(@key_name, request)
 | 
						|
    request = ::Google::Apis::CloudkmsV1::DecryptRequest.new(ciphertext: response.ciphertext)
 | 
						|
    recovered_secret = @kms.decrypt_crypto_key(@key_name, request).plaintext
 | 
						|
    expect(recovered_secret).to eq "secretabcde"
 | 
						|
 | 
						|
    logs = @logio.string
 | 
						|
    # Plain text content should never show up in logs.
 | 
						|
    # Ensure we redact the service response object for the decrypt call.
 | 
						|
    expect(logs).not_to match(/secretabcde/)
 | 
						|
    # Base64 encoding of the plain text content should never show up in logs.
 | 
						|
    # Ensure we redact the http response object for the decrypt call.
 | 
						|
    expect(logs).not_to match(/c2VjcmV0YWJjZGU=/)
 | 
						|
    # It's okay for the ciphertext to show up in logs.
 | 
						|
    # Ensure we don't redact the service response object for the encrypt call.
 | 
						|
    expect(logs).to match(/@ciphertext=/)
 | 
						|
    # Ensure we don't redact the http response object for the encrypt call.
 | 
						|
    expect(logs).to match(/\\"ciphertext\\"/)
 | 
						|
  end
 | 
						|
 | 
						|
  after(:context) do
 | 
						|
    # There does not appear to be a way to clean up key resources. :sadface:  
 | 
						|
    Google::Apis.logger = @old_logger
 | 
						|
    WebMock.disable_net_connect!
 | 
						|
  end
 | 
						|
 | 
						|
end
 |