73 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			73 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			Ruby
		
	
	
	
| # Copyright 2019 Google LLC
 | |
| #
 | |
| # Licensed under the Apache License, Version 2.0 (the "License");
 | |
| # you may not use this file except in compliance with the License.
 | |
| # You may obtain a copy of the License at
 | |
| #
 | |
| #      http://www.apache.org/licenses/LICENSE-2.0
 | |
| #
 | |
| # Unless required by applicable law or agreed to in writing, software
 | |
| # distributed under the License is distributed on an "AS IS" BASIS,
 | |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| # See the License for the specific language governing permissions and
 | |
| # limitations under the License.
 | |
| 
 | |
| require 'spec_helper'
 | |
| require 'google/apis/cloudkms_v1'
 | |
| require 'googleauth'
 | |
| require "logger"
 | |
| 
 | |
| Cloudkms = Google::Apis::CloudkmsV1
 | |
| 
 | |
| RSpec.describe Google::Apis::CloudkmsV1, :if => run_integration_tests? do
 | |
| 
 | |
|   before(:context) do
 | |
|     # Note: the service account running this test must have
 | |
|     # roles/cloudkms.cryptoKeyEncrypterDecrypter permissions.
 | |
|     WebMock.allow_net_connect!
 | |
|     @kms = Cloudkms::CloudKMSService.new
 | |
|     @kms.authorization = Google::Auth.get_application_default([Cloudkms::AUTH_CLOUDKMS])
 | |
| 
 | |
|     @project = ENV["GOOGLE_PROJECT_ID"]
 | |
|     @suffix = Time.now.utc.strftime("%Y%m%d%H%M%S-") + rand(36**8).to_s(36)
 | |
|     @parent_name = "projects/#{@project}/locations/us-central1"
 | |
|     @ring_name = @kms.create_project_location_key_ring(@parent_name, key_ring_id: "ring-#{@suffix}").name
 | |
|     key_object = Cloudkms::CryptoKey.new
 | |
|     key_object.purpose = "ENCRYPT_DECRYPT"
 | |
|     @key_name = @kms.create_project_location_key_ring_crypto_key(@ring_name, key_object, crypto_key_id: "key-#{@suffix}").name
 | |
| 
 | |
|     @old_logger = Google::Apis.logger
 | |
|     @logio = StringIO.new
 | |
|     Google::Apis.logger = ::Logger.new(@logio)
 | |
|     Google::Apis.logger.level = ::Logger::DEBUG
 | |
|   end
 | |
| 
 | |
|   it 'should not log secrets in plain text' do
 | |
|     request = Cloudkms::EncryptRequest.new(plaintext: "secretabcde")
 | |
|     response = @kms.encrypt_crypto_key(@key_name, request)
 | |
|     request = ::Google::Apis::CloudkmsV1::DecryptRequest.new(ciphertext: response.ciphertext)
 | |
|     recovered_secret = @kms.decrypt_crypto_key(@key_name, request).plaintext
 | |
|     expect(recovered_secret).to eq "secretabcde"
 | |
| 
 | |
|     logs = @logio.string
 | |
|     # Plain text content should never show up in logs.
 | |
|     # Ensure we redact the service response object for the decrypt call.
 | |
|     expect(logs).not_to match(/secretabcde/)
 | |
|     # Base64 encoding of the plain text content should never show up in logs.
 | |
|     # Ensure we redact the http response object for the decrypt call.
 | |
|     expect(logs).not_to match(/c2VjcmV0YWJjZGU=/)
 | |
|     # It's okay for the ciphertext to show up in logs.
 | |
|     # Ensure we don't redact the service response object for the encrypt call.
 | |
|     expect(logs).to match(/@ciphertext=/)
 | |
|     # Ensure we don't redact the http response object for the encrypt call.
 | |
|     expect(logs).to match(/\\"ciphertext\\"/)
 | |
|   end
 | |
| 
 | |
|   after(:context) do
 | |
|     # There does not appear to be a way to clean up key resources. :sadface:  
 | |
|     Google::Apis.logger = @old_logger
 | |
|     WebMock.disable_net_connect!
 | |
|   end
 | |
| 
 | |
| end
 |