summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCédric Jeanneret <cjeanner@redhat.com>2019-11-01 11:27:37 +0100
committerDougal Matthews <dougal@dougalmatthews.com>2019-11-13 10:46:13 +0000
commitf6d5df161fc7eaffe57e34e9fc20575b93a6f166 (patch)
tree586c6aa300f53afb95d1efbce2ccf95f2cc1233b
parent3bd98032a2b7b6cc4a70d720e57dbd05265bc336 (diff)
downloadoslo-utils-f6d5df161fc7eaffe57e34e9fc20575b93a6f166.tar.gz
Make mask_password case insensitive, and add new patterns
It appears that Mistral service logs everything, and doesn't use yet the mask_password (nor mask_dict_password) method. In order to ensure all is properly masked, we have to add some new patterns, and make it case insensitive in order to simplify and avoid duplicated entries. Change-Id: Icc19b7c8bdb6a3182939d5e9fdef21288b19f43d Related-Bug: #1850843 Signed-off-by: Cédric Jeanneret <cjeanner@redhat.com>
-rw-r--r--oslo_utils/strutils.py29
-rw-r--r--oslo_utils/tests/test_strutils.py41
-rw-r--r--releasenotes/notes/mask-password-patterns-f41524069b8ae488.yaml8
3 files changed, 64 insertions, 14 deletions
diff --git a/oslo_utils/strutils.py b/oslo_utils/strutils.py
index 936e4d5..396409d 100644
--- a/oslo_utils/strutils.py
+++ b/oslo_utils/strutils.py
@@ -59,7 +59,7 @@ _SANITIZE_KEYS = ['adminPass', 'admin_pass', 'password', 'admin_password',
'auth_token', 'new_pass', 'auth_password', 'secret_uuid',
'secret', 'sys_pswd', 'token', 'configdrive',
'CHAPPASSWORD', 'encrypted_key', 'private_key',
- 'encryption_key_id']
+ 'encryption_key_id', 'fernetkey', 'sslkey', 'passphrase']
# NOTE(ldbragst): Let's build a list of regex objects using the list of
# _SANITIZE_KEYS we already have. This way, we only have to add the new key
@@ -70,17 +70,18 @@ _SANITIZE_PATTERNS_1 = {}
# NOTE(amrith): Some regular expressions have only one parameter, some
# have two parameters. Use different lists of patterns here.
-_FORMAT_PATTERNS_1 = [r'(%(key)s\s*[=]\s*)[^\s^\'^\"]+']
-_FORMAT_PATTERNS_2 = [r'(%(key)s\s*[=]\s*[\"\'])[^\"\']*([\"\'])',
- r'(%(key)s\s+[\"\'])[^\"\']*([\"\'])',
- r'([-]{2}%(key)s\s+)[^\'^\"^=^\s]+([\s]*)',
- r'(<%(key)s>)[^<]*(</%(key)s>)',
- r'([\"\']%(key)s[\"\']\s*:\s*[\"\'])[^\"\']*([\"\'])',
- r'([\'"][^"\']*%(key)s[\'"]\s*:\s*u?[\'"])[^\"\']*'
+_FORMAT_PATTERNS_1 = [r'(%(key)s[0-9]*\s*[=]\s*)[^\s^\'^\"]+']
+_FORMAT_PATTERNS_2 = [r'(%(key)s[0-9]*\s*[=]\s*[\"\'])[^\"\']*([\"\'])',
+ r'(%(key)s[0-9]*\s+[\"\'])[^\"\']*([\"\'])',
+ r'([-]{2}%(key)s[0-9]*\s+)[^\'^\"^=^\s]+([\s]*)',
+ r'(<%(key)s[0-9]*>)[^<]*(</%(key)s[0-9]*>)',
+ r'([\"\']%(key)s[0-9]*[\"\']\s*:\s*[\"\'])[^\"\']*'
+ '([\"\'])',
+ r'([\'"][^"\']*%(key)s[0-9]*[\'"]\s*:\s*u?[\'"])[^\"\']*'
'([\'"])',
- r'([\'"][^\'"]*%(key)s[\'"]\s*,\s*\'--?[A-z]+\'\s*,\s*u?'
- '[\'"])[^\"\']*([\'"])',
- r'(%(key)s\s*--?[A-z]+\s*)\S+(\s*)']
+ r'([\'"][^\'"]*%(key)s[0-9]*[\'"]\s*,\s*\'--?[A-z]+'
+ '\'\s*,\s*u?[\'"])[^\"\']*([\'"])',
+ r'(%(key)s[0-9]*\s*--?[A-z]+\s*)\S+(\s*)']
# NOTE(dhellmann): Keep a separate list of patterns by key so we only
# need to apply the substitutions for keys we find using a quick "in"
@@ -90,11 +91,11 @@ for key in _SANITIZE_KEYS:
_SANITIZE_PATTERNS_2[key] = []
for pattern in _FORMAT_PATTERNS_2:
- reg_ex = re.compile(pattern % {'key': key}, re.DOTALL)
+ reg_ex = re.compile(pattern % {'key': key}, re.DOTALL | re.IGNORECASE)
_SANITIZE_PATTERNS_2[key].append(reg_ex)
for pattern in _FORMAT_PATTERNS_1:
- reg_ex = re.compile(pattern % {'key': key}, re.DOTALL)
+ reg_ex = re.compile(pattern % {'key': key}, re.DOTALL | re.IGNORECASE)
_SANITIZE_PATTERNS_1[key].append(reg_ex)
@@ -329,7 +330,7 @@ def mask_password(message, secret="***"): # nosec
# specified in _SANITIZE_KEYS, if not then just return the message since
# we don't have to mask any passwords.
for key in _SANITIZE_KEYS:
- if key in message:
+ if key.lower() in message.lower():
for pattern in _SANITIZE_PATTERNS_2[key]:
message = re.sub(pattern, substitute2, message)
for pattern in _SANITIZE_PATTERNS_1[key]:
diff --git a/oslo_utils/tests/test_strutils.py b/oslo_utils/tests/test_strutils.py
index f7efcd9..c4a449f 100644
--- a/oslo_utils/tests/test_strutils.py
+++ b/oslo_utils/tests/test_strutils.py
@@ -353,6 +353,43 @@ class MaskPasswordTestCase(test_base.BaseTestCase):
payload = """{ 'token' : 'token' }"""
expected = """{ 'token' : '***' }"""
self.assertEqual(expected, strutils.mask_password(payload))
+ # Test 'fernetkey'
+ payload = """{ 'fernetkey' : 'token' }"""
+ expected = """{ 'fernetkey' : '***' }"""
+ self.assertEqual(expected, strutils.mask_password(payload))
+ # Test 'FernetKey'
+ payload = """{ 'FernetKey' : 'token' }"""
+ expected = """{ 'FernetKey' : '***' }"""
+ self.assertEqual(expected, strutils.mask_password(payload))
+ # Test 'sslkey'
+ payload = """{ 'sslkey' : 'token' }"""
+ expected = """{ 'sslkey' : '***' }"""
+ self.assertEqual(expected, strutils.mask_password(payload))
+ # Test 'SslKey'
+ payload = """{ 'SslKey' : 'token' }"""
+ expected = """{ 'SslKey' : '***' }"""
+ self.assertEqual(expected, strutils.mask_password(payload))
+ # Test 'passphrase'
+ payload = """{ 'passphrase' : 'token' }"""
+ expected = """{ 'passphrase' : '***' }"""
+ self.assertEqual(expected, strutils.mask_password(payload))
+ # Test 'PassPhrase'
+ payload = """{ 'PassPhrase' : 'token' }"""
+ expected = """{ 'PassPhrase' : '***' }"""
+ self.assertEqual(expected, strutils.mask_password(payload))
+ # Some real-life cases
+ # Test 'KeystoneFernetKey1'
+ payload = """{ 'KeystoneFernetKey1' : 'token' }"""
+ expected = """{ 'KeystoneFernetKey1' : '***' }"""
+ self.assertEqual(expected, strutils.mask_password(payload))
+ # Test 'OctaviaCaKeyPassword'
+ payload = """{ 'OctaviaCaKeyPassword' : 'token' }"""
+ expected = """{ 'OctaviaCaKeyPassword' : '***' }"""
+ self.assertEqual(expected, strutils.mask_password(payload))
+ # Test 'OctaviaCaKeyPassphrase'
+ payload = """{ 'OctaviaCaKeyPassphrase' : 'token' }"""
+ expected = """{ 'OctaviaCaKeyPassphrase' : '***' }"""
+ self.assertEqual(expected, strutils.mask_password(payload))
def test_xml(self):
# Test 'adminPass' w/o spaces
@@ -395,6 +432,10 @@ class MaskPasswordTestCase(test_base.BaseTestCase):
</password>"""
expected = """<password>***</password>"""
self.assertEqual(expected, strutils.mask_password(payload))
+ # Test 'Password1' - case-insensitive + number
+ payload = """<Password1>TL0EfN33</Password1>"""
+ expected = """<Password1>***</Password1>"""
+ self.assertEqual(expected, strutils.mask_password(payload))
def test_xml_attribute(self):
# Test 'adminPass' w/o spaces
diff --git a/releasenotes/notes/mask-password-patterns-f41524069b8ae488.yaml b/releasenotes/notes/mask-password-patterns-f41524069b8ae488.yaml
new file mode 100644
index 0000000..d9a455a
--- /dev/null
+++ b/releasenotes/notes/mask-password-patterns-f41524069b8ae488.yaml
@@ -0,0 +1,8 @@
+---
+security:
+ - This patch ensures we actually mask sensitive data, even if case doesn't
+ match the static entry we have in the patterns.
+ - It also ensures that some fancy names with a common base, but added
+ number are actually taken care of.
+fixes:
+ - https://bugs.launchpad.net/tripleo/+bug/1850843