Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
777b6713
Commit
777b6713
authored
Nov 22, 2018
by
Grzegorz Bizon
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Ensure that db encryption keys have proper bytesize
parent
8a235c0c
Changes
5
Show whitespace changes
Inline
Side-by-side
Showing
5 changed files
with
160 additions
and
2 deletions
+160
-2
config/settings.rb
config/settings.rb
+8
-0
lib/gitlab/crypto_helper.rb
lib/gitlab/crypto_helper.rb
+2
-2
lib/gitlab/utils.rb
lib/gitlab/utils.rb
+14
-0
spec/config/settings_spec.rb
spec/config/settings_spec.rb
+98
-0
spec/lib/gitlab/utils_spec.rb
spec/lib/gitlab/utils_spec.rb
+38
-0
No files found.
config/settings.rb
View file @
777b6713
...
@@ -95,6 +95,14 @@ class Settings < Settingslogic
...
@@ -95,6 +95,14 @@ class Settings < Settingslogic
Gitlab
::
Application
.
secrets
.
db_key_base
[
0
..
31
]
Gitlab
::
Application
.
secrets
.
db_key_base
[
0
..
31
]
end
end
def
attr_encrypted_db_key_base_32
Gitlab
::
Utils
.
ensure_utf8_size
(
attr_encrypted_db_key_base
,
bytes:
32
.
bytes
)
end
def
attr_encrypted_db_key_base_12
Gitlab
::
Utils
.
ensure_utf8_size
(
attr_encrypted_db_key_base
,
bytes:
12
.
bytes
)
end
# This should be used for :per_attribute_salt_and_iv mode. There is no
# This should be used for :per_attribute_salt_and_iv mode. There is no
# need to truncate the key because the encryptor will use the salt to
# need to truncate the key because the encryptor will use the salt to
# generate a hash of the password:
# generate a hash of the password:
...
...
lib/gitlab/crypto_helper.rb
View file @
777b6713
...
@@ -6,8 +6,8 @@ module Gitlab
...
@@ -6,8 +6,8 @@ module Gitlab
AES256_GCM_OPTIONS
=
{
AES256_GCM_OPTIONS
=
{
algorithm:
'aes-256-gcm'
,
algorithm:
'aes-256-gcm'
,
key:
Settings
.
attr_encrypted_db_key_base_
truncated
,
key:
Settings
.
attr_encrypted_db_key_base_
32
,
iv:
Settings
.
attr_encrypted_db_key_base_
truncated
[
0
..
11
]
iv:
Settings
.
attr_encrypted_db_key_base_
12
}.
freeze
}.
freeze
def
sha256
(
value
)
def
sha256
(
value
)
...
...
lib/gitlab/utils.rb
View file @
777b6713
...
@@ -16,6 +16,20 @@ module Gitlab
...
@@ -16,6 +16,20 @@ module Gitlab
str
.
force_encoding
(
Encoding
::
UTF_8
)
str
.
force_encoding
(
Encoding
::
UTF_8
)
end
end
def
ensure_utf8_size
(
str
,
bytes
:)
raise
ArgumentError
if
str
.
empty?
||
bytes
.
negative?
truncated
=
str
.
each_char
.
each_with_object
(
String
.
new
)
do
|
char
,
object
|
if
object
.
bytesize
+
char
.
bytesize
>
bytes
break
object
else
object
.
concat
(
char
)
end
end
truncated
+
(
"
\0
"
*
(
bytes
-
truncated
.
bytesize
))
end
# Append path to host, making sure there's one single / in between
# Append path to host, making sure there's one single / in between
def
append_path
(
host
,
path
)
def
append_path
(
host
,
path
)
"
#{
host
.
to_s
.
sub
(
%r{
\/
+$}
,
''
)
}
/
#{
path
.
to_s
.
sub
(
%r{^
\/
+}
,
''
)
}
"
"
#{
host
.
to_s
.
sub
(
%r{
\/
+$}
,
''
)
}
/
#{
path
.
to_s
.
sub
(
%r{^
\/
+}
,
''
)
}
"
...
...
spec/config/settings_spec.rb
View file @
777b6713
...
@@ -6,4 +6,102 @@ describe Settings do
...
@@ -6,4 +6,102 @@ describe Settings do
expect
(
described_class
.
omniauth
.
enabled
).
to
be
true
expect
(
described_class
.
omniauth
.
enabled
).
to
be
true
end
end
end
end
describe
'.attr_encrypted_db_key_base_truncated'
do
it
'is a string with maximum 32 bytes size'
do
expect
(
described_class
.
attr_encrypted_db_key_base_truncated
.
bytesize
)
.
to
be
<=
32
end
end
describe
'.attr_encrypted_db_key_base_12'
do
context
'when db key base secret is less than 12 bytes'
do
before
do
allow
(
described_class
)
.
to
receive
(
:attr_encrypted_db_key_base
)
.
and_return
(
'a'
*
10
)
end
it
'expands db key base secret to 12 bytes'
do
expect
(
described_class
.
attr_encrypted_db_key_base_12
)
.
to
eq
(
'a'
*
10
)
+
(
"
\0
"
*
2
)
end
end
context
'when key has multiple multi-byte UTF chars exceeding 12 bytes'
do
before
do
allow
(
described_class
)
.
to
receive
(
:attr_encrypted_db_key_base
)
.
and_return
(
'❤'
*
18
)
end
it
'does not use more than 32 bytes'
do
db_key_base
=
described_class
.
attr_encrypted_db_key_base_12
expect
(
db_key_base
).
to
eq
(
'❤'
*
4
)
expect
(
db_key_base
.
bytesize
).
to
eq
12
end
end
end
describe
'.attr_encrypted_db_key_base_32'
do
context
'when db key base secret is less than 32 bytes'
do
before
do
allow
(
described_class
)
.
to
receive
(
:attr_encrypted_db_key_base
)
.
and_return
(
'a'
*
10
)
end
it
'expands db key base secret to 32 bytes'
do
expanded_key_base
=
(
'a'
*
10
)
+
(
"
\0
"
*
22
)
expect
(
expanded_key_base
.
bytesize
).
to
eq
32
expect
(
described_class
.
attr_encrypted_db_key_base_32
)
.
to
eq
expanded_key_base
end
end
context
'when db key base secret is 32 bytes'
do
before
do
allow
(
described_class
)
.
to
receive
(
:attr_encrypted_db_key_base
)
.
and_return
(
'a'
*
32
)
end
it
'returns original value'
do
expect
(
described_class
.
attr_encrypted_db_key_base_32
)
.
to
eq
'a'
*
32
end
end
context
'when db key base contains multi-byte UTF character'
do
before
do
allow
(
described_class
)
.
to
receive
(
:attr_encrypted_db_key_base
)
.
and_return
(
'❤'
*
6
)
end
it
'does not use more than 32 bytes'
do
db_key_base
=
described_class
.
attr_encrypted_db_key_base_32
expect
(
db_key_base
).
to
eq
'❤❤❤❤❤❤'
+
(
"
\0
"
*
14
)
expect
(
db_key_base
.
bytesize
).
to
eq
32
end
end
context
'when db key base multi-byte UTF chars exceeding 32 bytes'
do
before
do
allow
(
described_class
)
.
to
receive
(
:attr_encrypted_db_key_base
)
.
and_return
(
'❤'
*
18
)
end
it
'does not use more than 32 bytes'
do
db_key_base
=
described_class
.
attr_encrypted_db_key_base_32
expect
(
db_key_base
).
to
eq
(
'❤'
*
10
)
+
(
"
\0
"
*
2
)
expect
(
db_key_base
.
bytesize
).
to
eq
32
end
end
end
end
end
spec/lib/gitlab/utils_spec.rb
View file @
777b6713
...
@@ -127,4 +127,42 @@ describe Gitlab::Utils do
...
@@ -127,4 +127,42 @@ describe Gitlab::Utils do
end
end
end
end
end
end
describe
'.ensure_utf8_size'
do
context
'string is has less bytes than expected'
do
it
'backfills string with null characters'
do
transformed
=
described_class
.
ensure_utf8_size
(
'a'
*
10
,
bytes:
32
)
expect
(
transformed
.
bytesize
).
to
eq
32
expect
(
transformed
).
to
eq
(
'a'
*
10
)
+
(
"
\0
"
*
22
)
end
end
context
'string size is exactly the one that is expected'
do
it
'returns original value'
do
transformed
=
described_class
.
ensure_utf8_size
(
'a'
*
32
,
bytes:
32
)
expect
(
transformed
).
to
eq
'a'
*
32
expect
(
transformed
.
bytesize
).
to
eq
32
end
end
context
'when string contains a few multi-byte UTF characters'
do
it
'backfills string with null characters'
do
transformed
=
described_class
.
ensure_utf8_size
(
'❤'
*
6
,
bytes:
32
)
expect
(
transformed
).
to
eq
'❤❤❤❤❤❤'
+
(
"
\0
"
*
14
)
expect
(
transformed
.
bytesize
).
to
eq
32
end
end
context
'when string has multiple multi-byte UTF chars exceeding 32 bytes'
do
it
'truncates string to 32 characters and backfills it if needed'
do
transformed
=
described_class
.
ensure_utf8_size
(
'❤'
*
18
,
bytes:
32
)
expect
(
transformed
).
to
eq
(
'❤'
*
10
)
+
(
"
\0
"
*
2
)
expect
(
transformed
.
bytesize
).
to
eq
32
end
end
end
end
end
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment