Ensure that URL encoded passwords are properly redacted. (#14744)
The URL password redaction operation did not handle the case where the database connection URL was provided as a percent-encoded string, and its password component contained reserved characters. It attempted to redact the password by replacing the unescaped password in the percent-encoded URL. This resulted in the password being revealed when reading the configuration from Vault.
This commit is contained in:
parent
96a4612daa
commit
287bb77abc
|
@ -3,7 +3,9 @@ package database
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"database/sql"
|
"database/sql"
|
||||||
|
"fmt"
|
||||||
"log"
|
"log"
|
||||||
|
"net/url"
|
||||||
"os"
|
"os"
|
||||||
"reflect"
|
"reflect"
|
||||||
"strings"
|
"strings"
|
||||||
|
@ -12,6 +14,9 @@ import (
|
||||||
|
|
||||||
"github.com/go-test/deep"
|
"github.com/go-test/deep"
|
||||||
mongodbatlas "github.com/hashicorp/vault-plugin-database-mongodbatlas"
|
mongodbatlas "github.com/hashicorp/vault-plugin-database-mongodbatlas"
|
||||||
|
"github.com/lib/pq"
|
||||||
|
"github.com/mitchellh/mapstructure"
|
||||||
|
|
||||||
"github.com/hashicorp/vault/helper/namespace"
|
"github.com/hashicorp/vault/helper/namespace"
|
||||||
postgreshelper "github.com/hashicorp/vault/helper/testhelpers/postgresql"
|
postgreshelper "github.com/hashicorp/vault/helper/testhelpers/postgresql"
|
||||||
vaulthttp "github.com/hashicorp/vault/http"
|
vaulthttp "github.com/hashicorp/vault/http"
|
||||||
|
@ -25,8 +30,6 @@ import (
|
||||||
"github.com/hashicorp/vault/sdk/helper/pluginutil"
|
"github.com/hashicorp/vault/sdk/helper/pluginutil"
|
||||||
"github.com/hashicorp/vault/sdk/logical"
|
"github.com/hashicorp/vault/sdk/logical"
|
||||||
"github.com/hashicorp/vault/vault"
|
"github.com/hashicorp/vault/vault"
|
||||||
"github.com/lib/pq"
|
|
||||||
"github.com/mitchellh/mapstructure"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func getCluster(t *testing.T) (*vault.TestCluster, logical.SystemView) {
|
func getCluster(t *testing.T) (*vault.TestCluster, logical.SystemView) {
|
||||||
|
@ -1349,6 +1352,116 @@ func TestBackend_RotateRootCredentials(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestBackend_ConnectionURL_redacted(t *testing.T) {
|
||||||
|
cluster, sys := getCluster(t)
|
||||||
|
t.Cleanup(cluster.Cleanup)
|
||||||
|
|
||||||
|
config := logical.TestBackendConfig()
|
||||||
|
config.StorageView = &logical.InmemStorage{}
|
||||||
|
config.System = sys
|
||||||
|
|
||||||
|
b, err := Factory(context.Background(), config)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer b.Cleanup(context.Background())
|
||||||
|
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
password string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "basic",
|
||||||
|
password: "secret",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "encoded",
|
||||||
|
password: "yourStrong(!)Password",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
respCheck := func(req *logical.Request) *logical.Response {
|
||||||
|
t.Helper()
|
||||||
|
resp, err := b.HandleRequest(namespace.RootContext(nil), req)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("err: %v", err)
|
||||||
|
}
|
||||||
|
if resp == nil {
|
||||||
|
t.Fatalf("expected a response, resp: %#v", resp)
|
||||||
|
}
|
||||||
|
|
||||||
|
if resp.Error() != nil {
|
||||||
|
t.Fatalf("unexpected error in response, err: %#v", resp.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
return resp
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
cleanup, u := postgreshelper.PrepareTestContainerWithPassword(t, "13.4-buster", tt.password)
|
||||||
|
t.Cleanup(cleanup)
|
||||||
|
|
||||||
|
p, err := url.Parse(u)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
actualPassword, _ := p.User.Password()
|
||||||
|
if tt.password != actualPassword {
|
||||||
|
t.Fatalf("expected computed URL password %#v, actual %#v", tt.password, actualPassword)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Configure a connection
|
||||||
|
data := map[string]interface{}{
|
||||||
|
"connection_url": u,
|
||||||
|
"plugin_name": "postgresql-database-plugin",
|
||||||
|
"allowed_roles": []string{"plugin-role-test"},
|
||||||
|
}
|
||||||
|
req := &logical.Request{
|
||||||
|
Operation: logical.UpdateOperation,
|
||||||
|
Path: fmt.Sprintf("config/%s", tt.name),
|
||||||
|
Storage: config.StorageView,
|
||||||
|
Data: data,
|
||||||
|
}
|
||||||
|
respCheck(req)
|
||||||
|
|
||||||
|
// read config
|
||||||
|
readReq := &logical.Request{
|
||||||
|
Operation: logical.ReadOperation,
|
||||||
|
Path: req.Path,
|
||||||
|
Storage: config.StorageView,
|
||||||
|
}
|
||||||
|
resp := respCheck(readReq)
|
||||||
|
|
||||||
|
var connDetails map[string]interface{}
|
||||||
|
if v, ok := resp.Data["connection_details"]; ok {
|
||||||
|
connDetails = v.(map[string]interface{})
|
||||||
|
}
|
||||||
|
|
||||||
|
if connDetails == nil {
|
||||||
|
t.Fatalf("response data missing connection_details, resp: %#v", resp)
|
||||||
|
}
|
||||||
|
|
||||||
|
actual := connDetails["connection_url"].(string)
|
||||||
|
expected := p.Redacted()
|
||||||
|
if expected != actual {
|
||||||
|
t.Fatalf("expected redacted URL %q, actual %q", expected, actual)
|
||||||
|
}
|
||||||
|
|
||||||
|
if tt.password != "" {
|
||||||
|
// extra test to ensure that URL.Redacted() is working as expected.
|
||||||
|
p, err = url.Parse(actual)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if pp, _ := p.User.Password(); pp == tt.password {
|
||||||
|
t.Fatalf("password was not redacted by URL.Redacted()")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func testCredsExist(t *testing.T, resp *logical.Response, connURL string) bool {
|
func testCredsExist(t *testing.T, resp *logical.Response, connURL string) bool {
|
||||||
t.Helper()
|
t.Helper()
|
||||||
var d struct {
|
var d struct {
|
||||||
|
|
|
@ -5,10 +5,10 @@ import (
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/url"
|
"net/url"
|
||||||
"strings"
|
|
||||||
|
|
||||||
"github.com/fatih/structs"
|
"github.com/fatih/structs"
|
||||||
uuid "github.com/hashicorp/go-uuid"
|
"github.com/hashicorp/go-uuid"
|
||||||
|
|
||||||
v5 "github.com/hashicorp/vault/sdk/database/dbplugin/v5"
|
v5 "github.com/hashicorp/vault/sdk/database/dbplugin/v5"
|
||||||
"github.com/hashicorp/vault/sdk/framework"
|
"github.com/hashicorp/vault/sdk/framework"
|
||||||
"github.com/hashicorp/vault/sdk/logical"
|
"github.com/hashicorp/vault/sdk/logical"
|
||||||
|
@ -195,13 +195,10 @@ func (b *databaseBackend) connectionReadHandler() framework.OperationFunc {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// Mask the password if it is in the url
|
// Ensure that we only ever include a redacted valid URL in the response.
|
||||||
if connURLRaw, ok := config.ConnectionDetails["connection_url"]; ok {
|
if connURLRaw, ok := config.ConnectionDetails["connection_url"]; ok {
|
||||||
connURL := connURLRaw.(string)
|
if p, err := url.Parse(connURLRaw.(string)); err == nil {
|
||||||
if conn, err := url.Parse(connURL); err == nil {
|
config.ConnectionDetails["connection_url"] = p.Redacted()
|
||||||
if password, ok := conn.User.Password(); ok {
|
|
||||||
config.ConnectionDetails["connection_url"] = strings.Replace(connURL, password, "*****", -1)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
```release-note:bug
|
||||||
|
secrets/database: Ensure that a `connection_url` password is redacted in all cases.
|
||||||
|
```
|
|
@ -12,6 +12,14 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
func PrepareTestContainer(t *testing.T, version string) (func(), string) {
|
func PrepareTestContainer(t *testing.T, version string) (func(), string) {
|
||||||
|
return prepareTestContainer(t, version, "secret", "database")
|
||||||
|
}
|
||||||
|
|
||||||
|
func PrepareTestContainerWithPassword(t *testing.T, version, password string) (func(), string) {
|
||||||
|
return prepareTestContainer(t, version, password, "database")
|
||||||
|
}
|
||||||
|
|
||||||
|
func prepareTestContainer(t *testing.T, version, password, db string) (func(), string) {
|
||||||
if os.Getenv("PG_URL") != "" {
|
if os.Getenv("PG_URL") != "" {
|
||||||
return func() {}, os.Getenv("PG_URL")
|
return func() {}, os.Getenv("PG_URL")
|
||||||
}
|
}
|
||||||
|
@ -19,17 +27,21 @@ func PrepareTestContainer(t *testing.T, version string) (func(), string) {
|
||||||
if version == "" {
|
if version == "" {
|
||||||
version = "11"
|
version = "11"
|
||||||
}
|
}
|
||||||
|
|
||||||
runner, err := docker.NewServiceRunner(docker.RunOptions{
|
runner, err := docker.NewServiceRunner(docker.RunOptions{
|
||||||
ImageRepo: "postgres",
|
ImageRepo: "postgres",
|
||||||
ImageTag: version,
|
ImageTag: version,
|
||||||
Env: []string{"POSTGRES_PASSWORD=secret", "POSTGRES_DB=database"},
|
Env: []string{
|
||||||
Ports: []string{"5432/tcp"},
|
"POSTGRES_PASSWORD=" + password,
|
||||||
|
"POSTGRES_DB=" + db,
|
||||||
|
},
|
||||||
|
Ports: []string{"5432/tcp"},
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Could not start docker Postgres: %s", err)
|
t.Fatalf("Could not start docker Postgres: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
svc, err := runner.StartService(context.Background(), connectPostgres)
|
svc, err := runner.StartService(context.Background(), connectPostgres(password))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Could not start docker Postgres: %s", err)
|
t.Fatalf("Could not start docker Postgres: %s", err)
|
||||||
}
|
}
|
||||||
|
@ -37,24 +49,26 @@ func PrepareTestContainer(t *testing.T, version string) (func(), string) {
|
||||||
return svc.Cleanup, svc.Config.URL().String()
|
return svc.Cleanup, svc.Config.URL().String()
|
||||||
}
|
}
|
||||||
|
|
||||||
func connectPostgres(ctx context.Context, host string, port int) (docker.ServiceConfig, error) {
|
func connectPostgres(password string) docker.ServiceAdapter {
|
||||||
u := url.URL{
|
return func(ctx context.Context, host string, port int) (docker.ServiceConfig, error) {
|
||||||
Scheme: "postgres",
|
u := url.URL{
|
||||||
User: url.UserPassword("postgres", "secret"),
|
Scheme: "postgres",
|
||||||
Host: fmt.Sprintf("%s:%d", host, port),
|
User: url.UserPassword("postgres", password),
|
||||||
Path: "postgres",
|
Host: fmt.Sprintf("%s:%d", host, port),
|
||||||
RawQuery: "sslmode=disable",
|
Path: "postgres",
|
||||||
}
|
RawQuery: "sslmode=disable",
|
||||||
|
}
|
||||||
|
|
||||||
db, err := sql.Open("postgres", u.String())
|
db, err := sql.Open("postgres", u.String())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
defer db.Close()
|
defer db.Close()
|
||||||
|
|
||||||
err = db.Ping()
|
err = db.Ping()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
}
|
||||||
|
return docker.NewServiceURL(u), nil
|
||||||
}
|
}
|
||||||
return docker.NewServiceURL(u), nil
|
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue