Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix logging issue #105

Merged
merged 2 commits into from
Nov 15, 2018
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 7 additions & 1 deletion CHANGELOG.rst
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,15 @@
Changelog
*********

1.3.8 -- 2018-xx-xx
1.3.8 -- 2018-11-15
===================

Bugfixes
--------

* Remove debug logging that may contain input data when encrypting non-default unframed messages.
`#105 </~https://github.com/aws/aws-encryption-sdk-python/pull/105>`_

Minor
-----

Expand Down
2 changes: 1 addition & 1 deletion src/aws_encryption_sdk/identifiers.py
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@

from aws_encryption_sdk.exceptions import InvalidAlgorithmError

__version__ = "1.3.7"
__version__ = "1.3.8"
USER_AGENT_SUFFIX = "AwsEncryptionSdkPython/{}".format(__version__)


Expand Down
11 changes: 6 additions & 5 deletions src/aws_encryption_sdk/streaming_client.py
Original file line number Diff line number Diff line change
Expand Up @@ -502,18 +502,19 @@ def _read_bytes_to_non_framed_body(self, b):
:returns: Encrypted bytes from source stream
:rtype: bytes
"""
_LOGGER.debug("Reading %s bytes", b)
_LOGGER.debug("Reading %d bytes", b)
plaintext = self.source_stream.read(b)
plaintext_length = len(plaintext)
if self.tell() + len(plaintext) > MAX_NON_FRAMED_SIZE:
raise SerializationError("Source too large for non-framed message")

ciphertext = self.encryptor.update(plaintext)
self._bytes_encrypted += len(plaintext)
self._bytes_encrypted += plaintext_length
if self.signer is not None:
self.signer.update(ciphertext)

if len(plaintext) < b:
_LOGGER.debug("Closing encryptor after receiving only %s bytes of %s bytes requested", plaintext, b)
_LOGGER.debug("Closing encryptor after receiving only %d bytes of %d bytes requested", plaintext_length, b)
self.source_stream.close()
closing = self.encryptor.finalize()

Expand Down Expand Up @@ -620,8 +621,8 @@ def _read_bytes(self, b):
# must not exceed that value.
if self._bytes_encrypted > self.config.source_length:
raise CustomMaximumValueExceeded(
"Bytes encrypted has exceeded stated source length estimate:\n{actual} > {estimated}".format(
actual=self._bytes_encrypted, estimated=self.config.source
"Bytes encrypted has exceeded stated source length estimate:\n{actual:d} > {estimated:d}".format(
actual=self._bytes_encrypted, estimated=self.config.source_length
)
)

Expand Down
60 changes: 59 additions & 1 deletion test/functional/test_f_aws_encryption_sdk_client.py
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,10 @@
# ANY KIND, either express or implied. See the License for the specific
# language governing permissions and limitations under the License.
"""Functional test suite for aws_encryption_sdk.kms_thick_client"""
from __future__ import division

import io
import logging

import attr
import botocore.client
Expand All @@ -28,6 +31,7 @@
from aws_encryption_sdk.exceptions import CustomMaximumValueExceeded
from aws_encryption_sdk.identifiers import Algorithm, EncryptionKeyType, WrappingAlgorithm
from aws_encryption_sdk.internal.crypto.wrapping_keys import WrappingKey
from aws_encryption_sdk.internal.defaults import LINE_LENGTH
from aws_encryption_sdk.internal.formatting.encryption_context import serialize_encryption_context
from aws_encryption_sdk.key_providers.base import MasterKeyProviderConfig
from aws_encryption_sdk.key_providers.raw import RawMasterKeyProvider
Expand Down Expand Up @@ -498,12 +502,14 @@ def test_encryption_cycle_with_caching():
def test_encrypt_source_length_enforcement():
key_provider = fake_kms_key_provider()
cmm = aws_encryption_sdk.DefaultCryptoMaterialsManager(key_provider)
plaintext = io.BytesIO(VALUES["plaintext_128"])
with pytest.raises(CustomMaximumValueExceeded) as excinfo:
aws_encryption_sdk.encrypt(
source=VALUES["plaintext_128"], materials_manager=cmm, source_length=int(len(VALUES["plaintext_128"]) / 2)
source=plaintext, materials_manager=cmm, source_length=int(len(VALUES["plaintext_128"]) / 2)
)

excinfo.match(r"Bytes encrypted has exceeded stated source length estimate:*")
assert repr(plaintext) not in excinfo.exconly()


def test_encrypt_source_length_enforcement_legacy_support():
Expand Down Expand Up @@ -669,3 +675,55 @@ def test_incomplete_read_stream_cycle(frame_length):
)

assert ciphertext != decrypted == plaintext


def _prep_plaintext_and_logs(log_catcher, plaintext_length):
log_catcher.set_level(logging.DEBUG)
key_provider = fake_kms_key_provider()
plaintext = exact_length_plaintext(plaintext_length)
return plaintext, key_provider


def _look_in_logs(log_catcher, plaintext):
logs = log_catcher.text
# look for every possible 32-byte chunk
start = 0
end = 32
plaintext_length = len(plaintext)
while end <= plaintext_length:
chunk_repr = repr(plaintext[start:end])
repr_body = chunk_repr[2:-1]
assert repr_body not in logs
start += 1
end += 1


@pytest.mark.parametrize("frame_size", (0, LINE_LENGTH // 2, LINE_LENGTH, LINE_LENGTH * 2))
@pytest.mark.parametrize(
"plaintext_length", (1, LINE_LENGTH // 2, LINE_LENGTH, int(LINE_LENGTH * 1.5), LINE_LENGTH * 2)
)
def test_plaintext_logs_oneshot(caplog, plaintext_length, frame_size):
plaintext, key_provider = _prep_plaintext_and_logs(caplog, plaintext_length)

_ciphertext, _header = aws_encryption_sdk.encrypt(
source=plaintext, key_provider=key_provider, frame_length=frame_size
)

_look_in_logs(caplog, plaintext)


@pytest.mark.parametrize("frame_size", (0, LINE_LENGTH // 2, LINE_LENGTH, LINE_LENGTH * 2))
@pytest.mark.parametrize(
"plaintext_length", (1, LINE_LENGTH // 2, LINE_LENGTH, int(LINE_LENGTH * 1.5), LINE_LENGTH * 2)
)
def test_plaintext_logs_stream(caplog, plaintext_length, frame_size):
plaintext, key_provider = _prep_plaintext_and_logs(caplog, plaintext_length)

ciphertext = b""
with aws_encryption_sdk.stream(
mode="encrypt", source=plaintext, key_provider=key_provider, frame_length=frame_size
) as encryptor:
for line in encryptor:
ciphertext += line

_look_in_logs(caplog, plaintext)