google-nomulus/javatests/google/registry/testing/FakeKeyringModule.java
mcilwain f0c677b18b Rename DNL and SMDRL "login" to "loginAndPassword"
They are passed around in the format username:password, whereas just saying
"login" implies it's just a username and not necessarily also a secret
password. Putting password in the variable name makes it obvious what this is
and reduces the likelihood of anyone ever logging it or otherwise using it
inappropriately.

Note that this does not require data migrations as the actual key used to store
the data in KMS remains unchanged.

This is a follow-up to []

-------------
Created by MOE: https://github.com/google/moe
MOE_MIGRATED_REVID=231253964
2019-01-28 16:15:04 -05:00

173 lines
6.2 KiB
Java

// Copyright 2017 The Nomulus Authors. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package google.registry.testing;
import static google.registry.keyring.api.PgpHelper.KeyRequirement.ENCRYPT;
import static google.registry.keyring.api.PgpHelper.KeyRequirement.SIGN;
import static google.registry.testing.TestDataHelper.loadBytes;
import static google.registry.testing.TestDataHelper.loadFile;
import com.google.common.io.ByteSource;
import dagger.Module;
import dagger.Provides;
import google.registry.keyring.api.Keyring;
import google.registry.keyring.api.PgpHelper;
import google.registry.keyring.api.PgpHelper.KeyRequirement;
import java.io.IOException;
import java.io.InputStream;
import javax.annotation.concurrent.Immutable;
import org.bouncycastle.openpgp.PGPException;
import org.bouncycastle.openpgp.PGPKeyPair;
import org.bouncycastle.openpgp.PGPPrivateKey;
import org.bouncycastle.openpgp.PGPPublicKey;
import org.bouncycastle.openpgp.PGPPublicKeyRingCollection;
import org.bouncycastle.openpgp.PGPSecretKeyRingCollection;
import org.bouncycastle.openpgp.PGPUtil;
import org.bouncycastle.openpgp.bc.BcPGPPublicKeyRingCollection;
import org.bouncycastle.openpgp.bc.BcPGPSecretKeyRingCollection;
/** Keyring factory that loads keys from {@code javatests/.../testing/testdata} */
@Module
@Immutable
public final class FakeKeyringModule {
private static final String STAGING_KEY_EMAIL = "rde-unittest@registry.test";
private static final String SIGNING_KEY_EMAIL = "rde-unittest@registry.test";
private static final String RECEIVER_KEY_EMAIL = "rde-unittest@escrow.test";
private static final ByteSource PGP_PUBLIC_KEYRING =
loadBytes(FakeKeyringModule.class, "pgp-public-keyring.asc");
private static final ByteSource PGP_PRIVATE_KEYRING =
loadBytes(FakeKeyringModule.class, "pgp-private-keyring-registry.asc");
private static final String ICANN_REPORTING_PASSWORD = "yolo";
private static final String SAFE_BROWSING_API_KEY = "a/b_c";
private static final String MARKSDB_DNL_LOGIN_AND_PASSWORD = "dnl:yolo";
private static final String MARKSDB_LORDN_PASSWORD = "yolo";
private static final String MARKSDB_SMDRL_LOGIN_AND_PASSWORD = "smdrl:yolo";
private static final String JSON_CREDENTIAL = "json123";
@Provides
public Keyring get() {
PGPPublicKeyRingCollection publics;
PGPSecretKeyRingCollection privates;
try (InputStream publicInput = PGP_PUBLIC_KEYRING.openStream();
InputStream privateInput = PGP_PRIVATE_KEYRING.openStream()) {
publics = new BcPGPPublicKeyRingCollection(PGPUtil.getDecoderStream(publicInput));
privates = new BcPGPSecretKeyRingCollection(PGPUtil.getDecoderStream(privateInput));
} catch (PGPException e) {
throw new RuntimeException("Failed to load PGP keyrings from jar", e);
} catch (IOException e) {
throw new RuntimeException(e);
}
final PGPKeyPair rdeStagingKey =
PgpHelper.lookupKeyPair(publics, privates, STAGING_KEY_EMAIL, ENCRYPT);
final PGPKeyPair rdeSigningKey =
PgpHelper.lookupKeyPair(publics, privates, SIGNING_KEY_EMAIL, SIGN);
final PGPPublicKey rdeReceiverKey =
PgpHelper.lookupPublicKey(publics, RECEIVER_KEY_EMAIL, ENCRYPT);
final String sshPublic = loadFile(FakeKeyringModule.class, "registry-unittest.id_rsa.pub");
final String sshPrivate = loadFile(FakeKeyringModule.class, "registry-unittest.id_rsa");
return new Keyring() {
@Override
public PGPPublicKey getRdeStagingEncryptionKey() {
return rdeStagingKey.getPublicKey();
}
@Override
public PGPPrivateKey getRdeStagingDecryptionKey() {
return rdeStagingKey.getPrivateKey();
}
@Override
public String getRdeSshClientPublicKey() {
return sshPublic;
}
@Override
public String getRdeSshClientPrivateKey() {
return sshPrivate;
}
@Override
public PGPKeyPair getRdeSigningKey() {
return rdeSigningKey;
}
@Override
public PGPPublicKey getRdeReceiverKey() {
return rdeReceiverKey;
}
@Override
public String getMarksdbSmdrlLoginAndPassword() {
return MARKSDB_SMDRL_LOGIN_AND_PASSWORD;
}
@Override
public String getMarksdbLordnPassword() {
return MARKSDB_LORDN_PASSWORD;
}
@Override
public String getMarksdbDnlLoginAndPassword() {
return MARKSDB_DNL_LOGIN_AND_PASSWORD;
}
@Override
public String getJsonCredential() {
return JSON_CREDENTIAL;
}
@Override
public String getIcannReportingPassword() {
return ICANN_REPORTING_PASSWORD;
}
@Override
public String getSafeBrowsingAPIKey() {
return SAFE_BROWSING_API_KEY;
}
@Override
public PGPKeyPair getBrdaSigningKey() {
return rdeSigningKey;
}
@Override
public PGPPublicKey getBrdaReceiverKey() {
return rdeReceiverKey;
}
@Override
public void close() {}
};
}
/** Helper method for loading a specific {@link PGPKeyPair}. */
public PGPKeyPair get(String query, KeyRequirement want) {
PGPPublicKeyRingCollection publics;
PGPSecretKeyRingCollection privates;
try (InputStream publicInput = PGP_PUBLIC_KEYRING.openStream();
InputStream privateInput = PGP_PRIVATE_KEYRING.openStream()) {
publics = new BcPGPPublicKeyRingCollection(PGPUtil.getDecoderStream(publicInput));
privates = new BcPGPSecretKeyRingCollection(PGPUtil.getDecoderStream(privateInput));
} catch (PGPException e) {
throw new RuntimeException("Failed to load PGP keyrings from jar", e);
} catch (IOException e) {
throw new RuntimeException(e);
}
return PgpHelper.lookupKeyPair(publics, privates, query, want);
}
}