mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-12-04 20:20:19 +00:00
f84d43c6d1
Bumps [github.com/google/fscrypt](https://github.com/google/fscrypt) from 0.3.3 to 0.3.4. - [Release notes](https://github.com/google/fscrypt/releases) - [Changelog](https://github.com/google/fscrypt/blob/master/NEWS.md) - [Commits](https://github.com/google/fscrypt/compare/v0.3.3...v0.3.4) --- updated-dependencies: - dependency-name: github.com/google/fscrypt dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>
242 lines
6.8 KiB
Go
242 lines
6.8 KiB
Go
/*
|
|
* checks.go - Some sanity check methods for our metadata structures
|
|
*
|
|
* Copyright 2017 Google Inc.
|
|
* Author: Joe Richey (joerichey@google.com)
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may not
|
|
* use this file except in compliance with the License. You may obtain a copy of
|
|
* the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
* License for the specific language governing permissions and limitations under
|
|
* the License.
|
|
*/
|
|
|
|
package metadata
|
|
|
|
import (
|
|
"log"
|
|
"math"
|
|
|
|
"github.com/pkg/errors"
|
|
"google.golang.org/protobuf/proto"
|
|
|
|
"github.com/google/fscrypt/util"
|
|
)
|
|
|
|
var errNotInitialized = errors.New("not initialized")
|
|
|
|
// Metadata is the interface to all of the protobuf structures that can be
|
|
// checked for validity.
|
|
type Metadata interface {
|
|
CheckValidity() error
|
|
proto.Message
|
|
}
|
|
|
|
// CheckValidity ensures the mode has a name and isn't empty.
|
|
func (m EncryptionOptions_Mode) CheckValidity() error {
|
|
if m == EncryptionOptions_default {
|
|
return errNotInitialized
|
|
}
|
|
if m.String() == "" {
|
|
return errors.Errorf("unknown %d", m)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CheckValidity ensures the source has a name and isn't empty.
|
|
func (s SourceType) CheckValidity() error {
|
|
if s == SourceType_default {
|
|
return errNotInitialized
|
|
}
|
|
if s.String() == "" {
|
|
return errors.Errorf("unknown %d", s)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// MaxParallelism is the maximum allowed value for HashingCosts.Parallelism.
|
|
const MaxParallelism = math.MaxUint8
|
|
|
|
// CheckValidity ensures the hash costs will be accepted by Argon2.
|
|
func (h *HashingCosts) CheckValidity() error {
|
|
if h == nil {
|
|
return errNotInitialized
|
|
}
|
|
|
|
minP := int64(1)
|
|
p := uint8(h.Parallelism)
|
|
if h.Parallelism < minP || h.Parallelism > MaxParallelism {
|
|
if h.TruncationFixed || p == 0 {
|
|
return errors.Errorf("parallelism cost %d is not in range [%d, %d]",
|
|
h.Parallelism, minP, MaxParallelism)
|
|
}
|
|
// Previously we unconditionally casted costs.Parallelism to a uint8,
|
|
// so we replicate this behavior for backwards compatibility.
|
|
log.Printf("WARNING: Truncating parallelism cost of %d to %d", h.Parallelism, p)
|
|
}
|
|
|
|
minT := int64(1)
|
|
maxT := int64(math.MaxUint32)
|
|
if h.Time < minT || h.Time > maxT {
|
|
return errors.Errorf("time cost %d is not in range [%d, %d]", h.Time, minT, maxT)
|
|
}
|
|
|
|
minM := 8 * int64(p)
|
|
maxM := int64(math.MaxUint32)
|
|
if h.Memory < minM || h.Memory > maxM {
|
|
return errors.Errorf("memory cost %d KiB is not in range [%d, %d]", h.Memory, minM, maxM)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CheckValidity ensures our buffers are the correct length.
|
|
func (w *WrappedKeyData) CheckValidity() error {
|
|
if w == nil {
|
|
return errNotInitialized
|
|
}
|
|
if len(w.EncryptedKey) == 0 {
|
|
return errors.Wrap(errNotInitialized, "encrypted key")
|
|
}
|
|
if err := util.CheckValidLength(IVLen, len(w.IV)); err != nil {
|
|
return errors.Wrap(err, "IV")
|
|
}
|
|
return errors.Wrap(util.CheckValidLength(HMACLen, len(w.Hmac)), "HMAC")
|
|
}
|
|
|
|
// CheckValidity ensures our ProtectorData has the correct fields for its source.
|
|
func (p *ProtectorData) CheckValidity() error {
|
|
if p == nil {
|
|
return errNotInitialized
|
|
}
|
|
|
|
if err := p.Source.CheckValidity(); err != nil {
|
|
return errors.Wrap(err, "protector source")
|
|
}
|
|
|
|
// Source specific checks
|
|
switch p.Source {
|
|
case SourceType_pam_passphrase:
|
|
if p.Uid < 0 {
|
|
return errors.Errorf("UID=%d is negative", p.Uid)
|
|
}
|
|
fallthrough
|
|
case SourceType_custom_passphrase:
|
|
if err := p.Costs.CheckValidity(); err != nil {
|
|
return errors.Wrap(err, "passphrase hashing costs")
|
|
}
|
|
if err := util.CheckValidLength(SaltLen, len(p.Salt)); err != nil {
|
|
return errors.Wrap(err, "passphrase hashing salt")
|
|
}
|
|
}
|
|
|
|
// Generic checks
|
|
if err := p.WrappedKey.CheckValidity(); err != nil {
|
|
return errors.Wrap(err, "wrapped protector key")
|
|
}
|
|
if err := util.CheckValidLength(ProtectorDescriptorLen, len(p.ProtectorDescriptor)); err != nil {
|
|
return errors.Wrap(err, "protector descriptor")
|
|
|
|
}
|
|
err := util.CheckValidLength(InternalKeyLen, len(p.WrappedKey.EncryptedKey))
|
|
return errors.Wrap(err, "encrypted protector key")
|
|
}
|
|
|
|
// CheckValidity ensures each of the options is valid.
|
|
func (e *EncryptionOptions) CheckValidity() error {
|
|
if e == nil {
|
|
return errNotInitialized
|
|
}
|
|
if _, ok := util.Index(e.Padding, paddingArray); !ok {
|
|
return errors.Errorf("padding of %d is invalid", e.Padding)
|
|
}
|
|
if err := e.Contents.CheckValidity(); err != nil {
|
|
return errors.Wrap(err, "contents encryption mode")
|
|
}
|
|
if err := e.Filenames.CheckValidity(); err != nil {
|
|
return errors.Wrap(err, "filenames encryption mode")
|
|
}
|
|
// If PolicyVersion is unset, treat it as 1.
|
|
if e.PolicyVersion == 0 {
|
|
e.PolicyVersion = 1
|
|
}
|
|
if e.PolicyVersion != 1 && e.PolicyVersion != 2 {
|
|
return errors.Errorf("policy version of %d is invalid", e.PolicyVersion)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CheckValidity ensures the fields are valid and have the correct lengths.
|
|
func (w *WrappedPolicyKey) CheckValidity() error {
|
|
if w == nil {
|
|
return errNotInitialized
|
|
}
|
|
if err := w.WrappedKey.CheckValidity(); err != nil {
|
|
return errors.Wrap(err, "wrapped key")
|
|
}
|
|
if err := util.CheckValidLength(PolicyKeyLen, len(w.WrappedKey.EncryptedKey)); err != nil {
|
|
return errors.Wrap(err, "encrypted key")
|
|
}
|
|
err := util.CheckValidLength(ProtectorDescriptorLen, len(w.ProtectorDescriptor))
|
|
return errors.Wrap(err, "wrapping protector descriptor")
|
|
}
|
|
|
|
// CheckValidity ensures the fields and each wrapped key are valid.
|
|
func (p *PolicyData) CheckValidity() error {
|
|
if p == nil {
|
|
return errNotInitialized
|
|
}
|
|
// Check each wrapped key
|
|
for i, w := range p.WrappedPolicyKeys {
|
|
if err := w.CheckValidity(); err != nil {
|
|
return errors.Wrapf(err, "policy key slot %d", i)
|
|
}
|
|
}
|
|
|
|
if err := p.Options.CheckValidity(); err != nil {
|
|
return errors.Wrap(err, "policy options")
|
|
}
|
|
|
|
var expectedLen int
|
|
switch p.Options.PolicyVersion {
|
|
case 1:
|
|
expectedLen = PolicyDescriptorLenV1
|
|
case 2:
|
|
expectedLen = PolicyDescriptorLenV2
|
|
default:
|
|
return errors.Errorf("policy version of %d is invalid", p.Options.PolicyVersion)
|
|
}
|
|
|
|
if err := util.CheckValidLength(expectedLen, len(p.KeyDescriptor)); err != nil {
|
|
return errors.Wrap(err, "policy key descriptor")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// CheckValidity ensures the Config has all the necessary info for its Source.
|
|
func (c *Config) CheckValidity() error {
|
|
// General checks
|
|
if c == nil {
|
|
return errNotInitialized
|
|
}
|
|
if err := c.Source.CheckValidity(); err != nil {
|
|
return errors.Wrap(err, "default config source")
|
|
}
|
|
|
|
// Source specific checks
|
|
switch c.Source {
|
|
case SourceType_pam_passphrase, SourceType_custom_passphrase:
|
|
if err := c.HashCosts.CheckValidity(); err != nil {
|
|
return errors.Wrap(err, "config hashing costs")
|
|
}
|
|
}
|
|
|
|
return errors.Wrap(c.Options.CheckValidity(), "config options")
|
|
}
|