[Bug 1946787] Re: [SRU] Fix inconsistent encoding secret encoding
Edward Hope-Morley
1946787 at bugs.launchpad.net
Tue Nov 23 11:37:49 UTC 2021
focal-ussuri-proposed verified using [Test Case] and output is:
# apt-cache policy python3-barbican
python3-barbican:
Installed: 1:10.1.0-0ubuntu2
Candidate: 1:10.1.0-0ubuntu2
Version table:
*** 1:10.1.0-0ubuntu2 500
500 http://archive.ubuntu.com/ubuntu focal-proposed/main amd64 Packages
100 /var/lib/dpkg/status
1:10.1.0-0ubuntu1 500
500 http://nova.clouds.archive.ubuntu.com/ubuntu focal-updates/main amd64 Packages
1:10.0.0~b2~git2020020508.7b14d983-0ubuntu3 500
500 http://nova.clouds.archive.ubuntu.com/ubuntu focal/main amd64 Packages
# virsh dumpxml instance-00000001| grep -A 10 "device='disk'"| grep encryption
<encryption format='luks'>
$ sudo mkfs.ext4 /dev/vdb
$ sudo mount /dev/vdb /mnt/
$ echo "I'm feeling luksy"| sudo tee /mnt/secure
I'm feeling luksy
$ cat /mnt/secure
I'm feeling luksy
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Ubuntu
OpenStack, which is subscribed to Ubuntu Cloud Archive.
https://bugs.launchpad.net/bugs/1946787
Title:
[SRU] Fix inconsistent encoding secret encoding
Status in Ubuntu Cloud Archive:
Fix Released
Status in Ubuntu Cloud Archive ussuri series:
Fix Committed
Status in Ubuntu Cloud Archive victoria series:
Fix Released
Status in Ubuntu Cloud Archive wallaby series:
Fix Released
Status in Ubuntu Cloud Archive xena series:
Fix Released
Status in barbican package in Ubuntu:
Fix Released
Status in barbican source package in Focal:
Fix Committed
Status in barbican source package in Hirsute:
Fix Released
Status in barbican source package in Impish:
Fix Released
Bug description:
[Impact]
This SRU corresponds with the following story for upstream barbican
https://storyboard.openstack.org/#!/story/2008335.
The problem is some secrets were stored in plaintext and some were
stored encoded. This resulted in the inability to decode some secrets.
This is fixed by always storing secrets in plaintext and decoding
inconsistently stored data as needed when getting secrets.
[Test Case]
* deploy Openstack with Barbican using Vault as a backend
* openstack volume type create --encryption-provider nova.volume.encryptors.luks.LuksEncryptor --encryption-cipher aes-xts-plain64 --encryption-key-size 256 --encryption-control-location front-end LUKS
* openstack volume create --size 1 --type LUKS luks_vol1
* ensure volume created successfully
* openstack volume show luks_vol1
* create vm and attach volume
* mkfs and mount then test can read/write
[Where things could go wrong]
If things were to go wrong it would probably be in the get_secret() method which calls _ensure_legacy_base64(). _ensure_legacy_base64() assumes that anything that is not a key was stored base64 encoded. Presumably this is correct, but there was a path added to catch a UnicodeDecodeError exception to handle unexpected non-base64-encoded secrets.
To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1946787/+subscriptions
More information about the Ubuntu-openstack-bugs
mailing list