|
1 | 1 | # Copyright Amazon.com Inc. or its affiliates. All Rights Reserved. |
2 | 2 | # SPDX-License-Identifier: Apache-2.0 |
3 | 3 | """Unit test suite for aws_encryption_sdk.internal.formatting.serialize""" |
| 4 | +import io |
| 5 | +import struct |
| 6 | + |
4 | 7 | import pytest |
5 | 8 | from mock import MagicMock, patch, sentinel |
6 | 9 |
|
| 10 | +import aws_encryption_sdk.internal.formatting.deserialize |
7 | 11 | import aws_encryption_sdk.internal.formatting.serialize |
8 | 12 | from aws_encryption_sdk.exceptions import SerializationError |
9 | 13 | from aws_encryption_sdk.identifiers import ContentAADString, SerializationVersion |
|
15 | 19 |
|
16 | 20 | pytestmark = [pytest.mark.unit, pytest.mark.local] |
17 | 21 |
|
| 22 | +provider_input_strings = ["", "abc", "𐀂", "abc𐀂", "𐀂abc", "秘密代码", "abc秘密代码", "秘密代码abc", "秘密代码abc𐀂", "𐀂abc秘密代码123𐀂"] |
| 23 | + |
18 | 24 |
|
19 | 25 | @pytest.mark.parametrize( |
20 | 26 | "sequence_number, error_message", |
@@ -80,6 +86,146 @@ def apply_fixtures(self): |
80 | 86 | self.mock_encrypt_patcher.stop() |
81 | 87 | self.mock_valid_frame_length_patcher.stop() |
82 | 88 |
|
| 89 | + @pytest.mark.parametrize("provider_id", provider_input_strings) |
| 90 | + @pytest.mark.parametrize("provider_info", provider_input_strings) |
| 91 | + def test_GIVEN_valid_encrypted_data_key_WHEN_serialize_encrypted_data_key_THEN_deserialize_equals_input( |
| 92 | + self, |
| 93 | + provider_id, |
| 94 | + provider_info, |
| 95 | + ): |
| 96 | + # Given: Some valid encrypted data key |
| 97 | + key_provider = MasterKeyInfo(provider_id=provider_id, key_info=provider_info) |
| 98 | + encrypted_data_key = EncryptedDataKey( |
| 99 | + key_provider=key_provider, encrypted_data_key=VALUES["encrypted_data_key"] |
| 100 | + ) |
| 101 | + |
| 102 | + # When: serialize_encrypted_data_key |
| 103 | + serialized_edk = aws_encryption_sdk.internal.formatting.serialize.serialize_encrypted_data_key( |
| 104 | + encrypted_data_key=encrypted_data_key |
| 105 | + ) |
| 106 | + |
| 107 | + # Then: Can deserialize the value |
| 108 | + serialized_edks = bytes() |
| 109 | + # Hardcode to have only 1 EDK |
| 110 | + serialized_edks += struct.pack(">H", 1) |
| 111 | + serialized_edks += serialized_edk |
| 112 | + # Deserialization must not raise exception |
| 113 | + deserialized = aws_encryption_sdk.internal.formatting.deserialize.deserialize_encrypted_data_keys( |
| 114 | + stream=io.BytesIO(serialized_edks) |
| 115 | + ) |
| 116 | + assert deserialized == {encrypted_data_key} |
| 117 | + assert len(deserialized) == 1 |
| 118 | + deserialized_edk = list(deserialized)[0] |
| 119 | + assert deserialized_edk.key_provider == encrypted_data_key.key_provider |
| 120 | + assert deserialized_edk.key_provider.provider_id == encrypted_data_key.key_provider.provider_id |
| 121 | + assert deserialized_edk.key_provider.key_info == encrypted_data_key.key_provider.key_info |
| 122 | + assert deserialized_edk.encrypted_data_key == encrypted_data_key.encrypted_data_key |
| 123 | + |
| 124 | + @pytest.mark.parametrize("edk_1_provider_id", provider_input_strings) |
| 125 | + @pytest.mark.parametrize("edk_1_provider_info", provider_input_strings) |
| 126 | + @pytest.mark.parametrize("edk_2_provider_id", provider_input_strings) |
| 127 | + @pytest.mark.parametrize("edk_2_provider_info", provider_input_strings) |
| 128 | + def test_GIVEN_two_distinct_valid_encrypted_data_keys_WHEN_serialize_encrypted_data_keys_THEN_deserialize_equals_inputs( # noqa pylint: disable=line-too-long |
| 129 | + self, |
| 130 | + edk_1_provider_id, |
| 131 | + edk_1_provider_info, |
| 132 | + edk_2_provider_id, |
| 133 | + edk_2_provider_info, |
| 134 | + ): |
| 135 | + # pylint: disable=too-many-locals |
| 136 | + # Given: Two distinct valid encrypted data keys |
| 137 | + edk_1_key_provider = MasterKeyInfo(provider_id=edk_1_provider_id, key_info=edk_1_provider_info) |
| 138 | + encrypted_data_key_1 = EncryptedDataKey( |
| 139 | + key_provider=edk_1_key_provider, encrypted_data_key=VALUES["encrypted_data_key"] |
| 140 | + ) |
| 141 | + |
| 142 | + edk_2_key_provider = MasterKeyInfo(provider_id=edk_2_provider_id, key_info=edk_2_provider_info) |
| 143 | + encrypted_data_key_2 = EncryptedDataKey( |
| 144 | + key_provider=edk_2_key_provider, encrypted_data_key=VALUES["encrypted_data_key"] |
| 145 | + ) |
| 146 | + |
| 147 | + # Must be distinct |
| 148 | + if encrypted_data_key_1 == encrypted_data_key_2: |
| 149 | + return |
| 150 | + |
| 151 | + # When: serialize_encrypted_data_key |
| 152 | + serialized_edk_1 = aws_encryption_sdk.internal.formatting.serialize.serialize_encrypted_data_key( |
| 153 | + encrypted_data_key=encrypted_data_key_1 |
| 154 | + ) |
| 155 | + serialized_edk_2 = aws_encryption_sdk.internal.formatting.serialize.serialize_encrypted_data_key( |
| 156 | + encrypted_data_key=encrypted_data_key_2 |
| 157 | + ) |
| 158 | + |
| 159 | + # Then: Can deserialize the value |
| 160 | + serialized_edks = bytes() |
| 161 | + # Hardcode to have only 2 EDKs |
| 162 | + serialized_edks += struct.pack(">H", 2) |
| 163 | + serialized_edks += serialized_edk_1 |
| 164 | + serialized_edks += serialized_edk_2 |
| 165 | + # Deserialization must not raise exception |
| 166 | + deserialized = aws_encryption_sdk.internal.formatting.deserialize.deserialize_encrypted_data_keys( |
| 167 | + stream=io.BytesIO(serialized_edks) |
| 168 | + ) |
| 169 | + assert deserialized == {encrypted_data_key_1, encrypted_data_key_2} |
| 170 | + assert len(deserialized) == 2 |
| 171 | + deserialized_edk_list = list(deserialized) |
| 172 | + |
| 173 | + deserialized_edk_some = deserialized_edk_list[0] |
| 174 | + deserialized_edk_other = deserialized_edk_list[1] |
| 175 | + |
| 176 | + assert ( |
| 177 | + (deserialized_edk_some == encrypted_data_key_1 and deserialized_edk_other == encrypted_data_key_2) |
| 178 | + or (deserialized_edk_some == encrypted_data_key_2 and deserialized_edk_other == encrypted_data_key_1) |
| 179 | + ) |
| 180 | + |
| 181 | + def test_GIVEN_invalid_encrypted_data_key_WHEN_serialize_THEN_raises_UnicodeEncodeError( |
| 182 | + self, |
| 183 | + ): |
| 184 | + # Given: Some invalid encrypted data key |
| 185 | + |
| 186 | + # This is invalid because "\ud800\udc02" cannot be encoded to UTF-8. |
| 187 | + # This value MUST be able to be encoded to UTF-8, or serialization will fail. |
| 188 | + invalid_provider_string = "\ud800\udc02" |
| 189 | + |
| 190 | + # Then: raises UnicodeEncodeError |
| 191 | + with pytest.raises(UnicodeEncodeError): |
| 192 | + key_provider = MasterKeyInfo(provider_id=invalid_provider_string, key_info=invalid_provider_string) |
| 193 | + |
| 194 | + encrypted_data_key = EncryptedDataKey( |
| 195 | + key_provider=key_provider, encrypted_data_key=VALUES["encrypted_data_key"] |
| 196 | + ) |
| 197 | + |
| 198 | + # When: serialize_encrypted_data_key |
| 199 | + aws_encryption_sdk.internal.formatting.serialize.serialize_encrypted_data_key( |
| 200 | + encrypted_data_key=encrypted_data_key |
| 201 | + ) |
| 202 | + |
| 203 | + # Then: raises UnicodeEncodeError |
| 204 | + with pytest.raises(UnicodeEncodeError): |
| 205 | + key_provider = MasterKeyInfo(provider_id=invalid_provider_string, key_info="abc") |
| 206 | + |
| 207 | + encrypted_data_key = EncryptedDataKey( |
| 208 | + key_provider=key_provider, encrypted_data_key=VALUES["encrypted_data_key"] |
| 209 | + ) |
| 210 | + |
| 211 | + # When: serialize_encrypted_data_key |
| 212 | + aws_encryption_sdk.internal.formatting.serialize.serialize_encrypted_data_key( |
| 213 | + encrypted_data_key=encrypted_data_key |
| 214 | + ) |
| 215 | + |
| 216 | + # Then: raises UnicodeEncodeError |
| 217 | + with pytest.raises(UnicodeEncodeError): |
| 218 | + key_provider = MasterKeyInfo(provider_id="abc", key_info=invalid_provider_string) |
| 219 | + |
| 220 | + encrypted_data_key = EncryptedDataKey( |
| 221 | + key_provider=key_provider, encrypted_data_key=VALUES["encrypted_data_key"] |
| 222 | + ) |
| 223 | + |
| 224 | + # When: serialize_encrypted_data_key |
| 225 | + aws_encryption_sdk.internal.formatting.serialize.serialize_encrypted_data_key( |
| 226 | + encrypted_data_key=encrypted_data_key |
| 227 | + ) |
| 228 | + |
83 | 229 | def test_serialize_header_v1(self): |
84 | 230 | """Validate that the _serialize_header function |
85 | 231 | behaves as expected. |
|
0 commit comments