Skip to content

Commit 0ea5fce

Browse files
authored
Merge pull request #331 from github/add-encrypted-column-keys
Add encrypted column encryption keys to backup utils
2 parents 1bfa3a9 + 52b3e7b commit 0ea5fce

File tree

4 files changed

+110
-2
lines changed

4 files changed

+110
-2
lines changed

share/github-backup-utils/ghe-backup-settings

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,8 @@ backup-secret "management console password" "manage-password" "secrets.manage"
7878
backup-secret "password pepper" "password-pepper" "secrets.github.user-password-secrets"
7979
backup-secret "kredz.credz HMAC key" "kredz-credz-hmac" "secrets.kredz.credz-hmac-secret"
8080
backup-secret "kredz.varz HMAC key" "kredz-varz-hmac" "secrets.kredz.varz-hmac-secret"
81+
backup-secret "encrypted column encryption keying material" "encrypted-column-encryption-keying-material" "secrets.github.encrypted-column-keying-material"
82+
backup-secret "encrypted column current encryption key" "encrypted-column-current-encryption-key" "secrets.github.encrypted-column-current-encryption-key"
8183

8284
# Backup argon secrets for multiuser from ghes version 3.8 onwards
8385
if [[ "$(version $GHE_REMOTE_VERSION)" -ge "$(version 3.8.0)" && "$(version $GHE_REMOTE_VERSION)" -lt "$(version 3.8.2)" ]]; then

share/github-backup-utils/ghe-restore-settings

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,12 @@ restore-secret "kredz.credz HMAC key" "kredz-credz-hmac" "secrets.kredz.credz-hm
5656
# Restore kredz.varz HMAC key if present.
5757
restore-secret "kredz.varz HMAC key" "kredz-varz-hmac" "secrets.kredz.varz-hmac-secret"
5858

59+
# Restore encrypted column encryption keying material if present
60+
restore-secret "encrypted column encryption keying material" "encrypted-column-encryption-keying-material" "secrets.github.encrypted-column-keying-material"
61+
62+
# Restore encrypted column current encryption key if present
63+
restore-secret "encrypted column current encryption key" "encrypted-column-current-encryption-key" "secrets.github.encrypted-column-current-encryption-key"
64+
5965
# Restore SAML keys if present.
6066
if [ -f "$GHE_RESTORE_SNAPSHOT_PATH/saml-keys.tar" ]; then
6167
log_info "Restoring SAML keys ..."

test/test-ghe-backup.sh

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -555,6 +555,56 @@ begin_test "ghe-backup takes backup of kredz-varz settings"
555555
)
556556
end_test
557557

558+
begin_test "ghe-backup takes backup of encrypted column encryption keying material"
559+
(
560+
set -e
561+
562+
required_secrets=(
563+
"secrets.github.encrypted-column-keying-material"
564+
)
565+
566+
for secret in "${required_secrets[@]}"; do
567+
ghe-ssh "$GHE_HOSTNAME" -- ghe-config "$secret" "foo"
568+
done
569+
570+
ghe-backup
571+
572+
required_files=(
573+
"encrypted-column-encryption-keying-material"
574+
)
575+
576+
for file in "${required_files[@]}"; do
577+
[ "$(cat "$GHE_DATA_DIR/current/$file")" = "foo" ]
578+
done
579+
580+
)
581+
end_test
582+
583+
begin_test "ghe-backup takes backup of encrypted column current encryption key"
584+
(
585+
set -e
586+
587+
required_secrets=(
588+
"secrets.github.encrypted-column-current-encryption-key"
589+
)
590+
591+
for secret in "${required_secrets[@]}"; do
592+
ghe-ssh "$GHE_HOSTNAME" -- ghe-config "$secret" "foo"
593+
done
594+
595+
ghe-backup
596+
597+
required_files=(
598+
"encrypted-column-current-encryption-key"
599+
)
600+
601+
for file in "${required_files[@]}"; do
602+
[ "$(cat "$GHE_DATA_DIR/current/$file")" = "foo" ]
603+
done
604+
605+
)
606+
end_test
607+
558608
begin_test "ghe-backup takes backup of Actions settings"
559609
(
560610
set -e

test/test-ghe-restore.sh

Lines changed: 52 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -281,6 +281,56 @@ begin_test "ghe-restore with no pages backup"
281281
)
282282
end_test
283283

284+
begin_test "ghe-restore with encrypted column encryption keying material"
285+
(
286+
set -e
287+
rm -rf "$GHE_REMOTE_ROOT_DIR"
288+
setup_remote_metadata
289+
290+
required_files=(
291+
"encrypted-column-encryption-keying-material"
292+
)
293+
294+
for file in "${required_files[@]}"; do
295+
echo "foo" > "$GHE_DATA_DIR/current/$file"
296+
done
297+
298+
ghe-restore -v -f localhost
299+
required_secrets=(
300+
"secrets.github.encrypted-column-keying-material"
301+
)
302+
303+
for secret in "${required_secrets[@]}"; do
304+
[ "$(ghe-ssh "$GHE_HOSTNAME" -- ghe-config "$secret")" = "foo" ]
305+
done
306+
)
307+
end_test
308+
309+
begin_test "ghe-restore with encrypted column current encryption key"
310+
(
311+
set -e
312+
rm -rf "$GHE_REMOTE_ROOT_DIR"
313+
setup_remote_metadata
314+
315+
required_files=(
316+
"encrypted-column-current-encryption-key"
317+
)
318+
319+
for file in "${required_files[@]}"; do
320+
echo "foo" > "$GHE_DATA_DIR/current/$file"
321+
done
322+
323+
ghe-restore -v -f localhost
324+
required_secrets=(
325+
"secrets.github.encrypted-column-current-encryption-key"
326+
)
327+
328+
for secret in "${required_secrets[@]}"; do
329+
[ "$(ghe-ssh "$GHE_HOSTNAME" -- ghe-config "$secret")" = "foo" ]
330+
done
331+
)
332+
end_test
333+
284334
# Setup Actions data for the subsequent tests
285335
setup_actions_test_data "$GHE_DATA_DIR/1"
286336

@@ -329,7 +379,7 @@ begin_test "ghe-restore with Kredz settings"
329379
required_secrets=(
330380
"secrets.kredz.credz-hmac-secret"
331381
)
332-
382+
333383
for secret in "${required_secrets[@]}"; do
334384
[ "$(ghe-ssh "$GHE_HOSTNAME" -- ghe-config "$secret")" = "foo" ]
335385
done
@@ -355,7 +405,7 @@ begin_test "ghe-restore with kredz-varz settings"
355405
required_secrets=(
356406
"secrets.kredz.varz-hmac-secret"
357407
)
358-
408+
359409
for secret in "${required_secrets[@]}"; do
360410
[ "$(ghe-ssh "$GHE_HOSTNAME" -- ghe-config "$secret")" = "foo" ]
361411
done

0 commit comments

Comments
 (0)