10.1.1.1. CredentialStore data injection¶
To inject a user defined CredentialStore database into the CredentialStore
API when testing outside the SPS box.
Patch/overwrite the safeguard.sessions.plugin_impl.credential_store.credential_stores
with your own dictionary.
Note that for x509 certificates, the fake credential_store does not decrypt password protected private keys.
The credential_stores
is a dictionary where the key is the name of the local Credential Store policy to define.
Inside a policy the data is keyed with user name first, then host name and then as value a list of passwords, private
keys or X509 credentials. Passwords are encoded as a simple sequence of strings. Private keys and X509 credentials are
encoded as maps where “type” indicates the kind of data present in the map.
See the examples bellow for more information.
10.1.1.1.1. Example usage with pytest and monkeypatch¶
from safeguard.sessions.plugin.credential_store import CredentialStore as CredStore
from safeguard.sessions.plugin.plugin_configuration import PluginConfiguration as PluginConfig
from safeguard.sessions.plugin_impl.credential_store import credential_stores
def test_credential_store(monkeypatch):
# Data injection
testdb = {
# This user has a password and a private key as well
"user": {"host": [("password",), ({"type": "ssh-rsa", "key": "theKey"},)]},
}
monkeypatch.setitem(credential_stores, 'local', testdb)
# Test the injected data
pc = PluginConfig('''
[credential_store]
name=local
''')
cs = CredStore.from_config(pc)
assert cs.get_passwords('host', 'user') == ['password']