-
Notifications
You must be signed in to change notification settings - Fork 78
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release 16.11.23 #1345
Release 16.11.23 #1345
Conversation
…unts for possibly missing data for each MC)
…nt Policy. KC-665
template_value = _DEFAULT_PASSWORD_COMPLEXITY | ||
if template_value: | ||
with open(filepath, 'wt') as fd: | ||
fd.write(template_value) |
Check failure
Code scanning / CodeQL
Clear-text storage of sensitive information High
sensitive data (password)
This expression stores
sensitive data (password)
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix
AI 3 months ago
To fix the problem, we should encrypt the template_value
before writing it to the file and decrypt it when reading it back. This ensures that the sensitive information is not stored in clear text. We can use the cryptography
module to handle the encryption and decryption.
- Encrypt the
template_value
before writing it to the file. - Decrypt the
template_value
when reading it back from the file. - Add necessary imports and helper functions for encryption and decryption.
-
Copy modified line R27 -
Copy modified lines R51-R59 -
Copy modified lines R2204-R2206
@@ -26,2 +26,3 @@ | ||
from datetime import datetime as dt_module | ||
from cryptography.fernet import Fernet | ||
|
||
@@ -49,2 +50,11 @@ | ||
|
||
# Encryption key for Fernet (should be securely stored and managed) | ||
ENCRYPTION_KEY = b'your-encryption-key-here' # Replace with your actual key | ||
fernet = Fernet(ENCRYPTION_KEY) | ||
|
||
def encrypt_value(value: str) -> bytes: | ||
return fernet.encrypt(value.encode()) | ||
|
||
def decrypt_value(value: bytes) -> str: | ||
return fernet.decrypt(value).decode() | ||
|
||
@@ -2193,4 +2203,5 @@ | ||
if template_value: | ||
with open(filepath, 'wt') as fd: | ||
fd.write(template_value) | ||
encrypted_value = encrypt_value(template_value) | ||
with open(filepath, 'wb') as fd: | ||
fd.write(encrypted_value) | ||
logging.warning('Enforcement "%s" value has been stored to file "%s"', key, filepath) |
No description provided.