/elixir/ext/encrypted.py

https://bitbucket.org/vinay.sajip/elixir3 · Python · 127 lines · 121 code · 0 blank · 6 comment · 0 complexity · 3da4bcbead1a694b9c941030b77c124a MD5 · raw file

  1. '''
  2. An encryption plugin for Elixir utilizing the excellent PyCrypto library, which
  3. can be downloaded here: http://www.amk.ca/python/code/crypto
  4. Values for columns that are specified to be encrypted will be transparently
  5. encrypted and safely encoded for storage in a unicode column using the powerful
  6. and secure Blowfish Cipher using a specified "secret" which can be passed into
  7. the plugin at class declaration time.
  8. Example usage:
  9. .. sourcecode:: python
  10. from elixir import *
  11. from elixir.ext.encrypted import acts_as_encrypted
  12. class Person(Entity):
  13. name = Field(Unicode)
  14. password = Field(Unicode)
  15. ssn = Field(Unicode)
  16. acts_as_encrypted(for_fields=['password', 'ssn'],
  17. with_secret='secret')
  18. The above Person entity will automatically encrypt and decrypt the password and
  19. ssn columns on save, update, and load. Different secrets can be specified on
  20. an entity by entity basis, for added security.
  21. **Important note**: instance attributes are encrypted in-place. This means that
  22. if one of the encrypted attributes of an instance is accessed after the
  23. instance has been flushed to the database (and thus encrypted), the value for
  24. that attribute will be crypted in the in-memory object in addition to the
  25. database row.
  26. '''
  27. try:
  28. from Crypto.Cipher import Blowfish
  29. except ImportError:
  30. Blowfish = None
  31. from elixir.statements import Statement
  32. from sqlalchemy.orm import MapperExtension, EXT_CONTINUE, EXT_STOP
  33. try:
  34. from sqlalchemy.orm import EXT_PASS
  35. SA05orlater = False
  36. except ImportError:
  37. SA05orlater = True
  38. __all__ = ['acts_as_encrypted']
  39. __doc_all__ = []
  40. #
  41. # encryption and decryption functions
  42. #
  43. def encrypt_value(value, secret):
  44. return Blowfish.new(secret, Blowfish.MODE_CFB) \
  45. .encrypt(value).encode('string_escape')
  46. def decrypt_value(value, secret):
  47. return Blowfish.new(secret, Blowfish.MODE_CFB) \
  48. .decrypt(value.decode('string_escape'))
  49. #
  50. # acts_as_encrypted statement
  51. #
  52. class ActsAsEncrypted(object):
  53. def __init__(self, entity, for_fields=[], with_secret='abcdef'):
  54. def perform_encryption(instance, encrypt=True):
  55. encrypted = getattr(instance, '_elixir_encrypted', None)
  56. if encrypted is encrypt:
  57. # skipping encryption or decryption, as it is already done
  58. return
  59. else:
  60. # marking instance as already encrypted/decrypted
  61. instance._elixir_encrypted = encrypt
  62. if encrypt:
  63. func = encrypt_value
  64. else:
  65. func = decrypt_value
  66. for column_name in for_fields:
  67. current_value = getattr(instance, column_name)
  68. if current_value:
  69. setattr(instance, column_name,
  70. func(current_value, with_secret))
  71. def perform_decryption(instance):
  72. perform_encryption(instance, encrypt=False)
  73. class EncryptedMapperExtension(MapperExtension):
  74. def before_insert(self, mapper, connection, instance):
  75. perform_encryption(instance)
  76. return EXT_CONTINUE
  77. def before_update(self, mapper, connection, instance):
  78. perform_encryption(instance)
  79. return EXT_CONTINUE
  80. if SA05orlater:
  81. def reconstruct_instance(self, mapper, instance):
  82. perform_decryption(instance)
  83. # no special return value is required for
  84. # reconstruct_instance, but you never know...
  85. return EXT_CONTINUE
  86. else:
  87. def populate_instance(self, mapper, selectcontext, row,
  88. instance, *args, **kwargs):
  89. mapper.populate_instance(selectcontext, instance, row,
  90. *args, **kwargs)
  91. perform_decryption(instance)
  92. # EXT_STOP because we already did populate the instance and
  93. # the normal processing should not happen
  94. return EXT_STOP
  95. # make sure that the entity's mapper has our mapper extension
  96. entity._descriptor.add_mapper_extension(EncryptedMapperExtension())
  97. acts_as_encrypted = Statement(ActsAsEncrypted)