diffcrypt 0.4.1 → 0.5.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.circleci/config.yml +55 -3
- data/.rubocop.yml +4 -1
- data/CHANGELOG.md +16 -0
- data/Gemfile +2 -2
- data/README.md +2 -9
- data/Rakefile +3 -1
- data/diffcrypt.gemspec +1 -1
- data/lib/diffcrypt.rb +1 -0
- data/lib/diffcrypt/encryptor.rb +4 -4
- data/lib/diffcrypt/file.rb +26 -1
- data/lib/diffcrypt/rails/application_helper.rb +39 -0
- data/lib/diffcrypt/rails/encrypted_configuration.rb +9 -2
- data/lib/diffcrypt/railtie.rb +14 -0
- data/lib/diffcrypt/tasks/rails.rake +36 -0
- data/lib/diffcrypt/version.rb +1 -1
- metadata +6 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: dacd30e3ddee50fd84847385d2cd4161645b71b1cda79566557dff60e1f15108
|
4
|
+
data.tar.gz: 648e5cf57c6b909cf84196ded1643aa41baf776b8428862d57804d6465ebb3f0
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8c20572e67d7416fd2fac81556eadba73555959273f7ac900a2d05c82c4799135edb9940a69659eca121cddfee4dd99b3a1b94e7b5effeeea491677ae638b2b7
|
7
|
+
data.tar.gz: 7e8fe375714cdfcb730792285f648a8a7f1164fe9015b42ee06a0a592b065a576a4059ba0d338f9ec79a0749b087d186c73e1d5ba89c6cecaebb4123490eabdf
|
data/.circleci/config.yml
CHANGED
@@ -1,13 +1,39 @@
|
|
1
1
|
version: 2.1
|
2
2
|
|
3
3
|
jobs:
|
4
|
-
|
4
|
+
bundle:
|
5
5
|
docker:
|
6
|
-
- image: circleci/ruby:2.
|
6
|
+
- image: circleci/ruby:2.7.1
|
7
7
|
working_directory: /mnt/ramdisk
|
8
8
|
steps:
|
9
9
|
- checkout
|
10
|
-
-
|
10
|
+
- restore_cache:
|
11
|
+
keys:
|
12
|
+
- bundler-{{ checksum "diffcrypt.gemspec" }}-{{ .Environment.CACHE_VERSION }}
|
13
|
+
- run:
|
14
|
+
name: bundle install
|
15
|
+
command: |
|
16
|
+
gem install bundler -v '2.1.4'
|
17
|
+
bundle install --path=vendor/bundle --jobs=4 --retry=3
|
18
|
+
- save_cache:
|
19
|
+
key: bundler-{{ checksum "diffcrypt.gemspec" }}-{{ .Environment.CACHE_VERSION }}
|
20
|
+
paths:
|
21
|
+
- vendor/bundle
|
22
|
+
|
23
|
+
test:
|
24
|
+
docker:
|
25
|
+
- image: circleci/ruby:2.7.1
|
26
|
+
working_directory: /mnt/ramdisk
|
27
|
+
steps:
|
28
|
+
- checkout
|
29
|
+
- restore_cache:
|
30
|
+
keys:
|
31
|
+
- bundler-{{ checksum "diffcrypt.gemspec" }}-{{ .Environment.CACHE_VERSION }}
|
32
|
+
- run:
|
33
|
+
name: bundle install
|
34
|
+
command: |
|
35
|
+
gem install bundler -v '2.1.4'
|
36
|
+
bundle install --path=vendor/bundle --jobs=4 --retry=3
|
11
37
|
- run:
|
12
38
|
name: Setup Code Climate test-reporter
|
13
39
|
command: |
|
@@ -20,7 +46,33 @@ jobs:
|
|
20
46
|
./cc-test-reporter before-build
|
21
47
|
bundle exec rake test
|
22
48
|
./cc-test-reporter after-build --coverage-input-type lcov --exit-code $?
|
49
|
+
rubocop:
|
50
|
+
docker:
|
51
|
+
- image: circleci/ruby:2.7.1
|
52
|
+
working_directory: /mnt/ramdisk
|
53
|
+
steps:
|
54
|
+
- checkout
|
55
|
+
- restore_cache:
|
56
|
+
keys:
|
57
|
+
- bundler-{{ checksum "diffcrypt.gemspec" }}-{{ .Environment.CACHE_VERSION }}
|
58
|
+
- run:
|
59
|
+
name: bundle install
|
60
|
+
command: |
|
61
|
+
gem install bundler -v '2.1.4'
|
62
|
+
bundle install --path=vendor/bundle --jobs=4 --retry=3
|
23
63
|
- run:
|
24
64
|
name: rubocop
|
25
65
|
command: bundle exec rubocop
|
26
66
|
when: always
|
67
|
+
|
68
|
+
workflows:
|
69
|
+
version: 2
|
70
|
+
all:
|
71
|
+
jobs:
|
72
|
+
- bundle
|
73
|
+
- test:
|
74
|
+
requires:
|
75
|
+
- bundle
|
76
|
+
- rubocop:
|
77
|
+
requires:
|
78
|
+
- bundle
|
data/.rubocop.yml
CHANGED
@@ -1,5 +1,6 @@
|
|
1
1
|
AllCops:
|
2
2
|
NewCops: enable
|
3
|
+
TargetRubyVersion: 2.6
|
3
4
|
|
4
5
|
Style/ClassAndModuleChildren:
|
5
6
|
Exclude:
|
@@ -9,10 +10,12 @@ Style/Documentation:
|
|
9
10
|
Metrics/MethodLength:
|
10
11
|
Exclude:
|
11
12
|
- test/**/*_test.rb
|
12
|
-
TrailingCommaInArrayLiteral:
|
13
|
+
Style/TrailingCommaInArrayLiteral:
|
13
14
|
EnforcedStyleForMultiline: consistent_comma
|
14
15
|
Style/TrailingCommaInArguments:
|
15
16
|
EnforcedStyleForMultiline: consistent_comma
|
17
|
+
Style/TrailingCommaInHashLiteral:
|
18
|
+
EnforcedStyleForMultiline: consistent_comma
|
16
19
|
Style/AccessorGrouping:
|
17
20
|
EnforcedStyle: separated
|
18
21
|
|
data/CHANGELOG.md
CHANGED
@@ -7,6 +7,22 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|
7
7
|
|
8
8
|
|
9
9
|
|
10
|
+
## [0.5.0] - 2020-12-06
|
11
|
+
|
12
|
+
### Added
|
13
|
+
|
14
|
+
- `Diffcrypt::Rails::ApplicationHelper` to simplify integration
|
15
|
+
- `rake diffcrypt:init` command to help setup credentials
|
16
|
+
|
17
|
+
### Changed
|
18
|
+
|
19
|
+
- Default cipher is now `aes-265-gcm`
|
20
|
+
- YAML keys are now sorted
|
21
|
+
- Improved support for rails native `aes-128-gcm` cipher
|
22
|
+
- Improved test coverage for differing ciphers
|
23
|
+
|
24
|
+
|
25
|
+
|
10
26
|
## [0.4.1] - 2020-10-06
|
11
27
|
|
12
28
|
### Fixed
|
data/Gemfile
CHANGED
@@ -7,6 +7,6 @@ gemspec
|
|
7
7
|
|
8
8
|
gem 'minitest', '~> 5.0'
|
9
9
|
gem 'rake', '~> 13.0'
|
10
|
-
gem 'rubocop', '~>
|
11
|
-
gem 'simplecov', '~> 0.
|
10
|
+
gem 'rubocop', '~> 1.5.2'
|
11
|
+
gem 'simplecov', '~> 0.20.0', require: false # CodeClimate not compatible with 0.18+ yet - https://github.com/codeclimate/test-reporter/issues/413
|
12
12
|
gem 'simplecov-lcov', '< 0.8'
|
data/README.md
CHANGED
@@ -66,17 +66,10 @@ Currently there is not native support for rails, but ActiveSupport can be monkey
|
|
66
66
|
the built in encrypter. All existing `rails credentials:edit` also work with this method.
|
67
67
|
|
68
68
|
```ruby
|
69
|
-
|
69
|
+
# config/application.rb
|
70
70
|
module Rails
|
71
71
|
class Application
|
72
|
-
|
73
|
-
Diffcrypt::Rails::EncryptedConfiguration.new(
|
74
|
-
config_path: Rails.root.join(path),
|
75
|
-
key_path: Rails.root.join(key_path),
|
76
|
-
env_key: env_key,
|
77
|
-
raise_if_missing_key: config.require_master_key,
|
78
|
-
)
|
79
|
-
end
|
72
|
+
include Diffcrypt::Rails::ApplicationHelper
|
80
73
|
end
|
81
74
|
end
|
82
75
|
```
|
data/Rakefile
CHANGED
data/diffcrypt.gemspec
CHANGED
@@ -12,7 +12,7 @@ Gem::Specification.new do |spec|
|
|
12
12
|
spec.description = 'Diffable encrypted configuration files that can be safely committed into a git repository'
|
13
13
|
spec.homepage = 'https://github.com/marcqualie/diffcrypt'
|
14
14
|
spec.license = 'MIT'
|
15
|
-
spec.required_ruby_version = Gem::Requirement.new('>= 2.
|
15
|
+
spec.required_ruby_version = Gem::Requirement.new('>= 2.6.0')
|
16
16
|
|
17
17
|
# spec.metadata["allowed_push_host"] = "TODO: Set to 'http://mygemserver.com'"
|
18
18
|
|
data/lib/diffcrypt.rb
CHANGED
data/lib/diffcrypt/encryptor.rb
CHANGED
@@ -12,7 +12,7 @@ require_relative './version'
|
|
12
12
|
|
13
13
|
module Diffcrypt
|
14
14
|
class Encryptor
|
15
|
-
DEFAULT_CIPHER = 'aes-
|
15
|
+
DEFAULT_CIPHER = 'aes-256-gcm'
|
16
16
|
|
17
17
|
def self.generate_key(cipher = DEFAULT_CIPHER)
|
18
18
|
SecureRandom.hex(ActiveSupport::MessageEncryptor.key_len(cipher))
|
@@ -47,11 +47,11 @@ module Diffcrypt
|
|
47
47
|
# @param [String] contents The raw YAML string to be encrypted
|
48
48
|
# @param [String, nil] original_encrypted_contents The original (encrypted) content to determine which keys have changed
|
49
49
|
# @return [String]
|
50
|
-
def encrypt(contents, original_encrypted_contents = nil)
|
50
|
+
def encrypt(contents, original_encrypted_contents = nil, cipher: nil)
|
51
51
|
data = encrypt_data contents, original_encrypted_contents
|
52
52
|
YAML.dump(
|
53
53
|
'client' => "diffcrypt-#{Diffcrypt::VERSION}",
|
54
|
-
'cipher' => @cipher,
|
54
|
+
'cipher' => cipher || @cipher,
|
55
55
|
'data' => data,
|
56
56
|
)
|
57
57
|
end
|
@@ -86,7 +86,7 @@ module Diffcrypt
|
|
86
86
|
key_changed ? encrypt_string(value) : original_encrypted_value
|
87
87
|
end
|
88
88
|
end
|
89
|
-
data
|
89
|
+
data.sort.to_h
|
90
90
|
end
|
91
91
|
# rubocop:enable Metrics/PerceivedComplexity, Metrics/MethodLength, Metrics/CyclomaticComplexity
|
92
92
|
|
data/lib/diffcrypt/file.rb
CHANGED
@@ -14,7 +14,10 @@ module Diffcrypt
|
|
14
14
|
to_yaml['cipher']
|
15
15
|
end
|
16
16
|
|
17
|
+
# Determines the cipher to use for encryption/decryption
|
17
18
|
def cipher
|
19
|
+
return 'aes-128-gcm' if format == 'activesupport'
|
20
|
+
|
18
21
|
to_yaml['cipher'] || Encryptor::DEFAULT_CIPHER
|
19
22
|
end
|
20
23
|
|
@@ -23,11 +26,33 @@ module Diffcrypt
|
|
23
26
|
::File.exist?(@path)
|
24
27
|
end
|
25
28
|
|
29
|
+
# Determines the format to be used for encryption
|
30
|
+
# @return [String] diffcrypt|activesupport
|
31
|
+
def format
|
32
|
+
return 'diffcrypt' if read == ''
|
33
|
+
return 'diffcrypt' if read.index('---')&.zero?
|
34
|
+
|
35
|
+
'activesupport'
|
36
|
+
end
|
37
|
+
|
26
38
|
# @return [String] Raw contents of the file
|
27
39
|
def read
|
40
|
+
return '' unless ::File.exist?(@path)
|
41
|
+
|
28
42
|
@read ||= ::File.read(@path)
|
43
|
+
@read
|
44
|
+
end
|
45
|
+
|
46
|
+
# Save the encrypted contents back to disk
|
47
|
+
# @return [Boolean] True is file save was successful
|
48
|
+
def write(key, data, cipher: nil)
|
49
|
+
cipher ||= self.cipher
|
50
|
+
yaml = ::YAML.dump(data)
|
51
|
+
contents = Encryptor.new(key, cipher: cipher).encrypt(yaml)
|
52
|
+
::File.write(@path, contents)
|
29
53
|
end
|
30
54
|
|
55
|
+
# TODO: This seems useless, figure out what's up
|
31
56
|
def encrypt(key, cipher: DEFAULT_CIPHER)
|
32
57
|
return read if encrypted?
|
33
58
|
|
@@ -42,7 +67,7 @@ module Diffcrypt
|
|
42
67
|
end
|
43
68
|
|
44
69
|
def to_yaml
|
45
|
-
@to_yaml ||= YAML.safe_load(read)
|
70
|
+
@to_yaml ||= YAML.safe_load(read) || {}
|
46
71
|
end
|
47
72
|
end
|
48
73
|
end
|
@@ -0,0 +1,39 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require_relative './encrypted_configuration'
|
4
|
+
|
5
|
+
module Diffcrypt
|
6
|
+
module Rails
|
7
|
+
module ApplicationHelper
|
8
|
+
def encrypted(path, key_path: 'config/master.key', env_key: 'RAILS_MASTER_KEY')
|
9
|
+
config_path, key_path = resolve_encrypted_paths(path, key_path)
|
10
|
+
|
11
|
+
Diffcrypt::Rails::EncryptedConfiguration.new(
|
12
|
+
config_path: config_path,
|
13
|
+
key_path: key_path,
|
14
|
+
env_key: env_key,
|
15
|
+
raise_if_missing_key: config.require_master_key,
|
16
|
+
)
|
17
|
+
end
|
18
|
+
|
19
|
+
protected
|
20
|
+
|
21
|
+
def resolve_encrypted_paths(config_path, key_path)
|
22
|
+
config_path_abs = ::Rails.root.join(config_path)
|
23
|
+
key_path_abs = ::Rails.root.join(key_path)
|
24
|
+
|
25
|
+
# We always want to use `config/credentials/[environment]` for consistency
|
26
|
+
# If the master credentials do not exist, and a user has not specificed an environment, default to development
|
27
|
+
if config_path == 'config/credentials.yml.enc' && ::File.exist?(config_path_abs.to_s) == false
|
28
|
+
config_path_abs = ::Rails.root.join('config/credentials/development.yml.enc')
|
29
|
+
key_path_abs = ::Rails.root.join('config/credentials/development.key')
|
30
|
+
end
|
31
|
+
|
32
|
+
[
|
33
|
+
config_path_abs,
|
34
|
+
key_path_abs,
|
35
|
+
]
|
36
|
+
end
|
37
|
+
end
|
38
|
+
end
|
39
|
+
end
|
@@ -88,6 +88,13 @@ module Diffcrypt
|
|
88
88
|
end
|
89
89
|
# rubocop:enable Metrics/AbcSize
|
90
90
|
|
91
|
+
# Standard rails credentials encrypt the entire file. We need to detect this to use the correct
|
92
|
+
# data interface
|
93
|
+
# @return [Boolean]
|
94
|
+
def rails_native_credentials?(contents)
|
95
|
+
contents.index('---').nil?
|
96
|
+
end
|
97
|
+
|
91
98
|
# @param [String] contents The new content to be encrypted
|
92
99
|
# @param [String] diff_against The original (encrypted) content to determine which keys have changed
|
93
100
|
# @return [String] Encrypted content to commit
|
@@ -98,7 +105,7 @@ module Diffcrypt
|
|
98
105
|
# @param [String] contents
|
99
106
|
# @return [String]
|
100
107
|
def decrypt(contents)
|
101
|
-
if contents
|
108
|
+
if rails_native_credentials?(contents)
|
102
109
|
active_support_encryptor.decrypt_and_verify contents
|
103
110
|
else
|
104
111
|
encryptor.decrypt contents
|
@@ -110,7 +117,7 @@ module Diffcrypt
|
|
110
117
|
def active_support_encryptor
|
111
118
|
@active_support_encryptor ||= ActiveSupport::MessageEncryptor.new(
|
112
119
|
[key].pack('H*'),
|
113
|
-
cipher:
|
120
|
+
cipher: 'aes-128-gcm',
|
114
121
|
)
|
115
122
|
end
|
116
123
|
|
@@ -0,0 +1,14 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require 'diffcrypt/rails/application_helper'
|
4
|
+
|
5
|
+
module Diffcrypt
|
6
|
+
class Railtie < ::Rails::Railtie
|
7
|
+
railtie_name :diffcrypt
|
8
|
+
|
9
|
+
rake_tasks do
|
10
|
+
path = ::File.expand_path(__dir__)
|
11
|
+
::Dir.glob("#{path}/tasks/**/*.rake").each { |f| load f }
|
12
|
+
end
|
13
|
+
end
|
14
|
+
end
|
@@ -0,0 +1,36 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
namespace :diffcrypt do
|
4
|
+
desc 'Initialize credentials for all environments'
|
5
|
+
task :init, %i[environments] do |_t, args|
|
6
|
+
args.with_defaults(
|
7
|
+
environments: 'development,test,staging,production',
|
8
|
+
)
|
9
|
+
environments = args.environments.split(',')
|
10
|
+
|
11
|
+
environments.each do |environment|
|
12
|
+
key_path = Rails.root.join('config', 'credentials', "#{environment}.key")
|
13
|
+
file_path = Rails.root.join('config', 'credentials', "#{environment}.yml.enc")
|
14
|
+
gitignore_path = Rails.root.join('.gitignore')
|
15
|
+
next if File.exist?(file_path) || File.exist?(key_path)
|
16
|
+
|
17
|
+
# Generate a new key
|
18
|
+
key = Diffcrypt::Encryptor.generate_key
|
19
|
+
key_dir = File.dirname(key_path)
|
20
|
+
Dir.mkdir(key_dir) unless Dir.exist?(key_dir)
|
21
|
+
::File.write(key_path, key)
|
22
|
+
|
23
|
+
# Encrypt default contents
|
24
|
+
file = Diffcrypt::File.new(file_path)
|
25
|
+
data = {
|
26
|
+
'secret_key_base' => SecureRandom.hex(32),
|
27
|
+
}
|
28
|
+
file.write(key, data)
|
29
|
+
|
30
|
+
# Ensure .key files are always ignored
|
31
|
+
::File.open(gitignore_path, 'a') do |f|
|
32
|
+
f.write("\nconfig/credentials/*.key")
|
33
|
+
end
|
34
|
+
end
|
35
|
+
end
|
36
|
+
end
|
data/lib/diffcrypt/version.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: diffcrypt
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.5.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Marc Qualie
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-
|
11
|
+
date: 2020-12-06 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: activesupport
|
@@ -71,7 +71,10 @@ files:
|
|
71
71
|
- lib/diffcrypt/cli.rb
|
72
72
|
- lib/diffcrypt/encryptor.rb
|
73
73
|
- lib/diffcrypt/file.rb
|
74
|
+
- lib/diffcrypt/rails/application_helper.rb
|
74
75
|
- lib/diffcrypt/rails/encrypted_configuration.rb
|
76
|
+
- lib/diffcrypt/railtie.rb
|
77
|
+
- lib/diffcrypt/tasks/rails.rake
|
75
78
|
- lib/diffcrypt/version.rb
|
76
79
|
- tmp/.keep
|
77
80
|
homepage: https://github.com/marcqualie/diffcrypt
|
@@ -88,7 +91,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
88
91
|
requirements:
|
89
92
|
- - ">="
|
90
93
|
- !ruby/object:Gem::Version
|
91
|
-
version: 2.
|
94
|
+
version: 2.6.0
|
92
95
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
93
96
|
requirements:
|
94
97
|
- - ">="
|