kubernetes-secret-rails 0.2.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.gitignore +10 -0
- data/CODE_OF_CONDUCT.md +49 -0
- data/Gemfile +4 -0
- data/README.md +54 -0
- data/Rakefile +2 -0
- data/bin/console +15 -0
- data/bin/setup +8 -0
- data/kubernetes-secret-rails.gemspec +24 -0
- data/lib/kubernetes/secret.rb +27 -0
- data/lib/kubernetes/secret/rails.rb +6 -0
- data/lib/kubernetes/secret/rails/railtie.rb +15 -0
- data/lib/kubernetes/secret/rails/version.rb +7 -0
- metadata +85 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA1:
|
3
|
+
metadata.gz: 96d998b19deed76ac5d4b53573f16846794b8182
|
4
|
+
data.tar.gz: c05fce0f7bcf52790ac9424de083998f60e30dca
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: 1e5bb0811b2e2bd5b98ff7a20975709ea5c0632c83857e9f2058d091e45b1bcb115b21c661c542943a10f5c65d9afe30a1630db8b14125d504384a0e3df83e41
|
7
|
+
data.tar.gz: c93cd4b3ed94013ae57b14a744b67a4c054a72dbdc43eb9289aa2064ebc9fb3fae1d41728aed3434d2ed4e7ac051a45f458828966d9b553d44654dedc0963de5
|
data/.gitignore
ADDED
data/CODE_OF_CONDUCT.md
ADDED
@@ -0,0 +1,49 @@
|
|
1
|
+
# Contributor Code of Conduct
|
2
|
+
|
3
|
+
As contributors and maintainers of this project, and in the interest of
|
4
|
+
fostering an open and welcoming community, we pledge to respect all people who
|
5
|
+
contribute through reporting issues, posting feature requests, updating
|
6
|
+
documentation, submitting pull requests or patches, and other activities.
|
7
|
+
|
8
|
+
We are committed to making participation in this project a harassment-free
|
9
|
+
experience for everyone, regardless of level of experience, gender, gender
|
10
|
+
identity and expression, sexual orientation, disability, personal appearance,
|
11
|
+
body size, race, ethnicity, age, religion, or nationality.
|
12
|
+
|
13
|
+
Examples of unacceptable behavior by participants include:
|
14
|
+
|
15
|
+
* The use of sexualized language or imagery
|
16
|
+
* Personal attacks
|
17
|
+
* Trolling or insulting/derogatory comments
|
18
|
+
* Public or private harassment
|
19
|
+
* Publishing other's private information, such as physical or electronic
|
20
|
+
addresses, without explicit permission
|
21
|
+
* Other unethical or unprofessional conduct
|
22
|
+
|
23
|
+
Project maintainers have the right and responsibility to remove, edit, or
|
24
|
+
reject comments, commits, code, wiki edits, issues, and other contributions
|
25
|
+
that are not aligned to this Code of Conduct, or to ban temporarily or
|
26
|
+
permanently any contributor for other behaviors that they deem inappropriate,
|
27
|
+
threatening, offensive, or harmful.
|
28
|
+
|
29
|
+
By adopting this Code of Conduct, project maintainers commit themselves to
|
30
|
+
fairly and consistently applying these principles to every aspect of managing
|
31
|
+
this project. Project maintainers who do not follow or enforce the Code of
|
32
|
+
Conduct may be permanently removed from the project team.
|
33
|
+
|
34
|
+
This code of conduct applies both within project spaces and in public spaces
|
35
|
+
when an individual is representing the project or its community.
|
36
|
+
|
37
|
+
Instances of abusive, harassing, or otherwise unacceptable behavior may be
|
38
|
+
reported by contacting a project maintainer at zack@codemy.net. All
|
39
|
+
complaints will be reviewed and investigated and will result in a response that
|
40
|
+
is deemed necessary and appropriate to the circumstances. Maintainers are
|
41
|
+
obligated to maintain confidentiality with regard to the reporter of an
|
42
|
+
incident.
|
43
|
+
|
44
|
+
This Code of Conduct is adapted from the [Contributor Covenant][homepage],
|
45
|
+
version 1.3.0, available at
|
46
|
+
[http://contributor-covenant.org/version/1/3/0/][version]
|
47
|
+
|
48
|
+
[homepage]: http://contributor-covenant.org
|
49
|
+
[version]: http://contributor-covenant.org/version/1/3/0/
|
data/Gemfile
ADDED
data/README.md
ADDED
@@ -0,0 +1,54 @@
|
|
1
|
+
# Kubernetes Secret
|
2
|
+
|
3
|
+
This gem helps you work with secrets in kubernetes. If you are deploying your app using docker + kubernetes this gem can come in handy.
|
4
|
+
|
5
|
+
The gem is a simple wrapper and will inject kubernetes secrets into the `Rails.application.secrets`
|
6
|
+
|
7
|
+
## Installation
|
8
|
+
|
9
|
+
Add this line to your application's Gemfile:
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
group :production do
|
13
|
+
gem 'kubernetes-secret-rails'
|
14
|
+
end
|
15
|
+
|
16
|
+
# or
|
17
|
+
|
18
|
+
gem 'kubernetes-secret-rails', group: :production
|
19
|
+
```
|
20
|
+
|
21
|
+
And then execute:
|
22
|
+
|
23
|
+
$ bundle
|
24
|
+
|
25
|
+
Or install it yourself as:
|
26
|
+
|
27
|
+
$ gem install kubernetes-secret-rails
|
28
|
+
|
29
|
+
## Usage
|
30
|
+
|
31
|
+
Simply use `Rails.application.secrets.kubernetes` to access all the secrets you have on kubernetes.
|
32
|
+
|
33
|
+
Specify the name of the secret in your `config/secrets.yml file`
|
34
|
+
|
35
|
+
```ruby
|
36
|
+
staging:
|
37
|
+
kubernetes_secret_name: 'blah-staging'
|
38
|
+
|
39
|
+
production:
|
40
|
+
kubernetes_secret_name: 'blah-production'
|
41
|
+
```
|
42
|
+
|
43
|
+
This will work with Google Container Engine out of the box.
|
44
|
+
|
45
|
+
## Development
|
46
|
+
|
47
|
+
After checking out the repo, run `bin/setup` to install dependencies. You can also run `bin/console` for an interactive prompt that will allow you to experiment.
|
48
|
+
|
49
|
+
To install this gem onto your local machine, run `bundle exec rake install`. To release a new version, update the version number in `version.rb`, and then run `bundle exec rake release`, which will create a git tag for the version, push git commits and tags, and push the `.gem` file to [rubygems.org](https://rubygems.org).
|
50
|
+
|
51
|
+
## Contributing
|
52
|
+
|
53
|
+
Bug reports and pull requests are welcome on GitHub at https://github.com/[USERNAME]/kubernetes-secret-rails. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the [Contributor Covenant](http://contributor-covenant.org) code of conduct.
|
54
|
+
|
data/Rakefile
ADDED
data/bin/console
ADDED
@@ -0,0 +1,15 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
require "bundler/setup"
|
4
|
+
require "kubernetes/secret"
|
5
|
+
require "kubernetes/secret/rails"
|
6
|
+
|
7
|
+
# You can add fixtures and/or initialization code here to make experimenting
|
8
|
+
# with your gem easier. You can also use a different console, if you like.
|
9
|
+
|
10
|
+
# (If you use this, don't forget to add pry to your Gemfile!)
|
11
|
+
# require "pry"
|
12
|
+
# Pry.start
|
13
|
+
|
14
|
+
require "irb"
|
15
|
+
IRB.start
|
data/bin/setup
ADDED
@@ -0,0 +1,24 @@
|
|
1
|
+
# coding: utf-8
|
2
|
+
lib = File.expand_path('../lib', __FILE__)
|
3
|
+
$LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
|
4
|
+
require 'kubernetes/secret/rails/version'
|
5
|
+
|
6
|
+
Gem::Specification.new do |spec|
|
7
|
+
spec.name = "kubernetes-secret-rails"
|
8
|
+
spec.version = Kubernetes::Secret::Rails::VERSION
|
9
|
+
spec.authors = ["Zack Siri"]
|
10
|
+
spec.email = ["zack@codemy.net"]
|
11
|
+
|
12
|
+
spec.summary = %q{Simple Wrapper for accessing secrets on kubernetes}
|
13
|
+
spec.description = %q{Simple wrapper for accessing secrets}
|
14
|
+
spec.homepage = "http://github.com/codemy/kubernetes-secret-rails"
|
15
|
+
spec.license = "MIT"
|
16
|
+
|
17
|
+
spec.files = `git ls-files -z`.split("\x0").reject { |f| f.match(%r{^(test|spec|features)/}) }
|
18
|
+
spec.bindir = "exe"
|
19
|
+
spec.executables = spec.files.grep(%r{^exe/}) { |f| File.basename(f) }
|
20
|
+
spec.require_paths = ["lib"]
|
21
|
+
|
22
|
+
spec.add_development_dependency "bundler", "~> 1.11"
|
23
|
+
spec.add_development_dependency "rake", "~> 10.0"
|
24
|
+
end
|
@@ -0,0 +1,27 @@
|
|
1
|
+
module Kubernetes
|
2
|
+
module Secret
|
3
|
+
extend self
|
4
|
+
|
5
|
+
def path
|
6
|
+
"/etc/#{::Rails.application.secrets.kubernetes_secret_name}"
|
7
|
+
end
|
8
|
+
|
9
|
+
def secrets_list
|
10
|
+
begin
|
11
|
+
Dir.entries(path) - ['.', '..']
|
12
|
+
rescue => e
|
13
|
+
puts "-----> No secret mounted or not on kubernetes. No secrets injected."
|
14
|
+
end
|
15
|
+
end
|
16
|
+
|
17
|
+
def on_kubernetes?
|
18
|
+
secrets_list.present?
|
19
|
+
end
|
20
|
+
|
21
|
+
def load_secrets
|
22
|
+
secrets_list.inject({}) do |hash, file_name|
|
23
|
+
hash.merge(:"#{file_name.underscore}" => File.read(File.join(path, file_name)).strip)
|
24
|
+
end
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
@@ -0,0 +1,15 @@
|
|
1
|
+
require 'kubernetes/secret'
|
2
|
+
|
3
|
+
module Kubernetes
|
4
|
+
module Secret
|
5
|
+
module Rails
|
6
|
+
class Railtie < ::Rails::Railtie
|
7
|
+
config.before_configuration do
|
8
|
+
if Secret.on_kubernetes?
|
9
|
+
::Rails.application.secrets.merge!(Secret.load_secrets)
|
10
|
+
end
|
11
|
+
end
|
12
|
+
end
|
13
|
+
end
|
14
|
+
end
|
15
|
+
end
|
metadata
ADDED
@@ -0,0 +1,85 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: kubernetes-secret-rails
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.2.2
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Zack Siri
|
8
|
+
autorequire:
|
9
|
+
bindir: exe
|
10
|
+
cert_chain: []
|
11
|
+
date: 2016-03-02 00:00:00.000000000 Z
|
12
|
+
dependencies:
|
13
|
+
- !ruby/object:Gem::Dependency
|
14
|
+
name: bundler
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
16
|
+
requirements:
|
17
|
+
- - "~>"
|
18
|
+
- !ruby/object:Gem::Version
|
19
|
+
version: '1.11'
|
20
|
+
type: :development
|
21
|
+
prerelease: false
|
22
|
+
version_requirements: !ruby/object:Gem::Requirement
|
23
|
+
requirements:
|
24
|
+
- - "~>"
|
25
|
+
- !ruby/object:Gem::Version
|
26
|
+
version: '1.11'
|
27
|
+
- !ruby/object:Gem::Dependency
|
28
|
+
name: rake
|
29
|
+
requirement: !ruby/object:Gem::Requirement
|
30
|
+
requirements:
|
31
|
+
- - "~>"
|
32
|
+
- !ruby/object:Gem::Version
|
33
|
+
version: '10.0'
|
34
|
+
type: :development
|
35
|
+
prerelease: false
|
36
|
+
version_requirements: !ruby/object:Gem::Requirement
|
37
|
+
requirements:
|
38
|
+
- - "~>"
|
39
|
+
- !ruby/object:Gem::Version
|
40
|
+
version: '10.0'
|
41
|
+
description: Simple wrapper for accessing secrets
|
42
|
+
email:
|
43
|
+
- zack@codemy.net
|
44
|
+
executables: []
|
45
|
+
extensions: []
|
46
|
+
extra_rdoc_files: []
|
47
|
+
files:
|
48
|
+
- ".gitignore"
|
49
|
+
- CODE_OF_CONDUCT.md
|
50
|
+
- Gemfile
|
51
|
+
- README.md
|
52
|
+
- Rakefile
|
53
|
+
- bin/console
|
54
|
+
- bin/setup
|
55
|
+
- kubernetes-secret-rails.gemspec
|
56
|
+
- lib/kubernetes/secret.rb
|
57
|
+
- lib/kubernetes/secret/rails.rb
|
58
|
+
- lib/kubernetes/secret/rails/railtie.rb
|
59
|
+
- lib/kubernetes/secret/rails/version.rb
|
60
|
+
homepage: http://github.com/codemy/kubernetes-secret-rails
|
61
|
+
licenses:
|
62
|
+
- MIT
|
63
|
+
metadata: {}
|
64
|
+
post_install_message:
|
65
|
+
rdoc_options: []
|
66
|
+
require_paths:
|
67
|
+
- lib
|
68
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
69
|
+
requirements:
|
70
|
+
- - ">="
|
71
|
+
- !ruby/object:Gem::Version
|
72
|
+
version: '0'
|
73
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
74
|
+
requirements:
|
75
|
+
- - ">="
|
76
|
+
- !ruby/object:Gem::Version
|
77
|
+
version: '0'
|
78
|
+
requirements: []
|
79
|
+
rubyforge_project:
|
80
|
+
rubygems_version: 2.5.1
|
81
|
+
signing_key:
|
82
|
+
specification_version: 4
|
83
|
+
summary: Simple Wrapper for accessing secrets on kubernetes
|
84
|
+
test_files: []
|
85
|
+
has_rdoc:
|