kubernetes-secret-rails 0.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +10 -0
- data/CODE_OF_CONDUCT.md +49 -0
- data/Gemfile +4 -0
- data/README.md +54 -0
- data/Rakefile +2 -0
- data/bin/console +15 -0
- data/bin/setup +8 -0
- data/kubernetes-secret-rails.gemspec +24 -0
- data/lib/kubernetes/secret.rb +27 -0
- data/lib/kubernetes/secret/rails.rb +6 -0
- data/lib/kubernetes/secret/rails/railtie.rb +15 -0
- data/lib/kubernetes/secret/rails/version.rb +7 -0
- metadata +85 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA1:
|
3
|
+
metadata.gz: 96d998b19deed76ac5d4b53573f16846794b8182
|
4
|
+
data.tar.gz: c05fce0f7bcf52790ac9424de083998f60e30dca
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: 1e5bb0811b2e2bd5b98ff7a20975709ea5c0632c83857e9f2058d091e45b1bcb115b21c661c542943a10f5c65d9afe30a1630db8b14125d504384a0e3df83e41
|
7
|
+
data.tar.gz: c93cd4b3ed94013ae57b14a744b67a4c054a72dbdc43eb9289aa2064ebc9fb3fae1d41728aed3434d2ed4e7ac051a45f458828966d9b553d44654dedc0963de5
|
data/.gitignore
ADDED
data/CODE_OF_CONDUCT.md
ADDED
@@ -0,0 +1,49 @@
|
|
1
|
+
# Contributor Code of Conduct
|
2
|
+
|
3
|
+
As contributors and maintainers of this project, and in the interest of
|
4
|
+
fostering an open and welcoming community, we pledge to respect all people who
|
5
|
+
contribute through reporting issues, posting feature requests, updating
|
6
|
+
documentation, submitting pull requests or patches, and other activities.
|
7
|
+
|
8
|
+
We are committed to making participation in this project a harassment-free
|
9
|
+
experience for everyone, regardless of level of experience, gender, gender
|
10
|
+
identity and expression, sexual orientation, disability, personal appearance,
|
11
|
+
body size, race, ethnicity, age, religion, or nationality.
|
12
|
+
|
13
|
+
Examples of unacceptable behavior by participants include:
|
14
|
+
|
15
|
+
* The use of sexualized language or imagery
|
16
|
+
* Personal attacks
|
17
|
+
* Trolling or insulting/derogatory comments
|
18
|
+
* Public or private harassment
|
19
|
+
* Publishing other's private information, such as physical or electronic
|
20
|
+
addresses, without explicit permission
|
21
|
+
* Other unethical or unprofessional conduct
|
22
|
+
|
23
|
+
Project maintainers have the right and responsibility to remove, edit, or
|
24
|
+
reject comments, commits, code, wiki edits, issues, and other contributions
|
25
|
+
that are not aligned to this Code of Conduct, or to ban temporarily or
|
26
|
+
permanently any contributor for other behaviors that they deem inappropriate,
|
27
|
+
threatening, offensive, or harmful.
|
28
|
+
|
29
|
+
By adopting this Code of Conduct, project maintainers commit themselves to
|
30
|
+
fairly and consistently applying these principles to every aspect of managing
|
31
|
+
this project. Project maintainers who do not follow or enforce the Code of
|
32
|
+
Conduct may be permanently removed from the project team.
|
33
|
+
|
34
|
+
This code of conduct applies both within project spaces and in public spaces
|
35
|
+
when an individual is representing the project or its community.
|
36
|
+
|
37
|
+
Instances of abusive, harassing, or otherwise unacceptable behavior may be
|
38
|
+
reported by contacting a project maintainer at zack@codemy.net. All
|
39
|
+
complaints will be reviewed and investigated and will result in a response that
|
40
|
+
is deemed necessary and appropriate to the circumstances. Maintainers are
|
41
|
+
obligated to maintain confidentiality with regard to the reporter of an
|
42
|
+
incident.
|
43
|
+
|
44
|
+
This Code of Conduct is adapted from the [Contributor Covenant][homepage],
|
45
|
+
version 1.3.0, available at
|
46
|
+
[http://contributor-covenant.org/version/1/3/0/][version]
|
47
|
+
|
48
|
+
[homepage]: http://contributor-covenant.org
|
49
|
+
[version]: http://contributor-covenant.org/version/1/3/0/
|
data/Gemfile
ADDED
data/README.md
ADDED
@@ -0,0 +1,54 @@
|
|
1
|
+
# Kubernetes Secret
|
2
|
+
|
3
|
+
This gem helps you work with secrets in kubernetes. If you are deploying your app using docker + kubernetes this gem can come in handy.
|
4
|
+
|
5
|
+
The gem is a simple wrapper and will inject kubernetes secrets into the `Rails.application.secrets`
|
6
|
+
|
7
|
+
## Installation
|
8
|
+
|
9
|
+
Add this line to your application's Gemfile:
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
group :production do
|
13
|
+
gem 'kubernetes-secret-rails'
|
14
|
+
end
|
15
|
+
|
16
|
+
# or
|
17
|
+
|
18
|
+
gem 'kubernetes-secret-rails', group: :production
|
19
|
+
```
|
20
|
+
|
21
|
+
And then execute:
|
22
|
+
|
23
|
+
$ bundle
|
24
|
+
|
25
|
+
Or install it yourself as:
|
26
|
+
|
27
|
+
$ gem install kubernetes-secret-rails
|
28
|
+
|
29
|
+
## Usage
|
30
|
+
|
31
|
+
Simply use `Rails.application.secrets.kubernetes` to access all the secrets you have on kubernetes.
|
32
|
+
|
33
|
+
Specify the name of the secret in your `config/secrets.yml file`
|
34
|
+
|
35
|
+
```ruby
|
36
|
+
staging:
|
37
|
+
kubernetes_secret_name: 'blah-staging'
|
38
|
+
|
39
|
+
production:
|
40
|
+
kubernetes_secret_name: 'blah-production'
|
41
|
+
```
|
42
|
+
|
43
|
+
This will work with Google Container Engine out of the box.
|
44
|
+
|
45
|
+
## Development
|
46
|
+
|
47
|
+
After checking out the repo, run `bin/setup` to install dependencies. You can also run `bin/console` for an interactive prompt that will allow you to experiment.
|
48
|
+
|
49
|
+
To install this gem onto your local machine, run `bundle exec rake install`. To release a new version, update the version number in `version.rb`, and then run `bundle exec rake release`, which will create a git tag for the version, push git commits and tags, and push the `.gem` file to [rubygems.org](https://rubygems.org).
|
50
|
+
|
51
|
+
## Contributing
|
52
|
+
|
53
|
+
Bug reports and pull requests are welcome on GitHub at https://github.com/[USERNAME]/kubernetes-secret-rails. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the [Contributor Covenant](http://contributor-covenant.org) code of conduct.
|
54
|
+
|
data/Rakefile
ADDED
data/bin/console
ADDED
@@ -0,0 +1,15 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
require "bundler/setup"
|
4
|
+
require "kubernetes/secret"
|
5
|
+
require "kubernetes/secret/rails"
|
6
|
+
|
7
|
+
# You can add fixtures and/or initialization code here to make experimenting
|
8
|
+
# with your gem easier. You can also use a different console, if you like.
|
9
|
+
|
10
|
+
# (If you use this, don't forget to add pry to your Gemfile!)
|
11
|
+
# require "pry"
|
12
|
+
# Pry.start
|
13
|
+
|
14
|
+
require "irb"
|
15
|
+
IRB.start
|
data/bin/setup
ADDED
@@ -0,0 +1,24 @@
|
|
1
|
+
# coding: utf-8
|
2
|
+
lib = File.expand_path('../lib', __FILE__)
|
3
|
+
$LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
|
4
|
+
require 'kubernetes/secret/rails/version'
|
5
|
+
|
6
|
+
Gem::Specification.new do |spec|
|
7
|
+
spec.name = "kubernetes-secret-rails"
|
8
|
+
spec.version = Kubernetes::Secret::Rails::VERSION
|
9
|
+
spec.authors = ["Zack Siri"]
|
10
|
+
spec.email = ["zack@codemy.net"]
|
11
|
+
|
12
|
+
spec.summary = %q{Simple Wrapper for accessing secrets on kubernetes}
|
13
|
+
spec.description = %q{Simple wrapper for accessing secrets}
|
14
|
+
spec.homepage = "http://github.com/codemy/kubernetes-secret-rails"
|
15
|
+
spec.license = "MIT"
|
16
|
+
|
17
|
+
spec.files = `git ls-files -z`.split("\x0").reject { |f| f.match(%r{^(test|spec|features)/}) }
|
18
|
+
spec.bindir = "exe"
|
19
|
+
spec.executables = spec.files.grep(%r{^exe/}) { |f| File.basename(f) }
|
20
|
+
spec.require_paths = ["lib"]
|
21
|
+
|
22
|
+
spec.add_development_dependency "bundler", "~> 1.11"
|
23
|
+
spec.add_development_dependency "rake", "~> 10.0"
|
24
|
+
end
|
@@ -0,0 +1,27 @@
|
|
1
|
+
module Kubernetes
|
2
|
+
module Secret
|
3
|
+
extend self
|
4
|
+
|
5
|
+
def path
|
6
|
+
"/etc/#{::Rails.application.secrets.kubernetes_secret_name}"
|
7
|
+
end
|
8
|
+
|
9
|
+
def secrets_list
|
10
|
+
begin
|
11
|
+
Dir.entries(path) - ['.', '..']
|
12
|
+
rescue => e
|
13
|
+
puts "-----> No secret mounted or not on kubernetes. No secrets injected."
|
14
|
+
end
|
15
|
+
end
|
16
|
+
|
17
|
+
def on_kubernetes?
|
18
|
+
secrets_list.present?
|
19
|
+
end
|
20
|
+
|
21
|
+
def load_secrets
|
22
|
+
secrets_list.inject({}) do |hash, file_name|
|
23
|
+
hash.merge(:"#{file_name.underscore}" => File.read(File.join(path, file_name)).strip)
|
24
|
+
end
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
@@ -0,0 +1,15 @@
|
|
1
|
+
require 'kubernetes/secret'
|
2
|
+
|
3
|
+
module Kubernetes
|
4
|
+
module Secret
|
5
|
+
module Rails
|
6
|
+
class Railtie < ::Rails::Railtie
|
7
|
+
config.before_configuration do
|
8
|
+
if Secret.on_kubernetes?
|
9
|
+
::Rails.application.secrets.merge!(Secret.load_secrets)
|
10
|
+
end
|
11
|
+
end
|
12
|
+
end
|
13
|
+
end
|
14
|
+
end
|
15
|
+
end
|
metadata
ADDED
@@ -0,0 +1,85 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: kubernetes-secret-rails
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.2.2
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Zack Siri
|
8
|
+
autorequire:
|
9
|
+
bindir: exe
|
10
|
+
cert_chain: []
|
11
|
+
date: 2016-03-02 00:00:00.000000000 Z
|
12
|
+
dependencies:
|
13
|
+
- !ruby/object:Gem::Dependency
|
14
|
+
name: bundler
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
16
|
+
requirements:
|
17
|
+
- - "~>"
|
18
|
+
- !ruby/object:Gem::Version
|
19
|
+
version: '1.11'
|
20
|
+
type: :development
|
21
|
+
prerelease: false
|
22
|
+
version_requirements: !ruby/object:Gem::Requirement
|
23
|
+
requirements:
|
24
|
+
- - "~>"
|
25
|
+
- !ruby/object:Gem::Version
|
26
|
+
version: '1.11'
|
27
|
+
- !ruby/object:Gem::Dependency
|
28
|
+
name: rake
|
29
|
+
requirement: !ruby/object:Gem::Requirement
|
30
|
+
requirements:
|
31
|
+
- - "~>"
|
32
|
+
- !ruby/object:Gem::Version
|
33
|
+
version: '10.0'
|
34
|
+
type: :development
|
35
|
+
prerelease: false
|
36
|
+
version_requirements: !ruby/object:Gem::Requirement
|
37
|
+
requirements:
|
38
|
+
- - "~>"
|
39
|
+
- !ruby/object:Gem::Version
|
40
|
+
version: '10.0'
|
41
|
+
description: Simple wrapper for accessing secrets
|
42
|
+
email:
|
43
|
+
- zack@codemy.net
|
44
|
+
executables: []
|
45
|
+
extensions: []
|
46
|
+
extra_rdoc_files: []
|
47
|
+
files:
|
48
|
+
- ".gitignore"
|
49
|
+
- CODE_OF_CONDUCT.md
|
50
|
+
- Gemfile
|
51
|
+
- README.md
|
52
|
+
- Rakefile
|
53
|
+
- bin/console
|
54
|
+
- bin/setup
|
55
|
+
- kubernetes-secret-rails.gemspec
|
56
|
+
- lib/kubernetes/secret.rb
|
57
|
+
- lib/kubernetes/secret/rails.rb
|
58
|
+
- lib/kubernetes/secret/rails/railtie.rb
|
59
|
+
- lib/kubernetes/secret/rails/version.rb
|
60
|
+
homepage: http://github.com/codemy/kubernetes-secret-rails
|
61
|
+
licenses:
|
62
|
+
- MIT
|
63
|
+
metadata: {}
|
64
|
+
post_install_message:
|
65
|
+
rdoc_options: []
|
66
|
+
require_paths:
|
67
|
+
- lib
|
68
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
69
|
+
requirements:
|
70
|
+
- - ">="
|
71
|
+
- !ruby/object:Gem::Version
|
72
|
+
version: '0'
|
73
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
74
|
+
requirements:
|
75
|
+
- - ">="
|
76
|
+
- !ruby/object:Gem::Version
|
77
|
+
version: '0'
|
78
|
+
requirements: []
|
79
|
+
rubyforge_project:
|
80
|
+
rubygems_version: 2.5.1
|
81
|
+
signing_key:
|
82
|
+
specification_version: 4
|
83
|
+
summary: Simple Wrapper for accessing secrets on kubernetes
|
84
|
+
test_files: []
|
85
|
+
has_rdoc:
|