pwsafe-agent 0.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/.gitignore +17 -0
- data/Gemfile +4 -0
- data/LICENSE +22 -0
- data/README.md +47 -0
- data/Rakefile +2 -0
- data/bin/pwsafe-agent +85 -0
- data/bin/pwsafe-client +6 -0
- data/lib/pwsafe-agent.rb +6 -0
- data/lib/pwsafe-agent/client.rb +62 -0
- data/lib/pwsafe-agent/driver.rb +50 -0
- data/lib/pwsafe-agent/version.rb +5 -0
- data/pwsafe-agent.gemspec +21 -0
- metadata +60 -0
data/.gitignore
ADDED
data/Gemfile
ADDED
data/LICENSE
ADDED
@@ -0,0 +1,22 @@
|
|
1
|
+
Copyright (c) 2012 Fabrizio Regini
|
2
|
+
|
3
|
+
MIT License
|
4
|
+
|
5
|
+
Permission is hereby granted, free of charge, to any person obtaining
|
6
|
+
a copy of this software and associated documentation files (the
|
7
|
+
"Software"), to deal in the Software without restriction, including
|
8
|
+
without limitation the rights to use, copy, modify, merge, publish,
|
9
|
+
distribute, sublicense, and/or sell copies of the Software, and to
|
10
|
+
permit persons to whom the Software is furnished to do so, subject to
|
11
|
+
the following conditions:
|
12
|
+
|
13
|
+
The above copyright notice and this permission notice shall be
|
14
|
+
included in all copies or substantial portions of the Software.
|
15
|
+
|
16
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
17
|
+
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
18
|
+
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
19
|
+
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
20
|
+
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
21
|
+
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
22
|
+
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
data/README.md
ADDED
@@ -0,0 +1,47 @@
|
|
1
|
+
# Pwsafe::Agent
|
2
|
+
|
3
|
+
This gem is a wrapper for pwsafe composed of two executables which aim
|
4
|
+
to reduce the typing of the master password.
|
5
|
+
|
6
|
+
## How it works
|
7
|
+
|
8
|
+
A daemon is executed and a client interacts with it to save the master
|
9
|
+
passwowrd for a specified amount of time. At any later invocation, the
|
10
|
+
client asks the daemon for the master password.
|
11
|
+
|
12
|
+
Client and server communication is operated across a unix socket.
|
13
|
+
|
14
|
+
Master password is expired after 10 minutes.
|
15
|
+
|
16
|
+
Any printed output is saved to temporary file into `~/.pwsafe-agent/tmp` only for
|
17
|
+
the time required for the client program to execute. This is impossible to avoid
|
18
|
+
given the way pwsafe is designed. If you find any better solution, your contribution
|
19
|
+
is more than welcome.
|
20
|
+
|
21
|
+
Server pid is saved at `~/.pwsafe-agent/pid`
|
22
|
+
|
23
|
+
## Usage
|
24
|
+
|
25
|
+
pwsafe-client [any-pwsafe-option]
|
26
|
+
|
27
|
+
Examples:
|
28
|
+
|
29
|
+
pwsafe-client --list heroku
|
30
|
+
|
31
|
+
You can avoid the saving of master password to the server, or flush the saved password
|
32
|
+
by passing `--flush` option to the client, even in conjunction with any pwsafe command:
|
33
|
+
|
34
|
+
pwsafe-client -up amazon --flush
|
35
|
+
|
36
|
+
|
37
|
+
## Installation
|
38
|
+
|
39
|
+
gem install pwsafe-agent
|
40
|
+
|
41
|
+
## Contributing
|
42
|
+
|
43
|
+
1. Fork it
|
44
|
+
2. Create your feature branch (`git checkout -b my-new-feature`)
|
45
|
+
3. Commit your changes (`git commit -am 'Added some feature'`)
|
46
|
+
4. Push to the branch (`git push origin my-new-feature`)
|
47
|
+
5. Create new Pull Request
|
data/Rakefile
ADDED
data/bin/pwsafe-agent
ADDED
@@ -0,0 +1,85 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
require 'socket'
|
3
|
+
require 'pathname'
|
4
|
+
require 'logger'
|
5
|
+
|
6
|
+
AGENT_DIR = File.expand_path('~/.pwsafe-agent')
|
7
|
+
SOCKET_PATH = File.join(AGENT_DIR, 'socket')
|
8
|
+
|
9
|
+
PID_FILE = File.join(AGENT_DIR, 'pid')
|
10
|
+
LOG_FILE = File.join(AGENT_DIR, 'logs')
|
11
|
+
|
12
|
+
LOGGER = Logger.new(LOG_FILE)
|
13
|
+
PWSTORE = Hash.new
|
14
|
+
|
15
|
+
PWSTORE[:password] = Hash.new
|
16
|
+
|
17
|
+
STORE_TIME = 60 * 10 # minutes
|
18
|
+
|
19
|
+
if File.exists? PID_FILE
|
20
|
+
puts "Found pid at #{PID_FILE}, exiting"
|
21
|
+
exit 126
|
22
|
+
end
|
23
|
+
|
24
|
+
`mkdir -p #{AGENT_DIR}`
|
25
|
+
`rm #{SOCKET_PATH}`
|
26
|
+
|
27
|
+
Process.daemon(true)
|
28
|
+
|
29
|
+
def write_pid
|
30
|
+
`echo "#{Process.pid}" > #{PID_FILE}`
|
31
|
+
end
|
32
|
+
|
33
|
+
def clear_pid
|
34
|
+
`rm #{PID_FILE}`
|
35
|
+
end
|
36
|
+
|
37
|
+
Process.fork do
|
38
|
+
write_pid
|
39
|
+
|
40
|
+
Signal.trap('TERM') do
|
41
|
+
LOGGER.debug "Received TERM, exiting"
|
42
|
+
clear_pid && exit
|
43
|
+
end
|
44
|
+
|
45
|
+
begin
|
46
|
+
cleaner_thread = Thread.new do
|
47
|
+
loop do
|
48
|
+
begin
|
49
|
+
sleep 10
|
50
|
+
if PWSTORE[:password][:time] && PWSTORE[:password][:time] < Time.now - STORE_TIME
|
51
|
+
PWSTORE[:password] = Hash.new
|
52
|
+
end
|
53
|
+
rescue => e
|
54
|
+
LOGGER.error "#{e.message}"
|
55
|
+
end
|
56
|
+
end
|
57
|
+
end
|
58
|
+
|
59
|
+
UNIXServer.open(SOCKET_PATH) do |server|
|
60
|
+
while true do
|
61
|
+
accepted = server.accept # this block
|
62
|
+
command = accepted.read
|
63
|
+
begin
|
64
|
+
if command =~ /SET=(.+)/
|
65
|
+
PWSTORE[:password] = {:time => Time.now, :password => $1}
|
66
|
+
accepted.write PWSTORE[:password][:password]
|
67
|
+
elsif command == 'GET'
|
68
|
+
accepted.write PWSTORE[:password][:password]
|
69
|
+
elsif command == "FLUSH"
|
70
|
+
PWSTORE[:password] = Hash.new
|
71
|
+
else
|
72
|
+
accepted.write "-"
|
73
|
+
end
|
74
|
+
|
75
|
+
accepted.close
|
76
|
+
rescue => e
|
77
|
+
LOGGER.error "#{e.message} #{e.backtrace.join}"
|
78
|
+
end
|
79
|
+
end
|
80
|
+
end
|
81
|
+
rescue => e
|
82
|
+
LOGGER.error "#{e.message} #{e.backtrace.join}"
|
83
|
+
end
|
84
|
+
clear_pid
|
85
|
+
end
|
data/bin/pwsafe-client
ADDED
data/lib/pwsafe-agent.rb
ADDED
@@ -0,0 +1,62 @@
|
|
1
|
+
require 'socket'
|
2
|
+
require 'pathname'
|
3
|
+
require 'logger'
|
4
|
+
|
5
|
+
require File.expand_path('driver', File.dirname(__FILE__))
|
6
|
+
|
7
|
+
module Pwsafe
|
8
|
+
module Agent
|
9
|
+
|
10
|
+
BASE_DIR = '~/.pwsafe-agent'
|
11
|
+
SOCKET_PATH = File.expand_path(File.join(BASE_DIR, 'socket'))
|
12
|
+
TMP_FILE_PATH = File.expand_path(File.join(BASE_DIR, 'tmp'))
|
13
|
+
PWSAFE = ENV['PWSAFE_COMMAND'] || 'pwsafe'
|
14
|
+
|
15
|
+
class Client
|
16
|
+
def initialize(args)
|
17
|
+
system 'pwsafe-agent'
|
18
|
+
@args = args
|
19
|
+
end
|
20
|
+
|
21
|
+
def driver
|
22
|
+
@driver ||= Driver.new
|
23
|
+
end
|
24
|
+
|
25
|
+
def print_temp_file
|
26
|
+
puts File.read(TMP_FILE_PATH)
|
27
|
+
end
|
28
|
+
|
29
|
+
def remove_temp_file
|
30
|
+
system "rm #{TMP_FILE_PATH}"
|
31
|
+
end
|
32
|
+
|
33
|
+
def command
|
34
|
+
password = driver.get
|
35
|
+
"echo '#{password}' | #{PWSAFE} -E --output=#{TMP_FILE_PATH} #{stringified_args} > /dev/null"
|
36
|
+
end
|
37
|
+
|
38
|
+
def pwsafe_run
|
39
|
+
if system(command)
|
40
|
+
print_temp_file
|
41
|
+
remove_temp_file
|
42
|
+
else
|
43
|
+
puts "Some error occurred during command"
|
44
|
+
driver.flush
|
45
|
+
end
|
46
|
+
end
|
47
|
+
|
48
|
+
def run
|
49
|
+
if @args.delete('--flush')
|
50
|
+
driver.flush
|
51
|
+
end
|
52
|
+
|
53
|
+
pwsafe_run
|
54
|
+
end
|
55
|
+
|
56
|
+
def stringified_args
|
57
|
+
@args.join ' '
|
58
|
+
end
|
59
|
+
|
60
|
+
end
|
61
|
+
end
|
62
|
+
end
|
@@ -0,0 +1,50 @@
|
|
1
|
+
module Pwsafe
|
2
|
+
module Agent
|
3
|
+
class Driver
|
4
|
+
def initialize
|
5
|
+
@password = nil
|
6
|
+
end
|
7
|
+
|
8
|
+
def set
|
9
|
+
UNIXSocket.open(SOCKET_PATH) do |sock|
|
10
|
+
puts "type password"
|
11
|
+
begin
|
12
|
+
system 'stty -echo'
|
13
|
+
password = STDIN.gets.chomp
|
14
|
+
ensure
|
15
|
+
system 'stty echo'
|
16
|
+
end
|
17
|
+
sock.write "SET=#{password}"
|
18
|
+
sock.close_write
|
19
|
+
|
20
|
+
@password = sock.read
|
21
|
+
sock.close
|
22
|
+
end
|
23
|
+
end
|
24
|
+
|
25
|
+
def flush
|
26
|
+
UNIXSocket.open(SOCKET_PATH) do |sock|
|
27
|
+
sock.write "FLUSH"
|
28
|
+
sock.close
|
29
|
+
end
|
30
|
+
end
|
31
|
+
|
32
|
+
def blank_password?
|
33
|
+
@password == ''
|
34
|
+
end
|
35
|
+
|
36
|
+
def get
|
37
|
+
UNIXSocket.open(SOCKET_PATH) do |sock|
|
38
|
+
sock.write 'GET'
|
39
|
+
sock.close_write
|
40
|
+
|
41
|
+
@password = sock.read
|
42
|
+
sock.close
|
43
|
+
end
|
44
|
+
|
45
|
+
set if blank_password?
|
46
|
+
@password
|
47
|
+
end
|
48
|
+
end
|
49
|
+
end
|
50
|
+
end
|
@@ -0,0 +1,21 @@
|
|
1
|
+
# -*- encoding: utf-8 -*-
|
2
|
+
require File.expand_path('../lib/pwsafe-agent/version', __FILE__)
|
3
|
+
|
4
|
+
Gem::Specification.new do |gem|
|
5
|
+
gem.authors = ["Fabrizio Regini"]
|
6
|
+
gem.email = ["freegenie@gmail.com"]
|
7
|
+
gem.description = %q{Avoid master password typing in pwsafe}
|
8
|
+
gem.summary = <<-EOH
|
9
|
+
Make pwsafe on the command line more friendly
|
10
|
+
by avoiding the need of repetitive master password typing.
|
11
|
+
EOH
|
12
|
+
|
13
|
+
gem.homepage = "https://github.com/freegenie/pwsafe-agent"
|
14
|
+
|
15
|
+
gem.files = `git ls-files`.split($\)
|
16
|
+
gem.executables = gem.files.grep(%r{^bin/}).map{ |f| File.basename(f) }
|
17
|
+
gem.test_files = gem.files.grep(%r{^(test|spec|features)/})
|
18
|
+
gem.name = "pwsafe-agent"
|
19
|
+
gem.require_paths = ["lib"]
|
20
|
+
gem.version = Pwsafe::Agent::VERSION
|
21
|
+
end
|
metadata
ADDED
@@ -0,0 +1,60 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: pwsafe-agent
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.0.2
|
5
|
+
prerelease:
|
6
|
+
platform: ruby
|
7
|
+
authors:
|
8
|
+
- Fabrizio Regini
|
9
|
+
autorequire:
|
10
|
+
bindir: bin
|
11
|
+
cert_chain: []
|
12
|
+
date: 2012-07-30 00:00:00.000000000 Z
|
13
|
+
dependencies: []
|
14
|
+
description: Avoid master password typing in pwsafe
|
15
|
+
email:
|
16
|
+
- freegenie@gmail.com
|
17
|
+
executables:
|
18
|
+
- pwsafe-agent
|
19
|
+
- pwsafe-client
|
20
|
+
extensions: []
|
21
|
+
extra_rdoc_files: []
|
22
|
+
files:
|
23
|
+
- .gitignore
|
24
|
+
- Gemfile
|
25
|
+
- LICENSE
|
26
|
+
- README.md
|
27
|
+
- Rakefile
|
28
|
+
- bin/pwsafe-agent
|
29
|
+
- bin/pwsafe-client
|
30
|
+
- lib/pwsafe-agent.rb
|
31
|
+
- lib/pwsafe-agent/client.rb
|
32
|
+
- lib/pwsafe-agent/driver.rb
|
33
|
+
- lib/pwsafe-agent/version.rb
|
34
|
+
- pwsafe-agent.gemspec
|
35
|
+
homepage: https://github.com/freegenie/pwsafe-agent
|
36
|
+
licenses: []
|
37
|
+
post_install_message:
|
38
|
+
rdoc_options: []
|
39
|
+
require_paths:
|
40
|
+
- lib
|
41
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
42
|
+
none: false
|
43
|
+
requirements:
|
44
|
+
- - ! '>='
|
45
|
+
- !ruby/object:Gem::Version
|
46
|
+
version: '0'
|
47
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
48
|
+
none: false
|
49
|
+
requirements:
|
50
|
+
- - ! '>='
|
51
|
+
- !ruby/object:Gem::Version
|
52
|
+
version: '0'
|
53
|
+
requirements: []
|
54
|
+
rubyforge_project:
|
55
|
+
rubygems_version: 1.8.24
|
56
|
+
signing_key:
|
57
|
+
specification_version: 3
|
58
|
+
summary: Make pwsafe on the command line more friendly by avoiding the need of repetitive
|
59
|
+
master password typing.
|
60
|
+
test_files: []
|