safedb 0.3.1005 → 0.3.1009

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
- SHA256:
3
- metadata.gz: 718df8b99a21bac018c59c65972a82fbb2b117a8aeab58b7e1836dc65c4c759e
4
- data.tar.gz: b0eab23a4e4216f70badb1f454b621081fee24d3b88fce7c11cf43674d2bd018
2
+ SHA1:
3
+ metadata.gz: 93cd8e2ba6cd82c1825476110054999fc168d533
4
+ data.tar.gz: fe80242921b7acefc7344d0604270bea4c570b3f
5
5
  SHA512:
6
- metadata.gz: be459393d8ea7bfd99e1a9613e3d1b0229ab01487ec5ba7c533264e0deccd5ea6154d1eb80bd050826704f973e86eb1163c79d908bb775617abd562f17ffc120
7
- data.tar.gz: 921bbb4522ac6edc6a3f85d1acb9b019321fb6cb4dc7ad205ab44bc0a0f06089ea575605d2b0fe84f4a3747d4c58f3a50e942120f32148e6924c6f2c3cd88c43
6
+ metadata.gz: dd195060d76f1fdab168946ee71c8b0d6edee7980e31f46310d5ab19c0c60502bba4c037ffc5ec2ec39988dca6eed27228495e19c62daf15bc52a01e6fc5c698
7
+ data.tar.gz: 7b600ed027658cbbdadb4ba76621c26f9ef01b041ff6df3157cb192ebf57187ba548b33dbef2e92f40dafa858f5a263b64944940301a8cbfbba13123265cb63e
data/lib/interprete.rb CHANGED
@@ -12,7 +12,7 @@ include OpenLogger
12
12
 
13
13
 
14
14
  # This standard out sync command flushes text destined for STDOUT immediately,
15
- # without waiting either for a full cache or script completion.
15
+ # without waiting either for a full cache or completion.
16
16
  $stdout.sync = true
17
17
 
18
18
 
@@ -44,12 +44,6 @@ class Interprete < Thor
44
44
  class_option :debug, :type => :boolean
45
45
 
46
46
 
47
- # The script class option is implemented in the parent {SafeDb::UseCase}
48
- # use case enabling behaviour alteration based on the presence and state of
49
- # the --script flag.
50
- class_option :script, :type => :boolean
51
-
52
-
53
47
  # Any use case can modify its behaviour if this <tt>--to-dir</tt> class
54
48
  # option is present. For example the file write (eject) use case can place
55
49
  # files in the directory specified by this switch.
@@ -62,7 +56,6 @@ class Interprete < Thor
62
56
  class_option :to_dir, :aliases => '-t'
63
57
 
64
58
 
65
-
66
59
  # Printout the version of this safedb.net command line interface.
67
60
  desc "version", "prints the safedb.net command line interface version"
68
61
 
@@ -92,9 +85,8 @@ class Interprete < Thor
92
85
  # Description of the init configuration call.
93
86
  desc "init <book_name> <storage_dir>", "initialize the safe book on this device"
94
87
 
95
- # If confident that command history cannot be exploited to gain the
96
- # human password or if the agent running safe is itself a script,
97
- # the <tt>password</tt> option can be used to convey the password.
88
+ # Use <tt>password</tt> if confident that either the command history is
89
+ # inaccessible or the call originates from non-interactive software.
98
90
  option :password, :aliases => '-p'
99
91
 
100
92
  # Initialize the credentials manager, collect the human password and
@@ -116,9 +108,8 @@ class Interprete < Thor
116
108
  # Description of the login use case command line call.
117
109
  desc "login <book_name>", "login to the book before interacting with it"
118
110
 
119
- # If confident that command history cannot be exploited to gain the
120
- # human password or if the agent running safe is itself a script,
121
- # the <tt>password</tt> option can be used to convey the password.
111
+ # Use <tt>password</tt> if confident that either the command history is
112
+ # inaccessible or the call originates from non-interactive software.
122
113
  option :password, :aliases => '-p'
123
114
 
124
115
  # Login in order to securely interact with your data.
@@ -144,7 +135,6 @@ class Interprete < Thor
144
135
  log.info(x) { "[usecase] ~> print the key value at the opened chapter and verse." }
145
136
  print_uc = SafeDb::Print.new
146
137
  print_uc.key_name = key_name
147
- print_uc.from_script = options[:script].nil? ? false : options[:script]
148
138
  print_uc.flow_of_events
149
139
  end
150
140
 
@@ -157,7 +147,6 @@ class Interprete < Thor
157
147
  def verse
158
148
  log.info(x) { "[usecase] ~> print the verse name at the opened chapter and verse." }
159
149
  verse_uc = SafeDb::Verse.new
160
- verse_uc.from_script = options[:script].nil? ? false : options[:script]
161
150
  verse_uc.flow_of_events
162
151
  end
163
152
 
@@ -327,7 +316,6 @@ class Interprete < Thor
327
316
  def write( file_url = nil )
328
317
  log.info(x) { "[usecase] ~> write out file at chapter/verse to (optional) file url." }
329
318
  write_uc = SafeDb::Write.new
330
- write_uc.from_script = options[:script].nil? ? false : options[:script]
331
319
  write_uc.file_url = file_url if file_url
332
320
  write_uc.flow_of_events
333
321
  end
data/lib/usecase/cmd.rb CHANGED
@@ -28,21 +28,6 @@ module SafeDb
28
28
  # - {write} put directive key/value pair in parameter section
29
29
  class UseCase
30
30
 
31
- # This variable should be set to true if the use case call
32
- # originates from a shell different from the one through which
33
- # the login ocurred.
34
- #
35
- # To proceed, the shell that hosted the safe login must be a
36
- # parent or at least an ancestor of this shell.
37
- #
38
- # This variable need not be set if the login shell is the direct
39
- # parent of this one (the every day manual usage scenario).
40
- #
41
- # If however the login occurred from a grand or great grandparent
42
- # shell (as is the case when nested scripts make an agent-like call),
43
- # this variable must be set to true.
44
- attr_writer :from_script
45
-
46
31
  # This prefix denotes keys and their values should be posted as environment
47
32
  # variables within the context (for example terraform) before instigating the
48
33
  # main action like terraform apply.
@@ -89,13 +74,12 @@ module SafeDb
89
74
 
90
75
  begin
91
76
 
92
- log.info(x) { "Request for master db with from_script set to #{@from_script}" }
93
- return KeyApi.read_master_db( @from_script )
77
+ log.info(x) { "Request issued to read the master database." }
78
+ return KeyApi.read_master_db()
94
79
 
95
80
  rescue OpenSSL::Cipher::CipherError => e
96
81
 
97
82
  log.fatal(x) { "Exception getting master db for the safe book." }
98
- log.fatal(x) { "The from_script parameter came set as [ #{@from_script} ]" }
99
83
  log.fatal(x) { "The exception message is ~> [[ #{e.message} ]]" }
100
84
  e.backtrace.log_lines
101
85
  abort e.message
data/lib/version.rb CHANGED
@@ -1,3 +1,3 @@
1
1
  module SafeDb
2
- VERSION = "0.3.1005"
2
+ VERSION = "0.3.1009"
3
3
  end
data/safedb.gemspec CHANGED
@@ -23,7 +23,7 @@ Gem::Specification.new do |spec|
23
23
  spec.bindir = "bin"
24
24
  spec.executables = [ 'safe' ]
25
25
  spec.require_paths = ["lib"]
26
- spec.required_ruby_version = '>= 2.5.0'
26
+ spec.required_ruby_version = '>= 2.3.0'
27
27
 
28
28
  spec.add_dependency 'bcrypt', '~> 3.1'
29
29
  spec.add_dependency 'thor', '~> 0.20'
@@ -32,5 +32,6 @@ Gem::Specification.new do |spec|
32
32
  spec.add_development_dependency "bundler"
33
33
  spec.add_development_dependency "cucumber", "~> 2.0"
34
34
  spec.add_development_dependency "aruba", "~> 1.0.0-alpha.1"
35
+ spec.add_development_dependency "gem-release"
35
36
 
36
37
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: safedb
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.3.1005
4
+ version: 0.3.1009
5
5
  platform: ruby
6
6
  authors:
7
7
  - Apollo Akora
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2019-03-07 00:00:00.000000000 Z
11
+ date: 2019-03-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bcrypt
@@ -94,6 +94,20 @@ dependencies:
94
94
  - - "~>"
95
95
  - !ruby/object:Gem::Version
96
96
  version: 1.0.0.pre.alpha.1
97
+ - !ruby/object:Gem::Dependency
98
+ name: gem-release
99
+ requirement: !ruby/object:Gem::Requirement
100
+ requirements:
101
+ - - ">="
102
+ - !ruby/object:Gem::Version
103
+ version: '0'
104
+ type: :development
105
+ prerelease: false
106
+ version_requirements: !ruby/object:Gem::Requirement
107
+ requirements:
108
+ - - ">="
109
+ - !ruby/object:Gem::Version
110
+ version: '0'
97
111
  description: safe is a credentials manager for the linux command line written in Ruby.
98
112
  It locks and unlocks secrets in a safe simple and intuitive manner. You can then
99
113
  visit websites, manufacture keys and passwords, inject credentials into Jenkins,
@@ -208,14 +222,15 @@ required_ruby_version: !ruby/object:Gem::Requirement
208
222
  requirements:
209
223
  - - ">="
210
224
  - !ruby/object:Gem::Version
211
- version: 2.5.0
225
+ version: 2.3.0
212
226
  required_rubygems_version: !ruby/object:Gem::Requirement
213
227
  requirements:
214
228
  - - ">="
215
229
  - !ruby/object:Gem::Version
216
230
  version: '0'
217
231
  requirements: []
218
- rubygems_version: 3.0.2
232
+ rubyforge_project:
233
+ rubygems_version: 2.5.2.1
219
234
  signing_key:
220
235
  specification_version: 4
221
236
  summary: safe locks and unlocks secrets in a simple, secure and intuitive way.