secret_hub 0.1.0 → 0.1.5
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +72 -15
- data/lib/secret_hub.rb +1 -0
- data/lib/secret_hub/commands/bulk.rb +79 -42
- data/lib/secret_hub/commands/list.rb +2 -2
- data/lib/secret_hub/config-template.yml +19 -0
- data/lib/secret_hub/config.rb +49 -0
- data/lib/secret_hub/exceptions.rb +0 -1
- data/lib/secret_hub/github_client.rb +1 -1
- data/lib/secret_hub/refinements/string_obfuscation.rb +23 -0
- data/lib/secret_hub/version.rb +1 -1
- metadata +19 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: e6826ae6ff439ea52282709e85763ce621e16df21a06717cb4dc02ac3c8fde10
|
4
|
+
data.tar.gz: 042eddba704dabdf25795ff759cc0143801b94c2e4d24d0f0a3b189786aa8ee0
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: d65734ce86a9dad8fb55e77227e30a19ec4159d6e6084769b1d55a7bdc0d3833fac3ef9d693c14e87c9e17f7035e9256461c9593526fb49e55c5394bc13bd055
|
7
|
+
data.tar.gz: 2147da79c5da7844ffa8ff9e77231fe37a0dccc501db14bb390c235fcaf7857183ad9daf63012c4ed31d2ae0b75f547d2602ff0fec400a554d99f5dc5f102f1f
|
data/README.md
CHANGED
@@ -41,38 +41,45 @@ SecretHub has two families of commands:
|
|
41
41
|
1. Commands that operate on a single repository.
|
42
42
|
2. Commands that operate on multiple repositories, and multiple secrets.
|
43
43
|
|
44
|
-
|
44
|
+
Most commands are self explanatory, and described by the CLI.
|
45
45
|
|
46
|
-
|
46
|
+
```shell
|
47
|
+
$ secrethub --help
|
48
|
+
```
|
49
|
+
|
50
|
+
Single repository operations
|
51
|
+
--------------------------------------------------
|
52
|
+
|
53
|
+
### Show the secret keys in a repository
|
47
54
|
|
48
55
|
```shell
|
49
56
|
# secrethub list REPO
|
50
57
|
$ secrethub list you/your-repo
|
51
58
|
```
|
52
59
|
|
53
|
-
|
60
|
+
### Create or update a secret in a repository
|
54
61
|
|
55
62
|
```shell
|
56
63
|
# secrethub save REPO KEY VALUE
|
57
64
|
$ secrethub list you/your-repo SECRET "there is no spoon"
|
58
65
|
```
|
59
66
|
|
60
|
-
|
67
|
+
### Delete a secret from a repository
|
61
68
|
|
62
69
|
```shell
|
63
70
|
# secrethub delete REPO KEY
|
64
71
|
$ secrethub list you/your-repo SECRET
|
65
72
|
```
|
66
73
|
|
67
|
-
### Bulk operations
|
68
74
|
|
69
|
-
|
75
|
+
Bulk operations
|
76
|
+
--------------------------------------------------
|
70
77
|
|
71
|
-
|
72
|
-
|
73
|
-
|
78
|
+
All the bulk operations function by using a simple YAML configuration file.
|
79
|
+
The configuration file includes a list of GitHub repositories, each with a
|
80
|
+
list of its secrets.
|
74
81
|
|
75
|
-
|
82
|
+
For example:
|
76
83
|
|
77
84
|
```yaml
|
78
85
|
# secrethub.yml
|
@@ -86,24 +93,74 @@ user/another-repo:
|
|
86
93
|
- SECRET_KEY
|
87
94
|
```
|
88
95
|
|
89
|
-
|
96
|
+
Each list of secrets can either be an array, or a hash.
|
97
|
+
|
98
|
+
### Using array syntax
|
99
|
+
|
100
|
+
All secrets must be defined as environment variables.
|
101
|
+
|
102
|
+
```yaml
|
103
|
+
user/repo:
|
104
|
+
- SECRET
|
105
|
+
- PASSWORD
|
106
|
+
```
|
107
|
+
|
108
|
+
### Using hash syntax
|
109
|
+
|
110
|
+
Each secret may define its value, or leave it blank. When a secret value is
|
111
|
+
blank, it will be loaded from the environment.
|
112
|
+
|
113
|
+
```yaml
|
114
|
+
user/another-repo:
|
115
|
+
SECRET:
|
116
|
+
PASSWORD: p4ssw0rd
|
117
|
+
```
|
118
|
+
|
119
|
+
### Using YAML anchors
|
120
|
+
|
121
|
+
SecretHub ignores any key that does not look like a repository (does not
|
122
|
+
include a slash `/`). Using this feature, you can define reusable YAML
|
123
|
+
anchors:
|
124
|
+
|
125
|
+
```yaml
|
126
|
+
docker: &docker
|
127
|
+
DOCKER_USER:
|
128
|
+
DOCKER_PASSWORD:
|
129
|
+
|
130
|
+
user/another-repo:
|
131
|
+
<<: *docker
|
132
|
+
SECRET:
|
133
|
+
PASSWORD: p4ssw0rd
|
134
|
+
```
|
135
|
+
|
136
|
+
Note that YAML anchors only work with the hash syntax.
|
137
|
+
|
138
|
+
|
139
|
+
### Create a sample configuration file
|
90
140
|
|
91
141
|
```shell
|
92
142
|
# secrethub bulk init [CONFIG]
|
93
143
|
$ secrethub bulk init mysecrets.yml
|
94
144
|
```
|
95
145
|
|
96
|
-
|
146
|
+
### Show the configuration file and its secrets
|
147
|
+
|
148
|
+
```shell
|
149
|
+
# secrethub bulk show [CONFIG --visible]
|
150
|
+
$ secrethub bulk show mysecrets.yml
|
151
|
+
```
|
152
|
+
|
153
|
+
### Show all secrets stored on GitHub in all repositories
|
97
154
|
|
98
155
|
```shell
|
99
156
|
# secrethub bulk list [CONFIG]
|
100
157
|
$ secrethub bulk list mysecrets.yml
|
101
158
|
```
|
102
159
|
|
103
|
-
|
160
|
+
### Save multiple secrets to multiple repositories
|
104
161
|
|
105
162
|
```shell
|
106
|
-
# secrethub bulk save [CONFIG --clean]
|
163
|
+
# secrethub bulk save [CONFIG --clean --dry --only REPO]
|
107
164
|
$ secrethub bulk save mysecrets.yml --clean
|
108
165
|
```
|
109
166
|
|
@@ -111,7 +168,7 @@ Using the `--clean` flag, you can ensure that the repositories do not have
|
|
111
168
|
any secrets that you are unaware of. This flag will delete any secret that is
|
112
169
|
not specified in your config file.
|
113
170
|
|
114
|
-
|
171
|
+
### Delete secrets from multiple repositories unless they are specified in the config file
|
115
172
|
|
116
173
|
```shell
|
117
174
|
# secrethub bulk clean [CONFIG]
|
data/lib/secret_hub.rb
CHANGED
@@ -1,92 +1,130 @@
|
|
1
|
-
require '
|
1
|
+
require 'fileutils'
|
2
|
+
require 'secret_hub/refinements/string_obfuscation'
|
2
3
|
|
3
4
|
module SecretHub
|
4
5
|
module Commands
|
5
6
|
class Bulk < Base
|
7
|
+
using StringObfuscation
|
8
|
+
|
6
9
|
summary "Update or delete multiple secrets from multiple repositories"
|
7
10
|
|
8
11
|
usage "secrethub bulk init [CONFIG]"
|
12
|
+
usage "secrethub bulk show [CONFIG --visible]"
|
9
13
|
usage "secrethub bulk list [CONFIG]"
|
10
|
-
usage "secrethub bulk save [CONFIG --clean]"
|
11
|
-
usage "secrethub bulk clean [CONFIG]"
|
14
|
+
usage "secrethub bulk save [CONFIG --clean --dry --only REPO]"
|
15
|
+
usage "secrethub bulk clean [CONFIG --dry]"
|
12
16
|
usage "secrethub bulk (-h|--help)"
|
13
17
|
|
14
18
|
command "init", "Create a sample configuration file in the current directory"
|
19
|
+
command "show", "Show the configuration file"
|
15
20
|
command "save", "Save multiple secrets to multiple repositories"
|
16
21
|
command "clean", "Delete secrets from multiple repositories unless they are specified in the config file"
|
17
22
|
command "list", "Show all secrets in all repositories"
|
18
23
|
|
19
|
-
option "-c, --clean", "Also delete any other secret not defined in the
|
24
|
+
option "-c, --clean", "Also delete any other secret not defined in the configuration file"
|
25
|
+
option "-v, --visible", "Also show secret values"
|
26
|
+
option "-d, --dry", "Dry run"
|
27
|
+
option "-o, --only REPO", "Save all secrets to a single repository from the configuration file"
|
20
28
|
|
21
29
|
param "CONFIG", "Path to the configuration file [default: secrethub.yml]"
|
22
30
|
|
23
31
|
example "secrethub bulk init"
|
32
|
+
example "secrethub bulk show --visible"
|
24
33
|
example "secrethub bulk clean"
|
25
34
|
example "secrethub bulk list mysecrets.yml"
|
26
|
-
example "secrethub bulk save mysecrets.yml"
|
35
|
+
example "secrethub bulk save mysecrets.yml --dry"
|
27
36
|
example "secrethub bulk save --clean"
|
37
|
+
example "secrethub bulk save --only me/my-important-repo"
|
28
38
|
|
29
39
|
def init_command
|
30
40
|
raise SecretHubError, "File #{config_file} already exists" if File.exist? config_file
|
41
|
+
FileUtils.cp config_template, config_file
|
42
|
+
say "!txtgrn!Saved #{config_file}"
|
43
|
+
end
|
31
44
|
|
32
|
-
|
33
|
-
|
34
|
-
"
|
35
|
-
|
45
|
+
def show_command
|
46
|
+
config.each do |repo, secrets|
|
47
|
+
say "!txtblu!#{repo}:"
|
48
|
+
secrets.each do |key, value|
|
49
|
+
show_secret key, value, args['--visible']
|
50
|
+
end
|
51
|
+
end
|
52
|
+
end
|
36
53
|
|
37
|
-
|
38
|
-
|
54
|
+
def list_command
|
55
|
+
config.each_repo do |repo|
|
56
|
+
say "!txtblu!#{repo}:"
|
57
|
+
github.secrets(repo).each do |secret|
|
58
|
+
say "- !txtpur!#{secret}"
|
59
|
+
end
|
60
|
+
end
|
39
61
|
end
|
40
62
|
|
41
63
|
def save_command
|
42
|
-
|
64
|
+
dry = args['--dry']
|
65
|
+
only = args['--only']
|
66
|
+
skipped = 0
|
43
67
|
|
44
|
-
config.each do |repo,
|
68
|
+
config.each do |repo, secrets|
|
69
|
+
next if only and repo != only
|
45
70
|
say "!txtblu!#{repo}"
|
46
|
-
update_repo repo,
|
47
|
-
clean_repo repo, keys if clean
|
71
|
+
skipped += update_repo repo, secrets, dry
|
72
|
+
clean_repo repo, secrets.keys, dry if args['--clean']
|
48
73
|
end
|
74
|
+
|
75
|
+
puts "\n" if skipped > 0 or dry
|
76
|
+
say "Skipped #{skipped} missing secrets" if skipped > 0
|
77
|
+
say "Dry run, nothing happened" if dry
|
49
78
|
end
|
50
79
|
|
51
80
|
def clean_command
|
52
|
-
|
53
|
-
say "!txtblu!#{repo}"
|
54
|
-
clean_repo repo, keys
|
55
|
-
end
|
56
|
-
end
|
81
|
+
dry = args['--dry']
|
57
82
|
|
58
|
-
|
59
|
-
config.each do |repo, keys|
|
83
|
+
config.each do |repo, secrets|
|
60
84
|
say "!txtblu!#{repo}"
|
61
|
-
|
62
|
-
say "!txtpur!#{secret}"
|
63
|
-
end
|
85
|
+
clean_repo repo, secrets.keys, dry
|
64
86
|
end
|
87
|
+
|
88
|
+
say "\nDry run, nothing happened" if dry
|
65
89
|
end
|
66
|
-
|
90
|
+
|
67
91
|
private
|
68
92
|
|
69
|
-
def clean_repo(repo, keys)
|
93
|
+
def clean_repo(repo, keys, dry)
|
70
94
|
repo_keys = github.secrets repo
|
71
95
|
delete_candidates = repo_keys - keys
|
72
96
|
|
73
97
|
delete_candidates.each do |key|
|
74
|
-
say "delete
|
75
|
-
|
98
|
+
say "delete !txtpur!#{key} "
|
99
|
+
github.delete_secret repo, key unless dry
|
76
100
|
say "!txtgrn!OK"
|
77
101
|
end
|
78
102
|
end
|
79
103
|
|
80
|
-
def update_repo(repo,
|
81
|
-
|
82
|
-
|
83
|
-
|
84
|
-
say "!
|
104
|
+
def update_repo(repo, secrets, dry)
|
105
|
+
skipped = 0
|
106
|
+
|
107
|
+
secrets.each do |key, value|
|
108
|
+
say "save !txtpur!#{key} "
|
109
|
+
if value
|
110
|
+
github.put_secret repo, key, value unless dry
|
111
|
+
say "!txtgrn!OK"
|
112
|
+
else
|
113
|
+
say "!txtred!MISSING"
|
114
|
+
skipped += 1
|
115
|
+
end
|
85
116
|
end
|
117
|
+
|
118
|
+
skipped
|
86
119
|
end
|
87
120
|
|
88
|
-
def
|
89
|
-
|
121
|
+
def show_secret(key, value, visible)
|
122
|
+
if value
|
123
|
+
value = value.obfuscate unless visible
|
124
|
+
say " !txtpur!#{key}: !txtcyn!#{value}"
|
125
|
+
else
|
126
|
+
say " !txtpur!#{key}: !txtred!*MISSING*"
|
127
|
+
end
|
90
128
|
end
|
91
129
|
|
92
130
|
def config_file
|
@@ -94,12 +132,11 @@ module SecretHub
|
|
94
132
|
end
|
95
133
|
|
96
134
|
def config
|
97
|
-
|
98
|
-
|
99
|
-
|
100
|
-
|
101
|
-
|
102
|
-
end
|
135
|
+
@config ||= Config.load config_file
|
136
|
+
end
|
137
|
+
|
138
|
+
def config_template
|
139
|
+
File.expand_path '../config-template.yml', __dir__
|
103
140
|
end
|
104
141
|
end
|
105
142
|
end
|
@@ -0,0 +1,19 @@
|
|
1
|
+
# Ignored keys
|
2
|
+
# Keys that do not include '/' will be ignored
|
3
|
+
# Can be used to set some reusable YAML anchors
|
4
|
+
docker: &docker
|
5
|
+
DOCKER_USER:
|
6
|
+
DOCKER_PASSWORD:
|
7
|
+
|
8
|
+
# Array syntax
|
9
|
+
# All secrets must be defined as environment variables
|
10
|
+
user/repo:
|
11
|
+
- SECRET
|
12
|
+
- PASSWORD
|
13
|
+
|
14
|
+
# Hash syntax
|
15
|
+
# Empty secrets will be loaded from environment variables
|
16
|
+
user/another-repo:
|
17
|
+
<<: *docker
|
18
|
+
SECRET:
|
19
|
+
PASSWORD: p4ssw0rd
|
@@ -0,0 +1,49 @@
|
|
1
|
+
require 'yaml'
|
2
|
+
|
3
|
+
module SecretHub
|
4
|
+
class Config
|
5
|
+
attr_reader :data
|
6
|
+
|
7
|
+
def self.load(config_file)
|
8
|
+
raise ConfigurationError, "Config file not found #{config_flie}" unless File.exist? config_file
|
9
|
+
new YAML.load_file config_file
|
10
|
+
end
|
11
|
+
|
12
|
+
def initialize(data)
|
13
|
+
@data = data
|
14
|
+
end
|
15
|
+
|
16
|
+
def to_h
|
17
|
+
@to_h ||= to_h!
|
18
|
+
end
|
19
|
+
|
20
|
+
def each(&block)
|
21
|
+
to_h.each &block
|
22
|
+
end
|
23
|
+
|
24
|
+
def each_repo(&block)
|
25
|
+
to_h.keys.each &block
|
26
|
+
end
|
27
|
+
|
28
|
+
private
|
29
|
+
|
30
|
+
def to_h!
|
31
|
+
result = {}
|
32
|
+
data.each do |repo, secrets|
|
33
|
+
next unless repo.include? '/'
|
34
|
+
result[repo] = resolve_secrets secrets
|
35
|
+
end
|
36
|
+
result
|
37
|
+
end
|
38
|
+
|
39
|
+
def resolve_secrets(secrets)
|
40
|
+
secrets = [] unless secrets
|
41
|
+
|
42
|
+
if secrets.is_a? Hash
|
43
|
+
secrets.map { |key, value| [key, value || ENV[key]] }.to_h
|
44
|
+
elsif secrets.is_a? Array
|
45
|
+
secrets.map { |key| [key, ENV[key]] }.to_h
|
46
|
+
end
|
47
|
+
end
|
48
|
+
end
|
49
|
+
end
|
@@ -0,0 +1,23 @@
|
|
1
|
+
require 'string-obfuscator'
|
2
|
+
|
3
|
+
module SecretHub
|
4
|
+
module StringObfuscation
|
5
|
+
refine String do
|
6
|
+
def obfuscate
|
7
|
+
text = dup
|
8
|
+
trim = false
|
9
|
+
|
10
|
+
if text.size > 40
|
11
|
+
trim = true
|
12
|
+
text = text[0..40]
|
13
|
+
end
|
14
|
+
|
15
|
+
result = StringObfuscator.obfuscate text,
|
16
|
+
percent: 60,
|
17
|
+
min_obfuscated_length: 5
|
18
|
+
|
19
|
+
trim ? "#{result}..." : result
|
20
|
+
end
|
21
|
+
end
|
22
|
+
end
|
23
|
+
end
|
data/lib/secret_hub/version.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: secret_hub
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.1.
|
4
|
+
version: 0.1.5
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Danny Ben Shitrit
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-02-
|
11
|
+
date: 2020-02-17 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: mister_bin
|
@@ -80,6 +80,20 @@ dependencies:
|
|
80
80
|
- - "~>"
|
81
81
|
- !ruby/object:Gem::Version
|
82
82
|
version: '7.1'
|
83
|
+
- !ruby/object:Gem::Dependency
|
84
|
+
name: string-obfuscator
|
85
|
+
requirement: !ruby/object:Gem::Requirement
|
86
|
+
requirements:
|
87
|
+
- - "~>"
|
88
|
+
- !ruby/object:Gem::Version
|
89
|
+
version: '0.1'
|
90
|
+
type: :runtime
|
91
|
+
prerelease: false
|
92
|
+
version_requirements: !ruby/object:Gem::Requirement
|
93
|
+
requirements:
|
94
|
+
- - "~>"
|
95
|
+
- !ruby/object:Gem::Version
|
96
|
+
version: '0.1'
|
83
97
|
description: Command line interface for managing GitHub secrets in bulk
|
84
98
|
email: db@dannyben.com
|
85
99
|
executables:
|
@@ -96,8 +110,11 @@ files:
|
|
96
110
|
- lib/secret_hub/commands/delete.rb
|
97
111
|
- lib/secret_hub/commands/list.rb
|
98
112
|
- lib/secret_hub/commands/save.rb
|
113
|
+
- lib/secret_hub/config-template.yml
|
114
|
+
- lib/secret_hub/config.rb
|
99
115
|
- lib/secret_hub/exceptions.rb
|
100
116
|
- lib/secret_hub/github_client.rb
|
117
|
+
- lib/secret_hub/refinements/string_obfuscation.rb
|
101
118
|
- lib/secret_hub/sodium.rb
|
102
119
|
- lib/secret_hub/version.rb
|
103
120
|
homepage: https://github.com/dannyben/secret_hub
|