1
0
Fork 0
mirror of https://github.com/nishiki/manage-password.git synced 2024-11-27 15:43:04 +00:00
mpw/lib/MPW.rb

370 lines
9.5 KiB
Ruby
Raw Normal View History

2013-07-17 20:31:28 +00:00
#!/usr/bin/ruby
# author: nishiki
# mail: nishiki@yaegashi.fr
# info: a simple script who manage your passwords
require 'rubygems'
require 'gpgme'
require 'csv'
require 'yaml'
2013-12-25 17:51:41 +00:00
require 'i18n'
2013-07-17 20:31:28 +00:00
class MPW
2013-08-31 19:57:27 +00:00
ID = 0
NAME = 1
GROUP = 2
PROTOCOL = 3
SERVER = 4
LOGIN = 5
PASSWORD = 6
PORT = 7
COMMENT = 8
2013-07-17 20:31:28 +00:00
attr_accessor :error_msg
2013-09-08 18:04:31 +00:00
attr_accessor :timeout_pwd
2013-07-17 20:31:28 +00:00
# Constructor
2013-12-30 21:14:29 +00:00
# @args: file_config -> the specify config file
def initialize(file_config=nil)
@error_msg = nil
2013-07-17 20:31:28 +00:00
@file_config = "#{Dir.home()}/.mpw.cfg"
2013-12-30 20:00:07 +00:00
if !file_config.nil? && !file_config.empty?
@file_config = file_config
end
2013-07-17 20:31:28 +00:00
end
# Create a new config file
# @args: key -> the gpg key to encrypt
2013-12-25 17:51:41 +00:00
# lang -> the software language
2013-07-17 20:31:28 +00:00
# file_gpg -> the file who is encrypted
# file_pwd -> the file who stock the password
# timeout_pwd -> time to save the password
# @rtrn: true if le config file is create
2013-12-25 17:51:41 +00:00
def setup(key, lang, file_gpg, timeout_pwd)
2013-07-17 20:31:28 +00:00
if not key =~ /[a-zA-Z0-9.-_]+\@[a-zA-Z0-9]+\.[a-zA-Z]+/
2013-12-25 17:51:41 +00:00
@error_msg = I18n.t('error.config.key_bad_format')
2013-07-17 20:31:28 +00:00
return false
end
if file_gpg.empty?
file_gpg = "#{Dir.home()}/.mpw.gpg"
end
2013-09-08 18:04:31 +00:00
timeout_pwd.empty? ? (timeout_pwd = 60) : (timeout_pwd = timeout_pwd.to_i)
2013-07-17 20:31:28 +00:00
config = {'config' => {'key' => key,
2013-12-25 17:51:41 +00:00
'lang' => lang,
2013-07-17 20:31:28 +00:00
'file_gpg' => file_gpg,
2013-09-08 18:04:31 +00:00
'timeout_pwd' => timeout_pwd}}
2013-07-17 20:31:28 +00:00
begin
File.open(@file_config, 'w') do |file|
file << config.to_yaml
end
2013-09-04 20:41:56 +00:00
rescue Exception => e
2013-12-25 17:51:41 +00:00
@error_msg = "#{I18n.t('error.config.write')}\n#{e}"
2013-07-17 20:31:28 +00:00
return false
end
return true
end
# Check the config file
# @rtrn: true if the config file is correct
def checkconfig()
begin
config = YAML::load_file(@file_config)
@key = config['config']['key']
2013-12-25 17:51:41 +00:00
@lang = config['config']['lang']
2013-07-17 20:31:28 +00:00
@file_gpg = config['config']['file_gpg']
@timeout_pwd = config['config']['timeout_pwd'].to_i
2013-09-08 18:04:31 +00:00
if @key.empty? || @file_gpg.empty?
2013-12-25 17:51:41 +00:00
@error_msg = I18n.t('error.config.check')
2013-07-17 20:31:28 +00:00
return false
end
2013-12-30 20:00:07 +00:00
2013-12-30 21:14:29 +00:00
I18n.locale = @lang.to_sym
2013-07-17 20:31:28 +00:00
2013-09-04 20:41:56 +00:00
rescue Exception => e
2013-12-25 17:51:41 +00:00
@error_msg = "#{I18n.t('error.config.check')}\n#{e}"
2013-07-17 20:31:28 +00:00
return false
end
return true
end
# Decrypt a gpg file
# @args: password -> the GPG key password
2013-08-25 08:07:39 +00:00
# @rtrn: true if data has been decrypted
2013-07-17 20:31:28 +00:00
def decrypt(passwd=nil)
2013-08-31 19:57:27 +00:00
@data = Array.new
2013-07-17 20:31:28 +00:00
begin
if File.exist?(@file_gpg)
crypto = GPGME::Crypto.new(:armor => true)
2013-08-31 19:57:27 +00:00
data_decrypt = crypto.decrypt(IO.read(@file_gpg), :password => passwd).read
id = 0
data_decrypt.lines do |line|
@data[id] = line.parse_csv.unshift(id)
2013-08-31 19:57:27 +00:00
id += 1;
end
2013-07-17 20:31:28 +00:00
end
2013-08-31 21:20:59 +00:00
2013-07-17 20:31:28 +00:00
return true
2013-09-04 20:41:56 +00:00
rescue Exception => e
2013-07-17 22:17:24 +00:00
if !@file_pwd.nil? && File.exist?(@file_pwd)
2013-07-17 20:31:28 +00:00
File.delete(@file_pwd)
end
2013-12-25 17:51:41 +00:00
@error_msg = "#{I18n.t('error.gpg_file.decrypt')}\n#{e}"
2013-07-17 20:31:28 +00:00
return false
end
end
# Encrypt a file
2013-08-25 08:07:39 +00:00
# @rtrn: true if the file has been encrypted
2013-07-17 20:31:28 +00:00
def encrypt()
begin
crypto = GPGME::Crypto.new(:armor => true)
file_gpg = File.open(@file_gpg, 'w+')
2013-08-31 19:57:27 +00:00
data_to_encrypt = ''
@data.each do |row|
2013-12-30 18:39:54 +00:00
data_to_encrypt << row.drop(1).to_csv
2013-08-31 19:57:27 +00:00
end
crypto.encrypt(data_to_encrypt, :recipients => @key, :output => file_gpg)
2013-07-17 20:31:28 +00:00
file_gpg.close
return true
2013-09-04 20:41:56 +00:00
rescue Exception => e
2013-12-25 17:51:41 +00:00
@error_msg = "#{I18n.t('error.gpg_file.encrypt')}\n#{e}"
2013-07-17 20:31:28 +00:00
return false
end
end
# Search in some csv data
# @args: search -> the string to search
# protocol -> the connection protocol (ssh, web, other)
2013-07-17 20:31:28 +00:00
# @rtrn: a list with the resultat of the search
2013-09-09 19:48:42 +00:00
def search(search, group=nil, protocol=nil)
2013-07-17 20:31:28 +00:00
result = Array.new()
2013-12-01 09:03:52 +00:00
if !search.nil?
search = search.downcase
end
search = search.force_encoding('ASCII-8BIT')
2013-08-31 19:57:27 +00:00
@data.each do |row|
2013-12-30 18:39:54 +00:00
row[NAME].nil? ? (name = nil) : (name = row[NAME].downcase)
row[SERVER].nil? ? (server = nil) : (server = row[SERVER].downcase)
2013-12-01 09:03:52 +00:00
row[COMMENT].nil? ? (comment = nil) : (comment = row[COMMENT].downcase)
if name =~ /^.*#{search}.*$/ || server =~ /^.*#{search}.*$/ || comment =~ /^.*#{search}.*$/
2013-09-09 19:48:42 +00:00
if (protocol.nil? || protocol.eql?(row[PROTOCOL])) && (group.nil? || group.eql?(row[GROUP]))
2013-07-17 20:31:28 +00:00
result.push(row)
end
end
end
return result
end
# Search in some csv data
# @args: id -> the id item
# @rtrn: a row with the resultat of the search
def searchById(id)
2013-08-31 19:57:27 +00:00
if not @data[id.to_i].nil?
return @data[id.to_i]
else
return Array.new
2013-07-17 20:31:28 +00:00
end
end
# Add a new item
# @args: name -> the item name
# group -> the item group
# server -> the ip or server
2013-07-17 20:31:28 +00:00
# protocol -> the protocol
# login -> the login
# passwd -> the password
# port -> the port
# comment -> a comment
# @rtrn: true if it works
def add(name, group=nil, server=nil, protocol=nil, login=nil, passwd=nil, port=nil, comment=nil)
2013-07-17 20:31:28 +00:00
row = Array.new()
if name.nil? || name.empty?
2013-12-25 17:51:41 +00:00
@error_msg = I18n.t('error.add.name_empty')
return false
end
if port.to_i <= 0
port = nil
end
2013-08-31 19:57:27 +00:00
if not @data.last.nil?
id = @data.last
id = id[ID].to_i + 1
else
id = 0
end
2013-07-17 20:31:28 +00:00
2013-08-31 20:10:29 +00:00
row[ID] = id
row[PORT] = port
row[NAME] = name.force_encoding('ASCII-8BIT')
2013-09-20 09:59:57 +00:00
group.nil? || group.empty? ? (row[GROUP] = nil) : (row[GROUP] = group.force_encoding('ASCII-8BIT'))
server.nil? || server.empty? ? (row[SERVER] = nil) : (row[SERVER] = server.force_encoding('ASCII-8BIT'))
protocol.nil? || protocol.empty? ? (row[PROTOCOL] = nil) : (row[PROTOCOL] = protocol.force_encoding('ASCII-8BIT'))
login.nil? || login.empty? ? (row[LOGIN] = nil) : (row[LOGIN] = login.force_encoding('ASCII-8BIT'))
passwd.nil? || passwd.empty? ? (row[PASSWORD] = nil) : (row[PASSWORD] = passwd.force_encoding('ASCII-8BIT'))
comment.nil? || comment.empty? ? (row[COMMENT] = nil) : (row[COMMENT] = comment.force_encoding('ASCII-8BIT'))
2013-07-17 20:31:28 +00:00
2013-08-31 19:57:27 +00:00
@data[id] = row
return true
2013-07-17 20:31:28 +00:00
end
# Update an item
# @args: id -> the item's identifiant
# name -> the item name
# group -> the item group
# server -> the ip or hostname
2013-07-17 20:31:28 +00:00
# protocol -> the protocol
# login -> the login
# passwd -> the password
# port -> the port
# comment -> a comment
# @rtrn: true if the item has been updated
def update(id, name=nil, group=nil, server=nil, protocol=nil, login=nil, passwd=nil, port=nil, comment=nil)
2013-08-31 19:57:27 +00:00
id = id.to_i
if not @data[id].nil?
if port.to_i <= 0
port = nil
end
2013-08-31 19:57:27 +00:00
row = @data[id]
row_update = Array.new()
2013-09-20 09:59:57 +00:00
name.nil? || name.empty? ? (row_update[NAME] = row[NAME]) : (row_update[NAME] = name)
group.nil? || group.empty? ? (row_update[GROUP] = row[GROUP]) : (row_update[GROUP] = group)
server.nil? || server.empty? ? (row_update[SERVER] = row[SERVER]) : (row_update[SERVER] = server)
protocol.nil? || protocol.empty? ? (row_update[PROTOCOL] = row[PROTOCOL]) : (row_update[PROTOCOL] = protocol)
login.nil? || login.empty? ? (row_update[LOGIN] = row[LOGIN]) : (row_update[LOGIN] = login)
passwd.nil? || passwd.empty? ? (row_update[PASSWORD] = row[PASSWORD]) : (row_update[PASSWORD] = passwd)
port.nil? || port.empty? ? (row_update[PORT] = row[PORT]) : (row_update[PORT] = port)
2013-09-20 10:13:02 +00:00
comment.nil? || comment.empty? ? (row_update[COMMENT] = row[COMMENT]) : (row_update[COMMENT] = comment)
2013-08-31 19:57:27 +00:00
@data[id] = row_update
2013-07-17 20:31:28 +00:00
2013-08-31 19:57:27 +00:00
return true
else
2013-12-25 17:51:41 +00:00
@error_msg = I18n.t('error.update.id_no_exist', :id => id)
2013-08-31 19:57:27 +00:00
return false
2013-07-17 20:31:28 +00:00
end
end
# Remove an item
# @args: id -> the item's identifiant
# @rtrn: true if the item has been deleted
def remove(id)
2013-08-31 19:57:27 +00:00
if not @data.delete_at(id.to_i).nil?
return true
else
2013-12-25 17:51:41 +00:00
@error_msg = I18n.t('error.delete.id_no_exist', :id => id)
2013-08-31 19:57:27 +00:00
return false
2013-07-17 20:31:28 +00:00
end
end
2013-07-25 17:51:43 +00:00
# Export to csv
# @args: file -> a string to match
# @rtrn: true if export work
def export(file)
begin
2013-08-31 19:57:27 +00:00
File.open(file, 'w+') do |file|
@data.each do |row|
row.delete_at(ID)
file << row.to_csv
2013-08-31 19:57:27 +00:00
end
2013-07-25 17:51:43 +00:00
end
2013-08-31 21:20:59 +00:00
2013-07-25 17:51:43 +00:00
return true
2013-09-04 20:41:56 +00:00
rescue Exception => e
2013-12-25 17:51:41 +00:00
@error_msg = "#{I18n.t('error.export.write', :file => file)}\n#{e}"
2013-07-25 17:51:43 +00:00
return false
end
end
# Import to csv
2013-08-26 20:19:37 +00:00
# @args: file -> path to file import
2013-07-25 17:51:43 +00:00
# @rtrn: true if the import work
def import(file)
begin
data_new = IO.read(file)
data_new.lines do |line|
if not line =~ /(.*,){6}/
2013-12-25 17:51:41 +00:00
@error_msg = I18n.t('error.import.bad_format')
2013-07-25 17:51:43 +00:00
return false
2013-08-31 19:57:27 +00:00
else
row = line.parse_csv.unshift(0)
2013-08-31 19:57:27 +00:00
if not add(row[NAME], row[GROUP], row[SERVER], row[PROTOCOL], row[LOGIN], row[PASSWORD], row[PORT], row[COMMENT])
return false
end
2013-07-25 17:51:43 +00:00
end
end
return true
2013-09-04 20:41:56 +00:00
rescue Exception => e
2013-12-25 17:51:41 +00:00
@error_msg = "#{I18n.t('error.import.read', :file => file)}\n#{e}"
2013-07-25 17:51:43 +00:00
return false
end
end
2013-08-26 20:19:37 +00:00
# Return
# @args: file -> path to file import
# @rtrn: an array with the items to import, if there is an error return false
def importPreview(file)
begin
result = Array.new()
2013-08-31 20:14:51 +00:00
id = 0
2013-08-26 20:19:37 +00:00
data = IO.read(file)
data.lines do |line|
if not line =~ /(.*,){6}/
2013-12-25 17:51:41 +00:00
@error_msg = I18n.t('error.import.bad_format')
2013-08-26 20:19:37 +00:00
return false
else
result.push(line.parse_csv.unshift(id))
2013-08-26 20:19:37 +00:00
end
2013-08-31 20:14:51 +00:00
id += 1
2013-08-26 20:19:37 +00:00
end
return result
2013-09-04 20:41:56 +00:00
rescue Exception => e
2013-12-25 17:51:41 +00:00
@error_msg = "#{I18n.t('error.import.read', :file => file)}\n#{e}"
2013-08-26 20:19:37 +00:00
return false
end
end
2014-01-08 16:57:45 +00:00
# Generate a random password
# @args: length -> the length password
# @rtrn: a random string
def self.generatePassword(length=8)
if length.to_i <= 0
length = 8
end
return ([*('A'..'Z'),*('a'..'z'),*('0'..'9')]).sample(length.to_i).join
2014-01-08 16:57:45 +00:00
#return ([*('A'..'Z'),*('a'..'z'),*('0'..'9')]-%w(0 1 I O l i o)).sample(length).join
end
2013-07-17 20:31:28 +00:00
end