2014-01-29 19:49:39 +00:00
|
|
|
#!/usr/bin/ruby
|
|
|
|
# author: nishiki
|
|
|
|
# mail: nishiki@yaegashi.fr
|
|
|
|
# info: a simple script who manage your passwords
|
|
|
|
|
2014-12-06 17:20:43 +00:00
|
|
|
require 'rubygems'
|
|
|
|
require 'gpgme'
|
|
|
|
require 'csv'
|
|
|
|
require 'i18n'
|
|
|
|
require 'fileutils'
|
2014-12-07 15:24:31 +00:00
|
|
|
require 'yaml'
|
2015-01-27 22:17:16 +00:00
|
|
|
require "#{APP_ROOT}/lib/Item"
|
2014-01-29 19:49:39 +00:00
|
|
|
|
2014-12-06 17:20:43 +00:00
|
|
|
module MPW
|
2014-01-29 19:49:39 +00:00
|
|
|
class MPW
|
|
|
|
|
|
|
|
attr_accessor :error_msg
|
|
|
|
|
|
|
|
# Constructor
|
2014-12-07 15:24:31 +00:00
|
|
|
def initialize(file_gpg, key, share_keys='')
|
2014-02-02 16:34:05 +00:00
|
|
|
@error_msg = nil
|
|
|
|
@file_gpg = file_gpg
|
|
|
|
@key = key
|
|
|
|
@share_keys = share_keys
|
2015-01-27 22:17:16 +00:00
|
|
|
@data = []
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Decrypt a gpg file
|
|
|
|
# @args: password -> the GPG key password
|
|
|
|
# @rtrn: true if data has been decrypted
|
2015-01-27 22:17:16 +00:00
|
|
|
def decrypt(password=nil)
|
2014-01-30 22:08:38 +00:00
|
|
|
if File.exist?(@file_gpg)
|
2015-01-27 22:17:16 +00:00
|
|
|
crypto = GPGME::Crypto.new(armor: true)
|
|
|
|
data_decrypt = crypto.decrypt(IO.read(@file_gpg), password: password).read.force_encoding('utf-8')
|
|
|
|
if not data_decrypt.to_s.empty?
|
|
|
|
YAML.load(data_decrypt).each do |d|
|
|
|
|
@data.push(MPW::Item.new(id: d['id'],
|
|
|
|
name: d['name'],
|
|
|
|
group: d['group'],
|
|
|
|
host: d['host'],
|
|
|
|
protocol: d['protocol'],
|
|
|
|
user: d['login'],
|
|
|
|
password: d['password'],
|
|
|
|
port: d['port'],
|
|
|
|
comment: d['comment'],
|
|
|
|
last_edit: d['last_edit'],
|
|
|
|
created: d['created'],
|
|
|
|
)
|
|
|
|
end
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
2014-01-30 22:08:38 +00:00
|
|
|
|
|
|
|
return true
|
|
|
|
rescue Exception => e
|
|
|
|
@error_msg = "#{I18n.t('error.gpg_file.decrypt')}\n#{e}"
|
|
|
|
return false
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Encrypt a file
|
|
|
|
# @rtrn: true if the file has been encrypted
|
2014-01-30 22:08:38 +00:00
|
|
|
def encrypt
|
2014-12-06 15:24:40 +00:00
|
|
|
FileUtils.cp(@file_gpg, "#{@file_gpg}.bk") if File.exist?(@file_gpg)
|
2014-01-29 19:49:39 +00:00
|
|
|
|
2014-12-06 15:24:40 +00:00
|
|
|
data_to_encrypt = @data.to_yaml
|
2014-01-29 19:49:39 +00:00
|
|
|
|
2014-08-31 16:31:14 +00:00
|
|
|
recipients = []
|
2014-02-02 16:34:05 +00:00
|
|
|
recipients.push(@key)
|
2014-11-16 18:39:38 +00:00
|
|
|
if not @share_keys.nil?
|
2014-02-02 16:34:05 +00:00
|
|
|
@share_keys.split.each { |k| recipients.push(k) }
|
|
|
|
end
|
|
|
|
|
2014-12-06 15:24:40 +00:00
|
|
|
crypto = GPGME::Crypto.new(armor: true)
|
|
|
|
file_gpg = File.open(@file_gpg, 'w+')
|
2014-08-31 10:28:20 +00:00
|
|
|
crypto.encrypt(data_to_encrypt, recipients: recipients, output: file_gpg)
|
2014-01-30 22:08:38 +00:00
|
|
|
file_gpg.close
|
2014-01-29 19:49:39 +00:00
|
|
|
|
2014-12-06 15:24:40 +00:00
|
|
|
FileUtils.rm("#{@file_gpg}.bk") if File.exist?("#{@file_gpg}.bk")
|
2014-01-30 22:08:38 +00:00
|
|
|
return true
|
|
|
|
rescue Exception => e
|
|
|
|
@error_msg = "#{I18n.t('error.gpg_file.encrypt')}\n#{e}"
|
2014-12-06 15:24:40 +00:00
|
|
|
FileUtils.mv("#{@file_gpg}.bk", @file_gpg) if File.exist?("#{@file_gpg}.bk")
|
2014-01-30 22:08:38 +00:00
|
|
|
return false
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Search in some csv data
|
|
|
|
# @args: search -> the string to search
|
|
|
|
# protocol -> the connection protocol (ssh, web, other)
|
|
|
|
# @rtrn: a list with the resultat of the search
|
2015-01-27 22:17:16 +00:00
|
|
|
def list(options={})
|
2014-01-31 23:09:22 +00:00
|
|
|
result = []
|
2014-01-29 19:49:39 +00:00
|
|
|
|
2015-01-27 22:17:16 +00:00
|
|
|
search = defined?(options[:search]) ? options[:search].downcase : ''
|
2014-01-29 19:49:39 +00:00
|
|
|
|
2015-01-27 22:17:16 +00:00
|
|
|
@data.each do |item|
|
|
|
|
name = item.name.nil? ? nil : item.name.downcase
|
|
|
|
host = item.host.nil? ? nil : item.host.downcase
|
|
|
|
comment = item.comment.nil? ? nil : item.comment.downcase
|
2014-01-29 19:49:39 +00:00
|
|
|
|
2015-01-27 22:17:16 +00:00
|
|
|
if name =~ /^.*#{search}.*$/ or host =~ /^.*#{search}.*$/ or comment =~ /^.*#{search}.*$/
|
|
|
|
if (not defined?(options[:protocol] or options[:protocol].eql?(item.protocol)) and
|
|
|
|
(group.nil? or options[:group].eql?(item.group))
|
|
|
|
result.push(item)
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
return result
|
|
|
|
end
|
|
|
|
|
|
|
|
# Search in some csv data
|
2014-12-31 10:31:28 +00:00
|
|
|
# @args: id -> the id item
|
2014-01-29 19:49:39 +00:00
|
|
|
# @rtrn: a row with the resultat of the search
|
2014-12-31 10:31:28 +00:00
|
|
|
def search_by_id(id)
|
2015-01-27 22:17:16 +00:00
|
|
|
@data.each do |item|
|
|
|
|
return item if item.id == id
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
|
|
|
|
2015-01-27 22:17:16 +00:00
|
|
|
return nil
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Remove an item
|
|
|
|
# @args: id -> the item's identifiant
|
|
|
|
# @rtrn: true if the item has been deleted
|
|
|
|
def remove(id)
|
2014-12-31 10:31:28 +00:00
|
|
|
@data.each_value do |row|
|
|
|
|
if row['id'] == id
|
2014-12-06 15:24:40 +00:00
|
|
|
@data.delete(id)
|
2014-01-29 19:49:39 +00:00
|
|
|
return true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-08-31 10:28:20 +00:00
|
|
|
@error_msg = I18n.t('error.delete.id_no_exist', id: id)
|
2014-01-29 19:49:39 +00:00
|
|
|
return false
|
|
|
|
end
|
|
|
|
|
|
|
|
# Export to csv
|
2014-11-15 18:14:42 +00:00
|
|
|
# @args: file -> file where you export the data
|
2014-12-06 15:24:40 +00:00
|
|
|
# type -> udata type
|
2014-01-29 19:49:39 +00:00
|
|
|
# @rtrn: true if export work
|
2014-12-06 22:32:09 +00:00
|
|
|
def export(file, type=:yaml)
|
2014-11-15 18:14:42 +00:00
|
|
|
case type
|
|
|
|
when :csv
|
2014-12-29 21:32:36 +00:00
|
|
|
CSV.open(file, 'w', write_headers: true,
|
|
|
|
headers: ['name', 'group', 'protocol', 'host', 'login', 'password', 'port', 'comment']) do |csv|
|
|
|
|
@data.each do |id, r|
|
|
|
|
csv << [r['name'], r['group'], r['protocol'], r['host'], r['login'], r['password'], r['port'], r['comment']]
|
2014-11-15 18:14:42 +00:00
|
|
|
end
|
2014-12-29 21:32:36 +00:00
|
|
|
end
|
2014-11-15 18:14:42 +00:00
|
|
|
|
2014-12-06 17:20:43 +00:00
|
|
|
when :yaml
|
|
|
|
File.open(file, 'w') {|f| f << @data.to_yaml}
|
2014-11-15 18:14:42 +00:00
|
|
|
|
|
|
|
else
|
|
|
|
@error_msg = "#{I18n.t('error.export.unknown_type', type: type)}"
|
|
|
|
return false
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
2014-08-31 15:40:37 +00:00
|
|
|
|
2014-01-30 22:08:38 +00:00
|
|
|
return true
|
|
|
|
rescue Exception => e
|
2014-08-31 10:28:20 +00:00
|
|
|
@error_msg = "#{I18n.t('error.export.write', file: file)}\n#{e}"
|
2014-01-30 22:08:38 +00:00
|
|
|
return false
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Import to csv
|
|
|
|
# @args: file -> path to file import
|
2014-12-06 15:24:40 +00:00
|
|
|
# type -> udata type
|
2014-01-29 19:49:39 +00:00
|
|
|
# @rtrn: true if the import work
|
2014-12-06 22:32:09 +00:00
|
|
|
def import(file, type=:yaml)
|
2014-12-06 15:24:40 +00:00
|
|
|
case type
|
|
|
|
when :csv
|
2014-12-06 17:20:43 +00:00
|
|
|
CSV.foreach(file, {headers: true}) do |row|
|
|
|
|
if not update(row['name'], row['group'], row['host'], row['protocol'], row['login'], row['password'], row['port'], row['comment'])
|
2014-12-06 15:24:40 +00:00
|
|
|
return false
|
|
|
|
end
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
2014-12-06 17:20:43 +00:00
|
|
|
|
2014-12-06 15:24:40 +00:00
|
|
|
when :yaml
|
2014-12-31 10:31:28 +00:00
|
|
|
YAML::load_file(file).each_value do |row|
|
2014-12-06 15:24:40 +00:00
|
|
|
if not update(row['name'], row['group'], row['host'], row['protocol'], row['login'], row['password'], row['port'], row['comment'])
|
|
|
|
return false
|
|
|
|
end
|
|
|
|
end
|
2014-12-06 17:20:43 +00:00
|
|
|
|
2014-12-06 15:24:40 +00:00
|
|
|
else
|
|
|
|
@error_msg = "#{I18n.t('error.export.unknown_type', type: type)}"
|
|
|
|
return false
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
2014-01-30 22:08:38 +00:00
|
|
|
|
|
|
|
return true
|
|
|
|
rescue Exception => e
|
2014-08-31 10:28:20 +00:00
|
|
|
@error_msg = "#{I18n.t('error.import.read', file: file)}\n#{e}"
|
2014-01-30 22:08:38 +00:00
|
|
|
return false
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Return a preview import
|
|
|
|
# @args: file -> path to file import
|
2014-12-06 20:37:18 +00:00
|
|
|
# @rtrn: a hash with the items to import, if there is an error return false
|
2014-12-28 18:43:13 +00:00
|
|
|
def import_preview(file, type=:yaml)
|
2014-01-31 23:09:22 +00:00
|
|
|
result = []
|
2014-12-06 15:24:40 +00:00
|
|
|
case type
|
|
|
|
when :csv
|
|
|
|
CSV.foreach(file, {headers: true}) do |row|
|
|
|
|
result << row
|
|
|
|
end
|
|
|
|
when :yaml
|
|
|
|
YAML::load_file(file).each do |k, row|
|
|
|
|
result << row
|
|
|
|
end
|
|
|
|
else
|
|
|
|
@error_msg = "#{I18n.t('error.export.unknown_type', type: type)}"
|
|
|
|
return false
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
2014-01-30 22:08:38 +00:00
|
|
|
|
|
|
|
return result
|
|
|
|
rescue Exception => e
|
2014-08-31 10:28:20 +00:00
|
|
|
@error_msg = "#{I18n.t('error.import.read', file: file)}\n#{e}"
|
2014-01-30 22:08:38 +00:00
|
|
|
return false
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Sync remote data and local data
|
|
|
|
# @args: data_remote -> array with the data remote
|
|
|
|
# last_update -> last update
|
|
|
|
# @rtrn: false if data_remote is nil
|
|
|
|
def sync(data_remote, last_update)
|
2014-12-06 20:37:18 +00:00
|
|
|
if not data_remote.instance_of?(Array)
|
|
|
|
@error_msg = I18n.t('error.sync.array')
|
2014-01-29 19:49:39 +00:00
|
|
|
return false
|
2014-12-06 17:20:43 +00:00
|
|
|
else not data_remote.to_s.empty?
|
2014-12-31 10:31:28 +00:00
|
|
|
@data.each_value do |l|
|
2014-04-27 16:10:21 +00:00
|
|
|
j = 0
|
|
|
|
update = false
|
|
|
|
|
|
|
|
# Update item
|
2014-12-06 20:37:18 +00:00
|
|
|
data_remote.each do |r|
|
2014-12-06 17:20:43 +00:00
|
|
|
if l['id'] == r['id']
|
|
|
|
if l['date'].to_i < r['date'].to_i
|
|
|
|
update(r['name'], r['group'], r['host'], r['protocol'], r['login'], r['password'], r['port'], r['comment'], l['id'])
|
2014-04-27 16:10:21 +00:00
|
|
|
end
|
|
|
|
update = true
|
2014-12-06 20:37:18 +00:00
|
|
|
data_remote.delete(r['id'])
|
2014-04-27 16:10:21 +00:00
|
|
|
break
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
2014-04-27 16:10:21 +00:00
|
|
|
j += 1
|
|
|
|
end
|
|
|
|
|
|
|
|
# Delete an old item
|
2014-12-06 17:20:43 +00:00
|
|
|
if not update and l['date'].to_i < last_update
|
|
|
|
remove(l['id'])
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Add item
|
2014-12-06 20:37:18 +00:00
|
|
|
data_remote.each do |r|
|
2014-12-06 17:20:43 +00:00
|
|
|
if r['date'].to_i > last_update
|
|
|
|
update(r['name'], r['group'], r['host'], r['protocol'], r['login'], r['password'], r['port'], r['comment'], r['id'])
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-01-30 22:08:38 +00:00
|
|
|
return encrypt
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Generate a random password
|
|
|
|
# @args: length -> the length password
|
|
|
|
# @rtrn: a random string
|
|
|
|
def self.password(length=8)
|
|
|
|
if length.to_i <= 0
|
|
|
|
length = 8
|
|
|
|
else
|
|
|
|
length = length.to_i
|
|
|
|
end
|
|
|
|
|
|
|
|
result = ''
|
|
|
|
while length > 62 do
|
|
|
|
result << ([*('A'..'Z'),*('a'..'z'),*('0'..'9')]).sample(62).join
|
|
|
|
length -= 62
|
|
|
|
end
|
|
|
|
result << ([*('A'..'Z'),*('a'..'z'),*('0'..'9')]).sample(length).join
|
|
|
|
|
|
|
|
return result
|
|
|
|
end
|
|
|
|
|
2014-12-06 17:20:43 +00:00
|
|
|
end
|
2014-01-29 19:49:39 +00:00
|
|
|
end
|