# frozen_string_literal: true require 'openssl' require 'base64' require 'hashie/mash' require 'yaml' require 'chamber/encryption_methods/public_key' require 'chamber/encryption_methods/ssl' require 'chamber/encryption_methods/none' module Chamber module Filters class EncryptionFilter SECURE_KEY_TOKEN = /\A_secure_/ BASE64_STRING_PATTERN = %r{\A[A-Za-z0-9\+\/]{342}==\z} LARGE_DATA_STRING_PATTERN = %r{\A([A-Za-z0-9\+\/#]*\={0,2})#([A-Za-z0-9\+\/#]*\={0,2})#([A-Za-z0-9\+\/#]*\={0,2})\z} # rubocop:disable Metrics/LineLength def initialize(options = {}) self.encryption_key = options.fetch(:encryption_key, nil) self.data = options.fetch(:data).dup end def self.execute(options = {}) new(options).__send__(:execute) end protected attr_accessor :data attr_reader :encryption_key def execute(raw_data = data) settings = Hashie::Mash.new raw_data.each_pair do |key, value| settings[key] = if value.respond_to? :each_pair execute(value) elsif key.match(SECURE_KEY_TOKEN) encryption_method(value).encrypt(key, value, encryption_key) else value end end settings end def encryption_key=(keyish) return @encryption_key = nil if keyish.nil? key_content = if ::File.readable?(::File.expand_path(keyish)) ::File.read(::File.expand_path(keyish)) else keyish end @encryption_key = OpenSSL::PKey::RSA.new(key_content) end def encryption_method(value) if value.respond_to?(:match) && value.match(BASE64_STRING_PATTERN) EncryptionMethods::None else serialized_value = YAML.dump(value) if serialized_value.length <= 128 EncryptionMethods::PublicKey else EncryptionMethods::Ssl end end end end end end