# -*- encoding: utf-8 -*- # stub: sym 2.6.2 ruby lib Gem::Specification.new do |s| s.name = "sym".freeze s.version = "2.6.2".freeze s.required_rubygems_version = Gem::Requirement.new(">= 0".freeze) if s.respond_to? :required_rubygems_version= s.require_paths = ["lib".freeze] s.authors = ["Konstantin Gredeskoul".freeze] s.bindir = "exe".freeze s.date = "2017-03-12" s.description = "Sym is a ruby library (gem) that offers both the command line interface (CLI) and a set of rich Ruby APIs, which make it rather trivial to add encryption and decryption of sensitive data to your development or deployment flow. As a layer of additional security, you can encrypt the private key itself with a password. Unlike many other existing encryption tools, Sym focuses on getting out of the way \u2014 by offering its streamlined interface, hoping to make encryption of application secrets nearly completely transparent to the developers. For the data encryption Sym uses a symmetric 256-bit key with the AES-256-CBC cipher, same cipher as used by the US Government. For password-protecting the key Sym uses AES-128-CBC cipher. The resulting data is zlib-compressed and base64-encoded. The keys are also base64 encoded for easy copying/pasting/etc.\n \nSym accomplishes encryption transparency by combining convenience features: 1) Sym can read the private key from multiple source types, such as: a pathname to a file, an environment variable name, a keychain entry, or CLI argument. You simply pass either of these to the -k flag \u2014 one flag that works for all source types. 2) By utilizing OS-X Keychain on a Mac, Sym offers truly secure way of storing the key on a local machine, much more secure then storing it on a file system, 3) By using a local password cache (activated with -c) via an in-memory provider such as memcached or drb, sym invocations take advantage of password cache, and only ask for a password once per a configurable time period, 4) By using SYM_ARGS environment variable, where common flags can be saved. This is activated with sym -A, 5) By reading the key from the default key source file ~/.sym.key which requires no flags at all, 6) By utilizing the --negate option to quickly encrypt a regular file, or decrypt an encrypted file with extension .enc 7) By implementing the -t (edit) mode, that opens an encrypted file in your $EDITOR, and replaces the encrypted version upon save & exit, optionally creating a backup. 8) By offering the Sym::MagicFile ruby API to easily read encrypted files into memory.\n".freeze s.email = ["kigster@gmail.com".freeze] s.executables = ["keychain".freeze, "sym".freeze] s.files = [".codeclimate.yml".freeze, ".document".freeze, ".gitignore".freeze, ".rspec".freeze, ".rubocop.yml".freeze, ".travis.yml".freeze, ".yardopts".freeze, "CHANGELOG.md".freeze, "Gemfile".freeze, "LICENSE".freeze, "README.md".freeze, "Rakefile".freeze, "SYM-CLI.md".freeze, "bin/console".freeze, "bin/setup".freeze, "bin/sym.completion".freeze, "bin/sym.symit".freeze, "exe/keychain".freeze, "exe/sym".freeze, "lib/sym.rb".freeze, "lib/sym/app.rb".freeze, "lib/sym/app/args.rb".freeze, "lib/sym/app/cli.rb".freeze, "lib/sym/app/cli_slop.rb".freeze, "lib/sym/app/commands.rb".freeze, "lib/sym/app/commands/base_command.rb".freeze, "lib/sym/app/commands/bash_completion.rb".freeze, "lib/sym/app/commands/decrypt.rb".freeze, "lib/sym/app/commands/encrypt.rb".freeze, "lib/sym/app/commands/generate_key.rb".freeze, "lib/sym/app/commands/keychain_add_key.rb".freeze, "lib/sym/app/commands/open_editor.rb".freeze, "lib/sym/app/commands/password_protect_key.rb".freeze, "lib/sym/app/commands/print_key.rb".freeze, "lib/sym/app/commands/show_examples.rb".freeze, "lib/sym/app/commands/show_help.rb".freeze, "lib/sym/app/commands/show_version.rb".freeze, "lib/sym/app/input/handler.rb".freeze, "lib/sym/app/keychain.rb".freeze, "lib/sym/app/output.rb".freeze, "lib/sym/app/output/base.rb".freeze, "lib/sym/app/output/file.rb".freeze, "lib/sym/app/output/noop.rb".freeze, "lib/sym/app/output/stdout.rb".freeze, "lib/sym/app/password/cache.rb".freeze, "lib/sym/app/password/providers.rb".freeze, "lib/sym/app/password/providers/drb_provider.rb".freeze, "lib/sym/app/password/providers/memcached_provider.rb".freeze, "lib/sym/app/private_key/base64_decoder.rb".freeze, "lib/sym/app/private_key/decryptor.rb".freeze, "lib/sym/app/private_key/detector.rb".freeze, "lib/sym/app/private_key/handler.rb".freeze, "lib/sym/app/private_key/key_source_check.rb".freeze, "lib/sym/app/short_name.rb".freeze, "lib/sym/application.rb".freeze, "lib/sym/cipher_handler.rb".freeze, "lib/sym/configuration.rb".freeze, "lib/sym/constants.rb".freeze, "lib/sym/data.rb".freeze, "lib/sym/data/decoder.rb".freeze, "lib/sym/data/encoder.rb".freeze, "lib/sym/data/wrapper_struct.rb".freeze, "lib/sym/errors.rb".freeze, "lib/sym/extensions/class_methods.rb".freeze, "lib/sym/extensions/instance_methods.rb".freeze, "lib/sym/extensions/stdlib.rb".freeze, "lib/sym/extensions/with_retry.rb".freeze, "lib/sym/extensions/with_timeout.rb".freeze, "lib/sym/magic_file.rb".freeze, "lib/sym/version.rb".freeze, "sym-3.0-cli.md".freeze, "sym.gemspec".freeze] s.homepage = "https://github.com/kigster/sym".freeze s.post_install_message = "\nThank you for installing Sym! \n\nBLOG POST\n=========\nhttp://kig.re/2017/03/10/dead-simple-encryption-with-sym.html\n\nBASH COMPLETION\n===============\nTo enable bash command line completion, please run the following \ncommand, which appends sym's shell completion wrapper to the file \nspecified in arguments to -B/--bash-support flag.\n\n sym -B ~/.bash_profile\n source ~/.bash_profile\n \nThank you for using Sym and happy crypting :)\n\nFor bonus points, run 'symit -h' after installing and loading bash\ncompletion.\n\n@kigster on Github, \n @kig on Twitter.\n\n".freeze s.required_ruby_version = Gem::Requirement.new(">= 2.2".freeze) s.rubygems_version = "3.5.10".freeze s.summary = "Dead-simple and easy to use encryption library on top of OpenSSL, offering rich Ruby API as well as feature-rich CLI able to generate a key, encrypt/decrypt data, password-protect the keys, cache passwords, and more. Strong cipher \"aes-256-cbc\" used by US Government is behind data encryption.".freeze s.specification_version = 4 s.add_runtime_dependency(%q.freeze, ["~> 3".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 4.3".freeze]) s.add_runtime_dependency(%q.freeze, [">= 0".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 1.7".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 0.1.8".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 2.7".freeze]) s.add_development_dependency(%q.freeze, ["~> 1.0".freeze]) s.add_development_dependency(%q.freeze, [">= 0".freeze]) s.add_development_dependency(%q.freeze, [">= 0".freeze]) s.add_development_dependency(%q.freeze, ["~> 1".freeze]) s.add_development_dependency(%q.freeze, [">= 0".freeze]) s.add_development_dependency(%q.freeze, ["~> 3".freeze]) s.add_development_dependency(%q.freeze, [">= 0".freeze]) s.add_development_dependency(%q.freeze, [">= 0".freeze]) end