Vault encrypt string cli (#21024)
* Add a vault 'encrypt_string' command. The command will encrypt the string on the command line and print out the yaml block that can be included in a playbook. To be prompted for a string to encrypt: ansible-vault encrypt_string --prompt To specify a string on the command line: ansible-vault encrypt_string "some string to encrypt" To read a string from stdin to encrypt: echo "the plaintext to encrypt" | ansible-vault encrypt_string If a --name or --stdin-name is provided, the output will include that name in yaml key value format: $ ansible-vault encrypt_string "42" --name "the_answer" the_answer: !vault-encrypted | $ANSIBLE_VAULT;1.1;AES256 <vault cipher text here> plaintext provided via prompt, cli, and/or stdin can be mixed: $ ansible-vault encrypt_string "42" --name "the_answer" --prompt Vault password: Variable name (enter for no name): some_variable String to encrypt: microfiber # The encrypted version of variable ("some_variable", the string #1 from the interactive prompt). some_variable: !vault-encrypted | $ANSIBLE_VAULT;1.1;AES256 < vault cipher text here> # The encrypted version of variable ("the_answer", the string #2 from the command line args). the_answer: !vault-encrypted | $ANSIBLE_VAULT;1.1;AES256 < vault cipher text here> Encryption successful * add stdin and prompting to vault 'encrypt_string' * add a --name to encrypt_string to optional specify a var name * prompt for a var name to use with --prompt * add a --stdin-name for the var name for value read from stdin
This commit is contained in:
parent
fe02dbecc0
commit
7b6c992c46
2 changed files with 182 additions and 3 deletions
|
@ -26,7 +26,7 @@ from ansible.errors import AnsibleError, AnsibleOptionsError
|
|||
from ansible.parsing.dataloader import DataLoader
|
||||
from ansible.parsing.vault import VaultEditor
|
||||
from ansible.cli import CLI
|
||||
from ansible.module_utils._text import to_text
|
||||
from ansible.module_utils._text import to_text, to_bytes
|
||||
|
||||
try:
|
||||
from __main__ import display
|
||||
|
@ -38,12 +38,19 @@ except ImportError:
|
|||
class VaultCLI(CLI):
|
||||
""" Vault command line class """
|
||||
|
||||
VALID_ACTIONS = ("create", "decrypt", "edit", "encrypt", "rekey", "view")
|
||||
VALID_ACTIONS = ("create", "decrypt", "edit", "encrypt", "encrypt_string", "rekey", "view")
|
||||
|
||||
FROM_STDIN = "stdin"
|
||||
FROM_ARGS = "the command line args"
|
||||
FROM_PROMPT = "the interactive prompt"
|
||||
|
||||
def __init__(self, args):
|
||||
|
||||
self.vault_pass = None
|
||||
self.new_vault_pass = None
|
||||
|
||||
self.encrypt_string_read_stdin = False
|
||||
|
||||
super(VaultCLI, self).__init__(args)
|
||||
|
||||
def parse(self):
|
||||
|
@ -67,6 +74,18 @@ class VaultCLI(CLI):
|
|||
self.parser.set_usage("usage: %prog view [options] file_name")
|
||||
elif self.action == "encrypt":
|
||||
self.parser.set_usage("usage: %prog encrypt [options] file_name")
|
||||
# I have no prefence for either dash or underscore
|
||||
elif self.action == "encrypt_string":
|
||||
self.parser.add_option('-p', '--prompt', dest='encrypt_string_prompt',
|
||||
action='store_true',
|
||||
help="Prompt for the string to encrypt")
|
||||
self.parser.add_option('-n', '--name', dest='encrypt_string_names',
|
||||
action='append',
|
||||
help="Specify the variable name")
|
||||
self.parser.add_option('--stdin-name', dest='encrypt_string_stdin_name',
|
||||
default=None,
|
||||
help="Specify the variable name for stdin")
|
||||
self.parser.set_usage("usage: %prog encrypt-string [--prompt] [options] string_to_encrypt")
|
||||
elif self.action == "rekey":
|
||||
self.parser.set_usage("usage: %prog rekey [options] file_name")
|
||||
|
||||
|
@ -74,7 +93,7 @@ class VaultCLI(CLI):
|
|||
|
||||
display.verbosity = self.options.verbosity
|
||||
|
||||
can_output = ['encrypt', 'decrypt']
|
||||
can_output = ['encrypt', 'decrypt', 'encrypt_string']
|
||||
|
||||
if self.action not in can_output:
|
||||
if self.options.output_file:
|
||||
|
@ -90,6 +109,14 @@ class VaultCLI(CLI):
|
|||
if self.options.output_file and len(self.args) > 1:
|
||||
raise AnsibleOptionsError("At most one input file may be used with the --output option")
|
||||
|
||||
if '-' in self.args or len(self.args) == 0 or self.options.encrypt_string_stdin_name:
|
||||
self.encrypt_string_read_stdin = True
|
||||
|
||||
# TODO: prompting from stdin and reading from stdin seem
|
||||
# mutually exclusive, but verify that.
|
||||
if self.options.encrypt_string_prompt and self.encrypt_string_read_stdin:
|
||||
raise AnsibleOptionsError('The --prompt option is not supported if also reading input from stdin')
|
||||
|
||||
def run(self):
|
||||
|
||||
super(VaultCLI, self).run()
|
||||
|
@ -118,6 +145,10 @@ class VaultCLI(CLI):
|
|||
if not self.new_vault_pass:
|
||||
raise AnsibleOptionsError("A password is required to rekey Ansible's Vault")
|
||||
|
||||
if self.action == 'encrypt_string':
|
||||
if self.options.encrypt_string_prompt:
|
||||
self.encrypt_string_prompt = True
|
||||
|
||||
self.editor = VaultEditor(self.vault_pass)
|
||||
|
||||
self.execute()
|
||||
|
@ -136,6 +167,147 @@ class VaultCLI(CLI):
|
|||
if sys.stdout.isatty():
|
||||
display.display("Encryption successful", stderr=True)
|
||||
|
||||
def format_ciphertext_yaml(self, b_ciphertext, indent=None, name=None):
|
||||
indent = indent or 10
|
||||
|
||||
block_format_var_name = ""
|
||||
if name:
|
||||
block_format_var_name = "%s: " % name
|
||||
|
||||
block_format_header = "%s!vault-encrypted |" % block_format_var_name
|
||||
lines = []
|
||||
vault_ciphertext = to_text(b_ciphertext)
|
||||
|
||||
lines.append(block_format_header)
|
||||
for line in vault_ciphertext.splitlines():
|
||||
lines.append('%s%s' % (' ' * indent, line))
|
||||
|
||||
yaml_ciphertext = '\n'.join(lines)
|
||||
return yaml_ciphertext
|
||||
|
||||
def execute_encrypt_string(self):
|
||||
b_plaintext = None
|
||||
|
||||
# Holds tuples (the_text, the_source_of_the_string, the variable name if its provided).
|
||||
b_plaintext_list = []
|
||||
|
||||
# remove the non-option '-' arg (used to indicate 'read from stdin') from the candidate args so
|
||||
# we dont add it to the plaintext list
|
||||
args = [x for x in self.args if x != '-']
|
||||
|
||||
# We can prompt and read input, or read from stdin, but not both.
|
||||
if self.options.encrypt_string_prompt:
|
||||
msg = "String to encrypt: "
|
||||
|
||||
name = None
|
||||
name_prompt_response = display.prompt('Variable name (enter for no name): ')
|
||||
|
||||
# TODO: enforce var naming rules?
|
||||
if name_prompt_response != "":
|
||||
name = name_prompt_response
|
||||
|
||||
# could use private=True for shadowed input if useful
|
||||
prompt_response = display.prompt(msg)
|
||||
|
||||
if prompt_response == '':
|
||||
raise AnsibleOptionsError('The plaintext provided from the prompt was empty, not encrypting')
|
||||
|
||||
b_plaintext = to_bytes(prompt_response)
|
||||
b_plaintext_list.append((b_plaintext, self.FROM_PROMPT, name))
|
||||
|
||||
# read from stdin
|
||||
if self.encrypt_string_read_stdin:
|
||||
if sys.stdout.isatty():
|
||||
display.display("Reading plaintext input from stdin. (ctrl-d to end input)", stderr=True)
|
||||
|
||||
stdin_text = sys.stdin.read()
|
||||
if stdin_text == '':
|
||||
raise AnsibleOptionsError('stdin was empty, not encrypting')
|
||||
|
||||
b_plaintext = to_bytes(stdin_text)
|
||||
|
||||
# defaults to None
|
||||
name = self.options.encrypt_string_stdin_name
|
||||
b_plaintext_list.append((b_plaintext, self.FROM_STDIN, name))
|
||||
|
||||
# use any leftover args as strings to encrypt
|
||||
# Try to match args up to --name options
|
||||
if hasattr(self.options, 'encrypt_string_names') and self.options.encrypt_string_names:
|
||||
name_and_text_list = zip(self.options.encrypt_string_names, args)
|
||||
|
||||
# Some but not enough --name's to name each var
|
||||
if len(args) > len(name_and_text_list):
|
||||
# Trying to avoid ever showing the plaintext in the output, so this warning is vague to avoid that.
|
||||
display.display('The number of --name options do not match the number of args.',
|
||||
stderr=True)
|
||||
display.display('The last named variable will be "%s". The rest will not have names.' % self.options.encrypt_string_names[-1],
|
||||
stderr=True)
|
||||
|
||||
# Add the rest of the args without specifying a name
|
||||
for extra_arg in args[len(name_and_text_list):]:
|
||||
name_and_text_list.append((None, extra_arg))
|
||||
|
||||
# if no --names are provided, just use the args without a name.
|
||||
else:
|
||||
name_and_text_list = [(None, x) for x in args]
|
||||
|
||||
# Convert the plaintext text objects to bytestrings and collect
|
||||
for name_and_text in name_and_text_list:
|
||||
name, plaintext = name_and_text
|
||||
|
||||
if plaintext == '':
|
||||
raise AnsibleOptionsError('The plaintext provided from the command line args was empty, not encrypting')
|
||||
|
||||
b_plaintext = to_bytes(plaintext)
|
||||
b_plaintext_list.append((b_plaintext, self.FROM_ARGS, name))
|
||||
|
||||
# Format the encrypted strings and any corresponding stderr output
|
||||
outputs = self._format_output_vault_strings(b_plaintext_list)
|
||||
|
||||
for output in outputs:
|
||||
err = output.get('err', None)
|
||||
out = output.get('out', '')
|
||||
if err:
|
||||
sys.stderr.write(err)
|
||||
print(out)
|
||||
|
||||
if sys.stdout.isatty():
|
||||
display.display("Encryption successful", stderr=True)
|
||||
|
||||
# TODO: offer block or string ala eyaml
|
||||
|
||||
def _format_output_vault_strings(self, b_plaintext_list):
|
||||
# If we are only showing one item in the output, we dont need to included commented
|
||||
# delimiters in the text
|
||||
show_delimiter = False
|
||||
if len(b_plaintext_list) > 1:
|
||||
show_delimiter = True
|
||||
|
||||
# list of dicts {'out': '', 'err': ''}
|
||||
output = []
|
||||
|
||||
# Encrypt the plaintext, and format it into a yaml block that can be pasted into a playbook.
|
||||
# For more than one input, show some differentiating info in the stderr output so we can tell them
|
||||
# apart. If we have a var name, we include that in the yaml
|
||||
for index, b_plaintext_info in enumerate(b_plaintext_list):
|
||||
# (the text itself, which input it came from, its name)
|
||||
b_plaintext, src, name = b_plaintext_info
|
||||
b_ciphertext = self.editor.encrypt_bytes(b_plaintext)
|
||||
|
||||
# block formatting
|
||||
yaml_text = self.format_ciphertext_yaml(b_ciphertext, name=name)
|
||||
|
||||
err_msg = None
|
||||
if show_delimiter:
|
||||
human_index = index + 1
|
||||
if name:
|
||||
err_msg = '# The encrypted version of variable ("%s", the string #%d from %s).\n' % (name, human_index, src)
|
||||
else:
|
||||
err_msg = '# The encrypted version of the string #%d from %s.)\n' % (human_index, src)
|
||||
output.append({'out': yaml_text, 'err': err_msg})
|
||||
|
||||
return output
|
||||
|
||||
def execute_decrypt(self):
|
||||
|
||||
if len(self.args) == 0 and sys.stdin.isatty():
|
||||
|
|
|
@ -414,6 +414,13 @@ class VaultEditor:
|
|||
# shuffle tmp file into place
|
||||
self.shuffle_files(tmp_path, filename)
|
||||
|
||||
def encrypt_bytes(self, b_plaintext):
|
||||
check_prereqs()
|
||||
|
||||
b_ciphertext = self.vault.encrypt(b_plaintext)
|
||||
|
||||
return b_ciphertext
|
||||
|
||||
def encrypt_file(self, filename, output_file=None):
|
||||
|
||||
check_prereqs()
|
||||
|
|
Loading…
Reference in a new issue