12 Commits

Author SHA1 Message Date
Jason Davis-Cooke
4b4549c9c5 require. not include. 2015-02-06 14:56:20 -05:00
Jason Davis-Cooke
9d7b150712 Require pathname 2015-02-06 14:47:42 -05:00
Jason Davis-Cooke
8e323f76e7 Merge branch 'maclennann-zanzibar_bundle_thor_app' 2015-02-01 13:50:40 -05:00
Norm MacLennan
c050e21339 aliasing install to bundle 2015-02-01 13:35:28 -05:00
Norm MacLennan
2bd8beb6c3 adding hidden alias command 2015-02-01 13:26:55 -05:00
Norm MacLennan
c416f90ea7 un-ignoring required test file 2015-02-01 12:13:01 -05:00
Norm MacLennan
0fdf747de5 maybe fix tests for travis 2015-02-01 12:04:25 -05:00
Norm MacLennan
184b0b443c making zanzibar bin a thor app with bundler/librarian type capability 2015-02-01 11:43:42 -05:00
Jason Davis-Cooke
d91b418963 Bump version 2015-01-28 15:17:24 -05:00
Jason Davis-Cooke
dfb897a088 Merge pull request #4 from maclennann/feature/support_env_vars
support well-known env-vars for setting username and password
2015-01-28 15:15:20 -05:00
Norm MacLennan
9f7898cc0b support well-known env-vars for setting username and password 2015-01-28 15:01:50 -05:00
Jason Davis-Cooke
4902299cd4 Return path of secret file 2015-01-27 09:12:55 -05:00
31 changed files with 1768 additions and 490 deletions

3
.gitignore vendored
View File

@@ -12,3 +12,6 @@
*.o *.o
*.a *.a
mkmf.log mkmf.log
secrets/
Zanzifile
Zanzifile.resolved

2
.rspec
View File

@@ -1,2 +1,2 @@
--color --color
--require spec/spec_helper --require spec_helper

5
.rubocop.yml Normal file
View File

@@ -0,0 +1,5 @@
Metrics/ClassLength:
Max: 150
Metrics/LineLength:
Max: 175

13
Gemfile
View File

@@ -1,16 +1,3 @@
source 'https://rubygems.org' source 'https://rubygems.org'
gem 'savon'
group :test do
gem 'rake'
gem 'savon_spec'
gem 'rspec'
gem 'webmock'
gem 'codeclimate-test-reporter'
gem 'zanzibar', path: '.'
gem 'rubocop'
end
# Specify your gem's dependencies in zanzibar.gemspec
gemspec gemspec

View File

@@ -21,7 +21,11 @@ Or install it yourself as:
## Usage ## Usage
In your ruby project, rakefile, etc., create a new Zanzibar object. The constructor takes a hash of optional parameters for the WSDL location, the domain of the Secret Server, a hash of global variables to pass to savon (necessary for windows environments with self-signed certs) and a password for the current user (intended to be passed in through some encryption method, unless you really want a plaintext password there.). All of these parameters are optional and the user will be prompted to enter them if they are missing. In your ruby project, rakefile, etc., create a new Zanzibar object.
The constructor takes a hash of optional parameters for the WSDL location, the domain of the Secret Server, a hash of global variables to pass to savon (necessary for windows environments with self-signed certs) and a password for the current user (intended to be passed in through some encryption method, unless you really want a plaintext password there).
All of these parameters are optional and the user will be prompted to enter them if they are missing.
```ruby ```ruby
my_object = Zanzibar::Zanzibar.new(:domain => 'my.domain.net', :wsdl => 'my.scrt.srvr.com/webservices/sswebservice.asmx?wdsl', :pwd => get_encrypted_password_from_somewhere) my_object = Zanzibar::Zanzibar.new(:domain => 'my.domain.net', :wsdl => 'my.scrt.srvr.com/webservices/sswebservice.asmx?wdsl', :pwd => get_encrypted_password_from_somewhere)
@@ -51,20 +55,78 @@ secrets.download_secret_file(:scrt_id => 2345, :path => 'secrets/', :type => "At
``` ```
### Providing Credentials
Zanzibar has several ways of finding Secret Server credentials. It will use credentials
discovered in this order:
* Credentials passed to the initializer
* `Zanzibar::Zanzibar.new(:username=>'auser', :password=>'itsmyPassword')`
* Credentials discovered via the environment
* If `ZANZIBAR_USER` exists, it will use that.
* If not, it will try `USER`
* If `ZANZIBAR_PASSWORD` exists, it will use that.
* Credentials entered by the user
* Zanzibar will prompt the user to enter their password on STDIN
### Command Line ### Command Line
Zanzibar comes bundled with the `zanzibar` command-line utility that can be used for fetching passwords and downloading keys from outside of Ruby. Zanzibar comes bundled with the `zanzibar` command-line utility that can be used
for fetching passwords and downloading keys from outside of Ruby scripts.
`zanzibar` supports most actions provided by Zanzibar itself. Because it operates on the command-line, it can be used as part of a pipeline or within a bash script. `zanzibar` supports most actions provided by Zanzibar itself. Because it operates
on the command-line, it can be used as part of a pipeline or within a bash script.
```bash ```bash
# if you don't pipe in a password, you will be prompted to enter one. # if ZANZIBAR_PASSWORD is not set, you will be prompted to enter your password.
# this will download the private key from secret 1984 to the current directory # this will download the private key from secret 1984 to the current directory
cat ./local-password | zanzibar 1984 -s server.example.com -d example.com -t privatekey $ ZANZIBAR_PASSWORD=`gpg -d secretpasswd.txt.gpg` zanzibar get 1984 -s server.example.com -d example.com -f "Private Key"
ssh user@someremote -i ./private_key $ ssh user@someremote -i ./private_key
``` ```
#### Zanzifiles
The `zanzibar` command can also perform [bundler](http://bundler.io)-like actions.
Running `zanzibar init` will generate a `Zanzifile` in the current directory.
Information about Secret Server and the necessary secret files to be downloaded
can be added here.
Then `zanzibar bundle` will try to download the secrets named in the file.
When it downloads a file, it gets added to `Zanzifile.resolved`. And next time
`zanzibar bundle` is run, if the file exists and the hash matches the one in the
`resolved` file, it will not attempt to re-download. `zanzibar update` will attempt
to re-download all secrets.
Note: `zanzibar get` can fetch passwords or files, but `zanzibar bundle` can
only operate on secret files.
Sample `Zanzifile`:
```yaml
---
settings:
wsdl: my.scrt.srvr.com/webservices/sswebservice.asmx?wdsl
domain: my.domain.net
secret_dir: secrets/
ignore_ssl: true
secrets:
ssh_key:
id: 249
label: Private Key
encryption_key:
id: 483
label: Attachment
cert_pem:
id: 123
label: Certificate
cert_key:
id: 986
label: Misc Attachment
```
Run `zanzibar help` or `zanzibar help [command]` for more information.
## Contributing ## Contributing
1. Fork it ( https://github.com/Cimpress-MCP/zanzibar/fork ) 1. Fork it ( https://github.com/Cimpress-MCP/zanzibar/fork )

View File

@@ -1,11 +1,11 @@
require 'bundler/gem_tasks' require 'bundler/gem_tasks'
require 'bundler/setup' # load up our gem environment (incl. local zanzibar) require 'bundler/setup' # load up our gem environment (incl. local zanzibar)
require 'rspec/core/rake_task' require 'rspec/core/rake_task'
require 'zanzibar/version' require 'zanzibar/version'
require 'rubocop/rake_task' require 'rubocop/rake_task'
task default: [:test] task default: [:test]
RSpec::Core::RakeTask.new(:test) RSpec::Core::RakeTask.new(:test)
RuboCop::RakeTask.new RuboCop::RakeTask.new

4
bin/zamioculcas Normal file → Executable file
View File

@@ -1,2 +1,4 @@
#! ruby #! ruby
system("zanzibar #{ARGV.join(" ")}") require 'zanzibar/cli'
Zanzibar::Cli.start(ARGV)

View File

@@ -1,70 +1,4 @@
#! ruby #! ruby
require 'zanzibar/cli'
require 'zanzibar' Zanzibar::Cli.start(ARGV)
require 'optparse'
options = {
:domain => 'local'
}
OptionParser.new do |opts|
opts.banner = "Usage: zamioculcas -d domain [-w wsdl] [-k] [-p] [secret_id]"
opts.on("-d", "--domain DOMAIN", "Specify domain") do |v|
options[:domain] = v
end
opts.on("-w", "--wsdl WSDL", "Specify WSDL location") do |v|
options[:wsdl] = v
end
opts.on("-s", "--server SERVER", "Secret server hostname or IP") do |v|
options[:server] = v
end
opts.on("-k", "--no-check-certificate", "Don't run SSL certificate checks") do |v|
options[:globals] = {:ssl_verify_mode => :none}
end
opts.on("-p", "--password PASSWORD", "Specify password") do |v|
options[:pwd] = v
end
opts.on("-t", "--type TYPE", "Specify the type of secret") do |v|
options[:type] = v
end
opts.on("-u", "--user USER", "Specify the username") do |v|
options[:username] = v
end
end.parse!
raise OptionParser::MissingArgument if options[:server].nil?
options[:type] = "password" if options[:type].nil?
unless STDIN.tty? || options[:pwd]
options[:pwd] = $stdin.read.strip
end
secret_id = Integer(ARGV.pop)
if(!secret_id)
fail "no secret!"
end
unless options[:wsdl] || options[:server].nil?
options[:wsdl] = "https://#{options[:server]}/webservices/sswebservice.asmx?wsdl"
end
scrt = Zanzibar::Zanzibar.new(options)
case options[:type]
when "password"
$stdout.write "#{scrt.get_password(secret_id)}\n"
when "privatekey"
scrt.download_private_key(:scrt_id=>secret_id)
when "publickey"
scrt.download_public_key(:scrt_id=>secret_id)
else
$stderr.write "#{options[:type]} is not a known type."
end

View File

@@ -1,175 +1,190 @@
require 'zanzibar/version' require 'zanzibar/version'
require 'savon' require 'savon'
require 'io/console' require 'io/console'
require 'fileutils' require 'fileutils'
module Zanzibar module Zanzibar
## ##
# Class for interacting with Secret Server # Class for interacting with Secret Server
class Zanzibar class Zanzibar
## ##
# @param args{:domain, :wsdl, :pwd, :username, :globals{}} # @param args{:domain, :wsdl, :pwd, :username, :globals{}}
def initialize(args = {}) def initialize(args = {})
if args[:username] if args[:username]
@@username = args[:username] @@username = args[:username]
else elsif ENV['ZANZIBAR_USER']
@@username = ENV['USER'] @@username = ENV['ZANZIBAR_USER']
end else
@@username = ENV['USER']
if args[:wsdl] end
@@wsdl = args[:wsdl]
else if args[:wsdl]
@@wsdl = get_wsdl_location @@wsdl = args[:wsdl]
end else
if args[:pwd] @@wsdl = get_wsdl_location
@@password = args[:pwd] end
else
@@password = prompt_for_password if args[:pwd]
end @@password = args[:pwd]
if args[:domain] elsif ENV['ZANZIBAR_PASSWORD']
@@domain = args[:domain] @@password = ENV['ZANZIBAR_PASSWORD']
else else
@@domain = prompt_for_domain @@password = prompt_for_password
end end
args[:globals] = {} unless args[:globals]
init_client(args[:globals]) if args[:domain]
end @@domain = args[:domain]
else
## Initializes the Savon client class variable with the wdsl document location and optional global variables @@domain = prompt_for_domain
# @param globals{}, optional end
args[:globals] = {} unless args[:globals]
def init_client(globals = {}) init_client(args[:globals])
globals = {} if globals.nil? end
@@client = Savon.client(globals) do
wsdl @@wsdl def get_client_username
end @@username
end end
## Gets the user's password if none is provided in the constructor. def get_client_password
# @return [String] the password for the current user @@password
end
def prompt_for_password
puts "Please enter password for #{@@username}:" ## Initializes the Savon client class variable with the wdsl document location and optional global variables
STDIN.noecho(&:gets).chomp # @param globals{}, optional
end
def init_client(globals = {})
## Gets the wsdl document location if none is provided in the constructor globals = {} if globals.nil?
# @return [String] the location of the WDSL document @@client = Savon.client(globals) do
wsdl @@wsdl
def prompt_for_wsdl_location end
puts 'Enter the URL of the Secret Server WSDL:' end
STDIN.gets.chomp
end ## Gets the user's password if none is provided in the constructor.
# @return [String] the password for the current user
## Gets the domain of the Secret Server installation if none is provided in the constructor
# @return [String] the domain of the secret server installation def prompt_for_password
puts "Please enter password for #{@@username}:"
def prompt_for_domain STDIN.noecho(&:gets).chomp
puts 'Enter the domain of your Secret Server:' end
STDIN.gets.chomp
end ## Gets the wsdl document location if none is provided in the constructor
# @return [String] the location of the WDSL document
## Get an authentication token for interacting with Secret Server. These are only good for about 10 minutes so just get a new one each time.
# Will raise an error if there is an issue with the authentication. def prompt_for_wsdl_location
# @return the authentication token for the current user. puts 'Enter the URL of the Secret Server WSDL:'
STDIN.gets.chomp
def get_token end
response = @@client.call(:authenticate, message: { username: @@username, password: @@password, organization: '', domain: @@domain })
.hash[:envelope][:body][:authenticate_response][:authenticate_result] ## Gets the domain of the Secret Server installation if none is provided in the constructor
fail "Error generating the authentication token for user #{@@username}: #{response[:errors][:string]}" if response[:errors] # @return [String] the domain of the secret server installation
response[:token]
rescue Savon::Error => err def prompt_for_domain
raise "There was an error generating the authentiaton token for user #{@@username}: #{err}" puts 'Enter the domain of your Secret Server:'
end STDIN.gets.chomp
end
## Get a secret returned as a hash
# Will raise an error if there was an issue getting the secret ## Get an authentication token for interacting with Secret Server. These are only good for about 10 minutes so just get a new one each time.
# @param [Integer] the secret id # Will raise an error if there is an issue with the authentication.
# @return [Hash] the secret hash retrieved from the wsdl # @return the authentication token for the current user.
def get_secret(scrt_id, token = nil) def get_token
secret = @@client.call(:get_secret, message: { token: token || get_token, secretId: scrt_id }).hash[:envelope][:body][:get_secret_response][:get_secret_result] response = @@client.call(:authenticate, message: { username: @@username, password: @@password, organization: '', domain: @@domain })
fail "There was an error getting secret #{scrt_id}: #{secret[:errors][:string]}" if secret[:errors] .hash[:envelope][:body][:authenticate_response][:authenticate_result]
return secret fail "Error generating the authentication token for user #{@@username}: #{response[:errors][:string]}" if response[:errors]
rescue Savon::Error => err response[:token]
raise "There was an error getting the secret with id #{scrt_id}: #{err}" rescue Savon::Error => err
end raise "There was an error generating the authentiaton token for user #{@@username}: #{err}"
end
## Retrieve a simple password from a secret
# Will raise an error if there are any issues ## Get a secret returned as a hash
# @param [Integer] the secret id # Will raise an error if there was an issue getting the secret
# @return [String] the password for the given secret # @param [Integer] the secret id
# @return [Hash] the secret hash retrieved from the wsdl
def get_password(scrt_id)
secret = get_secret(scrt_id) def get_secret(scrt_id, token = nil)
secret_items = secret[:secret][:items][:secret_item] secret = @@client.call(:get_secret, message: { token: token || get_token, secretId: scrt_id }).hash[:envelope][:body][:get_secret_response][:get_secret_result]
return get_secret_item_by_field_name(secret_items, 'Password')[:value] fail "There was an error getting secret #{scrt_id}: #{secret[:errors][:string]}" if secret[:errors]
rescue Savon::Error => err return secret
raise "There was an error getting the password for secret #{scrt_id}: #{err}" rescue Savon::Error => err
end raise "There was an error getting the secret with id #{scrt_id}: #{err}"
end
def write_secret_to_file(path, secret_response)
File.open(File.join(path, secret_response[:file_name]), 'wb') do |file| ## Retrieve a simple password from a secret
file.puts Base64.decode64(secret_response[:file_attachment]) # Will raise an error if there are any issues
end # @param [Integer] the secret id
end # @return [String] the password for the given secret
def get_secret_item_by_field_name(secret_items, field_name) def get_password(scrt_id)
secret_items.each do |item| secret = get_secret(scrt_id)
return item if item[:field_name] == field_name secret_items = secret[:secret][:items][:secret_item]
end return get_secret_item_by_field_name(secret_items, 'Password')[:value]
end rescue Savon::Error => err
raise "There was an error getting the password for secret #{scrt_id}: #{err}"
## Get the secret item id that relates to a key file or attachment. end
# Will raise on error
# @param [Integer] the secret id def write_secret_to_file(path, secret_response)
# @param [String] the type of secret item to get, one of privatekey, publickey, attachment File.open(File.join(path, secret_response[:file_name]), 'wb') do |file|
# @return [Integer] the secret item id file.puts Base64.decode64(secret_response[:file_attachment])
end
def get_scrt_item_id(scrt_id, type, token) end
secret = get_secret(scrt_id, token)
secret_items = secret[:secret][:items][:secret_item] def get_secret_item_by_field_name(secret_items, field_name)
begin secret_items.each do |item|
return get_secret_item_by_field_name(secret_items, type)[:id] return item if item[:field_name] == field_name
rescue end
raise "Unknown type, #{type}." end
end
end ## Get the secret item id that relates to a key file or attachment.
# Will raise on error
## Downloads a file for a secret and places it where Zanzibar is running, or :path if specified # @param [Integer] the secret id
# Raise on error # @param [String] the type of secret item to get, one of privatekey, publickey, attachment
# @param [Hash] args, :scrt_id, :type (one of "Private Key", "Public Key", "Attachment"), :scrt_item_id - optional, :path - optional # @return [Integer] the secret item id
def download_secret_file(args = {}) def get_scrt_item_id(scrt_id, type, token)
token = get_token secret = get_secret(scrt_id, token)
FileUtils.mkdir_p(args[:path]) if args[:path] secret_items = secret[:secret][:items][:secret_item]
path = args[:path] ? args[:path] : '.' ## The File.join below doesn't handle nils well, so let's take that possibility away. begin
begin return get_secret_item_by_field_name(secret_items, type)[:id]
response = @@client.call(:download_file_attachment_by_item_id, message: rescue
{ token: token, secretId: args[:scrt_id], secretItemId: args[:scrt_item_id] || get_scrt_item_id(args[:scrt_id], args[:type], token) }) raise "Unknown type, #{type}."
.hash[:envelope][:body][:download_file_attachment_by_item_id_response][:download_file_attachment_by_item_id_result] end
fail "There was an error getting the #{args[:type]} for secret #{args[:scrt_id]}: #{response[:errors][:string]}" if response[:errors] end
write_secret_to_file(path, response)
rescue Savon::Error => err ## Downloads a file for a secret and places it where Zanzibar is running, or :path if specified
raise "There was an error getting the #{args[:type]} for secret #{args[:scrt_id]}: #{err}" # Raise on error
end # @param [Hash] args, :scrt_id, :type (one of "Private Key", "Public Key", "Attachment"), :scrt_item_id - optional, :path - optional
end
def download_secret_file(args = {})
## Methods to maintain backwards compatibility token = get_token
def download_private_key(args = {}) FileUtils.mkdir_p(args[:path]) if args[:path]
args[:type] = 'Private Key' path = args[:path] ? args[:path] : '.' ## The File.join below doesn't handle nils well, so let's take that possibility away.
download_secret_file(args) begin
end response = @@client.call(:download_file_attachment_by_item_id, message:
{ token: token, secretId: args[:scrt_id], secretItemId: args[:scrt_item_id] || get_scrt_item_id(args[:scrt_id], args[:type], token) })
def download_public_key(args = {}) .hash[:envelope][:body][:download_file_attachment_by_item_id_response][:download_file_attachment_by_item_id_result]
args[:type] = 'Public Key' fail "There was an error getting the #{args[:type]} for secret #{args[:scrt_id]}: #{response[:errors][:string]}" if response[:errors]
download_secret_file(args) write_secret_to_file(path, response)
end return File.join(path, response[:file_name])
rescue Savon::Error => err
def download_attachment(args = {}) raise "There was an error getting the #{args[:type]} for secret #{args[:scrt_id]}: #{err}"
args[:type] = 'Attachment' end
download_secret_file(args) end
end
end ## Methods to maintain backwards compatibility
end def download_private_key(args = {})
args[:type] = 'Private Key'
download_secret_file(args)
end
def download_public_key(args = {})
args[:type] = 'Public Key'
download_secret_file(args)
end
def download_attachment(args = {})
args[:type] = 'Attachment'
download_secret_file(args)
end
end
end

3
lib/zanzibar/actions.rb Normal file
View File

@@ -0,0 +1,3 @@
require 'zanzibar/actions/init'
require 'zanzibar/actions/bundle'
require 'zanzibar/actions/get'

View File

@@ -0,0 +1,27 @@
module Zanzibar
module Actions
# Basic plumbing for all actions
class Base
attr_accessor :options
private :options=
attr_accessor :logger
private :logger=
def initialize(logger, options = {})
self.logger = logger
self.options = options
end
private
def debug(*args, &block)
logger.debug(*args, &block)
end
def source_root
@source_root ||= Pathname.new(File.expand_path('../../../../', __FILE__))
end
end
end
end

View File

@@ -0,0 +1,119 @@
require 'zanzibar/actions/base'
require 'zanzibar/error'
require 'zanzibar'
module Zanzibar
module Actions
# Download or verify the secrets in a Zanzifile
class Bundle < Base
attr_accessor :settings
attr_accessor :remote_secrets
attr_accessor :local_secrets
attr_accessor :update
attr_accessor :zanzibar
def initialize(ui, options, args = {})
super(ui, options)
@update = args[:update]
end
def run
ensure_zanzifile
load_required_secrets
validate_environment
load_resolved_secrets if resolved_file?
validate_local_secrets unless @update
run!
end
private
def run!
if need_secrets?
new_secrets = download_remote_secrets
update_resolved_file new_secrets
else
debug { 'No secrets to download...' }
end
end
def ensure_zanzifile
fail Error, NO_ZANZIFILE_ERROR unless File.exist? ZANZIFILE_NAME
debug { "#{ZANZIFILE_NAME} located..." }
end
def resolved_file?
File.exist? RESOLVED_NAME
end
def load_required_secrets
zanzifile = YAML.load_file(ZANZIFILE_NAME)
@settings = zanzifile['settings'] || {}
@remote_secrets = zanzifile['secrets'] || {}
@local_secrets = {}
end
def validate_environment
return unless @settings.empty? || @remote_secrets.empty?
fail Error, INVALID_ZANZIFILE_ERROR
end
def load_resolved_secrets
@local_secrets = YAML.load_file RESOLVED_NAME
end
def need_secrets?
!@remote_secrets.empty?
end
def validate_local_secrets
@local_secrets.each do |key, secret|
if File.exist?(secret[:path]) && secret[:hash] == Digest::MD5.file(secret[:path]).hexdigest
debug { "#{key} found locally, skipping download..." }
@remote_secrets.delete key
end
end
end
def download_remote_secrets
args = @settings['ignore_ssl'] ? { ssl_verify_mode: :none } : {}
downloaded_secrets = {}
remote_secrets.each do |key, secret|
downloaded_secrets[key] = download_one_secret(secret['id'],
secret['label'],
@settings['secret_dir'],
args)
debug { "Downloaded secret: #{key} to #{path}..." }
end
downloaded_secrets
end
def download_one_secret(scrt_id, label, path, args)
path = zanzibar(args).download_secret_file(scrt_id: scrt_id,
type: label,
path: path)
{ path: path, hash: Digest::MD5.file(path).hexdigest }
end
def update_resolved_file(new_secrets)
@local_secrets.merge! new_secrets
File.open(RESOLVED_NAME, 'w') do |out|
YAML.dump(@local_secrets, out)
end
debug { 'Updated resolved file...' }
end
def zanzibar(args)
@zanzibar ||= ::Zanzibar::Zanzibar.new(wsdl: @settings['wsdl'],
domain: @settings['domain'],
globals: args)
end
end
end
end

View File

@@ -0,0 +1,61 @@
require 'zanzibar/actions/base'
require 'zanzibar/error'
require 'zanzibar'
require 'zanzibar/defaults'
module Zanzibar
module Actions
# Fetch a single secret
class Get < Base
attr_accessor :zanibar_options
attr_accessor :scrt_id
def initialize(ui, options, scrt_id)
super(ui, options)
@scrt_id = scrt_id
@zanzibar_options = {}
end
def run
construct_options
ensure_options
fetch_secret(@scrt_id, options['filelabel'])
end
def fetch_secret(scrt_id, label = nil)
scrt = ::Zanzibar::Zanzibar.new(@zanzibar_options)
puts @zanzibar_options
if label
scrt.download_secret_file(scrt_id: scrt_id,
type: label)
else
scrt.get_password(scrt_id)
end
end
def construct_options
@zanzibar_options[:wsdl] = construct_wsdl
@zanzibar_options[:globals] = { ssl_verify_mode: :none } if options['ignoressl']
@zanzibar_options[:domain] = options['domain']
@zanzibar_options[:username] = options['username'] unless options['username'].nil?
@zanzibar_options[:domain] = options['domain'] ? options['domain'] : 'local'
end
def construct_wsdl
if options['wsdl'].nil? && options['server']
DEFAULT_WSDL % options['server']
else
options['wsdl']
end
end
def ensure_options
return if @zanzibar_options[:wsdl]
fail Error, NO_WSDL_ERROR
end
end
end
end

View File

@@ -0,0 +1,40 @@
require 'zanzibar/actions/base'
require 'zanzibar/error'
require 'ostruct'
require 'erb'
require 'zanzibar/defaults'
module Zanzibar
module Actions
# Create a new Zanzifile
class Init < Base
def run
check_for_zanzifile
write_template
end
private
def check_for_zanzifile
return unless File.exist?(ZANZIFILE_NAME) && !options['force']
fail Error, ALREADY_EXISTS_ERROR
end
def write_template
template = TemplateRenderer.new(options)
File.open(ZANZIFILE_NAME, 'w') do |f|
f.write template.render(File.read(source_root.join(TEMPLATE_NAME)))
end
end
# Allows us to easily feed our options hash
# to an ERB
class TemplateRenderer < OpenStruct
def render(template)
ERB.new(template).result(binding)
end
end
end
end
end

126
lib/zanzibar/cli.rb Normal file
View File

@@ -0,0 +1,126 @@
require 'thor'
require 'thor/actions'
require 'zanzibar/version'
require 'zanzibar/cli'
require 'zanzibar/ui'
require 'zanzibar/actions'
require 'zanzibar/error'
require 'zanzibar/defaults'
module Zanzibar
# The `zanzibar` binay/thor application main class
class Cli < Thor
include Thor::Actions
attr_accessor :ui
def initialize(*)
super
the_shell = (options['no-color'] ? Thor::Shell::Basic.new : shell)
@ui = Shell.new(the_shell)
@ui.be_quiet! if options['quiet']
@ui.debug! if options['verbose']
debug_header
end
desc 'version', 'Display your Zanzibar verion'
def version
say "#{APPLICATION_NAME} Version: #{VERSION}"
end
desc 'init', "Create an empty #{ZANZIFILE_NAME} in the current directory."
option 'verbose', type: :boolean, default: false, aliases: :v
option 'wsdl', type: :string, aliases: :w,
default: DEFAULT_WSDL % DEFAULT_SERVER,
desc: 'The URI of the WSDL file for your Secret Server instance'
option 'domain', type: :string, default: 'local', aliases: :d,
desc: 'The logon domain for your Secret Server account'
option 'force', type: :boolean, default: false, aliases: :f,
desc: 'Recreate the Zanzifile if one already exists.'
option 'secretdir', type: :string, default: 'secrets/', aliases: :s,
desc: 'The directory to which secrets should be downloaded.'
option 'ignoressl', type: :boolean, default: 'false', aliases: :k,
desc: 'Don\'t check the SSL certificate of Secret Server'
def init
run_action { init! }
end
desc 'bundle', "Fetch secrets declared in your #{ZANZIFILE_NAME}"
option 'verbose', type: :boolean, default: false, aliases: :v
def bundle
run_action { bundle! }
end
desc 'plunder', "Alias to `#{APPLICATION_NAME} bundle`", :hide => true
alias_method :plunder, :bundle
desc 'install', "Alias to `#{APPLICATION_NAME} bundle`"
alias_method :install, :bundle
desc 'update', "Redownload all secrets in your #{ZANZIFILE_NAME}"
option 'verbose', type: :boolean, default: false, aliases: :v
def update
run_action { update! }
end
desc 'get SECRETID', 'Fetch a single SECRETID from Secret Server'
option 'domain', type: :string, aliases: :d,
desc: 'The logon domain to use when logging in.'
option 'server', type: :string, aliases: :s,
desc: 'The Secret Server hostname or IP'
option 'wsdl', type: :string, aliases: :w,
desc: 'Full path to the Secret Server WSDL'
option 'ignoressl', type: :boolean, aliases: :k,
desc: 'Don\'t verify Secret Server\'s SSL certificate'
option 'filelabel', type: :string, aliases: :f,
desc: 'Specify a file (by label) to download'
option 'username', type: :string, aliases: :u
option 'password', type: :string, aliases: :p
def get(scrt_id)
run_action { get! scrt_id }
end
private
def debug_header
@ui.debug { "Running #{APPLICATION_NAME} in debug mode..." }
@ui.debug { "Ruby Version: #{RUBY_VERSION}" }
@ui.debug { "Ruby Platform: #{RUBY_PLATFORM}" }
@ui.debug { "#{APPLICATION_NAME} Version: #{VERSION}" }
end
# Run the specified action and rescue errors we
# explicitly send back to format them
def run_action(&_block)
yield
rescue ::Zanzibar::Error => e
@ui.error e
abort "Fatal error: #{e.message}"
end
def init!
say "Initializing a new #{ZANZIFILE_NAME} in the current directory..."
Actions::Init.new(@ui, options).run
say "Your #{ZANZIFILE_NAME} has been created!"
say 'You should check the settings and add your secrets.'
say 'Then run `zanzibar bundle` to fetch them.'
end
def bundle!
say "Checking for secrets declared in your #{ZANZIFILE_NAME}..."
Actions::Bundle.new(@ui, options).run
say 'Finished downloading secrets!'
end
def update!
say "Redownloading all secrets declared in your #{ZANZIFILE_NAME}..."
Actions::Bundle.new(@ui, options, update: true).run
say 'Finished downloading secrets!'
end
def get!(scrt_id)
say Actions::Get.new(@ui, options, scrt_id).run
end
end
end

16
lib/zanzibar/defaults.rb Normal file
View File

@@ -0,0 +1,16 @@
require 'pathname'
# Definitions for various strings used throughout the gem
module Zanzibar
APPLICATION_NAME = Pathname.new($PROGRAM_NAME).basename
ZANZIFILE_NAME = 'Zanzifile'
RESOLVED_NAME = 'Zanzifile.resolved'
TEMPLATE_NAME = 'templates/Zanzifile.erb'
DEFAULT_SERVER = 'secret.example.com'
DEFAULT_WSDL = 'https://%s/webservices/sswebservice.asmx?wsdl'
ALREADY_EXISTS_ERROR = "#{ZANZIFILE_NAME} already exists! Aborting..."
NO_WSDL_ERROR = 'Could not construct WSDL URL. Please provide either --server or --wsdl'
NO_ZANZIFILE_ERROR = "You don't have a #{ZANZIFILE_NAME}! Run `#{APPLICATION_NAME} init` first!"
INVALID_ZANZIFILE_ERROR = "Unable to load your #{ZANZIFILE_NAME}. Please ensure it is valid YAML."
end

6
lib/zanzibar/error.rb Normal file
View File

@@ -0,0 +1,6 @@
module Zanzibar
# A standard error with a different name
# for identifying errors internal to zanzibar
class Error < StandardError
end
end

42
lib/zanzibar/ui.rb Normal file
View File

@@ -0,0 +1,42 @@
require 'rubygems/user_interaction'
module Zanzibar
# Prints messages out to stdout
class Shell
attr_writer :shell
def initialize(shell)
@shell = shell
@quiet = false
@debug = ENV['DEBUG']
end
def debug(message = nil)
@shell.say(message || yield) if @debug && !@quiet
end
def info(message = nil)
@shell.say(message || yield) unless @quiet
end
def confirm(message = nil)
@shell.say(message || yield, :green) unless @quiet
end
def warn(message = nil)
@shell.say(message || yield, :yellow)
end
def error(message = nil)
@shell.say(message || yield, :red)
end
def be_quiet!
@quiet = true
end
def debug!
@debug = true
end
end
end

View File

@@ -1,3 +1,4 @@
module Zanzibar # The version of the gem
VERSION = '0.1.11' module Zanzibar
end VERSION = '0.1.16'
end

1
spec/files/.gitignore vendored Normal file
View File

@@ -0,0 +1 @@
!Zanzifile

11
spec/files/Zanzifile Normal file
View File

@@ -0,0 +1,11 @@
---
settings:
wsdl: scrt.wsdl
domain: zanzitest.net
secret_dir: secrets/
ignore_ssl: true
secrets:
secrets:
ssh_key:
id: 2345
label: Private Key

629
spec/files/scrt.wsdl Normal file
View File

@@ -0,0 +1,629 @@
<?xml version="1.0" encoding="utf-8"?>
<wsdl:definitions xmlns:s="http://www.w3.org/2001/XMLSchema" xmlns:soap12="http://schemas.xmlsoap.org/wsdl/soap12/" xmlns:mime="http://schemas.xmlsoap.org/wsdl/mime/" xmlns:tns="urn:thesecretserver.com" xmlns:s1="urn:thesecretserver.com/AbstractTypes" xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:http="http://schemas.xmlsoap.org/wsdl/http/" xmlns:soapenc="http://schemas.xmlsoap.org/soap/encoding/" targetNamespace="urn:thesecretserver.com" xmlns:wsdl="http://schemas.xmlsoap.org/wsdl/">
<wsdl:documentation xmlns:wsdl="http://schemas.xmlsoap.org/wsdl/">Webservice for standard integration.</wsdl:documentation>
<wsdl:types>
<s:schema elementFormDefault="qualified" targetNamespace="urn:thesecretserver.com">
<s:complexType name="GenericResult">
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="ErrorMessage" type="s:string" />
</s:sequence>
</s:complexType>
<s:element name="Authenticate">
<s:complexType>
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="username" type="s:string" />
<s:element minOccurs="0" maxOccurs="1" name="password" type="s:string" />
<s:element minOccurs="0" maxOccurs="1" name="organization" type="s:string" />
<s:element minOccurs="0" maxOccurs="1" name="domain" type="s:string" />
</s:sequence>
</s:complexType>
</s:element>
<s:element name="AuthenticateResponse">
<s:complexType>
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="AuthenticateResult" type="tns:AuthenticateResult" />
</s:sequence>
</s:complexType>
</s:element>
<s:complexType name="AuthenticateResult">
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="Errors" type="tns:ArrayOfString" />
<s:element minOccurs="0" maxOccurs="1" name="Token" type="s:string" />
</s:sequence>
</s:complexType>
<s:complexType name="ArrayOfString">
<s:sequence>
<s:element minOccurs="0" maxOccurs="unbounded" name="string" nillable="true" type="s:string" />
</s:sequence>
</s:complexType>
<s:complexType name="GetSecretResult">
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="Errors" type="tns:ArrayOfString" />
<s:element minOccurs="0" maxOccurs="1" name="SecretError" type="tns:SecretError" />
<s:element minOccurs="0" maxOccurs="1" name="Secret" type="tns:Secret" />
</s:sequence>
</s:complexType>
<s:complexType name="SecretError">
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="ErrorCode" type="s:string" />
<s:element minOccurs="0" maxOccurs="1" name="ErrorMessage" type="s:string" />
<s:element minOccurs="1" maxOccurs="1" name="AllowsResponse" type="s:boolean" />
<s:element minOccurs="0" maxOccurs="1" name="CommentTitle" type="s:string" />
<s:element minOccurs="0" maxOccurs="1" name="AdditionalCommentTitle" type="s:string" />
</s:sequence>
</s:complexType>
<s:complexType name="Secret">
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="Name" type="s:string" />
<s:element minOccurs="0" maxOccurs="1" name="Items" type="tns:ArrayOfSecretItem" />
<s:element minOccurs="1" maxOccurs="1" name="Id" type="s:int" />
<s:element minOccurs="1" maxOccurs="1" name="SecretTypeId" type="s:int" />
<s:element minOccurs="1" maxOccurs="1" name="FolderId" type="s:int" />
<s:element minOccurs="1" maxOccurs="1" name="IsWebLauncher" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="Active" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="CheckOutMinutesRemaining" nillable="true" type="s:int" />
<s:element minOccurs="1" maxOccurs="1" name="IsCheckedOut" nillable="true" type="s:boolean" />
<s:element minOccurs="0" maxOccurs="1" name="CheckOutUserDisplayName" type="s:string" />
<s:element minOccurs="1" maxOccurs="1" name="CheckOutUserId" nillable="true" type="s:int" />
<s:element minOccurs="1" maxOccurs="1" name="IsOutOfSync" nillable="true" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="IsRestricted" nillable="true" type="s:boolean" />
<s:element minOccurs="0" maxOccurs="1" name="OutOfSyncReason" type="s:string" />
<s:element minOccurs="0" maxOccurs="1" name="SecretSettings" type="tns:SecretSettings" />
<s:element minOccurs="0" maxOccurs="1" name="SecretPermissions" type="tns:SecretPermissions" />
</s:sequence>
</s:complexType>
<s:complexType name="ArrayOfSecretItem">
<s:sequence>
<s:element minOccurs="0" maxOccurs="unbounded" name="SecretItem" nillable="true" type="tns:SecretItem" />
</s:sequence>
</s:complexType>
<s:complexType name="SecretItem">
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="Value" type="s:string" />
<s:element minOccurs="1" maxOccurs="1" name="Id" nillable="true" type="s:int" />
<s:element minOccurs="1" maxOccurs="1" name="FieldId" nillable="true" type="s:int" />
<s:element minOccurs="0" maxOccurs="1" name="FieldName" type="s:string" />
<s:element minOccurs="1" maxOccurs="1" name="IsFile" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="IsNotes" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="IsPassword" type="s:boolean" />
<s:element minOccurs="0" maxOccurs="1" name="FieldDisplayName" type="s:string" />
</s:sequence>
</s:complexType>
<s:complexType name="SecretSettings">
<s:sequence>
<s:element minOccurs="1" maxOccurs="1" name="AutoChangeEnabled" nillable="true" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="RequiresApprovalForAccess" nillable="true" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="RequiresComment" nillable="true" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="CheckOutEnabled" nillable="true" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="CheckOutChangePasswordEnabled" nillable="true" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="PrivilegedSecretId" nillable="true" type="s:int" />
<s:element minOccurs="0" maxOccurs="1" name="AssociatedSecretIds" type="tns:ArrayOfInt" />
<s:element minOccurs="0" maxOccurs="1" name="Approvers" type="tns:ArrayOfGroupOrUserRecord" />
<s:element minOccurs="1" maxOccurs="1" name="IsChangeToSettings" type="s:boolean" />
</s:sequence>
</s:complexType>
<s:complexType name="ArrayOfInt">
<s:sequence>
<s:element minOccurs="0" maxOccurs="unbounded" name="int" type="s:int" />
</s:sequence>
</s:complexType>
<s:complexType name="ArrayOfGroupOrUserRecord">
<s:sequence>
<s:element minOccurs="0" maxOccurs="unbounded" name="GroupOrUserRecord" nillable="true" type="tns:GroupOrUserRecord" />
</s:sequence>
</s:complexType>
<s:complexType name="GroupOrUserRecord">
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="Name" type="s:string" />
<s:element minOccurs="0" maxOccurs="1" name="DomainName" type="s:string" />
<s:element minOccurs="1" maxOccurs="1" name="IsUser" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="GroupId" nillable="true" type="s:int" />
<s:element minOccurs="1" maxOccurs="1" name="UserId" nillable="true" type="s:int" />
</s:sequence>
</s:complexType>
<s:complexType name="SecretPermissions">
<s:sequence>
<s:element minOccurs="1" maxOccurs="1" name="CurrentUserHasView" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="CurrentUserHasEdit" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="CurrentUserHasOwner" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="InheritPermissionsEnabled" nillable="true" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="IsChangeToPermissions" type="s:boolean" />
<s:element minOccurs="0" maxOccurs="1" name="Permissions" type="tns:ArrayOfPermission" />
</s:sequence>
</s:complexType>
<s:complexType name="ArrayOfPermission">
<s:sequence>
<s:element minOccurs="0" maxOccurs="unbounded" name="Permission" nillable="true" type="tns:Permission" />
</s:sequence>
</s:complexType>
<s:complexType name="Permission">
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="UserOrGroup" type="tns:GroupOrUserRecord" />
<s:element minOccurs="1" maxOccurs="1" name="View" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="Edit" type="s:boolean" />
<s:element minOccurs="1" maxOccurs="1" name="Owner" type="s:boolean" />
</s:sequence>
</s:complexType>
<s:element name="GetSecret">
<s:complexType>
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="token" type="s:string" />
<s:element minOccurs="1" maxOccurs="1" name="secretId" type="s:int" />
<s:element minOccurs="1" maxOccurs="1" name="loadSettingsAndPermissions" nillable="true" type="s:boolean" />
<s:element minOccurs="0" maxOccurs="1" name="codeResponses" type="tns:ArrayOfCodeResponse" />
</s:sequence>
</s:complexType>
</s:element>
<s:complexType name="ArrayOfCodeResponse">
<s:sequence>
<s:element minOccurs="0" maxOccurs="unbounded" name="CodeResponse" nillable="true" type="tns:CodeResponse" />
</s:sequence>
</s:complexType>
<s:complexType name="CodeResponse">
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="ErrorCode" type="s:string" />
<s:element minOccurs="0" maxOccurs="1" name="Comment" type="s:string" />
<s:element minOccurs="0" maxOccurs="1" name="AdditionalComment" type="s:string" />
</s:sequence>
</s:complexType>
<s:element name="GetSecretResponse">
<s:complexType>
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="GetSecretResult" type="tns:GetSecretResult" />
</s:sequence>
</s:complexType>
</s:element>
<s:complexType name="WebServiceResult">
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="Errors" type="tns:ArrayOfString" />
</s:sequence>
</s:complexType>
<s:element name="GetSecretsByFieldValue">
<s:complexType>
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="token" type="s:string" />
<s:element minOccurs="0" maxOccurs="1" name="fieldName" type="s:string" />
<s:element minOccurs="0" maxOccurs="1" name="searchTerm" type="s:string" />
<s:element minOccurs="1" maxOccurs="1" name="showDeleted" type="s:boolean" />
</s:sequence>
</s:complexType>
</s:element>
<s:element name="GetSecretsByFieldValueResponse">
<s:complexType>
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="GetSecretsByFieldValueResult" type="tns:GetSecretsByFieldValueResult" />
</s:sequence>
</s:complexType>
</s:element>
<s:complexType name="GetSecretsByFieldValueResult">
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="Errors" type="tns:ArrayOfString" />
<s:element minOccurs="0" maxOccurs="1" name="Secrets" type="tns:ArrayOfSecret" />
</s:sequence>
</s:complexType>
<s:complexType name="ArrayOfSecret">
<s:sequence>
<s:element minOccurs="0" maxOccurs="unbounded" name="Secret" nillable="true" type="tns:Secret" />
</s:sequence>
</s:complexType>
<s:element name="DownloadFileAttachment">
<s:complexType>
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="token" type="s:string" />
<s:element minOccurs="1" maxOccurs="1" name="secretId" type="s:int" />
</s:sequence>
</s:complexType>
</s:element>
<s:element name="DownloadFileAttachmentResponse">
<s:complexType>
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="DownloadFileAttachmentResult" type="tns:FileDownloadResult" />
</s:sequence>
</s:complexType>
</s:element>
<s:complexType name="FileDownloadResult">
<s:complexContent mixed="false">
<s:extension base="tns:WebServiceResult">
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="FileAttachment" type="s:base64Binary" />
<s:element minOccurs="0" maxOccurs="1" name="FileName" type="s:string" />
</s:sequence>
</s:extension>
</s:complexContent>
</s:complexType>
<s:element name="DownloadFileAttachmentByItemId">
<s:complexType>
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="token" type="s:string" />
<s:element minOccurs="1" maxOccurs="1" name="secretId" type="s:int" />
<s:element minOccurs="1" maxOccurs="1" name="secretItemId" type="s:int" />
</s:sequence>
</s:complexType>
</s:element>
<s:element name="DownloadFileAttachmentByItemIdResponse">
<s:complexType>
<s:sequence>
<s:element minOccurs="0" maxOccurs="1" name="DownloadFileAttachmentByItemIdResult" type="tns:FileDownloadResult" />
</s:sequence>
</s:complexType>
</s:element>
<s:element name="AuthenticateResult" nillable="true" type="tns:AuthenticateResult" />
<s:element name="GetSecretResult" nillable="true" type="tns:GetSecretResult" />
<s:element name="GetSecretsByFieldValueResult" nillable="true" type="tns:GetSecretsByFieldValueResult" />
<s:element name="FileDownloadResult" nillable="true" type="tns:FileDownloadResult" />
</s:schema>
<s:schema targetNamespace="urn:thesecretserver.com/AbstractTypes">
<s:import namespace="http://schemas.xmlsoap.org/soap/encoding/" />
<s:complexType name="StringArray">
<s:complexContent mixed="false">
<s:restriction base="soapenc:Array">
<s:sequence>
<s:element minOccurs="0" maxOccurs="unbounded" name="String" type="s:string" />
</s:sequence>
</s:restriction>
</s:complexContent>
</s:complexType>
</s:schema>
</wsdl:types>
<wsdl:message name="AuthenticateSoapIn">
<wsdl:part name="parameters" element="tns:Authenticate" />
</wsdl:message>
<wsdl:message name="AuthenticateSoapOut">
<wsdl:part name="parameters" element="tns:AuthenticateResponse" />
</wsdl:message>
<wsdl:message name="GetSecretSoapIn">
<wsdl:part name="parameters" element="tns:GetSecret" />
</wsdl:message>
<wsdl:message name="GetSecretSoapOut">
<wsdl:part name="parameters" element="tns:GetSecretResponse" />
</wsdl:message>
<wsdl:message name="GetSecretsByFieldValueSoapIn">
<wsdl:part name="parameters" element="tns:GetSecretsByFieldValue" />
</wsdl:message>
<wsdl:message name="GetSecretsByFieldValueSoapOut">
<wsdl:part name="parameters" element="tns:GetSecretsByFieldValueResponse" />
</wsdl:message>
<wsdl:message name="DownloadFileAttachmentSoapIn">
<wsdl:part name="parameters" element="tns:DownloadFileAttachment" />
</wsdl:message>
<wsdl:message name="DownloadFileAttachmentSoapOut">
<wsdl:part name="parameters" element="tns:DownloadFileAttachmentResponse" />
</wsdl:message>
<wsdl:message name="DownloadFileAttachmentByItemIdSoapIn">
<wsdl:part name="parameters" element="tns:DownloadFileAttachmentByItemId" />
</wsdl:message>
<wsdl:message name="DownloadFileAttachmentByItemIdSoapOut">
<wsdl:part name="parameters" element="tns:DownloadFileAttachmentByItemIdResponse" />
</wsdl:message>
<wsdl:message name="UploadFileAttachmentSoapIn">
<wsdl:part name="parameters" element="tns:UploadFileAttachment" />
</wsdl:message>
<wsdl:message name="UploadFileAttachmentSoapOut">
<wsdl:part name="parameters" element="tns:UploadFileAttachmentResponse" />
</wsdl:message>
<wsdl:message name="UploadFileAttachmentByItemIdSoapIn">
<wsdl:part name="parameters" element="tns:UploadFileAttachmentByItemId" />
</wsdl:message>
<wsdl:message name="UploadFileAttachmentByItemIdSoapOut">
<wsdl:part name="parameters" element="tns:UploadFileAttachmentByItemIdResponse" />
</wsdl:message>
<wsdl:message name="AuthenticateHttpGetIn">
<wsdl:part name="username" type="s:string" />
<wsdl:part name="password" type="s:string" />
<wsdl:part name="organization" type="s:string" />
<wsdl:part name="domain" type="s:string" />
</wsdl:message>
<wsdl:message name="AuthenticateHttpGetOut">
<wsdl:part name="Body" element="tns:AuthenticateResult" />
</wsdl:message>
<wsdl:message name="GetSecretsByFieldValueHttpGetIn">
<wsdl:part name="token" type="s:string" />
<wsdl:part name="fieldName" type="s:string" />
<wsdl:part name="searchTerm" type="s:string" />
<wsdl:part name="showDeleted" type="s:string" />
</wsdl:message>
<wsdl:message name="GetSecretsByFieldValueHttpGetOut">
<wsdl:part name="Body" element="tns:GetSecretsByFieldValueResult" />
</wsdl:message>
<wsdl:message name="DownloadFileAttachmentHttpGetIn">
<wsdl:part name="token" type="s:string" />
<wsdl:part name="secretId" type="s:string" />
</wsdl:message>
<wsdl:message name="DownloadFileAttachmentHttpGetOut">
<wsdl:part name="Body" element="tns:FileDownloadResult" />
</wsdl:message>
<wsdl:message name="DownloadFileAttachmentByItemIdHttpGetIn">
<wsdl:part name="token" type="s:string" />
<wsdl:part name="secretId" type="s:string" />
<wsdl:part name="secretItemId" type="s:string" />
</wsdl:message>
<wsdl:message name="DownloadFileAttachmentByItemIdHttpGetOut">
<wsdl:part name="Body" element="tns:FileDownloadResult" />
</wsdl:message>
<wsdl:message name="UploadFileAttachmentHttpGetIn">
<wsdl:part name="token" type="s:string" />
<wsdl:part name="secretId" type="s:string" />
<wsdl:part name="fileData" type="s1:StringArray" />
<wsdl:part name="fileName" type="s:string" />
</wsdl:message>
<wsdl:message name="AuthenticateHttpPostIn">
<wsdl:part name="username" type="s:string" />
<wsdl:part name="password" type="s:string" />
<wsdl:part name="organization" type="s:string" />
<wsdl:part name="domain" type="s:string" />
</wsdl:message>
<wsdl:message name="AuthenticateHttpPostOut">
<wsdl:part name="Body" element="tns:AuthenticateResult" />
</wsdl:message>
<wsdl:message name="GetSecretsByFieldValueHttpPostIn">
<wsdl:part name="token" type="s:string" />
<wsdl:part name="fieldName" type="s:string" />
<wsdl:part name="searchTerm" type="s:string" />
<wsdl:part name="showDeleted" type="s:string" />
</wsdl:message>
<wsdl:message name="GetSecretsByFieldValueHttpPostOut">
<wsdl:part name="Body" element="tns:GetSecretsByFieldValueResult" />
</wsdl:message>
<wsdl:message name="DownloadFileAttachmentHttpPostIn">
<wsdl:part name="token" type="s:string" />
<wsdl:part name="secretId" type="s:string" />
</wsdl:message>
<wsdl:message name="DownloadFileAttachmentHttpPostOut">
<wsdl:part name="Body" element="tns:FileDownloadResult" />
</wsdl:message>
<wsdl:message name="DownloadFileAttachmentByItemIdHttpPostIn">
<wsdl:part name="token" type="s:string" />
<wsdl:part name="secretId" type="s:string" />
<wsdl:part name="secretItemId" type="s:string" />
</wsdl:message>
<wsdl:message name="DownloadFileAttachmentByItemIdHttpPostOut">
<wsdl:part name="Body" element="tns:FileDownloadResult" />
</wsdl:message>
<wsdl:portType name="SSWebServiceSoap">
<wsdl:operation name="Authenticate">
<wsdl:input message="tns:AuthenticateSoapIn" />
<wsdl:output message="tns:AuthenticateSoapOut" />
</wsdl:operation>
<wsdl:operation name="GetSecret">
<wsdl:input message="tns:GetSecretSoapIn" />
<wsdl:output message="tns:GetSecretSoapOut" />
</wsdl:operation>
<wsdl:operation name="GetSecretsByFieldValue">
<wsdl:input message="tns:GetSecretsByFieldValueSoapIn" />
<wsdl:output message="tns:GetSecretsByFieldValueSoapOut" />
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachment">
<wsdl:input message="tns:DownloadFileAttachmentSoapIn" />
<wsdl:output message="tns:DownloadFileAttachmentSoapOut" />
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachmentByItemId">
<wsdl:input message="tns:DownloadFileAttachmentByItemIdSoapIn" />
<wsdl:output message="tns:DownloadFileAttachmentByItemIdSoapOut" />
</wsdl:operation>
</wsdl:portType>
<wsdl:portType name="SSWebServiceHttpGet">
<wsdl:operation name="Authenticate">
<wsdl:input message="tns:AuthenticateHttpGetIn" />
<wsdl:output message="tns:AuthenticateHttpGetOut" />
</wsdl:operation>
<wsdl:operation name="GetSecretsByFieldValue">
<wsdl:input message="tns:GetSecretsByFieldValueHttpGetIn" />
<wsdl:output message="tns:GetSecretsByFieldValueHttpGetOut" />
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachment">
<wsdl:input message="tns:DownloadFileAttachmentHttpGetIn" />
<wsdl:output message="tns:DownloadFileAttachmentHttpGetOut" />
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachmentByItemId">
<wsdl:input message="tns:DownloadFileAttachmentByItemIdHttpGetIn" />
<wsdl:output message="tns:DownloadFileAttachmentByItemIdHttpGetOut" />
</wsdl:operation>
</wsdl:portType>
<wsdl:portType name="SSWebServiceHttpPost">
<wsdl:operation name="Authenticate">
<wsdl:input message="tns:AuthenticateHttpPostIn" />
<wsdl:output message="tns:AuthenticateHttpPostOut" />
</wsdl:operation>
<wsdl:operation name="GetSecretsByFieldValue">
<wsdl:input message="tns:GetSecretsByFieldValueHttpPostIn" />
<wsdl:output message="tns:GetSecretsByFieldValueHttpPostOut" />
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachment">
<wsdl:input message="tns:DownloadFileAttachmentHttpPostIn" />
<wsdl:output message="tns:DownloadFileAttachmentHttpPostOut" />
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachmentByItemId">
<wsdl:input message="tns:DownloadFileAttachmentByItemIdHttpPostIn" />
<wsdl:output message="tns:DownloadFileAttachmentByItemIdHttpPostOut" />
</wsdl:operation>
</wsdl:portType>
<wsdl:binding name="SSWebServiceSoap" type="tns:SSWebServiceSoap">
<soap:binding transport="http://schemas.xmlsoap.org/soap/http" />
<wsdl:operation name="Authenticate">
<soap:operation soapAction="urn:thesecretserver.com/Authenticate" style="document" />
<wsdl:input>
<soap:body use="literal" />
</wsdl:input>
<wsdl:output>
<soap:body use="literal" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="GetSecret">
<soap:operation soapAction="urn:thesecretserver.com/GetSecret" style="document" />
<wsdl:input>
<soap:body use="literal" />
</wsdl:input>
<wsdl:output>
<soap:body use="literal" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="GetSecretsByFieldValue">
<soap:operation soapAction="urn:thesecretserver.com/GetSecretsByFieldValue" style="document" />
<wsdl:input>
<soap:body use="literal" />
</wsdl:input>
<wsdl:output>
<soap:body use="literal" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachment">
<soap:operation soapAction="urn:thesecretserver.com/DownloadFileAttachment" style="document" />
<wsdl:input>
<soap:body use="literal" />
</wsdl:input>
<wsdl:output>
<soap:body use="literal" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachmentByItemId">
<soap:operation soapAction="urn:thesecretserver.com/DownloadFileAttachmentByItemId" style="document" />
<wsdl:input>
<soap:body use="literal" />
</wsdl:input>
<wsdl:output>
<soap:body use="literal" />
</wsdl:output>
</wsdl:operation>
</wsdl:binding>
<wsdl:binding name="SSWebServiceSoap12" type="tns:SSWebServiceSoap">
<soap12:binding transport="http://schemas.xmlsoap.org/soap/http" />
<wsdl:operation name="Authenticate">
<soap12:operation soapAction="urn:thesecretserver.com/Authenticate" style="document" />
<wsdl:input>
<soap12:body use="literal" />
</wsdl:input>
<wsdl:output>
<soap12:body use="literal" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="GetSecret">
<soap12:operation soapAction="urn:thesecretserver.com/GetSecret" style="document" />
<wsdl:input>
<soap12:body use="literal" />
</wsdl:input>
<wsdl:output>
<soap12:body use="literal" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="GetSecretsByFieldValue">
<soap12:operation soapAction="urn:thesecretserver.com/GetSecretsByFieldValue" style="document" />
<wsdl:input>
<soap12:body use="literal" />
</wsdl:input>
<wsdl:output>
<soap12:body use="literal" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachment">
<soap12:operation soapAction="urn:thesecretserver.com/DownloadFileAttachment" style="document" />
<wsdl:input>
<soap12:body use="literal" />
</wsdl:input>
<wsdl:output>
<soap12:body use="literal" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachmentByItemId">
<soap12:operation soapAction="urn:thesecretserver.com/DownloadFileAttachmentByItemId" style="document" />
<wsdl:input>
<soap12:body use="literal" />
</wsdl:input>
<wsdl:output>
<soap12:body use="literal" />
</wsdl:output>
</wsdl:operation>
</wsdl:binding>
<wsdl:binding name="SSWebServiceHttpGet" type="tns:SSWebServiceHttpGet">
<http:binding verb="GET" />
<wsdl:operation name="Authenticate">
<http:operation location="/Authenticate" />
<wsdl:input>
<http:urlEncoded />
</wsdl:input>
<wsdl:output>
<mime:mimeXml part="Body" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="GetSecretsByFieldValue">
<http:operation location="/GetSecretsByFieldValue" />
<wsdl:input>
<http:urlEncoded />
</wsdl:input>
<wsdl:output>
<mime:mimeXml part="Body" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachment">
<http:operation location="/DownloadFileAttachment" />
<wsdl:input>
<http:urlEncoded />
</wsdl:input>
<wsdl:output>
<mime:mimeXml part="Body" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachmentByItemId">
<http:operation location="/DownloadFileAttachmentByItemId" />
<wsdl:input>
<http:urlEncoded />
</wsdl:input>
<wsdl:output>
<mime:mimeXml part="Body" />
</wsdl:output>
</wsdl:operation>
</wsdl:binding>
<wsdl:binding name="SSWebServiceHttpPost" type="tns:SSWebServiceHttpPost">
<http:binding verb="POST" />
<wsdl:operation name="Authenticate">
<http:operation location="/Authenticate" />
<wsdl:input>
<mime:content type="application/x-www-form-urlencoded" />
</wsdl:input>
<wsdl:output>
<mime:mimeXml part="Body" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="GetSecretsByFieldValue">
<http:operation location="/GetSecretsByFieldValue" />
<wsdl:input>
<mime:content type="application/x-www-form-urlencoded" />
</wsdl:input>
<wsdl:output>
<mime:mimeXml part="Body" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachment">
<http:operation location="/DownloadFileAttachment" />
<wsdl:input>
<mime:content type="application/x-www-form-urlencoded" />
</wsdl:input>
<wsdl:output>
<mime:mimeXml part="Body" />
</wsdl:output>
</wsdl:operation>
<wsdl:operation name="DownloadFileAttachmentByItemId">
<http:operation location="/DownloadFileAttachmentByItemId" />
<wsdl:input>
<mime:content type="application/x-www-form-urlencoded" />
</wsdl:input>
<wsdl:output>
<mime:mimeXml part="Body" />
</wsdl:output>
</wsdl:operation>
</wsdl:binding>
<wsdl:service name="SSWebService">
<wsdl:documentation xmlns:wsdl="http://schemas.xmlsoap.org/wsdl/">Webservice for standard integration.</wsdl:documentation>
<wsdl:port name="SSWebServiceSoap" binding="tns:SSWebServiceSoap">
<soap:address location="https://www.zanzitest.net/webservices/sswebservice.asmx" />
</wsdl:port>
<wsdl:port name="SSWebServiceSoap12" binding="tns:SSWebServiceSoap12">
<soap12:address location="https://www.zanzitest.net/webservices/sswebservice.asmx" />
</wsdl:port>
<wsdl:port name="SSWebServiceHttpGet" binding="tns:SSWebServiceHttpGet">
<http:address location="https://www.zanzitest.net/webservices/sswebservice.asmx" />
</wsdl:port>
<wsdl:port name="SSWebServiceHttpPost" binding="tns:SSWebServiceHttpPost">
<http:address location="https://www.zanzitest.net/webservices/sswebservice.asmx" />
</wsdl:port>
</wsdl:service>
</wsdl:definitions>

View File

@@ -0,0 +1,95 @@
require 'zanzibar/cli'
require 'zanzibar/defaults'
require 'rspec'
require 'fakefs/spec_helpers'
require 'webmock'
require 'rspec'
require 'webmock/rspec'
include WebMock::API
describe Zanzibar::Cli do
include FakeFS::SpecHelpers
describe '#bundle' do
context 'when Zanzifile already exists' do
before(:each) do
spec_root = File.join(source_root, 'spec')
response_root = File.join(spec_root, 'responses')
wsdl = File.join(spec_root, 'scrt.wsdl')
files = File.join(spec_root, 'files')
FakeFS::FileSystem.clone response_root
FakeFS::FileSystem.clone wsdl
FakeFS::FileSystem.clone files
stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
.to_return(body: AUTH_XML, status: 200).then
.to_return(body: SECRET_WITH_KEY_XML, status: 200).then
.to_return(body: PRIVATE_KEY_XML, status: 200)
Dir.chdir File.join(source_root, 'spec', 'files')
end
before(:all) do
ENV['ZANZIBAR_PASSWORD'] = 'password'
end
after(:all) do
ENV.delete 'ZANZIBAR_PASSWORD'
end
it 'should have a Zanzifile' do
expect(FakeFS::FileTest.file? Zanzibar::ZANZIFILE_NAME).to be(true)
expect(File.read(Zanzibar::ZANZIFILE_NAME)).to include('zanzitest')
end
it 'should download a file' do
expect(FakeFS::FileTest.file? File.join('secrets', 'zanzi_key')).to be(false)
expect { subject.bundle }.to output(/Finished downloading secrets/).to_stdout
expect(FakeFS::FileTest.file? File.join('secrets', 'zanzi_key')).to be(true)
end
it 'should create a resolved file' do
expect(FakeFS::FileTest.file? Zanzibar::RESOLVED_NAME).to be(false)
expect { subject.bundle }.to output(/Finished downloading secrets/).to_stdout
expect(FakeFS::FileTest.file? Zanzibar::RESOLVED_NAME).to be(true)
end
it 'should not redownload files it already has' do
expect { subject.bundle }.to output(/Finished downloading secrets/).to_stdout
expect(WebMock).to have_requested(:post, 'https://www.zanzitest.net/webservices/sswebservice.asmx').times(3)
WebMock.reset!
expect { subject.bundle }.to output(/Finished downloading secrets/).to_stdout
expect(WebMock).not_to have_requested(:post, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
end
it 'should redownload on update action' do
expect { subject.bundle }.to output(/Finished downloading secrets/).to_stdout
expect(WebMock).to have_requested(:post, 'https://www.zanzitest.net/webservices/sswebservice.asmx').times(3)
WebMock.reset!
stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
.to_return(body: AUTH_XML, status: 200).then
.to_return(body: SECRET_WITH_KEY_XML, status: 200).then
.to_return(body: PRIVATE_KEY_XML, status: 200)
expect { subject.update }.to output(/Finished downloading secrets/).to_stdout
expect(WebMock).to have_requested(:post, 'https://www.zanzitest.net/webservices/sswebservice.asmx').times(3)
end
it 'should reject a malformed Zanzifile' do
File.write('Zanzifile', 'broken YAML')
expect { subject.bundle }.to raise_error.with_message(/#{Zanzibar::INVALID_ZANZIFILE_ERROR}/)
end
end
context 'when Zanzifile does not exist' do
it 'should return an error' do
expect { subject.bundle }.to raise_error.with_message(/#{Zanzibar::NO_ZANZIFILE_ERROR}/)
end
end
end
end

View File

@@ -0,0 +1,64 @@
require 'zanzibar/cli'
require 'rspec'
require 'fakefs/spec_helpers'
require 'webmock'
require 'rspec'
require 'webmock/rspec'
require 'zanzibar/defaults'
include WebMock::API
describe Zanzibar::Cli do
include FakeFS::SpecHelpers
describe '#get' do
before(:each) do
spec_root = File.join(source_root, 'spec')
response_root = File.join(spec_root, 'responses')
wsdl = File.join(spec_root, 'scrt.wsdl')
files = File.join(spec_root, 'files')
FakeFS::FileSystem.clone response_root
FakeFS::FileSystem.clone wsdl
FakeFS::FileSystem.clone files
stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
.to_return(body: AUTH_XML, status: 200).then
.to_return(body: SECRET_XML, status: 200)
Dir.chdir File.join(source_root, 'spec', 'files')
end
before(:all) do
ENV['ZANZIBAR_PASSWORD'] = 'password'
end
after(:all) do
ENV.delete 'ZANZIBAR_PASSWORD'
WebMock.reset!
end
it 'should print a password to stdout' do
subject.options = { 'domain' => 'zanzitest.net', 'wsdl' => 'scrt.wsdl' }
expect { subject.get(1234) }.to output(/zanziUserPassword/).to_stdout
end
it 'should require a wsdl' do
expect { subject.get(1234) }.to raise_error.with_message(/#{Zanzibar::NO_WSDL_ERROR}/)
end
it 'should be able to download files' do
WebMock.reset!
stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
.to_return(body: AUTH_XML, status: 200).then
.to_return(body: SECRET_WITH_KEY_XML, status: 200).then
.to_return(body: PRIVATE_KEY_XML, status: 200)
subject.options = { 'domain' => 'zanzitest.net', 'wsdl' => 'scrt.wsdl', 'filelabel' => 'Private Key' }
expect(FakeFS::FileTest.file? 'zanzi_key').to be(false)
expect { subject.get(2345) }.to output(/zanzi_key/).to_stdout
expect(FakeFS::FileTest.file? 'zanzi_key')
end
end
end

View File

@@ -0,0 +1,53 @@
require 'zanzibar/cli'
require 'zanzibar/defaults'
require 'rspec'
require 'fakefs/spec_helpers'
describe Zanzibar::Cli do
include FakeFS::SpecHelpers
describe '#init' do
before(:each) do
templates_root = File.join(source_root, 'templates')
FakeFS::FileSystem.clone templates_root
end
context 'when a file does not yet exist' do
it 'should create a template file' do
expect { subject.init }.to output(/has been created/).to_stdout
expect(FakeFS::FileTest.file? Zanzibar::ZANZIFILE_NAME).to be(true)
expect(File.read Zanzibar::ZANZIFILE_NAME).to match(/fill in your secrets/)
end
it 'should accept settings as options' do
subject.options = { 'wsdl' => 'http://example.com/ss?wsdl',
'domain' => 'example.com',
'secretdir' => 'testfolderplzignore',
'ignoressl' => true }
expect { subject.init }.to output(/has been created/).to_stdout
contents = File.read Zanzibar::ZANZIFILE_NAME
expect(contents).to include('wsdl: http://example.com/ss?wsdl')
expect(contents).to include('domain: example.com')
expect(contents).to include('secret_dir: testfolderplzignore')
expect(contents).to include('ignore_ssl: true')
end
end
context 'when a file already exists' do
before(:each) { File.write(Zanzibar::ZANZIFILE_NAME, 'test value') }
it 'should not overwrite an existing file' do
expect { subject.init }.to raise_error.with_message(/#{Zanzibar::ALREADY_EXISTS_ERROR}/)
expect(File.read Zanzibar::ZANZIFILE_NAME).to eq('test value')
end
it 'should obey the force flag' do
subject.options = { 'force' => true }
expect { subject.init }.to output(/has been created/).to_stdout
expect(File.read Zanzibar::ZANZIFILE_NAME).to match('fill in your secrets')
end
end
end
end

View File

@@ -0,0 +1,12 @@
require 'zanzibar/cli'
require 'zanzibar/version'
require 'zanzibar/defaults'
require 'rspec'
describe Zanzibar::Cli do
describe '#version' do
it 'should print the gem version' do
expect { subject.version }.to output(/#{Zanzibar::APPLICATION_NAME} Version/).to_stdout
end
end
end

View File

@@ -1,113 +1,116 @@
require 'zanzibar' require 'zanzibar'
require 'savon' require 'savon'
require 'webmock' require 'webmock'
require 'rspec' require 'rspec'
require 'webmock/rspec' require 'webmock/rspec'
include WebMock::API include WebMock::API
describe 'Zanzibar Test' do describe 'Zanzibar Test' do
client = Zanzibar::Zanzibar.new(domain: 'zanzitest.net', pwd: 'password', wsdl: 'spec/scrt.wsdl') client = Zanzibar::Zanzibar.new(domain: 'zanzitest.net', pwd: 'password', wsdl: 'spec/scrt.wsdl')
auth_xml = File.read('spec/responses/authenticate_response.xml')
secret_xml = File.read('spec/responses/get_secret_response.xml') it 'should return an auth token' do
secret_with_key_xml = File.read('spec/responses/get_secret_with_keys_response.xml') stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
secret_with_attachment_xml = File.read('spec/responses/get_secret_with_attachment_response.xml') .to_return(body: AUTH_XML, status: 200)
private_key_xml = File.read('spec/responses/download_private_key_response.xml')
public_key_xml = File.read('spec/responses/download_public_key_response.xml') expect(client.get_token).to eq('imatoken')
attachment_xml = File.read('spec/responses/attachment_response.xml') end
it 'should return an auth token' do it 'should get a secret' do
stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx') stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
.to_return(body: auth_xml, status: 200) .to_return(body: AUTH_XML, status: 200).then
.to_return(body: SECRET_XML, status: 200)
expect(client.get_token).to eq('imatoken')
end expect(client.get_secret(1234)[:secret][:name]).to eq('Zanzi Test Secret')
end
it 'should get a secret' do
stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx') it 'should get a password' do
.to_return(body: auth_xml, status: 200).then stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
.to_return(body: secret_xml, status: 200) .to_return(body: AUTH_XML, status: 200).then
.to_return(body: SECRET_XML, status: 200)
expect(client.get_secret(1234)[:secret][:name]).to eq('Zanzi Test Secret')
end expect(client.get_password(1234)).to eq('zanziUserPassword')
end
it 'should get a password' do
stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx') it 'should download a private key' do
.to_return(body: auth_xml, status: 200).then stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
.to_return(body: secret_xml, status: 200) .to_return(body: AUTH_XML, status: 200).then
.to_return(body: SECRET_WITH_KEY_XML, status: 200).then
expect(client.get_password(1234)).to eq('zanziUserPassword') .to_return(body: PRIVATE_KEY_XML, status: 200)
end
client.download_secret_file(scrt_id: 2345, type: 'Private Key')
it 'should download a private key' do expect(File.exist? 'zanzi_key')
stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx') expect(File.read('zanzi_key')).to eq("-----BEGIN RSA PRIVATE KEY -----\nzanzibarTestPassword\n-----END RSA PRIVATE KEY-----\n")
.to_return(body: auth_xml, status: 200).then File.delete('zanzi_key')
.to_return(body: secret_with_key_xml, status: 200).then end
.to_return(body: private_key_xml, status: 200)
it 'should download a private key legacy' do
client.download_secret_file(scrt_id: 2345, type: 'Private Key') stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
expect(File.exist? 'zanzi_key') .to_return(body: AUTH_XML, status: 200).then
expect(File.read('zanzi_key')).to eq("-----BEGIN RSA PRIVATE KEY -----\nzanzibarTestPassword\n-----END RSA PRIVATE KEY-----\n") .to_return(body: SECRET_WITH_KEY_XML, status: 200).then
File.delete('zanzi_key') .to_return(body: PRIVATE_KEY_XML, status: 200)
end
client.download_private_key(scrt_id: 2345)
it 'should download a private key legacy' do expect(File.exist? 'zanzi_key')
stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx') expect(File.read('zanzi_key')).to eq("-----BEGIN RSA PRIVATE KEY -----\nzanzibarTestPassword\n-----END RSA PRIVATE KEY-----\n")
.to_return(body: auth_xml, status: 200).then File.delete('zanzi_key')
.to_return(body: secret_with_key_xml, status: 200).then end
.to_return(body: private_key_xml, status: 200)
it 'should download a public key' do
client.download_private_key(scrt_id: 2345) stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
expect(File.exist? 'zanzi_key') .to_return(body: AUTH_XML, status: 200).then
expect(File.read('zanzi_key')).to eq("-----BEGIN RSA PRIVATE KEY -----\nzanzibarTestPassword\n-----END RSA PRIVATE KEY-----\n") .to_return(body: SECRET_WITH_KEY_XML, status: 200).then
File.delete('zanzi_key') .to_return(body: PUBLIC_KEY_XML, status: 200)
end
client.download_secret_file(scrt_id: 2345, type: 'Public Key')
it 'should download a public key' do expect(File.exist? 'zanzi_key.pub')
stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx') expect(File.read('zanzi_key.pub')).to eq("1234PublicKey5678==\n")
.to_return(body: auth_xml, status: 200).then File.delete('zanzi_key.pub')
.to_return(body: secret_with_key_xml, status: 200).then end
.to_return(body: public_key_xml, status: 200)
it 'should download a public key legacy' do
client.download_secret_file(scrt_id: 2345, type: 'Public Key') stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
expect(File.exist? 'zanzi_key.pub') .to_return(body: AUTH_XML, status: 200).then
expect(File.read('zanzi_key.pub')).to eq("1234PublicKey5678==\n") .to_return(body: SECRET_WITH_KEY_XML, status: 200).then
File.delete('zanzi_key.pub') .to_return(body: PUBLIC_KEY_XML, status: 200)
end
client.download_public_key(scrt_id: 2345)
it 'should download a public key legacy' do expect(File.exist? 'zanzi_key.pub')
stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx') expect(File.read('zanzi_key.pub')).to eq("1234PublicKey5678==\n")
.to_return(body: auth_xml, status: 200).then File.delete('zanzi_key.pub')
.to_return(body: secret_with_key_xml, status: 200).then end
.to_return(body: public_key_xml, status: 200)
it 'should download an attachment' do
client.download_public_key(scrt_id: 2345) stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
expect(File.exist? 'zanzi_key.pub') .to_return(body: AUTH_XML, status: 200).then
expect(File.read('zanzi_key.pub')).to eq("1234PublicKey5678==\n") .to_return(body: SECRET_WITH_ATTACHMENT_XML, status: 200).then
File.delete('zanzi_key.pub') .to_return(body: ATTACHMENT_XML, status: 200)
end
client.download_secret_file(scrt_id: 3456, type: 'Attachment')
it 'should download an attachment' do expect(File.exist? 'attachment.txt')
stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx') expect(File.read('attachment.txt')).to eq("I am a secret attachment\n")
.to_return(body: auth_xml, status: 200).then File.delete('attachment.txt')
.to_return(body: secret_with_attachment_xml, status: 200).then end
.to_return(body: attachment_xml, status: 200)
it 'should download an attachment legacy' do
client.download_secret_file(scrt_id: 3456, type: 'Attachment') stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx')
expect(File.exist? 'attachment.txt') .to_return(body: AUTH_XML, status: 200).then
expect(File.read('attachment.txt')).to eq("I am a secret attachment\n") .to_return(body: SECRET_WITH_ATTACHMENT_XML, status: 200).then
File.delete('attachment.txt') .to_return(body: ATTACHMENT_XML, status: 200)
end
client.download_attachment(scrt_id: 3456)
it 'should download an attachment legacy' do expect(File.exist? 'attachment.txt')
stub_request(:any, 'https://www.zanzitest.net/webservices/sswebservice.asmx') expect(File.read('attachment.txt')).to eq("I am a secret attachment\n")
.to_return(body: auth_xml, status: 200).then File.delete('attachment.txt')
.to_return(body: secret_with_attachment_xml, status: 200).then end
.to_return(body: attachment_xml, status: 200)
it 'should use environment variables for credentials' do
client.download_attachment(scrt_id: 3456) ENV['ZANZIBAR_USER'] = 'environment_user'
expect(File.exist? 'attachment.txt') ENV['ZANZIBAR_PASSWORD'] = 'environment_password'
expect(File.read('attachment.txt')).to eq("I am a secret attachment\n") client = Zanzibar::Zanzibar.new(domain: 'zanzitest.net', wsdl: 'spec/scrt.wsdl')
File.delete('attachment.txt') expect(client.get_client_username).to eq(ENV['ZANZIBAR_USER'])
end expect(client.get_client_password).to eq(ENV['ZANZIBAR_PASSWORD'])
end ENV.delete 'ZANZIBAR_PASSWORD'
ENV.delete 'ZANZIBAR_USER'
end
end

View File

@@ -1,95 +0,0 @@
# This file was generated by the `rspec --init` command. Conventionally, all
# specs live under a `spec` directory, which RSpec adds to the `$LOAD_PATH`.
# The generated `.rspec` file contains `--require spec_helper` which will cause this
# file to always be loaded, without a need to explicitly require it in any files.
#
# Given that it is always loaded, you are encouraged to keep this file as
# light-weight as possible. Requiring heavyweight dependencies from this file
# will add to the boot time of your test suite on EVERY test run, even for an
# individual file that may not need all of that loaded. Instead, consider making
# a separate helper file that requires the additional dependencies and performs
# the additional setup, and require it from the spec files that actually need it.
#
# The `.rspec` file also contains a few flags that are not defaults but that
# users commonly want.
#
# See http://rubydoc.info/gems/rspec-core/RSpec/Core/Configuration
require 'webmock/rspec'
require 'codeclimate-test-reporter'
CodeClimate::TestReporter.start
RSpec.configure do |config|
# rspec-expectations config goes here. You can use an alternate
# assertion/expectation library such as wrong or the stdlib/minitest
# assertions if you prefer.
config.expect_with :rspec do |expectations|
# This option will default to `true` in RSpec 4. It makes the `description`
# and `failure_message` of custom matchers include text for helper methods
# defined using `chain`, e.g.:
# be_bigger_than(2).and_smaller_than(4).description
# # => "be bigger than 2 and smaller than 4"
# ...rather than:
# # => "be bigger than 2"
expectations.include_chain_clauses_in_custom_matcher_descriptions = true
end
# rspec-mocks config goes here. You can use an alternate test double
# library (such as bogus or mocha) by changing the `mock_with` option here.
config.mock_with :rspec do |mocks|
# Prevents you from mocking or stubbing a method that does not exist on
# a real object. This is generally recommended, and will default to
# `true` in RSpec 4.
mocks.verify_partial_doubles = true
end
config.after(:suite) do
WebMock.disable_net_connect!(allow: 'codeclimate.com')
end
# The settings below are suggested to provide a good initial experience
# with RSpec, but feel free to customize to your heart's content.
# # These two settings work together to allow you to limit a spec run
# # to individual examples or groups you care about by tagging them with
# # `:focus` metadata. When nothing is tagged with `:focus`, all examples
# # get run.
# config.filter_run :focus
# config.run_all_when_everything_filtered = true
#
# # Limits the available syntax to the non-monkey patched syntax that is recommended.
# # For more details, see:
# # - http://myronmars.to/n/dev-blog/2012/06/rspecs-new-expectation-syntax
# # - http://teaisaweso.me/blog/2013/05/27/rspecs-new-message-expectation-syntax/
# # - http://myronmars.to/n/dev-blog/2014/05/notable-changes-in-rspec-3#new__config_option_to_disable_rspeccore_monkey_patching
# config.disable_monkey_patching!
#
# # This setting enables warnings. It's recommended, but in some cases may
# # be too noisy due to issues in dependencies.
# config.warnings = true
#
# # Many RSpec users commonly either run the entire suite or an individual
# # file, and it's useful to allow more verbose output when running an
# # individual spec file.
# if config.files_to_run.one?
# # Use the documentation formatter for detailed output,
# # unless a formatter has already been configured
# # (e.g. via a command-line flag).
# config.default_formatter = 'doc'
# end
#
# # Print the 10 slowest examples and example groups at the
# # end of the spec run, to help surface which specs are running
# # particularly slow.
# config.profile_examples = 10
#
# # Run specs in random order to surface order dependencies. If you find an
# # order dependency and want to debug it, you can fix the order by providing
# # the seed, which is printed after each run.
# # --seed 1234
# config.order = :random
#
# # Seed global randomization in this process using the `--seed` CLI option.
# # Setting this allows you to use `--seed` to deterministically reproduce
# # test failures related to randomization by passing the same `--seed` value
# # as the one that triggered the failure.
# Kernel.srand config.seed
end

37
spec/spec_helper.rb Normal file
View File

@@ -0,0 +1,37 @@
# This file was generated by the `rspec --init` command. Conventionally, all
# specs live under a `spec` directory, which RSpec adds to the `$LOAD_PATH`.
# The generated `.rspec` file contains `--require spec_helper` which will cause this
# file to always be loaded, without a need to explicitly require it in any files.
#
# See http://rubydoc.info/gems/rspec-core/RSpec/Core/Configuration
require 'webmock/rspec'
require 'codeclimate-test-reporter'
require 'simplecov'
CodeClimate::TestReporter.start
SimpleCov.start
RSpec.configure do |config|
config.expect_with :rspec do |expectations|
expectations.include_chain_clauses_in_custom_matcher_descriptions = true
end
config.mock_with :rspec do |mocks|
mocks.verify_partial_doubles = true
end
config.after(:suite) do
WebMock.disable_net_connect!(allow: 'codeclimate.com')
end
end
def source_root
File.expand_path('../../', __FILE__)
end
AUTH_XML = File.read('spec/responses/authenticate_response.xml')
SECRET_XML = File.read('spec/responses/get_secret_response.xml')
SECRET_WITH_KEY_XML = File.read('spec/responses/get_secret_with_keys_response.xml')
SECRET_WITH_ATTACHMENT_XML = File.read('spec/responses/get_secret_with_attachment_response.xml')
PRIVATE_KEY_XML = File.read('spec/responses/download_private_key_response.xml')
PUBLIC_KEY_XML = File.read('spec/responses/download_public_key_response.xml')
ATTACHMENT_XML = File.read('spec/responses/attachment_response.xml')

11
templates/Zanzifile.erb Normal file
View File

@@ -0,0 +1,11 @@
---
settings:
wsdl: <%= wsdl %>
domain: <%= domain %>
secret_dir: <%= secretdir %>
ignore_ssl: <%= ignoressl %>
secrets:
# TODO fill in your secrets like so:
# ssh_key:
# id: 1
# label: Private Key

View File

@@ -14,13 +14,21 @@ Gem::Specification.new do |spec|
spec.license = 'Apache 2.0' spec.license = 'Apache 2.0'
spec.files = `git ls-files -z`.split("\x0") spec.files = `git ls-files -z`.split("\x0")
spec.executables = spec.files.grep(%r{^bin/}) { |f| File.basename(f) } spec.executables = spec.files.grep(/^bin\//) { |f| File.basename(f) }
spec.test_files = spec.files.grep(%r{^(test|spec|features)/}) spec.test_files = spec.files.grep(/^(test|spec|features)\//)
spec.require_paths = ['lib'] spec.require_paths = ['lib']
spec.add_dependency 'rubyntlm', '~> 0.4.0'
spec.add_development_dependency 'bundler', '~> 1.7' spec.add_development_dependency 'bundler', '~> 1.7'
spec.add_development_dependency 'rake', '~> 10.0' spec.add_development_dependency 'rake', '~> 10.0'
spec.add_development_dependency 'rubocop', '~>0.18.1' spec.add_development_dependency 'rubocop', '~> 0.28.0'
spec.add_development_dependency 'savon_spec', '~> 0.1.6'
spec.add_development_dependency 'rspec', '~> 3.1.0'
spec.add_development_dependency 'webmock', '~> 1.20.4'
spec.add_development_dependency 'codeclimate-test-reporter'
spec.add_development_dependency 'fakefs', '~> 0.6.4'
spec.add_development_dependency 'simplecov', '~> 0.9.1'
spec.add_runtime_dependency 'savon', '~> 2.8.0' spec.add_runtime_dependency 'savon', '~> 2.8.0'
spec.add_runtime_dependency 'rubyntlm', '~> 0.4.0'
spec.add_runtime_dependency 'thor', '~> 0.19.0'
end end