2017-07-09 08:06:36 -04:00
|
|
|
# frozen_string_literal: true
|
2017-07-10 09:39:13 -04:00
|
|
|
|
2016-08-06 11:58:50 -04:00
|
|
|
require "concurrent/map"
|
|
|
|
require "openssl"
|
2012-07-03 20:37:31 -04:00
|
|
|
|
|
|
|
module ActiveSupport
|
2015-10-11 03:33:57 -04:00
|
|
|
# KeyGenerator is a simple wrapper around OpenSSL's implementation of PBKDF2.
|
2012-07-03 20:37:31 -04:00
|
|
|
# It can be used to derive a number of keys for various purposes from a given secret.
|
2013-05-09 07:57:08 -04:00
|
|
|
# This lets Rails applications have a single secure secret, but avoid reusing that
|
2012-07-03 20:37:31 -04:00
|
|
|
# key in multiple incompatible contexts.
|
|
|
|
class KeyGenerator
|
|
|
|
def initialize(secret, options = {})
|
|
|
|
@secret = secret
|
|
|
|
# The default iterations are higher than required for our key derivation uses
|
|
|
|
# on the off chance someone uses this for password storage
|
|
|
|
@iterations = options[:iterations] || 2**16
|
|
|
|
end
|
|
|
|
|
|
|
|
# Returns a derived key suitable for use. The default key_size is chosen
|
2016-06-30 11:31:45 -04:00
|
|
|
# to be compatible with the default settings of ActiveSupport::MessageVerifier.
|
|
|
|
# i.e. OpenSSL::Digest::SHA1#block_length
|
2016-10-28 23:05:58 -04:00
|
|
|
def generate_key(salt, key_size = 64)
|
2012-07-03 20:37:31 -04:00
|
|
|
OpenSSL::PKCS5.pbkdf2_hmac_sha1(@secret, salt, @iterations, key_size)
|
|
|
|
end
|
|
|
|
end
|
2012-10-30 23:06:46 -04:00
|
|
|
|
2012-11-15 20:06:44 -05:00
|
|
|
# CachingKeyGenerator is a wrapper around KeyGenerator which allows users to avoid
|
|
|
|
# re-executing the key generation process when it's called using the same salt and
|
2015-10-11 03:33:57 -04:00
|
|
|
# key_size.
|
2012-11-01 18:23:21 -04:00
|
|
|
class CachingKeyGenerator
|
|
|
|
def initialize(key_generator)
|
|
|
|
@key_generator = key_generator
|
2015-09-19 09:56:26 -04:00
|
|
|
@cache_keys = Concurrent::Map.new
|
2012-11-01 18:23:21 -04:00
|
|
|
end
|
|
|
|
|
2016-06-30 11:31:45 -04:00
|
|
|
# Returns a derived key suitable for use.
|
|
|
|
def generate_key(*args)
|
|
|
|
@cache_keys[args.join] ||= @key_generator.generate_key(*args)
|
2012-11-01 18:23:21 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-04-02 19:41:57 -04:00
|
|
|
class LegacyKeyGenerator # :nodoc:
|
2012-11-02 09:03:18 -04:00
|
|
|
SECRET_MIN_LENGTH = 30 # Characters
|
|
|
|
|
2012-10-30 23:06:46 -04:00
|
|
|
def initialize(secret)
|
2012-11-02 09:03:18 -04:00
|
|
|
ensure_secret_secure(secret)
|
2012-10-30 23:06:46 -04:00
|
|
|
@secret = secret
|
|
|
|
end
|
|
|
|
|
|
|
|
def generate_key(salt)
|
|
|
|
@secret
|
|
|
|
end
|
2012-11-02 09:03:18 -04:00
|
|
|
|
|
|
|
private
|
|
|
|
|
2016-09-14 04:57:52 -04:00
|
|
|
# To prevent users from using something insecure like "Password" we make sure that the
|
|
|
|
# secret they've provided is at least 30 characters in length.
|
2016-08-06 13:55:02 -04:00
|
|
|
def ensure_secret_secure(secret)
|
|
|
|
if secret.blank?
|
|
|
|
raise ArgumentError, "A secret is required to generate an integrity hash " \
|
|
|
|
"for cookie session data. Set a secret_key_base of at least " \
|
2018-06-27 12:23:33 -04:00
|
|
|
"#{SECRET_MIN_LENGTH} characters by running `rails credentials:edit`."
|
2016-08-06 13:55:02 -04:00
|
|
|
end
|
2012-11-02 09:03:18 -04:00
|
|
|
|
2016-08-06 13:55:02 -04:00
|
|
|
if secret.length < SECRET_MIN_LENGTH
|
|
|
|
raise ArgumentError, "Secret should be something secure, " \
|
|
|
|
"like \"#{SecureRandom.hex(16)}\". The value you " \
|
|
|
|
"provided, \"#{secret}\", is shorter than the minimum length " \
|
|
|
|
"of #{SECRET_MIN_LENGTH} characters."
|
|
|
|
end
|
2012-11-02 09:03:18 -04:00
|
|
|
end
|
2012-10-30 23:06:46 -04:00
|
|
|
end
|
2012-07-03 20:37:31 -04:00
|
|
|
end
|