mirror of
https://github.com/rails/rails.git
synced 2022-11-09 12:12:34 -05:00
Allow on_rotation
in MessageEncryptor to be passed in constructor:
- Use case: I'm writing a wrapper around MessageEncryptor to make things easier to rotate a secret in our app. It works something like ```ruby crypt = RotatableSecret.new(['old_secret', 'new_secret']) crypt.decrypt_and_verify(message) ``` I'd like the caller to not have to care about passing the `on_rotation` option and have the wrapper deal with it when instantiating the MessageEncryptor object. Also, almost all of the time the on_rotation should be the same when rotating a secret (logging something or StatsD event) so I think it's not worth having to repeat ourselves each time we decrypt a message.
This commit is contained in:
parent
648144649a
commit
a5502f4a79
3 changed files with 50 additions and 4 deletions
|
@ -1,3 +1,20 @@
|
|||
* Allow the on_rotation proc used when decrypting/verifying a message to be
|
||||
be passed at the constructor level.
|
||||
|
||||
Before:
|
||||
|
||||
crypt = ActiveSupport::MessageEncryptor.new('long_secret')
|
||||
crypt.decrypt_and_verify(encrypted_message, on_rotation: proc { ... })
|
||||
crypt.decrypt_and_verify(another_encrypted_message, on_rotation: proc { ... })
|
||||
|
||||
After:
|
||||
|
||||
crypt = ActiveSupport::MessageEncryptor.new('long_secret', on_rotation: proc { ... })
|
||||
crypt.decrypt_and_verify(encrypted_message)
|
||||
crypt.decrypt_and_verify(another_encrypted_message)
|
||||
|
||||
*Edouard Chin*
|
||||
|
||||
* `delegate_missing_to` would raise a `DelegationError` if the object
|
||||
delegated to was `nil`. Now the `allow_nil` option has been added to enable
|
||||
the user to specify they want `nil` returned in this case.
|
||||
|
|
|
@ -3,11 +3,12 @@
|
|||
module ActiveSupport
|
||||
module Messages
|
||||
module Rotator # :nodoc:
|
||||
def initialize(*, **options)
|
||||
def initialize(*, on_rotation: nil, **options)
|
||||
super
|
||||
|
||||
@options = options
|
||||
@rotations = []
|
||||
@on_rotation = on_rotation
|
||||
end
|
||||
|
||||
def rotate(*secrets, **options)
|
||||
|
@ -17,7 +18,7 @@ module ActiveSupport
|
|||
module Encryptor
|
||||
include Rotator
|
||||
|
||||
def decrypt_and_verify(*args, on_rotation: nil, **options)
|
||||
def decrypt_and_verify(*args, on_rotation: @on_rotation, **options)
|
||||
super
|
||||
rescue MessageEncryptor::InvalidMessage, MessageVerifier::InvalidSignature
|
||||
run_rotations(on_rotation) { |encryptor| encryptor.decrypt_and_verify(*args, options) } || raise
|
||||
|
@ -32,7 +33,7 @@ module ActiveSupport
|
|||
module Verifier
|
||||
include Rotator
|
||||
|
||||
def verified(*args, on_rotation: nil, **options)
|
||||
def verified(*args, on_rotation: @on_rotation, **options)
|
||||
super || run_rotations(on_rotation) { |verifier| verifier.verified(*args, options) }
|
||||
end
|
||||
|
||||
|
@ -46,7 +47,7 @@ module ActiveSupport
|
|||
def run_rotations(on_rotation)
|
||||
@rotations.find do |rotation|
|
||||
if message = yield(rotation) rescue next
|
||||
on_rotation.call if on_rotation
|
||||
on_rotation&.call
|
||||
return message
|
||||
end
|
||||
end
|
||||
|
|
|
@ -171,6 +171,34 @@ class MessageEncryptorTest < ActiveSupport::TestCase
|
|||
assert rotated
|
||||
end
|
||||
|
||||
def test_on_rotation_can_be_passed_at_the_constructor_level
|
||||
older_message = ActiveSupport::MessageEncryptor.new(secrets[:older], "older sign").encrypt_and_sign(encoded: "message")
|
||||
|
||||
rotated = false
|
||||
encryptor = ActiveSupport::MessageEncryptor.new(@secret, on_rotation: proc { rotated = true })
|
||||
encryptor.rotate secrets[:older], "older sign"
|
||||
|
||||
assert_changes(:rotated, from: false, to: true) do
|
||||
message = encryptor.decrypt_and_verify(older_message)
|
||||
|
||||
assert_equal({ encoded: "message" }, message)
|
||||
end
|
||||
end
|
||||
|
||||
def test_on_rotation_option_takes_precedence_over_the_one_given_in_constructor
|
||||
older_message = ActiveSupport::MessageEncryptor.new(secrets[:older], "older sign").encrypt_and_sign(encoded: "message")
|
||||
|
||||
rotated = false
|
||||
encryptor = ActiveSupport::MessageEncryptor.new(@secret, on_rotation: proc { rotated = true })
|
||||
encryptor.rotate secrets[:older], "older sign"
|
||||
|
||||
assert_changes(:rotated, from: false, to: "Yes") do
|
||||
message = encryptor.decrypt_and_verify(older_message, on_rotation: proc { rotated = "Yes" })
|
||||
|
||||
assert_equal({ encoded: "message" }, message)
|
||||
end
|
||||
end
|
||||
|
||||
def test_with_rotated_metadata
|
||||
old_message = ActiveSupport::MessageEncryptor.new(secrets[:old], cipher: "aes-256-gcm").
|
||||
encrypt_and_sign("metadata", purpose: :rotation)
|
||||
|
|
Loading…
Reference in a new issue