/
encrypt.go
118 lines (95 loc) · 2.69 KB
/
encrypt.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
package secret
import (
"bytes"
"fmt"
"os"
"github.com/spf13/cobra"
"golang.org/x/crypto/ssh/terminal"
"github.com/flant/werf/cmd/werf/common"
secret_common "github.com/flant/werf/cmd/werf/helm/secret/common"
"github.com/flant/werf/pkg/deploy/secret"
"github.com/flant/werf/pkg/werf"
)
var cmdData struct {
OutputFilePath string
}
var commonCmdData common.CmdData
func NewCmd() *cobra.Command {
cmd := &cobra.Command{
Use: "encrypt",
DisableFlagsInUseLine: true,
Short: "Encrypt data",
Long: common.GetLongCommandDescription(`Encrypt data from standard input.
Encryption key should be in $WERF_SECRET_KEY or .werf_secret_key file`),
Example: ` # Encrypt data in interactive mode
$ werf helm secret encrypt
Enter secret:
100044d3f6a2ffd6dd2b73fa8f50db5d61fb6ac04da29955c77d13bb44e937448ee4
# Encrypt from a pipe and save result in file
$ date | werf helm secret encrypt -o .helm/secret/date`,
Annotations: map[string]string{
common.CmdEnvAnno: common.EnvsDescription(common.WerfSecretKey),
},
RunE: func(cmd *cobra.Command, args []string) error {
if err := common.ProcessLogOptions(&commonCmdData); err != nil {
common.PrintHelp(cmd)
return err
}
return runSecretEncrypt()
},
}
common.SetupDir(&commonCmdData, cmd)
common.SetupTmpDir(&commonCmdData, cmd)
common.SetupHomeDir(&commonCmdData, cmd)
common.SetupLogOptions(&commonCmdData, cmd)
cmd.Flags().StringVarP(&cmdData.OutputFilePath, "output-file-path", "o", "", "Write to file instead of stdout")
return cmd
}
func runSecretEncrypt() error {
if err := werf.Init(*commonCmdData.TmpDir, *commonCmdData.HomeDir); err != nil {
return fmt.Errorf("initialization error: %s", err)
}
projectDir, err := common.GetProjectDir(&commonCmdData)
if err != nil {
return fmt.Errorf("getting project dir failed: %s", err)
}
m, err := secret.GetManager(projectDir)
if err != nil {
return err
}
return secretEncrypt(m)
}
func secretEncrypt(m secret.Manager) error {
var data []byte
var encodedData []byte
var err error
if terminal.IsTerminal(int(os.Stdin.Fd())) {
data, err = secret_common.InputFromInteractiveStdin()
if err != nil {
return err
}
} else {
data, err = secret_common.InputFromStdin()
if err != nil {
return err
}
}
if len(data) == 0 {
return nil
}
encodedData, err = m.Encrypt(data)
if err != nil {
return err
}
if !bytes.HasSuffix(encodedData, []byte("\n")) {
encodedData = append(encodedData, []byte("\n")...)
}
if cmdData.OutputFilePath != "" {
if err := secret_common.SaveGeneratedData(cmdData.OutputFilePath, encodedData); err != nil {
return err
}
} else {
fmt.Printf("%s", string(encodedData))
}
return nil
}