diff options
author | elijah <elijah@riseup.net> | 2015-08-12 14:37:21 -0700 |
---|---|---|
committer | elijah <elijah@riseup.net> | 2015-08-19 12:24:51 -0700 |
commit | 64787942086b6fbfdf432cd6250f0937c785de1a (patch) | |
tree | 06634196af8066cb782032f731ee7cae939367ce /lib/leap_cli/macros/secrets.rb | |
parent | e6f6324ebea9fc46d5d617a08c2eb239349d9f90 (diff) |
mv commands and macros to lib/leap_cli
Diffstat (limited to 'lib/leap_cli/macros/secrets.rb')
-rw-r--r-- | lib/leap_cli/macros/secrets.rb | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/lib/leap_cli/macros/secrets.rb b/lib/leap_cli/macros/secrets.rb new file mode 100644 index 00000000..8d1feb55 --- /dev/null +++ b/lib/leap_cli/macros/secrets.rb @@ -0,0 +1,39 @@ +# encoding: utf-8 + +require 'base32' + +module LeapCli + module Macro + + # + # inserts a named secret, generating it if needed. + # + # manager.export_secrets should be called later to capture any newly generated secrets. + # + # +length+ is the character length of the generated password. + # + def secret(name, length=32) + manager.secrets.set(name, @node.environment) { Util::Secret.generate(length) } + end + + # inserts a base32 encoded secret + def base32_secret(name, length=20) + manager.secrets.set(name, @node.environment) { Base32.encode(Util::Secret.generate(length)) } + end + + # Picks a random obfsproxy port from given range + def rand_range(name, range) + manager.secrets.set(name, @node.environment) { rand(range) } + end + + # + # inserts an hexidecimal secret string, generating it if needed. + # + # +bit_length+ is the bits in the secret, (ie length of resulting hex string will be bit_length/4) + # + def hex_secret(name, bit_length=128) + manager.secrets.set(name, @node.environment) { Util::Secret.generate_hex(bit_length) } + end + + end +end
\ No newline at end of file |