Module: Pindo::AESHelper

Defined in:
lib/pindo/base/aeshelper.rb

Class Method Summary collapse

Class Method Details

.aes_128_ecb_decrypt(key, decrypted_string) ⇒ Object



102
103
104
105
106
107
108
# File 'lib/pindo/base/aeshelper.rb', line 102

def self.aes_128_ecb_decrypt(key, decrypted_string)
  cipher = OpenSSL::Cipher.new("AES-128-ECB")
  cipher.decrypt
  cipher.key = key
  text = cipher.update(Base64.strict_decode64(decrypted_string)) + cipher.final
  return text
end

.aes_128_ecb_encrypt(key, encrypted_string) ⇒ Object



93
94
95
96
97
98
99
100
# File 'lib/pindo/base/aeshelper.rb', line 93

def self.aes_128_ecb_encrypt(key, encrypted_string)
  cipher = OpenSSL::Cipher::Cipher.new('AES-128-ECB')
  cipher.encrypt
  cipher.key = key
  txt = cipher.update(encrypted_string) << cipher.final
  content =  Base64.strict_encode64(txt)
  return content
end

.decrypt_specific_file(src_file: nil, password: nil, output_dir: nil, hash_algorithm: "MD5") ⇒ Object

The encryption parameters in this implementations reflect the old behavior which depended on the users’ local OpenSSL version 1.0.x OpenSSL and earlier versions use MD5, 1.1.0c and newer uses SHA256, we try both before giving an error



125
126
127
128
129
130
131
132
133
134
135
136
137
# File 'lib/pindo/base/aeshelper.rb', line 125

def self.decrypt_specific_file(src_file: nil, password: nil, output_dir: nil, hash_algorithm: "MD5")

  begin
    destfile = File.join(output_dir, File.basename(src_file))
    e = Match::Encryption::MatchFileEncryption.new
    e.decrypt(file_path: src_file, password: password, output_path:destfile)
    return destfile
  rescue => error
      Funlog.instance.fancyinfo_error("解析文件失败: #{src_file}")
      raise Informative, error
      return nil
  end
end

.delete_password(keychain_name: nil) ⇒ Object



32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
# File 'lib/pindo/base/aeshelper.rb', line 32

def self.delete_password(keychain_name:nil)
  server_name = ["match", keychain_name].join("_")
  # 静默删除密码,不输出 keychain 详细信息(文件描述符级别重定向)
  begin
    old_stdout = STDOUT.dup
    old_stderr = STDERR.dup
    STDOUT.reopen(File::NULL, 'w')
    STDERR.reopen(File::NULL, 'w')

    Security::InternetPassword.delete(server:server_name)
  ensure
    STDOUT.reopen(old_stdout)
    STDERR.reopen(old_stderr)
    old_stdout.close
    old_stderr.close
  end
rescue => e
  # 忽略错误(密码可能不存在)
end

.encrypt_specific_file(src_file: nil, password: nil, output_dir: nil) ⇒ Object



111
112
113
114
115
116
117
118
119
120
121
# File 'lib/pindo/base/aeshelper.rb', line 111

def self.encrypt_specific_file(src_file: nil, password: nil, output_dir: nil)
  UI.user_error!("No password supplied") if password.to_s.strip.length == 0

  destfile = File.join(output_dir, File.basename(src_file))
  e = Match::Encryption::MatchFileEncryption.new
  e.encrypt(file_path: src_file, password: password, output_path:destfile)
  return destfile
rescue error
  puts path
  raise Informative, error
end

.fetch_password(keychain_name: nil, test_file: nil) ⇒ Object



12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
# File 'lib/pindo/base/aeshelper.rb', line 12

def self.fetch_password(keychain_name:nil, test_file:nil)
  # password = ENV["MATCH_PASSWORD"]

  server_name = ["match", keychain_name].join("_")

  item = Security::InternetPassword.find(server: server_name)

  password = item.password if item

  unless password
      puts "\e[33m[DEBUG] Keychain中未找到密码,需要用户输入: #{server_name}\e[0m" if ENV['PINDO_DEBUG']
      password = FastlaneCore::Helper.ask_password(message: "请输入证书仓库的加密密码: ", confirm: true)
      puts "\e[33m[DEBUG] 用户输入密码成功,等待验证后保存到Keychain\e[0m" if ENV['PINDO_DEBUG']
  else
      puts "\e[32m[DEBUG] 从Keychain获取密码成功: #{server_name}\e[0m" if ENV['PINDO_DEBUG']
  end

  return password
end

.store_password(keychain_name: nil, password: nil) ⇒ Object



52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
# File 'lib/pindo/base/aeshelper.rb', line 52

def self.store_password(keychain_name:nil, password:nil)
  server_name = ["match", keychain_name].join("_")

  # 先检查密码是否已存在,如果存在则无需重复保存
  begin
    item = Security::InternetPassword.find(server: server_name)
    if item && item.password == password
      puts "\e[33m[DEBUG] 密码已存在于Keychain,跳过保存: #{server_name}\e[0m" if ENV['PINDO_DEBUG']
      return
    end
  rescue => e
    # 密码不存在,继续保存流程
  end

  # 静默操作,避免输出错误信息(文件描述符级别重定向)
  begin
    old_stdout = STDOUT.dup
    old_stderr = STDERR.dup
    STDOUT.reopen(File::NULL, 'w')
    STDERR.reopen(File::NULL, 'w')

    # 先尝试删除旧密码(如果存在但不同)
    begin
      Security::InternetPassword.delete(server:server_name)
    rescue => e
      # 忽略删除错误(密码可能不存在)
    end

    # 添加新密码
    Security::InternetPassword.add(server_name, "", password)
  ensure
    STDOUT.reopen(old_stdout)
    STDERR.reopen(old_stderr)
    old_stdout.close
    old_stderr.close
  end
rescue => e
  # 忽略错误,不影响主流程
end