Download the PHP package giftcards/encryption without Composer
On this page you can find all versions of the php package giftcards/encryption. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Download giftcards/encryption
More information about giftcards/encryption
Files in giftcards/encryption
Package encryption
Short Description Library that helps with managing encrypting data.
License MIT
Informations about the package encryption
Giftcards Encryption Library
Library that helps make configuring and using encrypt schemes easier.
Purpose
This library was made to make managing encryptoin of data eaiser including sourcing encryption keys, rotating keys, using different ciphers, and being able to better keep track of wich data was encrypted with combination of keys
Usage
Basic
to just get going you will need to define at least one key source and one profile.
profiles are the way you tell the encryptor which cipher you want to use and which key you want to use for encrypting/decrypting and key sources are the classes that are in charge of loading a key given its name.
simple example.
If you dont set the default profile you will need to pass the name fo the profile always when encrypting. when decrypting however the same requirements will apply since it will do the same work trying to figure out what profile it was encrypted with.
Diving Deeper
Ciphers
Ciphers are classes following the Giftcards\Encryption\Cipher\CipherInterface
they are how you
can define different ways to encrypt/decrypt data. The current implementations are
- mysql_aes - this one duplicates the AES_ENCRYPT/AES_DECRYPT functions in mysql/mariadb
- no_op - this one is just a passthrough it will just return the data exactly the same as given on encrypt/decrypt
Key Sources
Key sources are classes following the Giftcards\Encryption\Key\SourceInterface
they are how you can
define ways for the encryptor to load a key they take the key by name and return the key if found
and if not they throw an exception. the current implementations are
- ArraySource - this one takes an array of keys as name value pairs
- CachingSource - this one takes another source into it and caches the requests for keys
- CombiningSource - this source allows you to make a new key out of 2 other keys it takes an array with the names of the new keys and the values for each being the names of keys to use as the left and right part of this new one
- ChainSource - takes a chain of key sources and returns the key for the first source to have a value for the given name
- ContainerAwareChainSource - this one works the same as the ChainSource, however it takes a symfony container and allows you to set the names of services as ket sources to allow for them to only be loaded when requests for keys are made
- CircularGuardSource - this takes a source to wrap if you have your sources setup to possibly reference each other and you think they could have the possibility of having a never ending circular key request. It keeps track of which keys ahve been requested through it and if the same key is requested it will return false on has and throw a key not found exception without asking its internal source
- ContainerParametersSource - this one takes a symfony container and looks for parameters named the same as the key requested
- FallbackSource - this one takes an array of key names and an array of fallbacks if they dont exist and goes through all the fallbacks before throwing an exception
- IniFileSource - this one takes the path to an ini file and loads keys using the keys of the ini file
- MappingSource - this one allows you to alias keys. it takes an array with the new key names as the keys and the keys to map to as the values
- MongoSource - this source allows you to define a mongo collection as a key source. It uses a search field you define to search for a key by the name given
- NoneSource - this is jsut an easy way of adding a key called
none
- PrefixKeyNameSource - this one allows you to wrap a different source and define a prefix for it. This can be really useful if you use the chain. you can wrap
for example the mongo source and say that it should only response to keys prefixed with
mongo:
the colon is the default separator and is configurable - VaultSource - this allows you to define a source that pulls your keys from vault
Profiles
Profiles are a way of grouping a cipher with a key name. The encryptor works wth profiles to decide how to encrypt/decrypt data all it contains is the name of a key and the name of a cipher to use
Cipher Text
Cipher Text are ment to represent data that has been encrypted. The encryptor returns an instance of this that is stringable and will automatically serialize using the serializers mentioned later on if you cast it to a string. The idea is to allow for the encrypted data and the profile used to encrypt it to move together
Cipher Text Serializers/Deserializers
The cipher text serializers and deserializers are in charge of making a cipher text instance into a string for easy storage
and deserializing them on the way out before decryption in the encryptor. this allows for them to be stored easily and the encryptor
to be able to deal just with cipher texts with all the info on how to decrypt them. There are 2 interfaces
Giftcards\Encryption\CipherText\Serializer\SerializerInterface
and Giftcards\Encryption\CipherText\Serializer\DeserializerInterface
there is a combination interface called SerializerDeserializerInterface
which the encryptor actually uses. Separating the interfaces allows
for different ways ofr serializing and deserializing. the current implmenentations are
- BasicSerializerDeserializer - takes the profile turns it into an array, json encodes that, base64 encodes that then joins it to the base64 encoded encrypted data to make one long string. it does the opposite on the deserializing side
- NoProfileSerializerDeserializer - this one returns the contents of the encrypted data as the serialized cipher text. it will only do it for cipher texts having a profile matching the profile sent in to its constructor. This adds a little bit of safety since on serialization the profile info is lost and will have to be inferred to be the same as the one sent to the serializers constructor. on deserialize as mentioned above it takes the encrypted data as is and creates a cipher text using it and the profile passed to its constructor
- ChainSerializerDeserializer - this takes a chain of serializers and a chain of deserializers and passes the cipher text to the first that can handle it
- ContainerAwareChainSerializerDeserializer - this does the smae as the chain but it takes a symfony container in its constructor and can pull the serializers/deserializers by service names you give it
Cipher Text Rotators
These classes allow you to define, in a programmatic way, the places that you would need to rotate an encryption key or encryption algorithm
so that you can just keep a list and go through them when you need to rotate, call rotate giving them an optional new profile to use
(if no new profile is used the current default encryptor profile will be used to re-encrypt). it allows you to define for exmaple
a list of tables along with the specific columns that need key rotation. All the rotators must follow the interface
Giftcards\Encryption\CipherText\Rotator\RotatorInterface
. implementations currently are
- DatabaseTableRotator - this class you give a pdo instance the name of the table the fields in that table and the way a row is is identified (usually its primary key) and will rotate those fields when asked to
- DoctrineDBALRotator - this class will take the same data but instead of a pdo instance you give it a doctrine dbal connection.
Doctrine ORM Integration
There is a listener + annotation you can use for defining entities that have encrypted fields. they will be automatically decrypted
on load and encrypted on flush. you can define which profile to use in the annotation. if none if defined the default
profile will be used. You can also define an array of ignored values using the ignoredValues
option in the annotation.
The default value is array(null)
Builders
there are builder classes that are meant to wrap creation of rotators, serializers, deserializers and key sources.
this allows for you to call the addKeySource($source, $options, $prefix, $addCircularGuard)
to add a key source
and internal builders will do the work for you. you can call addSerializer($serializer, $options)
,
addDeserializer($deserializer, $options)
. there is also a builder for rotators that is separate since they aren't used by the encryptor.
the encryptor builder can be instanciated using the EncryptorBuilder::newInstance()
.
the encryptor builder uses a bunch of sub builders.
- Giftcards\Encryption\Key\Source\SourceBuilder - builds key sources
- Giftcards\Encryption\CipherText\Serializer\SerializerDeserializerBuilder - builds a chain of serializers and deserializers
the rotator builder is Giftcards\Encryption\CipherText\Rotator\RotatorBuilder
.
all these sub builders rely on a factory that holds a builder for every one of the types it creates they can be found in the factory directories under which they are located. they are what allows for them to build based off a $name, $options conbination instead of just instances.
the names in the following builder lists can be passed to the first arg for the builder and the options named after that should be passed as the option array
so for example for a builder named foo
with options array('bar' => 'baz')
you can call addKeySource('foo', array('bar' => 'baz')
on the encryptor
builder or call add('foo', array('bar' => 'baz')
on the key source builder. same for the other builders
Key Source builders
array
- keys - an array of keys to create the array source out of with the keys being the key names and the value being the key values
container_parameter
- container - the symfony container to pass to the source. this may be optional dending on how you instanciated this builder. if you passed in a container then this is not necessary
ini_file
- file - the path to the ini file
- case_sensitive - if the keys should be case sensitive when called for or not
mongo
- connection - the mongo connection to use. this can be an instance of a [doctrine/mongodb]() connection or an array to create one with the following keys 'server', 'options', 'configuration', 'event_manager' with all but server being required.
- database - the database to use
- collection - the collection to use
- find_by_field - the field to use to find the correct document. for example if the field is
name
it will try to find a document with the name field matching the key name given - value_field - the field value to pull when the document is found. for example if the value_field is value then it will pull the value field as the key's value
vault
- base_url - the main domain + scheme url for vault
- token - the token to use when requesting from vault
- mount - the mount to request from
- value_field - the fivle to pull the key value from. for example if the
value_field
isvalue
then it will pull thevalue
field as the key's value - api_version - the valut api version defaults to v1.
Serializer/Deserializer builders
basic
- seperator - the seprator string to use to combine the base64 encoded profile data with the base64 encoded encrypted data
no_profile
- profile - th profile to check against before serializing andthe profile to set on deserialized cipher texts. this can be an inatance of
Giftcards\Encryption\Profile\Profile
or, if you pass the profile registry to its constructor you can give a profile name
Cipher text rotator builders
database_table
- pdo - a pdo instance to use
- table - the table to rotate
- fields - the fields within the table that should be rotated
- id_field - the field used to identify row (for db updates)
doctrine_dbal
- connection - a doctrine DBAL connection instance to use
- table - the table to rotate
- fields - the fields within the table that should be rotated
- id_field - the field used to identify row (for db updates)