Class: ConcealedString
- Inherits:
-
Object
- Object
- ConcealedString
- Defined in:
- lib/familia/features/encrypted_fields/concealed_string.rb
Overview
ConcealedString
A secure wrapper for encrypted field values that prevents accidental plaintext leakage through serialization, logging, or debugging.
Unlike RedactedString (which wraps plaintext), ConcealedString wraps encrypted data and provides controlled decryption through the .reveal API.
Security Model:
- Contains encrypted JSON data, never plaintext
- Requires explicit .reveal { } for decryption and plaintext access
- ALL serialization methods return '[CONCEALED]' to prevent leakage
- Maintains encryption context for proper AAD handling
- Thread-safe and supports concurrent access
Key Security Features:
- Universal Serialization Safety - ALL to_* methods protected
- Debugging Safety - inspect, logging, console output shows [CONCEALED]
- Exception Safety - never leaks plaintext in error messages
- Future-proof - any new serialization method automatically safe
- Memory Clearing - best-effort encrypted data clearing
Critical Design Principles:
- Secure by default - no auto-decryption anywhere
- Explicit decryption - .reveal required for plaintext access
- Comprehensive protection - covers ALL serialization paths
- Auditable access - easy to grep for .reveal usage
Example Usage: user = User.new user.secret_data = "sensitive info" # Encrypts and wraps user.secret_data # Returns ConcealedString user.secret_data.reveal { |plain| ... } # Explicit decryption user.to_h # Safe - contains [CONCEALED] user.to_json # Safe - contains [CONCEALED]
Constant Summary collapse
- REDACTED =
'[CONCEALED]'.freeze
Class Method Summary collapse
-
.finalizer_proc(encrypted_data) ⇒ Object
Finalizer to attempt memory cleanup.
Instance Method Summary collapse
-
#+(_other) ⇒ Object
String concatenation operations return concealed result.
-
#==(other) ⇒ Object
(also: #eql?)
Returns true when it's literally the same object, otherwise false.
-
#as_json ⇒ Object
Prevent exposure in Rails serialization (as_json -> to_json).
-
#belongs_to_context?(expected_record, expected_field_name) ⇒ Boolean
Validate that this ConcealedString belongs to the given record context.
- #blank? ⇒ Boolean
-
#clear! ⇒ Object
Clear the encrypted data from memory.
-
#cleared? ⇒ Boolean
Check if the encrypted data has been cleared.
-
#coerce(other) ⇒ Object
Handle coercion for concatenation like "string" + concealed.
- #concat(_other) ⇒ Object
-
#deconstruct ⇒ Object
Pattern matching safety (Ruby 3.0+).
- #deconstruct_keys ⇒ Object
- #downcase ⇒ Object
- #each {|'[CONCEALED]'| ... } ⇒ Object
- #empty? ⇒ Boolean
-
#encrypted_value ⇒ String?
Access the encrypted data for database storage.
- #gsub ⇒ Object
-
#hash ⇒ Object
Consistent hash to prevent timing attacks.
- #include?(_substring) ⇒ Boolean
-
#initialize(encrypted_data, record, field_type) ⇒ ConcealedString
constructor
Create a concealed string wrapper.
-
#inspect ⇒ Object
Safe representation for debugging and console output.
- #length ⇒ Object
-
#map {|'[CONCEALED]'| ... } ⇒ Object
Enumerable methods for safety.
- #present? ⇒ Boolean
-
#reveal {|String| ... } ⇒ Object
Primary API: reveal the decrypted plaintext in a controlled block.
- #size ⇒ Object
-
#strip ⇒ Object
String pattern matching methods.
- #to_a ⇒ Object
-
#to_h ⇒ Object
Hash/Array serialization safety.
-
#to_json ⇒ Object
Prevent exposure in JSON serialization - fail closed for security.
-
#to_s ⇒ Object
Prevent accidental exposure through string conversion and serialization.
-
#upcase ⇒ Object
String methods that should return safe concealed values.
Constructor Details
#initialize(encrypted_data, record, field_type) ⇒ ConcealedString
Create a concealed string wrapper
50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 50 def initialize(encrypted_data, record, field_type) @encrypted_data = encrypted_data.freeze @record = record @field_type = field_type @cleared = false # Parse and validate the encrypted data structure if @encrypted_data begin @encrypted_data_obj = Familia::Encryption::EncryptedData.from_json(@encrypted_data) # Validate that the encrypted data is decryptable (algorithm supported, etc.) @encrypted_data_obj.validate_decryptable! rescue Familia::EncryptionError => e raise Familia::EncryptionError, e. rescue StandardError => e raise Familia::EncryptionError, "Invalid encrypted data: #{e.}" end end ObjectSpace.define_finalizer(self, self.class.finalizer_proc(@encrypted_data)) end |
Class Method Details
.finalizer_proc(encrypted_data) ⇒ Object
Finalizer to attempt memory cleanup
282 283 284 285 286 287 288 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 282 def self.finalizer_proc(encrypted_data) proc do # Best effort cleanup - Ruby doesn't guarantee memory security # Only clear if not frozen to avoid FrozenError encrypted_data.clear if encrypted_data.respond_to?(:clear) && !encrypted_data.frozen? end end |
Instance Method Details
#+(_other) ⇒ Object
String concatenation operations return concealed result
202 203 204 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 202 def +(_other) '[CONCEALED]' end |
#==(other) ⇒ Object Also known as: eql?
Returns true when it's literally the same object, otherwise false. This prevents timing attacks where an attacker could potentially infer information about the secret value through comparison timing
147 148 149 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 147 def ==(other) object_id.equal?(other.object_id) # same object end |
#as_json ⇒ Object
Prevent exposure in Rails serialization (as_json -> to_json)
277 278 279 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 277 def as_json(*) '[CONCEALED]' end |
#belongs_to_context?(expected_record, expected_field_name) ⇒ Boolean
Validate that this ConcealedString belongs to the given record context
This prevents cross-context attacks where encrypted data is moved between different records or field contexts. While moving ConcealedString objects manually is not a normal use case, this provides defense in depth.
109 110 111 112 113 114 115 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 109 def belongs_to_context?(expected_record, expected_field_name) return false if @record.nil? || @field_type.nil? @record.instance_of?(expected_record.class) && @record.identifier == expected_record.identifier && @field_type.instance_variable_get(:@name) == expected_field_name end |
#blank? ⇒ Boolean
197 198 199 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 197 def blank? false # Never blank if encrypted data exists end |
#clear! ⇒ Object
Clear the encrypted data from memory
Safe to call multiple times. This provides best-effort memory clearing within Ruby's limitations.
122 123 124 125 126 127 128 129 130 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 122 def clear! return if @cleared @encrypted_data = nil @record = nil @field_type = nil @cleared = true freeze end |
#cleared? ⇒ Boolean
Check if the encrypted data has been cleared
136 137 138 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 136 def cleared? @cleared end |
#coerce(other) ⇒ Object
Handle coercion for concatenation like "string" + concealed
211 212 213 214 215 216 217 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 211 def coerce(other) if other.is_a?(String) ['[CONCEALED]', '[CONCEALED]'] else [other, '[CONCEALED]'] end end |
#concat(_other) ⇒ Object
206 207 208 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 206 def concat(_other) '[CONCEALED]' end |
#deconstruct ⇒ Object
Pattern matching safety (Ruby 3.0+)
263 264 265 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 263 def deconstruct ['[CONCEALED]'] end |
#deconstruct_keys ⇒ Object
267 268 269 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 267 def deconstruct_keys(*) { concealed: true } end |
#downcase ⇒ Object
181 182 183 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 181 def downcase '[CONCEALED]' end |
#each {|'[CONCEALED]'| ... } ⇒ Object
238 239 240 241 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 238 def each yield '[CONCEALED]' if block_given? self end |
#empty? ⇒ Boolean
140 141 142 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 140 def empty? @encrypted_data.to_s.empty? end |
#encrypted_value ⇒ String?
Access the encrypted data for database storage
This method is used internally by the field type system for persisting the encrypted data to the database.
159 160 161 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 159 def encrypted_value @encrypted_data end |
#gsub ⇒ Object
224 225 226 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 224 def gsub(*) '[CONCEALED]' end |
#hash ⇒ Object
Consistent hash to prevent timing attacks
258 259 260 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 258 def hash ConcealedString.hash end |
#include?(_substring) ⇒ Boolean
228 229 230 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 228 def include?(_substring) false # Never reveal substring presence end |
#inspect ⇒ Object
Safe representation for debugging and console output
244 245 246 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 244 def inspect '[CONCEALED]' end |
#length ⇒ Object
185 186 187 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 185 def length 11 # Fixed concealed length to match '[CONCEALED]' length end |
#map {|'[CONCEALED]'| ... } ⇒ Object
Enumerable methods for safety
233 234 235 236 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 233 def map yield '[CONCEALED]' if block_given? ['[CONCEALED]'] end |
#present? ⇒ Boolean
193 194 195 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 193 def present? true # Always return true since encrypted data exists end |
#reveal {|String| ... } ⇒ Object
Primary API: reveal the decrypted plaintext in a controlled block
This is the ONLY way to access plaintext from encrypted fields. The plaintext is decrypted fresh each time using the current record state and AAD context.
Security Warning: Avoid operations inside the block that create uncontrolled copies of the plaintext (dup, interpolation, etc.)
Example: user.api_token.reveal do |token| HTTP.post('/api', headers: { 'X-Token' => token }) end
89 90 91 92 93 94 95 96 97 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 89 def reveal raise ArgumentError, 'Block required for reveal' unless block_given? raise SecurityError, 'Encrypted data already cleared' if cleared? raise SecurityError, 'No encrypted data to reveal' if @encrypted_data.nil? # Decrypt using current record context and AAD plaintext = @field_type.decrypt_value(@record, @encrypted_data) yield plaintext end |
#size ⇒ Object
189 190 191 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 189 def size length end |
#strip ⇒ Object
String pattern matching methods
220 221 222 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 220 def strip '[CONCEALED]' end |
#to_a ⇒ Object
253 254 255 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 253 def to_a ['[CONCEALED]'] end |
#to_h ⇒ Object
Hash/Array serialization safety
249 250 251 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 249 def to_h '[CONCEALED]' end |
#to_json ⇒ Object
Prevent exposure in JSON serialization - fail closed for security
272 273 274 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 272 def to_json(*) raise Familia::SerializerError, 'ConcealedString cannot be serialized to JSON' end |
#to_s ⇒ Object
Prevent accidental exposure through string conversion and serialization
Ruby has two string conversion methods with different purposes:
- to_s: explicit conversion (
obj.to_s, string interpolation"#{obj}") - to_str: implicit coercion (
File.read(obj),"prefix" + obj)
We implement to_s for safe logging/debugging but deliberately omit to_str to prevent encrypted data from being used where strings are expected.
172 173 174 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 172 def to_s '[CONCEALED]' end |
#upcase ⇒ Object
String methods that should return safe concealed values
177 178 179 |
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 177 def upcase '[CONCEALED]' end |