Class: ConcealedString

Inherits:
Object
  • Object
show all
Defined in:
lib/familia/features/encrypted_fields/concealed_string.rb

Overview

ConcealedString

A secure wrapper for encrypted field values that prevents accidental plaintext leakage through serialization, logging, or debugging.

Unlike RedactedString (which wraps plaintext), ConcealedString wraps encrypted data and provides controlled decryption through the .reveal API.

Security Model:

  • Contains encrypted JSON data, never plaintext
  • Requires explicit .reveal { } for decryption and plaintext access
  • ALL serialization methods return '[CONCEALED]' to prevent leakage
  • Maintains encryption context for proper AAD handling
  • Thread-safe and supports concurrent access

Key Security Features:

  1. Universal Serialization Safety - ALL to_* methods protected
  2. Debugging Safety - inspect, logging, console output shows [CONCEALED]
  3. Exception Safety - never leaks plaintext in error messages
  4. Future-proof - any new serialization method automatically safe
  5. Memory Clearing - best-effort encrypted data clearing

Critical Design Principles:

  • Secure by default - no auto-decryption anywhere
  • Explicit decryption - .reveal required for plaintext access
  • Comprehensive protection - covers ALL serialization paths
  • Auditable access - easy to grep for .reveal usage

Example Usage: user = User.new user.secret_data = "sensitive info" # Encrypts and wraps user.secret_data # Returns ConcealedString user.secret_data.reveal { |plain| ... } # Explicit decryption user.to_h # Safe - contains [CONCEALED] user.to_json # Safe - contains [CONCEALED]

Constant Summary collapse

REDACTED =
'[CONCEALED]'.freeze

Class Method Summary collapse

Instance Method Summary collapse

Constructor Details

#initialize(encrypted_data, record, field_type) ⇒ ConcealedString

Create a concealed string wrapper

Parameters:

  • encrypted_data (String)

    The encrypted JSON data

  • record (Familia::Horreum)

    The record instance for context

  • field_type (EncryptedFieldType)

    The field type for decryption



50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 50

def initialize(encrypted_data, record, field_type)
  @encrypted_data = encrypted_data.freeze
  @record = record
  @field_type = field_type
  @cleared = false

  # Parse and validate the encrypted data structure
  if @encrypted_data
    begin
      @encrypted_data_obj = Familia::Encryption::EncryptedData.from_json(@encrypted_data)
      # Validate that the encrypted data is decryptable (algorithm supported, etc.)
      @encrypted_data_obj.validate_decryptable!
    rescue Familia::EncryptionError => e
      raise Familia::EncryptionError, e.message
    rescue StandardError => e
      raise Familia::EncryptionError, "Invalid encrypted data: #{e.message}"
    end
  end

  ObjectSpace.define_finalizer(self, self.class.finalizer_proc(@encrypted_data))
end

Class Method Details

.finalizer_proc(encrypted_data) ⇒ Object

Finalizer to attempt memory cleanup



282
283
284
285
286
287
288
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 282

def self.finalizer_proc(encrypted_data)
  proc do
    # Best effort cleanup - Ruby doesn't guarantee memory security
    # Only clear if not frozen to avoid FrozenError
    encrypted_data.clear if encrypted_data.respond_to?(:clear) && !encrypted_data.frozen?
  end
end

Instance Method Details

#+(_other) ⇒ Object

String concatenation operations return concealed result



202
203
204
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 202

def +(_other)
  '[CONCEALED]'
end

#==(other) ⇒ Object Also known as: eql?

Returns true when it's literally the same object, otherwise false. This prevents timing attacks where an attacker could potentially infer information about the secret value through comparison timing



147
148
149
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 147

def ==(other)
  object_id.equal?(other.object_id) # same object
end

#as_jsonObject

Prevent exposure in Rails serialization (as_json -> to_json)



277
278
279
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 277

def as_json(*)
  '[CONCEALED]'
end

#belongs_to_context?(expected_record, expected_field_name) ⇒ Boolean

Validate that this ConcealedString belongs to the given record context

This prevents cross-context attacks where encrypted data is moved between different records or field contexts. While moving ConcealedString objects manually is not a normal use case, this provides defense in depth.

Parameters:

  • expected_record (Familia::Horreum)

    The record that should own this data

  • expected_field_name (Symbol)

    The field name that should own this data

Returns:

  • (Boolean)

    true if contexts match, false otherwise



109
110
111
112
113
114
115
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 109

def belongs_to_context?(expected_record, expected_field_name)
  return false if @record.nil? || @field_type.nil?

  @record.instance_of?(expected_record.class) &&
    @record.identifier == expected_record.identifier &&
    @field_type.instance_variable_get(:@name) == expected_field_name
end

#blank?Boolean

Returns:

  • (Boolean)


197
198
199
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 197

def blank?
  false # Never blank if encrypted data exists
end

#clear!Object

Clear the encrypted data from memory

Safe to call multiple times. This provides best-effort memory clearing within Ruby's limitations.



122
123
124
125
126
127
128
129
130
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 122

def clear!
  return if @cleared

  @encrypted_data = nil
  @record = nil
  @field_type = nil
  @cleared = true
  freeze
end

#cleared?Boolean

Check if the encrypted data has been cleared

Returns:

  • (Boolean)

    true if cleared, false otherwise



136
137
138
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 136

def cleared?
  @cleared
end

#coerce(other) ⇒ Object

Handle coercion for concatenation like "string" + concealed



211
212
213
214
215
216
217
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 211

def coerce(other)
  if other.is_a?(String)
    ['[CONCEALED]', '[CONCEALED]']
  else
    [other, '[CONCEALED]']
  end
end

#concat(_other) ⇒ Object



206
207
208
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 206

def concat(_other)
  '[CONCEALED]'
end

#deconstructObject

Pattern matching safety (Ruby 3.0+)



263
264
265
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 263

def deconstruct
  ['[CONCEALED]']
end

#deconstruct_keysObject



267
268
269
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 267

def deconstruct_keys(*)
  { concealed: true }
end

#downcaseObject



181
182
183
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 181

def downcase
  '[CONCEALED]'
end

#each {|'[CONCEALED]'| ... } ⇒ Object

Yields:

  • ('[CONCEALED]')


238
239
240
241
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 238

def each
  yield '[CONCEALED]' if block_given?
  self
end

#empty?Boolean

Returns:

  • (Boolean)


140
141
142
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 140

def empty?
  @encrypted_data.to_s.empty?
end

#encrypted_valueString?

Access the encrypted data for database storage

This method is used internally by the field type system for persisting the encrypted data to the database.

Returns:

  • (String, nil)

    The encrypted JSON data



159
160
161
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 159

def encrypted_value
  @encrypted_data
end

#gsubObject



224
225
226
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 224

def gsub(*)
  '[CONCEALED]'
end

#hashObject

Consistent hash to prevent timing attacks



258
259
260
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 258

def hash
  ConcealedString.hash
end

#include?(_substring) ⇒ Boolean

Returns:

  • (Boolean)


228
229
230
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 228

def include?(_substring)
  false # Never reveal substring presence
end

#inspectObject

Safe representation for debugging and console output



244
245
246
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 244

def inspect
  '[CONCEALED]'
end

#lengthObject



185
186
187
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 185

def length
  11 # Fixed concealed length to match '[CONCEALED]' length
end

#map {|'[CONCEALED]'| ... } ⇒ Object

Enumerable methods for safety

Yields:

  • ('[CONCEALED]')


233
234
235
236
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 233

def map
  yield '[CONCEALED]' if block_given?
  ['[CONCEALED]']
end

#present?Boolean

Returns:

  • (Boolean)


193
194
195
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 193

def present?
  true # Always return true since encrypted data exists
end

#reveal {|String| ... } ⇒ Object

Primary API: reveal the decrypted plaintext in a controlled block

This is the ONLY way to access plaintext from encrypted fields. The plaintext is decrypted fresh each time using the current record state and AAD context.

Security Warning: Avoid operations inside the block that create uncontrolled copies of the plaintext (dup, interpolation, etc.)

Example: user.api_token.reveal do |token| HTTP.post('/api', headers: { 'X-Token' => token }) end

Yields:

  • (String)

    The decrypted plaintext value

Returns:

  • (Object)

    The return value of the block

Raises:

  • (ArgumentError)


89
90
91
92
93
94
95
96
97
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 89

def reveal
  raise ArgumentError, 'Block required for reveal' unless block_given?
  raise SecurityError, 'Encrypted data already cleared' if cleared?
  raise SecurityError, 'No encrypted data to reveal' if @encrypted_data.nil?

  # Decrypt using current record context and AAD
  plaintext = @field_type.decrypt_value(@record, @encrypted_data)
  yield plaintext
end

#sizeObject



189
190
191
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 189

def size
  length
end

#stripObject

String pattern matching methods



220
221
222
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 220

def strip
  '[CONCEALED]'
end

#to_aObject



253
254
255
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 253

def to_a
  ['[CONCEALED]']
end

#to_hObject

Hash/Array serialization safety



249
250
251
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 249

def to_h
  '[CONCEALED]'
end

#to_jsonObject

Prevent exposure in JSON serialization - fail closed for security



272
273
274
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 272

def to_json(*)
  raise Familia::SerializerError, 'ConcealedString cannot be serialized to JSON'
end

#to_sObject

Prevent accidental exposure through string conversion and serialization

Ruby has two string conversion methods with different purposes:

  • to_s: explicit conversion (obj.to_s, string interpolation "#{obj}")
  • to_str: implicit coercion (File.read(obj), "prefix" + obj)

We implement to_s for safe logging/debugging but deliberately omit to_str to prevent encrypted data from being used where strings are expected.



172
173
174
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 172

def to_s
  '[CONCEALED]'
end

#upcaseObject

String methods that should return safe concealed values



177
178
179
# File 'lib/familia/features/encrypted_fields/concealed_string.rb', line 177

def upcase
  '[CONCEALED]'
end