diff --git a/package.json b/package.json index 65f29dbd..304bb636 100644 --- a/package.json +++ b/package.json @@ -46,6 +46,7 @@ "@vueuse/core": "^10.3.0", "@vueuse/head": "^1.0.0", "@vueuse/router": "^10.0.0", + "ansible-vault": "^1.1.1", "bcryptjs": "^2.4.3", "change-case": "^4.1.2", "colord": "^2.9.3", diff --git a/pnpm-lock.yaml b/pnpm-lock.yaml index a6f7c32f..219c4d0b 100644 --- a/pnpm-lock.yaml +++ b/pnpm-lock.yaml @@ -38,6 +38,9 @@ dependencies: '@vueuse/router': specifier: ^10.0.0 version: 10.0.0(vue-router@4.1.6)(vue@3.3.4) + ansible-vault: + specifier: ^1.1.1 + version: 1.1.1 bcryptjs: specifier: ^2.4.3 version: 2.4.3 @@ -3341,7 +3344,7 @@ packages: dependencies: '@unhead/dom': 0.5.1 '@unhead/schema': 0.5.1 - '@vueuse/shared': 10.7.2(vue@3.3.4) + '@vueuse/shared': 10.9.0(vue@3.3.4) unhead: 0.5.1 vue: 3.3.4 transitivePeerDependencies: @@ -3983,10 +3986,10 @@ packages: - vue dev: false - /@vueuse/shared@10.7.2(vue@3.3.4): - resolution: {integrity: sha512-qFbXoxS44pi2FkgFjPvF4h7c9oMDutpyBdcJdMYIMg9XyXli2meFMuaKn+UMgsClo//Th6+beeCgqweT/79BVA==} + /@vueuse/shared@10.9.0(vue@3.3.4): + resolution: {integrity: sha512-Uud2IWncmAfJvRaFYzv5OHDli+FbOzxiVEQdLCKQKLyhz94PIyFC3CHcH7EDMwIn8NPtD06+PNbC/PiO0LGLtw==} dependencies: - vue-demi: 0.14.6(vue@3.3.4) + vue-demi: 0.14.7(vue@3.3.4) transitivePeerDependencies: - '@vue/composition-api' - vue @@ -4085,6 +4088,12 @@ packages: engines: {node: '>=10'} dev: true + /ansible-vault@1.1.1: + resolution: {integrity: sha512-JoUG/6poezcywvh0Fw5QJcrfwlmc5ZCSdZsYyHJkD6Qrby729jAoJ54mInTWg2pSDG+s2N09cp21A0Svzmo6+g==} + dependencies: + binascii: 0.0.2 + dev: false + /anymatch@3.1.3: resolution: {integrity: sha512-KMReFUr0B4t+D+OBkjR3KYqvocp2XaSzO55UcB6mgQMd3KbcE+mWTyvVV7D/zsdEbNnV6acZUutkiHQXvTr1Rw==} engines: {node: '>= 8'} @@ -4211,6 +4220,10 @@ packages: resolution: {integrity: sha512-jDctJ/IVQbZoJykoeHbhXpOlNBqGNcwXJKJog42E5HDPUwQTSdjCHdihjj0DlnheQ7blbT6dHOafNAiS8ooQKA==} engines: {node: '>=8'} + /binascii@0.0.2: + resolution: {integrity: sha512-rA2CrUl1+6yKrn+XgLs8Hdy18OER1UW146nM+ixzhQXDY+Bd3ySkyIJGwF2a4I45JwbvF1mDL/nWkqBwpOcdBA==} + dev: false + /bl@4.1.0: resolution: {integrity: sha512-1W07cM9gS6DcLperZfFSj+bWLtaPGSOHWhPiGzXmvVJbRLdG82sH/Kn8EtW1VqWVA54AKf2h5k5BbnIbwF3h6w==} dependencies: @@ -9135,8 +9148,8 @@ packages: vue: 3.3.4 dev: false - /vue-demi@0.14.6(vue@3.3.4): - resolution: {integrity: sha512-8QA7wrYSHKaYgUxDA5ZC24w+eHm3sYCbp0EzcDwKqN3p6HqtTCGR/GVsPyZW92unff4UlcSh++lmqDWN3ZIq4w==} + /vue-demi@0.14.7(vue@3.3.4): + resolution: {integrity: sha512-EOG8KXDQNwkJILkx/gPcoL/7vH+hORoBaKgGe+6W7VFMvCYJfmF2dGbvgDroVnI8LU7/kTu8mbjRZGBU1z9NTA==} engines: {node: '>=12'} hasBin: true requiresBuild: true diff --git a/src/tools/ansible-vault-crypt-decrypt/ansible-vault-crypt-decrypt.vue b/src/tools/ansible-vault-crypt-decrypt/ansible-vault-crypt-decrypt.vue new file mode 100644 index 00000000..5f58fc94 --- /dev/null +++ b/src/tools/ansible-vault-crypt-decrypt/ansible-vault-crypt-decrypt.vue @@ -0,0 +1,103 @@ + + + diff --git a/src/tools/ansible-vault-crypt-decrypt/index.ts b/src/tools/ansible-vault-crypt-decrypt/index.ts new file mode 100644 index 00000000..cef9faf2 --- /dev/null +++ b/src/tools/ansible-vault-crypt-decrypt/index.ts @@ -0,0 +1,12 @@ +import { LockSquare } from '@vicons/tabler'; +import { defineTool } from '../tool'; + +export const tool = defineTool({ + name: 'Ansible vault crypt decrypt', + path: '/ansible-vault-crypt-decrypt', + description: 'Encrypt and decrypt Ansible Vault Secrets', + keywords: ['ansible', 'vault', 'crypt', 'decrypt'], + component: () => import('./ansible-vault-crypt-decrypt.vue'), + icon: LockSquare, + createdAt: new Date('2024-02-25'), +}); diff --git a/src/tools/index.ts b/src/tools/index.ts index 2a477ed2..7c630ecc 100644 --- a/src/tools/index.ts +++ b/src/tools/index.ts @@ -2,6 +2,7 @@ import { tool as base64FileConverter } from './base64-file-converter'; import { tool as base64StringConverter } from './base64-string-converter'; import { tool as basicAuthGenerator } from './basic-auth-generator'; import { tool as textToUnicode } from './text-to-unicode'; +import { tool as ansibleVaultCryptDecrypt } from './ansible-vault-crypt-decrypt'; import { tool as pdfSignatureChecker } from './pdf-signature-checker'; import { tool as numeronymGenerator } from './numeronym-generator'; import { tool as macAddressGenerator } from './mac-address-generator'; @@ -81,7 +82,20 @@ import { tool as yamlViewer } from './yaml-viewer'; export const toolsByCategory: ToolCategory[] = [ { name: 'Crypto', - components: [tokenGenerator, hashText, bcrypt, uuidGenerator, ulidGenerator, cypher, bip39, hmacGenerator, rsaKeyPairGenerator, passwordStrengthAnalyser, pdfSignatureChecker], + components: [ + tokenGenerator, + hashText, + bcrypt, + uuidGenerator, + ulidGenerator, + cypher, + bip39, + hmacGenerator, + rsaKeyPairGenerator, + ansibleVaultCryptDecrypt, + passwordStrengthAnalyser, + pdfSignatureChecker, + ], }, { name: 'Converter',