No description
Find a file
Devin Lundberg f6ad788fda
[Snyk] Security upgrade cryptography from 42.0.3 to 42.0.8 (#371)
fix: requirements.txt to reduce vulnerabilities


The following vulnerabilities are fixed by pinning transitive dependencies:
- https://snyk.io/vuln/SNYK-PYTHON-CRYPTOGRAPHY-6913422

Co-authored-by: snyk-bot <snyk-bot@snyk.io>
2024-08-02 15:27:48 -07:00
.github Bump actions/cache from 3 to 4 (#320) 2024-02-23 13:49:05 -08:00
snappass 🚸 Add a link to web view 2024-03-30 20:47:03 +01:00
.dockerignore Install deps from requirements.txt (#303) 2023-12-01 09:35:00 -08:00
.gitignore fix missing bracket 2024-02-21 08:29:19 +01:00
ADOPTERS.md Update ADOPTERS.md (#116) 2019-12-24 07:28:42 -08:00
AUTHORS.rst Bots that prefetch should not destroy the secret (#100) 2019-03-05 07:47:07 -08:00
babel.cfg Add empty translations for de and es 2024-02-16 10:40:13 +01:00
CHANGELOG.rst Prepare the 1.6.0 release (#157) 2022-05-17 10:46:35 -07:00
CODE_OF_CONDUCT.md Prepare the 1.4.1 release 2018-10-31 15:50:49 -07:00
CONTRIBUTING.rst Migrate CI to GitHub Actions (#150) 2022-05-17 10:32:12 -07:00
dev-requirements.txt Bump fakeredis from 2.21.1 to 2.23.4 (#381) 2024-08-02 15:26:59 -07:00
docker-compose.yml Use SIGINT to grecefully shutdown flask 2017-05-24 14:02:23 -04:00
Dockerfile Install deps from requirements.txt (#303) 2023-12-01 09:35:00 -08:00
LICENSE Prepare the 1.6.0 release (#157) 2022-05-17 10:46:35 -07:00
Makefile Adds option for two-week timeout. (#120) 2020-05-08 11:43:54 -07:00
MANIFEST.in Prepare snappass for distribution. 2013-10-05 23:10:50 -07:00
README.rst 🚸 Add a link to web view 2024-03-30 20:47:03 +01:00
requirements.txt [Snyk] Security upgrade cryptography from 42.0.3 to 42.0.8 (#371) 2024-08-02 15:27:48 -07:00
setup.cfg Bump version: 1.6.1 → 1.6.2 (#311) 2024-01-02 17:17:27 -08:00
setup.py Bump version: 1.6.1 → 1.6.2 (#311) 2024-01-02 17:17:27 -08:00
tests.py 🎨 flake8 2024-03-29 23:59:15 +01:00
tox.ini Remove py3.7 (#234) 2023-06-09 12:54:41 -07:00

========
SnapPass
========

|pypi|

.. |pypi| image:: https://img.shields.io/pypi/v/snappass.svg
    :target: https://pypi.python.org/pypi/snappass
    :alt: Latest version released on PyPI

It's like SnapChat... for passwords.

This is a web app that lets you share passwords securely.

Let's say you have a password.  You want to give it to your coworker, Jane.
You could email it to her, but then it's in her email, which might be backed up,
and probably is in some storage device controlled by the NSA.

You could send it to her over chat, but chances are Jane logs all her messages
because she uses Google Hangouts Chat, and Google Hangouts Chat might log everything.

You could write it down, but you can't find a pen, and there's way too many
characters because your security person, Paul, is paranoid.

So we built SnapPass.  It's not that complicated, it does one thing.  If
Jane gets a link to the password and never looks at it, the password goes away.
If the NSA gets a hold of the link, and they look at the password... well they
have the password.  Also, Jane can't get the password, but now Jane knows that
not only is someone looking in her email, they are clicking on links.

Anyway, this took us very little time to write, but we figure we'd save you the
trouble of writing it yourself, because maybe you are busy and have other things
to do.  Enjoy.

Security
--------

Passwords are encrypted using `Fernet`_ symmetric encryption, from the `cryptography`_ library.
A random unique key is generated for each password, and is never stored;
it is rather sent as part of the password link.
This means that even if someone has access to the Redis store, the passwords are still safe.

.. _Fernet: https://cryptography.io/en/latest/fernet/
.. _cryptography: https://cryptography.io/en/latest/

Requirements
------------

* `Redis`_
* Python 3.8+

.. _Redis: https://redis.io/

Installation
------------

::

    $ pip install snappass
    $ snappass
    * Running on http://0.0.0.0:5000/
    * Restarting with reloader

Configuration
-------------

Start by ensuring that Redis is up and running.

Then, you can configure the following via environment variables.

``SECRET_KEY``: unique key that's used to sign key. This should
be kept secret.  See the `Flask Documentation`__ for more information.

.. __: http://flask.pocoo.org/docs/quickstart/#sessions

``DEBUG``: to run Flask web server in debug mode.  See the `Flask Documentation`__ for more information.

.. __: http://flask.pocoo.org/docs/quickstart/#debug-mode

``STATIC_URL``: this should be the location of your static assets.  You might not
need to change this.

``NO_SSL``: if you are not using SSL.

``URL_PREFIX``: useful when running snappass behind a reverse proxy like `nginx`. Example: ``"/some/path/"``, Defaults to ``None``

``REDIS_HOST``: this should be set by Redis, but you can override it if you want. Defaults to ``"localhost"``

``REDIS_PORT``: is the port redis is serving on, defaults to 6379

``SNAPPASS_REDIS_DB``: is the database that you want to use on this redis server. Defaults to db 0

``REDIS_URL``: (optional) will be used instead of ``REDIS_HOST``, ``REDIS_PORT``, and ``SNAPPASS_REDIS_DB`` to configure the Redis client object. For example: redis://username:password@localhost:6379/0

``REDIS_PREFIX``: (optional, defaults to ``"snappass"``) prefix used on redis keys to prevent collisions with other potential clients

``HOST_OVERRIDE``: (optional) Used to override the base URL if the app is unaware. Useful when running behind reverse proxies like an identity-aware SSO. Example: ``sub.domain.com``

APIs
----

SnapPass has 2 APIs :
1. A simple API : That can be used to create passwords links, and then share them with users
2. A more REST-y API : Which facilitate programmatic interactions with SnapPass, without having to parse HTML content when retrieving the password

Simple API
^^^^^^^^^^

The advantage of using the simple API is that you can create a password and retrieve the link without having to open the web interface. This is useful if you want to embed it in a script or use it in a CI/CD pipeline.

To create a password, send a POST request to ``/api/set_password`` like so:

::

    $ curl -X POST -H "Content-Type: application/json"  -d '{"password": "foobar"}' http://localhost:5000/api/set_password/

This will return a JSON response with the password link:

::

    {
        "link": "http://127.0.0.1:5000/snappassbedf19b161794fd288faec3eba15fa41~hHnILpQ50ZfJc3nurDfHCb_22rBr5gGEya68e_cZOrY%3D",
        "ttl":1209600
    }

the default TTL is 2 weeks (1209600 seconds), but you can override it by adding a expiration parameter:

::

    $ curl -X POST -H "Content-Type: application/json"  -d '{"password": "foobar", "ttl": 3600 }' http://localhost:5000/api/set_password/


REST API
^^^^^^^^

The advantage of using the REST API is that you can fully manage the lifecycle of the password stored in SnapPass without having to interact with any web user interface.

This is useful if you want to embed it in a script,  use it in a CI/CD pipeline or share it between multiple client applications.

Create a password
"""""""""""""""""

To create a password, send a POST request to ``/api/v2/passwords`` like so:

::

    $ curl -X POST -H "Content-Type: application/json"  -d '{"password": "foobar"}' http://localhost:5000/api/v2/passwords

This will return a JSON response with a token and the password link:

::

    {
        "token": "snappassbedf19b161794fd288faec3eba15fa41~hHnILpQ50ZfJc3nurDfHCb_22rBr5gGEya68e_cZOrY=",
        "links": [{
            "rel": "self",
            "href": "http://127.0.0.1:5000/api/v2/passwords/snappassbedf19b161794fd288faec3eba15fa41~hHnILpQ50ZfJc3nurDfHCb_22rBr5gGEya68e_cZOrY%3D",
        },{
            "rel": "web-view",
            "href": "http://127.0.0.1:5000/snappassbedf19b161794fd288faec3eba15fa41~hHnILpQ50ZfJc3nurDfHCb_22rBr5gGEya68e_cZOrY%3D",
        }],
        "ttl":1209600
    }

The default TTL is 2 weeks (1209600 seconds), but you can override it by adding a expiration parameter:

::

    $ curl -X POST -H "Content-Type: application/json"  -d '{"password": "foobar", "ttl": 3600 }' http://localhost:5000/api/v2/passwords

If the password is null or empty, and the TTL is larger than the max TTL of the application, the API will return an error like this:


Otherwise, the API will return a 404 (Not Found) response like so:

::

    {
        "invalid-params": [{
            "name": "password",
            "reason": "The password is required and should not be null or empty."
        }, {
            "name": "ttl",
            "reason": "The specified TTL is longer than the maximum supported."
        }],
        "title": "The password and/or the TTL are invalid.",
        "type": "https://127.0.0.1:5000/set-password-validation-error"
    }

Check if a password exists
""""""""""""""""""""""""""

To check if a password exists, send a HEAD request to ``/api/v2/passwords/<token>``, where ``<token>`` is the token of the API response when a password is created (url encoded), or simply use the `self` link:

::

    $ curl --head http://localhost:5000/api/v2/passwords/snappassbedf19b161794fd288faec3eba15fa41~hHnILpQ50ZfJc3nurDfHCb_22rBr5gGEya68e_cZOrY%3D

If :
- the passwork_key is valid 
- the password :
  - exists,
  - has not been read 
  - is not expired

Then the API will return a 200 (OK) response like so:

::

    HTTP/1.1 200 OK
    Server: Werkzeug/3.0.1 Python/3.12.2
    Date: Fri, 29 Mar 2024 22:15:54 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 0
    Connection: close

Otherwise, the API will return a 404 (Not Found) response like so:

::

    HTTP/1.1 404 NOT FOUND
    Server: Werkzeug/3.0.1 Python/3.12.2
    Date: Fri, 29 Mar 2024 22:19:29 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 0
    Connection: close
    

Read a password
"""""""""""""""

To read a password, send a GET request to ``/api/v2/passwords/<password_key>``, where ``<password_key>`` is the token of the API response when a password is created, or simply use the `self` link:

::

    $ curl -X GET http://localhost:5000/api/v2/passwords/snappassbedf19b161794fd288faec3eba15fa41~hHnILpQ50ZfJc3nurDfHCb_22rBr5gGEya68e_cZOrY%3D

If :
- the token is valid 
- the password :
  - exists
  - has not been read 
  - is not expired

Then the API will return a 200 (OK) with a JSON response containing the password :

::

    {
        "password": "foobar"
    }

Otherwise, the API will return a 404 (Not Found) response like so:

::

    {
        "invalid-params": [{
            "name": "token"
        }],
        "title": "The password doesn't exist.",
        "type": "https://127.0.0.1:5000/get-password-error"
    }

Notes on APIs
^^^^^^^^^^^^^

Notes:

- When using the APIs, you can specify any ttl, as long as it is lower than the default.
- The password is passed in the body of the request rather than in the URL. This is to prevent the password from being logged in the server logs.
- Depending on the environment you are running it, you might want to expose the ``/api`` endpoint to your internal network only, and put the web interface behind authentication.


Docker
------

Alternatively, you can use `Docker`_ and `Docker Compose`_ to install and run SnapPass:

.. _Docker: https://www.docker.com/
.. _Docker Compose: https://docs.docker.com/compose/

::

    $ docker-compose up -d

This will pull all dependencies, i.e. Redis and appropriate Python version (3.7), then start up SnapPass and Redis server. SnapPass server is accessible at: http://localhost:5000

Similar Tools
-------------

- `Snappass.NET <https://github.com/generateui/Snappass.NET>`_ is a .NET
  (ASP.NET Core) port of SnapPass.


We're Hiring!
-------------

Are you really excited about open-source and great software engineering?
`Pinterest is hiring <https://careers.pinterest.com>`_!