summaryrefslogtreecommitdiff
path: root/vendor/gems/attr_encrypted/test/legacy_data_mapper_test.rb
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/gems/attr_encrypted/test/legacy_data_mapper_test.rb')
-rw-r--r--vendor/gems/attr_encrypted/test/legacy_data_mapper_test.rb57
1 files changed, 57 insertions, 0 deletions
diff --git a/vendor/gems/attr_encrypted/test/legacy_data_mapper_test.rb b/vendor/gems/attr_encrypted/test/legacy_data_mapper_test.rb
new file mode 100644
index 00000000000..03916dd9728
--- /dev/null
+++ b/vendor/gems/attr_encrypted/test/legacy_data_mapper_test.rb
@@ -0,0 +1,57 @@
+# frozen_string_literal: true
+
+require_relative 'test_helper'
+
+DataMapper.setup(:default, 'sqlite3::memory:')
+
+class LegacyClient
+ include DataMapper::Resource
+ self.attr_encrypted_options[:insecure_mode] = true
+ self.attr_encrypted_options[:algorithm] = 'aes-256-cbc'
+ self.attr_encrypted_options[:mode] = :single_iv_and_salt
+
+ property :id, Serial
+ property :encrypted_email, String
+ property :encrypted_credentials, Text
+ property :salt, String
+
+ attr_encrypted :email, :key => 'a secret key', mode: :single_iv_and_salt
+ attr_encrypted :credentials, :key => Proc.new { |client| Encryptor.encrypt(:value => client.salt, :key => 'some private key', insecure_mode: true, algorithm: 'aes-256-cbc') }, :marshal => true, mode: :single_iv_and_salt
+
+ def initialize(attrs = {})
+ super attrs
+ self.salt ||= Digest::SHA1.hexdigest((Time.now.to_i * rand(5)).to_s)
+ self.credentials ||= { :username => 'example', :password => 'test' }
+ end
+end
+
+DataMapper.auto_migrate!
+
+class LegacyDataMapperTest < Minitest::Test
+
+ def setup
+ LegacyClient.all.each(&:destroy)
+ end
+
+ def test_should_encrypt_email
+ @client = LegacyClient.new :email => 'test@example.com'
+ assert @client.save
+ refute_nil @client.encrypted_email
+ refute_equal @client.email, @client.encrypted_email
+ assert_equal @client.email, LegacyClient.first.email
+ end
+
+ def test_should_marshal_and_encrypt_credentials
+ @client = LegacyClient.new
+ assert @client.save
+ refute_nil @client.encrypted_credentials
+ refute_equal @client.credentials, @client.encrypted_credentials
+ assert_equal @client.credentials, LegacyClient.first.credentials
+ assert LegacyClient.first.credentials.is_a?(Hash)
+ end
+
+ def test_should_encode_by_default
+ assert LegacyClient.attr_encrypted_options[:encode]
+ end
+
+end