d287315dbf
attr_encrypted (1.3.4 => 3.0.1) Changelog: https://github.com/attr-encrypted/attr_encrypted/blob/master/CHANGELOG.m d attr_encrypted 2.x included a vulnerability, so that major version is skipped. 3.x requires that the algorithm and mode used by each encrypted attribute is specified explicitly. `nil` is no longer a valid value for the encrypted_value_iv field, so it’s changed to a randomly generated string.
32 lines
777 B
Ruby
32 lines
777 B
Ruby
require 'spec_helper'
|
|
|
|
describe Ci::Variable, models: true do
|
|
subject { Ci::Variable.new }
|
|
|
|
let(:secret_value) { 'secret' }
|
|
|
|
before :each do
|
|
subject.value = secret_value
|
|
end
|
|
|
|
describe :value do
|
|
it 'stores the encrypted value' do
|
|
expect(subject.encrypted_value).not_to be_nil
|
|
end
|
|
|
|
it 'stores an iv for value' do
|
|
expect(subject.encrypted_value_iv).not_to be_nil
|
|
end
|
|
|
|
it 'stores a salt for value' do
|
|
expect(subject.encrypted_value_salt).not_to be_nil
|
|
end
|
|
|
|
it 'fails to decrypt if iv is incorrect' do
|
|
subject.encrypted_value_iv = SecureRandom.hex
|
|
subject.instance_variable_set(:@value, nil)
|
|
expect { subject.value }.
|
|
to raise_error(OpenSSL::Cipher::CipherError, 'bad decrypt')
|
|
end
|
|
end
|
|
end
|