encrypted_strings 0.2.1 → 0.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
data/test/cipher_test.rb CHANGED
@@ -2,7 +2,7 @@ require File.dirname(__FILE__) + '/test_helper'
2
2
 
3
3
  class CipherByDefaultTest < Test::Unit::TestCase
4
4
  def setup
5
- @cipher = PluginAWeek::EncryptedStrings::Cipher.new
5
+ @cipher = EncryptedStrings::Cipher.new
6
6
  end
7
7
 
8
8
  def test_should_be_able_to_decrypt_by_default
@@ -2,7 +2,7 @@ require File.dirname(__FILE__) + '/test_helper'
2
2
 
3
3
  class ShaCipherByDefaulTest < Test::Unit::TestCase
4
4
  def setup
5
- @sha_cipher = PluginAWeek::EncryptedStrings::ShaCipher.new
5
+ @sha_cipher = EncryptedStrings::ShaCipher.new
6
6
  end
7
7
 
8
8
  def test_should_use_default_salt
@@ -16,9 +16,9 @@ end
16
16
 
17
17
  class ShaCipherWithCustomDefaultsTest < Test::Unit::TestCase
18
18
  def setup
19
- @original_default_salt = PluginAWeek::EncryptedStrings::ShaCipher.default_salt
20
- PluginAWeek::EncryptedStrings::ShaCipher.default_salt = 'custom_salt'
21
- @sha_cipher = PluginAWeek::EncryptedStrings::ShaCipher.new
19
+ @original_default_salt = EncryptedStrings::ShaCipher.default_salt
20
+ EncryptedStrings::ShaCipher.default_salt = 'custom_salt'
21
+ @sha_cipher = EncryptedStrings::ShaCipher.new
22
22
  end
23
23
 
24
24
  def test_should_use_custom_default_salt
@@ -30,33 +30,33 @@ class ShaCipherWithCustomDefaultsTest < Test::Unit::TestCase
30
30
  end
31
31
 
32
32
  def teardown
33
- PluginAWeek::EncryptedStrings::ShaCipher.default_salt = @original_default_salt
33
+ EncryptedStrings::ShaCipher.default_salt = @original_default_salt
34
34
  end
35
35
  end
36
36
 
37
37
  class ShaCipherWithInvalidOptionsTest < Test::Unit::TestCase
38
38
  def test_should_throw_an_exception
39
- assert_raise(ArgumentError) {PluginAWeek::EncryptedStrings::ShaCipher.new(:invalid => true)}
39
+ assert_raise(ArgumentError) {EncryptedStrings::ShaCipher.new(:invalid => true)}
40
40
  end
41
41
  end
42
42
 
43
43
  class ShaCipherTest < Test::Unit::TestCase
44
44
  def setup
45
- @sha_cipher = PluginAWeek::EncryptedStrings::ShaCipher.new
45
+ @sha_cipher = EncryptedStrings::ShaCipher.new
46
46
  end
47
47
 
48
48
  def test_should_not_be_able_to_decrypt
49
- assert !PluginAWeek::EncryptedStrings::ShaCipher.new.can_decrypt?
49
+ assert !EncryptedStrings::ShaCipher.new.can_decrypt?
50
50
  end
51
51
 
52
52
  def test_should_raise_exception_if_trying_to_decrypt
53
- assert_raises(NotImplementedError) {PluginAWeek::EncryptedStrings::ShaCipher.new.decrypt('test')}
53
+ assert_raises(NotImplementedError) {EncryptedStrings::ShaCipher.new.decrypt('test')}
54
54
  end
55
55
  end
56
56
 
57
57
  class ShaCipherWithCustomOptionsTest < Test::Unit::TestCase
58
58
  def setup
59
- @sha_cipher = PluginAWeek::EncryptedStrings::ShaCipher.new(:salt => 'different salt')
59
+ @sha_cipher = EncryptedStrings::ShaCipher.new(:salt => 'different salt')
60
60
  end
61
61
 
62
62
  def test_should_use_custom_salt
@@ -72,7 +72,7 @@ class ShaCipherWithNonStringSaltTest < Test::Unit::TestCase
72
72
  require 'time'
73
73
 
74
74
  def setup
75
- @sha_cipher = PluginAWeek::EncryptedStrings::ShaCipher.new(:salt => Time.parse('Tue Jan 01 00:00:00 UTC 2008'))
75
+ @sha_cipher = EncryptedStrings::ShaCipher.new(:salt => Time.parse('Tue Jan 01 00:00:00 UTC 2008'))
76
76
  end
77
77
 
78
78
  def test_should_stringify_salt
data/test/string_test.rb CHANGED
@@ -6,7 +6,7 @@ class StringByDefaultTest < Test::Unit::TestCase
6
6
  end
7
7
 
8
8
  def test_should_use_sha
9
- assert_instance_of PluginAWeek::EncryptedStrings::ShaCipher, @encrypted_string.cipher
9
+ assert_instance_of EncryptedStrings::ShaCipher, @encrypted_string.cipher
10
10
  end
11
11
  end
12
12
 
@@ -16,7 +16,7 @@ class StringWithCustomOptionsTest < Test::Unit::TestCase
16
16
  end
17
17
 
18
18
  def test_should_use_sha
19
- assert_instance_of PluginAWeek::EncryptedStrings::ShaCipher, @encrypted_string.cipher
19
+ assert_instance_of EncryptedStrings::ShaCipher, @encrypted_string.cipher
20
20
  end
21
21
 
22
22
  def test_should_use_custom_options
@@ -30,7 +30,7 @@ class StringWithCustomCipher
30
30
  end
31
31
 
32
32
  def test_should_use_custom_cipher
33
- assert_instance_of PluginAWeek::EncryptedStrings::SymmetricCipher, @encrypted_string.cipher
33
+ assert_instance_of EncryptedStrings::SymmetricCipher, @encrypted_string.cipher
34
34
  end
35
35
  end
36
36
 
@@ -73,7 +73,7 @@ class StringAfterBeingEncryptedAndReplacedTest < Test::Unit::TestCase
73
73
  end
74
74
 
75
75
  def test_should_have_a_cipher
76
- assert_instance_of PluginAWeek::EncryptedStrings::ShaCipher, @encrypted_string.cipher
76
+ assert_instance_of EncryptedStrings::ShaCipher, @encrypted_string.cipher
77
77
  end
78
78
 
79
79
  def test_should_be_encrypted
@@ -2,13 +2,13 @@ require File.dirname(__FILE__) + '/test_helper'
2
2
 
3
3
  class NoPasswordErrorTest < Test::Unit::TestCase
4
4
  def test_should_exist
5
- assert_not_nil PluginAWeek::EncryptedStrings::NoPasswordError
5
+ assert_not_nil EncryptedStrings::NoPasswordError
6
6
  end
7
7
  end
8
8
 
9
9
  class SymmetricCipherByDefaultTest < Test::Unit::TestCase
10
10
  def setup
11
- @symmetric_cipher = PluginAWeek::EncryptedStrings::SymmetricCipher.new(:password => 'secret')
11
+ @symmetric_cipher = EncryptedStrings::SymmetricCipher.new(:password => 'secret')
12
12
  end
13
13
 
14
14
  def test_should_use_default_algorithm
@@ -16,7 +16,7 @@ class SymmetricCipherByDefaultTest < Test::Unit::TestCase
16
16
  end
17
17
 
18
18
  def test_should_raise_exception
19
- assert_raise(PluginAWeek::EncryptedStrings::NoPasswordError) {PluginAWeek::EncryptedStrings::SymmetricCipher.new}
19
+ assert_raise(EncryptedStrings::NoPasswordError) {EncryptedStrings::SymmetricCipher.new}
20
20
  end
21
21
 
22
22
  def test_should_encrypt_using_default_configuration
@@ -30,12 +30,12 @@ end
30
30
 
31
31
  class SymmetricCipherWithCustomDefaultsTest < Test::Unit::TestCase
32
32
  def setup
33
- @original_default_algorithm = PluginAWeek::EncryptedStrings::SymmetricCipher.default_algorithm
34
- @original_default_password = PluginAWeek::EncryptedStrings::SymmetricCipher.default_password
33
+ @original_default_algorithm = EncryptedStrings::SymmetricCipher.default_algorithm
34
+ @original_default_password = EncryptedStrings::SymmetricCipher.default_password
35
35
 
36
- PluginAWeek::EncryptedStrings::SymmetricCipher.default_algorithm = 'DES-EDE3-CFB'
37
- PluginAWeek::EncryptedStrings::SymmetricCipher.default_password = 'secret'
38
- @symmetric_cipher = PluginAWeek::EncryptedStrings::SymmetricCipher.new
36
+ EncryptedStrings::SymmetricCipher.default_algorithm = 'DES-EDE3-CFB'
37
+ EncryptedStrings::SymmetricCipher.default_password = 'secret'
38
+ @symmetric_cipher = EncryptedStrings::SymmetricCipher.new
39
39
  end
40
40
 
41
41
  def test_should_use_custom_default_algorithm
@@ -55,20 +55,20 @@ class SymmetricCipherWithCustomDefaultsTest < Test::Unit::TestCase
55
55
  end
56
56
 
57
57
  def teardown
58
- PluginAWeek::EncryptedStrings::SymmetricCipher.default_algorithm = @original_default_algorithm
59
- PluginAWeek::EncryptedStrings::SymmetricCipher.default_password = @original_default_password
58
+ EncryptedStrings::SymmetricCipher.default_algorithm = @original_default_algorithm
59
+ EncryptedStrings::SymmetricCipher.default_password = @original_default_password
60
60
  end
61
61
  end
62
62
 
63
63
  class SymmetricCipherWithInvalidOptionsTest < Test::Unit::TestCase
64
64
  def test_should_throw_an_exception
65
- assert_raise(ArgumentError) {PluginAWeek::EncryptedStrings::SymmetricCipher.new(:invalid => true)}
65
+ assert_raise(ArgumentError) {EncryptedStrings::SymmetricCipher.new(:invalid => true)}
66
66
  end
67
67
  end
68
68
 
69
69
  class SymmetricCipherTest < Test::Unit::TestCase
70
70
  def setup
71
- @symmetric_cipher = PluginAWeek::EncryptedStrings::SymmetricCipher.new(:password => 'secret')
71
+ @symmetric_cipher = EncryptedStrings::SymmetricCipher.new(:password => 'secret')
72
72
  end
73
73
 
74
74
  def test_should_be_able_to_decrypt
@@ -78,7 +78,7 @@ end
78
78
 
79
79
  class SymmetricCipherWithCustomOptionsTest < Test::Unit::TestCase
80
80
  def setup
81
- @symmetric_cipher = PluginAWeek::EncryptedStrings::SymmetricCipher.new(:algorithm => 'DES-EDE3-CFB', :password => 'secret')
81
+ @symmetric_cipher = EncryptedStrings::SymmetricCipher.new(:algorithm => 'DES-EDE3-CFB', :password => 'secret')
82
82
  end
83
83
 
84
84
  def test_should_use_custom_algorithm
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: encrypted_strings
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.2.1
4
+ version: 0.3.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Aaron Pfeifer
@@ -9,7 +9,7 @@ autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
11
 
12
- date: 2008-12-04 00:00:00 -05:00
12
+ date: 2008-12-14 00:00:00 -05:00
13
13
  default_executable:
14
14
  dependencies: []
15
15