metasploit-model 0.25.2 → 0.25.3

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,15 +1,15 @@
1
1
  ---
2
2
  !binary "U0hBMQ==":
3
3
  metadata.gz: !binary |-
4
- MjBlNmMwY2U2ODY3ZWM1YzhmNzk3MzMxOWQ1M2E4ZmJjN2U0ZDk3MQ==
4
+ ZjgyZDk4OGJjMjMzZTJkOTM5MmQyMjQyOTkxYjU3YTNjZGE5MjE1Zg==
5
5
  data.tar.gz: !binary |-
6
- YWE3YzlmMjBlNDk3YWVmNGFkZTM5YTgyOGQzNTU5ZTA2M2ZkOGE1NQ==
6
+ NmYwNTdiMjQ0ZjE5ZTljMmEwMWNkM2ZhOGU4NTc0YWE3MjE3YzQ4Mg==
7
7
  SHA512:
8
8
  metadata.gz: !binary |-
9
- Y2IyNzMwMWFmOGQ3Y2UzNzhjMTNmYWVkNzU2OGRjOGJkY2Q1M2JjMTliYzU4
10
- MmVhMmIwOGE0ZmU1NWMwMzUzZWM0NDZiZmNkYTIyYzg1NWQ4ZmIzOWI2NDIy
11
- ZDU0MTg2NWVmNDNmMDZkOGQ0M2Q4ZWI1YjM0ODBlNTc5OWVjNDM=
9
+ OWI4NjViMjA1NmE2NDEzNDU4YWIwMTJiOGI4MmQyYzg5MmIyZjI3NjYwMjk5
10
+ OGI3MjY3ODgxNWU2ZmE4Y2Y1OTQ3MDhhNDI3NjZiYTlmNmYyNjFjZmE5NTQw
11
+ M2IzYWUxNjkxZGI2NWM1ZWY3MjlkYzUzNjMwZTI4MGM4YTkyNjA=
12
12
  data.tar.gz: !binary |-
13
- MGMxYTg1MTkwNTkzZDhmNzdlN2NkYWIyMDlhMTdhYzg5ZWJiNTlmMGY2MDlk
14
- NjdiNmU1MGJmMzI4YTExMjU0NzRkZGZkNjRmMjQxYzkxOTFiMDAwYjQyMzEz
15
- NDA0YmI3MjNmNzk1M2RlNDhkZWMyYWE0NmQxMzFlODZjNzE2ZGE=
13
+ NmFkYWM5NmI2YmY3NWJmMzdkNzk5MzY0YjkzOGY3NDk2NTRmOTlmNzI0Mjgw
14
+ OTBkYzE2NjUzMDkyYTQxMjAyMzlkMDE5Y2UzOWNlYTc1MmIxMTY3YWE0ZDQy
15
+ MWM0N2M0YjAwMjNkMzJjZDY2ZmJmZTMyNTZkZDM5MDYxYzkwNGI=
@@ -0,0 +1,37 @@
1
+ # Canonical `Metasploit::Credential::Realm#key`s.
2
+ #
3
+ # `Metasploit::Credential::Realm#key` is restricted to values in {ALL}, so new valid values need to be added to this
4
+ # module:
5
+ #
6
+ # 1. Add a String constant where the constant name is in SCREAMING_SNAKE_CASE and the String in Title Case.
7
+ # 2. Add the new constant to {ALL}.
8
+ module Metasploit::Model::Realm::Key
9
+ #
10
+ # CONSTANTS
11
+ #
12
+
13
+ # An Active Directory domain that is used for authenication in Windows environments.
14
+ #
15
+ # @see https://en.wikipedia.org/wiki/Active_Directory
16
+ ACTIVE_DIRECTORY_DOMAIN = 'Active Directory Domain'
17
+
18
+ # A DB2 database name. Like PostgreSQL, DB2 requires a database to authenticate to.
19
+ DB2_DATABASE = 'DB2 Database'
20
+
21
+ # A System Identifier for an Oracle Database.
22
+ #
23
+ # @see http://docs.oracle.com/cd/E11882_01/server.112/e40540/startup.htm#CNCPT89037
24
+ ORACLE_SYSTEM_IDENTIFIER = 'Oracle System Identifier'
25
+
26
+ # A PostgreSQL database name. Unlike, MySQL, PostgreSQL requires the user to authenticate to a specific
27
+ # database and does not allow authenticating to just a server (which would be an `Mdm::Service`).
28
+ POSTGRESQL_DATABASE = 'PostgreSQL Database'
29
+
30
+ # All values that are valid for {Metasploit::Credential::Realm#key}.
31
+ ALL = [
32
+ ACTIVE_DIRECTORY_DOMAIN,
33
+ DB2_DATABASE,
34
+ ORACLE_SYSTEM_IDENTIFIER,
35
+ POSTGRESQL_DATABASE
36
+ ]
37
+ end
@@ -7,7 +7,7 @@ module Metasploit
7
7
  # The minor version number, scoped to the {MAJOR} version number.
8
8
  MINOR = 25
9
9
  # The patch number, scoped to the {MINOR} version number.
10
- PATCH = 2
10
+ PATCH = 3
11
11
 
12
12
  # The full version string, including the {MAJOR}, {MINOR}, {PATCH}, and optionally, the {PRERELEASE} in the
13
13
  # {http://semver.org/spec/v2.0.0.html semantic versioning v2.0.0} format.
@@ -0,0 +1,42 @@
1
+ require 'spec_helper'
2
+
3
+ describe Metasploit::Model::Realm::Key do
4
+ context 'CONSTANTS' do
5
+ context 'ACTIVE_DIRECTORY_DOMAIN' do
6
+ subject(:active_directory_domain) do
7
+ described_class::ACTIVE_DIRECTORY_DOMAIN
8
+ end
9
+
10
+ it { should == 'Active Directory Domain' }
11
+ it { should be_in described_class::ALL }
12
+ end
13
+
14
+ context 'ALL' do
15
+ subject(:all) do
16
+ described_class::ALL
17
+ end
18
+
19
+ it { should include described_class::ACTIVE_DIRECTORY_DOMAIN }
20
+ it { should include described_class::ORACLE_SYSTEM_IDENTIFIER }
21
+ it { should include described_class::POSTGRESQL_DATABASE }
22
+ end
23
+
24
+ context 'ORACLE_SYSTEM_IDENTIFIER' do
25
+ subject(:oracle_system_identifier) do
26
+ described_class::ORACLE_SYSTEM_IDENTIFIER
27
+ end
28
+
29
+ it { should == 'Oracle System Identifier' }
30
+ it { should be_in described_class::ALL }
31
+ end
32
+
33
+ context 'POSTGRESQL DATABASE' do
34
+ subject(:postgresql_database) do
35
+ described_class::POSTGRESQL_DATABASE
36
+ end
37
+
38
+ it { should == 'PostgreSQL Database' }
39
+ it { should be_in described_class::ALL }
40
+ end
41
+ end
42
+ end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-model
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.25.2
4
+ version: 0.25.3
5
5
  platform: ruby
6
6
  authors:
7
7
  - Luke Imhoff
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2014-07-03 00:00:00.000000000 Z
11
+ date: 2014-07-09 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bundler
@@ -193,6 +193,7 @@ files:
193
193
  - lib/metasploit/model/nilify_blanks.rb
194
194
  - lib/metasploit/model/platform.rb
195
195
  - lib/metasploit/model/real_pathname.rb
196
+ - lib/metasploit/model/realm/key.rb
196
197
  - lib/metasploit/model/reference.rb
197
198
  - lib/metasploit/model/search.rb
198
199
  - lib/metasploit/model/search/association.rb
@@ -395,6 +396,7 @@ files:
395
396
  - spec/lib/metasploit/model/module/type_spec.rb
396
397
  - spec/lib/metasploit/model/nilify_blanks_spec.rb
397
398
  - spec/lib/metasploit/model/platform_spec.rb
399
+ - spec/lib/metasploit/model/realm/key_spec.rb
398
400
  - spec/lib/metasploit/model/reference_spec.rb
399
401
  - spec/lib/metasploit/model/search/association_spec.rb
400
402
  - spec/lib/metasploit/model/search/attribute_spec.rb
@@ -678,6 +680,7 @@ test_files:
678
680
  - spec/lib/metasploit/model/module/type_spec.rb
679
681
  - spec/lib/metasploit/model/nilify_blanks_spec.rb
680
682
  - spec/lib/metasploit/model/platform_spec.rb
683
+ - spec/lib/metasploit/model/realm/key_spec.rb
681
684
  - spec/lib/metasploit/model/reference_spec.rb
682
685
  - spec/lib/metasploit/model/search/association_spec.rb
683
686
  - spec/lib/metasploit/model/search/attribute_spec.rb