sentry 0.3 → 0.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/CHANGELOG +4 -0
- data/lib/sentry/asymmetric_sentry.rb +0 -2
- data/test/debug.log +30 -85
- metadata +2 -3
- data/test/sentry_plugin.sqlite.db +0 -0
data/CHANGELOG
CHANGED
@@ -63,8 +63,6 @@ module Sentry
|
|
63
63
|
private_key = options[:key].to_s.empty? ?
|
64
64
|
rsa.to_s :
|
65
65
|
SymmetricSentry.new(:algorithm => options[:symmetric_algorithm]).encrypt_to_base64(rsa.to_s, options[:key])
|
66
|
-
require 'breakpoint'
|
67
|
-
breakpoint
|
68
66
|
File.open(public_key_file, 'w') { |f| f.write(public_key) }
|
69
67
|
File.open(private_key_file, 'w') { |f| f.write(private_key) }
|
70
68
|
end
|
data/test/debug.log
CHANGED
@@ -1,86 +1,31 @@
|
|
1
|
-
# Logfile created on Sat
|
2
|
-
[4;36;1mSQL (0.
|
3
|
-
[4;35;1mSQL (0.
|
4
|
-
[4;36;1mSQL (0.
|
5
|
-
[4;35;1mSQL (0.
|
6
|
-
[4;36;1mSQL (0.
|
7
|
-
[4;35;
|
8
|
-
[4;36;
|
9
|
-
[4;35;
|
10
|
-
[4;36;
|
11
|
-
[4;35;1mSQL (0.
|
12
|
-
[4;36;
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
[4;36;
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
[4;36;1mUser Load (0.
|
21
|
-
[4;35;1mUser Load (0.
|
22
|
-
[4;36;
|
23
|
-
[4;35;1mSQL (0.
|
24
|
-
[4;36;1mSQL (0.
|
25
|
-
[4;35;1mSQL (0.
|
26
|
-
[4;36;
|
27
|
-
[4;35;
|
1
|
+
# Logfile created on Sat Jan 07 09:03:58 CST 2006 by logger.rb/1.5.2.4
|
2
|
+
[4;36;1mSQL (0.000000)[0m [0;1mSQLite::Exceptions::SQLException: no such table: users: DROP TABLE users[0m
|
3
|
+
[4;35;1mSQL (0.005221)[0m [0mCREATE TABLE users ("id" INTEGER PRIMARY KEY NOT NULL, "crypted_password" varchar(255), "crypted_creditcard" varchar(255), "login" varchar(50), "type" varchar(20)) [0m
|
4
|
+
[4;36;1mSQL (0.003576)[0m [0;1mCREATE TABLE schema_info (version integer)[0m
|
5
|
+
[4;35;1mSQL (0.003704)[0m [0mINSERT INTO schema_info (version) VALUES(0)[0m
|
6
|
+
[4;36;1mSQL (0.000756)[0m [0;1mPRAGMA table_info(schema_info)[0m
|
7
|
+
[4;35;1mSQL (0.004727)[0m [0mUPDATE schema_info SET version = 1[0m
|
8
|
+
[4;36;1mUser Load (0.001346)[0m [0;1mSELECT * FROM users WHERE (users.id = 1) LIMIT 1[0m
|
9
|
+
[4;35;1mSQL (0.001764)[0m [0mPRAGMA table_info(users)[0m
|
10
|
+
[4;36;1mUser Load (0.001193)[0m [0;1mSELECT * FROM users WHERE (users.id = 2) LIMIT 1[0m
|
11
|
+
[4;35;1mSQL (0.001241)[0m [0mPRAGMA table_info(users)[0m
|
12
|
+
[4;36;1mSQL (0.000575)[0m [0;1mINSERT INTO users ("crypted_password", "type", "crypted_creditcard", "login") VALUES(NULL, NULL, NULL, 'jones')[0m
|
13
|
+
[4;35;1mUser Update (0.001793)[0m [0mUPDATE users SET "login" = 'jones', "crypted_creditcard" = 'koPtQtUa82ByXY5MOyILWpi9lu7extty7kx+VSCxwx67uGehx3na7XyH5pmN
|
14
|
+
KUkWiAOHvLFULQBJdEdN3zBYkQ==
|
15
|
+
', "crypted_password" = NULL, "type" = NULL WHERE id = 3[0m
|
16
|
+
[4;36;1mSQL (0.000548)[0m [0;1mINSERT INTO users ("crypted_password", "type", "crypted_creditcard", "login") VALUES(NULL, NULL, NULL, 'jones')[0m
|
17
|
+
[4;35;1mUser Update (0.001880)[0m [0mUPDATE users SET "login" = 'jones', "crypted_creditcard" = 'iZFsOBetA9wFupzgdoMi7/XBfT6S2zUJupoCPRHFKcJSRKJWaEpfeFEHPYKn
|
18
|
+
X5n8RbAL9c6YnYUtpjT/9//Ujg==
|
19
|
+
', "crypted_password" = NULL, "type" = NULL WHERE id = 3[0m
|
20
|
+
[4;36;1mUser Load (0.001154)[0m [0;1mSELECT * FROM users WHERE (users.id = 2) LIMIT 1[0m
|
21
|
+
[4;35;1mUser Load (0.003403)[0m [0mSELECT * FROM users WHERE (users.id = 2) LIMIT 1[0m
|
22
|
+
[4;36;1mUser Load (0.002220)[0m [0;1mSELECT * FROM users WHERE (users.id = 1) LIMIT 1[0m
|
23
|
+
[4;35;1mSQL (0.001528)[0m [0mPRAGMA table_info(users)[0m
|
24
|
+
[4;36;1mSQL (0.000545)[0m [0;1mINSERT INTO users ("crypted_password", "type", "crypted_creditcard", "login") VALUES('f438229716cab43569496f3a3630b3727524b81b', 'ShaUser', NULL, 'bob')[0m
|
25
|
+
[4;35;1mSQL (0.002788)[0m [0mPRAGMA table_info(users)[0m
|
26
|
+
[4;36;1mSQL (0.002787)[0m [0;1mINSERT INTO users ("crypted_password", "type", "crypted_creditcard", "login") VALUES('f438229716cab43569496f3a3630b3727524b81b', 'DangerousUser', NULL, 'bob')[0m
|
27
|
+
[4;35;1mUser Load (0.001110)[0m [0mSELECT * FROM users WHERE (users.id = 1) LIMIT 1[0m
|
28
|
+
[4;36;1mSQL (0.000535)[0m [0;1mINSERT INTO users ("crypted_password", "type", "crypted_creditcard", "login") VALUES('0XlmUuNpE2k=
|
28
29
|
', 'SymmetricUser', NULL, 'bob')[0m
|
29
|
-
[4;
|
30
|
-
[4;
|
31
|
-
[4;36;1mSQL (0.119978)[0m [0;1mDROP TABLE users[0m
|
32
|
-
[4;35;1mSQL (0.026073)[0m [0mCREATE TABLE users (id INTEGER PRIMARY KEY NOT NULL, crypted_password varchar(255), crypted_creditcard varchar(255), login varchar(50), type varchar(20)) [0m
|
33
|
-
[4;36;1mSQL (0.000000)[0m [0;1mtable schema_info already exists: CREATE TABLE schema_info (version integer)[0m
|
34
|
-
[4;35;1mSQL (0.000674)[0m [0mPRAGMA table_info(schema_info)[0m
|
35
|
-
[4;36;1mSQL (0.004633)[0m [0;1mUPDATE schema_info SET version = 1[0m
|
36
|
-
[4;35;1mUser Load (0.001196)[0m [0mSELECT * FROM users WHERE (users.id = 1) LIMIT 1[0m
|
37
|
-
[4;36;1mSQL (0.001339)[0m [0;1mPRAGMA table_info(users)[0m
|
38
|
-
[4;35;1mUser Load (0.001147)[0m [0mSELECT * FROM users WHERE (users.id = 2) LIMIT 1[0m
|
39
|
-
[4;36;1mSQL (0.001198)[0m [0;1mPRAGMA table_info(users)[0m
|
40
|
-
[4;35;1mSQL (0.000582)[0m [0mINSERT INTO users ('crypted_password', 'type', 'crypted_creditcard', 'login') VALUES(NULL, NULL, NULL, 'jones')[0m
|
41
|
-
[4;36;1mUser Update (0.001720)[0m [0;1mUPDATE users SET 'login' = 'jones', 'type' = NULL, 'crypted_password' = NULL, 'crypted_creditcard' = 'DLIh4equrhSTs6yK2f+w82K4xt7bROoHbkYXp+eynjF0FD9WRv4Ont5bOSDZ
|
42
|
-
QjyBWLYsekOqbR+EbIkEmNcHeA==
|
43
|
-
' WHERE id = 3[0m
|
44
|
-
[4;35;1mSQL (0.000573)[0m [0mINSERT INTO users ('crypted_password', 'type', 'crypted_creditcard', 'login') VALUES(NULL, NULL, NULL, 'jones')[0m
|
45
|
-
[4;36;1mUser Update (0.001698)[0m [0;1mUPDATE users SET 'login' = 'jones', 'type' = NULL, 'crypted_password' = NULL, 'crypted_creditcard' = 'eQOiEbqm6S9YylKEIY/uKIamJoNWmb0x2Zth+N8LCEoZRh66bQFfyh4H1k5r
|
46
|
-
p5HUIZpNnol1bMhVtqWG31lWjw==
|
47
|
-
' WHERE id = 3[0m
|
48
|
-
[4;35;1mUser Load (0.001134)[0m [0mSELECT * FROM users WHERE (users.id = 2) LIMIT 1[0m
|
49
|
-
[4;36;1mUser Load (0.001122)[0m [0;1mSELECT * FROM users WHERE (users.id = 2) LIMIT 1[0m
|
50
|
-
[4;35;1mUser Load (0.001154)[0m [0mSELECT * FROM users WHERE (users.id = 1) LIMIT 1[0m
|
51
|
-
[4;36;1mSQL (0.001791)[0m [0;1mPRAGMA table_info(users)[0m
|
52
|
-
[4;35;1mSQL (0.000602)[0m [0mINSERT INTO users ('crypted_password', 'type', 'crypted_creditcard', 'login') VALUES('f438229716cab43569496f3a3630b3727524b81b', 'ShaUser', NULL, 'bob')[0m
|
53
|
-
[4;36;1mSQL (0.001591)[0m [0;1mPRAGMA table_info(users)[0m
|
54
|
-
[4;35;1mSQL (0.000550)[0m [0mINSERT INTO users ('crypted_password', 'type', 'crypted_creditcard', 'login') VALUES('f438229716cab43569496f3a3630b3727524b81b', 'DangerousUser', NULL, 'bob')[0m
|
55
|
-
[4;36;1mUser Load (0.003733)[0m [0;1mSELECT * FROM users WHERE (users.id = 1) LIMIT 1[0m
|
56
|
-
[4;35;1mSQL (0.000532)[0m [0mINSERT INTO users ('crypted_password', 'type', 'crypted_creditcard', 'login') VALUES('0XlmUuNpE2k=
|
57
|
-
', 'SymmetricUser', NULL, 'bob')[0m
|
58
|
-
[4;36;1mUser Load (0.001268)[0m [0;1mSELECT * FROM users WHERE (users.id = 1) LIMIT 1[0m
|
59
|
-
[4;35;1mUser Load (0.001492)[0m [0mSELECT * FROM users WHERE (users.id = 1) LIMIT 1[0m
|
60
|
-
[4;36;1mSQL (0.208598)[0m [0;1mDROP TABLE users[0m
|
61
|
-
[4;35;1mSQL (0.003186)[0m [0mCREATE TABLE users (id INTEGER PRIMARY KEY NOT NULL, crypted_password varchar(255), crypted_creditcard varchar(255), login varchar(50), type varchar(20)) [0m
|
62
|
-
[4;36;1mSQL (0.000000)[0m [0;1mtable schema_info already exists: CREATE TABLE schema_info (version integer)[0m
|
63
|
-
[4;35;1mSQL (0.000686)[0m [0mPRAGMA table_info(schema_info)[0m
|
64
|
-
[4;36;1mSQL (0.003169)[0m [0;1mUPDATE schema_info SET version = 1[0m
|
65
|
-
[4;35;1mSQL (0.001369)[0m [0mPRAGMA table_info(users)[0m
|
66
|
-
[4;36;1mSQL (0.000543)[0m [0;1mINSERT INTO users ('crypted_password', 'type', 'crypted_creditcard', 'login') VALUES('f438229716cab43569496f3a3630b3727524b81b', 'ShaUser', NULL, 'bob')[0m
|
67
|
-
[4;35;1mSQL (0.001211)[0m [0mPRAGMA table_info(users)[0m
|
68
|
-
[4;36;1mSQL (0.000614)[0m [0;1mINSERT INTO users ('crypted_password', 'type', 'crypted_creditcard', 'login') VALUES('f438229716cab43569496f3a3630b3727524b81b', 'DangerousUser', NULL, 'bob')[0m
|
69
|
-
[4;36;1mSQL (0.208579)[0m [0;1mDROP TABLE users[0m
|
70
|
-
[4;35;1mSQL (0.003693)[0m [0mCREATE TABLE users (id INTEGER PRIMARY KEY NOT NULL, crypted_password varchar(255), crypted_creditcard varchar(255), login varchar(50), type varchar(20)) [0m
|
71
|
-
[4;36;1mSQL (0.000000)[0m [0;1mtable schema_info already exists: CREATE TABLE schema_info (version integer)[0m
|
72
|
-
[4;35;1mSQL (0.000644)[0m [0mPRAGMA table_info(schema_info)[0m
|
73
|
-
[4;36;1mSQL (0.003024)[0m [0;1mUPDATE schema_info SET version = 1[0m
|
74
|
-
[4;35;1mSQL (0.002309)[0m [0mPRAGMA table_info(users)[0m
|
75
|
-
[4;36;1mSQL (0.000523)[0m [0;1mINSERT INTO users ('crypted_password', 'type', 'crypted_creditcard', 'login') VALUES('f438229716cab43569496f3a3630b3727524b81b', 'ShaUser', NULL, 'bob')[0m
|
76
|
-
[4;35;1mSQL (0.001247)[0m [0mPRAGMA table_info(users)[0m
|
77
|
-
[4;36;1mSQL (0.000551)[0m [0;1mINSERT INTO users ('crypted_password', 'type', 'crypted_creditcard', 'login') VALUES('f438229716cab43569496f3a3630b3727524b81b', 'DangerousUser', NULL, 'bob')[0m
|
78
|
-
[4;36;1mSQL (0.004938)[0m [0;1mDROP TABLE users[0m
|
79
|
-
[4;35;1mSQL (0.003801)[0m [0mCREATE TABLE users (id INTEGER PRIMARY KEY NOT NULL, crypted_password varchar(255), crypted_creditcard varchar(255), login varchar(50), type varchar(20)) [0m
|
80
|
-
[4;36;1mSQL (0.000000)[0m [0;1mtable schema_info already exists: CREATE TABLE schema_info (version integer)[0m
|
81
|
-
[4;35;1mSQL (0.000648)[0m [0mPRAGMA table_info(schema_info)[0m
|
82
|
-
[4;36;1mSQL (0.003591)[0m [0;1mUPDATE schema_info SET version = 1[0m
|
83
|
-
[4;35;1mSQL (0.001882)[0m [0mPRAGMA table_info(users)[0m
|
84
|
-
[4;36;1mSQL (0.000592)[0m [0;1mINSERT INTO users ('crypted_password', 'type', 'crypted_creditcard', 'login') VALUES('f438229716cab43569496f3a3630b3727524b81b', 'ShaUser', NULL, 'bob')[0m
|
85
|
-
[4;35;1mSQL (0.001319)[0m [0mPRAGMA table_info(users)[0m
|
86
|
-
[4;36;1mSQL (0.000643)[0m [0;1mINSERT INTO users ('crypted_password', 'type', 'crypted_creditcard', 'login') VALUES('f438229716cab43569496f3a3630b3727524b81b', 'DangerousUser', NULL, 'bob')[0m
|
30
|
+
[4;35;1mUser Load (0.001276)[0m [0mSELECT * FROM users WHERE (users.id = 1) LIMIT 1[0m
|
31
|
+
[4;36;1mUser Load (0.001209)[0m [0;1mSELECT * FROM users WHERE (users.id = 1) LIMIT 1[0m
|
metadata
CHANGED
@@ -3,8 +3,8 @@ rubygems_version: 0.8.10
|
|
3
3
|
specification_version: 1
|
4
4
|
name: sentry
|
5
5
|
version: !ruby/object:Gem::Version
|
6
|
-
version:
|
7
|
-
date:
|
6
|
+
version: 0.3.1
|
7
|
+
date: 2006-01-07
|
8
8
|
summary: Sentry provides painless encryption services with a wrapper around some OpenSSL classes
|
9
9
|
require_paths:
|
10
10
|
- lib
|
@@ -44,7 +44,6 @@ files:
|
|
44
44
|
- test/fixtures
|
45
45
|
- test/keys
|
46
46
|
- test/schema.rb
|
47
|
-
- test/sentry_plugin.sqlite.db
|
48
47
|
- test/sha_sentry_test.rb
|
49
48
|
- test/symmetric_sentry_callback_test.rb
|
50
49
|
- test/symmetric_sentry_test.rb
|
Binary file
|