Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
path: root/vendor
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2023-02-02 00:12:08 +0300
committerGitLab Bot <gitlab-bot@gitlab.com>2023-02-02 00:12:08 +0300
commitd170c7eeef81debb74afa518c256358ccb7e231c (patch)
treedc4adba24cead9505703600189bbba712f442661 /vendor
parent3bfb19d99e3508b2a42c49d09e5a3236d2ce3a29 (diff)
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'vendor')
-rw-r--r--vendor/gems/attr_encrypted/README.md2
-rw-r--r--vendor/gems/attr_encrypted/lib/attr_encrypted.rb58
-rw-r--r--vendor/gems/attr_encrypted/lib/attr_encrypted/adapters/active_record.rb12
-rw-r--r--vendor/gems/attr_encrypted/test/active_record_test.rb10
-rw-r--r--vendor/gems/attr_encrypted/test/attr_encrypted_test.rb30
-rw-r--r--vendor/gems/attr_encrypted/test/legacy_attr_encrypted_test.rb18
6 files changed, 65 insertions, 65 deletions
diff --git a/vendor/gems/attr_encrypted/README.md b/vendor/gems/attr_encrypted/README.md
index 1a332a2edd5..da0631bb18e 100644
--- a/vendor/gems/attr_encrypted/README.md
+++ b/vendor/gems/attr_encrypted/README.md
@@ -425,7 +425,7 @@ It is recommended that you implement a strategy to insure that you do not mix th
attr_encrypted :ssn, key: :encryption_key, v2_gcm_iv: is_decrypting?(:ssn)
def is_decrypting?(attribute)
- encrypted_attributes[attribute][:operation] == :decrypting
+ attr_encrypted_attributes[attribute][:operation] == :decrypting
end
end
diff --git a/vendor/gems/attr_encrypted/lib/attr_encrypted.rb b/vendor/gems/attr_encrypted/lib/attr_encrypted.rb
index 88e5f65e3c8..82a14086ade 100644
--- a/vendor/gems/attr_encrypted/lib/attr_encrypted.rb
+++ b/vendor/gems/attr_encrypted/lib/attr_encrypted.rb
@@ -10,7 +10,7 @@ module AttrEncrypted
base.class_eval do
include InstanceMethods
attr_writer :attr_encrypted_options
- @attr_encrypted_options, @encrypted_attributes = {}, {}
+ @attr_encrypted_options, @attr_encrypted_attributes = {}, {}
end
end
@@ -160,11 +160,11 @@ module AttrEncrypted
end
define_method(attribute) do
- instance_variable_get("@#{attribute}") || instance_variable_set("@#{attribute}", decrypt(attribute, send(encrypted_attribute_name)))
+ instance_variable_get("@#{attribute}") || instance_variable_set("@#{attribute}", attr_decrypt(attribute, send(encrypted_attribute_name)))
end
define_method("#{attribute}=") do |value|
- send("#{encrypted_attribute_name}=", encrypt(attribute, value))
+ send("#{encrypted_attribute_name}=", attr_encrypt(attribute, value))
instance_variable_set("@#{attribute}", value)
end
@@ -173,7 +173,7 @@ module AttrEncrypted
value.respond_to?(:empty?) ? !value.empty? : !!value
end
- encrypted_attributes[attribute.to_sym] = options.merge(attribute: encrypted_attribute_name)
+ attr_encrypted_attributes[attribute.to_sym] = options.merge(attribute: encrypted_attribute_name)
end
end
@@ -223,7 +223,7 @@ module AttrEncrypted
# User.attr_encrypted?(:name) # false
# User.attr_encrypted?(:email) # true
def attr_encrypted?(attribute)
- encrypted_attributes.has_key?(attribute.to_sym)
+ attr_encrypted_attributes.has_key?(attribute.to_sym)
end
# Decrypts a value for the attribute specified
@@ -234,9 +234,9 @@ module AttrEncrypted
# attr_encrypted :email
# end
#
- # email = User.decrypt(:email, 'SOME_ENCRYPTED_EMAIL_STRING')
- def decrypt(attribute, encrypted_value, options = {})
- options = encrypted_attributes[attribute.to_sym].merge(options)
+ # email = User.attr_decrypt(:email, 'SOME_ENCRYPTED_EMAIL_STRING')
+ def attr_decrypt(attribute, encrypted_value, options = {})
+ options = attr_encrypted_attributes[attribute.to_sym].merge(options)
if options[:if] && !options[:unless] && not_empty?(encrypted_value)
encrypted_value = encrypted_value.unpack(options[:encode]).first if options[:encode]
value = options[:encryptor].send(options[:decrypt_method], options.merge!(value: encrypted_value))
@@ -260,9 +260,9 @@ module AttrEncrypted
# attr_encrypted :email
# end
#
- # encrypted_email = User.encrypt(:email, 'test@example.com')
- def encrypt(attribute, value, options = {})
- options = encrypted_attributes[attribute.to_sym].merge(options)
+ # encrypted_email = User.attr_encrypt(:email, 'test@example.com')
+ def attr_encrypt(attribute, value, options = {})
+ options = attr_encrypted_attributes[attribute.to_sym].merge(options)
if options[:if] && !options[:unless] && (options[:allow_empty_value] || not_empty?(value))
value = options[:marshal] ? options[:marshaler].send(options[:dump_method], value) : value.to_s
encrypted_value = options[:encryptor].send(options[:encrypt_method], options.merge!(value: value))
@@ -286,9 +286,9 @@ module AttrEncrypted
# attr_encrypted :email, key: 'my secret key'
# end
#
- # User.encrypted_attributes # { email: { attribute: 'encrypted_email', key: 'my secret key' } }
- def encrypted_attributes
- @encrypted_attributes ||= superclass.encrypted_attributes.dup
+ # User.attr_encrypted_attributes # { email: { attribute: 'encrypted_email', key: 'my secret key' } }
+ def attr_encrypted_attributes
+ @attr_encrypted_attributes ||= superclass.attr_encrypted_attributes.dup
end
# Forwards calls to :encrypt_#{attribute} or :decrypt_#{attribute} to the corresponding encrypt or decrypt method
@@ -303,7 +303,7 @@ module AttrEncrypted
# User.encrypt_email('SOME_ENCRYPTED_EMAIL_STRING')
def method_missing(method, *arguments, &block)
if method.to_s =~ /^((en|de)crypt)_(.+)$/ && attr_encrypted?($3)
- send($1, $3, *arguments)
+ send("attr_#{$1}", $3, *arguments)
else
super
end
@@ -324,11 +324,11 @@ module AttrEncrypted
# end
#
# @user = User.new('some-secret-key')
- # @user.decrypt(:email, 'SOME_ENCRYPTED_EMAIL_STRING')
- def decrypt(attribute, encrypted_value)
- encrypted_attributes[attribute.to_sym][:operation] = :decrypting
- encrypted_attributes[attribute.to_sym][:value_present] = self.class.not_empty?(encrypted_value)
- self.class.decrypt(attribute, encrypted_value, evaluated_attr_encrypted_options_for(attribute))
+ # @user.attr_decrypt(:email, 'SOME_ENCRYPTED_EMAIL_STRING')
+ def attr_decrypt(attribute, encrypted_value)
+ attr_encrypted_attributes[attribute.to_sym][:operation] = :decrypting
+ attr_encrypted_attributes[attribute.to_sym][:value_present] = self.class.not_empty?(encrypted_value)
+ self.class.attr_decrypt(attribute, encrypted_value, evaluated_attr_encrypted_options_for(attribute))
end
# Encrypts a value for the attribute specified using options evaluated in the current object's scope
@@ -345,20 +345,20 @@ module AttrEncrypted
# end
#
# @user = User.new('some-secret-key')
- # @user.encrypt(:email, 'test@example.com')
- def encrypt(attribute, value)
- encrypted_attributes[attribute.to_sym][:operation] = :encrypting
- encrypted_attributes[attribute.to_sym][:value_present] = self.class.not_empty?(value)
- self.class.encrypt(attribute, value, evaluated_attr_encrypted_options_for(attribute))
+ # @user.attr_encrypt(:email, 'test@example.com')
+ def attr_encrypt(attribute, value)
+ attr_encrypted_attributes[attribute.to_sym][:operation] = :encrypting
+ attr_encrypted_attributes[attribute.to_sym][:value_present] = self.class.not_empty?(value)
+ self.class.attr_encrypt(attribute, value, evaluated_attr_encrypted_options_for(attribute))
end
# Copies the class level hash of encrypted attributes with virtual attribute names as keys
# and their corresponding options as values to the instance
#
- def encrypted_attributes
- @encrypted_attributes ||= begin
+ def attr_encrypted_attributes
+ @attr_encrypted_attributes ||= begin
duplicated= {}
- self.class.encrypted_attributes.map { |key, value| duplicated[key] = value.dup }
+ self.class.attr_encrypted_attributes.map { |key, value| duplicated[key] = value.dup }
duplicated
end
end
@@ -368,7 +368,7 @@ module AttrEncrypted
# Returns attr_encrypted options evaluated in the current object's scope for the attribute specified
def evaluated_attr_encrypted_options_for(attribute)
evaluated_options = Hash.new
- attributes = encrypted_attributes[attribute.to_sym]
+ attributes = attr_encrypted_attributes[attribute.to_sym]
attribute_option_value = attributes[:attribute]
[:if, :unless, :value_present, :allow_empty_value].each do |option|
diff --git a/vendor/gems/attr_encrypted/lib/attr_encrypted/adapters/active_record.rb b/vendor/gems/attr_encrypted/lib/attr_encrypted/adapters/active_record.rb
index ec8d0208e92..f3c71611b13 100644
--- a/vendor/gems/attr_encrypted/lib/attr_encrypted/adapters/active_record.rb
+++ b/vendor/gems/attr_encrypted/lib/attr_encrypted/adapters/active_record.rb
@@ -11,7 +11,7 @@ if defined?(ActiveRecord::Base)
alias_method :reload_without_attr_encrypted, :reload
def reload(*args, &block)
result = reload_without_attr_encrypted(*args, &block)
- self.class.encrypted_attributes.keys.each do |attribute_name|
+ self.class.attr_encrypted_attributes.keys.each do |attribute_name|
instance_variable_set("@#{attribute_name}", nil)
end
result
@@ -27,8 +27,8 @@ if defined?(ActiveRecord::Base)
def perform_attribute_assignment(method, new_attributes, *args)
return if new_attributes.blank?
- send method, new_attributes.reject { |k, _| self.class.encrypted_attributes.key?(k.to_sym) }, *args
- send method, new_attributes.reject { |k, _| !self.class.encrypted_attributes.key?(k.to_sym) }, *args
+ send method, new_attributes.reject { |k, _| self.class.attr_encrypted_attributes.key?(k.to_sym) }, *args
+ send method, new_attributes.reject { |k, _| !self.class.attr_encrypted_attributes.key?(k.to_sym) }, *args
end
private :perform_attribute_assignment
@@ -54,7 +54,7 @@ if defined?(ActiveRecord::Base)
options = attrs.extract_options!
attr = attrs.pop
attribute attr if ::ActiveRecord::VERSION::STRING >= "5.1.0"
- options.merge! encrypted_attributes[attr]
+ options.merge! attr_encrypted_attributes[attr]
define_method("#{attr}_was") do
attribute_was(attr)
@@ -125,10 +125,10 @@ if defined?(ActiveRecord::Base)
if match = /^(find|scoped)_(all_by|by)_([_a-zA-Z]\w*)$/.match(method.to_s)
attribute_names = match.captures.last.split('_and_')
attribute_names.each_with_index do |attribute, index|
- if attr_encrypted?(attribute) && encrypted_attributes[attribute.to_sym][:mode] == :single_iv_and_salt
+ if attr_encrypted?(attribute) && attr_encrypted_attributes[attribute.to_sym][:mode] == :single_iv_and_salt
args[index] = send("encrypt_#{attribute}", args[index])
warn "DEPRECATION WARNING: This feature will be removed in the next major release."
- attribute_names[index] = encrypted_attributes[attribute.to_sym][:attribute]
+ attribute_names[index] = attr_encrypted_attributes[attribute.to_sym][:attribute]
end
end
method = "#{match.captures[0]}_#{match.captures[1]}_#{attribute_names.join('_and_')}".to_sym
diff --git a/vendor/gems/attr_encrypted/test/active_record_test.rb b/vendor/gems/attr_encrypted/test/active_record_test.rb
index 4c903bc3cd8..44705989663 100644
--- a/vendor/gems/attr_encrypted/test/active_record_test.rb
+++ b/vendor/gems/attr_encrypted/test/active_record_test.rb
@@ -89,7 +89,7 @@ class Account < ActiveRecord::Base
attr_encrypted :password, key: :password_encryption_key
def encrypting?(attr)
- encrypted_attributes[attr][:operation] == :encrypting
+ attr_encrypted_attributes[attr][:operation] == :encrypting
end
def password_encryption_key
@@ -289,14 +289,14 @@ class ActiveRecordTest < Minitest::Test
@person = PersonWithProcMode.create(email: 'test@example.com', credentials: 'password123')
# Email is :per_attribute_iv_and_salt
- assert_equal @person.class.encrypted_attributes[:email][:mode].class, Proc
- assert_equal @person.class.encrypted_attributes[:email][:mode].call, :per_attribute_iv_and_salt
+ assert_equal @person.class.attr_encrypted_attributes[:email][:mode].class, Proc
+ assert_equal @person.class.attr_encrypted_attributes[:email][:mode].call, :per_attribute_iv_and_salt
refute_nil @person.encrypted_email_salt
refute_nil @person.encrypted_email_iv
# Credentials is :single_iv_and_salt
- assert_equal @person.class.encrypted_attributes[:credentials][:mode].class, Proc
- assert_equal @person.class.encrypted_attributes[:credentials][:mode].call, :single_iv_and_salt
+ assert_equal @person.class.attr_encrypted_attributes[:credentials][:mode].class, Proc
+ assert_equal @person.class.attr_encrypted_attributes[:credentials][:mode].call, :single_iv_and_salt
assert_nil @person.encrypted_credentials_salt
assert_nil @person.encrypted_credentials_iv
end
diff --git a/vendor/gems/attr_encrypted/test/attr_encrypted_test.rb b/vendor/gems/attr_encrypted/test/attr_encrypted_test.rb
index 84cb130aa50..a57bd773b92 100644
--- a/vendor/gems/attr_encrypted/test/attr_encrypted_test.rb
+++ b/vendor/gems/attr_encrypted/test/attr_encrypted_test.rb
@@ -82,12 +82,12 @@ class AttrEncryptedTest < Minitest::Test
@iv = SecureRandom.random_bytes(12)
end
- def test_should_store_email_in_encrypted_attributes
- assert User.encrypted_attributes.include?(:email)
+ def test_should_store_email_in_attr_encrypted_attributes
+ assert User.attr_encrypted_attributes.include?(:email)
end
- def test_should_not_store_salt_in_encrypted_attributes
- refute User.encrypted_attributes.include?(:salt)
+ def test_should_not_store_salt_in_attr_encrypted_attributes
+ refute User.attr_encrypted_attributes.include?(:salt)
end
def test_attr_encrypted_should_return_true_for_email
@@ -95,7 +95,7 @@ class AttrEncryptedTest < Minitest::Test
end
def test_attr_encrypted_should_not_use_the_same_attribute_name_for_two_attributes_in_the_same_line
- refute_equal User.encrypted_attributes[:email][:attribute], User.encrypted_attributes[:without_encoding][:attribute]
+ refute_equal User.attr_encrypted_attributes[:email][:attribute], User.attr_encrypted_attributes[:without_encoding][:attribute]
end
def test_attr_encrypted_should_return_false_for_salt
@@ -154,7 +154,7 @@ class AttrEncryptedTest < Minitest::Test
def test_should_decrypt_email_when_reading
@user = User.new
assert_nil @user.email
- options = @user.encrypted_attributes[:email]
+ options = @user.attr_encrypted_attributes[:email]
iv = @user.send(:generate_iv, options[:algorithm])
encoded_iv = [iv].pack(options[:encode_iv])
salt = SecureRandom.random_bytes
@@ -222,8 +222,8 @@ class AttrEncryptedTest < Minitest::Test
assert_equal encrypted, @user.crypted_password_test
end
- def test_should_inherit_encrypted_attributes
- assert_equal [User.encrypted_attributes.keys, :testing].flatten.collect { |key| key.to_s }.sort, Admin.encrypted_attributes.keys.collect { |key| key.to_s }.sort
+ def test_should_inherit_attr_encrypted_attributes
+ assert_equal [User.attr_encrypted_attributes.keys, :testing].flatten.collect { |key| key.to_s }.sort, Admin.attr_encrypted_attributes.keys.collect { |key| key.to_s }.sort
end
def test_should_inherit_attr_encrypted_options
@@ -233,7 +233,7 @@ class AttrEncryptedTest < Minitest::Test
def test_should_not_inherit_unrelated_attributes
assert SomeOtherClass.attr_encrypted_options.empty?
- assert SomeOtherClass.encrypted_attributes.empty?
+ assert SomeOtherClass.attr_encrypted_attributes.empty?
end
def test_should_evaluate_a_symbol_option
@@ -304,7 +304,7 @@ class AttrEncryptedTest < Minitest::Test
end
def test_should_work_with_aliased_attr_encryptor
- assert User.encrypted_attributes.include?(:aliased)
+ assert User.attr_encrypted_attributes.include?(:aliased)
end
def test_should_always_reset_options
@@ -381,12 +381,12 @@ class AttrEncryptedTest < Minitest::Test
@user2 = User.new
@user2.email = 'test@example.com'
- assert_equal 'test@example.com', @user1.decrypt(:email, @user1.encrypted_email)
+ assert_equal 'test@example.com', @user1.attr_decrypt(:email, @user1.encrypted_email)
end
def test_should_specify_the_default_algorithm
- assert YetAnotherClass.encrypted_attributes[:email][:algorithm]
- assert_equal YetAnotherClass.encrypted_attributes[:email][:algorithm], 'aes-256-gcm'
+ assert YetAnotherClass.attr_encrypted_attributes[:email][:algorithm]
+ assert_equal YetAnotherClass.attr_encrypted_attributes[:email][:algorithm], 'aes-256-gcm'
end
def test_should_not_encode_iv_when_encode_iv_is_false
@@ -475,8 +475,8 @@ class AttrEncryptedTest < Minitest::Test
another_user = User.new
- assert_equal :encrypting, user.encrypted_attributes[:ssn][:operation]
- assert_nil another_user.encrypted_attributes[:ssn][:operation]
+ assert_equal :encrypting, user.attr_encrypted_attributes[:ssn][:operation]
+ assert_nil another_user.attr_encrypted_attributes[:ssn][:operation]
end
def test_should_not_by_default_generate_key_when_attribute_is_empty
diff --git a/vendor/gems/attr_encrypted/test/legacy_attr_encrypted_test.rb b/vendor/gems/attr_encrypted/test/legacy_attr_encrypted_test.rb
index 875086d2351..608a81970bb 100644
--- a/vendor/gems/attr_encrypted/test/legacy_attr_encrypted_test.rb
+++ b/vendor/gems/attr_encrypted/test/legacy_attr_encrypted_test.rb
@@ -57,12 +57,12 @@ end
class LegacyAttrEncryptedTest < Minitest::Test
- def test_should_store_email_in_encrypted_attributes
- assert LegacyUser.encrypted_attributes.include?(:email)
+ def test_should_store_email_in_attr_encrypted_attributes
+ assert LegacyUser.attr_encrypted_attributes.include?(:email)
end
- def test_should_not_store_salt_in_encrypted_attributes
- assert !LegacyUser.encrypted_attributes.include?(:salt)
+ def test_should_not_store_salt_in_attr_encrypted_attributes
+ assert !LegacyUser.attr_encrypted_attributes.include?(:salt)
end
def test_attr_encrypted_should_return_true_for_email
@@ -70,7 +70,7 @@ class LegacyAttrEncryptedTest < Minitest::Test
end
def test_attr_encrypted_should_not_use_the_same_attribute_name_for_two_attributes_in_the_same_line
- refute_equal LegacyUser.encrypted_attributes[:email][:attribute], LegacyUser.encrypted_attributes[:without_encoding][:attribute]
+ refute_equal LegacyUser.attr_encrypted_attributes[:email][:attribute], LegacyUser.attr_encrypted_attributes[:without_encoding][:attribute]
end
def test_attr_encrypted_should_return_false_for_salt
@@ -200,8 +200,8 @@ class LegacyAttrEncryptedTest < Minitest::Test
assert_equal Encryptor.encrypt(:value => 'testing', :key => 'LegacyUser', insecure_mode: true, algorithm: 'aes-256-cbc'), @user.crypted_password_test
end
- def test_should_inherit_encrypted_attributes
- assert_equal [LegacyUser.encrypted_attributes.keys, :testing].flatten.collect { |key| key.to_s }.sort, LegacyAdmin.encrypted_attributes.keys.collect { |key| key.to_s }.sort
+ def test_should_inherit_attr_encrypted_attributes
+ assert_equal [LegacyUser.attr_encrypted_attributes.keys, :testing].flatten.collect { |key| key.to_s }.sort, LegacyAdmin.attr_encrypted_attributes.keys.collect { |key| key.to_s }.sort
end
def test_should_inherit_attr_encrypted_options
@@ -211,7 +211,7 @@ class LegacyAttrEncryptedTest < Minitest::Test
def test_should_not_inherit_unrelated_attributes
assert LegacySomeOtherClass.attr_encrypted_options.empty?
- assert LegacySomeOtherClass.encrypted_attributes.empty?
+ assert LegacySomeOtherClass.attr_encrypted_attributes.empty?
end
def test_should_evaluate_a_symbol_option
@@ -268,7 +268,7 @@ class LegacyAttrEncryptedTest < Minitest::Test
end
def test_should_work_with_aliased_attr_encryptor
- assert LegacyUser.encrypted_attributes.include?(:aliased)
+ assert LegacyUser.attr_encrypted_attributes.include?(:aliased)
end
def test_should_always_reset_options