-
-
Notifications
You must be signed in to change notification settings - Fork 76
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
segmentation fault when rekey on empty in memory db #85
Comments
The issue is documented here: m4heshd/better-sqlite3-multiple-ciphers#27 (comment) |
As documented here transient (i.e. in-memory) databases and temporary databases will not be encrypted. Only file-based databases (and journals) can be encrypted, That said, it is simply a misuse to try to encrypt an in-memory database. Nevertheless, I agree that an application should not crash, even in case of misuse of a feature. Currently, the function |
Interesting i must have missed this. btw
maybe this should not give ok but 'not supported' or so? or a debug log to stdout. |
Well, admittedly the fact that in-memory databases and temporary databases will not be encrypted could be documented more prominently. I'll try to update the documentation accordingly.
Therefore I will fix the issue, so that an application will not experience a crash, when using
Well, not really.
I'll look into this whether this is somehow possible, but error handling in SQLite is not trivial. |
Thanks, i appreciate your effort |
Commit e1b82c1 hopefully fixes the issue without causing further problems. Functions |
awesome. Thanks |
- Based on SQLite version 3.39.2 - Fix issue #85 (`PRAGMA rekey` could lead to a crash)
build locally and only rekey it.
i found this and opened it over here:
m4heshd/better-sqlite3-multiple-ciphers#27
The text was updated successfully, but these errors were encountered: