authentication-zero 2.15.4 → 2.15.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/Gemfile.lock +1 -1
- data/lib/authentication_zero/version.rb +1 -1
- data/lib/generators/authentication/templates/mailers/user_mailer.rb.tt +2 -2
- data/lib/generators/authentication/templates/migrations/create_email_verification_tokens_migration.rb.tt +1 -1
- data/lib/generators/authentication/templates/migrations/create_password_reset_tokens_migration.rb.tt +1 -1
- data/lib/generators/authentication/templates/models/user.rb.tt +2 -2
- data/lib/generators/authentication/templates/test_unit/controllers/api/identity/email_verifications_controller_test.rb.tt +2 -2
- data/lib/generators/authentication/templates/test_unit/controllers/api/identity/password_resets_controller_test.rb.tt +2 -2
- data/lib/generators/authentication/templates/test_unit/controllers/html/identity/email_verifications_controller_test.rb.tt +2 -2
- data/lib/generators/authentication/templates/test_unit/controllers/html/identity/password_resets_controller_test.rb.tt +3 -3
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 01c7b52ff1b2e13b2156ce3cbb1be0818ceeec438f81731043a021c108f7857c
|
4
|
+
data.tar.gz: e6737c19691028d086f970f7e0d78d9e9554de1a78270a3a4c4e4e1fb560d9f5
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: ba47e6108df6c2becd72a35c2d5c88a1c7f40e9342c1cf8dbe5555ad103e39602b955f0aba86930943d0450b07cd59bf1a6d2b3c9717405fe784ecb97835c13d
|
7
|
+
data.tar.gz: 429c2c959760ec9b154cd4bc96def21d00db21d7490e01f768608a423b81af66e1a79165220b084a691437f67e404fe14a6f275ded7628bd790096576d293fb2
|
data/Gemfile.lock
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
class UserMailer < ApplicationMailer
|
2
2
|
def password_reset
|
3
3
|
@user = params[:user]
|
4
|
-
@signed_id = @user.
|
4
|
+
@signed_id = @user.password_reset_tokens.create.signed_id(expires_in: 20.minutes)
|
5
5
|
|
6
6
|
mail to: @user.email, subject: "Reset your password"
|
7
7
|
end
|
@@ -11,7 +11,7 @@ class UserMailer < ApplicationMailer
|
|
11
11
|
<%- if code_verifiable? -%>
|
12
12
|
@user.verification_code.value = rand.to_s[2..7]
|
13
13
|
<%- else -%>
|
14
|
-
@signed_id = @user.
|
14
|
+
@signed_id = @user.email_verification_tokens.create.signed_id(expires_in: 2.days)
|
15
15
|
<%- end -%>
|
16
16
|
|
17
17
|
mail to: @user.email, subject: "Verify your email"
|
@@ -1,7 +1,7 @@
|
|
1
1
|
class <%= migration_class_name %> < ActiveRecord::Migration[<%= ActiveRecord::Migration.current_version %>]
|
2
2
|
def change
|
3
3
|
create_table :email_verification_tokens do |t|
|
4
|
-
t.references :user, null: false, foreign_key:
|
4
|
+
t.references :user, null: false, foreign_key: true
|
5
5
|
end
|
6
6
|
end
|
7
7
|
end
|
data/lib/generators/authentication/templates/migrations/create_password_reset_tokens_migration.rb.tt
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
class <%= migration_class_name %> < ActiveRecord::Migration[<%= ActiveRecord::Migration.current_version %>]
|
2
2
|
def change
|
3
3
|
create_table :password_reset_tokens do |t|
|
4
|
-
t.references :user, null: false, foreign_key:
|
4
|
+
t.references :user, null: false, foreign_key: true
|
5
5
|
end
|
6
6
|
end
|
7
7
|
end
|
@@ -1,8 +1,8 @@
|
|
1
1
|
class User < ApplicationRecord
|
2
2
|
has_secure_password
|
3
3
|
|
4
|
-
|
5
|
-
|
4
|
+
has_many :email_verification_tokens, dependent: :destroy
|
5
|
+
has_many :password_reset_tokens, dependent: :destroy
|
6
6
|
|
7
7
|
has_many :sessions, dependent: :destroy
|
8
8
|
<%- if options.trackable? -%>
|
@@ -19,14 +19,14 @@ class Identity::EmailVerificationsControllerTest < ActionDispatch::IntegrationTe
|
|
19
19
|
end
|
20
20
|
|
21
21
|
test "should verify email" do
|
22
|
-
sid = @user.
|
22
|
+
sid = @user.email_verification_tokens.create.signed_id(expires_in: 2.days)
|
23
23
|
|
24
24
|
get edit_identity_email_verification_url, params: { sid: sid }, headers: default_headers
|
25
25
|
assert_response :no_content
|
26
26
|
end
|
27
27
|
|
28
28
|
test "should not verify email with expired token" do
|
29
|
-
sid_exp = @user.
|
29
|
+
sid_exp = @user.email_verification_tokens.create.signed_id(expires_in: 0.minutes)
|
30
30
|
|
31
31
|
get edit_identity_email_verification_url, params: { sid: sid_exp }, headers: default_headers
|
32
32
|
assert_response :bad_request
|
@@ -34,14 +34,14 @@ class Identity::PasswordResetsControllerTest < ActionDispatch::IntegrationTest
|
|
34
34
|
end
|
35
35
|
|
36
36
|
test "should update password" do
|
37
|
-
sid = @user.
|
37
|
+
sid = @user.password_reset_tokens.create.signed_id(expires_in: 20.minutes)
|
38
38
|
|
39
39
|
patch identity_password_reset_url, params: { sid: sid, password: "Secret6*4*2*", password_confirmation: "Secret6*4*2*" }
|
40
40
|
assert_response :success
|
41
41
|
end
|
42
42
|
|
43
43
|
test "should not update password with expired token" do
|
44
|
-
sid_exp = @user.
|
44
|
+
sid_exp = @user.password_reset_tokens.create.signed_id(expires_in: 0.minutes)
|
45
45
|
|
46
46
|
patch identity_password_reset_url, params: { sid: sid_exp, password: "Secret6*4*2*", password_confirmation: "Secret6*4*2*" }
|
47
47
|
assert_response :bad_request
|
@@ -15,14 +15,14 @@ class Identity::EmailVerificationsControllerTest < ActionDispatch::IntegrationTe
|
|
15
15
|
end
|
16
16
|
|
17
17
|
test "should verify email" do
|
18
|
-
sid = @user.
|
18
|
+
sid = @user.email_verification_tokens.create.signed_id(expires_in: 2.days)
|
19
19
|
|
20
20
|
get edit_identity_email_verification_url(sid: sid, email: @user.email)
|
21
21
|
assert_redirected_to root_url
|
22
22
|
end
|
23
23
|
|
24
24
|
test "should not verify email with expired token" do
|
25
|
-
sid_exp = @user.
|
25
|
+
sid_exp = @user.email_verification_tokens.create.signed_id(expires_in: 0.minutes)
|
26
26
|
|
27
27
|
get edit_identity_email_verification_url(sid: sid_exp, email: @user.email)
|
28
28
|
|
@@ -11,7 +11,7 @@ class Identity::PasswordResetsControllerTest < ActionDispatch::IntegrationTest
|
|
11
11
|
end
|
12
12
|
|
13
13
|
test "should get edit" do
|
14
|
-
sid = @user.
|
14
|
+
sid = @user.password_reset_tokens.create.signed_id(expires_in: 20.minutes)
|
15
15
|
|
16
16
|
get edit_identity_password_reset_url(sid: sid)
|
17
17
|
assert_response :success
|
@@ -46,14 +46,14 @@ class Identity::PasswordResetsControllerTest < ActionDispatch::IntegrationTest
|
|
46
46
|
end
|
47
47
|
|
48
48
|
test "should update password" do
|
49
|
-
sid = @user.
|
49
|
+
sid = @user.password_reset_tokens.create.signed_id(expires_in: 20.minutes)
|
50
50
|
|
51
51
|
patch identity_password_reset_url, params: { sid: sid, password: "Secret6*4*2*", password_confirmation: "Secret6*4*2*" }
|
52
52
|
assert_redirected_to sign_in_url
|
53
53
|
end
|
54
54
|
|
55
55
|
test "should not update password with expired token" do
|
56
|
-
sid_exp = @user.
|
56
|
+
sid_exp = @user.password_reset_tokens.create.signed_id(expires_in: 0.minutes)
|
57
57
|
|
58
58
|
patch identity_password_reset_url, params: { sid: @sid_exp, password: "Secret6*4*2*", password_confirmation: "Secret6*4*2*" }
|
59
59
|
assert_redirected_to new_identity_password_reset_url
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: authentication-zero
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 2.15.
|
4
|
+
version: 2.15.7
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Nixon
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-08-
|
11
|
+
date: 2022-08-24 00:00:00.000000000 Z
|
12
12
|
dependencies: []
|
13
13
|
description:
|
14
14
|
email:
|