authentication-zero 2.15.4 → 2.15.7
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/Gemfile.lock +1 -1
- data/lib/authentication_zero/version.rb +1 -1
- data/lib/generators/authentication/templates/mailers/user_mailer.rb.tt +2 -2
- data/lib/generators/authentication/templates/migrations/create_email_verification_tokens_migration.rb.tt +1 -1
- data/lib/generators/authentication/templates/migrations/create_password_reset_tokens_migration.rb.tt +1 -1
- data/lib/generators/authentication/templates/models/user.rb.tt +2 -2
- data/lib/generators/authentication/templates/test_unit/controllers/api/identity/email_verifications_controller_test.rb.tt +2 -2
- data/lib/generators/authentication/templates/test_unit/controllers/api/identity/password_resets_controller_test.rb.tt +2 -2
- data/lib/generators/authentication/templates/test_unit/controllers/html/identity/email_verifications_controller_test.rb.tt +2 -2
- data/lib/generators/authentication/templates/test_unit/controllers/html/identity/password_resets_controller_test.rb.tt +3 -3
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 01c7b52ff1b2e13b2156ce3cbb1be0818ceeec438f81731043a021c108f7857c
|
4
|
+
data.tar.gz: e6737c19691028d086f970f7e0d78d9e9554de1a78270a3a4c4e4e1fb560d9f5
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: ba47e6108df6c2becd72a35c2d5c88a1c7f40e9342c1cf8dbe5555ad103e39602b955f0aba86930943d0450b07cd59bf1a6d2b3c9717405fe784ecb97835c13d
|
7
|
+
data.tar.gz: 429c2c959760ec9b154cd4bc96def21d00db21d7490e01f768608a423b81af66e1a79165220b084a691437f67e404fe14a6f275ded7628bd790096576d293fb2
|
data/Gemfile.lock
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
class UserMailer < ApplicationMailer
|
2
2
|
def password_reset
|
3
3
|
@user = params[:user]
|
4
|
-
@signed_id = @user.
|
4
|
+
@signed_id = @user.password_reset_tokens.create.signed_id(expires_in: 20.minutes)
|
5
5
|
|
6
6
|
mail to: @user.email, subject: "Reset your password"
|
7
7
|
end
|
@@ -11,7 +11,7 @@ class UserMailer < ApplicationMailer
|
|
11
11
|
<%- if code_verifiable? -%>
|
12
12
|
@user.verification_code.value = rand.to_s[2..7]
|
13
13
|
<%- else -%>
|
14
|
-
@signed_id = @user.
|
14
|
+
@signed_id = @user.email_verification_tokens.create.signed_id(expires_in: 2.days)
|
15
15
|
<%- end -%>
|
16
16
|
|
17
17
|
mail to: @user.email, subject: "Verify your email"
|
@@ -1,7 +1,7 @@
|
|
1
1
|
class <%= migration_class_name %> < ActiveRecord::Migration[<%= ActiveRecord::Migration.current_version %>]
|
2
2
|
def change
|
3
3
|
create_table :email_verification_tokens do |t|
|
4
|
-
t.references :user, null: false, foreign_key:
|
4
|
+
t.references :user, null: false, foreign_key: true
|
5
5
|
end
|
6
6
|
end
|
7
7
|
end
|
data/lib/generators/authentication/templates/migrations/create_password_reset_tokens_migration.rb.tt
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
class <%= migration_class_name %> < ActiveRecord::Migration[<%= ActiveRecord::Migration.current_version %>]
|
2
2
|
def change
|
3
3
|
create_table :password_reset_tokens do |t|
|
4
|
-
t.references :user, null: false, foreign_key:
|
4
|
+
t.references :user, null: false, foreign_key: true
|
5
5
|
end
|
6
6
|
end
|
7
7
|
end
|
@@ -1,8 +1,8 @@
|
|
1
1
|
class User < ApplicationRecord
|
2
2
|
has_secure_password
|
3
3
|
|
4
|
-
|
5
|
-
|
4
|
+
has_many :email_verification_tokens, dependent: :destroy
|
5
|
+
has_many :password_reset_tokens, dependent: :destroy
|
6
6
|
|
7
7
|
has_many :sessions, dependent: :destroy
|
8
8
|
<%- if options.trackable? -%>
|
@@ -19,14 +19,14 @@ class Identity::EmailVerificationsControllerTest < ActionDispatch::IntegrationTe
|
|
19
19
|
end
|
20
20
|
|
21
21
|
test "should verify email" do
|
22
|
-
sid = @user.
|
22
|
+
sid = @user.email_verification_tokens.create.signed_id(expires_in: 2.days)
|
23
23
|
|
24
24
|
get edit_identity_email_verification_url, params: { sid: sid }, headers: default_headers
|
25
25
|
assert_response :no_content
|
26
26
|
end
|
27
27
|
|
28
28
|
test "should not verify email with expired token" do
|
29
|
-
sid_exp = @user.
|
29
|
+
sid_exp = @user.email_verification_tokens.create.signed_id(expires_in: 0.minutes)
|
30
30
|
|
31
31
|
get edit_identity_email_verification_url, params: { sid: sid_exp }, headers: default_headers
|
32
32
|
assert_response :bad_request
|
@@ -34,14 +34,14 @@ class Identity::PasswordResetsControllerTest < ActionDispatch::IntegrationTest
|
|
34
34
|
end
|
35
35
|
|
36
36
|
test "should update password" do
|
37
|
-
sid = @user.
|
37
|
+
sid = @user.password_reset_tokens.create.signed_id(expires_in: 20.minutes)
|
38
38
|
|
39
39
|
patch identity_password_reset_url, params: { sid: sid, password: "Secret6*4*2*", password_confirmation: "Secret6*4*2*" }
|
40
40
|
assert_response :success
|
41
41
|
end
|
42
42
|
|
43
43
|
test "should not update password with expired token" do
|
44
|
-
sid_exp = @user.
|
44
|
+
sid_exp = @user.password_reset_tokens.create.signed_id(expires_in: 0.minutes)
|
45
45
|
|
46
46
|
patch identity_password_reset_url, params: { sid: sid_exp, password: "Secret6*4*2*", password_confirmation: "Secret6*4*2*" }
|
47
47
|
assert_response :bad_request
|
@@ -15,14 +15,14 @@ class Identity::EmailVerificationsControllerTest < ActionDispatch::IntegrationTe
|
|
15
15
|
end
|
16
16
|
|
17
17
|
test "should verify email" do
|
18
|
-
sid = @user.
|
18
|
+
sid = @user.email_verification_tokens.create.signed_id(expires_in: 2.days)
|
19
19
|
|
20
20
|
get edit_identity_email_verification_url(sid: sid, email: @user.email)
|
21
21
|
assert_redirected_to root_url
|
22
22
|
end
|
23
23
|
|
24
24
|
test "should not verify email with expired token" do
|
25
|
-
sid_exp = @user.
|
25
|
+
sid_exp = @user.email_verification_tokens.create.signed_id(expires_in: 0.minutes)
|
26
26
|
|
27
27
|
get edit_identity_email_verification_url(sid: sid_exp, email: @user.email)
|
28
28
|
|
@@ -11,7 +11,7 @@ class Identity::PasswordResetsControllerTest < ActionDispatch::IntegrationTest
|
|
11
11
|
end
|
12
12
|
|
13
13
|
test "should get edit" do
|
14
|
-
sid = @user.
|
14
|
+
sid = @user.password_reset_tokens.create.signed_id(expires_in: 20.minutes)
|
15
15
|
|
16
16
|
get edit_identity_password_reset_url(sid: sid)
|
17
17
|
assert_response :success
|
@@ -46,14 +46,14 @@ class Identity::PasswordResetsControllerTest < ActionDispatch::IntegrationTest
|
|
46
46
|
end
|
47
47
|
|
48
48
|
test "should update password" do
|
49
|
-
sid = @user.
|
49
|
+
sid = @user.password_reset_tokens.create.signed_id(expires_in: 20.minutes)
|
50
50
|
|
51
51
|
patch identity_password_reset_url, params: { sid: sid, password: "Secret6*4*2*", password_confirmation: "Secret6*4*2*" }
|
52
52
|
assert_redirected_to sign_in_url
|
53
53
|
end
|
54
54
|
|
55
55
|
test "should not update password with expired token" do
|
56
|
-
sid_exp = @user.
|
56
|
+
sid_exp = @user.password_reset_tokens.create.signed_id(expires_in: 0.minutes)
|
57
57
|
|
58
58
|
patch identity_password_reset_url, params: { sid: @sid_exp, password: "Secret6*4*2*", password_confirmation: "Secret6*4*2*" }
|
59
59
|
assert_redirected_to new_identity_password_reset_url
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: authentication-zero
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 2.15.
|
4
|
+
version: 2.15.7
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Nixon
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-08-
|
11
|
+
date: 2022-08-24 00:00:00.000000000 Z
|
12
12
|
dependencies: []
|
13
13
|
description:
|
14
14
|
email:
|