authentication-zero 2.2.9 → 2.2.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. checksums.yaml +4 -4
  2. data/Gemfile.lock +1 -1
  3. data/lib/authentication_zero/version.rb +1 -1
  4. data/lib/generators/authentication/templates/controllers/api/emails_controller.rb.tt +3 -8
  5. data/lib/generators/authentication/templates/controllers/api/passwords_controller.rb.tt +3 -8
  6. data/lib/generators/authentication/templates/controllers/html/emails_controller.rb.tt +3 -8
  7. data/lib/generators/authentication/templates/controllers/html/passwords_controller.rb.tt +3 -8
  8. data/lib/generators/authentication/templates/erb/password_resets/edit.html.erb.tt +1 -1
  9. data/lib/generators/authentication/templates/erb/passwords/edit.html.erb.tt +1 -1
  10. data/lib/generators/authentication/templates/erb/registrations/new.html.erb.tt +1 -1
  11. data/lib/generators/authentication/templates/models/model.rb.tt +1 -1
  12. data/lib/generators/authentication/templates/test_unit/controllers/api/email_verifications_controller_test.rb.tt +1 -1
  13. data/lib/generators/authentication/templates/test_unit/controllers/api/emails_controller_test.rb.tt +2 -2
  14. data/lib/generators/authentication/templates/test_unit/controllers/api/password_resets_controller_test.rb.tt +2 -2
  15. data/lib/generators/authentication/templates/test_unit/controllers/api/passwords_controller_test.rb.tt +3 -3
  16. data/lib/generators/authentication/templates/test_unit/controllers/api/registrations_controller_test.rb.tt +2 -2
  17. data/lib/generators/authentication/templates/test_unit/controllers/api/sessions_controller_test.rb.tt +2 -2
  18. data/lib/generators/authentication/templates/test_unit/controllers/html/email_verifications_controller_test.rb.tt +1 -1
  19. data/lib/generators/authentication/templates/test_unit/controllers/html/emails_controller_test.rb.tt +2 -2
  20. data/lib/generators/authentication/templates/test_unit/controllers/html/password_resets_controller_test.rb.tt +2 -2
  21. data/lib/generators/authentication/templates/test_unit/controllers/html/passwords_controller_test.rb.tt +3 -3
  22. data/lib/generators/authentication/templates/test_unit/controllers/html/registrations_controller_test.rb.tt +2 -2
  23. data/lib/generators/authentication/templates/test_unit/controllers/html/sessions_controller_test.rb.tt +2 -2
  24. data/lib/generators/authentication/templates/test_unit/fixtures.yml.tt +1 -1
  25. data/lib/generators/authentication/templates/test_unit/system/emails_test.rb.tt +2 -2
  26. data/lib/generators/authentication/templates/test_unit/system/password_resets_test.rb.tt +2 -2
  27. data/lib/generators/authentication/templates/test_unit/system/passwords_test.rb.tt +4 -4
  28. data/lib/generators/authentication/templates/test_unit/system/registrations_test.rb.tt +3 -3
  29. data/lib/generators/authentication/templates/test_unit/system/sessions_test.rb.tt +2 -2
  30. metadata +1 -1
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e025028c28dd89faa490a953449c4b9176a4ac3ca0060612d87bb3f1cfc1863d
4
- data.tar.gz: fa5d9c5ebad6a4362d107b6ceaaa82b384ab15570c4124c69ea14db20eb4de4d
3
+ metadata.gz: d86415b86a2afceb0fd9f224ca9edd8f6ee32824d0e3c4bd8bb4ed6b7ac01b29
4
+ data.tar.gz: 7f16a4f0cd62f7a6ebc201172c8e8f7443af20ebf7f43e2aa2cac76eb26edfd5
5
5
  SHA512:
6
- metadata.gz: 439ce53002ab43e268dfa3be24d9a91f5d94dd033865f4801eb2aa0c32e5f51d05e6a1e11be3655fc31285422302b7a993ac543553734d8b23b6d24d5acceec3
7
- data.tar.gz: 41d4aad8d43718e4d9e458cdaa15560b7b45d61e68e2fc734444b2eaa43e632336dad558e731cd882787b03d0156a188de1cd25c6df5f38b73383e930c6fcb6c
6
+ metadata.gz: f17fc115b066489463a3f7ee458f1028a731619508db8b559d58b743686b4e217ba00540e7343e59636519da27409abec73801f33d94282866c156bef14aeaf7
7
+ data.tar.gz: 346c434a4270e1733363d2d0bab34863d7a000646b1ef8f79c42301b9a11fe191b5c548fcefb9f00f5e967ddedf1fa505febd343ff2608348505c97b1e40f01d
data/Gemfile.lock CHANGED
@@ -1,7 +1,7 @@
1
1
  PATH
2
2
  remote: .
3
3
  specs:
4
- authentication-zero (2.2.9)
4
+ authentication-zero (2.2.10)
5
5
 
6
6
  GEM
7
7
  remote: https://rubygems.org/
@@ -1,3 +1,3 @@
1
1
  module AuthenticationZero
2
- VERSION = "2.2.9"
2
+ VERSION = "2.2.10"
3
3
  end
@@ -1,9 +1,10 @@
1
1
  class EmailsController < ApplicationController
2
2
  before_action :set_<%= singular_table_name %>
3
- before_action :validate_current_password
4
3
 
5
4
  def update
6
- if @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
5
+ if !@<%= singular_table_name %>.authenticate(params[:current_password])
6
+ render json: { error: "The current password you entered is incorrect" }, status: :bad_request
7
+ elsif @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
7
8
  render json: @<%= singular_table_name %>
8
9
  else
9
10
  render json: @<%= singular_table_name %>.errors, status: :unprocessable_entity
@@ -18,10 +19,4 @@ class EmailsController < ApplicationController
18
19
  def <%= "#{singular_table_name}_params" %>
19
20
  params.permit(:email)
20
21
  end
21
-
22
- def validate_current_password
23
- unless @<%= singular_table_name %>.authenticate(params[:current_password])
24
- render json: { error: "The current password you entered is incorrect" }, status: :bad_request
25
- end
26
- end
27
22
  end
@@ -1,9 +1,10 @@
1
1
  class PasswordsController < ApplicationController
2
2
  before_action :set_<%= singular_table_name %>
3
- before_action :validate_current_password
4
3
 
5
4
  def update
6
- if @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
5
+ if !@<%= singular_table_name %>.authenticate(params[:current_password])
6
+ render json: { error: "The current password you entered is incorrect" }, status: :bad_request
7
+ elsif @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
7
8
  render json: @<%= singular_table_name %>
8
9
  else
9
10
  render json: @<%= singular_table_name %>.errors, status: :unprocessable_entity
@@ -18,10 +19,4 @@ class PasswordsController < ApplicationController
18
19
  def <%= "#{singular_table_name}_params" %>
19
20
  params.permit(:password, :password_confirmation)
20
21
  end
21
-
22
- def validate_current_password
23
- unless @<%= singular_table_name %>.authenticate(params[:current_password])
24
- render json: { error: "The current password you entered is incorrect" }, status: :bad_request
25
- end
26
- end
27
22
  end
@@ -1,12 +1,13 @@
1
1
  class EmailsController < ApplicationController
2
2
  before_action :set_<%= singular_table_name %>
3
- before_action :validate_current_password, only: :update
4
3
 
5
4
  def edit
6
5
  end
7
6
 
8
7
  def update
9
- if @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
8
+ if !@<%= singular_table_name %>.authenticate(params[:current_password])
9
+ redirect_to edit_email_path, alert: "The current password you entered is incorrect"
10
+ elsif @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
10
11
  redirect_to root_path, notice: "Your email has been changed"
11
12
  else
12
13
  render :edit, status: :unprocessable_entity
@@ -21,10 +22,4 @@ class EmailsController < ApplicationController
21
22
  def <%= "#{singular_table_name}_params" %>
22
23
  params.require(:<%= singular_table_name %>).permit(:email)
23
24
  end
24
-
25
- def validate_current_password
26
- unless @<%= singular_table_name %>.authenticate(params[:current_password])
27
- redirect_to edit_email_path, alert: "The current password you entered is incorrect"
28
- end
29
- end
30
25
  end
@@ -1,12 +1,13 @@
1
1
  class PasswordsController < ApplicationController
2
2
  before_action :set_<%= singular_table_name %>
3
- before_action :validate_current_password, only: :update
4
3
 
5
4
  def edit
6
5
  end
7
6
 
8
7
  def update
9
- if @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
8
+ if !@<%= singular_table_name %>.authenticate(params[:current_password])
9
+ redirect_to edit_password_path, alert: "The current password you entered is incorrect"
10
+ elsif @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
10
11
  redirect_to root_path, notice: "Your password has been changed"
11
12
  else
12
13
  render :edit, status: :unprocessable_entity
@@ -21,10 +22,4 @@ class PasswordsController < ApplicationController
21
22
  def <%= "#{singular_table_name}_params" %>
22
23
  params.require(:<%= singular_table_name %>).permit(:password, :password_confirmation)
23
24
  end
24
-
25
- def validate_current_password
26
- unless @<%= singular_table_name %>.authenticate(params[:current_password])
27
- redirect_to edit_password_path, alert: "The current password you entered is incorrect"
28
- end
29
- end
30
25
  end
@@ -18,7 +18,7 @@
18
18
  <div>
19
19
  <%%= form.label :password, "New password", style: "display: block" %>
20
20
  <%%= form.password_field :password, autofocus: true, autocomplete: "new-password" %>
21
- <div>8 characters minimum.</div>
21
+ <div>12 characters minimum.</div>
22
22
  </div>
23
23
 
24
24
  <div>
@@ -23,7 +23,7 @@
23
23
  <div>
24
24
  <%%= form.label :password, "New password", style: "display: block" %>
25
25
  <%%= form.password_field :password, autocomplete: "new-password" %>
26
- <div>8 characters minimum.</div>
26
+ <div>12 characters minimum.</div>
27
27
  </div>
28
28
 
29
29
  <div>
@@ -21,7 +21,7 @@
21
21
  <div>
22
22
  <%%= form.label :password, style: "display: block" %>
23
23
  <%%= form.password_field :password, autocomplete: "new-password" %>
24
- <div>8 characters minimum.</div>
24
+ <div>12 characters minimum.</div>
25
25
  </div>
26
26
 
27
27
  <div>
@@ -6,7 +6,7 @@ class <%= class_name %> < ApplicationRecord
6
6
  validates :email, presence: true, uniqueness: true
7
7
  validates_format_of :email, with: /\A[^@\s]+@[^@\s]+\z/
8
8
 
9
- validates_length_of :password, minimum: 8, allow_blank: true
9
+ validates_length_of :password, minimum: 12, allow_blank: true
10
10
  validates_format_of :password, with: /(?=.*[a-z])(?=.*[A-Z])(?=.*[0-9])/, allow_blank: true, message: "might easily be guessed"
11
11
 
12
12
  before_validation do
@@ -39,6 +39,6 @@ class EmailVerificationsControllerTest < ActionDispatch::IntegrationTest
39
39
  end
40
40
 
41
41
  def sign_in_as(<%= singular_table_name %>)
42
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
42
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
43
43
  end
44
44
  end
@@ -6,7 +6,7 @@ class EmailsControllerTest < ActionDispatch::IntegrationTest
6
6
  end
7
7
 
8
8
  test "should update email" do
9
- patch email_url, params: { current_password: "Secret123", email: "new_email@hey.com" }, headers: { "Authorization" => "Bearer #{@token}" }
9
+ patch email_url, params: { current_password: "Secret123456", email: "new_email@hey.com" }, headers: { "Authorization" => "Bearer #{@token}" }
10
10
  assert_response :success
11
11
  end
12
12
 
@@ -18,6 +18,6 @@ class EmailsControllerTest < ActionDispatch::IntegrationTest
18
18
  end
19
19
 
20
20
  def sign_in_as(<%= singular_table_name %>)
21
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
21
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
22
22
  end
23
23
  end
@@ -36,12 +36,12 @@ class PasswordResetsControllerTest < ActionDispatch::IntegrationTest
36
36
  end
37
37
 
38
38
  test "should update password" do
39
- patch password_reset_url, params: { token: @sid, password: "Secret321", password_confirmation: "Secret321" }
39
+ patch password_reset_url, params: { token: @sid, password: "Secret654321", password_confirmation: "Secret654321" }
40
40
  assert_response :success
41
41
  end
42
42
 
43
43
  test "should not update password with expired token" do
44
- patch password_reset_url, params: { token: @sid_exp, password: "Secret321", password_confirmation: "Secret321" }
44
+ patch password_reset_url, params: { token: @sid_exp, password: "Secret654321", password_confirmation: "Secret654321" }
45
45
 
46
46
  assert_response :bad_request
47
47
  assert_equal "That password reset link is invalid", response.parsed_body["error"]
@@ -6,18 +6,18 @@ class PasswordsControllerTest < ActionDispatch::IntegrationTest
6
6
  end
7
7
 
8
8
  test "should update password" do
9
- patch password_url, params: { current_password: "Secret123", password: "Secret321", password_confirmation: "Secret321" }, headers: { "Authorization" => "Bearer #{@token}" }
9
+ patch password_url, params: { current_password: "Secret123456", password: "Secret654321", password_confirmation: "Secret654321" }, headers: { "Authorization" => "Bearer #{@token}" }
10
10
  assert_response :success
11
11
  end
12
12
 
13
13
  test "should not update password with wrong current password" do
14
- patch password_url, params: { current_password: "wrong_password", password: "Secret321", password_confirmation: "Secret321" }, headers: { "Authorization" => "Bearer #{@token}" }
14
+ patch password_url, params: { current_password: "wrong_password", password: "Secret654321", password_confirmation: "Secret654321" }, headers: { "Authorization" => "Bearer #{@token}" }
15
15
 
16
16
  assert_response :bad_request
17
17
  assert_equal "The current password you entered is incorrect", response.parsed_body["error"]
18
18
  end
19
19
 
20
20
  def sign_in_as(<%= singular_table_name %>)
21
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
21
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
22
22
  end
23
23
  end
@@ -3,7 +3,7 @@ require "test_helper"
3
3
  class RegistrationsControllerTest < ActionDispatch::IntegrationTest
4
4
  test "should sign up" do
5
5
  assert_difference("<%= class_name %>.count") do
6
- post sign_up_url, params: { email: "lazaronixon@hey.com", password: "Secret123", password_confirmation: "Secret123" }
6
+ post sign_up_url, params: { email: "lazaronixon@hey.com", password: "Secret123456", password_confirmation: "Secret123456" }
7
7
  end
8
8
 
9
9
  assert_response :created
@@ -20,6 +20,6 @@ class RegistrationsControllerTest < ActionDispatch::IntegrationTest
20
20
  end
21
21
 
22
22
  def sign_in_as(<%= singular_table_name %>)
23
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
23
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
24
24
  end
25
25
  end
@@ -16,7 +16,7 @@ class SessionsControllerTest < ActionDispatch::IntegrationTest
16
16
  end
17
17
 
18
18
  test "should sign in" do
19
- post sign_in_url, params: { email: @<%= singular_table_name %>.email, password: "Secret123" }
19
+ post sign_in_url, params: { email: @<%= singular_table_name %>.email, password: "Secret123456" }
20
20
 
21
21
  assert_enqueued_email_with SessionMailer, :signed_in_notification, args: { session: @<%= singular_table_name %>.sessions.last }
22
22
  assert_response :created
@@ -33,6 +33,6 @@ class SessionsControllerTest < ActionDispatch::IntegrationTest
33
33
  end
34
34
 
35
35
  def sign_in_as(<%= singular_table_name %>)
36
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
36
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
37
37
  end
38
38
  end
@@ -39,6 +39,6 @@ class EmailVerificationsControllerTest < ActionDispatch::IntegrationTest
39
39
  end
40
40
 
41
41
  def sign_in_as(<%= singular_table_name %>)
42
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); <%= singular_table_name %>
42
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); <%= singular_table_name %>
43
43
  end
44
44
  end
@@ -11,7 +11,7 @@ class EmailsControllerTest < ActionDispatch::IntegrationTest
11
11
  end
12
12
 
13
13
  test "should update email" do
14
- patch email_url, params: { current_password: "Secret123", <%= singular_table_name %>: { email: "new_email@hey.com" } }
14
+ patch email_url, params: { current_password: "Secret123456", <%= singular_table_name %>: { email: "new_email@hey.com" } }
15
15
  assert_redirected_to root_path
16
16
  end
17
17
 
@@ -23,6 +23,6 @@ class EmailsControllerTest < ActionDispatch::IntegrationTest
23
23
  end
24
24
 
25
25
  def sign_in_as(<%= singular_table_name %>)
26
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); <%= singular_table_name %>
26
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); <%= singular_table_name %>
27
27
  end
28
28
  end
@@ -46,12 +46,12 @@ class PasswordResetsControllerTest < ActionDispatch::IntegrationTest
46
46
  end
47
47
 
48
48
  test "should update password" do
49
- patch password_reset_url, params: { token: @sid, <%= singular_table_name %>: { password: "Secret321", password_confirmation: "Secret321" } }
49
+ patch password_reset_url, params: { token: @sid, <%= singular_table_name %>: { password: "Secret654321", password_confirmation: "Secret654321" } }
50
50
  assert_redirected_to sign_in_path
51
51
  end
52
52
 
53
53
  test "should not update password with expired token" do
54
- patch password_reset_url, params: { token: @sid_exp, password: "Secret321", password_confirmation: "Secret321" }
54
+ patch password_reset_url, params: { token: @sid_exp, password: "Secret654321", password_confirmation: "Secret654321" }
55
55
 
56
56
  assert_redirected_to new_password_reset_path
57
57
  assert_equal "That password reset link is invalid", flash[:alert]
@@ -11,18 +11,18 @@ class PasswordsControllerTest < ActionDispatch::IntegrationTest
11
11
  end
12
12
 
13
13
  test "should update password" do
14
- patch password_url, params: { current_password: "Secret123", <%= singular_table_name %>: { password: "Secret321", password_confirmation: "Secret321" } }
14
+ patch password_url, params: { current_password: "Secret123456", <%= singular_table_name %>: { password: "Secret654321", password_confirmation: "Secret654321" } }
15
15
  assert_redirected_to root_path
16
16
  end
17
17
 
18
18
  test "should not update password with wrong current password" do
19
- patch password_url, params: { current_password: "wrong_password", <%= singular_table_name %>: { password: "Secret321", password_confirmation: "Secret321" } }
19
+ patch password_url, params: { current_password: "wrong_password", <%= singular_table_name %>: { password: "Secret654321", password_confirmation: "Secret654321" } }
20
20
 
21
21
  assert_redirected_to edit_password_path
22
22
  assert_equal "The current password you entered is incorrect", flash[:alert]
23
23
  end
24
24
 
25
25
  def sign_in_as(<%= singular_table_name %>)
26
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); <%= singular_table_name %>
26
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); <%= singular_table_name %>
27
27
  end
28
28
  end
@@ -8,7 +8,7 @@ class RegistrationsControllerTest < ActionDispatch::IntegrationTest
8
8
 
9
9
  test "should sign up" do
10
10
  assert_difference("<%= class_name %>.count") do
11
- post sign_up_url, params: { <%= singular_table_name %>: { email: "lazaronixon@hey.com", password: "Secret123", password_confirmation: "Secret123" } }
11
+ post sign_up_url, params: { <%= singular_table_name %>: { email: "lazaronixon@hey.com", password: "Secret123456", password_confirmation: "Secret123456" } }
12
12
  end
13
13
 
14
14
  assert_redirected_to root_url
@@ -25,6 +25,6 @@ class RegistrationsControllerTest < ActionDispatch::IntegrationTest
25
25
  end
26
26
 
27
27
  def sign_in_as(<%= singular_table_name %>)
28
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); <%= singular_table_name %>
28
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); <%= singular_table_name %>
29
29
  end
30
30
  end
@@ -18,7 +18,7 @@ class SessionsControllerTest < ActionDispatch::IntegrationTest
18
18
  end
19
19
 
20
20
  test "should sign in" do
21
- post sign_in_url, params: { email: @<%= singular_table_name %>.email, password: "Secret123" }
21
+ post sign_in_url, params: { email: @<%= singular_table_name %>.email, password: "Secret123456" }
22
22
  assert_enqueued_email_with SessionMailer, :signed_in_notification, args: { session: @<%= singular_table_name %>.sessions.last }
23
23
 
24
24
  assert_redirected_to root_url
@@ -47,6 +47,6 @@ class SessionsControllerTest < ActionDispatch::IntegrationTest
47
47
  end
48
48
 
49
49
  def sign_in_as(<%= singular_table_name %>)
50
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); <%= singular_table_name %>
50
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); <%= singular_table_name %>
51
51
  end
52
52
  end
@@ -2,5 +2,5 @@
2
2
 
3
3
  lazaro_nixon:
4
4
  email: lazaronixon@hotmail.com
5
- password_digest: <%%= BCrypt::Password.create("Secret123") %>
5
+ password_digest: <%%= BCrypt::Password.create("Secret123456") %>
6
6
  verified: true
@@ -8,7 +8,7 @@ class EmailsTest < ApplicationSystemTestCase
8
8
  test "updating the email" do
9
9
  click_on "Change email address"
10
10
 
11
- fill_in "Current password", with: "Secret123"
11
+ fill_in "Current password", with: "Secret123456"
12
12
  fill_in "New email", with: "new_email@hey.com"
13
13
  click_on "Save changes"
14
14
 
@@ -27,7 +27,7 @@ class EmailsTest < ApplicationSystemTestCase
27
27
  def sign_in_as(<%= singular_table_name %>)
28
28
  visit sign_in_url
29
29
  fill_in :email, with: <%= singular_table_name %>.email
30
- fill_in :password, with: "Secret123"
30
+ fill_in :password, with: "Secret123456"
31
31
  click_on "Sign in"
32
32
 
33
33
  return <%= singular_table_name %>
@@ -19,8 +19,8 @@ class PasswordResetsTest < ApplicationSystemTestCase
19
19
  test "updating password" do
20
20
  visit edit_password_reset_url(token: @sid)
21
21
 
22
- fill_in "New password", with: "Secret321"
23
- fill_in "Confirm new password", with: "Secret321"
22
+ fill_in "New password", with: "Secret654321"
23
+ fill_in "Confirm new password", with: "Secret654321"
24
24
  click_on "Save changes"
25
25
 
26
26
  assert_text "Your password was reset successfully. Please sign in"
@@ -8,9 +8,9 @@ class PasswordsTest < ApplicationSystemTestCase
8
8
  test "updating the password" do
9
9
  click_on "Change password"
10
10
 
11
- fill_in "Current password", with: "Secret123"
12
- fill_in "New password", with: "Secret321"
13
- fill_in "Confirm new password", with: "Secret321"
11
+ fill_in "Current password", with: "Secret123456"
12
+ fill_in "New password", with: "Secret654321"
13
+ fill_in "Confirm new password", with: "Secret654321"
14
14
  click_on "Save changes"
15
15
 
16
16
  assert_text "Your password has been changed"
@@ -19,7 +19,7 @@ class PasswordsTest < ApplicationSystemTestCase
19
19
  def sign_in_as(<%= singular_table_name %>)
20
20
  visit sign_in_url
21
21
  fill_in :email, with: <%= singular_table_name %>.email
22
- fill_in :password, with: "Secret123"
22
+ fill_in :password, with: "Secret123456"
23
23
  click_on "Sign in"
24
24
 
25
25
  return <%= singular_table_name %>
@@ -10,8 +10,8 @@ class RegistrationsTest < ApplicationSystemTestCase
10
10
  click_on "Sign up"
11
11
 
12
12
  fill_in "Email", with: "lazaronixon@hey.com"
13
- fill_in "Password", with: "Secret321"
14
- fill_in "Password confirmation", with: "Secret321"
13
+ fill_in "Password", with: "Secret654321"
14
+ fill_in "Password confirmation", with: "Secret654321"
15
15
  click_on "Sign up"
16
16
 
17
17
  assert_text "Welcome! You have signed up successfully"
@@ -27,7 +27,7 @@ class RegistrationsTest < ApplicationSystemTestCase
27
27
  def sign_in_as(<%= singular_table_name %>)
28
28
  visit sign_in_url
29
29
  fill_in :email, with: <%= singular_table_name %>.email
30
- fill_in :password, with: "Secret123"
30
+ fill_in :password, with: "Secret123456"
31
31
  click_on "Sign in"
32
32
 
33
33
  return <%= singular_table_name %>
@@ -15,7 +15,7 @@ class SessionsTest < ApplicationSystemTestCase
15
15
  test "signing in" do
16
16
  visit sign_in_url
17
17
  fill_in "Email", with: @<%= singular_table_name %>.email
18
- fill_in "Password", with: "Secret123"
18
+ fill_in "Password", with: "Secret123456"
19
19
  click_on "Sign in"
20
20
 
21
21
  assert_text "Signed in successfully"
@@ -31,7 +31,7 @@ class SessionsTest < ApplicationSystemTestCase
31
31
  def sign_in_as(<%= singular_table_name %>)
32
32
  visit sign_in_url
33
33
  fill_in :email, with: <%= singular_table_name %>.email
34
- fill_in :password, with: "Secret123"
34
+ fill_in :password, with: "Secret123456"
35
35
  click_on "Sign in"
36
36
 
37
37
  return <%= singular_table_name %>
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: authentication-zero
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.2.9
4
+ version: 2.2.10
5
5
  platform: ruby
6
6
  authors:
7
7
  - Nixon