authentication-zero 2.2.9 → 2.2.10

Sign up to get free protection for your applications and to get access to all the features.
Files changed (30) hide show
  1. checksums.yaml +4 -4
  2. data/Gemfile.lock +1 -1
  3. data/lib/authentication_zero/version.rb +1 -1
  4. data/lib/generators/authentication/templates/controllers/api/emails_controller.rb.tt +3 -8
  5. data/lib/generators/authentication/templates/controllers/api/passwords_controller.rb.tt +3 -8
  6. data/lib/generators/authentication/templates/controllers/html/emails_controller.rb.tt +3 -8
  7. data/lib/generators/authentication/templates/controllers/html/passwords_controller.rb.tt +3 -8
  8. data/lib/generators/authentication/templates/erb/password_resets/edit.html.erb.tt +1 -1
  9. data/lib/generators/authentication/templates/erb/passwords/edit.html.erb.tt +1 -1
  10. data/lib/generators/authentication/templates/erb/registrations/new.html.erb.tt +1 -1
  11. data/lib/generators/authentication/templates/models/model.rb.tt +1 -1
  12. data/lib/generators/authentication/templates/test_unit/controllers/api/email_verifications_controller_test.rb.tt +1 -1
  13. data/lib/generators/authentication/templates/test_unit/controllers/api/emails_controller_test.rb.tt +2 -2
  14. data/lib/generators/authentication/templates/test_unit/controllers/api/password_resets_controller_test.rb.tt +2 -2
  15. data/lib/generators/authentication/templates/test_unit/controllers/api/passwords_controller_test.rb.tt +3 -3
  16. data/lib/generators/authentication/templates/test_unit/controllers/api/registrations_controller_test.rb.tt +2 -2
  17. data/lib/generators/authentication/templates/test_unit/controllers/api/sessions_controller_test.rb.tt +2 -2
  18. data/lib/generators/authentication/templates/test_unit/controllers/html/email_verifications_controller_test.rb.tt +1 -1
  19. data/lib/generators/authentication/templates/test_unit/controllers/html/emails_controller_test.rb.tt +2 -2
  20. data/lib/generators/authentication/templates/test_unit/controllers/html/password_resets_controller_test.rb.tt +2 -2
  21. data/lib/generators/authentication/templates/test_unit/controllers/html/passwords_controller_test.rb.tt +3 -3
  22. data/lib/generators/authentication/templates/test_unit/controllers/html/registrations_controller_test.rb.tt +2 -2
  23. data/lib/generators/authentication/templates/test_unit/controllers/html/sessions_controller_test.rb.tt +2 -2
  24. data/lib/generators/authentication/templates/test_unit/fixtures.yml.tt +1 -1
  25. data/lib/generators/authentication/templates/test_unit/system/emails_test.rb.tt +2 -2
  26. data/lib/generators/authentication/templates/test_unit/system/password_resets_test.rb.tt +2 -2
  27. data/lib/generators/authentication/templates/test_unit/system/passwords_test.rb.tt +4 -4
  28. data/lib/generators/authentication/templates/test_unit/system/registrations_test.rb.tt +3 -3
  29. data/lib/generators/authentication/templates/test_unit/system/sessions_test.rb.tt +2 -2
  30. metadata +1 -1
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e025028c28dd89faa490a953449c4b9176a4ac3ca0060612d87bb3f1cfc1863d
4
- data.tar.gz: fa5d9c5ebad6a4362d107b6ceaaa82b384ab15570c4124c69ea14db20eb4de4d
3
+ metadata.gz: d86415b86a2afceb0fd9f224ca9edd8f6ee32824d0e3c4bd8bb4ed6b7ac01b29
4
+ data.tar.gz: 7f16a4f0cd62f7a6ebc201172c8e8f7443af20ebf7f43e2aa2cac76eb26edfd5
5
5
  SHA512:
6
- metadata.gz: 439ce53002ab43e268dfa3be24d9a91f5d94dd033865f4801eb2aa0c32e5f51d05e6a1e11be3655fc31285422302b7a993ac543553734d8b23b6d24d5acceec3
7
- data.tar.gz: 41d4aad8d43718e4d9e458cdaa15560b7b45d61e68e2fc734444b2eaa43e632336dad558e731cd882787b03d0156a188de1cd25c6df5f38b73383e930c6fcb6c
6
+ metadata.gz: f17fc115b066489463a3f7ee458f1028a731619508db8b559d58b743686b4e217ba00540e7343e59636519da27409abec73801f33d94282866c156bef14aeaf7
7
+ data.tar.gz: 346c434a4270e1733363d2d0bab34863d7a000646b1ef8f79c42301b9a11fe191b5c548fcefb9f00f5e967ddedf1fa505febd343ff2608348505c97b1e40f01d
data/Gemfile.lock CHANGED
@@ -1,7 +1,7 @@
1
1
  PATH
2
2
  remote: .
3
3
  specs:
4
- authentication-zero (2.2.9)
4
+ authentication-zero (2.2.10)
5
5
 
6
6
  GEM
7
7
  remote: https://rubygems.org/
@@ -1,3 +1,3 @@
1
1
  module AuthenticationZero
2
- VERSION = "2.2.9"
2
+ VERSION = "2.2.10"
3
3
  end
@@ -1,9 +1,10 @@
1
1
  class EmailsController < ApplicationController
2
2
  before_action :set_<%= singular_table_name %>
3
- before_action :validate_current_password
4
3
 
5
4
  def update
6
- if @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
5
+ if !@<%= singular_table_name %>.authenticate(params[:current_password])
6
+ render json: { error: "The current password you entered is incorrect" }, status: :bad_request
7
+ elsif @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
7
8
  render json: @<%= singular_table_name %>
8
9
  else
9
10
  render json: @<%= singular_table_name %>.errors, status: :unprocessable_entity
@@ -18,10 +19,4 @@ class EmailsController < ApplicationController
18
19
  def <%= "#{singular_table_name}_params" %>
19
20
  params.permit(:email)
20
21
  end
21
-
22
- def validate_current_password
23
- unless @<%= singular_table_name %>.authenticate(params[:current_password])
24
- render json: { error: "The current password you entered is incorrect" }, status: :bad_request
25
- end
26
- end
27
22
  end
@@ -1,9 +1,10 @@
1
1
  class PasswordsController < ApplicationController
2
2
  before_action :set_<%= singular_table_name %>
3
- before_action :validate_current_password
4
3
 
5
4
  def update
6
- if @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
5
+ if !@<%= singular_table_name %>.authenticate(params[:current_password])
6
+ render json: { error: "The current password you entered is incorrect" }, status: :bad_request
7
+ elsif @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
7
8
  render json: @<%= singular_table_name %>
8
9
  else
9
10
  render json: @<%= singular_table_name %>.errors, status: :unprocessable_entity
@@ -18,10 +19,4 @@ class PasswordsController < ApplicationController
18
19
  def <%= "#{singular_table_name}_params" %>
19
20
  params.permit(:password, :password_confirmation)
20
21
  end
21
-
22
- def validate_current_password
23
- unless @<%= singular_table_name %>.authenticate(params[:current_password])
24
- render json: { error: "The current password you entered is incorrect" }, status: :bad_request
25
- end
26
- end
27
22
  end
@@ -1,12 +1,13 @@
1
1
  class EmailsController < ApplicationController
2
2
  before_action :set_<%= singular_table_name %>
3
- before_action :validate_current_password, only: :update
4
3
 
5
4
  def edit
6
5
  end
7
6
 
8
7
  def update
9
- if @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
8
+ if !@<%= singular_table_name %>.authenticate(params[:current_password])
9
+ redirect_to edit_email_path, alert: "The current password you entered is incorrect"
10
+ elsif @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
10
11
  redirect_to root_path, notice: "Your email has been changed"
11
12
  else
12
13
  render :edit, status: :unprocessable_entity
@@ -21,10 +22,4 @@ class EmailsController < ApplicationController
21
22
  def <%= "#{singular_table_name}_params" %>
22
23
  params.require(:<%= singular_table_name %>).permit(:email)
23
24
  end
24
-
25
- def validate_current_password
26
- unless @<%= singular_table_name %>.authenticate(params[:current_password])
27
- redirect_to edit_email_path, alert: "The current password you entered is incorrect"
28
- end
29
- end
30
25
  end
@@ -1,12 +1,13 @@
1
1
  class PasswordsController < ApplicationController
2
2
  before_action :set_<%= singular_table_name %>
3
- before_action :validate_current_password, only: :update
4
3
 
5
4
  def edit
6
5
  end
7
6
 
8
7
  def update
9
- if @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
8
+ if !@<%= singular_table_name %>.authenticate(params[:current_password])
9
+ redirect_to edit_password_path, alert: "The current password you entered is incorrect"
10
+ elsif @<%= singular_table_name %>.update(<%= "#{singular_table_name}_params" %>)
10
11
  redirect_to root_path, notice: "Your password has been changed"
11
12
  else
12
13
  render :edit, status: :unprocessable_entity
@@ -21,10 +22,4 @@ class PasswordsController < ApplicationController
21
22
  def <%= "#{singular_table_name}_params" %>
22
23
  params.require(:<%= singular_table_name %>).permit(:password, :password_confirmation)
23
24
  end
24
-
25
- def validate_current_password
26
- unless @<%= singular_table_name %>.authenticate(params[:current_password])
27
- redirect_to edit_password_path, alert: "The current password you entered is incorrect"
28
- end
29
- end
30
25
  end
@@ -18,7 +18,7 @@
18
18
  <div>
19
19
  <%%= form.label :password, "New password", style: "display: block" %>
20
20
  <%%= form.password_field :password, autofocus: true, autocomplete: "new-password" %>
21
- <div>8 characters minimum.</div>
21
+ <div>12 characters minimum.</div>
22
22
  </div>
23
23
 
24
24
  <div>
@@ -23,7 +23,7 @@
23
23
  <div>
24
24
  <%%= form.label :password, "New password", style: "display: block" %>
25
25
  <%%= form.password_field :password, autocomplete: "new-password" %>
26
- <div>8 characters minimum.</div>
26
+ <div>12 characters minimum.</div>
27
27
  </div>
28
28
 
29
29
  <div>
@@ -21,7 +21,7 @@
21
21
  <div>
22
22
  <%%= form.label :password, style: "display: block" %>
23
23
  <%%= form.password_field :password, autocomplete: "new-password" %>
24
- <div>8 characters minimum.</div>
24
+ <div>12 characters minimum.</div>
25
25
  </div>
26
26
 
27
27
  <div>
@@ -6,7 +6,7 @@ class <%= class_name %> < ApplicationRecord
6
6
  validates :email, presence: true, uniqueness: true
7
7
  validates_format_of :email, with: /\A[^@\s]+@[^@\s]+\z/
8
8
 
9
- validates_length_of :password, minimum: 8, allow_blank: true
9
+ validates_length_of :password, minimum: 12, allow_blank: true
10
10
  validates_format_of :password, with: /(?=.*[a-z])(?=.*[A-Z])(?=.*[0-9])/, allow_blank: true, message: "might easily be guessed"
11
11
 
12
12
  before_validation do
@@ -39,6 +39,6 @@ class EmailVerificationsControllerTest < ActionDispatch::IntegrationTest
39
39
  end
40
40
 
41
41
  def sign_in_as(<%= singular_table_name %>)
42
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
42
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
43
43
  end
44
44
  end
@@ -6,7 +6,7 @@ class EmailsControllerTest < ActionDispatch::IntegrationTest
6
6
  end
7
7
 
8
8
  test "should update email" do
9
- patch email_url, params: { current_password: "Secret123", email: "new_email@hey.com" }, headers: { "Authorization" => "Bearer #{@token}" }
9
+ patch email_url, params: { current_password: "Secret123456", email: "new_email@hey.com" }, headers: { "Authorization" => "Bearer #{@token}" }
10
10
  assert_response :success
11
11
  end
12
12
 
@@ -18,6 +18,6 @@ class EmailsControllerTest < ActionDispatch::IntegrationTest
18
18
  end
19
19
 
20
20
  def sign_in_as(<%= singular_table_name %>)
21
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
21
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
22
22
  end
23
23
  end
@@ -36,12 +36,12 @@ class PasswordResetsControllerTest < ActionDispatch::IntegrationTest
36
36
  end
37
37
 
38
38
  test "should update password" do
39
- patch password_reset_url, params: { token: @sid, password: "Secret321", password_confirmation: "Secret321" }
39
+ patch password_reset_url, params: { token: @sid, password: "Secret654321", password_confirmation: "Secret654321" }
40
40
  assert_response :success
41
41
  end
42
42
 
43
43
  test "should not update password with expired token" do
44
- patch password_reset_url, params: { token: @sid_exp, password: "Secret321", password_confirmation: "Secret321" }
44
+ patch password_reset_url, params: { token: @sid_exp, password: "Secret654321", password_confirmation: "Secret654321" }
45
45
 
46
46
  assert_response :bad_request
47
47
  assert_equal "That password reset link is invalid", response.parsed_body["error"]
@@ -6,18 +6,18 @@ class PasswordsControllerTest < ActionDispatch::IntegrationTest
6
6
  end
7
7
 
8
8
  test "should update password" do
9
- patch password_url, params: { current_password: "Secret123", password: "Secret321", password_confirmation: "Secret321" }, headers: { "Authorization" => "Bearer #{@token}" }
9
+ patch password_url, params: { current_password: "Secret123456", password: "Secret654321", password_confirmation: "Secret654321" }, headers: { "Authorization" => "Bearer #{@token}" }
10
10
  assert_response :success
11
11
  end
12
12
 
13
13
  test "should not update password with wrong current password" do
14
- patch password_url, params: { current_password: "wrong_password", password: "Secret321", password_confirmation: "Secret321" }, headers: { "Authorization" => "Bearer #{@token}" }
14
+ patch password_url, params: { current_password: "wrong_password", password: "Secret654321", password_confirmation: "Secret654321" }, headers: { "Authorization" => "Bearer #{@token}" }
15
15
 
16
16
  assert_response :bad_request
17
17
  assert_equal "The current password you entered is incorrect", response.parsed_body["error"]
18
18
  end
19
19
 
20
20
  def sign_in_as(<%= singular_table_name %>)
21
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
21
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
22
22
  end
23
23
  end
@@ -3,7 +3,7 @@ require "test_helper"
3
3
  class RegistrationsControllerTest < ActionDispatch::IntegrationTest
4
4
  test "should sign up" do
5
5
  assert_difference("<%= class_name %>.count") do
6
- post sign_up_url, params: { email: "lazaronixon@hey.com", password: "Secret123", password_confirmation: "Secret123" }
6
+ post sign_up_url, params: { email: "lazaronixon@hey.com", password: "Secret123456", password_confirmation: "Secret123456" }
7
7
  end
8
8
 
9
9
  assert_response :created
@@ -20,6 +20,6 @@ class RegistrationsControllerTest < ActionDispatch::IntegrationTest
20
20
  end
21
21
 
22
22
  def sign_in_as(<%= singular_table_name %>)
23
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
23
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
24
24
  end
25
25
  end
@@ -16,7 +16,7 @@ class SessionsControllerTest < ActionDispatch::IntegrationTest
16
16
  end
17
17
 
18
18
  test "should sign in" do
19
- post sign_in_url, params: { email: @<%= singular_table_name %>.email, password: "Secret123" }
19
+ post sign_in_url, params: { email: @<%= singular_table_name %>.email, password: "Secret123456" }
20
20
 
21
21
  assert_enqueued_email_with SessionMailer, :signed_in_notification, args: { session: @<%= singular_table_name %>.sessions.last }
22
22
  assert_response :created
@@ -33,6 +33,6 @@ class SessionsControllerTest < ActionDispatch::IntegrationTest
33
33
  end
34
34
 
35
35
  def sign_in_as(<%= singular_table_name %>)
36
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
36
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); [<%= singular_table_name %>, response.headers["X-Session-Token"]]
37
37
  end
38
38
  end
@@ -39,6 +39,6 @@ class EmailVerificationsControllerTest < ActionDispatch::IntegrationTest
39
39
  end
40
40
 
41
41
  def sign_in_as(<%= singular_table_name %>)
42
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); <%= singular_table_name %>
42
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); <%= singular_table_name %>
43
43
  end
44
44
  end
@@ -11,7 +11,7 @@ class EmailsControllerTest < ActionDispatch::IntegrationTest
11
11
  end
12
12
 
13
13
  test "should update email" do
14
- patch email_url, params: { current_password: "Secret123", <%= singular_table_name %>: { email: "new_email@hey.com" } }
14
+ patch email_url, params: { current_password: "Secret123456", <%= singular_table_name %>: { email: "new_email@hey.com" } }
15
15
  assert_redirected_to root_path
16
16
  end
17
17
 
@@ -23,6 +23,6 @@ class EmailsControllerTest < ActionDispatch::IntegrationTest
23
23
  end
24
24
 
25
25
  def sign_in_as(<%= singular_table_name %>)
26
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); <%= singular_table_name %>
26
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); <%= singular_table_name %>
27
27
  end
28
28
  end
@@ -46,12 +46,12 @@ class PasswordResetsControllerTest < ActionDispatch::IntegrationTest
46
46
  end
47
47
 
48
48
  test "should update password" do
49
- patch password_reset_url, params: { token: @sid, <%= singular_table_name %>: { password: "Secret321", password_confirmation: "Secret321" } }
49
+ patch password_reset_url, params: { token: @sid, <%= singular_table_name %>: { password: "Secret654321", password_confirmation: "Secret654321" } }
50
50
  assert_redirected_to sign_in_path
51
51
  end
52
52
 
53
53
  test "should not update password with expired token" do
54
- patch password_reset_url, params: { token: @sid_exp, password: "Secret321", password_confirmation: "Secret321" }
54
+ patch password_reset_url, params: { token: @sid_exp, password: "Secret654321", password_confirmation: "Secret654321" }
55
55
 
56
56
  assert_redirected_to new_password_reset_path
57
57
  assert_equal "That password reset link is invalid", flash[:alert]
@@ -11,18 +11,18 @@ class PasswordsControllerTest < ActionDispatch::IntegrationTest
11
11
  end
12
12
 
13
13
  test "should update password" do
14
- patch password_url, params: { current_password: "Secret123", <%= singular_table_name %>: { password: "Secret321", password_confirmation: "Secret321" } }
14
+ patch password_url, params: { current_password: "Secret123456", <%= singular_table_name %>: { password: "Secret654321", password_confirmation: "Secret654321" } }
15
15
  assert_redirected_to root_path
16
16
  end
17
17
 
18
18
  test "should not update password with wrong current password" do
19
- patch password_url, params: { current_password: "wrong_password", <%= singular_table_name %>: { password: "Secret321", password_confirmation: "Secret321" } }
19
+ patch password_url, params: { current_password: "wrong_password", <%= singular_table_name %>: { password: "Secret654321", password_confirmation: "Secret654321" } }
20
20
 
21
21
  assert_redirected_to edit_password_path
22
22
  assert_equal "The current password you entered is incorrect", flash[:alert]
23
23
  end
24
24
 
25
25
  def sign_in_as(<%= singular_table_name %>)
26
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); <%= singular_table_name %>
26
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); <%= singular_table_name %>
27
27
  end
28
28
  end
@@ -8,7 +8,7 @@ class RegistrationsControllerTest < ActionDispatch::IntegrationTest
8
8
 
9
9
  test "should sign up" do
10
10
  assert_difference("<%= class_name %>.count") do
11
- post sign_up_url, params: { <%= singular_table_name %>: { email: "lazaronixon@hey.com", password: "Secret123", password_confirmation: "Secret123" } }
11
+ post sign_up_url, params: { <%= singular_table_name %>: { email: "lazaronixon@hey.com", password: "Secret123456", password_confirmation: "Secret123456" } }
12
12
  end
13
13
 
14
14
  assert_redirected_to root_url
@@ -25,6 +25,6 @@ class RegistrationsControllerTest < ActionDispatch::IntegrationTest
25
25
  end
26
26
 
27
27
  def sign_in_as(<%= singular_table_name %>)
28
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); <%= singular_table_name %>
28
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); <%= singular_table_name %>
29
29
  end
30
30
  end
@@ -18,7 +18,7 @@ class SessionsControllerTest < ActionDispatch::IntegrationTest
18
18
  end
19
19
 
20
20
  test "should sign in" do
21
- post sign_in_url, params: { email: @<%= singular_table_name %>.email, password: "Secret123" }
21
+ post sign_in_url, params: { email: @<%= singular_table_name %>.email, password: "Secret123456" }
22
22
  assert_enqueued_email_with SessionMailer, :signed_in_notification, args: { session: @<%= singular_table_name %>.sessions.last }
23
23
 
24
24
  assert_redirected_to root_url
@@ -47,6 +47,6 @@ class SessionsControllerTest < ActionDispatch::IntegrationTest
47
47
  end
48
48
 
49
49
  def sign_in_as(<%= singular_table_name %>)
50
- post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123" }); <%= singular_table_name %>
50
+ post(sign_in_url, params: { email: <%= singular_table_name %>.email, password: "Secret123456" }); <%= singular_table_name %>
51
51
  end
52
52
  end
@@ -2,5 +2,5 @@
2
2
 
3
3
  lazaro_nixon:
4
4
  email: lazaronixon@hotmail.com
5
- password_digest: <%%= BCrypt::Password.create("Secret123") %>
5
+ password_digest: <%%= BCrypt::Password.create("Secret123456") %>
6
6
  verified: true
@@ -8,7 +8,7 @@ class EmailsTest < ApplicationSystemTestCase
8
8
  test "updating the email" do
9
9
  click_on "Change email address"
10
10
 
11
- fill_in "Current password", with: "Secret123"
11
+ fill_in "Current password", with: "Secret123456"
12
12
  fill_in "New email", with: "new_email@hey.com"
13
13
  click_on "Save changes"
14
14
 
@@ -27,7 +27,7 @@ class EmailsTest < ApplicationSystemTestCase
27
27
  def sign_in_as(<%= singular_table_name %>)
28
28
  visit sign_in_url
29
29
  fill_in :email, with: <%= singular_table_name %>.email
30
- fill_in :password, with: "Secret123"
30
+ fill_in :password, with: "Secret123456"
31
31
  click_on "Sign in"
32
32
 
33
33
  return <%= singular_table_name %>
@@ -19,8 +19,8 @@ class PasswordResetsTest < ApplicationSystemTestCase
19
19
  test "updating password" do
20
20
  visit edit_password_reset_url(token: @sid)
21
21
 
22
- fill_in "New password", with: "Secret321"
23
- fill_in "Confirm new password", with: "Secret321"
22
+ fill_in "New password", with: "Secret654321"
23
+ fill_in "Confirm new password", with: "Secret654321"
24
24
  click_on "Save changes"
25
25
 
26
26
  assert_text "Your password was reset successfully. Please sign in"
@@ -8,9 +8,9 @@ class PasswordsTest < ApplicationSystemTestCase
8
8
  test "updating the password" do
9
9
  click_on "Change password"
10
10
 
11
- fill_in "Current password", with: "Secret123"
12
- fill_in "New password", with: "Secret321"
13
- fill_in "Confirm new password", with: "Secret321"
11
+ fill_in "Current password", with: "Secret123456"
12
+ fill_in "New password", with: "Secret654321"
13
+ fill_in "Confirm new password", with: "Secret654321"
14
14
  click_on "Save changes"
15
15
 
16
16
  assert_text "Your password has been changed"
@@ -19,7 +19,7 @@ class PasswordsTest < ApplicationSystemTestCase
19
19
  def sign_in_as(<%= singular_table_name %>)
20
20
  visit sign_in_url
21
21
  fill_in :email, with: <%= singular_table_name %>.email
22
- fill_in :password, with: "Secret123"
22
+ fill_in :password, with: "Secret123456"
23
23
  click_on "Sign in"
24
24
 
25
25
  return <%= singular_table_name %>
@@ -10,8 +10,8 @@ class RegistrationsTest < ApplicationSystemTestCase
10
10
  click_on "Sign up"
11
11
 
12
12
  fill_in "Email", with: "lazaronixon@hey.com"
13
- fill_in "Password", with: "Secret321"
14
- fill_in "Password confirmation", with: "Secret321"
13
+ fill_in "Password", with: "Secret654321"
14
+ fill_in "Password confirmation", with: "Secret654321"
15
15
  click_on "Sign up"
16
16
 
17
17
  assert_text "Welcome! You have signed up successfully"
@@ -27,7 +27,7 @@ class RegistrationsTest < ApplicationSystemTestCase
27
27
  def sign_in_as(<%= singular_table_name %>)
28
28
  visit sign_in_url
29
29
  fill_in :email, with: <%= singular_table_name %>.email
30
- fill_in :password, with: "Secret123"
30
+ fill_in :password, with: "Secret123456"
31
31
  click_on "Sign in"
32
32
 
33
33
  return <%= singular_table_name %>
@@ -15,7 +15,7 @@ class SessionsTest < ApplicationSystemTestCase
15
15
  test "signing in" do
16
16
  visit sign_in_url
17
17
  fill_in "Email", with: @<%= singular_table_name %>.email
18
- fill_in "Password", with: "Secret123"
18
+ fill_in "Password", with: "Secret123456"
19
19
  click_on "Sign in"
20
20
 
21
21
  assert_text "Signed in successfully"
@@ -31,7 +31,7 @@ class SessionsTest < ApplicationSystemTestCase
31
31
  def sign_in_as(<%= singular_table_name %>)
32
32
  visit sign_in_url
33
33
  fill_in :email, with: <%= singular_table_name %>.email
34
- fill_in :password, with: "Secret123"
34
+ fill_in :password, with: "Secret123456"
35
35
  click_on "Sign in"
36
36
 
37
37
  return <%= singular_table_name %>
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: authentication-zero
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.2.9
4
+ version: 2.2.10
5
5
  platform: ruby
6
6
  authors:
7
7
  - Nixon