authpro 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/MIT-LICENSE +20 -0
- data/Rakefile +28 -0
- data/lib/authpro.rb +2 -0
- data/lib/authpro/version.rb +3 -0
- data/lib/generators/authpro/USAGE +8 -0
- data/lib/generators/authpro/authpro_generator.rb +59 -0
- data/lib/generators/authpro/templates/application.html.erb +26 -0
- data/lib/generators/authpro/templates/home_controller.rb +4 -0
- data/lib/generators/authpro/templates/index.html.erb +1 -0
- data/lib/generators/authpro/templates/new_password_resets.html.erb +9 -0
- data/lib/generators/authpro/templates/new_sessions.html.erb +16 -0
- data/lib/generators/authpro/templates/new_user.html.erb +27 -0
- data/lib/generators/authpro/templates/password_reset.text.erb +5 -0
- data/lib/generators/authpro/templates/password_resets_controller.rb +37 -0
- data/lib/generators/authpro/templates/password_resets_edit.html.erb +23 -0
- data/lib/generators/authpro/templates/sessions_controller.rb +26 -0
- data/lib/generators/authpro/templates/user.rb +25 -0
- data/lib/generators/authpro/templates/user_mailer.rb +8 -0
- data/lib/generators/authpro/templates/users_controller.rb +21 -0
- data/lib/tasks/authpro_tasks.rake +4 -0
- data/test/authpro_generator_test.rb +35 -0
- data/test/authpro_integration_test.rb +144 -0
- data/test/dummy/Gemfile +17 -0
- data/test/dummy/Gemfile.lock +120 -0
- data/test/dummy/README.rdoc +28 -0
- data/test/dummy/Rakefile +6 -0
- data/test/dummy/app/assets/javascripts/application.js +13 -0
- data/test/dummy/app/assets/stylesheets/application.css +13 -0
- data/test/dummy/app/controllers/application_controller.rb +5 -0
- data/test/dummy/app/helpers/application_helper.rb +2 -0
- data/test/dummy/app/views/layouts/application.html.erb +14 -0
- data/test/dummy/bin/bundle +3 -0
- data/test/dummy/bin/rails +4 -0
- data/test/dummy/bin/rake +4 -0
- data/test/dummy/config.ru +4 -0
- data/test/dummy/config/application.rb +23 -0
- data/test/dummy/config/boot.rb +9 -0
- data/test/dummy/config/database.yml +25 -0
- data/test/dummy/config/environment.rb +5 -0
- data/test/dummy/config/environments/development.rb +27 -0
- data/test/dummy/config/environments/production.rb +80 -0
- data/test/dummy/config/environments/test.rb +38 -0
- data/test/dummy/config/initializers/backtrace_silencers.rb +7 -0
- data/test/dummy/config/initializers/filter_parameter_logging.rb +4 -0
- data/test/dummy/config/initializers/inflections.rb +16 -0
- data/test/dummy/config/initializers/mime_types.rb +5 -0
- data/test/dummy/config/initializers/secret_token.rb +12 -0
- data/test/dummy/config/initializers/session_store.rb +3 -0
- data/test/dummy/config/initializers/wrap_parameters.rb +14 -0
- data/test/dummy/config/locales/en.yml +23 -0
- data/test/dummy/config/routes.rb +49 -0
- data/test/dummy/db/test.sqlite3 +0 -0
- data/test/dummy/log/test.log +72 -0
- data/test/dummy/public/404.html +27 -0
- data/test/dummy/public/422.html +26 -0
- data/test/dummy/public/500.html +26 -0
- data/test/dummy/public/favicon.ico +0 -0
- data/test/rails/dummy/Gemfile +17 -0
- data/test/rails/dummy/Gemfile.lock +120 -0
- data/test/rails/dummy/README.rdoc +28 -0
- data/test/rails/dummy/Rakefile +6 -0
- data/test/rails/dummy/app/assets/javascripts/application.js +13 -0
- data/test/rails/dummy/app/assets/stylesheets/application.css +13 -0
- data/test/rails/dummy/app/controllers/application_controller.rb +13 -0
- data/test/rails/dummy/app/controllers/home_controller.rb +4 -0
- data/test/rails/dummy/app/controllers/password_resets_controller.rb +37 -0
- data/test/rails/dummy/app/controllers/sessions_controller.rb +26 -0
- data/test/rails/dummy/app/controllers/users_controller.rb +21 -0
- data/test/rails/dummy/app/helpers/application_helper.rb +2 -0
- data/test/rails/dummy/app/mailers/user_mailer.rb +8 -0
- data/test/rails/dummy/app/models/user.rb +25 -0
- data/test/rails/dummy/app/views/home/index.html.erb +1 -0
- data/test/rails/dummy/app/views/layouts/application.html.erb +26 -0
- data/test/rails/dummy/app/views/password_resets/edit.html.erb +23 -0
- data/test/rails/dummy/app/views/password_resets/new.html.erb +9 -0
- data/test/rails/dummy/app/views/sessions/new.html.erb +16 -0
- data/test/rails/dummy/app/views/user_mailer/password_reset.text.erb +5 -0
- data/test/rails/dummy/app/views/users/new.html.erb +27 -0
- data/test/rails/dummy/bin/bundle +3 -0
- data/test/rails/dummy/bin/rails +4 -0
- data/test/rails/dummy/bin/rake +4 -0
- data/test/rails/dummy/config.ru +4 -0
- data/test/rails/dummy/config/application.rb +23 -0
- data/test/rails/dummy/config/boot.rb +9 -0
- data/test/rails/dummy/config/database.yml +25 -0
- data/test/rails/dummy/config/environment.rb +5 -0
- data/test/rails/dummy/config/environments/development.rb +28 -0
- data/test/rails/dummy/config/environments/production.rb +80 -0
- data/test/rails/dummy/config/environments/test.rb +38 -0
- data/test/rails/dummy/config/initializers/backtrace_silencers.rb +7 -0
- data/test/rails/dummy/config/initializers/filter_parameter_logging.rb +4 -0
- data/test/rails/dummy/config/initializers/inflections.rb +16 -0
- data/test/rails/dummy/config/initializers/mime_types.rb +5 -0
- data/test/rails/dummy/config/initializers/secret_token.rb +12 -0
- data/test/rails/dummy/config/initializers/session_store.rb +3 -0
- data/test/rails/dummy/config/initializers/wrap_parameters.rb +14 -0
- data/test/rails/dummy/config/locales/en.yml +23 -0
- data/test/rails/dummy/config/routes.rb +56 -0
- data/test/rails/dummy/db/migrate/20130310185934_create_users.rb +13 -0
- data/test/rails/dummy/db/test.sqlite3 +0 -0
- data/test/rails/dummy/log/test.log +454 -0
- data/test/rails/dummy/public/404.html +27 -0
- data/test/rails/dummy/public/422.html +26 -0
- data/test/rails/dummy/public/500.html +26 -0
- data/test/rails/dummy/public/favicon.ico +0 -0
- data/test/rails/dummy/test/fixtures/users.yml +15 -0
- data/test/rails/dummy/test/models/user_test.rb +7 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/13fe41fee1fe35b49d145bcc06610705 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/2f5173deea6c795b8fdde723bb4b63af +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/357970feca3ac29060c1e3861e2c0953 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/cffd775d018f68ce5dba1ee0d951a994 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/d771ace226fc8215a3572e0aa35bb0d6 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/f7cbd26ba1d28d48de824f0e94586655 +0 -0
- data/test/test_helper.rb +31 -0
- metadata +335 -0
@@ -0,0 +1,80 @@
|
|
1
|
+
Dummy::Application.configure do
|
2
|
+
# Settings specified here will take precedence over those in config/application.rb.
|
3
|
+
|
4
|
+
# Code is not reloaded between requests.
|
5
|
+
config.cache_classes = true
|
6
|
+
|
7
|
+
# Eager load code on boot. This eager loads most of Rails and
|
8
|
+
# your application in memory, allowing both thread web servers
|
9
|
+
# and those relying on copy on write to perform better.
|
10
|
+
# Rake tasks automatically ignore this option for performance.
|
11
|
+
config.eager_load = true
|
12
|
+
|
13
|
+
# Full error reports are disabled and caching is turned on.
|
14
|
+
config.consider_all_requests_local = false
|
15
|
+
config.action_controller.perform_caching = true
|
16
|
+
|
17
|
+
# Enable Rack::Cache to put a simple HTTP cache in front of your application
|
18
|
+
# Add `rack-cache` to your Gemfile before enabling this.
|
19
|
+
# For large-scale production use, consider using a caching reverse proxy like nginx, varnish or squid.
|
20
|
+
# config.action_dispatch.rack_cache = true
|
21
|
+
|
22
|
+
# Disable Rails's static asset server (Apache or nginx will already do this).
|
23
|
+
config.serve_static_assets = false
|
24
|
+
|
25
|
+
# Compress JavaScripts and CSS.
|
26
|
+
config.assets.js_compressor = :uglifier
|
27
|
+
# config.assets.css_compressor = :sass
|
28
|
+
|
29
|
+
# Whether to fallback to assets pipeline if a precompiled asset is missed.
|
30
|
+
config.assets.compile = false
|
31
|
+
|
32
|
+
# Generate digests for assets URLs.
|
33
|
+
config.assets.digest = true
|
34
|
+
|
35
|
+
# Version of your assets, change this if you want to expire all your assets.
|
36
|
+
config.assets.version = '1.0'
|
37
|
+
|
38
|
+
# Specifies the header that your server uses for sending files.
|
39
|
+
# config.action_dispatch.x_sendfile_header = "X-Sendfile" # for apache
|
40
|
+
# config.action_dispatch.x_sendfile_header = 'X-Accel-Redirect' # for nginx
|
41
|
+
|
42
|
+
# Force all access to the app over SSL, use Strict-Transport-Security, and use secure cookies.
|
43
|
+
# config.force_ssl = true
|
44
|
+
|
45
|
+
# Set to :debug to see everything in the log.
|
46
|
+
config.log_level = :info
|
47
|
+
|
48
|
+
# Prepend all log lines with the following tags.
|
49
|
+
# config.log_tags = [ :subdomain, :uuid ]
|
50
|
+
|
51
|
+
# Use a different logger for distributed setups.
|
52
|
+
# config.logger = ActiveSupport::TaggedLogging.new(SyslogLogger.new)
|
53
|
+
|
54
|
+
# Use a different cache store in production.
|
55
|
+
# config.cache_store = :mem_cache_store
|
56
|
+
|
57
|
+
# Enable serving of images, stylesheets, and JavaScripts from an asset server.
|
58
|
+
# config.action_controller.asset_host = "http://assets.example.com"
|
59
|
+
|
60
|
+
# Precompile additional assets.
|
61
|
+
# application.js, application.css, and all non-JS/CSS in app/assets folder are already added.
|
62
|
+
# config.assets.precompile += %w( search.js )
|
63
|
+
|
64
|
+
# Ignore bad email addresses and do not raise email delivery errors.
|
65
|
+
# Set this to true and configure the email server for immediate delivery to raise delivery errors.
|
66
|
+
# config.action_mailer.raise_delivery_errors = false
|
67
|
+
|
68
|
+
# Enable locale fallbacks for I18n (makes lookups for any locale fall back to
|
69
|
+
# the I18n.default_locale when a translation can not be found).
|
70
|
+
config.i18n.fallbacks = true
|
71
|
+
|
72
|
+
# Send deprecation notices to registered listeners.
|
73
|
+
config.active_support.deprecation = :notify
|
74
|
+
|
75
|
+
# Disable automatic flushing of the log to improve performance.
|
76
|
+
# config.autoflush_log = false
|
77
|
+
|
78
|
+
# Use default logging formatter so that PID and timestamp are not suppressed.
|
79
|
+
config.log_formatter = ::Logger::Formatter.new
|
80
|
+
end
|
@@ -0,0 +1,38 @@
|
|
1
|
+
Dummy::Application.configure do
|
2
|
+
# Settings specified here will take precedence over those in config/application.rb.
|
3
|
+
|
4
|
+
# The test environment is used exclusively to run your application's
|
5
|
+
# test suite. You never need to work with it otherwise. Remember that
|
6
|
+
# your test database is "scratch space" for the test suite and is wiped
|
7
|
+
# and recreated between test runs. Don't rely on the data there!
|
8
|
+
config.cache_classes = true
|
9
|
+
|
10
|
+
# Do not eager load code on boot. This avoids loading your whole application
|
11
|
+
# just for the purpose of running a single test. If you are using a tool that
|
12
|
+
# preloads Rails for running tests, you may have to set it to true.
|
13
|
+
config.eager_load = false
|
14
|
+
|
15
|
+
# Configure static asset server for tests with Cache-Control for performance.
|
16
|
+
config.serve_static_assets = true
|
17
|
+
config.static_cache_control = "public, max-age=3600"
|
18
|
+
|
19
|
+
# Show full error reports and disable caching.
|
20
|
+
config.consider_all_requests_local = true
|
21
|
+
config.action_controller.perform_caching = false
|
22
|
+
|
23
|
+
# Raise exceptions instead of rendering exception templates.
|
24
|
+
config.action_dispatch.show_exceptions = false
|
25
|
+
|
26
|
+
# Disable request forgery protection in test environment.
|
27
|
+
config.action_controller.allow_forgery_protection = false
|
28
|
+
|
29
|
+
# Tell Action Mailer not to deliver emails to the real world.
|
30
|
+
# The :test delivery method accumulates sent emails in the
|
31
|
+
# ActionMailer::Base.deliveries array.
|
32
|
+
config.action_mailer.delivery_method = :test
|
33
|
+
|
34
|
+
# Print deprecation notices to the stderr.
|
35
|
+
config.active_support.deprecation = :stderr
|
36
|
+
|
37
|
+
config.action_mailer.default_url_options = { :host => 'localhost:3000' }
|
38
|
+
end
|
@@ -0,0 +1,7 @@
|
|
1
|
+
# Be sure to restart your server when you modify this file.
|
2
|
+
|
3
|
+
# You can add backtrace silencers for libraries that you're using but don't wish to see in your backtraces.
|
4
|
+
# Rails.backtrace_cleaner.add_silencer { |line| line =~ /my_noisy_library/ }
|
5
|
+
|
6
|
+
# You can also remove all the silencers if you're trying to debug a problem that might stem from framework code.
|
7
|
+
# Rails.backtrace_cleaner.remove_silencers!
|
@@ -0,0 +1,16 @@
|
|
1
|
+
# Be sure to restart your server when you modify this file.
|
2
|
+
|
3
|
+
# Add new inflection rules using the following format. Inflections
|
4
|
+
# are locale specific, and you may define rules for as many different
|
5
|
+
# locales as you wish. All of these examples are active by default:
|
6
|
+
# ActiveSupport::Inflector.inflections(:en) do |inflect|
|
7
|
+
# inflect.plural /^(ox)$/i, '\1en'
|
8
|
+
# inflect.singular /^(ox)en/i, '\1'
|
9
|
+
# inflect.irregular 'person', 'people'
|
10
|
+
# inflect.uncountable %w( fish sheep )
|
11
|
+
# end
|
12
|
+
|
13
|
+
# These inflection rules are supported but not enabled by default:
|
14
|
+
# ActiveSupport::Inflector.inflections(:en) do |inflect|
|
15
|
+
# inflect.acronym 'RESTful'
|
16
|
+
# end
|
@@ -0,0 +1,12 @@
|
|
1
|
+
# Be sure to restart your server when you modify this file.
|
2
|
+
|
3
|
+
# Your secret key for verifying the integrity of signed cookies.
|
4
|
+
# If you change this key, all old signed cookies will become invalid!
|
5
|
+
|
6
|
+
# Make sure the secret is at least 30 characters and all random,
|
7
|
+
# no regular words or you'll be exposed to dictionary attacks.
|
8
|
+
# You can use `rake secret` to generate a secure secret key.
|
9
|
+
|
10
|
+
# Make sure your secret_key_base is kept private
|
11
|
+
# if you're sharing your code publicly.
|
12
|
+
Dummy::Application.config.secret_key_base = '41fc3962c7d9ffdd546d3a6192b02e6375559427aad86a4eb9dd712cadad0abe927f6958986d1812e26cf392a375ee46276a85af18521ab956f2db8e80b71b45'
|
@@ -0,0 +1,14 @@
|
|
1
|
+
# Be sure to restart your server when you modify this file.
|
2
|
+
|
3
|
+
# This file contains settings for ActionController::ParamsWrapper which
|
4
|
+
# is enabled by default.
|
5
|
+
|
6
|
+
# Enable parameter wrapping for JSON. You can disable this by setting :format to an empty array.
|
7
|
+
ActiveSupport.on_load(:action_controller) do
|
8
|
+
wrap_parameters format: [:json] if respond_to?(:wrap_parameters)
|
9
|
+
end
|
10
|
+
|
11
|
+
# To enable root element in JSON for ActiveRecord objects.
|
12
|
+
# ActiveSupport.on_load(:active_record) do
|
13
|
+
# self.include_root_in_json = true
|
14
|
+
# end
|
@@ -0,0 +1,23 @@
|
|
1
|
+
# Files in the config/locales directory are used for internationalization
|
2
|
+
# and are automatically loaded by Rails. If you want to use locales other
|
3
|
+
# than English, add the necessary files in this directory.
|
4
|
+
#
|
5
|
+
# To use the locales, use `I18n.t`:
|
6
|
+
#
|
7
|
+
# I18n.t 'hello'
|
8
|
+
#
|
9
|
+
# In views, this is aliased to just `t`:
|
10
|
+
#
|
11
|
+
# <%= t('hello') %>
|
12
|
+
#
|
13
|
+
# To use a different locale, set it with `I18n.locale`:
|
14
|
+
#
|
15
|
+
# I18n.locale = :es
|
16
|
+
#
|
17
|
+
# This would use the information in config/locales/es.yml.
|
18
|
+
#
|
19
|
+
# To learn more, please read the Rails Internationalization guide
|
20
|
+
# available at http://guides.rubyonrails.org/i18n.html.
|
21
|
+
|
22
|
+
en:
|
23
|
+
hello: "Hello world"
|
@@ -0,0 +1,56 @@
|
|
1
|
+
Dummy::Application.routes.draw do
|
2
|
+
root to: 'home#index'
|
3
|
+
get 'logout' => 'sessions#destroy', :as => 'logout'
|
4
|
+
get 'signup' => 'users#new', :as => 'signup'
|
5
|
+
get 'login' => 'sessions#new', :as => 'login'
|
6
|
+
resources :users
|
7
|
+
resources :sessions
|
8
|
+
resources :password_resets
|
9
|
+
# The priority is based upon order of creation: first created -> highest priority.
|
10
|
+
# See how all your routes lay out with "rake routes".
|
11
|
+
|
12
|
+
# You can have the root of your site routed with "root"
|
13
|
+
# root to: 'welcome#index'
|
14
|
+
|
15
|
+
# Example of regular route:
|
16
|
+
# get 'products/:id' => 'catalog#view'
|
17
|
+
|
18
|
+
# Example of named route that can be invoked with purchase_url(id: product.id)
|
19
|
+
# get 'products/:id/purchase' => 'catalog#purchase', as: :purchase
|
20
|
+
|
21
|
+
# Example resource route (maps HTTP verbs to controller actions automatically):
|
22
|
+
# resources :products
|
23
|
+
|
24
|
+
# Example resource route with options:
|
25
|
+
# resources :products do
|
26
|
+
# member do
|
27
|
+
# get 'short'
|
28
|
+
# post 'toggle'
|
29
|
+
# end
|
30
|
+
#
|
31
|
+
# collection do
|
32
|
+
# get 'sold'
|
33
|
+
# end
|
34
|
+
# end
|
35
|
+
|
36
|
+
# Example resource route with sub-resources:
|
37
|
+
# resources :products do
|
38
|
+
# resources :comments, :sales
|
39
|
+
# resource :seller
|
40
|
+
# end
|
41
|
+
|
42
|
+
# Example resource route with more complex sub-resources:
|
43
|
+
# resources :products do
|
44
|
+
# resources :comments
|
45
|
+
# resources :sales do
|
46
|
+
# get 'recent', on: :collection
|
47
|
+
# end
|
48
|
+
# end
|
49
|
+
|
50
|
+
# Example resource route within a namespace:
|
51
|
+
# namespace :admin do
|
52
|
+
# # Directs /admin/products/* to Admin::ProductsController
|
53
|
+
# # (app/controllers/admin/products_controller.rb)
|
54
|
+
# resources :products
|
55
|
+
# end
|
56
|
+
end
|
@@ -0,0 +1,13 @@
|
|
1
|
+
class CreateUsers < ActiveRecord::Migration
|
2
|
+
def change
|
3
|
+
create_table :users do |t|
|
4
|
+
t.string :email
|
5
|
+
t.string :password_digest
|
6
|
+
t.string :auth_token
|
7
|
+
t.string :password_reset_token
|
8
|
+
t.datetime :password_reset_sent_at
|
9
|
+
|
10
|
+
t.timestamps
|
11
|
+
end
|
12
|
+
end
|
13
|
+
end
|
Binary file
|
@@ -0,0 +1,454 @@
|
|
1
|
+
----------------------------------------------------------------
|
2
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
3
|
+
----------------------------------------------------------------
|
4
|
+
-----------------------
|
5
|
+
AuthproTest: test_truth
|
6
|
+
-----------------------
|
7
|
+
----------------------------------------------------------------
|
8
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
9
|
+
----------------------------------------------------------------
|
10
|
+
-----------------------
|
11
|
+
AuthproTest: test_truth
|
12
|
+
-----------------------
|
13
|
+
----------------------------------------------------------------
|
14
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
15
|
+
----------------------------------------------------------------
|
16
|
+
----------------------------------------------------------------
|
17
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
18
|
+
----------------------------------------------------------------
|
19
|
+
----------------------------------------------------------------
|
20
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
21
|
+
----------------------------------------------------------------
|
22
|
+
----------------------------------------------------------------
|
23
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
24
|
+
----------------------------------------------------------------
|
25
|
+
----------------------------------------------------------------
|
26
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
27
|
+
----------------------------------------------------------------
|
28
|
+
----------------------------------------------------------------
|
29
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
30
|
+
----------------------------------------------------------------
|
31
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
32
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
33
|
+
----------------------------------------------------------------
|
34
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
35
|
+
----------------------------------------------------------------
|
36
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
37
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
38
|
+
----------------------------------------------------------------
|
39
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
40
|
+
----------------------------------------------------------------
|
41
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
42
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
43
|
+
----------------------------------------------------------------
|
44
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
45
|
+
----------------------------------------------------------------
|
46
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
47
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
48
|
+
----------------------------------------------------------------
|
49
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
50
|
+
----------------------------------------------------------------
|
51
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
52
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
53
|
+
----------------------------------------------------------------
|
54
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
55
|
+
----------------------------------------------------------------
|
56
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
57
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
58
|
+
----------------------------------------------------------------
|
59
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
60
|
+
----------------------------------------------------------------
|
61
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
62
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
63
|
+
----------------------------------------------------------------
|
64
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
65
|
+
----------------------------------------------------------------
|
66
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
67
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
68
|
+
----------------------------------------------------------------
|
69
|
+
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
70
|
+
----------------------------------------------------------------
|
71
|
+
[1m[36m (0.3ms)[0m [1mbegin transaction[0m
|
72
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
73
|
+
----------------------------------------
|
74
|
+
AuthproGeneratorTest: test_file_creation
|
75
|
+
----------------------------------------
|
76
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
77
|
+
[1m[35m (0.2ms)[0m rollback transaction
|
78
|
+
-------------------------------------------
|
79
|
+
AuthproIntegrationTest: test_Reset_password
|
80
|
+
-------------------------------------------
|
81
|
+
[1m[36m (0.9ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
82
|
+
[1m[35m (0.7ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
83
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
84
|
+
Migrating to CreateUsers (20130310185934)
|
85
|
+
[1m[35m (0.1ms)[0m begin transaction
|
86
|
+
[1m[36m (0.4ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
87
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20130310185934"]]
|
88
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
89
|
+
[1m[35m (0.1ms)[0m begin transaction
|
90
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'MbHLO-YZOyzHNbahzFPhUg' LIMIT 1[0m
|
91
|
+
Binary data inserted for `string` type on column `password_digest`
|
92
|
+
[1m[35mSQL (4.0ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "MbHLO-YZOyzHNbahzFPhUg"], ["created_at", Sun, 10 Mar 2013 18:59:34 UTC +00:00], ["email", "master@example.com"], ["password_digest", "$2a$04$alKfsqZvU3oa0R486ouYQuFJ5jTV9IjR.3jKQRyobORnOn6C61wmK"], ["updated_at", Sun, 10 Mar 2013 18:59:34 UTC +00:00]]
|
93
|
+
[1m[36m (2.0ms)[0m [1mcommit transaction[0m
|
94
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
95
|
+
Processing by SessionsController#new as HTML
|
96
|
+
Rendered sessions/new.html.erb within layouts/application (2.2ms)
|
97
|
+
Completed 200 OK in 35ms (Views: 34.4ms | ActiveRecord: 0.0ms)
|
98
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
99
|
+
Processing by PasswordResetsController#new as HTML
|
100
|
+
Rendered password_resets/new.html.erb within layouts/application (1.4ms)
|
101
|
+
Completed 200 OK in 5ms (Views: 4.1ms | ActiveRecord: 0.0ms)
|
102
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
103
|
+
Processing by PasswordResetsController#create as HTML
|
104
|
+
Parameters: {"utf8"=>"✓", "email"=>"master@example.com", "commit"=>"Reset password"}
|
105
|
+
[1m[35mUser Load (0.3ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'master@example.com' LIMIT 1
|
106
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'rwUNZ8Paq8QfXScL2ywhDQ' LIMIT 1[0m
|
107
|
+
[1m[35m (0.0ms)[0m begin transaction
|
108
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "rwUNZ8Paq8QfXScL2ywhDQ"], ["password_reset_sent_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00], ["updated_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00]]
|
109
|
+
[1m[35m (0.9ms)[0m commit transaction
|
110
|
+
Rendered user_mailer/password_reset.text.erb (0.7ms)
|
111
|
+
|
112
|
+
Sent mail to master@example.com (10.8ms)
|
113
|
+
Date: Sun, 10 Mar 2013 19:59:35 +0100
|
114
|
+
From: from@example.com
|
115
|
+
To: master@example.com
|
116
|
+
Message-ID: <513cd817887bc_10cd93fce6a06066c3971c@Richards-MacBook-Air.local.mail>
|
117
|
+
Subject: Password Reset
|
118
|
+
Mime-Version: 1.0
|
119
|
+
Content-Type: text/plain;
|
120
|
+
charset=UTF-8
|
121
|
+
Content-Transfer-Encoding: 7bit
|
122
|
+
|
123
|
+
To reset your password, click the URL below.
|
124
|
+
|
125
|
+
http://localhost:3000/password_resets/rwUNZ8Paq8QfXScL2ywhDQ/edit
|
126
|
+
|
127
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
128
|
+
Redirected to http://www.example.com/
|
129
|
+
Completed 302 Found in 315ms (ActiveRecord: 1.7ms)
|
130
|
+
Started GET "/" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
131
|
+
Processing by HomeController#index as HTML
|
132
|
+
Rendered home/index.html.erb within layouts/application (0.3ms)
|
133
|
+
Completed 200 OK in 3ms (Views: 2.6ms | ActiveRecord: 0.0ms)
|
134
|
+
Started GET "/password_resets/rwUNZ8Paq8QfXScL2ywhDQ/edit" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
135
|
+
Processing by PasswordResetsController#edit as HTML
|
136
|
+
Parameters: {"id"=>"rwUNZ8Paq8QfXScL2ywhDQ"}
|
137
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'rwUNZ8Paq8QfXScL2ywhDQ' LIMIT 1[0m
|
138
|
+
Rendered password_resets/edit.html.erb within layouts/application (9.1ms)
|
139
|
+
Completed 200 OK in 12ms (Views: 10.6ms | ActiveRecord: 0.2ms)
|
140
|
+
Started PATCH "/password_resets/rwUNZ8Paq8QfXScL2ywhDQ" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
141
|
+
Processing by PasswordResetsController#update as HTML
|
142
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"rwUNZ8Paq8QfXScL2ywhDQ"}
|
143
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'rwUNZ8Paq8QfXScL2ywhDQ' LIMIT 1
|
144
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
145
|
+
Binary data inserted for `string` type on column `password_digest`
|
146
|
+
[1m[35mSQL (0.5ms)[0m UPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_digest", "$2a$04$JvS4g7RLpzV8aOrBuA76QOq2AdejeaM8qAaqWRhh2RjtYQxUwrFxm"], ["updated_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00]]
|
147
|
+
[1m[36m (1.9ms)[0m [1mcommit transaction[0m
|
148
|
+
Redirected to http://localhost:3000/
|
149
|
+
Completed 302 Found in 7ms (ActiveRecord: 2.7ms)
|
150
|
+
Started GET "/" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
151
|
+
Processing by HomeController#index as HTML
|
152
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
153
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
154
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
155
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
156
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
157
|
+
--------------------------------------------------------------------------------
|
158
|
+
AuthproIntegrationTest: test_Reset_password_failing_because_email_does_not_exist
|
159
|
+
--------------------------------------------------------------------------------
|
160
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
161
|
+
[1m[35m (0.1ms)[0m begin transaction
|
162
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '_WTx2Jw-M7YpzGjXr1UPhg' LIMIT 1[0m
|
163
|
+
Binary data inserted for `string` type on column `password_digest`
|
164
|
+
[1m[35mSQL (0.6ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "_WTx2Jw-M7YpzGjXr1UPhg"], ["created_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00], ["email", "master@example.com"], ["password_digest", "$2a$04$0MQtsssNIBjEdcL5onkxeegh8omFYHeP1dQuE7Ijh5NGE2TjFA3Na"], ["updated_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00]]
|
165
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
166
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
167
|
+
Processing by SessionsController#new as HTML
|
168
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
169
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
170
|
+
Processing by PasswordResetsController#new as HTML
|
171
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
172
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
173
|
+
Processing by PasswordResetsController#create as HTML
|
174
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
175
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
176
|
+
Completed 200 OK in 2ms (Views: 0.9ms | ActiveRecord: 0.2ms)
|
177
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
178
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
179
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
180
|
+
-------------------------------------------------------------------------
|
181
|
+
AuthproIntegrationTest: test_Reset_password_failing_because_of_expiration
|
182
|
+
-------------------------------------------------------------------------
|
183
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
184
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
185
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'xNeIDABf52hgjYcqO9OgfA' LIMIT 1
|
186
|
+
Binary data inserted for `string` type on column `password_digest`
|
187
|
+
[1m[36mSQL (0.6ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "xNeIDABf52hgjYcqO9OgfA"], ["created_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00], ["email", "master@example.com"], ["password_digest", "$2a$04$Eh..RtTMn60k4u6tj3H3huB9NF7Fn0MZqvMXepH24UuWotM6rf4by"], ["updated_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00]]
|
188
|
+
[1m[35m (0.6ms)[0m commit transaction
|
189
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
190
|
+
Processing by SessionsController#new as HTML
|
191
|
+
Completed 200 OK in 3ms (Views: 2.6ms | ActiveRecord: 0.0ms)
|
192
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
193
|
+
Processing by PasswordResetsController#new as HTML
|
194
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
195
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
196
|
+
Processing by PasswordResetsController#create as HTML
|
197
|
+
Parameters: {"utf8"=>"✓", "email"=>"master@example.com", "commit"=>"Reset password"}
|
198
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'master@example.com' LIMIT 1[0m
|
199
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '74c4KNPKymdviRnH_XHn_Q' LIMIT 1
|
200
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
201
|
+
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "74c4KNPKymdviRnH_XHn_Q"], ["password_reset_sent_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00], ["updated_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00]]
|
202
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
203
|
+
|
204
|
+
Sent mail to master@example.com (8.1ms)
|
205
|
+
Date: Sun, 10 Mar 2013 19:59:35 +0100
|
206
|
+
From: from@example.com
|
207
|
+
To: master@example.com
|
208
|
+
Message-ID: <513cd817affd2_10cd93fce6a06066c39814@Richards-MacBook-Air.local.mail>
|
209
|
+
Subject: Password Reset
|
210
|
+
Mime-Version: 1.0
|
211
|
+
Content-Type: text/plain;
|
212
|
+
charset=UTF-8
|
213
|
+
Content-Transfer-Encoding: 7bit
|
214
|
+
|
215
|
+
To reset your password, click the URL below.
|
216
|
+
|
217
|
+
http://localhost:3000/password_resets/74c4KNPKymdviRnH_XHn_Q/edit
|
218
|
+
|
219
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
220
|
+
Redirected to http://www.example.com/
|
221
|
+
Completed 302 Found in 23ms (ActiveRecord: 1.3ms)
|
222
|
+
Started GET "/" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
223
|
+
Processing by HomeController#index as HTML
|
224
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
225
|
+
Started GET "/password_resets/74c4KNPKymdviRnH_XHn_Q/edit" for 127.0.0.1 at 2013-03-12 01:00:00 +0100
|
226
|
+
Processing by PasswordResetsController#edit as HTML
|
227
|
+
Parameters: {"id"=>"74c4KNPKymdviRnH_XHn_Q"}
|
228
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '74c4KNPKymdviRnH_XHn_Q' LIMIT 1
|
229
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
230
|
+
Started PATCH "/password_resets/74c4KNPKymdviRnH_XHn_Q" for 127.0.0.1 at 2013-03-12 01:00:00 +0100
|
231
|
+
Processing by PasswordResetsController#update as HTML
|
232
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"74c4KNPKymdviRnH_XHn_Q"}
|
233
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '74c4KNPKymdviRnH_XHn_Q' LIMIT 1[0m
|
234
|
+
Redirected to http://localhost:3000/password_resets/new
|
235
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
236
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-12 01:00:00 +0100
|
237
|
+
Processing by PasswordResetsController#new as HTML
|
238
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
239
|
+
[1m[35m (1.1ms)[0m DELETE FROM "users";
|
240
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
241
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
242
|
+
-------------------------------------------------------------------------------------------
|
243
|
+
AuthproIntegrationTest: test_Reset_password_failing_because_we_enter_a_new_invalid_password
|
244
|
+
-------------------------------------------------------------------------------------------
|
245
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
246
|
+
[1m[35m (0.1ms)[0m begin transaction
|
247
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'xQ3rW4GHCcr5UE37dGDo9g' LIMIT 1[0m
|
248
|
+
Binary data inserted for `string` type on column `password_digest`
|
249
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "xQ3rW4GHCcr5UE37dGDo9g"], ["created_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00], ["email", "master@example.com"], ["password_digest", "$2a$04$gr1nF/wAklyo2HH3cphoJ.vHGnk9WEmwMurblY/7iJwpoYdPezsHy"], ["updated_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00]]
|
250
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
251
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
252
|
+
Processing by SessionsController#new as HTML
|
253
|
+
Completed 200 OK in 2ms (Views: 2.3ms | ActiveRecord: 0.0ms)
|
254
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
255
|
+
Processing by PasswordResetsController#new as HTML
|
256
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
257
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
258
|
+
Processing by PasswordResetsController#create as HTML
|
259
|
+
Parameters: {"utf8"=>"✓", "email"=>"master@example.com", "commit"=>"Reset password"}
|
260
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'master@example.com' LIMIT 1
|
261
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'C7DdTXwaSV2TXEdG1d_GhQ' LIMIT 1[0m
|
262
|
+
[1m[35m (0.0ms)[0m begin transaction
|
263
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "C7DdTXwaSV2TXEdG1d_GhQ"], ["password_reset_sent_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00], ["updated_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00]]
|
264
|
+
[1m[35m (0.5ms)[0m commit transaction
|
265
|
+
|
266
|
+
Sent mail to master@example.com (5.4ms)
|
267
|
+
Date: Sun, 10 Mar 2013 19:59:35 +0100
|
268
|
+
From: from@example.com
|
269
|
+
To: master@example.com
|
270
|
+
Message-ID: <513cd817d2655_10cd93fce6a06066c39930@Richards-MacBook-Air.local.mail>
|
271
|
+
Subject: Password Reset
|
272
|
+
Mime-Version: 1.0
|
273
|
+
Content-Type: text/plain;
|
274
|
+
charset=UTF-8
|
275
|
+
Content-Transfer-Encoding: 7bit
|
276
|
+
|
277
|
+
To reset your password, click the URL below.
|
278
|
+
|
279
|
+
http://localhost:3000/password_resets/C7DdTXwaSV2TXEdG1d_GhQ/edit
|
280
|
+
|
281
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
282
|
+
Redirected to http://www.example.com/
|
283
|
+
Completed 302 Found in 14ms (ActiveRecord: 1.1ms)
|
284
|
+
Started GET "/" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
285
|
+
Processing by HomeController#index as HTML
|
286
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
287
|
+
Started GET "/password_resets/C7DdTXwaSV2TXEdG1d_GhQ/edit" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
288
|
+
Processing by PasswordResetsController#edit as HTML
|
289
|
+
Parameters: {"id"=>"C7DdTXwaSV2TXEdG1d_GhQ"}
|
290
|
+
[1m[36mUser Load (0.3ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'C7DdTXwaSV2TXEdG1d_GhQ' LIMIT 1[0m
|
291
|
+
Completed 200 OK in 5ms (Views: 3.6ms | ActiveRecord: 0.3ms)
|
292
|
+
Started PATCH "/password_resets/C7DdTXwaSV2TXEdG1d_GhQ" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
293
|
+
Processing by PasswordResetsController#update as HTML
|
294
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"C7DdTXwaSV2TXEdG1d_GhQ"}
|
295
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'C7DdTXwaSV2TXEdG1d_GhQ' LIMIT 1
|
296
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
297
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
298
|
+
Completed 200 OK in 10ms (Views: 4.4ms | ActiveRecord: 0.3ms)
|
299
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
300
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
301
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
302
|
+
---------------------------------------
|
303
|
+
AuthproIntegrationTest: test_Visit_home
|
304
|
+
---------------------------------------
|
305
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
306
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
307
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'j75kLa7QQDcOmUriTWZIMQ' LIMIT 1
|
308
|
+
Binary data inserted for `string` type on column `password_digest`
|
309
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "j75kLa7QQDcOmUriTWZIMQ"], ["created_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00], ["email", "master@example.com"], ["password_digest", "$2a$04$hMIXNvGgtap/tqTVHqLjSOcfPSfwIY0Fs6P5jPu/JGecWTEpWIjJK"], ["updated_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00]]
|
310
|
+
[1m[35m (0.6ms)[0m commit transaction
|
311
|
+
Started GET "/" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
312
|
+
Processing by HomeController#index as HTML
|
313
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
314
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
315
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
316
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
317
|
+
----------------------------------
|
318
|
+
AuthproIntegrationTest: test_login
|
319
|
+
----------------------------------
|
320
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
321
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
322
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '38SQtvCfTeyASaJrTGiI7Q' LIMIT 1
|
323
|
+
Binary data inserted for `string` type on column `password_digest`
|
324
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "38SQtvCfTeyASaJrTGiI7Q"], ["created_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00], ["email", "master@example.com"], ["password_digest", "$2a$04$1iF9ZVX55IDn6FaBLOojauKUbkBHQe7kFq/PV45ht3vVUy5jAqtwS"], ["updated_at", Sun, 10 Mar 2013 18:59:35 UTC +00:00]]
|
325
|
+
[1m[35m (0.7ms)[0m commit transaction
|
326
|
+
Started GET "/" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
327
|
+
Processing by HomeController#index as HTML
|
328
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
329
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
330
|
+
Processing by SessionsController#new as HTML
|
331
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
332
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
333
|
+
Processing by SessionsController#create as HTML
|
334
|
+
Parameters: {"utf8"=>"✓", "email"=>"master@example.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
335
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'master@example.com' LIMIT 1[0m
|
336
|
+
Redirected to http://www.example.com/
|
337
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
338
|
+
Started GET "/" for 127.0.0.1 at 2013-03-10 19:59:35 +0100
|
339
|
+
Processing by HomeController#index as HTML
|
340
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = '38SQtvCfTeyASaJrTGiI7Q' LIMIT 1
|
341
|
+
Completed 200 OK in 4ms (Views: 3.2ms | ActiveRecord: 0.2ms)
|
342
|
+
[1m[36m (1.4ms)[0m [1mDELETE FROM "users";[0m
|
343
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
344
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
345
|
+
------------------------------------------
|
346
|
+
AuthproIntegrationTest: test_login_failing
|
347
|
+
------------------------------------------
|
348
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
349
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
350
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'hRwWRJO6ymNzgKrUGDi3Iw' LIMIT 1
|
351
|
+
Binary data inserted for `string` type on column `password_digest`
|
352
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "hRwWRJO6ymNzgKrUGDi3Iw"], ["created_at", Sun, 10 Mar 2013 18:59:36 UTC +00:00], ["email", "master@example.com"], ["password_digest", "$2a$04$MSEgUl8ue6UmyDsBnFK.HOG6tmSSNsNZggM.CYxOTa0JDcs9YGEZW"], ["updated_at", Sun, 10 Mar 2013 18:59:36 UTC +00:00]]
|
353
|
+
[1m[35m (0.7ms)[0m commit transaction
|
354
|
+
Started GET "/" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
355
|
+
Processing by HomeController#index as HTML
|
356
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
357
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
358
|
+
Processing by SessionsController#new as HTML
|
359
|
+
Completed 200 OK in 1ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
360
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
361
|
+
Processing by SessionsController#create as HTML
|
362
|
+
Parameters: {"utf8"=>"✓", "email"=>"master@example.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
363
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'master@example.com' LIMIT 1[0m
|
364
|
+
Completed 200 OK in 3ms (Views: 1.0ms | ActiveRecord: 0.2ms)
|
365
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
366
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
367
|
+
[1m[35m (0.6ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
368
|
+
-----------------------------------
|
369
|
+
AuthproIntegrationTest: test_logout
|
370
|
+
-----------------------------------
|
371
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
372
|
+
[1m[35m (0.1ms)[0m begin transaction
|
373
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '7FkOowE4yAqewzbz3csIPA' LIMIT 1[0m
|
374
|
+
Binary data inserted for `string` type on column `password_digest`
|
375
|
+
[1m[35mSQL (0.6ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "7FkOowE4yAqewzbz3csIPA"], ["created_at", Sun, 10 Mar 2013 18:59:36 UTC +00:00], ["email", "master@example.com"], ["password_digest", "$2a$04$viZrJsPglJgu8Iz/hsDiReZWFAxZuHwNtkyEuVy9o.cuwvJePO9NG"], ["updated_at", Sun, 10 Mar 2013 18:59:36 UTC +00:00]]
|
376
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
377
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
378
|
+
Processing by SessionsController#new as HTML
|
379
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
380
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
381
|
+
Processing by SessionsController#create as HTML
|
382
|
+
Parameters: {"utf8"=>"✓", "email"=>"master@example.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
383
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'master@example.com' LIMIT 1
|
384
|
+
Redirected to http://www.example.com/
|
385
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
386
|
+
Started GET "/" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
387
|
+
Processing by HomeController#index as HTML
|
388
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = '7FkOowE4yAqewzbz3csIPA' LIMIT 1[0m
|
389
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.2ms)
|
390
|
+
Started GET "/logout" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
391
|
+
Processing by SessionsController#destroy as HTML
|
392
|
+
Redirected to http://www.example.com/
|
393
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
394
|
+
Started GET "/" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
395
|
+
Processing by HomeController#index as HTML
|
396
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
397
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
398
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
399
|
+
[1m[35m (0.6ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
400
|
+
-----------------------------------
|
401
|
+
AuthproIntegrationTest: test_signup
|
402
|
+
-----------------------------------
|
403
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
404
|
+
[1m[35m (0.1ms)[0m begin transaction
|
405
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'luH8NfFX6Ry-am7BKJoWLA' LIMIT 1[0m
|
406
|
+
Binary data inserted for `string` type on column `password_digest`
|
407
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "luH8NfFX6Ry-am7BKJoWLA"], ["created_at", Sun, 10 Mar 2013 18:59:36 UTC +00:00], ["email", "master@example.com"], ["password_digest", "$2a$04$6S7XvTMDqWH1yQXIceCRw.AQL.9ISrX1wI.lnLS8ibLfF3xPlKpA2"], ["updated_at", Sun, 10 Mar 2013 18:59:36 UTC +00:00]]
|
408
|
+
[1m[36m (0.6ms)[0m [1mcommit transaction[0m
|
409
|
+
Started GET "/" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
410
|
+
Processing by HomeController#index as HTML
|
411
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
412
|
+
Started GET "/signup" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
413
|
+
Processing by UsersController#new as HTML
|
414
|
+
Completed 200 OK in 7ms (Views: 6.0ms | ActiveRecord: 0.0ms)
|
415
|
+
Started POST "/users" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
416
|
+
Processing by UsersController#create as HTML
|
417
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"user@example.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
418
|
+
[1m[35m (0.1ms)[0m begin transaction
|
419
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'AGOT15DNXOXfFPjvsxOzcQ' LIMIT 1[0m
|
420
|
+
Binary data inserted for `string` type on column `password_digest`
|
421
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "AGOT15DNXOXfFPjvsxOzcQ"], ["created_at", Sun, 10 Mar 2013 18:59:36 UTC +00:00], ["email", "user@example.com"], ["password_digest", "$2a$04$x1AtR9S0qh7/izyRjGrkhu4tukFbnB4ER02f2rPs3SnY6JAH3HXMe"], ["updated_at", Sun, 10 Mar 2013 18:59:36 UTC +00:00]]
|
422
|
+
[1m[36m (0.6ms)[0m [1mcommit transaction[0m
|
423
|
+
Redirected to http://www.example.com/
|
424
|
+
Completed 302 Found in 7ms (ActiveRecord: 1.4ms)
|
425
|
+
Started GET "/" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
426
|
+
Processing by HomeController#index as HTML
|
427
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
428
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
429
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
430
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
431
|
+
-------------------------------------------
|
432
|
+
AuthproIntegrationTest: test_signup_failing
|
433
|
+
-------------------------------------------
|
434
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
435
|
+
[1m[35m (0.1ms)[0m begin transaction
|
436
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'MO3DpEL67SwdYWGpsbgNuw' LIMIT 1[0m
|
437
|
+
Binary data inserted for `string` type on column `password_digest`
|
438
|
+
[1m[35mSQL (0.6ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "MO3DpEL67SwdYWGpsbgNuw"], ["created_at", Sun, 10 Mar 2013 18:59:36 UTC +00:00], ["email", "master@example.com"], ["password_digest", "$2a$04$s1KsglI5FePMO5LPlOCvUuQytn44OP4gfXQ2ctd4IKUAcGkFV3OMm"], ["updated_at", Sun, 10 Mar 2013 18:59:36 UTC +00:00]]
|
439
|
+
[1m[36m (2.4ms)[0m [1mcommit transaction[0m
|
440
|
+
Started GET "/" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
441
|
+
Processing by HomeController#index as HTML
|
442
|
+
Completed 200 OK in 16ms (Views: 15.6ms | ActiveRecord: 0.0ms)
|
443
|
+
Started GET "/signup" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
444
|
+
Processing by UsersController#new as HTML
|
445
|
+
Completed 200 OK in 5ms (Views: 4.8ms | ActiveRecord: 0.0ms)
|
446
|
+
Started POST "/users" for 127.0.0.1 at 2013-03-10 19:59:36 +0100
|
447
|
+
Processing by UsersController#create as HTML
|
448
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"user@example.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
449
|
+
[1m[35m (0.1ms)[0m begin transaction
|
450
|
+
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
451
|
+
Completed 200 OK in 9ms (Views: 4.5ms | ActiveRecord: 0.2ms)
|
452
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
453
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
454
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|