authpro 0.9.0 → 0.9.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +3 -5
- data/lib/authpro/version.rb +1 -1
- data/lib/generators/authpro/authpro_generator.rb +0 -1
- data/test/rails/dummy/app/models/user.rb +0 -1
- data/test/rails/dummy/db/migrate/{20130315220020_create_users.rb → 20130328085155_create_users.rb} +0 -0
- data/test/rails/dummy/db/test.sqlite3 +0 -0
- data/test/rails/dummy/log/test.log +218 -218
- data/test/rails/dummy/test/fixtures/users.yml +2 -2
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: dc7b17548b187c342469895d82a46d1dd43d5c9e
|
4
|
+
data.tar.gz: 372629df68bae8d0d866c0a4ea3812f7e7c62827
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: d82e0bb1eba598cb8a2cc165a6db8d53a7fa7ad6449b0147d0570d807daf8adc6e968901aae5b112d47f2f88d459c75217cee02f0949b8da03a6ed98f2d1ac6f
|
7
|
+
data.tar.gz: 97cc78845001257113cfa8765d4a53ae8d26186a6376d70e78a26cd91c210d8dcd288252bacbf74763e5b65c271556cc6d131f3d2d2efbe4f358fe02ad9c207b
|
data/README.md
CHANGED
@@ -1,14 +1,12 @@
|
|
1
|
-
# Authpro
|
2
|
-
|
3
|
-
Work in progress but fully functional.
|
1
|
+
# Authpro
|
4
2
|
|
5
3
|
[![Code Climate](https://codeclimate.com/github/ricn/authpro.png)](https://codeclimate.com/github/ricn/authpro)
|
6
4
|
[![Build Status](https://travis-ci.org/ricn/authpro.png?branch=master)](https://travis-ci.org/ricn/authpro)
|
7
5
|
|
8
|
-
Authpro is a simple authentication generator for Rails. It:
|
6
|
+
Authpro is a simple authentication generator for Rails 4. It:
|
9
7
|
|
10
8
|
* Gives you sign up, log in, remember me & password reset funtionality
|
11
|
-
* Has no hidden code,
|
9
|
+
* Has no hidden code, special super classes or mixins
|
12
10
|
* Has no configuration
|
13
11
|
|
14
12
|
Authpro assumes you want:
|
data/lib/authpro/version.rb
CHANGED
data/test/rails/dummy/db/migrate/{20130315220020_create_users.rb → 20130328085155_create_users.rb}
RENAMED
File without changes
|
Binary file
|
@@ -73,135 +73,135 @@ AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
73
73
|
------------------------------------------
|
74
74
|
AuthproGeneratorTest: test_generated_files
|
75
75
|
------------------------------------------
|
76
|
-
[1m[36m (0.
|
76
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
77
77
|
[1m[35m (0.1ms)[0m rollback transaction
|
78
78
|
----------------------------------
|
79
79
|
AuthproIntegrationTest: test_login
|
80
80
|
----------------------------------
|
81
|
-
[1m[36m (1.
|
82
|
-
[1m[35m (
|
81
|
+
[1m[36m (1.6ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
82
|
+
[1m[35m (1.3ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
83
83
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
84
|
-
Migrating to CreateUsers (
|
84
|
+
Migrating to CreateUsers (20130328085155)
|
85
85
|
[1m[35m (0.1ms)[0m begin transaction
|
86
86
|
[1m[36m (0.5ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
87
|
-
[1m[35mSQL (0.
|
88
|
-
[1m[36m (0.
|
87
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20130328085155"]]
|
88
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
89
89
|
[1m[35m (0.1ms)[0m begin transaction
|
90
|
-
[1m[36mUser Exists (0.
|
91
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
90
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'hmz-NGh85d33Hjo-OS59mg@sample.com' LIMIT 1[0m
|
91
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'gc_L5ngVkwUF3JZmXA35qw' LIMIT 1
|
92
92
|
Binary data inserted for `string` type on column `password_digest`
|
93
|
-
[1m[36mSQL (
|
94
|
-
[1m[35m (0.
|
95
|
-
Started GET "/" for 127.0.0.1 at 2013-03-
|
93
|
+
[1m[36mSQL (2.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "gc_L5ngVkwUF3JZmXA35qw"], ["created_at", Thu, 28 Mar 2013 08:51:55 UTC +00:00], ["email", "hmz-NGh85d33Hjo-OS59mg@sample.com"], ["password_digest", "$2a$04$rBW9TuyauuLKBb6L1BhEqejY93zUFTRhx08Y4RcfiMBwWYGkiqByy"], ["updated_at", Thu, 28 Mar 2013 08:51:55 UTC +00:00]]
|
94
|
+
[1m[35m (0.9ms)[0m commit transaction
|
95
|
+
Started GET "/" for 127.0.0.1 at 2013-03-28 09:51:55 +0100
|
96
96
|
Processing by HomeController#index as HTML
|
97
|
-
Rendered home/index.html.erb within layouts/application (
|
98
|
-
Completed 200 OK in
|
99
|
-
Started GET "/login" for 127.0.0.1 at 2013-03-
|
97
|
+
Rendered home/index.html.erb within layouts/application (0.9ms)
|
98
|
+
Completed 200 OK in 26ms (Views: 26.0ms | ActiveRecord: 0.0ms)
|
99
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
100
100
|
Processing by SessionsController#new as HTML
|
101
|
-
Rendered sessions/new.html.erb within layouts/application (1.
|
102
|
-
Completed 200 OK in
|
103
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-03-
|
101
|
+
Rendered sessions/new.html.erb within layouts/application (1.1ms)
|
102
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
103
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
104
104
|
Processing by SessionsController#create as HTML
|
105
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
106
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
105
|
+
Parameters: {"utf8"=>"✓", "email"=>"hmz-NGh85d33Hjo-OS59mg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
106
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'hmz-NGh85d33Hjo-OS59mg@sample.com' LIMIT 1[0m
|
107
107
|
Redirected to http://www.example.com/
|
108
|
-
Completed 302 Found in
|
109
|
-
Started GET "/" for 127.0.0.1 at 2013-03-
|
108
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
109
|
+
Started GET "/" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
110
110
|
Processing by HomeController#index as HTML
|
111
111
|
Rendered home/index.html.erb within layouts/application (0.1ms)
|
112
|
-
[1m[35mUser Load (0.
|
113
|
-
Completed 200 OK in
|
114
|
-
[1m[36m (
|
112
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'gc_L5ngVkwUF3JZmXA35qw' LIMIT 1
|
113
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.1ms)
|
114
|
+
[1m[36m (2.6ms)[0m [1mDELETE FROM "users";[0m
|
115
115
|
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
116
|
-
[1m[36m (0.
|
116
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
117
117
|
------------------------------------------
|
118
118
|
AuthproIntegrationTest: test_login_failing
|
119
119
|
------------------------------------------
|
120
120
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
121
121
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
122
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
123
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
122
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'XTuq4A8QxXJkdz3qTaQI6A@sample.com' LIMIT 1
|
123
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'MsO5n07p0YtalHK__eKhvg' LIMIT 1[0m
|
124
124
|
Binary data inserted for `string` type on column `password_digest`
|
125
|
-
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "
|
126
|
-
[1m[36m (
|
127
|
-
Started GET "/" for 127.0.0.1 at 2013-03-
|
125
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "MsO5n07p0YtalHK__eKhvg"], ["created_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00], ["email", "XTuq4A8QxXJkdz3qTaQI6A@sample.com"], ["password_digest", "$2a$04$9JqnkKf6HfZ8RN4FASOKZO34temgnejS6bBfTQpS/WavEDIMJcVwe"], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
126
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
127
|
+
Started GET "/" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
128
128
|
Processing by HomeController#index as HTML
|
129
|
-
Completed 200 OK in
|
130
|
-
Started GET "/login" for 127.0.0.1 at 2013-03-
|
129
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
130
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
131
131
|
Processing by SessionsController#new as HTML
|
132
|
-
Completed 200 OK in
|
133
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-03-
|
132
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
133
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
134
134
|
Processing by SessionsController#create as HTML
|
135
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
136
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
137
|
-
Completed 200 OK in 4ms (Views: 1.
|
138
|
-
[1m[36m (
|
139
|
-
[1m[35m (0.
|
140
|
-
[1m[36m (
|
135
|
+
Parameters: {"utf8"=>"✓", "email"=>"XTuq4A8QxXJkdz3qTaQI6A@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
136
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'XTuq4A8QxXJkdz3qTaQI6A@sample.com' LIMIT 1
|
137
|
+
Completed 200 OK in 4ms (Views: 1.4ms | ActiveRecord: 0.2ms)
|
138
|
+
[1m[36m (1.1ms)[0m [1mDELETE FROM "users";[0m
|
139
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
140
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
141
141
|
-----------------------------------
|
142
142
|
AuthproIntegrationTest: test_logout
|
143
143
|
-----------------------------------
|
144
144
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
145
145
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
146
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
147
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
146
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'eSjCqX1jjU504qGIl6PuRw@sample.com' LIMIT 1
|
147
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'Ot9TmDqt41Z1J1rm1TEXzg' LIMIT 1[0m
|
148
148
|
Binary data inserted for `string` type on column `password_digest`
|
149
|
-
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "
|
150
|
-
[1m[36m (0.
|
151
|
-
Started GET "/login" for 127.0.0.1 at 2013-03-
|
149
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "Ot9TmDqt41Z1J1rm1TEXzg"], ["created_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00], ["email", "eSjCqX1jjU504qGIl6PuRw@sample.com"], ["password_digest", "$2a$04$apxgekyeEqzQv8jv5Lx75OylSTSIoBesZeydJyXElLj37n1HN1O2m"], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
150
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
151
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
152
152
|
Processing by SessionsController#new as HTML
|
153
|
-
Completed 200 OK in 2ms (Views: 1.
|
154
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-03-
|
153
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
154
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
155
155
|
Processing by SessionsController#create as HTML
|
156
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
157
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
156
|
+
Parameters: {"utf8"=>"✓", "email"=>"eSjCqX1jjU504qGIl6PuRw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
157
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'eSjCqX1jjU504qGIl6PuRw@sample.com' LIMIT 1
|
158
158
|
Redirected to http://www.example.com/
|
159
|
-
Completed 302 Found in
|
160
|
-
Started GET "/" for 127.0.0.1 at 2013-03-
|
159
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
160
|
+
Started GET "/" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
161
161
|
Processing by HomeController#index as HTML
|
162
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = '
|
163
|
-
Completed 200 OK in 2ms (Views:
|
164
|
-
Started GET "/logout" for 127.0.0.1 at 2013-03-
|
162
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'Ot9TmDqt41Z1J1rm1TEXzg' LIMIT 1[0m
|
163
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.2ms)
|
164
|
+
Started GET "/logout" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
165
165
|
Processing by SessionsController#destroy as HTML
|
166
166
|
Redirected to http://www.example.com/
|
167
167
|
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
168
|
-
Started GET "/" for 127.0.0.1 at 2013-03-
|
168
|
+
Started GET "/" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
169
169
|
Processing by HomeController#index as HTML
|
170
|
-
Completed 200 OK in
|
171
|
-
[1m[35m (
|
170
|
+
Completed 200 OK in 1ms (Views: 0.9ms | ActiveRecord: 0.0ms)
|
171
|
+
[1m[35m (1.2ms)[0m DELETE FROM "users";
|
172
172
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
173
|
-
[1m[35m (0.
|
173
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
174
174
|
-------------------------------------------
|
175
175
|
AuthproIntegrationTest: test_reset_password
|
176
176
|
-------------------------------------------
|
177
177
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
178
178
|
[1m[35m (0.1ms)[0m begin transaction
|
179
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
180
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
179
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'U2JpMMaMnTVEybZJZSP3Kg@sample.com' LIMIT 1[0m
|
180
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'mH1UOHHkhQIL-aehdvR0CA' LIMIT 1
|
181
181
|
Binary data inserted for `string` type on column `password_digest`
|
182
|
-
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
183
|
-
[1m[35m (
|
184
|
-
Started GET "/login" for 127.0.0.1 at 2013-03-
|
182
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "mH1UOHHkhQIL-aehdvR0CA"], ["created_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00], ["email", "U2JpMMaMnTVEybZJZSP3Kg@sample.com"], ["password_digest", "$2a$04$QX.sctyXycqzuETYWep1TOypEgt.C7dFB6yEFVTh1oY4ctTBHB1Ky"], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
183
|
+
[1m[35m (0.9ms)[0m commit transaction
|
184
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
185
185
|
Processing by SessionsController#new as HTML
|
186
186
|
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
187
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-
|
187
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
188
188
|
Processing by PasswordResetsController#new as HTML
|
189
|
-
Completed 200 OK in 4ms (Views: 3.
|
190
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-03-
|
189
|
+
Completed 200 OK in 4ms (Views: 3.9ms | ActiveRecord: 0.0ms)
|
190
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
191
191
|
Processing by PasswordResetsController#create as HTML
|
192
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
193
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
194
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
192
|
+
Parameters: {"utf8"=>"✓", "email"=>"U2JpMMaMnTVEybZJZSP3Kg@sample.com", "commit"=>"Reset password"}
|
193
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'U2JpMMaMnTVEybZJZSP3Kg@sample.com' LIMIT 1[0m
|
194
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'uLe0ptldT7lGsehMxLwfPg' LIMIT 1
|
195
195
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
196
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
197
|
-
[1m[36mSQL (0.
|
198
|
-
[1m[35m (0.
|
196
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'U2JpMMaMnTVEybZJZSP3Kg@sample.com' AND "users"."id" != 1) LIMIT 1
|
197
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "uLe0ptldT7lGsehMxLwfPg"], ["password_reset_sent_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
198
|
+
[1m[35m (0.9ms)[0m commit transaction
|
199
199
|
|
200
|
-
Sent mail to
|
201
|
-
Date:
|
200
|
+
Sent mail to U2JpMMaMnTVEybZJZSP3Kg@sample.com (6.4ms)
|
201
|
+
Date: Thu, 28 Mar 2013 09:51:56 +0100
|
202
202
|
From: from@example.com
|
203
|
-
To:
|
204
|
-
Message-ID: <
|
203
|
+
To: U2JpMMaMnTVEybZJZSP3Kg@sample.com
|
204
|
+
Message-ID: <515404ac6d144_9be63fe1118606781332d@Richards-MacBook-Air.local.mail>
|
205
205
|
Subject: Password Reset
|
206
206
|
Mime-Version: 1.0
|
207
207
|
Content-Type: text/plain;
|
@@ -210,91 +210,91 @@ Content-Transfer-Encoding: 7bit
|
|
210
210
|
|
211
211
|
To reset your password, click the URL below.
|
212
212
|
|
213
|
-
http://localhost:3000/password_resets/
|
213
|
+
http://localhost:3000/password_resets/uLe0ptldT7lGsehMxLwfPg/edit
|
214
214
|
|
215
215
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
216
216
|
Redirected to http://www.example.com/
|
217
|
-
Completed 302 Found in
|
218
|
-
Started GET "/" for 127.0.0.1 at 2013-03-
|
217
|
+
Completed 302 Found in 210ms (ActiveRecord: 1.8ms)
|
218
|
+
Started GET "/" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
219
219
|
Processing by HomeController#index as HTML
|
220
|
-
Completed 200 OK in 1ms (Views: 1.
|
221
|
-
Started GET "/password_resets/
|
220
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
221
|
+
Started GET "/password_resets/uLe0ptldT7lGsehMxLwfPg/edit" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
222
222
|
Processing by PasswordResetsController#edit as HTML
|
223
|
-
Parameters: {"id"=>"
|
224
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
225
|
-
Completed 200 OK in
|
226
|
-
Started PATCH "/password_resets/
|
223
|
+
Parameters: {"id"=>"uLe0ptldT7lGsehMxLwfPg"}
|
224
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'uLe0ptldT7lGsehMxLwfPg' LIMIT 1[0m
|
225
|
+
Completed 200 OK in 11ms (Views: 9.8ms | ActiveRecord: 0.2ms)
|
226
|
+
Started PATCH "/password_resets/uLe0ptldT7lGsehMxLwfPg" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
227
227
|
Processing by PasswordResetsController#update as HTML
|
228
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
229
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
230
|
-
[1m[36m (0.
|
231
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
228
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"uLe0ptldT7lGsehMxLwfPg"}
|
229
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'uLe0ptldT7lGsehMxLwfPg' LIMIT 1
|
230
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
231
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'U2JpMMaMnTVEybZJZSP3Kg@sample.com' AND "users"."id" != 1) LIMIT 1
|
232
232
|
Binary data inserted for `string` type on column `password_digest`
|
233
|
-
[1m[36mSQL (0.
|
234
|
-
[1m[35m (
|
233
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$am45ZYxXEYIeB/QEOgmp0upXbghKVHVH0/X9JACFPta9KBQLh2HFu"], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
234
|
+
[1m[35m (2.5ms)[0m commit transaction
|
235
235
|
Redirected to http://localhost:3000/
|
236
|
-
Completed 302 Found in 7ms (ActiveRecord:
|
237
|
-
Started GET "/" for 127.0.0.1 at 2013-03-
|
236
|
+
Completed 302 Found in 7ms (ActiveRecord: 3.1ms)
|
237
|
+
Started GET "/" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
238
238
|
Processing by HomeController#index as HTML
|
239
|
-
Completed 200 OK in
|
239
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
240
240
|
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
241
241
|
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
242
|
-
[1m[36m (0.
|
242
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
243
243
|
--------------------------------------------------------------------------------
|
244
244
|
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
245
245
|
--------------------------------------------------------------------------------
|
246
246
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
247
247
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
248
|
-
[1m[35mUser Exists (0.
|
249
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
248
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'oVM5fjHHnTjF3JE9EC7wbA@sample.com' LIMIT 1
|
249
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '7mjwwUv2cIDoq2H1eVS-Ow' LIMIT 1[0m
|
250
250
|
Binary data inserted for `string` type on column `password_digest`
|
251
|
-
[1m[35mSQL (0.
|
252
|
-
[1m[36m (0.
|
253
|
-
Started GET "/login" for 127.0.0.1 at 2013-03-
|
251
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "7mjwwUv2cIDoq2H1eVS-Ow"], ["created_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00], ["email", "oVM5fjHHnTjF3JE9EC7wbA@sample.com"], ["password_digest", "$2a$04$bZGqgTrv0peRaG/0xAwGuuBlfegEKq3RU6ATcit7cd0l.V/IpX8Lu"], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
252
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
253
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
254
254
|
Processing by SessionsController#new as HTML
|
255
|
-
Completed 200 OK in 2ms (Views: 1.
|
256
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-
|
255
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
256
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
257
257
|
Processing by PasswordResetsController#new as HTML
|
258
|
-
Completed 200 OK in 1ms (Views: 1.
|
259
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-03-
|
258
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
259
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
260
260
|
Processing by PasswordResetsController#create as HTML
|
261
261
|
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
262
262
|
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
263
|
-
Completed 200 OK in
|
264
|
-
[1m[36m (
|
263
|
+
Completed 200 OK in 2ms (Views: 0.9ms | ActiveRecord: 0.2ms)
|
264
|
+
[1m[36m (1.1ms)[0m [1mDELETE FROM "users";[0m
|
265
265
|
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
266
|
-
[1m[36m (0.
|
266
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
267
267
|
-------------------------------------------------------------------------
|
268
268
|
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
269
269
|
-------------------------------------------------------------------------
|
270
270
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
271
271
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
272
|
-
[1m[35mUser Exists (0.
|
273
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
272
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '1bIs5hzntfHwsxlsIb0IZw@sample.com' LIMIT 1
|
273
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'GLXNG6QJpCutNjA0L4uSkw' LIMIT 1[0m
|
274
274
|
Binary data inserted for `string` type on column `password_digest`
|
275
|
-
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "
|
276
|
-
[1m[36m (0.
|
277
|
-
Started GET "/login" for 127.0.0.1 at 2013-03-
|
275
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "GLXNG6QJpCutNjA0L4uSkw"], ["created_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00], ["email", "1bIs5hzntfHwsxlsIb0IZw@sample.com"], ["password_digest", "$2a$04$eqioHVKRajL4HOnr5bu4n.XfWgF0QGaInVCABuMj41PCZDdFxumRe"], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
276
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
277
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
278
278
|
Processing by SessionsController#new as HTML
|
279
|
-
Completed 200 OK in 2ms (Views:
|
280
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-
|
279
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
280
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
281
281
|
Processing by PasswordResetsController#new as HTML
|
282
|
-
Completed 200 OK in
|
283
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-03-
|
282
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
283
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
284
284
|
Processing by PasswordResetsController#create as HTML
|
285
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
286
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
287
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
285
|
+
Parameters: {"utf8"=>"✓", "email"=>"1bIs5hzntfHwsxlsIb0IZw@sample.com", "commit"=>"Reset password"}
|
286
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '1bIs5hzntfHwsxlsIb0IZw@sample.com' LIMIT 1
|
287
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'oJ5IclIxIaIYgXvkmPgAmA' LIMIT 1[0m
|
288
288
|
[1m[35m (0.1ms)[0m begin transaction
|
289
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
290
|
-
[1m[35mSQL (0.
|
289
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '1bIs5hzntfHwsxlsIb0IZw@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
290
|
+
[1m[35mSQL (0.4ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "oJ5IclIxIaIYgXvkmPgAmA"], ["password_reset_sent_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
291
291
|
[1m[36m (0.6ms)[0m [1mcommit transaction[0m
|
292
292
|
|
293
|
-
Sent mail to
|
294
|
-
Date:
|
293
|
+
Sent mail to 1bIs5hzntfHwsxlsIb0IZw@sample.com (4.5ms)
|
294
|
+
Date: Thu, 28 Mar 2013 09:51:56 +0100
|
295
295
|
From: from@example.com
|
296
|
-
To:
|
297
|
-
Message-ID: <
|
296
|
+
To: 1bIs5hzntfHwsxlsIb0IZw@sample.com
|
297
|
+
Message-ID: <515404ac93f2c_9be63fe11186067813472@Richards-MacBook-Air.local.mail>
|
298
298
|
Subject: Password Reset
|
299
299
|
Mime-Version: 1.0
|
300
300
|
Content-Type: text/plain;
|
@@ -303,62 +303,62 @@ Content-Transfer-Encoding: 7bit
|
|
303
303
|
|
304
304
|
To reset your password, click the URL below.
|
305
305
|
|
306
|
-
http://localhost:3000/password_resets/
|
306
|
+
http://localhost:3000/password_resets/oJ5IclIxIaIYgXvkmPgAmA/edit
|
307
307
|
|
308
308
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
309
309
|
Redirected to http://www.example.com/
|
310
|
-
Completed 302 Found in
|
311
|
-
Started GET "/" for 127.0.0.1 at 2013-03-
|
310
|
+
Completed 302 Found in 16ms (ActiveRecord: 1.5ms)
|
311
|
+
Started GET "/" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
312
312
|
Processing by HomeController#index as HTML
|
313
|
-
Completed 200 OK in 1ms (Views: 1.
|
314
|
-
Started GET "/password_resets/
|
313
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
314
|
+
Started GET "/password_resets/oJ5IclIxIaIYgXvkmPgAmA/edit" for 127.0.0.1 at 2013-03-30 01:00:00 +0100
|
315
315
|
Processing by PasswordResetsController#edit as HTML
|
316
|
-
Parameters: {"id"=>"
|
317
|
-
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
316
|
+
Parameters: {"id"=>"oJ5IclIxIaIYgXvkmPgAmA"}
|
317
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'oJ5IclIxIaIYgXvkmPgAmA' LIMIT 1
|
318
318
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
319
|
-
Started PATCH "/password_resets/
|
319
|
+
Started PATCH "/password_resets/oJ5IclIxIaIYgXvkmPgAmA" for 127.0.0.1 at 2013-03-30 01:00:00 +0100
|
320
320
|
Processing by PasswordResetsController#update as HTML
|
321
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
322
|
-
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
321
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"oJ5IclIxIaIYgXvkmPgAmA"}
|
322
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'oJ5IclIxIaIYgXvkmPgAmA' LIMIT 1[0m
|
323
323
|
Redirected to http://localhost:3000/password_resets/new
|
324
324
|
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
325
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-
|
325
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-30 01:00:00 +0100
|
326
326
|
Processing by PasswordResetsController#new as HTML
|
327
327
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
328
|
-
[1m[35m (
|
329
|
-
[1m[36m (0.
|
330
|
-
[1m[35m (
|
328
|
+
[1m[35m (2.1ms)[0m DELETE FROM "users";
|
329
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
330
|
+
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
331
331
|
-------------------------------------------------------------------------------------------
|
332
332
|
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
333
333
|
-------------------------------------------------------------------------------------------
|
334
334
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
335
335
|
[1m[35m (0.1ms)[0m begin transaction
|
336
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
337
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
336
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'DzO8Wy3pcPWIIpduQ5vKZA@sample.com' LIMIT 1[0m
|
337
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'cvNPXvr9HL-pk0dvmyuwMA' LIMIT 1
|
338
338
|
Binary data inserted for `string` type on column `password_digest`
|
339
|
-
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
340
|
-
[1m[35m (0.
|
341
|
-
Started GET "/login" for 127.0.0.1 at 2013-03-
|
339
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "cvNPXvr9HL-pk0dvmyuwMA"], ["created_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00], ["email", "DzO8Wy3pcPWIIpduQ5vKZA@sample.com"], ["password_digest", "$2a$04$E0NwVVMsEy57jaXIfqxV3ub95Iax6ixC1K1T3vPAB8.t17HspnKLy"], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
340
|
+
[1m[35m (0.9ms)[0m commit transaction
|
341
|
+
Started GET "/login" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
342
342
|
Processing by SessionsController#new as HTML
|
343
343
|
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
344
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-
|
344
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
345
345
|
Processing by PasswordResetsController#new as HTML
|
346
|
-
Completed 200 OK in 1ms (Views: 1.
|
347
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-03-
|
346
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
347
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
348
348
|
Processing by PasswordResetsController#create as HTML
|
349
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
350
|
-
[1m[36mUser Load (0.
|
351
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
352
|
-
[1m[36m (0.
|
353
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
354
|
-
[1m[36mSQL (0.
|
355
|
-
[1m[35m (0.
|
349
|
+
Parameters: {"utf8"=>"✓", "email"=>"DzO8Wy3pcPWIIpduQ5vKZA@sample.com", "commit"=>"Reset password"}
|
350
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'DzO8Wy3pcPWIIpduQ5vKZA@sample.com' LIMIT 1[0m
|
351
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'l3dpvYh2-QUiM-ioqHIOjg' LIMIT 1
|
352
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
353
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'DzO8Wy3pcPWIIpduQ5vKZA@sample.com' AND "users"."id" != 1) LIMIT 1
|
354
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "l3dpvYh2-QUiM-ioqHIOjg"], ["password_reset_sent_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
355
|
+
[1m[35m (0.5ms)[0m commit transaction
|
356
356
|
|
357
|
-
Sent mail to
|
358
|
-
Date:
|
357
|
+
Sent mail to DzO8Wy3pcPWIIpduQ5vKZA@sample.com (5.0ms)
|
358
|
+
Date: Thu, 28 Mar 2013 09:51:56 +0100
|
359
359
|
From: from@example.com
|
360
|
-
To:
|
361
|
-
Message-ID: <
|
360
|
+
To: DzO8Wy3pcPWIIpduQ5vKZA@sample.com
|
361
|
+
Message-ID: <515404aca5503_9be63fe11186067813571@Richards-MacBook-Air.local.mail>
|
362
362
|
Subject: Password Reset
|
363
363
|
Mime-Version: 1.0
|
364
364
|
Content-Type: text/plain;
|
@@ -367,102 +367,102 @@ Content-Transfer-Encoding: 7bit
|
|
367
367
|
|
368
368
|
To reset your password, click the URL below.
|
369
369
|
|
370
|
-
http://localhost:3000/password_resets/
|
370
|
+
http://localhost:3000/password_resets/l3dpvYh2-QUiM-ioqHIOjg/edit
|
371
371
|
|
372
372
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
373
373
|
Redirected to http://www.example.com/
|
374
|
-
Completed 302 Found in
|
375
|
-
Started GET "/" for 127.0.0.1 at 2013-03-
|
374
|
+
Completed 302 Found in 16ms (ActiveRecord: 1.3ms)
|
375
|
+
Started GET "/" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
376
376
|
Processing by HomeController#index as HTML
|
377
|
-
Completed 200 OK in
|
378
|
-
Started GET "/password_resets/
|
377
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
378
|
+
Started GET "/password_resets/l3dpvYh2-QUiM-ioqHIOjg/edit" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
379
379
|
Processing by PasswordResetsController#edit as HTML
|
380
|
-
Parameters: {"id"=>"
|
381
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
382
|
-
Completed 200 OK in 4ms (Views:
|
383
|
-
Started PATCH "/password_resets/
|
380
|
+
Parameters: {"id"=>"l3dpvYh2-QUiM-ioqHIOjg"}
|
381
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'l3dpvYh2-QUiM-ioqHIOjg' LIMIT 1[0m
|
382
|
+
Completed 200 OK in 4ms (Views: 2.3ms | ActiveRecord: 0.2ms)
|
383
|
+
Started PATCH "/password_resets/l3dpvYh2-QUiM-ioqHIOjg" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
384
384
|
Processing by PasswordResetsController#update as HTML
|
385
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
386
|
-
[1m[35mUser Load (0.
|
387
|
-
[1m[36m (0.
|
388
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
385
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"l3dpvYh2-QUiM-ioqHIOjg"}
|
386
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'l3dpvYh2-QUiM-ioqHIOjg' LIMIT 1
|
387
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
388
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'DzO8Wy3pcPWIIpduQ5vKZA@sample.com' AND "users"."id" != 1) LIMIT 1
|
389
389
|
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
390
|
-
Completed 200 OK in
|
391
|
-
[1m[35m (
|
392
|
-
[1m[36m (0.
|
393
|
-
[1m[35m (
|
390
|
+
Completed 200 OK in 7ms (Views: 2.7ms | ActiveRecord: 0.3ms)
|
391
|
+
[1m[35m (1.3ms)[0m DELETE FROM "users";
|
392
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
393
|
+
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
394
394
|
-----------------------------------
|
395
395
|
AuthproIntegrationTest: test_signup
|
396
396
|
-----------------------------------
|
397
397
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
398
398
|
[1m[35m (0.1ms)[0m begin transaction
|
399
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
400
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
399
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'Qx-KuBsk963W94ZPp_yjYg@sample.com' LIMIT 1[0m
|
400
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'ptsH4WJxHVOmmLLAGRY_8Q' LIMIT 1
|
401
401
|
Binary data inserted for `string` type on column `password_digest`
|
402
|
-
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
403
|
-
[1m[35m (0.
|
404
|
-
Started GET "/" for 127.0.0.1 at 2013-03-
|
402
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "ptsH4WJxHVOmmLLAGRY_8Q"], ["created_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00], ["email", "Qx-KuBsk963W94ZPp_yjYg@sample.com"], ["password_digest", "$2a$04$udnUPGKvPI4H6TWOy3DypeU8/B4Ui1.M6czwAPeEytDUyfYDVKCG2"], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
403
|
+
[1m[35m (0.7ms)[0m commit transaction
|
404
|
+
Started GET "/" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
405
405
|
Processing by HomeController#index as HTML
|
406
|
-
Completed 200 OK in
|
407
|
-
Started GET "/signup" for 127.0.0.1 at 2013-03-
|
406
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
407
|
+
Started GET "/signup" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
408
408
|
Processing by UsersController#new as HTML
|
409
|
-
Completed 200 OK in
|
410
|
-
Started POST "/users" for 127.0.0.1 at 2013-03-
|
409
|
+
Completed 200 OK in 5ms (Views: 4.5ms | ActiveRecord: 0.0ms)
|
410
|
+
Started POST "/users" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
411
411
|
Processing by UsersController#create as HTML
|
412
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
412
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"0uDAhCyGu7zOSTMsmX14tA@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
413
413
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
414
|
-
[1m[35mUser Exists (0.
|
415
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
414
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '0uDAhCyGu7zOSTMsmX14tA@sample.com' LIMIT 1
|
415
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'QjVN_3iUh3mx68PiZi9kkw' LIMIT 1[0m
|
416
416
|
Binary data inserted for `string` type on column `password_digest`
|
417
|
-
[1m[35mSQL (0.
|
418
|
-
[1m[36m (
|
417
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "QjVN_3iUh3mx68PiZi9kkw"], ["created_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00], ["email", "0uDAhCyGu7zOSTMsmX14tA@sample.com"], ["password_digest", "$2a$04$baC6uqG6f9HCsm/aOZHv9OHkATSNS24eFoZQ0lsBR1kKAZnlj4c.W"], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
418
|
+
[1m[36m (1.5ms)[0m [1mcommit transaction[0m
|
419
419
|
Redirected to http://www.example.com/
|
420
|
-
Completed 302 Found in 6ms (ActiveRecord:
|
421
|
-
Started GET "/" for 127.0.0.1 at 2013-03-
|
420
|
+
Completed 302 Found in 6ms (ActiveRecord: 2.0ms)
|
421
|
+
Started GET "/" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
422
422
|
Processing by HomeController#index as HTML
|
423
|
-
Completed 200 OK in
|
424
|
-
[1m[35m (
|
423
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
424
|
+
[1m[35m (1.2ms)[0m DELETE FROM "users";
|
425
425
|
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
426
|
-
[1m[35m (
|
426
|
+
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
427
427
|
-------------------------------------------
|
428
428
|
AuthproIntegrationTest: test_signup_failing
|
429
429
|
-------------------------------------------
|
430
430
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
431
431
|
[1m[35m (0.1ms)[0m begin transaction
|
432
|
-
[1m[36mUser Exists (0.
|
433
|
-
[1m[35mUser Exists (0.
|
432
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '6G7PMzesoAKtxzVOL4p6tg@sample.com' LIMIT 1[0m
|
433
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'f0p_VB67GUF_83hqaVHcZQ' LIMIT 1
|
434
434
|
Binary data inserted for `string` type on column `password_digest`
|
435
|
-
[1m[36mSQL (0.
|
436
|
-
[1m[35m (
|
437
|
-
Started GET "/" for 127.0.0.1 at 2013-03-
|
435
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "f0p_VB67GUF_83hqaVHcZQ"], ["created_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00], ["email", "6G7PMzesoAKtxzVOL4p6tg@sample.com"], ["password_digest", "$2a$04$GWhXB9L38kqDqsxCtZp26OAKkIV0rN5vxuicAkI1dc1tKyoh8KzQe"], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
436
|
+
[1m[35m (1.1ms)[0m commit transaction
|
437
|
+
Started GET "/" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
438
438
|
Processing by HomeController#index as HTML
|
439
|
-
Completed 200 OK in 1ms (Views: 1.
|
440
|
-
Started GET "/signup" for 127.0.0.1 at 2013-03-
|
439
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
440
|
+
Started GET "/signup" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
441
441
|
Processing by UsersController#new as HTML
|
442
|
-
Completed 200 OK in
|
443
|
-
Started POST "/users" for 127.0.0.1 at 2013-03-
|
442
|
+
Completed 200 OK in 2ms (Views: 2.3ms | ActiveRecord: 0.0ms)
|
443
|
+
Started POST "/users" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
444
444
|
Processing by UsersController#create as HTML
|
445
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
445
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"deHTYb1CFakna_5x1lQSAQ@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
446
446
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
447
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
447
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'deHTYb1CFakna_5x1lQSAQ@sample.com' LIMIT 1
|
448
448
|
[1m[36m (0.0ms)[0m [1mrollback transaction[0m
|
449
|
-
Completed 200 OK in 7ms (Views: 3.
|
450
|
-
[1m[35m (1.
|
451
|
-
[1m[36m (0.
|
452
|
-
[1m[35m (0.
|
449
|
+
Completed 200 OK in 7ms (Views: 3.0ms | ActiveRecord: 0.3ms)
|
450
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
451
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
452
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
453
453
|
---------------------------------------
|
454
454
|
AuthproIntegrationTest: test_visit_home
|
455
455
|
---------------------------------------
|
456
456
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
457
457
|
[1m[35m (0.1ms)[0m begin transaction
|
458
|
-
[1m[36mUser Exists (0.
|
459
|
-
[1m[35mUser Exists (0.
|
458
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'FCJ59coSrZqkpwm5MheW0A@sample.com' LIMIT 1[0m
|
459
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'fnpEzZgtQSPOtnS8NZQQwA' LIMIT 1
|
460
460
|
Binary data inserted for `string` type on column `password_digest`
|
461
|
-
[1m[36mSQL (0.
|
462
|
-
[1m[35m (
|
463
|
-
Started GET "/" for 127.0.0.1 at 2013-03-
|
461
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "fnpEzZgtQSPOtnS8NZQQwA"], ["created_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00], ["email", "FCJ59coSrZqkpwm5MheW0A@sample.com"], ["password_digest", "$2a$04$baJINTC9nJ2ekXfi0479o.FOHqZSCQ0Vor2b5whS5GJO3ntP/4y4."], ["updated_at", Thu, 28 Mar 2013 08:51:56 UTC +00:00]]
|
462
|
+
[1m[35m (1.1ms)[0m commit transaction
|
463
|
+
Started GET "/" for 127.0.0.1 at 2013-03-28 09:51:56 +0100
|
464
464
|
Processing by HomeController#index as HTML
|
465
|
-
Completed 200 OK in
|
466
|
-
[1m[36m (
|
467
|
-
[1m[35m (0.
|
468
|
-
[1m[36m (0.
|
465
|
+
Completed 200 OK in 1ms (Views: 0.9ms | ActiveRecord: 0.0ms)
|
466
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
467
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
468
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
@@ -5,11 +5,11 @@ one:
|
|
5
5
|
password_digest: MyString
|
6
6
|
auth_token: MyString
|
7
7
|
password_reset_token: MyString
|
8
|
-
password_reset_sent_at: 2013-03-
|
8
|
+
password_reset_sent_at: 2013-03-28 09:51:55
|
9
9
|
|
10
10
|
two:
|
11
11
|
email: MyString
|
12
12
|
password_digest: MyString
|
13
13
|
auth_token: MyString
|
14
14
|
password_reset_token: MyString
|
15
|
-
password_reset_sent_at: 2013-03-
|
15
|
+
password_reset_sent_at: 2013-03-28 09:51:55
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: authpro
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.9.
|
4
|
+
version: 0.9.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Richard Nyström
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2013-03-
|
11
|
+
date: 2013-03-28 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: rails
|
@@ -209,7 +209,7 @@ files:
|
|
209
209
|
- test/rails/dummy/config/locales/en.yml
|
210
210
|
- test/rails/dummy/config/routes.rb
|
211
211
|
- test/rails/dummy/config.ru
|
212
|
-
- test/rails/dummy/db/migrate/
|
212
|
+
- test/rails/dummy/db/migrate/20130328085155_create_users.rb
|
213
213
|
- test/rails/dummy/db/test.sqlite3
|
214
214
|
- test/rails/dummy/Gemfile
|
215
215
|
- test/rails/dummy/Gemfile.lock
|
@@ -327,7 +327,7 @@ test_files:
|
|
327
327
|
- test/rails/dummy/config/locales/en.yml
|
328
328
|
- test/rails/dummy/config/routes.rb
|
329
329
|
- test/rails/dummy/config.ru
|
330
|
-
- test/rails/dummy/db/migrate/
|
330
|
+
- test/rails/dummy/db/migrate/20130328085155_create_users.rb
|
331
331
|
- test/rails/dummy/db/test.sqlite3
|
332
332
|
- test/rails/dummy/Gemfile
|
333
333
|
- test/rails/dummy/Gemfile.lock
|