authpro 0.9.1 → 0.9.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +3 -3
- data/lib/authpro/version.rb +1 -1
- data/test/dummy/config/initializers/session_store.rb +1 -1
- data/test/rails/dummy/config/initializers/session_store.rb +1 -1
- data/test/rails/dummy/db/migrate/{20130328085155_create_users.rb → 20130430211809_create_users.rb} +0 -0
- data/test/rails/dummy/db/test.sqlite3 +0 -0
- data/test/rails/dummy/log/test.log +227 -227
- data/test/rails/dummy/test/fixtures/users.yml +2 -2
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/13fe41fee1fe35b49d145bcc06610705 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/2f5173deea6c795b8fdde723bb4b63af +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/357970feca3ac29060c1e3861e2c0953 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/cffd775d018f68ce5dba1ee0d951a994 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/d771ace226fc8215a3572e0aa35bb0d6 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/f7cbd26ba1d28d48de824f0e94586655 +0 -0
- metadata +6 -6
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 82223afabf2e218a462f9ef743bda7f43974de70
|
4
|
+
data.tar.gz: b328f0cdb9ae80f85e213978da6c53aeeb8c638b
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 69a889523735d8a5b410070ff380f3e84c292279d5b69349510c59162420846031fb1ffea4afb3f00b468d3873390efb5e36a01b0d7dc07745ce74879d0834eb
|
7
|
+
data.tar.gz: c30a456b3ba66cad375b3b4673ebc5a0ecea31e4518371c56e4d01a8547d97b458eb0705365773aa66611b73c1b0bb460c49c256261188b89caeec31a7bdd32c
|
data/README.md
CHANGED
@@ -3,11 +3,11 @@
|
|
3
3
|
[![Code Climate](https://codeclimate.com/github/ricn/authpro.png)](https://codeclimate.com/github/ricn/authpro)
|
4
4
|
[![Build Status](https://travis-ci.org/ricn/authpro.png?branch=master)](https://travis-ci.org/ricn/authpro)
|
5
5
|
|
6
|
-
Authpro is a simple authentication generator for Rails 4. It:
|
6
|
+
Authpro is a simple authentication generator for Rails 4.0.0.rc1 It:
|
7
7
|
|
8
|
-
* Gives you sign up, log in, remember me & password reset
|
8
|
+
* Gives you sign up, log in, remember me & password reset functionality
|
9
9
|
* Has no hidden code, special super classes or mixins
|
10
|
-
* Has no configuration
|
10
|
+
* Has no configuration.
|
11
11
|
|
12
12
|
Authpro assumes you want:
|
13
13
|
|
data/lib/authpro/version.rb
CHANGED
data/test/rails/dummy/db/migrate/{20130328085155_create_users.rb → 20130430211809_create_users.rb}
RENAMED
File without changes
|
Binary file
|
@@ -70,138 +70,138 @@ AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
70
70
|
----------------------------------------------------------------
|
71
71
|
[1m[36m (0.3ms)[0m [1mbegin transaction[0m
|
72
72
|
[1m[35m (0.1ms)[0m rollback transaction
|
73
|
+
[1m[36m (0.3ms)[0m [1mbegin transaction[0m
|
73
74
|
------------------------------------------
|
74
75
|
AuthproGeneratorTest: test_generated_files
|
75
76
|
------------------------------------------
|
76
|
-
[1m[
|
77
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
77
|
+
[1m[35m (0.2ms)[0m rollback transaction
|
78
78
|
----------------------------------
|
79
79
|
AuthproIntegrationTest: test_login
|
80
80
|
----------------------------------
|
81
|
-
[1m[36m (1.
|
82
|
-
[1m[35m (1.
|
81
|
+
[1m[36m (1.3ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
82
|
+
[1m[35m (1.1ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
83
83
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
84
|
-
Migrating to CreateUsers (
|
84
|
+
Migrating to CreateUsers (20130430211809)
|
85
85
|
[1m[35m (0.1ms)[0m begin transaction
|
86
|
-
[1m[36m (0.
|
87
|
-
[1m[35mSQL (0.
|
88
|
-
[1m[36m (
|
86
|
+
[1m[36m (0.4ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
87
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20130430211809"]]
|
88
|
+
[1m[36m (1.1ms)[0m [1mcommit transaction[0m
|
89
89
|
[1m[35m (0.1ms)[0m begin transaction
|
90
|
-
[1m[36mUser Exists (0.
|
91
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
90
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '47OURNJjM8HIk18nEONqmA@sample.com' LIMIT 1[0m
|
91
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'cZiucLbzPEcc12nj-I-eEw' LIMIT 1
|
92
92
|
Binary data inserted for `string` type on column `password_digest`
|
93
|
-
[1m[36mSQL (
|
94
|
-
[1m[35m (
|
95
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
93
|
+
[1m[36mSQL (5.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "cZiucLbzPEcc12nj-I-eEw"], ["created_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00], ["email", "47OURNJjM8HIk18nEONqmA@sample.com"], ["password_digest", "$2a$04$dhblGTlG36P1wQius.B.heeECV6Ah.9t7B9Byb9sJ9gmz.afcq3B6"], ["updated_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00]]
|
94
|
+
[1m[35m (2.3ms)[0m commit transaction
|
95
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
96
96
|
Processing by HomeController#index as HTML
|
97
|
-
Rendered home/index.html.erb within layouts/application (
|
98
|
-
Completed 200 OK in
|
99
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
97
|
+
Rendered home/index.html.erb within layouts/application (1.5ms)
|
98
|
+
Completed 200 OK in 43ms (Views: 42.7ms | ActiveRecord: 0.0ms)
|
99
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
100
100
|
Processing by SessionsController#new as HTML
|
101
|
-
Rendered sessions/new.html.erb within layouts/application (
|
102
|
-
Completed 200 OK in
|
103
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
101
|
+
Rendered sessions/new.html.erb within layouts/application (2.1ms)
|
102
|
+
Completed 200 OK in 6ms (Views: 5.1ms | ActiveRecord: 0.0ms)
|
103
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
104
104
|
Processing by SessionsController#create as HTML
|
105
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
106
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
105
|
+
Parameters: {"utf8"=>"✓", "email"=>"47OURNJjM8HIk18nEONqmA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
106
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '47OURNJjM8HIk18nEONqmA@sample.com' LIMIT 1[0m
|
107
107
|
Redirected to http://www.example.com/
|
108
|
-
Completed 302 Found in
|
109
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
108
|
+
Completed 302 Found in 8ms (ActiveRecord: 0.2ms)
|
109
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
110
110
|
Processing by HomeController#index as HTML
|
111
111
|
Rendered home/index.html.erb within layouts/application (0.1ms)
|
112
|
-
[1m[35mUser Load (0.
|
113
|
-
Completed 200 OK in
|
114
|
-
[1m[36m (
|
112
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'cZiucLbzPEcc12nj-I-eEw' LIMIT 1
|
113
|
+
Completed 200 OK in 4ms (Views: 3.7ms | ActiveRecord: 0.2ms)
|
114
|
+
[1m[36m (1.3ms)[0m [1mDELETE FROM "users";[0m
|
115
115
|
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
116
|
-
[1m[36m (
|
116
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
117
117
|
------------------------------------------
|
118
118
|
AuthproIntegrationTest: test_login_failing
|
119
119
|
------------------------------------------
|
120
120
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
121
|
-
[1m[36m (0.
|
122
|
-
[1m[35mUser Exists (0.
|
123
|
-
[1m[36mUser Exists (0.
|
121
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
122
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'YR807SlBnnb9sKWLya8Kng@sample.com' LIMIT 1
|
123
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'W9TZGZfwqzstL90XhlgpHw' LIMIT 1[0m
|
124
124
|
Binary data inserted for `string` type on column `password_digest`
|
125
|
-
[1m[35mSQL (0.
|
126
|
-
[1m[36m (
|
127
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
125
|
+
[1m[35mSQL (0.7ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "W9TZGZfwqzstL90XhlgpHw"], ["created_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00], ["email", "YR807SlBnnb9sKWLya8Kng@sample.com"], ["password_digest", "$2a$04$sg8Xi.ck1WUA4561E2ZY/uIy3TZdNdwW.GDggBD45nJLwYyCdxGOe"], ["updated_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00]]
|
126
|
+
[1m[36m (1.2ms)[0m [1mcommit transaction[0m
|
127
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
128
128
|
Processing by HomeController#index as HTML
|
129
|
-
Completed 200 OK in
|
130
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
129
|
+
Completed 200 OK in 3ms (Views: 2.4ms | ActiveRecord: 0.0ms)
|
130
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
131
131
|
Processing by SessionsController#new as HTML
|
132
|
-
Completed 200 OK in
|
133
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
132
|
+
Completed 200 OK in 2ms (Views: 2.3ms | ActiveRecord: 0.0ms)
|
133
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
134
134
|
Processing by SessionsController#create as HTML
|
135
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
136
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
137
|
-
Completed 200 OK in
|
135
|
+
Parameters: {"utf8"=>"✓", "email"=>"YR807SlBnnb9sKWLya8Kng@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
136
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'YR807SlBnnb9sKWLya8Kng@sample.com' LIMIT 1
|
137
|
+
Completed 200 OK in 9ms (Views: 2.0ms | ActiveRecord: 0.2ms)
|
138
138
|
[1m[36m (1.1ms)[0m [1mDELETE FROM "users";[0m
|
139
|
-
[1m[35m (0.
|
139
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
140
140
|
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
141
141
|
-----------------------------------
|
142
142
|
AuthproIntegrationTest: test_logout
|
143
143
|
-----------------------------------
|
144
144
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
145
145
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
146
|
-
[1m[35mUser Exists (0.
|
147
|
-
[1m[36mUser Exists (0.
|
146
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '8IxygiRKzwYM6JQmJLS_Yw@sample.com' LIMIT 1
|
147
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'L8qzFoVJtAcabFz-qHfyEg' LIMIT 1[0m
|
148
148
|
Binary data inserted for `string` type on column `password_digest`
|
149
|
-
[1m[35mSQL (0.
|
150
|
-
[1m[36m (
|
151
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
149
|
+
[1m[35mSQL (0.6ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "L8qzFoVJtAcabFz-qHfyEg"], ["created_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00], ["email", "8IxygiRKzwYM6JQmJLS_Yw@sample.com"], ["password_digest", "$2a$04$hE.irdOg6XVflKARSsggnerFRKB44.gYCL0VACjqo/RTlYaWSGK2O"], ["updated_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00]]
|
150
|
+
[1m[36m (1.0ms)[0m [1mcommit transaction[0m
|
151
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
152
152
|
Processing by SessionsController#new as HTML
|
153
|
-
Completed 200 OK in
|
154
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
153
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
154
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
155
155
|
Processing by SessionsController#create as HTML
|
156
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
157
|
-
[1m[35mUser Load (0.
|
156
|
+
Parameters: {"utf8"=>"✓", "email"=>"8IxygiRKzwYM6JQmJLS_Yw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
157
|
+
[1m[35mUser Load (0.3ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '8IxygiRKzwYM6JQmJLS_Yw@sample.com' LIMIT 1
|
158
158
|
Redirected to http://www.example.com/
|
159
|
-
Completed 302 Found in
|
160
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
159
|
+
Completed 302 Found in 7ms (ActiveRecord: 0.3ms)
|
160
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
161
161
|
Processing by HomeController#index as HTML
|
162
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = '
|
163
|
-
Completed 200 OK in
|
164
|
-
Started GET "/logout" for 127.0.0.1 at 2013-
|
162
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'L8qzFoVJtAcabFz-qHfyEg' LIMIT 1[0m
|
163
|
+
Completed 200 OK in 3ms (Views: 2.6ms | ActiveRecord: 0.2ms)
|
164
|
+
Started GET "/logout" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
165
165
|
Processing by SessionsController#destroy as HTML
|
166
166
|
Redirected to http://www.example.com/
|
167
|
-
Completed 302 Found in
|
168
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
167
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
168
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
169
169
|
Processing by HomeController#index as HTML
|
170
|
-
Completed 200 OK in
|
171
|
-
[1m[35m (1.
|
170
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
171
|
+
[1m[35m (1.3ms)[0m DELETE FROM "users";
|
172
172
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
173
|
-
[1m[35m (
|
173
|
+
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
174
174
|
-------------------------------------------
|
175
175
|
AuthproIntegrationTest: test_reset_password
|
176
176
|
-------------------------------------------
|
177
177
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
178
178
|
[1m[35m (0.1ms)[0m begin transaction
|
179
|
-
[1m[36mUser Exists (0.
|
180
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
179
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'asfOdzA9kqagHoMGLmqLpQ@sample.com' LIMIT 1[0m
|
180
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'quw1QSoRoeNAnNLxPSMcwA' LIMIT 1
|
181
181
|
Binary data inserted for `string` type on column `password_digest`
|
182
|
-
[1m[36mSQL (0.
|
183
|
-
[1m[35m (0.
|
184
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
182
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "quw1QSoRoeNAnNLxPSMcwA"], ["created_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00], ["email", "asfOdzA9kqagHoMGLmqLpQ@sample.com"], ["password_digest", "$2a$04$VNgqYg2fJ4nVlpmrFux8kOL/RYq.Z19TYJIpPXPBqhk4.fRCN2l3O"], ["updated_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00]]
|
183
|
+
[1m[35m (0.8ms)[0m commit transaction
|
184
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
185
185
|
Processing by SessionsController#new as HTML
|
186
|
-
Completed 200 OK in
|
187
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
186
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
187
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
188
188
|
Processing by PasswordResetsController#new as HTML
|
189
|
-
Completed 200 OK in
|
190
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
189
|
+
Completed 200 OK in 5ms (Views: 4.7ms | ActiveRecord: 0.0ms)
|
190
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
191
191
|
Processing by PasswordResetsController#create as HTML
|
192
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
193
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
194
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
192
|
+
Parameters: {"utf8"=>"✓", "email"=>"asfOdzA9kqagHoMGLmqLpQ@sample.com", "commit"=>"Reset password"}
|
193
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'asfOdzA9kqagHoMGLmqLpQ@sample.com' LIMIT 1[0m
|
194
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'nsOSQeEhA0-GYtx3SO4bVg' LIMIT 1
|
195
195
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
196
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
197
|
-
[1m[36mSQL (0.
|
198
|
-
[1m[35m (0.
|
196
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'asfOdzA9kqagHoMGLmqLpQ@sample.com' AND "users"."id" != 1) LIMIT 1
|
197
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "nsOSQeEhA0-GYtx3SO4bVg"], ["password_reset_sent_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00], ["updated_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00]]
|
198
|
+
[1m[35m (0.8ms)[0m commit transaction
|
199
199
|
|
200
|
-
Sent mail to
|
201
|
-
Date:
|
200
|
+
Sent mail to asfOdzA9kqagHoMGLmqLpQ@sample.com (16.0ms)
|
201
|
+
Date: Tue, 30 Apr 2013 23:18:10 +0200
|
202
202
|
From: from@example.com
|
203
|
-
To:
|
204
|
-
Message-ID: <
|
203
|
+
To: asfOdzA9kqagHoMGLmqLpQ@sample.com
|
204
|
+
Message-ID: <518035124feb6_aa053fcf45c6067086c@Richards-MacBook-Air.local.mail>
|
205
205
|
Subject: Password Reset
|
206
206
|
Mime-Version: 1.0
|
207
207
|
Content-Type: text/plain;
|
@@ -210,91 +210,91 @@ Content-Transfer-Encoding: 7bit
|
|
210
210
|
|
211
211
|
To reset your password, click the URL below.
|
212
212
|
|
213
|
-
http://localhost:3000/password_resets/
|
213
|
+
http://localhost:3000/password_resets/nsOSQeEhA0-GYtx3SO4bVg/edit
|
214
214
|
|
215
215
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
216
216
|
Redirected to http://www.example.com/
|
217
|
-
Completed 302 Found in
|
218
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
217
|
+
Completed 302 Found in 358ms (ActiveRecord: 1.9ms)
|
218
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
219
219
|
Processing by HomeController#index as HTML
|
220
|
-
Completed 200 OK in
|
221
|
-
Started GET "/password_resets/
|
220
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
221
|
+
Started GET "/password_resets/nsOSQeEhA0-GYtx3SO4bVg/edit" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
222
222
|
Processing by PasswordResetsController#edit as HTML
|
223
|
-
Parameters: {"id"=>"
|
224
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
225
|
-
Completed 200 OK in
|
226
|
-
Started PATCH "/password_resets/
|
223
|
+
Parameters: {"id"=>"nsOSQeEhA0-GYtx3SO4bVg"}
|
224
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'nsOSQeEhA0-GYtx3SO4bVg' LIMIT 1[0m
|
225
|
+
Completed 200 OK in 69ms (Views: 67.3ms | ActiveRecord: 0.2ms)
|
226
|
+
Started PATCH "/password_resets/nsOSQeEhA0-GYtx3SO4bVg" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
227
227
|
Processing by PasswordResetsController#update as HTML
|
228
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
229
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
230
|
-
[1m[36m (0.
|
231
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
228
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"nsOSQeEhA0-GYtx3SO4bVg"}
|
229
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'nsOSQeEhA0-GYtx3SO4bVg' LIMIT 1
|
230
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
231
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'asfOdzA9kqagHoMGLmqLpQ@sample.com' AND "users"."id" != 1) LIMIT 1
|
232
232
|
Binary data inserted for `string` type on column `password_digest`
|
233
|
-
[1m[36mSQL (0.
|
234
|
-
[1m[35m (2.
|
233
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$mAUunAE/1JNTqGm32TFjre7tm6muzV8l2aSs/AHi.pCPATD.CMqty"], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
234
|
+
[1m[35m (2.2ms)[0m commit transaction
|
235
235
|
Redirected to http://localhost:3000/
|
236
|
-
Completed 302 Found in
|
237
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
236
|
+
Completed 302 Found in 13ms (ActiveRecord: 3.0ms)
|
237
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
238
238
|
Processing by HomeController#index as HTML
|
239
|
-
Completed 200 OK in
|
239
|
+
Completed 200 OK in 3ms (Views: 2.2ms | ActiveRecord: 0.0ms)
|
240
240
|
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
241
|
-
[1m[35m (0.
|
242
|
-
[1m[36m (0.
|
241
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
242
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
243
243
|
--------------------------------------------------------------------------------
|
244
244
|
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
245
245
|
--------------------------------------------------------------------------------
|
246
|
-
[1m[35mActiveRecord::SchemaMigration Load (0.
|
246
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.2ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
247
247
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
248
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
249
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
248
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'tkuZLaiyfUlLQguDAd30MQ@sample.com' LIMIT 1
|
249
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'v44O1HQ53ik0czx57p7EUQ' LIMIT 1[0m
|
250
250
|
Binary data inserted for `string` type on column `password_digest`
|
251
|
-
[1m[35mSQL (0.
|
252
|
-
[1m[36m (0.
|
253
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
251
|
+
[1m[35mSQL (0.6ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "v44O1HQ53ik0czx57p7EUQ"], ["created_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["email", "tkuZLaiyfUlLQguDAd30MQ@sample.com"], ["password_digest", "$2a$04$/.wJRGADPoiB2XsTcwhWpu3uQ/63uuKl.jIJYDj8VizfZZyP5Khfm"], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
252
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
253
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
254
254
|
Processing by SessionsController#new as HTML
|
255
|
-
Completed 200 OK in
|
256
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
255
|
+
Completed 200 OK in 4ms (Views: 3.6ms | ActiveRecord: 0.0ms)
|
256
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
257
257
|
Processing by PasswordResetsController#new as HTML
|
258
|
-
Completed 200 OK in
|
259
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
258
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
259
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
260
260
|
Processing by PasswordResetsController#create as HTML
|
261
261
|
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
262
262
|
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
263
|
-
Completed 200 OK in
|
263
|
+
Completed 200 OK in 3ms (Views: 1.7ms | ActiveRecord: 0.2ms)
|
264
264
|
[1m[36m (1.1ms)[0m [1mDELETE FROM "users";[0m
|
265
|
-
[1m[35m (0.
|
266
|
-
[1m[36m (
|
265
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
266
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
267
267
|
-------------------------------------------------------------------------
|
268
268
|
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
269
269
|
-------------------------------------------------------------------------
|
270
270
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
271
|
-
[1m[36m (0.
|
272
|
-
[1m[35mUser Exists (0.
|
273
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
271
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
272
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '0E1mMLUvZsMUFRb-JyFNhg@sample.com' LIMIT 1
|
273
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'xnqnqNGK9ZXL4Q-oIEQVkw' LIMIT 1[0m
|
274
274
|
Binary data inserted for `string` type on column `password_digest`
|
275
|
-
[1m[35mSQL (0.
|
276
|
-
[1m[36m (0.
|
277
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
275
|
+
[1m[35mSQL (0.8ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "xnqnqNGK9ZXL4Q-oIEQVkw"], ["created_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["email", "0E1mMLUvZsMUFRb-JyFNhg@sample.com"], ["password_digest", "$2a$04$eYw1YfTF1ol3PIETXM4L8u5LxxOaAWDTEbsbp3c1V9jfCPqMbSZtS"], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
276
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
277
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
278
278
|
Processing by SessionsController#new as HTML
|
279
|
-
Completed 200 OK in
|
280
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
279
|
+
Completed 200 OK in 3ms (Views: 3.0ms | ActiveRecord: 0.0ms)
|
280
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
281
281
|
Processing by PasswordResetsController#new as HTML
|
282
|
-
Completed 200 OK in
|
283
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
282
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
283
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
284
284
|
Processing by PasswordResetsController#create as HTML
|
285
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
286
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
287
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
285
|
+
Parameters: {"utf8"=>"✓", "email"=>"0E1mMLUvZsMUFRb-JyFNhg@sample.com", "commit"=>"Reset password"}
|
286
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '0E1mMLUvZsMUFRb-JyFNhg@sample.com' LIMIT 1
|
287
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'UZjYKNusQJRru1IUhHcbOQ' LIMIT 1[0m
|
288
288
|
[1m[35m (0.1ms)[0m begin transaction
|
289
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
290
|
-
[1m[35mSQL (0.4ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "
|
291
|
-
[1m[36m (
|
289
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '0E1mMLUvZsMUFRb-JyFNhg@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
290
|
+
[1m[35mSQL (0.4ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "UZjYKNusQJRru1IUhHcbOQ"], ["password_reset_sent_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
291
|
+
[1m[36m (1.5ms)[0m [1mcommit transaction[0m
|
292
292
|
|
293
|
-
Sent mail to
|
294
|
-
Date:
|
293
|
+
Sent mail to 0E1mMLUvZsMUFRb-JyFNhg@sample.com (10.5ms)
|
294
|
+
Date: Tue, 30 Apr 2013 23:18:10 +0200
|
295
295
|
From: from@example.com
|
296
|
-
To:
|
297
|
-
Message-ID: <
|
296
|
+
To: 0E1mMLUvZsMUFRb-JyFNhg@sample.com
|
297
|
+
Message-ID: <518035129791d_aa053fcf45c6067098b@Richards-MacBook-Air.local.mail>
|
298
298
|
Subject: Password Reset
|
299
299
|
Mime-Version: 1.0
|
300
300
|
Content-Type: text/plain;
|
@@ -303,62 +303,62 @@ Content-Transfer-Encoding: 7bit
|
|
303
303
|
|
304
304
|
To reset your password, click the URL below.
|
305
305
|
|
306
|
-
http://localhost:3000/password_resets/
|
306
|
+
http://localhost:3000/password_resets/UZjYKNusQJRru1IUhHcbOQ/edit
|
307
307
|
|
308
308
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
309
309
|
Redirected to http://www.example.com/
|
310
|
-
Completed 302 Found in
|
311
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
310
|
+
Completed 302 Found in 31ms (ActiveRecord: 2.4ms)
|
311
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
312
312
|
Processing by HomeController#index as HTML
|
313
|
-
Completed 200 OK in
|
314
|
-
Started GET "/password_resets/
|
313
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
314
|
+
Started GET "/password_resets/UZjYKNusQJRru1IUhHcbOQ/edit" for 127.0.0.1 at 2013-05-02 02:00:00 +0200
|
315
315
|
Processing by PasswordResetsController#edit as HTML
|
316
|
-
Parameters: {"id"=>"
|
317
|
-
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
316
|
+
Parameters: {"id"=>"UZjYKNusQJRru1IUhHcbOQ"}
|
317
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'UZjYKNusQJRru1IUhHcbOQ' LIMIT 1
|
318
318
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
319
|
-
Started PATCH "/password_resets/
|
319
|
+
Started PATCH "/password_resets/UZjYKNusQJRru1IUhHcbOQ" for 127.0.0.1 at 2013-05-02 02:00:00 +0200
|
320
320
|
Processing by PasswordResetsController#update as HTML
|
321
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
322
|
-
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
321
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"UZjYKNusQJRru1IUhHcbOQ"}
|
322
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'UZjYKNusQJRru1IUhHcbOQ' LIMIT 1[0m
|
323
323
|
Redirected to http://localhost:3000/password_resets/new
|
324
324
|
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
325
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
325
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-05-02 02:00:00 +0200
|
326
326
|
Processing by PasswordResetsController#new as HTML
|
327
327
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
328
|
-
[1m[35m (
|
328
|
+
[1m[35m (1.1ms)[0m DELETE FROM "users";
|
329
329
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
330
|
-
[1m[35m (
|
330
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
331
331
|
-------------------------------------------------------------------------------------------
|
332
332
|
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
333
333
|
-------------------------------------------------------------------------------------------
|
334
334
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
335
|
-
[1m[35m (0.
|
336
|
-
[1m[36mUser Exists (0.
|
337
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
335
|
+
[1m[35m (0.2ms)[0m begin transaction
|
336
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'nqlk8PeNSt4SJbT5j3Zffg@sample.com' LIMIT 1[0m
|
337
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'GPTtlmB3hKlj5KfLKAhCOw' LIMIT 1
|
338
338
|
Binary data inserted for `string` type on column `password_digest`
|
339
|
-
[1m[36mSQL (0.
|
340
|
-
[1m[35m (
|
341
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
339
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "GPTtlmB3hKlj5KfLKAhCOw"], ["created_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["email", "nqlk8PeNSt4SJbT5j3Zffg@sample.com"], ["password_digest", "$2a$04$1C6Ei54nApFCbAlzowrOi.kNs0MIWSUGlhVdUnz9HO5jFeMkHpeGK"], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
340
|
+
[1m[35m (1.1ms)[0m commit transaction
|
341
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
342
342
|
Processing by SessionsController#new as HTML
|
343
|
-
Completed 200 OK in
|
344
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
343
|
+
Completed 200 OK in 4ms (Views: 3.7ms | ActiveRecord: 0.0ms)
|
344
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
345
345
|
Processing by PasswordResetsController#new as HTML
|
346
|
-
Completed 200 OK in
|
347
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
346
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
347
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
348
348
|
Processing by PasswordResetsController#create as HTML
|
349
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
350
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
351
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
352
|
-
[1m[36m (0.
|
353
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
354
|
-
[1m[36mSQL (0.
|
355
|
-
[1m[35m (0.
|
349
|
+
Parameters: {"utf8"=>"✓", "email"=>"nqlk8PeNSt4SJbT5j3Zffg@sample.com", "commit"=>"Reset password"}
|
350
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'nqlk8PeNSt4SJbT5j3Zffg@sample.com' LIMIT 1[0m
|
351
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'H1m3GQxm5cD0zlVgd9rh7w' LIMIT 1
|
352
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
353
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'nqlk8PeNSt4SJbT5j3Zffg@sample.com' AND "users"."id" != 1) LIMIT 1
|
354
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "H1m3GQxm5cD0zlVgd9rh7w"], ["password_reset_sent_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
355
|
+
[1m[35m (0.8ms)[0m commit transaction
|
356
356
|
|
357
|
-
Sent mail to
|
358
|
-
Date:
|
357
|
+
Sent mail to nqlk8PeNSt4SJbT5j3Zffg@sample.com (9.9ms)
|
358
|
+
Date: Tue, 30 Apr 2013 23:18:10 +0200
|
359
359
|
From: from@example.com
|
360
|
-
To:
|
361
|
-
Message-ID: <
|
360
|
+
To: nqlk8PeNSt4SJbT5j3Zffg@sample.com
|
361
|
+
Message-ID: <51803512b91aa_aa053fcf45c606701018@Richards-MacBook-Air.local.mail>
|
362
362
|
Subject: Password Reset
|
363
363
|
Mime-Version: 1.0
|
364
364
|
Content-Type: text/plain;
|
@@ -367,102 +367,102 @@ Content-Transfer-Encoding: 7bit
|
|
367
367
|
|
368
368
|
To reset your password, click the URL below.
|
369
369
|
|
370
|
-
http://localhost:3000/password_resets/
|
370
|
+
http://localhost:3000/password_resets/H1m3GQxm5cD0zlVgd9rh7w/edit
|
371
371
|
|
372
372
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
373
373
|
Redirected to http://www.example.com/
|
374
|
-
Completed 302 Found in
|
375
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
374
|
+
Completed 302 Found in 29ms (ActiveRecord: 1.8ms)
|
375
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
376
376
|
Processing by HomeController#index as HTML
|
377
|
-
Completed 200 OK in 2ms (Views:
|
378
|
-
Started GET "/password_resets/
|
377
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
378
|
+
Started GET "/password_resets/H1m3GQxm5cD0zlVgd9rh7w/edit" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
379
379
|
Processing by PasswordResetsController#edit as HTML
|
380
|
-
Parameters: {"id"=>"
|
381
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
382
|
-
Completed 200 OK in
|
383
|
-
Started PATCH "/password_resets/
|
380
|
+
Parameters: {"id"=>"H1m3GQxm5cD0zlVgd9rh7w"}
|
381
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'H1m3GQxm5cD0zlVgd9rh7w' LIMIT 1[0m
|
382
|
+
Completed 200 OK in 6ms (Views: 4.1ms | ActiveRecord: 0.2ms)
|
383
|
+
Started PATCH "/password_resets/H1m3GQxm5cD0zlVgd9rh7w" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
384
384
|
Processing by PasswordResetsController#update as HTML
|
385
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
386
|
-
[1m[35mUser Load (0.
|
387
|
-
[1m[36m (0.
|
388
|
-
[1m[35mUser Exists (0.
|
385
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"H1m3GQxm5cD0zlVgd9rh7w"}
|
386
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'H1m3GQxm5cD0zlVgd9rh7w' LIMIT 1
|
387
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
388
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'nqlk8PeNSt4SJbT5j3Zffg@sample.com' AND "users"."id" != 1) LIMIT 1
|
389
389
|
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
390
|
-
Completed 200 OK in
|
391
|
-
[1m[35m (
|
392
|
-
[1m[36m (0.
|
390
|
+
Completed 200 OK in 17ms (Views: 4.9ms | ActiveRecord: 0.5ms)
|
391
|
+
[1m[35m (2.7ms)[0m DELETE FROM "users";
|
392
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
393
393
|
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
394
394
|
-----------------------------------
|
395
395
|
AuthproIntegrationTest: test_signup
|
396
396
|
-----------------------------------
|
397
397
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
398
|
-
[1m[35m (0.
|
399
|
-
[1m[36mUser Exists (0.
|
400
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
398
|
+
[1m[35m (0.2ms)[0m begin transaction
|
399
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'kp0wZabKy17WEIwj0GubnQ@sample.com' LIMIT 1[0m
|
400
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'syH-73PlQNuFGtoTWbzIiA' LIMIT 1
|
401
401
|
Binary data inserted for `string` type on column `password_digest`
|
402
|
-
[1m[36mSQL (0.
|
402
|
+
[1m[36mSQL (0.7ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "syH-73PlQNuFGtoTWbzIiA"], ["created_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["email", "kp0wZabKy17WEIwj0GubnQ@sample.com"], ["password_digest", "$2a$04$CPUEOnzuPwys/fpENWwUxOK29dLclsQO3nGdoslOxmaV9c9m0w48y"], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
403
403
|
[1m[35m (0.7ms)[0m commit transaction
|
404
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
404
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
405
405
|
Processing by HomeController#index as HTML
|
406
|
-
Completed 200 OK in
|
407
|
-
Started GET "/signup" for 127.0.0.1 at 2013-
|
406
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
407
|
+
Started GET "/signup" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
408
408
|
Processing by UsersController#new as HTML
|
409
|
-
Completed 200 OK in
|
410
|
-
Started POST "/users" for 127.0.0.1 at 2013-
|
409
|
+
Completed 200 OK in 9ms (Views: 7.7ms | ActiveRecord: 0.0ms)
|
410
|
+
Started POST "/users" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
411
411
|
Processing by UsersController#create as HTML
|
412
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
412
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"XX9v5aaGxz1w63AqEcBssw@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
413
413
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
414
|
-
[1m[35mUser Exists (0.
|
415
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
414
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'XX9v5aaGxz1w63AqEcBssw@sample.com' LIMIT 1
|
415
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'c_2flZGmo1rkyaL_kK8Pxw' LIMIT 1[0m
|
416
416
|
Binary data inserted for `string` type on column `password_digest`
|
417
|
-
[1m[35mSQL (0.
|
418
|
-
[1m[36m (
|
417
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "c_2flZGmo1rkyaL_kK8Pxw"], ["created_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["email", "XX9v5aaGxz1w63AqEcBssw@sample.com"], ["password_digest", "$2a$04$I3c3jFsX4.mKTOa0wa0Qb.n67Qhnf6MhYi.D47JrHGNqq391ToTOe"], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
418
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
419
419
|
Redirected to http://www.example.com/
|
420
|
-
Completed 302 Found in
|
421
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
420
|
+
Completed 302 Found in 12ms (ActiveRecord: 1.5ms)
|
421
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
422
422
|
Processing by HomeController#index as HTML
|
423
|
-
Completed 200 OK in
|
424
|
-
[1m[35m (1.
|
425
|
-
[1m[36m (0.
|
423
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
424
|
+
[1m[35m (1.1ms)[0m DELETE FROM "users";
|
425
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
426
426
|
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
427
427
|
-------------------------------------------
|
428
428
|
AuthproIntegrationTest: test_signup_failing
|
429
429
|
-------------------------------------------
|
430
|
-
[1m[36mActiveRecord::SchemaMigration Load (0.
|
430
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.2ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
431
431
|
[1m[35m (0.1ms)[0m begin transaction
|
432
|
-
[1m[36mUser Exists (0.
|
433
|
-
[1m[35mUser Exists (0.
|
432
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'K59Kef8QZ5u69oEEbDTXFw@sample.com' LIMIT 1[0m
|
433
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'hwhp6NsHnL5QZ_Q1QCAOWg' LIMIT 1
|
434
434
|
Binary data inserted for `string` type on column `password_digest`
|
435
|
-
[1m[36mSQL (0.
|
436
|
-
[1m[35m (
|
437
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
435
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "hwhp6NsHnL5QZ_Q1QCAOWg"], ["created_at", Tue, 30 Apr 2013 21:18:11 UTC +00:00], ["email", "K59Kef8QZ5u69oEEbDTXFw@sample.com"], ["password_digest", "$2a$04$7bMbZi.mPe74d6YxM0jAGOx5Ayda3rmFZqnPO6CE8SEXbhBwqFQ8C"], ["updated_at", Tue, 30 Apr 2013 21:18:11 UTC +00:00]]
|
436
|
+
[1m[35m (0.9ms)[0m commit transaction
|
437
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:11 +0200
|
438
438
|
Processing by HomeController#index as HTML
|
439
|
-
Completed 200 OK in
|
440
|
-
Started GET "/signup" for 127.0.0.1 at 2013-
|
439
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
440
|
+
Started GET "/signup" for 127.0.0.1 at 2013-04-30 23:18:11 +0200
|
441
441
|
Processing by UsersController#new as HTML
|
442
|
-
Completed 200 OK in
|
443
|
-
Started POST "/users" for 127.0.0.1 at 2013-
|
442
|
+
Completed 200 OK in 6ms (Views: 5.9ms | ActiveRecord: 0.0ms)
|
443
|
+
Started POST "/users" for 127.0.0.1 at 2013-04-30 23:18:11 +0200
|
444
444
|
Processing by UsersController#create as HTML
|
445
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
445
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"F11CeZKJTsz4A89vD5HMJw@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
446
446
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
447
|
-
[1m[35mUser Exists (0.
|
448
|
-
[1m[36m (0.
|
449
|
-
Completed 200 OK in
|
450
|
-
[1m[35m (1.
|
451
|
-
[1m[36m (0.
|
452
|
-
[1m[35m (0.
|
447
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'F11CeZKJTsz4A89vD5HMJw@sample.com' LIMIT 1
|
448
|
+
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
449
|
+
Completed 200 OK in 15ms (Views: 4.8ms | ActiveRecord: 0.3ms)
|
450
|
+
[1m[35m (1.3ms)[0m DELETE FROM "users";
|
451
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
452
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
453
453
|
---------------------------------------
|
454
454
|
AuthproIntegrationTest: test_visit_home
|
455
455
|
---------------------------------------
|
456
456
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
457
|
-
[1m[35m (0.
|
458
|
-
[1m[36mUser Exists (0.
|
459
|
-
[1m[35mUser Exists (0.
|
457
|
+
[1m[35m (0.2ms)[0m begin transaction
|
458
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'YODoUeyaJeNn7ICpxPs6ww@sample.com' LIMIT 1[0m
|
459
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '_AiHoog6iacfdZ52ngep4A' LIMIT 1
|
460
460
|
Binary data inserted for `string` type on column `password_digest`
|
461
|
-
[1m[36mSQL (0.
|
462
|
-
[1m[35m (
|
463
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
461
|
+
[1m[36mSQL (0.7ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "_AiHoog6iacfdZ52ngep4A"], ["created_at", Tue, 30 Apr 2013 21:18:11 UTC +00:00], ["email", "YODoUeyaJeNn7ICpxPs6ww@sample.com"], ["password_digest", "$2a$04$Pk0qUPrPab1zXjPmElChVeDOYs3pjw/DAef/DPvpcm7XqsHWMg.du"], ["updated_at", Tue, 30 Apr 2013 21:18:11 UTC +00:00]]
|
462
|
+
[1m[35m (0.7ms)[0m commit transaction
|
463
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:11 +0200
|
464
464
|
Processing by HomeController#index as HTML
|
465
|
-
Completed 200 OK in
|
466
|
-
[1m[36m (
|
465
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
466
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
467
467
|
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
468
|
-
[1m[36m (
|
468
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
@@ -5,11 +5,11 @@ one:
|
|
5
5
|
password_digest: MyString
|
6
6
|
auth_token: MyString
|
7
7
|
password_reset_token: MyString
|
8
|
-
password_reset_sent_at: 2013-
|
8
|
+
password_reset_sent_at: 2013-04-30 23:18:09
|
9
9
|
|
10
10
|
two:
|
11
11
|
email: MyString
|
12
12
|
password_digest: MyString
|
13
13
|
auth_token: MyString
|
14
14
|
password_reset_token: MyString
|
15
|
-
password_reset_sent_at: 2013-
|
15
|
+
password_reset_sent_at: 2013-04-30 23:18:09
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: authpro
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.9.
|
4
|
+
version: 0.9.2
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Richard Nyström
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2013-
|
11
|
+
date: 2013-04-30 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: rails
|
@@ -16,14 +16,14 @@ dependencies:
|
|
16
16
|
requirements:
|
17
17
|
- - ~>
|
18
18
|
- !ruby/object:Gem::Version
|
19
|
-
version: 4.0.0.
|
19
|
+
version: 4.0.0.rc1
|
20
20
|
type: :runtime
|
21
21
|
prerelease: false
|
22
22
|
version_requirements: !ruby/object:Gem::Requirement
|
23
23
|
requirements:
|
24
24
|
- - ~>
|
25
25
|
- !ruby/object:Gem::Version
|
26
|
-
version: 4.0.0.
|
26
|
+
version: 4.0.0.rc1
|
27
27
|
- !ruby/object:Gem::Dependency
|
28
28
|
name: bcrypt-ruby
|
29
29
|
requirement: !ruby/object:Gem::Requirement
|
@@ -209,7 +209,7 @@ files:
|
|
209
209
|
- test/rails/dummy/config/locales/en.yml
|
210
210
|
- test/rails/dummy/config/routes.rb
|
211
211
|
- test/rails/dummy/config.ru
|
212
|
-
- test/rails/dummy/db/migrate/
|
212
|
+
- test/rails/dummy/db/migrate/20130430211809_create_users.rb
|
213
213
|
- test/rails/dummy/db/test.sqlite3
|
214
214
|
- test/rails/dummy/Gemfile
|
215
215
|
- test/rails/dummy/Gemfile.lock
|
@@ -327,7 +327,7 @@ test_files:
|
|
327
327
|
- test/rails/dummy/config/locales/en.yml
|
328
328
|
- test/rails/dummy/config/routes.rb
|
329
329
|
- test/rails/dummy/config.ru
|
330
|
-
- test/rails/dummy/db/migrate/
|
330
|
+
- test/rails/dummy/db/migrate/20130430211809_create_users.rb
|
331
331
|
- test/rails/dummy/db/test.sqlite3
|
332
332
|
- test/rails/dummy/Gemfile
|
333
333
|
- test/rails/dummy/Gemfile.lock
|