authpro 0.9.2 → 0.9.3
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +1 -1
- data/lib/authpro/version.rb +1 -1
- data/test/rails/dummy/db/migrate/{20130430211809_create_users.rb → 20130612192336_create_users.rb} +0 -0
- data/test/rails/dummy/db/test.sqlite3 +0 -0
- data/test/rails/dummy/log/test.log +215 -215
- data/test/rails/dummy/test/fixtures/users.yml +2 -2
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/13fe41fee1fe35b49d145bcc06610705 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/2f5173deea6c795b8fdde723bb4b63af +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/357970feca3ac29060c1e3861e2c0953 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/cffd775d018f68ce5dba1ee0d951a994 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/d771ace226fc8215a3572e0aa35bb0d6 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/f7cbd26ba1d28d48de824f0e94586655 +0 -0
- metadata +8 -8
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 0e420e681d69ecd86571fe05235af63b1a848a83
|
4
|
+
data.tar.gz: eab409a0f70eb3c73c73d392632e5b7af95b2871
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b771696a51f644e7d19bab9fa2c5571b8f3555eee548a64b82b6153044db1603894d100f79b62fe483829bd3aa340ce8c5babd861670aba0d0af8a3adc36eadc
|
7
|
+
data.tar.gz: 2e41f8e1dd615c91675febd466af34cb5b69947067e2e5435246689993b4fc585512cdadc47548f25b93e61669992cb0930496e24e94cbfbe001c8496e00af9f
|
data/README.md
CHANGED
@@ -3,7 +3,7 @@
|
|
3
3
|
[![Code Climate](https://codeclimate.com/github/ricn/authpro.png)](https://codeclimate.com/github/ricn/authpro)
|
4
4
|
[![Build Status](https://travis-ci.org/ricn/authpro.png?branch=master)](https://travis-ci.org/ricn/authpro)
|
5
5
|
|
6
|
-
Authpro is a simple authentication generator for Rails 4.0.0.
|
6
|
+
Authpro is a simple authentication generator for Rails 4.0.0.rc2 It:
|
7
7
|
|
8
8
|
* Gives you sign up, log in, remember me & password reset functionality
|
9
9
|
* Has no hidden code, special super classes or mixins
|
data/lib/authpro/version.rb
CHANGED
data/test/rails/dummy/db/migrate/{20130430211809_create_users.rb → 20130612192336_create_users.rb}
RENAMED
File without changes
|
Binary file
|
@@ -70,138 +70,138 @@ AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
70
70
|
----------------------------------------------------------------
|
71
71
|
[1m[36m (0.3ms)[0m [1mbegin transaction[0m
|
72
72
|
[1m[35m (0.1ms)[0m rollback transaction
|
73
|
-
[1m[36m (0.
|
73
|
+
[1m[36m (0.4ms)[0m [1mbegin transaction[0m
|
74
74
|
------------------------------------------
|
75
75
|
AuthproGeneratorTest: test_generated_files
|
76
76
|
------------------------------------------
|
77
|
-
[1m[35m (0.
|
77
|
+
[1m[35m (0.3ms)[0m rollback transaction
|
78
78
|
----------------------------------
|
79
79
|
AuthproIntegrationTest: test_login
|
80
80
|
----------------------------------
|
81
81
|
[1m[36m (1.3ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
82
|
-
[1m[35m (1.
|
82
|
+
[1m[35m (1.2ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
83
83
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
84
|
-
Migrating to CreateUsers (
|
84
|
+
Migrating to CreateUsers (20130612192336)
|
85
85
|
[1m[35m (0.1ms)[0m begin transaction
|
86
86
|
[1m[36m (0.4ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
87
|
-
[1m[35mSQL (0.
|
88
|
-
[1m[36m (
|
87
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20130612192336"]]
|
88
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
89
89
|
[1m[35m (0.1ms)[0m begin transaction
|
90
|
-
[1m[36mUser Exists (0.
|
91
|
-
[1m[35mUser Exists (0.
|
90
|
+
[1m[36mUser Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'DzkL7IpcWwk0_2sBAGrccA@sample.com' LIMIT 1[0m
|
91
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'QauPmVim9Nsjt4ni1KPr1g' LIMIT 1
|
92
92
|
Binary data inserted for `string` type on column `password_digest`
|
93
|
-
[1m[36mSQL (
|
94
|
-
[1m[35m (2.
|
95
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
93
|
+
[1m[36mSQL (3.9ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "QauPmVim9Nsjt4ni1KPr1g"], ["created_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00], ["email", "DzkL7IpcWwk0_2sBAGrccA@sample.com"], ["password_digest", "$2a$04$.UWNG1wutCHbi3UhCvP6suLEW.Ha6cUerJ7LFgXM4aZLeVepb.aAW"], ["updated_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00]]
|
94
|
+
[1m[35m (2.4ms)[0m commit transaction
|
95
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
96
96
|
Processing by HomeController#index as HTML
|
97
97
|
Rendered home/index.html.erb within layouts/application (1.5ms)
|
98
|
-
Completed 200 OK in
|
99
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
98
|
+
Completed 200 OK in 42ms (Views: 41.5ms | ActiveRecord: 0.0ms)
|
99
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
100
100
|
Processing by SessionsController#new as HTML
|
101
|
-
Rendered sessions/new.html.erb within layouts/application (
|
102
|
-
Completed 200 OK in
|
103
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
101
|
+
Rendered sessions/new.html.erb within layouts/application (1.9ms)
|
102
|
+
Completed 200 OK in 5ms (Views: 4.7ms | ActiveRecord: 0.0ms)
|
103
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
104
104
|
Processing by SessionsController#create as HTML
|
105
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
106
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
105
|
+
Parameters: {"utf8"=>"✓", "email"=>"DzkL7IpcWwk0_2sBAGrccA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
106
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'DzkL7IpcWwk0_2sBAGrccA@sample.com' LIMIT 1[0m
|
107
107
|
Redirected to http://www.example.com/
|
108
108
|
Completed 302 Found in 8ms (ActiveRecord: 0.2ms)
|
109
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
109
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
110
110
|
Processing by HomeController#index as HTML
|
111
111
|
Rendered home/index.html.erb within layouts/application (0.1ms)
|
112
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = '
|
113
|
-
Completed 200 OK in 4ms (Views: 3.
|
114
|
-
[1m[36m (
|
115
|
-
[1m[35m (0.
|
116
|
-
[1m[36m (1.
|
112
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'QauPmVim9Nsjt4ni1KPr1g' LIMIT 1
|
113
|
+
Completed 200 OK in 4ms (Views: 3.6ms | ActiveRecord: 0.2ms)
|
114
|
+
[1m[36m (2.9ms)[0m [1mDELETE FROM "users";[0m
|
115
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
116
|
+
[1m[36m (1.1ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
117
117
|
------------------------------------------
|
118
118
|
AuthproIntegrationTest: test_login_failing
|
119
119
|
------------------------------------------
|
120
120
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
121
|
-
[1m[36m (0.
|
122
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
123
|
-
[1m[36mUser Exists (0.
|
121
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
122
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'V3pHg_EtCu3b9MH4V6t41w@sample.com' LIMIT 1
|
123
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'pZHmr-RrGQp99Wrn81mb6A' LIMIT 1[0m
|
124
124
|
Binary data inserted for `string` type on column `password_digest`
|
125
|
-
[1m[35mSQL (0.
|
126
|
-
[1m[36m (1.
|
127
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
125
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "pZHmr-RrGQp99Wrn81mb6A"], ["created_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00], ["email", "V3pHg_EtCu3b9MH4V6t41w@sample.com"], ["password_digest", "$2a$04$zCSbd0PPM46mHIdFlj0zxedTH8hGHJexKDKMRGV1gMPD9mIPN/7ZC"], ["updated_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00]]
|
126
|
+
[1m[36m (1.0ms)[0m [1mcommit transaction[0m
|
127
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
128
128
|
Processing by HomeController#index as HTML
|
129
|
-
Completed 200 OK in
|
130
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
129
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
130
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
131
131
|
Processing by SessionsController#new as HTML
|
132
|
-
Completed 200 OK in 2ms (Views: 2.
|
133
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
132
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
133
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
134
134
|
Processing by SessionsController#create as HTML
|
135
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
136
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
137
|
-
Completed 200 OK in
|
135
|
+
Parameters: {"utf8"=>"✓", "email"=>"V3pHg_EtCu3b9MH4V6t41w@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
136
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'V3pHg_EtCu3b9MH4V6t41w@sample.com' LIMIT 1
|
137
|
+
Completed 200 OK in 8ms (Views: 1.9ms | ActiveRecord: 0.2ms)
|
138
138
|
[1m[36m (1.1ms)[0m [1mDELETE FROM "users";[0m
|
139
|
-
[1m[35m (0.
|
140
|
-
[1m[36m (
|
139
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
140
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
141
141
|
-----------------------------------
|
142
142
|
AuthproIntegrationTest: test_logout
|
143
143
|
-----------------------------------
|
144
144
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
145
145
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
146
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
147
|
-
[1m[36mUser Exists (0.
|
146
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'sAON3N3SA5qR_nrpOkl2Kg@sample.com' LIMIT 1
|
147
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'WQEGF_uHbcEMrlb4nDisgg' LIMIT 1[0m
|
148
148
|
Binary data inserted for `string` type on column `password_digest`
|
149
|
-
[1m[35mSQL (0.
|
150
|
-
[1m[36m (
|
151
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
149
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "WQEGF_uHbcEMrlb4nDisgg"], ["created_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00], ["email", "sAON3N3SA5qR_nrpOkl2Kg@sample.com"], ["password_digest", "$2a$04$v1Qdvvh7il61jQD4rqJDXOa6B.e10.lPG77K96mYYIUFjmaMvvRpi"], ["updated_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00]]
|
150
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
151
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
152
152
|
Processing by SessionsController#new as HTML
|
153
|
-
Completed 200 OK in 3ms (Views:
|
154
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
153
|
+
Completed 200 OK in 3ms (Views: 3.0ms | ActiveRecord: 0.0ms)
|
154
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
155
155
|
Processing by SessionsController#create as HTML
|
156
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
157
|
-
[1m[35mUser Load (0.
|
156
|
+
Parameters: {"utf8"=>"✓", "email"=>"sAON3N3SA5qR_nrpOkl2Kg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
157
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'sAON3N3SA5qR_nrpOkl2Kg@sample.com' LIMIT 1
|
158
158
|
Redirected to http://www.example.com/
|
159
|
-
Completed 302 Found in 7ms (ActiveRecord: 0.
|
160
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
159
|
+
Completed 302 Found in 7ms (ActiveRecord: 0.2ms)
|
160
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
161
161
|
Processing by HomeController#index as HTML
|
162
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = '
|
163
|
-
Completed 200 OK in 3ms (Views: 2.
|
164
|
-
Started GET "/logout" for 127.0.0.1 at 2013-
|
162
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'WQEGF_uHbcEMrlb4nDisgg' LIMIT 1[0m
|
163
|
+
Completed 200 OK in 3ms (Views: 2.4ms | ActiveRecord: 0.2ms)
|
164
|
+
Started GET "/logout" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
165
165
|
Processing by SessionsController#destroy as HTML
|
166
166
|
Redirected to http://www.example.com/
|
167
167
|
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
168
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
168
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
169
169
|
Processing by HomeController#index as HTML
|
170
170
|
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
171
|
-
[1m[35m (1.
|
171
|
+
[1m[35m (1.1ms)[0m DELETE FROM "users";
|
172
172
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
173
173
|
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
174
174
|
-------------------------------------------
|
175
175
|
AuthproIntegrationTest: test_reset_password
|
176
176
|
-------------------------------------------
|
177
177
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
178
|
-
[1m[35m (0.
|
179
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
180
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
178
|
+
[1m[35m (0.2ms)[0m begin transaction
|
179
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'rHyEHIbiokDFG8C58Ji9Vg@sample.com' LIMIT 1[0m
|
180
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'eRWANRnbNsz1Yw7XlUiqRw' LIMIT 1
|
181
181
|
Binary data inserted for `string` type on column `password_digest`
|
182
|
-
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
183
|
-
[1m[35m (
|
184
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
182
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "eRWANRnbNsz1Yw7XlUiqRw"], ["created_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00], ["email", "rHyEHIbiokDFG8C58Ji9Vg@sample.com"], ["password_digest", "$2a$04$BkI1bmLH.qOvXqsWAzzVv.eEc9JLmFgcqJrhBwxr5LUEbRzRMyPGu"], ["updated_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00]]
|
183
|
+
[1m[35m (1.0ms)[0m commit transaction
|
184
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
185
185
|
Processing by SessionsController#new as HTML
|
186
|
-
Completed 200 OK in 3ms (Views: 2.
|
187
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
186
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
187
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
188
188
|
Processing by PasswordResetsController#new as HTML
|
189
|
-
Completed 200 OK in 5ms (Views: 4.
|
190
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
189
|
+
Completed 200 OK in 5ms (Views: 4.3ms | ActiveRecord: 0.0ms)
|
190
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
191
191
|
Processing by PasswordResetsController#create as HTML
|
192
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
193
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
194
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
192
|
+
Parameters: {"utf8"=>"✓", "email"=>"rHyEHIbiokDFG8C58Ji9Vg@sample.com", "commit"=>"Reset password"}
|
193
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'rHyEHIbiokDFG8C58Ji9Vg@sample.com' LIMIT 1[0m
|
194
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'ea5SASkjA6HgRtbKQXwsqA' LIMIT 1
|
195
195
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
196
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
197
|
-
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "
|
198
|
-
[1m[35m (
|
196
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'rHyEHIbiokDFG8C58Ji9Vg@sample.com' AND "users"."id" != 1) LIMIT 1
|
197
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "ea5SASkjA6HgRtbKQXwsqA"], ["password_reset_sent_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00], ["updated_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00]]
|
198
|
+
[1m[35m (1.3ms)[0m commit transaction
|
199
199
|
|
200
|
-
Sent mail to
|
201
|
-
Date:
|
200
|
+
Sent mail to rHyEHIbiokDFG8C58Ji9Vg@sample.com (17.0ms)
|
201
|
+
Date: Wed, 12 Jun 2013 21:23:37 +0200
|
202
202
|
From: from@example.com
|
203
|
-
To:
|
204
|
-
Message-ID: <
|
203
|
+
To: rHyEHIbiokDFG8C58Ji9Vg@sample.com
|
204
|
+
Message-ID: <51b8cab94a2ff_35fc3fc18c46066c43c1@Richards-MacBook-Air.local.mail>
|
205
205
|
Subject: Password Reset
|
206
206
|
Mime-Version: 1.0
|
207
207
|
Content-Type: text/plain;
|
@@ -210,91 +210,91 @@ Content-Transfer-Encoding: 7bit
|
|
210
210
|
|
211
211
|
To reset your password, click the URL below.
|
212
212
|
|
213
|
-
http://localhost:3000/password_resets/
|
213
|
+
http://localhost:3000/password_resets/ea5SASkjA6HgRtbKQXwsqA/edit
|
214
214
|
|
215
215
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
216
216
|
Redirected to http://www.example.com/
|
217
|
-
Completed 302 Found in
|
218
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
217
|
+
Completed 302 Found in 427ms (ActiveRecord: 2.3ms)
|
218
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
219
219
|
Processing by HomeController#index as HTML
|
220
220
|
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
221
|
-
Started GET "/password_resets/
|
221
|
+
Started GET "/password_resets/ea5SASkjA6HgRtbKQXwsqA/edit" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
222
222
|
Processing by PasswordResetsController#edit as HTML
|
223
|
-
Parameters: {"id"=>"
|
224
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
225
|
-
Completed 200 OK in
|
226
|
-
Started PATCH "/password_resets/
|
223
|
+
Parameters: {"id"=>"ea5SASkjA6HgRtbKQXwsqA"}
|
224
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'ea5SASkjA6HgRtbKQXwsqA' LIMIT 1[0m
|
225
|
+
Completed 200 OK in 70ms (Views: 68.0ms | ActiveRecord: 0.2ms)
|
226
|
+
Started PATCH "/password_resets/ea5SASkjA6HgRtbKQXwsqA" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
227
227
|
Processing by PasswordResetsController#update as HTML
|
228
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
229
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
228
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"ea5SASkjA6HgRtbKQXwsqA"}
|
229
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'ea5SASkjA6HgRtbKQXwsqA' LIMIT 1
|
230
230
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
231
|
-
[1m[35mUser Exists (0.
|
231
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'rHyEHIbiokDFG8C58Ji9Vg@sample.com' AND "users"."id" != 1) LIMIT 1
|
232
232
|
Binary data inserted for `string` type on column `password_digest`
|
233
|
-
[1m[36mSQL (0.
|
234
|
-
[1m[35m (
|
233
|
+
[1m[36mSQL (0.7ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$YXvBWLknHbjX60hGblll9enrpVDiaLNqmfoeUcE.CHlPkrc8u9cDe"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
234
|
+
[1m[35m (1.1ms)[0m commit transaction
|
235
235
|
Redirected to http://localhost:3000/
|
236
|
-
Completed 302 Found in
|
237
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
236
|
+
Completed 302 Found in 15ms (ActiveRecord: 2.3ms)
|
237
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
238
238
|
Processing by HomeController#index as HTML
|
239
|
-
Completed 200 OK in
|
240
|
-
[1m[36m (
|
239
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
240
|
+
[1m[36m (1.1ms)[0m [1mDELETE FROM "users";[0m
|
241
241
|
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
242
|
-
[1m[36m (0.
|
242
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
243
243
|
--------------------------------------------------------------------------------
|
244
244
|
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
245
245
|
--------------------------------------------------------------------------------
|
246
|
-
[1m[35mActiveRecord::SchemaMigration Load (0.
|
247
|
-
[1m[36m (0.
|
248
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
249
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
246
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
247
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
248
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'GSPbFRgY_iDZSwHXjWugMQ@sample.com' LIMIT 1
|
249
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'JhNFHHPNA9Atwv2NAukgFg' LIMIT 1[0m
|
250
250
|
Binary data inserted for `string` type on column `password_digest`
|
251
|
-
[1m[35mSQL (0.
|
252
|
-
[1m[36m (
|
253
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
251
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "JhNFHHPNA9Atwv2NAukgFg"], ["created_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["email", "GSPbFRgY_iDZSwHXjWugMQ@sample.com"], ["password_digest", "$2a$04$QhjCnhltY7BomOQhAXc.u.iKbwQDBxnCRaS9JozXuI.gHzxIWxf/m"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
252
|
+
[1m[36m (1.0ms)[0m [1mcommit transaction[0m
|
253
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
254
254
|
Processing by SessionsController#new as HTML
|
255
|
-
Completed 200 OK in
|
256
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
255
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
256
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
257
257
|
Processing by PasswordResetsController#new as HTML
|
258
|
-
Completed 200 OK in
|
259
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
258
|
+
Completed 200 OK in 3ms (Views: 2.2ms | ActiveRecord: 0.0ms)
|
259
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
260
260
|
Processing by PasswordResetsController#create as HTML
|
261
261
|
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
262
262
|
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
263
263
|
Completed 200 OK in 3ms (Views: 1.7ms | ActiveRecord: 0.2ms)
|
264
|
-
[1m[36m (1.
|
265
|
-
[1m[35m (0.
|
264
|
+
[1m[36m (1.4ms)[0m [1mDELETE FROM "users";[0m
|
265
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
266
266
|
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
267
267
|
-------------------------------------------------------------------------
|
268
268
|
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
269
269
|
-------------------------------------------------------------------------
|
270
270
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
271
|
-
[1m[36m (0.
|
272
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
273
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
271
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
272
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'hY7A32WAJgdVtVej3uyi5g@sample.com' LIMIT 1
|
273
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '8o-MB9zyNwYt9IVgNPmKUw' LIMIT 1[0m
|
274
274
|
Binary data inserted for `string` type on column `password_digest`
|
275
|
-
[1m[35mSQL (0.
|
276
|
-
[1m[36m (
|
277
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
275
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "8o-MB9zyNwYt9IVgNPmKUw"], ["created_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["email", "hY7A32WAJgdVtVej3uyi5g@sample.com"], ["password_digest", "$2a$04$3oq3TCo/rW986jrZblLJ3e1ZgB4TTtX2Bwe7khW0qft.KyUUtgEBS"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
276
|
+
[1m[36m (1.1ms)[0m [1mcommit transaction[0m
|
277
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
278
278
|
Processing by SessionsController#new as HTML
|
279
|
-
Completed 200 OK in 3ms (Views:
|
280
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
279
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
280
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
281
281
|
Processing by PasswordResetsController#new as HTML
|
282
|
-
Completed 200 OK in
|
283
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
282
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
283
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
284
284
|
Processing by PasswordResetsController#create as HTML
|
285
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
286
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
287
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
285
|
+
Parameters: {"utf8"=>"✓", "email"=>"hY7A32WAJgdVtVej3uyi5g@sample.com", "commit"=>"Reset password"}
|
286
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'hY7A32WAJgdVtVej3uyi5g@sample.com' LIMIT 1
|
287
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'sq8KXg_h7YN8zeqN_8KUrA' LIMIT 1[0m
|
288
288
|
[1m[35m (0.1ms)[0m begin transaction
|
289
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
290
|
-
[1m[35mSQL (0.4ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "
|
291
|
-
[1m[36m (
|
289
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'hY7A32WAJgdVtVej3uyi5g@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
290
|
+
[1m[35mSQL (0.4ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "sq8KXg_h7YN8zeqN_8KUrA"], ["password_reset_sent_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
291
|
+
[1m[36m (2.5ms)[0m [1mcommit transaction[0m
|
292
292
|
|
293
|
-
Sent mail to
|
294
|
-
Date:
|
293
|
+
Sent mail to hY7A32WAJgdVtVej3uyi5g@sample.com (11.5ms)
|
294
|
+
Date: Wed, 12 Jun 2013 21:23:37 +0200
|
295
295
|
From: from@example.com
|
296
|
-
To:
|
297
|
-
Message-ID: <
|
296
|
+
To: hY7A32WAJgdVtVej3uyi5g@sample.com
|
297
|
+
Message-ID: <51b8cab990e96_35fc3fc18c46066c4484@Richards-MacBook-Air.local.mail>
|
298
298
|
Subject: Password Reset
|
299
299
|
Mime-Version: 1.0
|
300
300
|
Content-Type: text/plain;
|
@@ -303,62 +303,62 @@ Content-Transfer-Encoding: 7bit
|
|
303
303
|
|
304
304
|
To reset your password, click the URL below.
|
305
305
|
|
306
|
-
http://localhost:3000/password_resets/
|
306
|
+
http://localhost:3000/password_resets/sq8KXg_h7YN8zeqN_8KUrA/edit
|
307
307
|
|
308
308
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
309
309
|
Redirected to http://www.example.com/
|
310
|
-
Completed 302 Found in 31ms (ActiveRecord:
|
311
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
310
|
+
Completed 302 Found in 31ms (ActiveRecord: 3.3ms)
|
311
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
312
312
|
Processing by HomeController#index as HTML
|
313
|
-
Completed 200 OK in 2ms (Views:
|
314
|
-
Started GET "/password_resets/
|
313
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
314
|
+
Started GET "/password_resets/sq8KXg_h7YN8zeqN_8KUrA/edit" for 127.0.0.1 at 2013-06-14 02:00:00 +0200
|
315
315
|
Processing by PasswordResetsController#edit as HTML
|
316
|
-
Parameters: {"id"=>"
|
317
|
-
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
316
|
+
Parameters: {"id"=>"sq8KXg_h7YN8zeqN_8KUrA"}
|
317
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'sq8KXg_h7YN8zeqN_8KUrA' LIMIT 1
|
318
318
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
319
|
-
Started PATCH "/password_resets/
|
319
|
+
Started PATCH "/password_resets/sq8KXg_h7YN8zeqN_8KUrA" for 127.0.0.1 at 2013-06-14 02:00:00 +0200
|
320
320
|
Processing by PasswordResetsController#update as HTML
|
321
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
322
|
-
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
321
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"sq8KXg_h7YN8zeqN_8KUrA"}
|
322
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'sq8KXg_h7YN8zeqN_8KUrA' LIMIT 1[0m
|
323
323
|
Redirected to http://localhost:3000/password_resets/new
|
324
324
|
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
325
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
325
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-14 02:00:00 +0200
|
326
326
|
Processing by PasswordResetsController#new as HTML
|
327
327
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
328
|
-
[1m[35m (1.
|
328
|
+
[1m[35m (1.3ms)[0m DELETE FROM "users";
|
329
329
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
330
330
|
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
331
331
|
-------------------------------------------------------------------------------------------
|
332
332
|
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
333
333
|
-------------------------------------------------------------------------------------------
|
334
334
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
335
|
-
[1m[35m (0.
|
336
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
337
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
335
|
+
[1m[35m (0.1ms)[0m begin transaction
|
336
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '2Al7mLnQuesv4vv_OtUbEA@sample.com' LIMIT 1[0m
|
337
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '3Qa6ypXf8yiK6HmtXuAvJw' LIMIT 1
|
338
338
|
Binary data inserted for `string` type on column `password_digest`
|
339
|
-
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
340
|
-
[1m[35m (1.
|
341
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
339
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "3Qa6ypXf8yiK6HmtXuAvJw"], ["created_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["email", "2Al7mLnQuesv4vv_OtUbEA@sample.com"], ["password_digest", "$2a$04$oQSzqn4CIUMqp/S9MLWxHudg.HlhF6BEa6IrwKTDAILAUhrkaLkiq"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
340
|
+
[1m[35m (1.0ms)[0m commit transaction
|
341
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
342
342
|
Processing by SessionsController#new as HTML
|
343
|
-
Completed 200 OK in
|
344
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
343
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
344
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
345
345
|
Processing by PasswordResetsController#new as HTML
|
346
|
-
Completed 200 OK in 2ms (Views: 2.
|
347
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
346
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
347
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
348
348
|
Processing by PasswordResetsController#create as HTML
|
349
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
350
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
351
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
349
|
+
Parameters: {"utf8"=>"✓", "email"=>"2Al7mLnQuesv4vv_OtUbEA@sample.com", "commit"=>"Reset password"}
|
350
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '2Al7mLnQuesv4vv_OtUbEA@sample.com' LIMIT 1[0m
|
351
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'sV_1C6JHjHsEKyAq-6dvTg' LIMIT 1
|
352
352
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
353
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
354
|
-
[1m[36mSQL (0.
|
355
|
-
[1m[35m (
|
353
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '2Al7mLnQuesv4vv_OtUbEA@sample.com' AND "users"."id" != 1) LIMIT 1
|
354
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "sV_1C6JHjHsEKyAq-6dvTg"], ["password_reset_sent_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
355
|
+
[1m[35m (2.6ms)[0m commit transaction
|
356
356
|
|
357
|
-
Sent mail to
|
358
|
-
Date:
|
357
|
+
Sent mail to 2Al7mLnQuesv4vv_OtUbEA@sample.com (11.5ms)
|
358
|
+
Date: Wed, 12 Jun 2013 21:23:37 +0200
|
359
359
|
From: from@example.com
|
360
|
-
To:
|
361
|
-
Message-ID: <
|
360
|
+
To: 2Al7mLnQuesv4vv_OtUbEA@sample.com
|
361
|
+
Message-ID: <51b8cab9b14d5_35fc3fc18c46066c45c@Richards-MacBook-Air.local.mail>
|
362
362
|
Subject: Password Reset
|
363
363
|
Mime-Version: 1.0
|
364
364
|
Content-Type: text/plain;
|
@@ -367,102 +367,102 @@ Content-Transfer-Encoding: 7bit
|
|
367
367
|
|
368
368
|
To reset your password, click the URL below.
|
369
369
|
|
370
|
-
http://localhost:3000/password_resets/
|
370
|
+
http://localhost:3000/password_resets/sV_1C6JHjHsEKyAq-6dvTg/edit
|
371
371
|
|
372
372
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
373
373
|
Redirected to http://www.example.com/
|
374
|
-
Completed 302 Found in
|
375
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
374
|
+
Completed 302 Found in 31ms (ActiveRecord: 3.4ms)
|
375
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
376
376
|
Processing by HomeController#index as HTML
|
377
|
-
Completed 200 OK in 2ms (Views:
|
378
|
-
Started GET "/password_resets/
|
377
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
378
|
+
Started GET "/password_resets/sV_1C6JHjHsEKyAq-6dvTg/edit" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
379
379
|
Processing by PasswordResetsController#edit as HTML
|
380
|
-
Parameters: {"id"=>"
|
381
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
382
|
-
Completed 200 OK in
|
383
|
-
Started PATCH "/password_resets/
|
380
|
+
Parameters: {"id"=>"sV_1C6JHjHsEKyAq-6dvTg"}
|
381
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'sV_1C6JHjHsEKyAq-6dvTg' LIMIT 1[0m
|
382
|
+
Completed 200 OK in 8ms (Views: 6.5ms | ActiveRecord: 0.2ms)
|
383
|
+
Started PATCH "/password_resets/sV_1C6JHjHsEKyAq-6dvTg" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
384
384
|
Processing by PasswordResetsController#update as HTML
|
385
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
386
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
385
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"sV_1C6JHjHsEKyAq-6dvTg"}
|
386
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'sV_1C6JHjHsEKyAq-6dvTg' LIMIT 1
|
387
387
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
388
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
388
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '2Al7mLnQuesv4vv_OtUbEA@sample.com' AND "users"."id" != 1) LIMIT 1
|
389
389
|
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
390
|
-
Completed 200 OK in
|
391
|
-
[1m[35m (2.
|
390
|
+
Completed 200 OK in 77ms (Views: 4.9ms | ActiveRecord: 0.6ms)
|
391
|
+
[1m[35m (2.9ms)[0m DELETE FROM "users";
|
392
392
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
393
|
-
[1m[35m (1.
|
393
|
+
[1m[35m (1.1ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
394
394
|
-----------------------------------
|
395
395
|
AuthproIntegrationTest: test_signup
|
396
396
|
-----------------------------------
|
397
397
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
398
398
|
[1m[35m (0.2ms)[0m begin transaction
|
399
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
400
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
399
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '92CEzDVvm9kt3HDRIfo5Vw@sample.com' LIMIT 1[0m
|
400
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'UsdwaLZtSQazTpAigNHk_w' LIMIT 1
|
401
401
|
Binary data inserted for `string` type on column `password_digest`
|
402
|
-
[1m[36mSQL (0.
|
403
|
-
[1m[35m (0.
|
404
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
402
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "UsdwaLZtSQazTpAigNHk_w"], ["created_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["email", "92CEzDVvm9kt3HDRIfo5Vw@sample.com"], ["password_digest", "$2a$04$yHROM2XR1mGDqQNxW28ab.gTL569MbJCetgZGT6AMuI1AI//llxx6"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
403
|
+
[1m[35m (0.9ms)[0m commit transaction
|
404
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
405
405
|
Processing by HomeController#index as HTML
|
406
|
-
Completed 200 OK in 2ms (Views:
|
407
|
-
Started GET "/signup" for 127.0.0.1 at 2013-
|
406
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
407
|
+
Started GET "/signup" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
408
408
|
Processing by UsersController#new as HTML
|
409
|
-
Completed 200 OK in
|
410
|
-
Started POST "/users" for 127.0.0.1 at 2013-
|
409
|
+
Completed 200 OK in 8ms (Views: 7.2ms | ActiveRecord: 0.0ms)
|
410
|
+
Started POST "/users" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
411
411
|
Processing by UsersController#create as HTML
|
412
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
412
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"dZKY36adIKWS_SRGqCt6Ww@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
413
413
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
414
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
415
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
414
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'dZKY36adIKWS_SRGqCt6Ww@sample.com' LIMIT 1
|
415
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '45TvgLMDmJn2Xfz6io91LQ' LIMIT 1[0m
|
416
416
|
Binary data inserted for `string` type on column `password_digest`
|
417
|
-
[1m[35mSQL (0.
|
418
|
-
[1m[36m (
|
417
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "45TvgLMDmJn2Xfz6io91LQ"], ["created_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["email", "dZKY36adIKWS_SRGqCt6Ww@sample.com"], ["password_digest", "$2a$04$1GmSxJpZkJSX2npImm.qV.9bGtqpFus6CtZrwBv1SSrznWd3aluQi"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
418
|
+
[1m[36m (1.0ms)[0m [1mcommit transaction[0m
|
419
419
|
Redirected to http://www.example.com/
|
420
|
-
Completed 302 Found in
|
421
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
420
|
+
Completed 302 Found in 11ms (ActiveRecord: 1.7ms)
|
421
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
422
422
|
Processing by HomeController#index as HTML
|
423
|
-
Completed 200 OK in 2ms (Views: 1.
|
424
|
-
[1m[35m (1.
|
423
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
424
|
+
[1m[35m (1.2ms)[0m DELETE FROM "users";
|
425
425
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
426
426
|
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
427
427
|
-------------------------------------------
|
428
428
|
AuthproIntegrationTest: test_signup_failing
|
429
429
|
-------------------------------------------
|
430
|
-
[1m[36mActiveRecord::SchemaMigration Load (0.
|
430
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
431
431
|
[1m[35m (0.1ms)[0m begin transaction
|
432
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
433
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
432
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '7LbtRHwo2e97T-hBHUGxXg@sample.com' LIMIT 1[0m
|
433
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'ocViu-hY4J7yzS48-YQm2w' LIMIT 1
|
434
434
|
Binary data inserted for `string` type on column `password_digest`
|
435
|
-
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
435
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "ocViu-hY4J7yzS48-YQm2w"], ["created_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["email", "7LbtRHwo2e97T-hBHUGxXg@sample.com"], ["password_digest", "$2a$04$RvPLAdsaboAeoM9iFk4AkOj6s3UGB/B36Jc/Gk7fOpwnex1OLwlAS"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
436
436
|
[1m[35m (0.9ms)[0m commit transaction
|
437
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
437
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
438
438
|
Processing by HomeController#index as HTML
|
439
|
-
Completed 200 OK in 2ms (Views:
|
440
|
-
Started GET "/signup" for 127.0.0.1 at 2013-
|
439
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
440
|
+
Started GET "/signup" for 127.0.0.1 at 2013-06-12 21:23:38 +0200
|
441
441
|
Processing by UsersController#new as HTML
|
442
|
-
Completed 200 OK in
|
443
|
-
Started POST "/users" for 127.0.0.1 at 2013-
|
442
|
+
Completed 200 OK in 5ms (Views: 4.8ms | ActiveRecord: 0.0ms)
|
443
|
+
Started POST "/users" for 127.0.0.1 at 2013-06-12 21:23:38 +0200
|
444
444
|
Processing by UsersController#create as HTML
|
445
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
445
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"8rmw1L4dxcunIFh7wiAtFQ@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
446
446
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
447
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
447
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '8rmw1L4dxcunIFh7wiAtFQ@sample.com' LIMIT 1
|
448
448
|
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
449
|
-
Completed 200 OK in
|
450
|
-
[1m[35m (1.
|
451
|
-
[1m[36m (0.
|
452
|
-
[1m[35m (0.
|
449
|
+
Completed 200 OK in 14ms (Views: 4.8ms | ActiveRecord: 0.3ms)
|
450
|
+
[1m[35m (1.1ms)[0m DELETE FROM "users";
|
451
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
452
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
453
453
|
---------------------------------------
|
454
454
|
AuthproIntegrationTest: test_visit_home
|
455
455
|
---------------------------------------
|
456
456
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
457
457
|
[1m[35m (0.2ms)[0m begin transaction
|
458
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
459
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
458
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'Bx1IuCV9F8EByAcq0_Ul0A@sample.com' LIMIT 1[0m
|
459
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '8kWAAWcblhcq2QCImdJS5w' LIMIT 1
|
460
460
|
Binary data inserted for `string` type on column `password_digest`
|
461
|
-
[1m[36mSQL (0.
|
462
|
-
[1m[35m (
|
463
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
461
|
+
[1m[36mSQL (0.6ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "8kWAAWcblhcq2QCImdJS5w"], ["created_at", Wed, 12 Jun 2013 19:23:38 UTC +00:00], ["email", "Bx1IuCV9F8EByAcq0_Ul0A@sample.com"], ["password_digest", "$2a$04$8eEkPwZWb2R1yCWNuyjdQOJwlkuHqRBwjr7pYEV9A4zUBITYs9Odq"], ["updated_at", Wed, 12 Jun 2013 19:23:38 UTC +00:00]]
|
462
|
+
[1m[35m (1.0ms)[0m commit transaction
|
463
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:38 +0200
|
464
464
|
Processing by HomeController#index as HTML
|
465
|
-
Completed 200 OK in 2ms (Views:
|
466
|
-
[1m[36m (1.
|
467
|
-
[1m[35m (0.
|
468
|
-
[1m[36m (
|
465
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
466
|
+
[1m[36m (1.2ms)[0m [1mDELETE FROM "users";[0m
|
467
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
468
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
@@ -5,11 +5,11 @@ one:
|
|
5
5
|
password_digest: MyString
|
6
6
|
auth_token: MyString
|
7
7
|
password_reset_token: MyString
|
8
|
-
password_reset_sent_at: 2013-
|
8
|
+
password_reset_sent_at: 2013-06-12 21:23:36
|
9
9
|
|
10
10
|
two:
|
11
11
|
email: MyString
|
12
12
|
password_digest: MyString
|
13
13
|
auth_token: MyString
|
14
14
|
password_reset_token: MyString
|
15
|
-
password_reset_sent_at: 2013-
|
15
|
+
password_reset_sent_at: 2013-06-12 21:23:36
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: authpro
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.9.
|
4
|
+
version: 0.9.3
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Richard Nyström
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2013-
|
11
|
+
date: 2013-06-12 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: rails
|
@@ -16,14 +16,14 @@ dependencies:
|
|
16
16
|
requirements:
|
17
17
|
- - ~>
|
18
18
|
- !ruby/object:Gem::Version
|
19
|
-
version: 4.0.0.
|
19
|
+
version: 4.0.0.rc2
|
20
20
|
type: :runtime
|
21
21
|
prerelease: false
|
22
22
|
version_requirements: !ruby/object:Gem::Requirement
|
23
23
|
requirements:
|
24
24
|
- - ~>
|
25
25
|
- !ruby/object:Gem::Version
|
26
|
-
version: 4.0.0.
|
26
|
+
version: 4.0.0.rc2
|
27
27
|
- !ruby/object:Gem::Dependency
|
28
28
|
name: bcrypt-ruby
|
29
29
|
requirement: !ruby/object:Gem::Requirement
|
@@ -72,14 +72,14 @@ dependencies:
|
|
72
72
|
requirements:
|
73
73
|
- - ~>
|
74
74
|
- !ruby/object:Gem::Version
|
75
|
-
version: 1.0.
|
75
|
+
version: 1.0.1
|
76
76
|
type: :development
|
77
77
|
prerelease: false
|
78
78
|
version_requirements: !ruby/object:Gem::Requirement
|
79
79
|
requirements:
|
80
80
|
- - ~>
|
81
81
|
- !ruby/object:Gem::Version
|
82
|
-
version: 1.0.
|
82
|
+
version: 1.0.1
|
83
83
|
- !ruby/object:Gem::Dependency
|
84
84
|
name: timecop
|
85
85
|
requirement: !ruby/object:Gem::Requirement
|
@@ -209,7 +209,7 @@ files:
|
|
209
209
|
- test/rails/dummy/config/locales/en.yml
|
210
210
|
- test/rails/dummy/config/routes.rb
|
211
211
|
- test/rails/dummy/config.ru
|
212
|
-
- test/rails/dummy/db/migrate/
|
212
|
+
- test/rails/dummy/db/migrate/20130612192336_create_users.rb
|
213
213
|
- test/rails/dummy/db/test.sqlite3
|
214
214
|
- test/rails/dummy/Gemfile
|
215
215
|
- test/rails/dummy/Gemfile.lock
|
@@ -327,7 +327,7 @@ test_files:
|
|
327
327
|
- test/rails/dummy/config/locales/en.yml
|
328
328
|
- test/rails/dummy/config/routes.rb
|
329
329
|
- test/rails/dummy/config.ru
|
330
|
-
- test/rails/dummy/db/migrate/
|
330
|
+
- test/rails/dummy/db/migrate/20130612192336_create_users.rb
|
331
331
|
- test/rails/dummy/db/test.sqlite3
|
332
332
|
- test/rails/dummy/Gemfile
|
333
333
|
- test/rails/dummy/Gemfile.lock
|