authpro 0.9.3 → 1.0.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +1 -1
- data/lib/authpro/version.rb +1 -1
- data/test/rails/dummy/db/migrate/{20130612192336_create_users.rb → 20130625163635_create_users.rb} +0 -0
- data/test/rails/dummy/db/test.sqlite3 +0 -0
- data/test/rails/dummy/log/test.log +216 -216
- data/test/rails/dummy/test/fixtures/users.yml +2 -2
- metadata +8 -8
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6a962d916a49339d4e50d4fa1d0d29a4659322ac
|
4
|
+
data.tar.gz: bc7bd3f99c7fff3d7eab7465c09cde335ba2e55e
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8001f059edc71664e63c63bd1272e9b193543aa43751e8b688535ff9801e9fc029e8eaedd9310cbb8fb4cbb4cf16f8a100691a7445c3e2af06d6ca2dd2e643d9
|
7
|
+
data.tar.gz: 33e3ab74eed9a1f1637ce6dc6fef2577a35ce437693195a11a4b7b5ddb20d2ec7f2fe83ef7b95d8aad9059bbb6a68eddc52d50b1d18597918146d788e6dd8e08
|
data/README.md
CHANGED
@@ -3,7 +3,7 @@
|
|
3
3
|
[![Code Climate](https://codeclimate.com/github/ricn/authpro.png)](https://codeclimate.com/github/ricn/authpro)
|
4
4
|
[![Build Status](https://travis-ci.org/ricn/authpro.png?branch=master)](https://travis-ci.org/ricn/authpro)
|
5
5
|
|
6
|
-
Authpro is a simple authentication generator for Rails 4
|
6
|
+
Authpro is a simple authentication generator for Rails 4 It:
|
7
7
|
|
8
8
|
* Gives you sign up, log in, remember me & password reset functionality
|
9
9
|
* Has no hidden code, special super classes or mixins
|
data/lib/authpro/version.rb
CHANGED
data/test/rails/dummy/db/migrate/{20130612192336_create_users.rb → 20130625163635_create_users.rb}
RENAMED
File without changes
|
Binary file
|
@@ -70,138 +70,138 @@ AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
70
70
|
----------------------------------------------------------------
|
71
71
|
[1m[36m (0.3ms)[0m [1mbegin transaction[0m
|
72
72
|
[1m[35m (0.1ms)[0m rollback transaction
|
73
|
-
[1m[36m (0.
|
73
|
+
[1m[36m (0.3ms)[0m [1mbegin transaction[0m
|
74
74
|
------------------------------------------
|
75
75
|
AuthproGeneratorTest: test_generated_files
|
76
76
|
------------------------------------------
|
77
|
-
[1m[35m (0.
|
77
|
+
[1m[35m (0.2ms)[0m rollback transaction
|
78
78
|
----------------------------------
|
79
79
|
AuthproIntegrationTest: test_login
|
80
80
|
----------------------------------
|
81
|
-
[1m[36m (1.
|
82
|
-
[1m[35m (1.
|
81
|
+
[1m[36m (1.1ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
82
|
+
[1m[35m (1.3ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
83
83
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
84
|
-
Migrating to CreateUsers (
|
84
|
+
Migrating to CreateUsers (20130625163635)
|
85
85
|
[1m[35m (0.1ms)[0m begin transaction
|
86
86
|
[1m[36m (0.4ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
87
|
-
[1m[35mSQL (0.
|
88
|
-
[1m[36m (
|
87
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20130625163635"]]
|
88
|
+
[1m[36m (1.2ms)[0m [1mcommit transaction[0m
|
89
89
|
[1m[35m (0.1ms)[0m begin transaction
|
90
|
-
[1m[36mUser Exists (0.
|
91
|
-
[1m[35mUser Exists (0.
|
90
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'DJAWMqrIAWcTabEqn-VvPg@sample.com' LIMIT 1[0m
|
91
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'rFBRLZdX_zyQgx_T3FISOg' LIMIT 1
|
92
92
|
Binary data inserted for `string` type on column `password_digest`
|
93
|
-
[1m[36mSQL (
|
94
|
-
[1m[35m (
|
95
|
-
Started GET "/" for 127.0.0.1 at 2013-06-
|
93
|
+
[1m[36mSQL (5.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "rFBRLZdX_zyQgx_T3FISOg"], ["created_at", Tue, 25 Jun 2013 16:36:35 UTC +00:00], ["email", "DJAWMqrIAWcTabEqn-VvPg@sample.com"], ["password_digest", "$2a$04$odFsS8dHCl6AkUDY/SKs/.jBUvuOde0MhtpRz0G4AfPYndqm36l62"], ["updated_at", Tue, 25 Jun 2013 16:36:35 UTC +00:00]]
|
94
|
+
[1m[35m (1.3ms)[0m commit transaction
|
95
|
+
Started GET "/" for 127.0.0.1 at 2013-06-25 18:36:35 +0200
|
96
96
|
Processing by HomeController#index as HTML
|
97
97
|
Rendered home/index.html.erb within layouts/application (1.5ms)
|
98
|
-
Completed 200 OK in
|
99
|
-
Started GET "/login" for 127.0.0.1 at 2013-06-
|
98
|
+
Completed 200 OK in 39ms (Views: 38.7ms | ActiveRecord: 0.0ms)
|
99
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-25 18:36:35 +0200
|
100
100
|
Processing by SessionsController#new as HTML
|
101
|
-
Rendered sessions/new.html.erb within layouts/application (
|
102
|
-
Completed 200 OK in
|
103
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-06-
|
101
|
+
Rendered sessions/new.html.erb within layouts/application (2.1ms)
|
102
|
+
Completed 200 OK in 6ms (Views: 5.3ms | ActiveRecord: 0.0ms)
|
103
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-06-25 18:36:35 +0200
|
104
104
|
Processing by SessionsController#create as HTML
|
105
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
106
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
105
|
+
Parameters: {"utf8"=>"✓", "email"=>"DJAWMqrIAWcTabEqn-VvPg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
106
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'DJAWMqrIAWcTabEqn-VvPg@sample.com' LIMIT 1[0m
|
107
107
|
Redirected to http://www.example.com/
|
108
108
|
Completed 302 Found in 8ms (ActiveRecord: 0.2ms)
|
109
|
-
Started GET "/" for 127.0.0.1 at 2013-06-
|
109
|
+
Started GET "/" for 127.0.0.1 at 2013-06-25 18:36:35 +0200
|
110
110
|
Processing by HomeController#index as HTML
|
111
111
|
Rendered home/index.html.erb within layouts/application (0.1ms)
|
112
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = '
|
113
|
-
Completed 200 OK in
|
114
|
-
[1m[36m (2.
|
112
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'rFBRLZdX_zyQgx_T3FISOg' LIMIT 1
|
113
|
+
Completed 200 OK in 52ms (Views: 51.3ms | ActiveRecord: 0.2ms)
|
114
|
+
[1m[36m (2.8ms)[0m [1mDELETE FROM "users";[0m
|
115
115
|
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
116
|
-
[1m[36m (1.
|
116
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
117
117
|
------------------------------------------
|
118
118
|
AuthproIntegrationTest: test_login_failing
|
119
119
|
------------------------------------------
|
120
120
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
121
|
-
[1m[36m (0.
|
122
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
123
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
121
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
122
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '_UbFvp_pWE0xrm00Ll1rSg@sample.com' LIMIT 1
|
123
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'nMgyjPHghr7Iz3iIuwVQvg' LIMIT 1[0m
|
124
124
|
Binary data inserted for `string` type on column `password_digest`
|
125
|
-
[1m[35mSQL (0.
|
126
|
-
[1m[36m (
|
127
|
-
Started GET "/" for 127.0.0.1 at 2013-06-
|
125
|
+
[1m[35mSQL (0.6ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "nMgyjPHghr7Iz3iIuwVQvg"], ["created_at", Tue, 25 Jun 2013 16:36:35 UTC +00:00], ["email", "_UbFvp_pWE0xrm00Ll1rSg@sample.com"], ["password_digest", "$2a$04$eHvqH.knXbPLxiE4puoyZu6.sZhidx2FAXkUls4MJEJRNzLqstiLe"], ["updated_at", Tue, 25 Jun 2013 16:36:35 UTC +00:00]]
|
126
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
127
|
+
Started GET "/" for 127.0.0.1 at 2013-06-25 18:36:35 +0200
|
128
128
|
Processing by HomeController#index as HTML
|
129
|
-
Completed 200 OK in
|
130
|
-
Started GET "/login" for 127.0.0.1 at 2013-06-
|
129
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
130
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-25 18:36:35 +0200
|
131
131
|
Processing by SessionsController#new as HTML
|
132
|
-
Completed 200 OK in
|
133
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-06-
|
132
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
133
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-06-25 18:36:35 +0200
|
134
134
|
Processing by SessionsController#create as HTML
|
135
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
136
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
137
|
-
Completed 200 OK in
|
138
|
-
[1m[36m (1.
|
139
|
-
[1m[35m (0.
|
140
|
-
[1m[36m (1.
|
135
|
+
Parameters: {"utf8"=>"✓", "email"=>"_UbFvp_pWE0xrm00Ll1rSg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
136
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '_UbFvp_pWE0xrm00Ll1rSg@sample.com' LIMIT 1
|
137
|
+
Completed 200 OK in 9ms (Views: 2.2ms | ActiveRecord: 0.2ms)
|
138
|
+
[1m[36m (1.2ms)[0m [1mDELETE FROM "users";[0m
|
139
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
140
|
+
[1m[36m (1.1ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
141
141
|
-----------------------------------
|
142
142
|
AuthproIntegrationTest: test_logout
|
143
143
|
-----------------------------------
|
144
144
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
145
|
-
[1m[36m (0.
|
146
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
147
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
145
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
146
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '_xzXza8gjrcNKusWr9GdfQ@sample.com' LIMIT 1
|
147
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'UlBVysw1sRjV7DDdldgsdA' LIMIT 1[0m
|
148
148
|
Binary data inserted for `string` type on column `password_digest`
|
149
|
-
[1m[35mSQL (0.
|
150
|
-
[1m[36m (0.
|
151
|
-
Started GET "/login" for 127.0.0.1 at 2013-06-
|
149
|
+
[1m[35mSQL (0.7ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "UlBVysw1sRjV7DDdldgsdA"], ["created_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00], ["email", "_xzXza8gjrcNKusWr9GdfQ@sample.com"], ["password_digest", "$2a$04$M7KXS7FJ0Prp3.YsQ7PvEulLeEr87JYsn47wLwOHqmxkSvkvUlKDm"], ["updated_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00]]
|
150
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
151
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
152
152
|
Processing by SessionsController#new as HTML
|
153
|
-
Completed 200 OK in
|
154
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-06-
|
153
|
+
Completed 200 OK in 4ms (Views: 3.9ms | ActiveRecord: 0.0ms)
|
154
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
155
155
|
Processing by SessionsController#create as HTML
|
156
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
157
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
156
|
+
Parameters: {"utf8"=>"✓", "email"=>"_xzXza8gjrcNKusWr9GdfQ@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
157
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '_xzXza8gjrcNKusWr9GdfQ@sample.com' LIMIT 1
|
158
158
|
Redirected to http://www.example.com/
|
159
159
|
Completed 302 Found in 7ms (ActiveRecord: 0.2ms)
|
160
|
-
Started GET "/" for 127.0.0.1 at 2013-06-
|
160
|
+
Started GET "/" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
161
161
|
Processing by HomeController#index as HTML
|
162
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = '
|
163
|
-
Completed 200 OK in 3ms (Views: 2.
|
164
|
-
Started GET "/logout" for 127.0.0.1 at 2013-06-
|
162
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'UlBVysw1sRjV7DDdldgsdA' LIMIT 1[0m
|
163
|
+
Completed 200 OK in 3ms (Views: 2.6ms | ActiveRecord: 0.2ms)
|
164
|
+
Started GET "/logout" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
165
165
|
Processing by SessionsController#destroy as HTML
|
166
166
|
Redirected to http://www.example.com/
|
167
167
|
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
168
|
-
Started GET "/" for 127.0.0.1 at 2013-06-
|
168
|
+
Started GET "/" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
169
169
|
Processing by HomeController#index as HTML
|
170
|
-
Completed 200 OK in 2ms (Views: 1.
|
171
|
-
[1m[35m (1.
|
170
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
171
|
+
[1m[35m (1.2ms)[0m DELETE FROM "users";
|
172
172
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
173
|
-
[1m[35m (
|
173
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
174
174
|
-------------------------------------------
|
175
175
|
AuthproIntegrationTest: test_reset_password
|
176
176
|
-------------------------------------------
|
177
177
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
178
178
|
[1m[35m (0.2ms)[0m begin transaction
|
179
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
180
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
179
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'N1EbfmzclBRqR0r7G_32QA@sample.com' LIMIT 1[0m
|
180
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '2mgJ88lvAaw0OtvBGMVQdQ' LIMIT 1
|
181
181
|
Binary data inserted for `string` type on column `password_digest`
|
182
|
-
[1m[36mSQL (0.
|
182
|
+
[1m[36mSQL (0.6ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "2mgJ88lvAaw0OtvBGMVQdQ"], ["created_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00], ["email", "N1EbfmzclBRqR0r7G_32QA@sample.com"], ["password_digest", "$2a$04$CJJSyPKN/2..bliz3DQX2eZuOg2S/.qh3KVdSLQ/AeVJKARp9aa12"], ["updated_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00]]
|
183
183
|
[1m[35m (1.0ms)[0m commit transaction
|
184
|
-
Started GET "/login" for 127.0.0.1 at 2013-06-
|
184
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
185
185
|
Processing by SessionsController#new as HTML
|
186
|
-
Completed 200 OK in
|
187
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-
|
186
|
+
Completed 200 OK in 4ms (Views: 3.3ms | ActiveRecord: 0.0ms)
|
187
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
188
188
|
Processing by PasswordResetsController#new as HTML
|
189
|
-
Completed 200 OK in 5ms (Views: 4.
|
190
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-06-
|
189
|
+
Completed 200 OK in 5ms (Views: 4.7ms | ActiveRecord: 0.0ms)
|
190
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
191
191
|
Processing by PasswordResetsController#create as HTML
|
192
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
193
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
194
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
192
|
+
Parameters: {"utf8"=>"✓", "email"=>"N1EbfmzclBRqR0r7G_32QA@sample.com", "commit"=>"Reset password"}
|
193
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'N1EbfmzclBRqR0r7G_32QA@sample.com' LIMIT 1[0m
|
194
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'Eoupp2vaS202Wx-ixlGyoQ' LIMIT 1
|
195
195
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
196
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
197
|
-
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "
|
198
|
-
[1m[35m (1.
|
196
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'N1EbfmzclBRqR0r7G_32QA@sample.com' AND "users"."id" != 1) LIMIT 1
|
197
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "Eoupp2vaS202Wx-ixlGyoQ"], ["password_reset_sent_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00], ["updated_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00]]
|
198
|
+
[1m[35m (1.1ms)[0m commit transaction
|
199
199
|
|
200
|
-
Sent mail to
|
201
|
-
Date:
|
200
|
+
Sent mail to N1EbfmzclBRqR0r7G_32QA@sample.com (19.8ms)
|
201
|
+
Date: Tue, 25 Jun 2013 18:36:36 +0200
|
202
202
|
From: from@example.com
|
203
|
-
To:
|
204
|
-
Message-ID: <
|
203
|
+
To: N1EbfmzclBRqR0r7G_32QA@sample.com
|
204
|
+
Message-ID: <51c9c7148f5b1_72873fdf9c4606705924@Richards-MacBook-Air.local.mail>
|
205
205
|
Subject: Password Reset
|
206
206
|
Mime-Version: 1.0
|
207
207
|
Content-Type: text/plain;
|
@@ -210,91 +210,91 @@ Content-Transfer-Encoding: 7bit
|
|
210
210
|
|
211
211
|
To reset your password, click the URL below.
|
212
212
|
|
213
|
-
http://localhost:3000/password_resets/
|
213
|
+
http://localhost:3000/password_resets/Eoupp2vaS202Wx-ixlGyoQ/edit
|
214
214
|
|
215
215
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
216
216
|
Redirected to http://www.example.com/
|
217
|
-
Completed 302 Found in
|
218
|
-
Started GET "/" for 127.0.0.1 at 2013-06-
|
217
|
+
Completed 302 Found in 438ms (ActiveRecord: 2.1ms)
|
218
|
+
Started GET "/" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
219
219
|
Processing by HomeController#index as HTML
|
220
|
-
Completed 200 OK in 2ms (Views:
|
221
|
-
Started GET "/password_resets/
|
220
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
221
|
+
Started GET "/password_resets/Eoupp2vaS202Wx-ixlGyoQ/edit" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
222
222
|
Processing by PasswordResetsController#edit as HTML
|
223
|
-
Parameters: {"id"=>"
|
224
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
225
|
-
Completed 200 OK in
|
226
|
-
Started PATCH "/password_resets/
|
223
|
+
Parameters: {"id"=>"Eoupp2vaS202Wx-ixlGyoQ"}
|
224
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Eoupp2vaS202Wx-ixlGyoQ' LIMIT 1[0m
|
225
|
+
Completed 200 OK in 71ms (Views: 69.4ms | ActiveRecord: 0.2ms)
|
226
|
+
Started PATCH "/password_resets/Eoupp2vaS202Wx-ixlGyoQ" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
227
227
|
Processing by PasswordResetsController#update as HTML
|
228
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
229
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
228
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"Eoupp2vaS202Wx-ixlGyoQ"}
|
229
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Eoupp2vaS202Wx-ixlGyoQ' LIMIT 1
|
230
230
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
231
|
-
[1m[35mUser Exists (0.
|
231
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'N1EbfmzclBRqR0r7G_32QA@sample.com' AND "users"."id" != 1) LIMIT 1
|
232
232
|
Binary data inserted for `string` type on column `password_digest`
|
233
|
-
[1m[36mSQL (0.
|
234
|
-
[1m[35m (
|
233
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$WRylAFG.0DdNIVS7wbb0CeH6Izov19e4DCXn8xUdkYHlKXaaMjF6W"], ["updated_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00]]
|
234
|
+
[1m[35m (2.4ms)[0m commit transaction
|
235
235
|
Redirected to http://localhost:3000/
|
236
|
-
Completed 302 Found in
|
237
|
-
Started GET "/" for 127.0.0.1 at 2013-06-
|
236
|
+
Completed 302 Found in 14ms (ActiveRecord: 3.3ms)
|
237
|
+
Started GET "/" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
238
238
|
Processing by HomeController#index as HTML
|
239
|
-
Completed 200 OK in 2ms (Views:
|
240
|
-
[1m[36m (
|
241
|
-
[1m[35m (0.
|
242
|
-
[1m[36m (0.
|
239
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
240
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM "users";[0m
|
241
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
242
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
243
243
|
--------------------------------------------------------------------------------
|
244
244
|
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
245
245
|
--------------------------------------------------------------------------------
|
246
246
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
247
|
-
[1m[36m (0.
|
248
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
249
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
247
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
248
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'DPBzgbrYpZk6tWixM9ADuw@sample.com' LIMIT 1
|
249
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'RSjPXuKsph5kfls1wkol4w' LIMIT 1[0m
|
250
250
|
Binary data inserted for `string` type on column `password_digest`
|
251
|
-
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "
|
252
|
-
[1m[36m (
|
253
|
-
Started GET "/login" for 127.0.0.1 at 2013-06-
|
251
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "RSjPXuKsph5kfls1wkol4w"], ["created_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00], ["email", "DPBzgbrYpZk6tWixM9ADuw@sample.com"], ["password_digest", "$2a$04$1xe0dKUB5UzfqfYNU.C5..faVwMUqJTWJjHQsR/dJvYEcCB9X.uc."], ["updated_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00]]
|
252
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
253
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
254
254
|
Processing by SessionsController#new as HTML
|
255
255
|
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
256
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-
|
256
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
257
257
|
Processing by PasswordResetsController#new as HTML
|
258
|
-
Completed 200 OK in
|
259
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-06-
|
258
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
259
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
260
260
|
Processing by PasswordResetsController#create as HTML
|
261
261
|
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
262
262
|
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
263
|
-
Completed 200 OK in 3ms (Views: 1.
|
264
|
-
[1m[36m (1.
|
263
|
+
Completed 200 OK in 3ms (Views: 1.8ms | ActiveRecord: 0.2ms)
|
264
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
265
265
|
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
266
266
|
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
267
267
|
-------------------------------------------------------------------------
|
268
268
|
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
269
269
|
-------------------------------------------------------------------------
|
270
270
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
271
|
-
[1m[36m (0.
|
272
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
273
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
271
|
+
[1m[36m (0.3ms)[0m [1mbegin transaction[0m
|
272
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '6tkhziIuEiHQRM3z11K88g@sample.com' LIMIT 1
|
273
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'KsQF1UQs5R8KsaCIw2PTCA' LIMIT 1[0m
|
274
274
|
Binary data inserted for `string` type on column `password_digest`
|
275
|
-
[1m[35mSQL (0.
|
276
|
-
[1m[36m (
|
277
|
-
Started GET "/login" for 127.0.0.1 at 2013-06-
|
275
|
+
[1m[35mSQL (0.7ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "KsQF1UQs5R8KsaCIw2PTCA"], ["created_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00], ["email", "6tkhziIuEiHQRM3z11K88g@sample.com"], ["password_digest", "$2a$04$InQHKr4zRYfAuJg9BKaq2e2JCFPeNRQjsp9Zt.cXJfMggOxA3lxVu"], ["updated_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00]]
|
276
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
277
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
278
278
|
Processing by SessionsController#new as HTML
|
279
|
-
Completed 200 OK in 3ms (Views:
|
280
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-
|
279
|
+
Completed 200 OK in 3ms (Views: 3.2ms | ActiveRecord: 0.0ms)
|
280
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
281
281
|
Processing by PasswordResetsController#new as HTML
|
282
|
-
Completed 200 OK in
|
283
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-06-
|
282
|
+
Completed 200 OK in 3ms (Views: 2.6ms | ActiveRecord: 0.0ms)
|
283
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
284
284
|
Processing by PasswordResetsController#create as HTML
|
285
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
286
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
287
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
285
|
+
Parameters: {"utf8"=>"✓", "email"=>"6tkhziIuEiHQRM3z11K88g@sample.com", "commit"=>"Reset password"}
|
286
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '6tkhziIuEiHQRM3z11K88g@sample.com' LIMIT 1
|
287
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'LTpknzk3cblBIhbYK0gbog' LIMIT 1[0m
|
288
288
|
[1m[35m (0.1ms)[0m begin transaction
|
289
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
290
|
-
[1m[35mSQL (0.
|
291
|
-
[1m[36m (
|
289
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '6tkhziIuEiHQRM3z11K88g@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
290
|
+
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "LTpknzk3cblBIhbYK0gbog"], ["password_reset_sent_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00], ["updated_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00]]
|
291
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
292
292
|
|
293
|
-
Sent mail to
|
294
|
-
Date:
|
293
|
+
Sent mail to 6tkhziIuEiHQRM3z11K88g@sample.com (11.6ms)
|
294
|
+
Date: Tue, 25 Jun 2013 18:36:36 +0200
|
295
295
|
From: from@example.com
|
296
|
-
To:
|
297
|
-
Message-ID: <
|
296
|
+
To: 6tkhziIuEiHQRM3z11K88g@sample.com
|
297
|
+
Message-ID: <51c9c714d6c82_72873fdf9c4606705931@Richards-MacBook-Air.local.mail>
|
298
298
|
Subject: Password Reset
|
299
299
|
Mime-Version: 1.0
|
300
300
|
Content-Type: text/plain;
|
@@ -303,62 +303,62 @@ Content-Transfer-Encoding: 7bit
|
|
303
303
|
|
304
304
|
To reset your password, click the URL below.
|
305
305
|
|
306
|
-
http://localhost:3000/password_resets/
|
306
|
+
http://localhost:3000/password_resets/LTpknzk3cblBIhbYK0gbog/edit
|
307
307
|
|
308
308
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
309
309
|
Redirected to http://www.example.com/
|
310
|
-
Completed 302 Found in
|
311
|
-
Started GET "/" for 127.0.0.1 at 2013-06-
|
310
|
+
Completed 302 Found in 30ms (ActiveRecord: 1.8ms)
|
311
|
+
Started GET "/" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
312
312
|
Processing by HomeController#index as HTML
|
313
|
-
Completed 200 OK in 2ms (Views:
|
314
|
-
Started GET "/password_resets/
|
313
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
314
|
+
Started GET "/password_resets/LTpknzk3cblBIhbYK0gbog/edit" for 127.0.0.1 at 2013-06-27 02:00:00 +0200
|
315
315
|
Processing by PasswordResetsController#edit as HTML
|
316
|
-
Parameters: {"id"=>"
|
317
|
-
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
316
|
+
Parameters: {"id"=>"LTpknzk3cblBIhbYK0gbog"}
|
317
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'LTpknzk3cblBIhbYK0gbog' LIMIT 1
|
318
318
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
319
|
-
Started PATCH "/password_resets/
|
319
|
+
Started PATCH "/password_resets/LTpknzk3cblBIhbYK0gbog" for 127.0.0.1 at 2013-06-27 02:00:00 +0200
|
320
320
|
Processing by PasswordResetsController#update as HTML
|
321
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
322
|
-
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
321
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"LTpknzk3cblBIhbYK0gbog"}
|
322
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'LTpknzk3cblBIhbYK0gbog' LIMIT 1[0m
|
323
323
|
Redirected to http://localhost:3000/password_resets/new
|
324
324
|
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
325
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-
|
325
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-27 02:00:00 +0200
|
326
326
|
Processing by PasswordResetsController#new as HTML
|
327
327
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
328
328
|
[1m[35m (1.3ms)[0m DELETE FROM "users";
|
329
|
-
[1m[36m (0.
|
330
|
-
[1m[35m (
|
329
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
330
|
+
[1m[35m (1.1ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
331
331
|
-------------------------------------------------------------------------------------------
|
332
332
|
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
333
333
|
-------------------------------------------------------------------------------------------
|
334
334
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
335
|
-
[1m[35m (0.
|
336
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
337
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
335
|
+
[1m[35m (0.2ms)[0m begin transaction
|
336
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'px1GCCcocfKy1MU-6zit_g@sample.com' LIMIT 1[0m
|
337
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'C01iJ1yD0N_Xonmu_bVWuw' LIMIT 1
|
338
338
|
Binary data inserted for `string` type on column `password_digest`
|
339
|
-
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
340
|
-
[1m[35m (
|
341
|
-
Started GET "/login" for 127.0.0.1 at 2013-06-
|
339
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "C01iJ1yD0N_Xonmu_bVWuw"], ["created_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00], ["email", "px1GCCcocfKy1MU-6zit_g@sample.com"], ["password_digest", "$2a$04$rmlHnI0RgJsNWMyBznpsZ.i2YRUdGQoUr8tNP/qEI3DiFLs0V/7Xe"], ["updated_at", Tue, 25 Jun 2013 16:36:36 UTC +00:00]]
|
340
|
+
[1m[35m (0.9ms)[0m commit transaction
|
341
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
342
342
|
Processing by SessionsController#new as HTML
|
343
|
-
Completed 200 OK in
|
344
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-
|
343
|
+
Completed 200 OK in 4ms (Views: 3.5ms | ActiveRecord: 0.0ms)
|
344
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-25 18:36:36 +0200
|
345
345
|
Processing by PasswordResetsController#new as HTML
|
346
|
-
Completed 200 OK in
|
347
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-06-
|
346
|
+
Completed 200 OK in 61ms (Views: 60.7ms | ActiveRecord: 0.0ms)
|
347
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-06-25 18:36:37 +0200
|
348
348
|
Processing by PasswordResetsController#create as HTML
|
349
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
350
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
351
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
349
|
+
Parameters: {"utf8"=>"✓", "email"=>"px1GCCcocfKy1MU-6zit_g@sample.com", "commit"=>"Reset password"}
|
350
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'px1GCCcocfKy1MU-6zit_g@sample.com' LIMIT 1[0m
|
351
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'vzeJT3Mv_r2emQGiZKml7A' LIMIT 1
|
352
352
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
353
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
354
|
-
[1m[36mSQL (0.
|
355
|
-
[1m[35m (
|
353
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'px1GCCcocfKy1MU-6zit_g@sample.com' AND "users"."id" != 1) LIMIT 1
|
354
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "vzeJT3Mv_r2emQGiZKml7A"], ["password_reset_sent_at", Tue, 25 Jun 2013 16:36:37 UTC +00:00], ["updated_at", Tue, 25 Jun 2013 16:36:37 UTC +00:00]]
|
355
|
+
[1m[35m (1.0ms)[0m commit transaction
|
356
356
|
|
357
|
-
Sent mail to
|
358
|
-
Date:
|
357
|
+
Sent mail to px1GCCcocfKy1MU-6zit_g@sample.com (11.7ms)
|
358
|
+
Date: Tue, 25 Jun 2013 18:36:37 +0200
|
359
359
|
From: from@example.com
|
360
|
-
To:
|
361
|
-
Message-ID: <
|
360
|
+
To: px1GCCcocfKy1MU-6zit_g@sample.com
|
361
|
+
Message-ID: <51c9c715126cb_72873fdf9c460670594d4@Richards-MacBook-Air.local.mail>
|
362
362
|
Subject: Password Reset
|
363
363
|
Mime-Version: 1.0
|
364
364
|
Content-Type: text/plain;
|
@@ -367,102 +367,102 @@ Content-Transfer-Encoding: 7bit
|
|
367
367
|
|
368
368
|
To reset your password, click the URL below.
|
369
369
|
|
370
|
-
http://localhost:3000/password_resets/
|
370
|
+
http://localhost:3000/password_resets/vzeJT3Mv_r2emQGiZKml7A/edit
|
371
371
|
|
372
372
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
373
373
|
Redirected to http://www.example.com/
|
374
|
-
Completed 302 Found in
|
375
|
-
Started GET "/" for 127.0.0.1 at 2013-06-
|
374
|
+
Completed 302 Found in 30ms (ActiveRecord: 1.8ms)
|
375
|
+
Started GET "/" for 127.0.0.1 at 2013-06-25 18:36:37 +0200
|
376
376
|
Processing by HomeController#index as HTML
|
377
|
-
Completed 200 OK in 2ms (Views:
|
378
|
-
Started GET "/password_resets/
|
377
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
378
|
+
Started GET "/password_resets/vzeJT3Mv_r2emQGiZKml7A/edit" for 127.0.0.1 at 2013-06-25 18:36:37 +0200
|
379
379
|
Processing by PasswordResetsController#edit as HTML
|
380
|
-
Parameters: {"id"=>"
|
381
|
-
[1m[36mUser Load (0.
|
382
|
-
Completed 200 OK in
|
383
|
-
Started PATCH "/password_resets/
|
380
|
+
Parameters: {"id"=>"vzeJT3Mv_r2emQGiZKml7A"}
|
381
|
+
[1m[36mUser Load (0.3ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'vzeJT3Mv_r2emQGiZKml7A' LIMIT 1[0m
|
382
|
+
Completed 200 OK in 6ms (Views: 4.2ms | ActiveRecord: 0.3ms)
|
383
|
+
Started PATCH "/password_resets/vzeJT3Mv_r2emQGiZKml7A" for 127.0.0.1 at 2013-06-25 18:36:37 +0200
|
384
384
|
Processing by PasswordResetsController#update as HTML
|
385
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
386
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
385
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"vzeJT3Mv_r2emQGiZKml7A"}
|
386
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'vzeJT3Mv_r2emQGiZKml7A' LIMIT 1
|
387
387
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
388
|
-
[1m[35mUser Exists (0.
|
388
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'px1GCCcocfKy1MU-6zit_g@sample.com' AND "users"."id" != 1) LIMIT 1
|
389
389
|
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
390
|
-
Completed 200 OK in
|
391
|
-
[1m[35m (
|
390
|
+
Completed 200 OK in 16ms (Views: 5.0ms | ActiveRecord: 0.5ms)
|
391
|
+
[1m[35m (1.3ms)[0m DELETE FROM "users";
|
392
392
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
393
|
-
[1m[35m (
|
393
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
394
394
|
-----------------------------------
|
395
395
|
AuthproIntegrationTest: test_signup
|
396
396
|
-----------------------------------
|
397
397
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
398
398
|
[1m[35m (0.2ms)[0m begin transaction
|
399
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
400
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
399
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'CK31OtnbfTrl2TELFQ8oBA@sample.com' LIMIT 1[0m
|
400
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'DBVydpn2zvNunhjPDoLiaQ' LIMIT 1
|
401
401
|
Binary data inserted for `string` type on column `password_digest`
|
402
|
-
[1m[36mSQL (0.
|
403
|
-
[1m[35m (0.
|
404
|
-
Started GET "/" for 127.0.0.1 at 2013-06-
|
402
|
+
[1m[36mSQL (0.7ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "DBVydpn2zvNunhjPDoLiaQ"], ["created_at", Tue, 25 Jun 2013 16:36:37 UTC +00:00], ["email", "CK31OtnbfTrl2TELFQ8oBA@sample.com"], ["password_digest", "$2a$04$0u1w9l2foZnb0FIIlM/9NerEmNTD9svXLsswcoj9qYquKrlCukQv2"], ["updated_at", Tue, 25 Jun 2013 16:36:37 UTC +00:00]]
|
403
|
+
[1m[35m (0.7ms)[0m commit transaction
|
404
|
+
Started GET "/" for 127.0.0.1 at 2013-06-25 18:36:37 +0200
|
405
405
|
Processing by HomeController#index as HTML
|
406
|
-
Completed 200 OK in
|
407
|
-
Started GET "/signup" for 127.0.0.1 at 2013-06-
|
406
|
+
Completed 200 OK in 3ms (Views: 2.3ms | ActiveRecord: 0.0ms)
|
407
|
+
Started GET "/signup" for 127.0.0.1 at 2013-06-25 18:36:37 +0200
|
408
408
|
Processing by UsersController#new as HTML
|
409
|
-
Completed 200 OK in
|
410
|
-
Started POST "/users" for 127.0.0.1 at 2013-06-
|
409
|
+
Completed 200 OK in 9ms (Views: 7.8ms | ActiveRecord: 0.0ms)
|
410
|
+
Started POST "/users" for 127.0.0.1 at 2013-06-25 18:36:37 +0200
|
411
411
|
Processing by UsersController#create as HTML
|
412
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
412
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"J8V5lhwcCuPTn5Ln_CD8rg@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
413
413
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
414
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
415
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
414
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'J8V5lhwcCuPTn5Ln_CD8rg@sample.com' LIMIT 1
|
415
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'UU_W0cEyXTfCNTu5sNGaXA' LIMIT 1[0m
|
416
416
|
Binary data inserted for `string` type on column `password_digest`
|
417
|
-
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "
|
418
|
-
[1m[36m (1.
|
417
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "UU_W0cEyXTfCNTu5sNGaXA"], ["created_at", Tue, 25 Jun 2013 16:36:37 UTC +00:00], ["email", "J8V5lhwcCuPTn5Ln_CD8rg@sample.com"], ["password_digest", "$2a$04$uDFC8kucGnC/0h9dxhj/Pee2gElB5oFAPkMlNUiM6OG/Bx3kjH/0a"], ["updated_at", Tue, 25 Jun 2013 16:36:37 UTC +00:00]]
|
418
|
+
[1m[36m (1.1ms)[0m [1mcommit transaction[0m
|
419
419
|
Redirected to http://www.example.com/
|
420
|
-
Completed 302 Found in
|
421
|
-
Started GET "/" for 127.0.0.1 at 2013-06-
|
420
|
+
Completed 302 Found in 13ms (ActiveRecord: 1.9ms)
|
421
|
+
Started GET "/" for 127.0.0.1 at 2013-06-25 18:36:37 +0200
|
422
422
|
Processing by HomeController#index as HTML
|
423
|
-
Completed 200 OK in 2ms (Views: 1.
|
424
|
-
[1m[35m (1.
|
423
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
424
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
425
425
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
426
|
-
[1m[35m (
|
426
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
427
427
|
-------------------------------------------
|
428
428
|
AuthproIntegrationTest: test_signup_failing
|
429
429
|
-------------------------------------------
|
430
430
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
431
431
|
[1m[35m (0.1ms)[0m begin transaction
|
432
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
433
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
432
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'k9RcoR2jF5Ej-sHHIJx2BA@sample.com' LIMIT 1[0m
|
433
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'LpjBLIlg5qrufUVySiKhyg' LIMIT 1
|
434
434
|
Binary data inserted for `string` type on column `password_digest`
|
435
|
-
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
436
|
-
[1m[35m (
|
437
|
-
Started GET "/" for 127.0.0.1 at 2013-06-
|
435
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "LpjBLIlg5qrufUVySiKhyg"], ["created_at", Tue, 25 Jun 2013 16:36:37 UTC +00:00], ["email", "k9RcoR2jF5Ej-sHHIJx2BA@sample.com"], ["password_digest", "$2a$04$SJkOi738KMdZcQdsnyntHuNwP6.8v2E/IlgP8bT7QBZ4FVjAqZYy."], ["updated_at", Tue, 25 Jun 2013 16:36:37 UTC +00:00]]
|
436
|
+
[1m[35m (1.0ms)[0m commit transaction
|
437
|
+
Started GET "/" for 127.0.0.1 at 2013-06-25 18:36:37 +0200
|
438
438
|
Processing by HomeController#index as HTML
|
439
|
-
Completed 200 OK in 2ms (Views:
|
440
|
-
Started GET "/signup" for 127.0.0.1 at 2013-06-
|
439
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
440
|
+
Started GET "/signup" for 127.0.0.1 at 2013-06-25 18:36:37 +0200
|
441
441
|
Processing by UsersController#new as HTML
|
442
|
-
Completed 200 OK in
|
443
|
-
Started POST "/users" for 127.0.0.1 at 2013-06-
|
442
|
+
Completed 200 OK in 6ms (Views: 5.6ms | ActiveRecord: 0.0ms)
|
443
|
+
Started POST "/users" for 127.0.0.1 at 2013-06-25 18:36:37 +0200
|
444
444
|
Processing by UsersController#create as HTML
|
445
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
445
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"wFfq7DuowB4KYm0oy7razQ@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
446
446
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
447
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
447
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'wFfq7DuowB4KYm0oy7razQ@sample.com' LIMIT 1
|
448
448
|
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
449
|
-
Completed 200 OK in
|
449
|
+
Completed 200 OK in 15ms (Views: 5.5ms | ActiveRecord: 0.3ms)
|
450
450
|
[1m[35m (1.1ms)[0m DELETE FROM "users";
|
451
|
-
[1m[36m (0.
|
452
|
-
[1m[35m (
|
451
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
452
|
+
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
453
453
|
---------------------------------------
|
454
454
|
AuthproIntegrationTest: test_visit_home
|
455
455
|
---------------------------------------
|
456
456
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
457
|
-
[1m[35m (0.
|
458
|
-
[1m[36mUser Exists (0.
|
459
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
457
|
+
[1m[35m (0.1ms)[0m begin transaction
|
458
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'UcdaPJpJHWGXHP1Wm4h9iw@sample.com' LIMIT 1[0m
|
459
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '2K6XLXIf1RAhH02amgn0eA' LIMIT 1
|
460
460
|
Binary data inserted for `string` type on column `password_digest`
|
461
|
-
[1m[36mSQL (0.
|
462
|
-
[1m[35m (
|
463
|
-
Started GET "/" for 127.0.0.1 at 2013-06-
|
461
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "2K6XLXIf1RAhH02amgn0eA"], ["created_at", Tue, 25 Jun 2013 16:36:37 UTC +00:00], ["email", "UcdaPJpJHWGXHP1Wm4h9iw@sample.com"], ["password_digest", "$2a$04$8VfLyxcfupcZ8K52ZwnYlOG2XuJKQpbh7Y44uh/CG4G8yDNdAk.iu"], ["updated_at", Tue, 25 Jun 2013 16:36:37 UTC +00:00]]
|
462
|
+
[1m[35m (2.2ms)[0m commit transaction
|
463
|
+
Started GET "/" for 127.0.0.1 at 2013-06-25 18:36:37 +0200
|
464
464
|
Processing by HomeController#index as HTML
|
465
465
|
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
466
|
-
[1m[36m (1.
|
466
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
467
467
|
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
468
|
-
[1m[36m (0.
|
468
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
@@ -5,11 +5,11 @@ one:
|
|
5
5
|
password_digest: MyString
|
6
6
|
auth_token: MyString
|
7
7
|
password_reset_token: MyString
|
8
|
-
password_reset_sent_at: 2013-06-
|
8
|
+
password_reset_sent_at: 2013-06-25 18:36:35
|
9
9
|
|
10
10
|
two:
|
11
11
|
email: MyString
|
12
12
|
password_digest: MyString
|
13
13
|
auth_token: MyString
|
14
14
|
password_reset_token: MyString
|
15
|
-
password_reset_sent_at: 2013-06-
|
15
|
+
password_reset_sent_at: 2013-06-25 18:36:35
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: authpro
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 1.0.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Richard Nyström
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2013-06-
|
11
|
+
date: 2013-06-25 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: rails
|
@@ -16,28 +16,28 @@ dependencies:
|
|
16
16
|
requirements:
|
17
17
|
- - ~>
|
18
18
|
- !ruby/object:Gem::Version
|
19
|
-
version: 4.0
|
19
|
+
version: '4.0'
|
20
20
|
type: :runtime
|
21
21
|
prerelease: false
|
22
22
|
version_requirements: !ruby/object:Gem::Requirement
|
23
23
|
requirements:
|
24
24
|
- - ~>
|
25
25
|
- !ruby/object:Gem::Version
|
26
|
-
version: 4.0
|
26
|
+
version: '4.0'
|
27
27
|
- !ruby/object:Gem::Dependency
|
28
28
|
name: bcrypt-ruby
|
29
29
|
requirement: !ruby/object:Gem::Requirement
|
30
30
|
requirements:
|
31
31
|
- - ~>
|
32
32
|
- !ruby/object:Gem::Version
|
33
|
-
version: 3.0
|
33
|
+
version: '3.0'
|
34
34
|
type: :runtime
|
35
35
|
prerelease: false
|
36
36
|
version_requirements: !ruby/object:Gem::Requirement
|
37
37
|
requirements:
|
38
38
|
- - ~>
|
39
39
|
- !ruby/object:Gem::Version
|
40
|
-
version: 3.0
|
40
|
+
version: '3.0'
|
41
41
|
- !ruby/object:Gem::Dependency
|
42
42
|
name: sqlite3
|
43
43
|
requirement: !ruby/object:Gem::Requirement
|
@@ -209,7 +209,7 @@ files:
|
|
209
209
|
- test/rails/dummy/config/locales/en.yml
|
210
210
|
- test/rails/dummy/config/routes.rb
|
211
211
|
- test/rails/dummy/config.ru
|
212
|
-
- test/rails/dummy/db/migrate/
|
212
|
+
- test/rails/dummy/db/migrate/20130625163635_create_users.rb
|
213
213
|
- test/rails/dummy/db/test.sqlite3
|
214
214
|
- test/rails/dummy/Gemfile
|
215
215
|
- test/rails/dummy/Gemfile.lock
|
@@ -327,7 +327,7 @@ test_files:
|
|
327
327
|
- test/rails/dummy/config/locales/en.yml
|
328
328
|
- test/rails/dummy/config/routes.rb
|
329
329
|
- test/rails/dummy/config.ru
|
330
|
-
- test/rails/dummy/db/migrate/
|
330
|
+
- test/rails/dummy/db/migrate/20130625163635_create_users.rb
|
331
331
|
- test/rails/dummy/db/test.sqlite3
|
332
332
|
- test/rails/dummy/Gemfile
|
333
333
|
- test/rails/dummy/Gemfile.lock
|