authpro 1.0.0 → 1.0.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/authpro/version.rb +1 -1
- data/test/dummy/Gemfile +4 -4
- data/test/dummy/Gemfile.lock +62 -68
- data/test/rails/dummy/Gemfile +4 -4
- data/test/rails/dummy/Gemfile.lock +62 -68
- data/test/rails/dummy/db/migrate/{20130625163635_create_users.rb → 20131111172934_create_users.rb} +0 -0
- data/test/rails/dummy/db/test.sqlite3 +0 -0
- data/test/rails/dummy/log/test.log +229 -229
- data/test/rails/dummy/test/fixtures/users.yml +3 -3
- metadata +9 -9
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: ff91b3cd8856eccc4c9388fcc438af86e2c04c18
|
4
|
+
data.tar.gz: 8f314712f0afc6f170f87f95c3e8ce670b710b51
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b66c1af1f72bc20453cce9e4def93dd4430648c473ee18697cc8d547b5bf81c87a0ce0dd43885a2c83002b410155ca85c47e6731fa5c096cedf1b51e8610eba0
|
7
|
+
data.tar.gz: 92177451acaa83bb6ef23e2966f1dd28a657289244ae9dd391104ef4303489582887497d16e2c93ff514827bb7ad43246e23faa96082305e5b6075bb1c0233d8
|
data/lib/authpro/version.rb
CHANGED
data/test/dummy/Gemfile
CHANGED
@@ -1,11 +1,11 @@
|
|
1
1
|
source 'https://rubygems.org'
|
2
2
|
|
3
|
-
gem
|
3
|
+
gem "rails", "~> 4.0"
|
4
4
|
gem 'sqlite3'
|
5
5
|
|
6
6
|
group :assets do
|
7
|
-
gem 'sass-rails', '~> 4.0
|
8
|
-
gem 'coffee-rails', '~> 4.0
|
7
|
+
gem 'sass-rails', '~> 4.0'
|
8
|
+
gem 'coffee-rails', '~> 4.0'
|
9
9
|
gem 'uglifier', '>= 1.0.3'
|
10
10
|
end
|
11
11
|
|
@@ -14,4 +14,4 @@ gem 'turbolinks'
|
|
14
14
|
gem 'jbuilder', '~> 1.0.1'
|
15
15
|
|
16
16
|
# To use ActiveModel has_secure_password
|
17
|
-
gem 'bcrypt-ruby', '~> 3.
|
17
|
+
gem 'bcrypt-ruby', '~> 3.1'
|
data/test/dummy/Gemfile.lock
CHANGED
@@ -1,120 +1,114 @@
|
|
1
1
|
GEM
|
2
2
|
remote: https://rubygems.org/
|
3
3
|
specs:
|
4
|
-
actionmailer (4.0.
|
5
|
-
actionpack (= 4.0.
|
6
|
-
mail (~> 2.5.
|
7
|
-
actionpack (4.0.
|
8
|
-
activesupport (= 4.0.
|
4
|
+
actionmailer (4.0.1)
|
5
|
+
actionpack (= 4.0.1)
|
6
|
+
mail (~> 2.5.4)
|
7
|
+
actionpack (4.0.1)
|
8
|
+
activesupport (= 4.0.1)
|
9
9
|
builder (~> 3.1.0)
|
10
10
|
erubis (~> 2.7.0)
|
11
11
|
rack (~> 1.5.2)
|
12
12
|
rack-test (~> 0.6.2)
|
13
|
-
activemodel (4.0.
|
14
|
-
activesupport (= 4.0.
|
13
|
+
activemodel (4.0.1)
|
14
|
+
activesupport (= 4.0.1)
|
15
15
|
builder (~> 3.1.0)
|
16
|
-
activerecord (4.0.
|
17
|
-
activemodel (= 4.0.
|
18
|
-
activerecord-deprecated_finders (~>
|
19
|
-
activesupport (= 4.0.
|
20
|
-
arel (~> 4.0.0
|
21
|
-
activerecord-deprecated_finders (
|
22
|
-
activesupport (4.0.
|
23
|
-
i18n (~> 0.6.
|
16
|
+
activerecord (4.0.1)
|
17
|
+
activemodel (= 4.0.1)
|
18
|
+
activerecord-deprecated_finders (~> 1.0.2)
|
19
|
+
activesupport (= 4.0.1)
|
20
|
+
arel (~> 4.0.0)
|
21
|
+
activerecord-deprecated_finders (1.0.3)
|
22
|
+
activesupport (4.0.1)
|
23
|
+
i18n (~> 0.6, >= 0.6.4)
|
24
24
|
minitest (~> 4.2)
|
25
25
|
multi_json (~> 1.3)
|
26
26
|
thread_safe (~> 0.1)
|
27
|
-
tzinfo (~> 0.3.
|
28
|
-
arel (4.0.
|
29
|
-
atomic (1.
|
30
|
-
bcrypt-ruby (3.
|
27
|
+
tzinfo (~> 0.3.37)
|
28
|
+
arel (4.0.1)
|
29
|
+
atomic (1.1.14)
|
30
|
+
bcrypt-ruby (3.1.2)
|
31
31
|
builder (3.1.4)
|
32
|
-
coffee-rails (4.0.
|
32
|
+
coffee-rails (4.0.1)
|
33
33
|
coffee-script (>= 2.2.0)
|
34
|
-
railties (>= 4.0.0
|
34
|
+
railties (>= 4.0.0, < 5.0)
|
35
35
|
coffee-script (2.2.0)
|
36
36
|
coffee-script-source
|
37
37
|
execjs
|
38
|
-
coffee-script-source (1.6.
|
38
|
+
coffee-script-source (1.6.3)
|
39
39
|
erubis (2.7.0)
|
40
|
-
execjs (
|
41
|
-
|
42
|
-
|
43
|
-
i18n (0.6.4)
|
40
|
+
execjs (2.0.2)
|
41
|
+
hike (1.2.3)
|
42
|
+
i18n (0.6.5)
|
44
43
|
jbuilder (1.0.2)
|
45
44
|
activesupport (>= 3.0.0)
|
46
|
-
jquery-rails (
|
45
|
+
jquery-rails (3.0.4)
|
47
46
|
railties (>= 3.0, < 5.0)
|
48
47
|
thor (>= 0.14, < 2.0)
|
49
|
-
json (1.
|
50
|
-
mail (2.5.
|
51
|
-
i18n (>= 0.4.0)
|
48
|
+
json (1.8.1)
|
49
|
+
mail (2.5.4)
|
52
50
|
mime-types (~> 1.16)
|
53
51
|
treetop (~> 1.4.8)
|
54
|
-
mime-types (1.
|
55
|
-
minitest (4.
|
56
|
-
multi_json (1.
|
52
|
+
mime-types (1.25)
|
53
|
+
minitest (4.7.5)
|
54
|
+
multi_json (1.8.2)
|
57
55
|
polyglot (0.3.3)
|
58
56
|
rack (1.5.2)
|
59
57
|
rack-test (0.6.2)
|
60
58
|
rack (>= 1.0)
|
61
|
-
rails (4.0.
|
62
|
-
actionmailer (= 4.0.
|
63
|
-
actionpack (= 4.0.
|
64
|
-
activerecord (= 4.0.
|
65
|
-
activesupport (= 4.0.
|
59
|
+
rails (4.0.1)
|
60
|
+
actionmailer (= 4.0.1)
|
61
|
+
actionpack (= 4.0.1)
|
62
|
+
activerecord (= 4.0.1)
|
63
|
+
activesupport (= 4.0.1)
|
66
64
|
bundler (>= 1.3.0, < 2.0)
|
67
|
-
railties (= 4.0.
|
68
|
-
sprockets-rails (~> 2.0.0
|
69
|
-
railties (4.0.
|
70
|
-
actionpack (= 4.0.
|
71
|
-
activesupport (= 4.0.
|
65
|
+
railties (= 4.0.1)
|
66
|
+
sprockets-rails (~> 2.0.0)
|
67
|
+
railties (4.0.1)
|
68
|
+
actionpack (= 4.0.1)
|
69
|
+
activesupport (= 4.0.1)
|
72
70
|
rake (>= 0.8.7)
|
73
|
-
|
74
|
-
|
75
|
-
|
76
|
-
|
77
|
-
|
78
|
-
sass (3.2.7)
|
79
|
-
sass-rails (4.0.0.beta1)
|
80
|
-
railties (>= 4.0.0.beta, < 5.0)
|
71
|
+
thor (>= 0.18.1, < 2.0)
|
72
|
+
rake (10.1.0)
|
73
|
+
sass (3.2.12)
|
74
|
+
sass-rails (4.0.1)
|
75
|
+
railties (>= 4.0.0, < 5.0)
|
81
76
|
sass (>= 3.1.10)
|
82
|
-
sprockets-rails (~> 2.0.0
|
83
|
-
|
84
|
-
sprockets (2.9.0)
|
77
|
+
sprockets-rails (~> 2.0.0)
|
78
|
+
sprockets (2.10.0)
|
85
79
|
hike (~> 1.2)
|
86
80
|
multi_json (~> 1.0)
|
87
81
|
rack (~> 1.0)
|
88
82
|
tilt (~> 1.1, != 1.3.0)
|
89
|
-
sprockets-rails (2.0.
|
83
|
+
sprockets-rails (2.0.1)
|
90
84
|
actionpack (>= 3.0)
|
91
85
|
activesupport (>= 3.0)
|
92
86
|
sprockets (~> 2.8)
|
93
|
-
sqlite3 (1.3.
|
94
|
-
thor (0.
|
95
|
-
thread_safe (0.1.
|
87
|
+
sqlite3 (1.3.8)
|
88
|
+
thor (0.18.1)
|
89
|
+
thread_safe (0.1.3)
|
96
90
|
atomic
|
97
|
-
tilt (1.
|
98
|
-
treetop (1.4.
|
91
|
+
tilt (1.4.1)
|
92
|
+
treetop (1.4.15)
|
99
93
|
polyglot
|
100
94
|
polyglot (>= 0.3.1)
|
101
|
-
turbolinks (1.
|
95
|
+
turbolinks (1.3.0)
|
102
96
|
coffee-rails
|
103
|
-
tzinfo (0.3.
|
104
|
-
uglifier (
|
97
|
+
tzinfo (0.3.38)
|
98
|
+
uglifier (2.3.1)
|
105
99
|
execjs (>= 0.3.0)
|
106
|
-
|
100
|
+
json (>= 1.8.0)
|
107
101
|
|
108
102
|
PLATFORMS
|
109
103
|
ruby
|
110
104
|
|
111
105
|
DEPENDENCIES
|
112
|
-
bcrypt-ruby (~> 3.
|
113
|
-
coffee-rails (~> 4.0
|
106
|
+
bcrypt-ruby (~> 3.1.0)
|
107
|
+
coffee-rails (~> 4.0)
|
114
108
|
jbuilder (~> 1.0.1)
|
115
109
|
jquery-rails
|
116
|
-
rails (
|
117
|
-
sass-rails (~> 4.0
|
110
|
+
rails (~> 4.0.0)
|
111
|
+
sass-rails (~> 4.0)
|
118
112
|
sqlite3
|
119
113
|
turbolinks
|
120
114
|
uglifier (>= 1.0.3)
|
data/test/rails/dummy/Gemfile
CHANGED
@@ -1,11 +1,11 @@
|
|
1
1
|
source 'https://rubygems.org'
|
2
2
|
|
3
|
-
gem
|
3
|
+
gem "rails", "~> 4.0"
|
4
4
|
gem 'sqlite3'
|
5
5
|
|
6
6
|
group :assets do
|
7
|
-
gem 'sass-rails', '~> 4.0
|
8
|
-
gem 'coffee-rails', '~> 4.0
|
7
|
+
gem 'sass-rails', '~> 4.0'
|
8
|
+
gem 'coffee-rails', '~> 4.0'
|
9
9
|
gem 'uglifier', '>= 1.0.3'
|
10
10
|
end
|
11
11
|
|
@@ -14,4 +14,4 @@ gem 'turbolinks'
|
|
14
14
|
gem 'jbuilder', '~> 1.0.1'
|
15
15
|
|
16
16
|
# To use ActiveModel has_secure_password
|
17
|
-
gem 'bcrypt-ruby', '~> 3.
|
17
|
+
gem 'bcrypt-ruby', '~> 3.1'
|
@@ -1,120 +1,114 @@
|
|
1
1
|
GEM
|
2
2
|
remote: https://rubygems.org/
|
3
3
|
specs:
|
4
|
-
actionmailer (4.0.
|
5
|
-
actionpack (= 4.0.
|
6
|
-
mail (~> 2.5.
|
7
|
-
actionpack (4.0.
|
8
|
-
activesupport (= 4.0.
|
4
|
+
actionmailer (4.0.1)
|
5
|
+
actionpack (= 4.0.1)
|
6
|
+
mail (~> 2.5.4)
|
7
|
+
actionpack (4.0.1)
|
8
|
+
activesupport (= 4.0.1)
|
9
9
|
builder (~> 3.1.0)
|
10
10
|
erubis (~> 2.7.0)
|
11
11
|
rack (~> 1.5.2)
|
12
12
|
rack-test (~> 0.6.2)
|
13
|
-
activemodel (4.0.
|
14
|
-
activesupport (= 4.0.
|
13
|
+
activemodel (4.0.1)
|
14
|
+
activesupport (= 4.0.1)
|
15
15
|
builder (~> 3.1.0)
|
16
|
-
activerecord (4.0.
|
17
|
-
activemodel (= 4.0.
|
18
|
-
activerecord-deprecated_finders (~>
|
19
|
-
activesupport (= 4.0.
|
20
|
-
arel (~> 4.0.0
|
21
|
-
activerecord-deprecated_finders (
|
22
|
-
activesupport (4.0.
|
23
|
-
i18n (~> 0.6.
|
16
|
+
activerecord (4.0.1)
|
17
|
+
activemodel (= 4.0.1)
|
18
|
+
activerecord-deprecated_finders (~> 1.0.2)
|
19
|
+
activesupport (= 4.0.1)
|
20
|
+
arel (~> 4.0.0)
|
21
|
+
activerecord-deprecated_finders (1.0.3)
|
22
|
+
activesupport (4.0.1)
|
23
|
+
i18n (~> 0.6, >= 0.6.4)
|
24
24
|
minitest (~> 4.2)
|
25
25
|
multi_json (~> 1.3)
|
26
26
|
thread_safe (~> 0.1)
|
27
|
-
tzinfo (~> 0.3.
|
28
|
-
arel (4.0.
|
29
|
-
atomic (1.
|
30
|
-
bcrypt-ruby (3.
|
27
|
+
tzinfo (~> 0.3.37)
|
28
|
+
arel (4.0.1)
|
29
|
+
atomic (1.1.14)
|
30
|
+
bcrypt-ruby (3.1.2)
|
31
31
|
builder (3.1.4)
|
32
|
-
coffee-rails (4.0.
|
32
|
+
coffee-rails (4.0.1)
|
33
33
|
coffee-script (>= 2.2.0)
|
34
|
-
railties (>= 4.0.0
|
34
|
+
railties (>= 4.0.0, < 5.0)
|
35
35
|
coffee-script (2.2.0)
|
36
36
|
coffee-script-source
|
37
37
|
execjs
|
38
|
-
coffee-script-source (1.6.
|
38
|
+
coffee-script-source (1.6.3)
|
39
39
|
erubis (2.7.0)
|
40
|
-
execjs (
|
41
|
-
|
42
|
-
|
43
|
-
i18n (0.6.4)
|
40
|
+
execjs (2.0.2)
|
41
|
+
hike (1.2.3)
|
42
|
+
i18n (0.6.5)
|
44
43
|
jbuilder (1.0.2)
|
45
44
|
activesupport (>= 3.0.0)
|
46
|
-
jquery-rails (
|
45
|
+
jquery-rails (3.0.4)
|
47
46
|
railties (>= 3.0, < 5.0)
|
48
47
|
thor (>= 0.14, < 2.0)
|
49
|
-
json (1.
|
50
|
-
mail (2.5.
|
51
|
-
i18n (>= 0.4.0)
|
48
|
+
json (1.8.1)
|
49
|
+
mail (2.5.4)
|
52
50
|
mime-types (~> 1.16)
|
53
51
|
treetop (~> 1.4.8)
|
54
|
-
mime-types (1.
|
55
|
-
minitest (4.
|
56
|
-
multi_json (1.
|
52
|
+
mime-types (1.25)
|
53
|
+
minitest (4.7.5)
|
54
|
+
multi_json (1.8.2)
|
57
55
|
polyglot (0.3.3)
|
58
56
|
rack (1.5.2)
|
59
57
|
rack-test (0.6.2)
|
60
58
|
rack (>= 1.0)
|
61
|
-
rails (4.0.
|
62
|
-
actionmailer (= 4.0.
|
63
|
-
actionpack (= 4.0.
|
64
|
-
activerecord (= 4.0.
|
65
|
-
activesupport (= 4.0.
|
59
|
+
rails (4.0.1)
|
60
|
+
actionmailer (= 4.0.1)
|
61
|
+
actionpack (= 4.0.1)
|
62
|
+
activerecord (= 4.0.1)
|
63
|
+
activesupport (= 4.0.1)
|
66
64
|
bundler (>= 1.3.0, < 2.0)
|
67
|
-
railties (= 4.0.
|
68
|
-
sprockets-rails (~> 2.0.0
|
69
|
-
railties (4.0.
|
70
|
-
actionpack (= 4.0.
|
71
|
-
activesupport (= 4.0.
|
65
|
+
railties (= 4.0.1)
|
66
|
+
sprockets-rails (~> 2.0.0)
|
67
|
+
railties (4.0.1)
|
68
|
+
actionpack (= 4.0.1)
|
69
|
+
activesupport (= 4.0.1)
|
72
70
|
rake (>= 0.8.7)
|
73
|
-
|
74
|
-
|
75
|
-
|
76
|
-
|
77
|
-
|
78
|
-
sass (3.2.7)
|
79
|
-
sass-rails (4.0.0.beta1)
|
80
|
-
railties (>= 4.0.0.beta, < 5.0)
|
71
|
+
thor (>= 0.18.1, < 2.0)
|
72
|
+
rake (10.1.0)
|
73
|
+
sass (3.2.12)
|
74
|
+
sass-rails (4.0.1)
|
75
|
+
railties (>= 4.0.0, < 5.0)
|
81
76
|
sass (>= 3.1.10)
|
82
|
-
sprockets-rails (~> 2.0.0
|
83
|
-
|
84
|
-
sprockets (2.9.0)
|
77
|
+
sprockets-rails (~> 2.0.0)
|
78
|
+
sprockets (2.10.0)
|
85
79
|
hike (~> 1.2)
|
86
80
|
multi_json (~> 1.0)
|
87
81
|
rack (~> 1.0)
|
88
82
|
tilt (~> 1.1, != 1.3.0)
|
89
|
-
sprockets-rails (2.0.
|
83
|
+
sprockets-rails (2.0.1)
|
90
84
|
actionpack (>= 3.0)
|
91
85
|
activesupport (>= 3.0)
|
92
86
|
sprockets (~> 2.8)
|
93
|
-
sqlite3 (1.3.
|
94
|
-
thor (0.
|
95
|
-
thread_safe (0.1.
|
87
|
+
sqlite3 (1.3.8)
|
88
|
+
thor (0.18.1)
|
89
|
+
thread_safe (0.1.3)
|
96
90
|
atomic
|
97
|
-
tilt (1.
|
98
|
-
treetop (1.4.
|
91
|
+
tilt (1.4.1)
|
92
|
+
treetop (1.4.15)
|
99
93
|
polyglot
|
100
94
|
polyglot (>= 0.3.1)
|
101
|
-
turbolinks (1.
|
95
|
+
turbolinks (1.3.0)
|
102
96
|
coffee-rails
|
103
|
-
tzinfo (0.3.
|
104
|
-
uglifier (
|
97
|
+
tzinfo (0.3.38)
|
98
|
+
uglifier (2.3.1)
|
105
99
|
execjs (>= 0.3.0)
|
106
|
-
|
100
|
+
json (>= 1.8.0)
|
107
101
|
|
108
102
|
PLATFORMS
|
109
103
|
ruby
|
110
104
|
|
111
105
|
DEPENDENCIES
|
112
|
-
bcrypt-ruby (~> 3.
|
113
|
-
coffee-rails (~> 4.0
|
106
|
+
bcrypt-ruby (~> 3.1.0)
|
107
|
+
coffee-rails (~> 4.0)
|
114
108
|
jbuilder (~> 1.0.1)
|
115
109
|
jquery-rails
|
116
|
-
rails (
|
117
|
-
sass-rails (~> 4.0
|
110
|
+
rails (~> 4.0.0)
|
111
|
+
sass-rails (~> 4.0)
|
118
112
|
sqlite3
|
119
113
|
turbolinks
|
120
114
|
uglifier (>= 1.0.3)
|
data/test/rails/dummy/db/migrate/{20130625163635_create_users.rb → 20131111172934_create_users.rb}
RENAMED
File without changes
|
Binary file
|
@@ -70,7 +70,7 @@ AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
70
70
|
----------------------------------------------------------------
|
71
71
|
[1m[36m (0.3ms)[0m [1mbegin transaction[0m
|
72
72
|
[1m[35m (0.1ms)[0m rollback transaction
|
73
|
-
[1m[36m (0.
|
73
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
74
74
|
------------------------------------------
|
75
75
|
AuthproGeneratorTest: test_generated_files
|
76
76
|
------------------------------------------
|
@@ -78,130 +78,130 @@ AuthproGeneratorTest: test_generated_files
|
|
78
78
|
----------------------------------
|
79
79
|
AuthproIntegrationTest: test_login
|
80
80
|
----------------------------------
|
81
|
-
[1m[36m (1.
|
82
|
-
[1m[35m (
|
83
|
-
[1m[36mActiveRecord::SchemaMigration Load (0.
|
84
|
-
Migrating to CreateUsers (
|
81
|
+
[1m[36m (1.0ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
82
|
+
[1m[35m (0.7ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
83
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.2ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
84
|
+
Migrating to CreateUsers (20131111172934)
|
85
85
|
[1m[35m (0.1ms)[0m begin transaction
|
86
86
|
[1m[36m (0.4ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
87
|
-
[1m[35mSQL (0.3ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "
|
88
|
-
[1m[36m (
|
87
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20131111172934"]]
|
88
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
89
89
|
[1m[35m (0.1ms)[0m begin transaction
|
90
|
-
[1m[36mUser Exists (0.
|
91
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
90
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '_JyTcLfjYdLeZSHyVV2mPQ@sample.com' LIMIT 1[0m
|
91
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'vvSM1cD70zJBZ67nW8W4nw' LIMIT 1
|
92
92
|
Binary data inserted for `string` type on column `password_digest`
|
93
|
-
[1m[36mSQL (
|
94
|
-
[1m[35m (
|
95
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
93
|
+
[1m[36mSQL (2.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "vvSM1cD70zJBZ67nW8W4nw"], ["created_at", Mon, 11 Nov 2013 17:29:34 UTC +00:00], ["email", "_JyTcLfjYdLeZSHyVV2mPQ@sample.com"], ["password_digest", "$2a$04$9B3F5ns4w3ZOvkgOkb8yUeXjxoxSz4q9nYeig187qGIvsz0z7mO4C"], ["updated_at", Mon, 11 Nov 2013 17:29:34 UTC +00:00]]
|
94
|
+
[1m[35m (0.8ms)[0m commit transaction
|
95
|
+
Started GET "/" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
96
96
|
Processing by HomeController#index as HTML
|
97
97
|
Rendered home/index.html.erb within layouts/application (1.5ms)
|
98
|
-
Completed 200 OK in 39ms (Views: 38.
|
99
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
98
|
+
Completed 200 OK in 39ms (Views: 38.2ms | ActiveRecord: 0.0ms)
|
99
|
+
Started GET "/login" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
100
100
|
Processing by SessionsController#new as HTML
|
101
101
|
Rendered sessions/new.html.erb within layouts/application (2.1ms)
|
102
|
-
Completed 200 OK in 6ms (Views: 5.
|
103
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
102
|
+
Completed 200 OK in 6ms (Views: 5.2ms | ActiveRecord: 0.0ms)
|
103
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
104
104
|
Processing by SessionsController#create as HTML
|
105
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
106
|
-
[1m[36mUser Load (0.
|
105
|
+
Parameters: {"utf8"=>"✓", "email"=>"_JyTcLfjYdLeZSHyVV2mPQ@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
106
|
+
[1m[36mUser Load (0.3ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '_JyTcLfjYdLeZSHyVV2mPQ@sample.com' LIMIT 1[0m
|
107
107
|
Redirected to http://www.example.com/
|
108
|
-
Completed 302 Found in
|
109
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
108
|
+
Completed 302 Found in 5ms (ActiveRecord: 0.3ms)
|
109
|
+
Started GET "/" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
110
110
|
Processing by HomeController#index as HTML
|
111
111
|
Rendered home/index.html.erb within layouts/application (0.1ms)
|
112
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = '
|
113
|
-
Completed 200 OK in
|
114
|
-
[1m[36m (
|
112
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'vvSM1cD70zJBZ67nW8W4nw' LIMIT 1
|
113
|
+
Completed 200 OK in 4ms (Views: 3.5ms | ActiveRecord: 0.2ms)
|
114
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
115
115
|
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
116
|
-
[1m[36m (
|
116
|
+
[1m[36m (9.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
117
117
|
------------------------------------------
|
118
118
|
AuthproIntegrationTest: test_login_failing
|
119
119
|
------------------------------------------
|
120
120
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
121
|
-
[1m[36m (0.
|
122
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
123
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
121
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
122
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'vQLa7xngK5yFAaKMSsDpFA@sample.com' LIMIT 1
|
123
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'Vor-gs4ED38S7JGCGz04UA' LIMIT 1[0m
|
124
124
|
Binary data inserted for `string` type on column `password_digest`
|
125
|
-
[1m[35mSQL (0.
|
126
|
-
[1m[36m (0.
|
127
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
125
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "Vor-gs4ED38S7JGCGz04UA"], ["created_at", Mon, 11 Nov 2013 17:29:34 UTC +00:00], ["email", "vQLa7xngK5yFAaKMSsDpFA@sample.com"], ["password_digest", "$2a$04$U4G8xWHpfFq2XgZ0vBgFdOSRjq8T2ZqRwRwsNr9c2qqmt/RgucbVS"], ["updated_at", Mon, 11 Nov 2013 17:29:34 UTC +00:00]]
|
126
|
+
[1m[36m (0.6ms)[0m [1mcommit transaction[0m
|
127
|
+
Started GET "/" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
128
128
|
Processing by HomeController#index as HTML
|
129
|
-
Completed 200 OK in
|
130
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
129
|
+
Completed 200 OK in 38ms (Views: 38.2ms | ActiveRecord: 0.0ms)
|
130
|
+
Started GET "/login" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
131
131
|
Processing by SessionsController#new as HTML
|
132
|
-
Completed 200 OK in 3ms (Views: 2.
|
133
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
132
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
133
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
134
134
|
Processing by SessionsController#create as HTML
|
135
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
136
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
137
|
-
Completed 200 OK in
|
138
|
-
[1m[36m (
|
139
|
-
[1m[35m (0.
|
140
|
-
[1m[36m (
|
135
|
+
Parameters: {"utf8"=>"✓", "email"=>"vQLa7xngK5yFAaKMSsDpFA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
136
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'vQLa7xngK5yFAaKMSsDpFA@sample.com' LIMIT 1
|
137
|
+
Completed 200 OK in 4ms (Views: 1.9ms | ActiveRecord: 0.2ms)
|
138
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM "users";[0m
|
139
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
140
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
141
141
|
-----------------------------------
|
142
142
|
AuthproIntegrationTest: test_logout
|
143
143
|
-----------------------------------
|
144
144
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
145
|
-
[1m[36m (0.
|
146
|
-
[1m[35mUser Exists (0.
|
147
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
145
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
146
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'pRT0ip5dPpWHYFaRL5Qs7A@sample.com' LIMIT 1
|
147
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '66Ef0a0ArrJ8ZJ3foO5u4A' LIMIT 1[0m
|
148
148
|
Binary data inserted for `string` type on column `password_digest`
|
149
|
-
[1m[35mSQL (0.
|
150
|
-
[1m[36m (0.
|
151
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
149
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "66Ef0a0ArrJ8ZJ3foO5u4A"], ["created_at", Mon, 11 Nov 2013 17:29:34 UTC +00:00], ["email", "pRT0ip5dPpWHYFaRL5Qs7A@sample.com"], ["password_digest", "$2a$04$ehdz5jwyZJZso.TSccknWeCWvXKtRexUfP3JbkqNYX8BkNOB65BfO"], ["updated_at", Mon, 11 Nov 2013 17:29:34 UTC +00:00]]
|
150
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
151
|
+
Started GET "/login" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
152
152
|
Processing by SessionsController#new as HTML
|
153
|
-
Completed 200 OK in
|
154
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
153
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
154
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
155
155
|
Processing by SessionsController#create as HTML
|
156
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
157
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
156
|
+
Parameters: {"utf8"=>"✓", "email"=>"pRT0ip5dPpWHYFaRL5Qs7A@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
157
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'pRT0ip5dPpWHYFaRL5Qs7A@sample.com' LIMIT 1
|
158
158
|
Redirected to http://www.example.com/
|
159
|
-
Completed 302 Found in
|
160
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
159
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
160
|
+
Started GET "/" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
161
161
|
Processing by HomeController#index as HTML
|
162
|
-
[1m[36mUser Load (0.
|
163
|
-
Completed 200 OK in
|
164
|
-
Started GET "/logout" for 127.0.0.1 at 2013-
|
162
|
+
[1m[36mUser Load (0.1ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = '66Ef0a0ArrJ8ZJ3foO5u4A' LIMIT 1[0m
|
163
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.1ms)
|
164
|
+
Started GET "/logout" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
165
165
|
Processing by SessionsController#destroy as HTML
|
166
166
|
Redirected to http://www.example.com/
|
167
167
|
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
168
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
168
|
+
Started GET "/" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
169
169
|
Processing by HomeController#index as HTML
|
170
|
-
Completed 200 OK in 2ms (Views: 1.
|
171
|
-
[1m[35m (1.
|
172
|
-
[1m[36m (0.
|
173
|
-
[1m[35m (0.
|
170
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
171
|
+
[1m[35m (1.1ms)[0m DELETE FROM "users";
|
172
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
173
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
174
174
|
-------------------------------------------
|
175
175
|
AuthproIntegrationTest: test_reset_password
|
176
176
|
-------------------------------------------
|
177
177
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
178
|
-
[1m[35m (0.
|
179
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
180
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
178
|
+
[1m[35m (0.1ms)[0m begin transaction
|
179
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'ZJmh8v5VTZI4ireE-kpf-g@sample.com' LIMIT 1[0m
|
180
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '4-slhKhSkGFGCpZAtuuRlw' LIMIT 1
|
181
181
|
Binary data inserted for `string` type on column `password_digest`
|
182
|
-
[1m[36mSQL (0.
|
183
|
-
[1m[35m (
|
184
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
182
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "4-slhKhSkGFGCpZAtuuRlw"], ["created_at", Mon, 11 Nov 2013 17:29:34 UTC +00:00], ["email", "ZJmh8v5VTZI4ireE-kpf-g@sample.com"], ["password_digest", "$2a$04$ksMwqvlkTo45kUo3m7IZ2.iykeHFbWBCxLgJLe8cJJKMhADZfgkCu"], ["updated_at", Mon, 11 Nov 2013 17:29:34 UTC +00:00]]
|
183
|
+
[1m[35m (0.8ms)[0m commit transaction
|
184
|
+
Started GET "/login" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
185
185
|
Processing by SessionsController#new as HTML
|
186
|
-
Completed 200 OK in
|
187
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
186
|
+
Completed 200 OK in 3ms (Views: 2.7ms | ActiveRecord: 0.0ms)
|
187
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
188
188
|
Processing by PasswordResetsController#new as HTML
|
189
|
-
Completed 200 OK in
|
190
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
189
|
+
Completed 200 OK in 4ms (Views: 3.5ms | ActiveRecord: 0.0ms)
|
190
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
191
191
|
Processing by PasswordResetsController#create as HTML
|
192
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
193
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
194
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
195
|
-
[1m[36m (0.
|
196
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
197
|
-
[1m[36mSQL (0.
|
198
|
-
[1m[35m (
|
192
|
+
Parameters: {"utf8"=>"✓", "email"=>"ZJmh8v5VTZI4ireE-kpf-g@sample.com", "commit"=>"Reset password"}
|
193
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'ZJmh8v5VTZI4ireE-kpf-g@sample.com' LIMIT 1[0m
|
194
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'xNsqiCpC7M-mh4y-iDHSoA' LIMIT 1
|
195
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
196
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'ZJmh8v5VTZI4ireE-kpf-g@sample.com' AND "users"."id" != 1) LIMIT 1
|
197
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "xNsqiCpC7M-mh4y-iDHSoA"], ["password_reset_sent_at", Mon, 11 Nov 2013 17:29:34 UTC +00:00], ["updated_at", Mon, 11 Nov 2013 17:29:34 UTC +00:00]]
|
198
|
+
[1m[35m (0.9ms)[0m commit transaction
|
199
199
|
|
200
|
-
Sent mail to
|
201
|
-
Date:
|
200
|
+
Sent mail to ZJmh8v5VTZI4ireE-kpf-g@sample.com (7.1ms)
|
201
|
+
Date: Mon, 11 Nov 2013 18:29:34 +0100
|
202
202
|
From: from@example.com
|
203
|
-
To:
|
204
|
-
Message-ID: <
|
203
|
+
To: ZJmh8v5VTZI4ireE-kpf-g@sample.com
|
204
|
+
Message-ID: <528113fee1b80_a79a3fec1485e6d035964@unknown.lan.mail>
|
205
205
|
Subject: Password Reset
|
206
206
|
Mime-Version: 1.0
|
207
207
|
Content-Type: text/plain;
|
@@ -210,91 +210,91 @@ Content-Transfer-Encoding: 7bit
|
|
210
210
|
|
211
211
|
To reset your password, click the URL below.
|
212
212
|
|
213
|
-
http://localhost:3000/password_resets/
|
213
|
+
http://localhost:3000/password_resets/xNsqiCpC7M-mh4y-iDHSoA/edit
|
214
214
|
|
215
215
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
216
216
|
Redirected to http://www.example.com/
|
217
|
-
Completed 302 Found in
|
218
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
217
|
+
Completed 302 Found in 227ms (ActiveRecord: 1.7ms)
|
218
|
+
Started GET "/" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
219
219
|
Processing by HomeController#index as HTML
|
220
|
-
Completed 200 OK in
|
221
|
-
Started GET "/password_resets/
|
220
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
221
|
+
Started GET "/password_resets/xNsqiCpC7M-mh4y-iDHSoA/edit" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
222
222
|
Processing by PasswordResetsController#edit as HTML
|
223
|
-
Parameters: {"id"=>"
|
224
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
225
|
-
Completed 200 OK in
|
226
|
-
Started PATCH "/password_resets/
|
223
|
+
Parameters: {"id"=>"xNsqiCpC7M-mh4y-iDHSoA"}
|
224
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'xNsqiCpC7M-mh4y-iDHSoA' LIMIT 1[0m
|
225
|
+
Completed 200 OK in 37ms (Views: 36.2ms | ActiveRecord: 0.2ms)
|
226
|
+
Started PATCH "/password_resets/xNsqiCpC7M-mh4y-iDHSoA" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
227
227
|
Processing by PasswordResetsController#update as HTML
|
228
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
229
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
230
|
-
[1m[36m (0.
|
231
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
228
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"xNsqiCpC7M-mh4y-iDHSoA"}
|
229
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'xNsqiCpC7M-mh4y-iDHSoA' LIMIT 1
|
230
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
231
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'ZJmh8v5VTZI4ireE-kpf-g@sample.com' AND "users"."id" != 1) LIMIT 1
|
232
232
|
Binary data inserted for `string` type on column `password_digest`
|
233
|
-
[1m[36mSQL (0.
|
234
|
-
[1m[35m (
|
233
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$mpcjPnybjGU3wjssIS0o6OsuAxDOlZqKuty2gOlxvE6dpjL/u0H9m"], ["updated_at", Mon, 11 Nov 2013 17:29:34 UTC +00:00]]
|
234
|
+
[1m[35m (1.9ms)[0m commit transaction
|
235
235
|
Redirected to http://localhost:3000/
|
236
|
-
Completed 302 Found in
|
237
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
236
|
+
Completed 302 Found in 7ms (ActiveRecord: 2.5ms)
|
237
|
+
Started GET "/" for 127.0.0.1 at 2013-11-11 18:29:34 +0100
|
238
238
|
Processing by HomeController#index as HTML
|
239
|
-
Completed 200 OK in
|
240
|
-
[1m[36m (0.
|
241
|
-
[1m[35m (0.
|
242
|
-
[1m[36m (0.
|
239
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
240
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
241
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
242
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
243
243
|
--------------------------------------------------------------------------------
|
244
244
|
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
245
245
|
--------------------------------------------------------------------------------
|
246
246
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
247
247
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
248
|
-
[1m[35mUser Exists (0.
|
249
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
248
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'sjnvNxtaf2EbcMPcpYGkUw@sample.com' LIMIT 1
|
249
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'x1ZH1IrCz2SypeLxAztvBA' LIMIT 1[0m
|
250
250
|
Binary data inserted for `string` type on column `password_digest`
|
251
|
-
[1m[35mSQL (0.
|
252
|
-
[1m[36m (0.
|
253
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
251
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "x1ZH1IrCz2SypeLxAztvBA"], ["created_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00], ["email", "sjnvNxtaf2EbcMPcpYGkUw@sample.com"], ["password_digest", "$2a$04$mlwJUpi1YJzKEYI2HG0Uju2mbsbhBH7kjhv0NJk92qrMdNh1JjwbO"], ["updated_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00]]
|
252
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
253
|
+
Started GET "/login" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
254
254
|
Processing by SessionsController#new as HTML
|
255
|
-
Completed 200 OK in
|
256
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
255
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
256
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
257
257
|
Processing by PasswordResetsController#new as HTML
|
258
|
-
Completed 200 OK in 2ms (Views:
|
259
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
258
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
259
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
260
260
|
Processing by PasswordResetsController#create as HTML
|
261
261
|
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
262
262
|
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
263
|
-
Completed 200 OK in 3ms (Views: 1.
|
264
|
-
[1m[36m (
|
263
|
+
Completed 200 OK in 3ms (Views: 1.7ms | ActiveRecord: 0.2ms)
|
264
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
265
265
|
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
266
|
-
[1m[36m (
|
266
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
267
267
|
-------------------------------------------------------------------------
|
268
268
|
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
269
269
|
-------------------------------------------------------------------------
|
270
270
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
271
|
-
[1m[36m (0.
|
272
|
-
[1m[35mUser Exists (0.
|
273
|
-
[1m[36mUser Exists (0.
|
271
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
272
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'UOr6gi2aemV0IT_qxqGRig@sample.com' LIMIT 1
|
273
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '1nxZ1PCxBGIfN2fojqZ5ZA' LIMIT 1[0m
|
274
274
|
Binary data inserted for `string` type on column `password_digest`
|
275
|
-
[1m[35mSQL (0.
|
275
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "1nxZ1PCxBGIfN2fojqZ5ZA"], ["created_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00], ["email", "UOr6gi2aemV0IT_qxqGRig@sample.com"], ["password_digest", "$2a$04$ydFiXGqVBNdHCn7pyUPYK.cks5vMQ3ZhsTqPtlY1ODNGOuMzXmfr2"], ["updated_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00]]
|
276
276
|
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
277
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
277
|
+
Started GET "/login" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
278
278
|
Processing by SessionsController#new as HTML
|
279
|
-
Completed 200 OK in
|
280
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
279
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
280
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
281
281
|
Processing by PasswordResetsController#new as HTML
|
282
|
-
Completed 200 OK in
|
283
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
282
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
283
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
284
284
|
Processing by PasswordResetsController#create as HTML
|
285
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
286
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
287
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
288
|
-
[1m[35m (0.
|
289
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
290
|
-
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "
|
291
|
-
[1m[36m (0.
|
285
|
+
Parameters: {"utf8"=>"✓", "email"=>"UOr6gi2aemV0IT_qxqGRig@sample.com", "commit"=>"Reset password"}
|
286
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'UOr6gi2aemV0IT_qxqGRig@sample.com' LIMIT 1
|
287
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'lDQEVH06DTKMMEdyPuWD2A' LIMIT 1[0m
|
288
|
+
[1m[35m (0.0ms)[0m begin transaction
|
289
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'UOr6gi2aemV0IT_qxqGRig@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
290
|
+
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "lDQEVH06DTKMMEdyPuWD2A"], ["password_reset_sent_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00], ["updated_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00]]
|
291
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
292
292
|
|
293
|
-
Sent mail to
|
294
|
-
Date:
|
293
|
+
Sent mail to UOr6gi2aemV0IT_qxqGRig@sample.com (7.5ms)
|
294
|
+
Date: Mon, 11 Nov 2013 18:29:35 +0100
|
295
295
|
From: from@example.com
|
296
|
-
To:
|
297
|
-
Message-ID: <
|
296
|
+
To: UOr6gi2aemV0IT_qxqGRig@sample.com
|
297
|
+
Message-ID: <528113ff142b6_a79a3fec1485e6d03603b@unknown.lan.mail>
|
298
298
|
Subject: Password Reset
|
299
299
|
Mime-Version: 1.0
|
300
300
|
Content-Type: text/plain;
|
@@ -303,62 +303,62 @@ Content-Transfer-Encoding: 7bit
|
|
303
303
|
|
304
304
|
To reset your password, click the URL below.
|
305
305
|
|
306
|
-
http://localhost:3000/password_resets/
|
306
|
+
http://localhost:3000/password_resets/lDQEVH06DTKMMEdyPuWD2A/edit
|
307
307
|
|
308
308
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
309
309
|
Redirected to http://www.example.com/
|
310
|
-
Completed 302 Found in
|
311
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
310
|
+
Completed 302 Found in 19ms (ActiveRecord: 1.4ms)
|
311
|
+
Started GET "/" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
312
312
|
Processing by HomeController#index as HTML
|
313
|
-
Completed 200 OK in 2ms (Views:
|
314
|
-
Started GET "/password_resets/
|
313
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
314
|
+
Started GET "/password_resets/lDQEVH06DTKMMEdyPuWD2A/edit" for 127.0.0.1 at 2013-11-13 01:00:00 +0100
|
315
315
|
Processing by PasswordResetsController#edit as HTML
|
316
|
-
Parameters: {"id"=>"
|
317
|
-
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
316
|
+
Parameters: {"id"=>"lDQEVH06DTKMMEdyPuWD2A"}
|
317
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'lDQEVH06DTKMMEdyPuWD2A' LIMIT 1
|
318
318
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
319
|
-
Started PATCH "/password_resets/
|
319
|
+
Started PATCH "/password_resets/lDQEVH06DTKMMEdyPuWD2A" for 127.0.0.1 at 2013-11-13 01:00:00 +0100
|
320
320
|
Processing by PasswordResetsController#update as HTML
|
321
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
322
|
-
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
321
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"lDQEVH06DTKMMEdyPuWD2A"}
|
322
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'lDQEVH06DTKMMEdyPuWD2A' LIMIT 1[0m
|
323
323
|
Redirected to http://localhost:3000/password_resets/new
|
324
324
|
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
325
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
325
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-11-13 01:00:00 +0100
|
326
326
|
Processing by PasswordResetsController#new as HTML
|
327
327
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
328
|
-
[1m[35m (1.
|
328
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
329
329
|
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
330
|
-
[1m[35m (
|
330
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
331
331
|
-------------------------------------------------------------------------------------------
|
332
332
|
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
333
333
|
-------------------------------------------------------------------------------------------
|
334
334
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
335
|
-
[1m[35m (0.
|
336
|
-
[1m[36mUser Exists (0.
|
337
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
335
|
+
[1m[35m (0.1ms)[0m begin transaction
|
336
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'bgOLrIb4d9HsSGx_Eiy8SA@sample.com' LIMIT 1[0m
|
337
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'DXH9WbBcMDnFi3thfkRRFg' LIMIT 1
|
338
338
|
Binary data inserted for `string` type on column `password_digest`
|
339
|
-
[1m[36mSQL (0.
|
340
|
-
[1m[35m (0.
|
341
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
339
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "DXH9WbBcMDnFi3thfkRRFg"], ["created_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00], ["email", "bgOLrIb4d9HsSGx_Eiy8SA@sample.com"], ["password_digest", "$2a$04$U0jOoqSv121j.k1F7Np/O.2EOFqBel03yG8RsRVWOE0bpwYaPl5GC"], ["updated_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00]]
|
340
|
+
[1m[35m (0.8ms)[0m commit transaction
|
341
|
+
Started GET "/login" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
342
342
|
Processing by SessionsController#new as HTML
|
343
|
-
Completed 200 OK in
|
344
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
343
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
344
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
345
345
|
Processing by PasswordResetsController#new as HTML
|
346
|
-
Completed 200 OK in
|
347
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
346
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
347
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
348
348
|
Processing by PasswordResetsController#create as HTML
|
349
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
350
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
351
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
352
|
-
[1m[36m (0.
|
353
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
354
|
-
[1m[36mSQL (0.
|
355
|
-
[1m[35m (
|
349
|
+
Parameters: {"utf8"=>"✓", "email"=>"bgOLrIb4d9HsSGx_Eiy8SA@sample.com", "commit"=>"Reset password"}
|
350
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'bgOLrIb4d9HsSGx_Eiy8SA@sample.com' LIMIT 1[0m
|
351
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'ms_xh3YCTKFnhV-6-N60Vg' LIMIT 1
|
352
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
353
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'bgOLrIb4d9HsSGx_Eiy8SA@sample.com' AND "users"."id" != 1) LIMIT 1
|
354
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "ms_xh3YCTKFnhV-6-N60Vg"], ["password_reset_sent_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00], ["updated_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00]]
|
355
|
+
[1m[35m (0.8ms)[0m commit transaction
|
356
356
|
|
357
|
-
Sent mail to
|
358
|
-
Date:
|
357
|
+
Sent mail to bgOLrIb4d9HsSGx_Eiy8SA@sample.com (4.4ms)
|
358
|
+
Date: Mon, 11 Nov 2013 18:29:35 +0100
|
359
359
|
From: from@example.com
|
360
|
-
To:
|
361
|
-
Message-ID: <
|
360
|
+
To: bgOLrIb4d9HsSGx_Eiy8SA@sample.com
|
361
|
+
Message-ID: <528113ff2fac5_a79a3fec1485e6d0361be@unknown.lan.mail>
|
362
362
|
Subject: Password Reset
|
363
363
|
Mime-Version: 1.0
|
364
364
|
Content-Type: text/plain;
|
@@ -367,102 +367,102 @@ Content-Transfer-Encoding: 7bit
|
|
367
367
|
|
368
368
|
To reset your password, click the URL below.
|
369
369
|
|
370
|
-
http://localhost:3000/password_resets/
|
370
|
+
http://localhost:3000/password_resets/ms_xh3YCTKFnhV-6-N60Vg/edit
|
371
371
|
|
372
372
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
373
373
|
Redirected to http://www.example.com/
|
374
|
-
Completed 302 Found in
|
375
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
374
|
+
Completed 302 Found in 15ms (ActiveRecord: 1.4ms)
|
375
|
+
Started GET "/" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
376
376
|
Processing by HomeController#index as HTML
|
377
|
-
Completed 200 OK in 2ms (Views:
|
378
|
-
Started GET "/password_resets/
|
377
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
378
|
+
Started GET "/password_resets/ms_xh3YCTKFnhV-6-N60Vg/edit" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
379
379
|
Processing by PasswordResetsController#edit as HTML
|
380
|
-
Parameters: {"id"=>"
|
381
|
-
[1m[36mUser Load (0.
|
382
|
-
Completed 200 OK in
|
383
|
-
Started PATCH "/password_resets/
|
380
|
+
Parameters: {"id"=>"ms_xh3YCTKFnhV-6-N60Vg"}
|
381
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'ms_xh3YCTKFnhV-6-N60Vg' LIMIT 1[0m
|
382
|
+
Completed 200 OK in 3ms (Views: 2.3ms | ActiveRecord: 0.2ms)
|
383
|
+
Started PATCH "/password_resets/ms_xh3YCTKFnhV-6-N60Vg" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
384
384
|
Processing by PasswordResetsController#update as HTML
|
385
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
386
|
-
[1m[35mUser Load (0.
|
387
|
-
[1m[36m (0.
|
388
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
389
|
-
[1m[36m (0.
|
390
|
-
Completed 200 OK in
|
391
|
-
[1m[35m (
|
392
|
-
[1m[36m (0.
|
393
|
-
[1m[35m (0.
|
385
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"ms_xh3YCTKFnhV-6-N60Vg"}
|
386
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'ms_xh3YCTKFnhV-6-N60Vg' LIMIT 1
|
387
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
388
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'bgOLrIb4d9HsSGx_Eiy8SA@sample.com' AND "users"."id" != 1) LIMIT 1
|
389
|
+
[1m[36m (0.0ms)[0m [1mrollback transaction[0m
|
390
|
+
Completed 200 OK in 9ms (Views: 4.7ms | ActiveRecord: 0.3ms)
|
391
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
392
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
393
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
394
394
|
-----------------------------------
|
395
395
|
AuthproIntegrationTest: test_signup
|
396
396
|
-----------------------------------
|
397
397
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
398
|
-
[1m[35m (0.
|
399
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
400
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
398
|
+
[1m[35m (0.1ms)[0m begin transaction
|
399
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'EYugVqv2TvFRvil8Zr-xGA@sample.com' LIMIT 1[0m
|
400
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '8PhUrxPrTxHvFAtpd_8MDA' LIMIT 1
|
401
401
|
Binary data inserted for `string` type on column `password_digest`
|
402
|
-
[1m[36mSQL (0.
|
402
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "8PhUrxPrTxHvFAtpd_8MDA"], ["created_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00], ["email", "EYugVqv2TvFRvil8Zr-xGA@sample.com"], ["password_digest", "$2a$04$Balb/5M/3LzxvwlP3u5RxewGCKL9lv1J1K8GG64UkIP8no0r4VAzm"], ["updated_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00]]
|
403
403
|
[1m[35m (0.7ms)[0m commit transaction
|
404
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
404
|
+
Started GET "/" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
405
405
|
Processing by HomeController#index as HTML
|
406
|
-
Completed 200 OK in
|
407
|
-
Started GET "/signup" for 127.0.0.1 at 2013-
|
406
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
407
|
+
Started GET "/signup" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
408
408
|
Processing by UsersController#new as HTML
|
409
|
-
Completed 200 OK in
|
410
|
-
Started POST "/users" for 127.0.0.1 at 2013-
|
409
|
+
Completed 200 OK in 8ms (Views: 7.4ms | ActiveRecord: 0.0ms)
|
410
|
+
Started POST "/users" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
411
411
|
Processing by UsersController#create as HTML
|
412
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
412
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"uCzM1BNV-9G2N0dJiadRzQ@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
413
413
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
414
|
-
[1m[35mUser Exists (0.
|
415
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
414
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'uCzM1BNV-9G2N0dJiadRzQ@sample.com' LIMIT 1
|
415
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'RpZbtO3VLcEz9dKfQtzdlw' LIMIT 1[0m
|
416
416
|
Binary data inserted for `string` type on column `password_digest`
|
417
|
-
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "
|
418
|
-
[1m[36m (
|
417
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "RpZbtO3VLcEz9dKfQtzdlw"], ["created_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00], ["email", "uCzM1BNV-9G2N0dJiadRzQ@sample.com"], ["password_digest", "$2a$04$9.3AG5Is/ocQIFx4X0uJIOPgnrlHlVJqpfEVS/3O62N7ZXWJh/cI2"], ["updated_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00]]
|
418
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
419
419
|
Redirected to http://www.example.com/
|
420
|
-
Completed 302 Found in
|
421
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
420
|
+
Completed 302 Found in 5ms (ActiveRecord: 1.4ms)
|
421
|
+
Started GET "/" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
422
422
|
Processing by HomeController#index as HTML
|
423
|
-
Completed 200 OK in
|
423
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
424
424
|
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
425
|
-
[1m[36m (0.
|
426
|
-
[1m[35m (0.
|
425
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
426
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
427
427
|
-------------------------------------------
|
428
428
|
AuthproIntegrationTest: test_signup_failing
|
429
429
|
-------------------------------------------
|
430
430
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
431
431
|
[1m[35m (0.1ms)[0m begin transaction
|
432
|
-
[1m[36mUser Exists (0.
|
433
|
-
[1m[35mUser Exists (0.
|
432
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'j6K3kRuZOMtc4cIrdUnC3A@sample.com' LIMIT 1[0m
|
433
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'pnPEeQmbMmxDprqM_bxsKQ' LIMIT 1
|
434
434
|
Binary data inserted for `string` type on column `password_digest`
|
435
|
-
[1m[36mSQL (0.
|
436
|
-
[1m[35m (1.
|
437
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
435
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "pnPEeQmbMmxDprqM_bxsKQ"], ["created_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00], ["email", "j6K3kRuZOMtc4cIrdUnC3A@sample.com"], ["password_digest", "$2a$04$zRg/fziOjKcmUpsDEla1c.nfY5rUULtVBhMqpCPjiHzz1QpiWlPF2"], ["updated_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00]]
|
436
|
+
[1m[35m (1.1ms)[0m commit transaction
|
437
|
+
Started GET "/" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
438
438
|
Processing by HomeController#index as HTML
|
439
|
-
Completed 200 OK in
|
440
|
-
Started GET "/signup" for 127.0.0.1 at 2013-
|
439
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
440
|
+
Started GET "/signup" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
441
441
|
Processing by UsersController#new as HTML
|
442
|
-
Completed 200 OK in
|
443
|
-
Started POST "/users" for 127.0.0.1 at 2013-
|
442
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
443
|
+
Started POST "/users" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
444
444
|
Processing by UsersController#create as HTML
|
445
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
445
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"yPZef8MxLlNfDSD2hH0OYA@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
446
446
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
447
|
-
[1m[35mUser Exists (0.
|
448
|
-
[1m[36m (0.
|
449
|
-
Completed 200 OK in
|
450
|
-
[1m[35m (
|
451
|
-
[1m[36m (0.
|
452
|
-
[1m[35m (
|
447
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'yPZef8MxLlNfDSD2hH0OYA@sample.com' LIMIT 1
|
448
|
+
[1m[36m (0.0ms)[0m [1mrollback transaction[0m
|
449
|
+
Completed 200 OK in 6ms (Views: 2.6ms | ActiveRecord: 0.3ms)
|
450
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
451
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
452
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
453
453
|
---------------------------------------
|
454
454
|
AuthproIntegrationTest: test_visit_home
|
455
455
|
---------------------------------------
|
456
456
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
457
457
|
[1m[35m (0.1ms)[0m begin transaction
|
458
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
459
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
458
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'Z0Ea__1z0AyG3q5xGW9vDg@sample.com' LIMIT 1[0m
|
459
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'Gnj6HKuuXm91hkGFcqtivg' LIMIT 1
|
460
460
|
Binary data inserted for `string` type on column `password_digest`
|
461
|
-
[1m[36mSQL (0.
|
462
|
-
[1m[35m (
|
463
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
461
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "Gnj6HKuuXm91hkGFcqtivg"], ["created_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00], ["email", "Z0Ea__1z0AyG3q5xGW9vDg@sample.com"], ["password_digest", "$2a$04$21SZEnwELPXGPjS0RCFd.eHuzECr4I5C9KAwIPQxBVmN9Ugh3BUmm"], ["updated_at", Mon, 11 Nov 2013 17:29:35 UTC +00:00]]
|
462
|
+
[1m[35m (0.9ms)[0m commit transaction
|
463
|
+
Started GET "/" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
464
464
|
Processing by HomeController#index as HTML
|
465
|
-
Completed 200 OK in
|
466
|
-
[1m[36m (
|
465
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
466
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
467
467
|
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
468
|
-
[1m[36m (0.
|
468
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|