authpro 1.0.1 → 1.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +4 -4
- data/lib/authpro/version.rb +2 -2
- data/test/dummy/Gemfile +8 -6
- data/test/dummy/Gemfile.lock +69 -63
- data/test/rails/dummy/Gemfile +8 -6
- data/test/rails/dummy/Gemfile.lock +69 -63
- data/test/rails/dummy/db/migrate/{20131111172934_create_users.rb → 20140423203816_create_users.rb} +0 -0
- data/test/rails/dummy/db/test.sqlite3 +0 -0
- data/test/rails/dummy/log/test.log +2998 -277
- data/test/rails/dummy/test/fixtures/users.yml +2 -2
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/13fe41fee1fe35b49d145bcc06610705 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/2f5173deea6c795b8fdde723bb4b63af +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/357970feca3ac29060c1e3861e2c0953 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/cffd775d018f68ce5dba1ee0d951a994 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/d771ace226fc8215a3572e0aa35bb0d6 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/f7cbd26ba1d28d48de824f0e94586655 +0 -0
- data/test/test_helper.rb +2 -3
- metadata +45 -60
- data/test/dummy/log/test.log +0 -72
data/test/rails/dummy/db/migrate/{20131111172934_create_users.rb → 20140423203816_create_users.rb}
RENAMED
|
File without changes
|
|
Binary file
|
|
@@ -1,207 +1,135 @@
|
|
|
1
|
-
----------------------------------------------------------------
|
|
2
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
3
|
-
----------------------------------------------------------------
|
|
4
|
-
-----------------------
|
|
5
|
-
AuthproTest: test_truth
|
|
6
|
-
-----------------------
|
|
7
|
-
----------------------------------------------------------------
|
|
8
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
9
|
-
----------------------------------------------------------------
|
|
10
|
-
-----------------------
|
|
11
|
-
AuthproTest: test_truth
|
|
12
|
-
-----------------------
|
|
13
|
-
----------------------------------------------------------------
|
|
14
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
15
|
-
----------------------------------------------------------------
|
|
16
|
-
----------------------------------------------------------------
|
|
17
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
18
|
-
----------------------------------------------------------------
|
|
19
|
-
----------------------------------------------------------------
|
|
20
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
21
|
-
----------------------------------------------------------------
|
|
22
|
-
----------------------------------------------------------------
|
|
23
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
24
|
-
----------------------------------------------------------------
|
|
25
|
-
----------------------------------------------------------------
|
|
26
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
27
|
-
----------------------------------------------------------------
|
|
28
|
-
----------------------------------------------------------------
|
|
29
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
30
|
-
----------------------------------------------------------------
|
|
31
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
32
|
-
[1m[35m (0.0ms)[0m rollback transaction
|
|
33
|
-
----------------------------------------------------------------
|
|
34
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
35
|
-
----------------------------------------------------------------
|
|
36
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
37
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
|
38
|
-
----------------------------------------------------------------
|
|
39
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
40
|
-
----------------------------------------------------------------
|
|
41
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
42
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
|
43
|
-
----------------------------------------------------------------
|
|
44
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
45
|
-
----------------------------------------------------------------
|
|
46
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
47
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
|
48
|
-
----------------------------------------------------------------
|
|
49
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
50
|
-
----------------------------------------------------------------
|
|
51
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
52
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
|
53
|
-
----------------------------------------------------------------
|
|
54
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
55
|
-
----------------------------------------------------------------
|
|
56
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
57
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
|
58
|
-
----------------------------------------------------------------
|
|
59
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
60
|
-
----------------------------------------------------------------
|
|
61
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
62
|
-
[1m[35m (0.0ms)[0m rollback transaction
|
|
63
|
-
----------------------------------------------------------------
|
|
64
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
65
|
-
----------------------------------------------------------------
|
|
66
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
67
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
|
68
|
-
----------------------------------------------------------------
|
|
69
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
70
|
-
----------------------------------------------------------------
|
|
71
|
-
[1m[36m (0.3ms)[0m [1mbegin transaction[0m
|
|
72
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
|
73
1
|
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
74
2
|
------------------------------------------
|
|
75
3
|
AuthproGeneratorTest: test_generated_files
|
|
76
4
|
------------------------------------------
|
|
77
|
-
[1m[35m (0.
|
|
5
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
|
78
6
|
----------------------------------
|
|
79
7
|
AuthproIntegrationTest: test_login
|
|
80
8
|
----------------------------------
|
|
81
9
|
[1m[36m (1.0ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
|
82
|
-
[1m[35m (
|
|
83
|
-
[1m[36mActiveRecord::SchemaMigration Load (0.
|
|
84
|
-
Migrating to CreateUsers (
|
|
85
|
-
[1m[35m (0.1ms)[0m begin transaction
|
|
86
|
-
[1m[36m (0.4ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
|
87
|
-
[1m[35mSQL (0.3ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20131111172934"]]
|
|
88
|
-
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
10
|
+
[1m[35m (1.0ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
|
11
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
12
|
+
Migrating to CreateUsers (20140423203148)
|
|
89
13
|
[1m[35m (0.1ms)[0m begin transaction
|
|
90
|
-
[1m[
|
|
91
|
-
[1m[
|
|
14
|
+
[1m[36m (0.3ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
|
15
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20140423203148"]]
|
|
16
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
17
|
+
[1m[35m (0.3ms)[0m begin transaction
|
|
18
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'vSIDz2edGIi_6erWCG9Ixw@sample.com' LIMIT 1[0m
|
|
19
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'JTOPXMzb0vQQbdYgBrHGkg' LIMIT 1
|
|
92
20
|
Binary data inserted for `string` type on column `password_digest`
|
|
93
|
-
[1m[36mSQL (2.
|
|
94
|
-
[1m[35m (
|
|
95
|
-
Started GET "/" for 127.0.0.1 at
|
|
21
|
+
[1m[36mSQL (2.7ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "JTOPXMzb0vQQbdYgBrHGkg"], ["created_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00], ["email", "vSIDz2edGIi_6erWCG9Ixw@sample.com"], ["password_digest", "$2a$04$0h7lImGNuhN.h.b0XjWvwOp.YEKYQUik5KgSaAg/k1DFByh1.jA8a"], ["updated_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00]]
|
|
22
|
+
[1m[35m (1.1ms)[0m commit transaction
|
|
23
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
96
24
|
Processing by HomeController#index as HTML
|
|
97
|
-
Rendered home/index.html.erb within layouts/application (1.
|
|
98
|
-
Completed 200 OK in
|
|
99
|
-
Started GET "/login" for 127.0.0.1 at
|
|
25
|
+
Rendered home/index.html.erb within layouts/application (1.0ms)
|
|
26
|
+
Completed 200 OK in 26ms (Views: 25.9ms | ActiveRecord: 0.0ms)
|
|
27
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
100
28
|
Processing by SessionsController#new as HTML
|
|
101
|
-
Rendered sessions/new.html.erb within layouts/application (
|
|
102
|
-
Completed 200 OK in
|
|
103
|
-
Started POST "/sessions" for 127.0.0.1 at
|
|
29
|
+
Rendered sessions/new.html.erb within layouts/application (1.1ms)
|
|
30
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
|
31
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
104
32
|
Processing by SessionsController#create as HTML
|
|
105
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
106
|
-
[1m[36mUser Load (0.
|
|
33
|
+
Parameters: {"utf8"=>"✓", "email"=>"vSIDz2edGIi_6erWCG9Ixw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
34
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'vSIDz2edGIi_6erWCG9Ixw@sample.com' LIMIT 1[0m
|
|
107
35
|
Redirected to http://www.example.com/
|
|
108
|
-
Completed 302 Found in
|
|
109
|
-
Started GET "/" for 127.0.0.1 at
|
|
36
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
|
37
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
110
38
|
Processing by HomeController#index as HTML
|
|
111
39
|
Rendered home/index.html.erb within layouts/application (0.1ms)
|
|
112
|
-
[1m[35mUser Load (0.
|
|
113
|
-
Completed 200 OK in
|
|
114
|
-
[1m[36m (0.
|
|
115
|
-
[1m[35m (0.
|
|
116
|
-
[1m[36m (
|
|
40
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'JTOPXMzb0vQQbdYgBrHGkg' LIMIT 1
|
|
41
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.1ms)
|
|
42
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
|
43
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
44
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
117
45
|
------------------------------------------
|
|
118
46
|
AuthproIntegrationTest: test_login_failing
|
|
119
47
|
------------------------------------------
|
|
120
48
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
121
49
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
122
|
-
[1m[35mUser Exists (0.
|
|
123
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
50
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'gZss5woFry0ZuIhRLl46SA@sample.com' LIMIT 1
|
|
51
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'WCJUVoRJSHng2Rnpjtz5UA' LIMIT 1[0m
|
|
124
52
|
Binary data inserted for `string` type on column `password_digest`
|
|
125
|
-
[1m[35mSQL (0.
|
|
126
|
-
[1m[36m (0.
|
|
127
|
-
Started GET "/" for 127.0.0.1 at
|
|
53
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "WCJUVoRJSHng2Rnpjtz5UA"], ["created_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00], ["email", "gZss5woFry0ZuIhRLl46SA@sample.com"], ["password_digest", "$2a$04$WwwDzCUJysSfjUOCVhClGOckH2BMPn3DaV0HWnxc599NsposuPKKK"], ["updated_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00]]
|
|
54
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
55
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
128
56
|
Processing by HomeController#index as HTML
|
|
129
|
-
Completed 200 OK in
|
|
130
|
-
Started GET "/login" for 127.0.0.1 at
|
|
57
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
|
58
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
131
59
|
Processing by SessionsController#new as HTML
|
|
132
|
-
Completed 200 OK in
|
|
133
|
-
Started POST "/sessions" for 127.0.0.1 at
|
|
60
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
61
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
134
62
|
Processing by SessionsController#create as HTML
|
|
135
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
136
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
137
|
-
Completed 200 OK in
|
|
138
|
-
[1m[36m (0.
|
|
139
|
-
[1m[35m (0.
|
|
140
|
-
[1m[36m (0.
|
|
63
|
+
Parameters: {"utf8"=>"✓", "email"=>"gZss5woFry0ZuIhRLl46SA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
64
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'gZss5woFry0ZuIhRLl46SA@sample.com' LIMIT 1
|
|
65
|
+
Completed 200 OK in 3ms (Views: 1.2ms | ActiveRecord: 0.2ms)
|
|
66
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
67
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
68
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
141
69
|
-----------------------------------
|
|
142
70
|
AuthproIntegrationTest: test_logout
|
|
143
71
|
-----------------------------------
|
|
144
72
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
145
73
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
146
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
147
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
74
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'S2pIwpRkmIE5irako3UrYA@sample.com' LIMIT 1
|
|
75
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'EwMwNIu0oonCA8-KghmDwA' LIMIT 1[0m
|
|
148
76
|
Binary data inserted for `string` type on column `password_digest`
|
|
149
|
-
[1m[35mSQL (0.
|
|
77
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "EwMwNIu0oonCA8-KghmDwA"], ["created_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00], ["email", "S2pIwpRkmIE5irako3UrYA@sample.com"], ["password_digest", "$2a$04$Unv5zybIczgEPS8HtPdSw.zkq.fc1yA1JmLle88yCCwiEHZAjb5ei"], ["updated_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00]]
|
|
150
78
|
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
151
|
-
Started GET "/login" for 127.0.0.1 at
|
|
79
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
152
80
|
Processing by SessionsController#new as HTML
|
|
153
|
-
Completed 200 OK in 2ms (Views: 1.
|
|
154
|
-
Started POST "/sessions" for 127.0.0.1 at
|
|
81
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
82
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
155
83
|
Processing by SessionsController#create as HTML
|
|
156
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
157
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
84
|
+
Parameters: {"utf8"=>"✓", "email"=>"S2pIwpRkmIE5irako3UrYA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
85
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'S2pIwpRkmIE5irako3UrYA@sample.com' LIMIT 1
|
|
158
86
|
Redirected to http://www.example.com/
|
|
159
|
-
Completed 302 Found in
|
|
160
|
-
Started GET "/" for 127.0.0.1 at
|
|
87
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
|
88
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
161
89
|
Processing by HomeController#index as HTML
|
|
162
|
-
[1m[36mUser Load (0.
|
|
163
|
-
Completed 200 OK in 2ms (Views: 1.
|
|
164
|
-
Started GET "/logout" for 127.0.0.1 at
|
|
90
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'EwMwNIu0oonCA8-KghmDwA' LIMIT 1[0m
|
|
91
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.2ms)
|
|
92
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
165
93
|
Processing by SessionsController#destroy as HTML
|
|
166
94
|
Redirected to http://www.example.com/
|
|
167
95
|
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
|
168
|
-
Started GET "/" for 127.0.0.1 at
|
|
96
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
169
97
|
Processing by HomeController#index as HTML
|
|
170
|
-
Completed 200 OK in 2ms (Views: 1.
|
|
171
|
-
[1m[35m (
|
|
98
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
99
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
|
172
100
|
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
173
|
-
[1m[35m (0.
|
|
101
|
+
[1m[35m (0.5ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
174
102
|
-------------------------------------------
|
|
175
103
|
AuthproIntegrationTest: test_reset_password
|
|
176
104
|
-------------------------------------------
|
|
177
105
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
178
106
|
[1m[35m (0.1ms)[0m begin transaction
|
|
179
|
-
[1m[36mUser Exists (0.
|
|
180
|
-
[1m[35mUser Exists (0.
|
|
107
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'oZo7301roOTH6SqLSiF20Q@sample.com' LIMIT 1[0m
|
|
108
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'mENVKXio1Qf64wvFKm2XXw' LIMIT 1
|
|
181
109
|
Binary data inserted for `string` type on column `password_digest`
|
|
182
|
-
[1m[36mSQL (0.
|
|
110
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "mENVKXio1Qf64wvFKm2XXw"], ["created_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00], ["email", "oZo7301roOTH6SqLSiF20Q@sample.com"], ["password_digest", "$2a$04$jr9FpHp3nz96/Uv3kbFAfujAkZIuMGLboTVlDH7qRdboUBfoG7hKi"], ["updated_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00]]
|
|
183
111
|
[1m[35m (0.8ms)[0m commit transaction
|
|
184
|
-
Started GET "/login" for 127.0.0.1 at
|
|
112
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
185
113
|
Processing by SessionsController#new as HTML
|
|
186
|
-
Completed 200 OK in
|
|
187
|
-
Started GET "/password_resets/new" for 127.0.0.1 at
|
|
114
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
115
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
188
116
|
Processing by PasswordResetsController#new as HTML
|
|
189
|
-
Completed 200 OK in
|
|
190
|
-
Started POST "/password_resets" for 127.0.0.1 at
|
|
117
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
|
118
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
|
191
119
|
Processing by PasswordResetsController#create as HTML
|
|
192
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
193
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
194
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
|
120
|
+
Parameters: {"utf8"=>"✓", "email"=>"oZo7301roOTH6SqLSiF20Q@sample.com", "commit"=>"Reset password"}
|
|
121
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'oZo7301roOTH6SqLSiF20Q@sample.com' LIMIT 1[0m
|
|
122
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'U7nsU0mcU1kjxW93-seMVA' LIMIT 1
|
|
195
123
|
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
196
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
|
197
|
-
[1m[36mSQL (0.
|
|
198
|
-
[1m[35m (0.
|
|
124
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'oZo7301roOTH6SqLSiF20Q@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
125
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "U7nsU0mcU1kjxW93-seMVA"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00]]
|
|
126
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
199
127
|
|
|
200
|
-
Sent mail to
|
|
201
|
-
Date:
|
|
128
|
+
Sent mail to oZo7301roOTH6SqLSiF20Q@sample.com (10.2ms)
|
|
129
|
+
Date: Wed, 23 Apr 2014 22:31:49 +0200
|
|
202
130
|
From: from@example.com
|
|
203
|
-
To:
|
|
204
|
-
Message-ID: <
|
|
131
|
+
To: oZo7301roOTH6SqLSiF20Q@sample.com
|
|
132
|
+
Message-ID: <535823351c43e_49ee3fe75882dbb899065@air.lan.mail>
|
|
205
133
|
Subject: Password Reset
|
|
206
134
|
Mime-Version: 1.0
|
|
207
135
|
Content-Type: text/plain;
|
|
@@ -210,91 +138,91 @@ Content-Transfer-Encoding: 7bit
|
|
|
210
138
|
|
|
211
139
|
To reset your password, click the URL below.
|
|
212
140
|
|
|
213
|
-
http://localhost:3000/password_resets/
|
|
141
|
+
http://localhost:3000/password_resets/U7nsU0mcU1kjxW93-seMVA/edit
|
|
214
142
|
|
|
215
143
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
216
144
|
Redirected to http://www.example.com/
|
|
217
|
-
Completed 302 Found in
|
|
218
|
-
Started GET "/" for 127.0.0.1 at
|
|
145
|
+
Completed 302 Found in 201ms (ActiveRecord: 1.5ms)
|
|
146
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
219
147
|
Processing by HomeController#index as HTML
|
|
220
148
|
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
221
|
-
Started GET "/password_resets/
|
|
149
|
+
Started GET "/password_resets/U7nsU0mcU1kjxW93-seMVA/edit" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
222
150
|
Processing by PasswordResetsController#edit as HTML
|
|
223
|
-
Parameters: {"id"=>"
|
|
224
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
225
|
-
Completed 200 OK in
|
|
226
|
-
Started PATCH "/password_resets/
|
|
151
|
+
Parameters: {"id"=>"U7nsU0mcU1kjxW93-seMVA"}
|
|
152
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'U7nsU0mcU1kjxW93-seMVA' LIMIT 1[0m
|
|
153
|
+
Completed 200 OK in 11ms (Views: 10.0ms | ActiveRecord: 0.2ms)
|
|
154
|
+
Started PATCH "/password_resets/U7nsU0mcU1kjxW93-seMVA" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
227
155
|
Processing by PasswordResetsController#update as HTML
|
|
228
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
|
229
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
156
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"U7nsU0mcU1kjxW93-seMVA"}
|
|
157
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'U7nsU0mcU1kjxW93-seMVA' LIMIT 1
|
|
230
158
|
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
231
|
-
[1m[35mUser Exists (0.
|
|
159
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'oZo7301roOTH6SqLSiF20Q@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
232
160
|
Binary data inserted for `string` type on column `password_digest`
|
|
233
|
-
[1m[36mSQL (0.
|
|
234
|
-
[1m[35m (
|
|
161
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$QWcHzQ2oTUr0ONnx.kXZpOU4zTeORnugUuw94PEwNzitkepgoaXjy"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
|
162
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
235
163
|
Redirected to http://localhost:3000/
|
|
236
|
-
Completed 302 Found in 7ms (ActiveRecord:
|
|
237
|
-
Started GET "/" for 127.0.0.1 at
|
|
164
|
+
Completed 302 Found in 7ms (ActiveRecord: 1.8ms)
|
|
165
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
238
166
|
Processing by HomeController#index as HTML
|
|
239
|
-
Completed 200 OK in 1ms (Views: 1.
|
|
167
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
240
168
|
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
241
|
-
[1m[35m (0.
|
|
169
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
242
170
|
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
243
171
|
--------------------------------------------------------------------------------
|
|
244
172
|
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
|
245
173
|
--------------------------------------------------------------------------------
|
|
246
174
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
247
175
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
248
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
249
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
176
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'rgiDtRncDetrvKmVdfdT9Q@sample.com' LIMIT 1
|
|
177
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '3uU_OYgQ3ufX6NUPD-_Dwg' LIMIT 1[0m
|
|
250
178
|
Binary data inserted for `string` type on column `password_digest`
|
|
251
|
-
[1m[35mSQL (0.
|
|
179
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "3uU_OYgQ3ufX6NUPD-_Dwg"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "rgiDtRncDetrvKmVdfdT9Q@sample.com"], ["password_digest", "$2a$04$ASaZsbMK3yCoBITNxXgVHegoXY3tbPct5NjBDZXVDom8LyNZKCmdu"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
|
252
180
|
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
253
|
-
Started GET "/login" for 127.0.0.1 at
|
|
181
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
254
182
|
Processing by SessionsController#new as HTML
|
|
255
|
-
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
|
256
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
|
257
|
-
Processing by PasswordResetsController#new as HTML
|
|
258
183
|
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
259
|
-
Started
|
|
184
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
185
|
+
Processing by PasswordResetsController#new as HTML
|
|
186
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
187
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
260
188
|
Processing by PasswordResetsController#create as HTML
|
|
261
189
|
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
|
262
190
|
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
|
263
|
-
Completed 200 OK in
|
|
191
|
+
Completed 200 OK in 2ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
|
264
192
|
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
265
193
|
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
266
|
-
[1m[36m (0.
|
|
194
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
267
195
|
-------------------------------------------------------------------------
|
|
268
196
|
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
|
269
197
|
-------------------------------------------------------------------------
|
|
270
198
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
271
199
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
272
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
273
|
-
[1m[36mUser Exists (0.
|
|
200
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'Vj3dlIMb1aJI3AZG5y5UWA@sample.com' LIMIT 1
|
|
201
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'Zoa9_c8FuctQz1ErbWciVw' LIMIT 1[0m
|
|
274
202
|
Binary data inserted for `string` type on column `password_digest`
|
|
275
|
-
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "
|
|
203
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "Zoa9_c8FuctQz1ErbWciVw"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "Vj3dlIMb1aJI3AZG5y5UWA@sample.com"], ["password_digest", "$2a$04$APRyb4TLNjMOx0tlQPJxO.9cKuEZGFGmuRN1NfQ3CZ.FVx8yKKsdi"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
|
276
204
|
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
277
|
-
Started GET "/login" for 127.0.0.1 at
|
|
205
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
278
206
|
Processing by SessionsController#new as HTML
|
|
279
|
-
Completed 200 OK in 2ms (Views: 1.
|
|
280
|
-
Started GET "/password_resets/new" for 127.0.0.1 at
|
|
207
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
208
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
281
209
|
Processing by PasswordResetsController#new as HTML
|
|
282
210
|
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
283
|
-
Started POST "/password_resets" for 127.0.0.1 at
|
|
211
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
284
212
|
Processing by PasswordResetsController#create as HTML
|
|
285
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
286
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
287
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
|
213
|
+
Parameters: {"utf8"=>"✓", "email"=>"Vj3dlIMb1aJI3AZG5y5UWA@sample.com", "commit"=>"Reset password"}
|
|
214
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'Vj3dlIMb1aJI3AZG5y5UWA@sample.com' LIMIT 1
|
|
215
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'yXJaGO6lae4P1PbmadSFtg' LIMIT 1[0m
|
|
288
216
|
[1m[35m (0.0ms)[0m begin transaction
|
|
289
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
|
290
|
-
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "
|
|
291
|
-
[1m[36m (0.
|
|
217
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'Vj3dlIMb1aJI3AZG5y5UWA@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
218
|
+
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "yXJaGO6lae4P1PbmadSFtg"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
|
219
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
292
220
|
|
|
293
|
-
Sent mail to
|
|
294
|
-
Date:
|
|
221
|
+
Sent mail to Vj3dlIMb1aJI3AZG5y5UWA@sample.com (5.4ms)
|
|
222
|
+
Date: Wed, 23 Apr 2014 22:31:49 +0200
|
|
295
223
|
From: from@example.com
|
|
296
|
-
To:
|
|
297
|
-
Message-ID: <
|
|
224
|
+
To: Vj3dlIMb1aJI3AZG5y5UWA@sample.com
|
|
225
|
+
Message-ID: <535823353bab0_49ee3fe75882dbb89919a@air.lan.mail>
|
|
298
226
|
Subject: Password Reset
|
|
299
227
|
Mime-Version: 1.0
|
|
300
228
|
Content-Type: text/plain;
|
|
@@ -303,62 +231,62 @@ Content-Transfer-Encoding: 7bit
|
|
|
303
231
|
|
|
304
232
|
To reset your password, click the URL below.
|
|
305
233
|
|
|
306
|
-
http://localhost:3000/password_resets/
|
|
234
|
+
http://localhost:3000/password_resets/yXJaGO6lae4P1PbmadSFtg/edit
|
|
307
235
|
|
|
308
236
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
309
237
|
Redirected to http://www.example.com/
|
|
310
|
-
Completed 302 Found in
|
|
311
|
-
Started GET "/" for 127.0.0.1 at
|
|
238
|
+
Completed 302 Found in 15ms (ActiveRecord: 1.5ms)
|
|
239
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
312
240
|
Processing by HomeController#index as HTML
|
|
313
|
-
Completed 200 OK in 2ms (Views: 1.
|
|
314
|
-
Started GET "/password_resets/
|
|
241
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
242
|
+
Started GET "/password_resets/yXJaGO6lae4P1PbmadSFtg/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
315
243
|
Processing by PasswordResetsController#edit as HTML
|
|
316
|
-
Parameters: {"id"=>"
|
|
317
|
-
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
244
|
+
Parameters: {"id"=>"yXJaGO6lae4P1PbmadSFtg"}
|
|
245
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'yXJaGO6lae4P1PbmadSFtg' LIMIT 1
|
|
318
246
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
319
|
-
Started PATCH "/password_resets/
|
|
247
|
+
Started PATCH "/password_resets/yXJaGO6lae4P1PbmadSFtg" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
320
248
|
Processing by PasswordResetsController#update as HTML
|
|
321
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
|
322
|
-
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
249
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"yXJaGO6lae4P1PbmadSFtg"}
|
|
250
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'yXJaGO6lae4P1PbmadSFtg' LIMIT 1[0m
|
|
323
251
|
Redirected to http://localhost:3000/password_resets/new
|
|
324
252
|
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
|
325
|
-
Started GET "/password_resets/new" for 127.0.0.1 at
|
|
253
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
326
254
|
Processing by PasswordResetsController#new as HTML
|
|
327
255
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
328
|
-
[1m[35m (
|
|
256
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
|
329
257
|
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
330
|
-
[1m[35m (0.
|
|
258
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
331
259
|
-------------------------------------------------------------------------------------------
|
|
332
260
|
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
|
333
261
|
-------------------------------------------------------------------------------------------
|
|
334
262
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
335
263
|
[1m[35m (0.1ms)[0m begin transaction
|
|
336
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
337
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
264
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'FrQwp-vsKPH9d46yqVeZrA@sample.com' LIMIT 1[0m
|
|
265
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '_IigZ0GUEarQNzUJRvlUvg' LIMIT 1
|
|
338
266
|
Binary data inserted for `string` type on column `password_digest`
|
|
339
|
-
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
|
340
|
-
[1m[35m (0.
|
|
341
|
-
Started GET "/login" for 127.0.0.1 at
|
|
267
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "_IigZ0GUEarQNzUJRvlUvg"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "FrQwp-vsKPH9d46yqVeZrA@sample.com"], ["password_digest", "$2a$04$NgAbkgrGCyd8vRJyE2FMgu7R/jyIOM4eQTlQNMvCXL6TErviI32rq"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
|
268
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
269
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
342
270
|
Processing by SessionsController#new as HTML
|
|
343
|
-
Completed 200 OK in 2ms (Views: 1.
|
|
344
|
-
Started GET "/password_resets/new" for 127.0.0.1 at
|
|
271
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
272
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
345
273
|
Processing by PasswordResetsController#new as HTML
|
|
346
|
-
Completed 200 OK in
|
|
347
|
-
Started POST "/password_resets" for 127.0.0.1 at
|
|
274
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
275
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
348
276
|
Processing by PasswordResetsController#create as HTML
|
|
349
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
350
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
351
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
|
277
|
+
Parameters: {"utf8"=>"✓", "email"=>"FrQwp-vsKPH9d46yqVeZrA@sample.com", "commit"=>"Reset password"}
|
|
278
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'FrQwp-vsKPH9d46yqVeZrA@sample.com' LIMIT 1[0m
|
|
279
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'OojeQOotAJgQLyj_LMBX1A' LIMIT 1
|
|
352
280
|
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
353
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
|
354
|
-
[1m[36mSQL (0.
|
|
355
|
-
[1m[35m (0.
|
|
281
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'FrQwp-vsKPH9d46yqVeZrA@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
282
|
+
[1m[36mSQL (0.2ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "OojeQOotAJgQLyj_LMBX1A"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
|
283
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
356
284
|
|
|
357
|
-
Sent mail to
|
|
358
|
-
Date:
|
|
285
|
+
Sent mail to FrQwp-vsKPH9d46yqVeZrA@sample.com (4.9ms)
|
|
286
|
+
Date: Wed, 23 Apr 2014 22:31:49 +0200
|
|
359
287
|
From: from@example.com
|
|
360
|
-
To:
|
|
361
|
-
Message-ID: <
|
|
288
|
+
To: FrQwp-vsKPH9d46yqVeZrA@sample.com
|
|
289
|
+
Message-ID: <5358233552f69_49ee3fe75882dbb8992e4@air.lan.mail>
|
|
362
290
|
Subject: Password Reset
|
|
363
291
|
Mime-Version: 1.0
|
|
364
292
|
Content-Type: text/plain;
|
|
@@ -367,61 +295,61 @@ Content-Transfer-Encoding: 7bit
|
|
|
367
295
|
|
|
368
296
|
To reset your password, click the URL below.
|
|
369
297
|
|
|
370
|
-
http://localhost:3000/password_resets/
|
|
298
|
+
http://localhost:3000/password_resets/OojeQOotAJgQLyj_LMBX1A/edit
|
|
371
299
|
|
|
372
300
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
373
301
|
Redirected to http://www.example.com/
|
|
374
|
-
Completed 302 Found in
|
|
375
|
-
Started GET "/" for 127.0.0.1 at
|
|
302
|
+
Completed 302 Found in 17ms (ActiveRecord: 1.4ms)
|
|
303
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
376
304
|
Processing by HomeController#index as HTML
|
|
377
|
-
Completed 200 OK in
|
|
378
|
-
Started GET "/password_resets/
|
|
305
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
306
|
+
Started GET "/password_resets/OojeQOotAJgQLyj_LMBX1A/edit" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
379
307
|
Processing by PasswordResetsController#edit as HTML
|
|
380
|
-
Parameters: {"id"=>"
|
|
381
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
308
|
+
Parameters: {"id"=>"OojeQOotAJgQLyj_LMBX1A"}
|
|
309
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'OojeQOotAJgQLyj_LMBX1A' LIMIT 1[0m
|
|
382
310
|
Completed 200 OK in 3ms (Views: 2.3ms | ActiveRecord: 0.2ms)
|
|
383
|
-
Started PATCH "/password_resets/
|
|
311
|
+
Started PATCH "/password_resets/OojeQOotAJgQLyj_LMBX1A" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
384
312
|
Processing by PasswordResetsController#update as HTML
|
|
385
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
|
386
|
-
[1m[35mUser Load (0.
|
|
313
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"OojeQOotAJgQLyj_LMBX1A"}
|
|
314
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'OojeQOotAJgQLyj_LMBX1A' LIMIT 1
|
|
387
315
|
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
388
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
|
316
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'FrQwp-vsKPH9d46yqVeZrA@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
389
317
|
[1m[36m (0.0ms)[0m [1mrollback transaction[0m
|
|
390
|
-
Completed 200 OK in
|
|
391
|
-
[1m[35m (0.
|
|
392
|
-
[1m[36m (0.
|
|
318
|
+
Completed 200 OK in 6ms (Views: 2.3ms | ActiveRecord: 0.3ms)
|
|
319
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
320
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
393
321
|
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
394
322
|
-----------------------------------
|
|
395
323
|
AuthproIntegrationTest: test_signup
|
|
396
324
|
-----------------------------------
|
|
397
325
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
398
326
|
[1m[35m (0.1ms)[0m begin transaction
|
|
399
|
-
[1m[36mUser Exists (0.
|
|
400
|
-
[1m[35mUser Exists (0.
|
|
327
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'tvuWNAeD_56dstvCO6BjVg@sample.com' LIMIT 1[0m
|
|
328
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'LH3HROteORwVOUL0Ir0PBA' LIMIT 1
|
|
401
329
|
Binary data inserted for `string` type on column `password_digest`
|
|
402
|
-
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
|
403
|
-
[1m[35m (0.
|
|
404
|
-
Started GET "/" for 127.0.0.1 at
|
|
330
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "LH3HROteORwVOUL0Ir0PBA"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "tvuWNAeD_56dstvCO6BjVg@sample.com"], ["password_digest", "$2a$04$x84NnYVR9azMo7wcUDjKxe2gQ68DkU1RVKabp3QYoZgsQDdVXIh1K"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
|
331
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
332
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
405
333
|
Processing by HomeController#index as HTML
|
|
406
|
-
Completed 200 OK in 1ms (Views: 1.
|
|
407
|
-
Started GET "/signup" for 127.0.0.1 at
|
|
334
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
|
335
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
408
336
|
Processing by UsersController#new as HTML
|
|
409
|
-
Completed 200 OK in
|
|
410
|
-
Started POST "/users" for 127.0.0.1 at
|
|
337
|
+
Completed 200 OK in 6ms (Views: 5.4ms | ActiveRecord: 0.0ms)
|
|
338
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
411
339
|
Processing by UsersController#create as HTML
|
|
412
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
|
340
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"dw0ww67R5DcTPcYCP3k2iA@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
413
341
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
414
|
-
[1m[35mUser Exists (0.
|
|
415
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
342
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'dw0ww67R5DcTPcYCP3k2iA@sample.com' LIMIT 1
|
|
343
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'AmlnxmmbTR1Guflp3kCiAg' LIMIT 1[0m
|
|
416
344
|
Binary data inserted for `string` type on column `password_digest`
|
|
417
|
-
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "
|
|
418
|
-
[1m[36m (0.
|
|
345
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "AmlnxmmbTR1Guflp3kCiAg"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "dw0ww67R5DcTPcYCP3k2iA@sample.com"], ["password_digest", "$2a$04$.QlRPaftmslSs0YxTc/MwuY.TRtogQp63p98biCDxmqVm.IXvnMNK"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
|
346
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
419
347
|
Redirected to http://www.example.com/
|
|
420
|
-
Completed 302 Found in
|
|
421
|
-
Started GET "/" for 127.0.0.1 at
|
|
348
|
+
Completed 302 Found in 6ms (ActiveRecord: 1.5ms)
|
|
349
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
422
350
|
Processing by HomeController#index as HTML
|
|
423
351
|
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
424
|
-
[1m[35m (
|
|
352
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
425
353
|
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
426
354
|
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
427
355
|
-------------------------------------------
|
|
@@ -429,40 +357,2833 @@ AuthproIntegrationTest: test_signup_failing
|
|
|
429
357
|
-------------------------------------------
|
|
430
358
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
431
359
|
[1m[35m (0.1ms)[0m begin transaction
|
|
432
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
433
|
-
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
360
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'iFdXiLm9YLw2dUBl7xyB7A@sample.com' LIMIT 1[0m
|
|
361
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'rpl4AbvL5x1vjrYDd-Y_0g' LIMIT 1
|
|
434
362
|
Binary data inserted for `string` type on column `password_digest`
|
|
435
|
-
[1m[36mSQL (0.
|
|
436
|
-
[1m[35m (
|
|
437
|
-
Started GET "/" for 127.0.0.1 at
|
|
363
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "rpl4AbvL5x1vjrYDd-Y_0g"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "iFdXiLm9YLw2dUBl7xyB7A@sample.com"], ["password_digest", "$2a$04$y6lRLJTkwFYgzwtNTAZmv.OPyAW2lIm.vOL5g/IQGMUYbAeOVh5IG"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
|
364
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
365
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
438
366
|
Processing by HomeController#index as HTML
|
|
439
|
-
Completed 200 OK in 1ms (Views: 1.
|
|
440
|
-
Started GET "/signup" for 127.0.0.1 at
|
|
367
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
|
368
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
441
369
|
Processing by UsersController#new as HTML
|
|
442
|
-
Completed 200 OK in
|
|
443
|
-
Started POST "/users" for 127.0.0.1 at
|
|
370
|
+
Completed 200 OK in 4ms (Views: 4.2ms | ActiveRecord: 0.0ms)
|
|
371
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
444
372
|
Processing by UsersController#create as HTML
|
|
445
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
|
373
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"Kk36uaQBjdar0smAmUuS6w@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
446
374
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
447
|
-
[1m[35mUser Exists (0.
|
|
448
|
-
[1m[36m (0.
|
|
449
|
-
Completed 200 OK in
|
|
375
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'Kk36uaQBjdar0smAmUuS6w@sample.com' LIMIT 1
|
|
376
|
+
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
|
377
|
+
Completed 200 OK in 7ms (Views: 3.6ms | ActiveRecord: 0.3ms)
|
|
450
378
|
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
451
379
|
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
452
|
-
[1m[35m (0.
|
|
380
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
453
381
|
---------------------------------------
|
|
454
382
|
AuthproIntegrationTest: test_visit_home
|
|
455
383
|
---------------------------------------
|
|
456
384
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
457
385
|
[1m[35m (0.1ms)[0m begin transaction
|
|
458
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
459
|
-
[1m[35mUser Exists (0.
|
|
386
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '2EInV3A1WmZfT-WAeaBfIA@sample.com' LIMIT 1[0m
|
|
387
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'xUqieAtfYfRCNvC9282B7w' LIMIT 1
|
|
388
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
389
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "xUqieAtfYfRCNvC9282B7w"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "2EInV3A1WmZfT-WAeaBfIA@sample.com"], ["password_digest", "$2a$04$lbOxiDC4T9NtOjcKYC6zr.boH1dT7ph1UUTwVedfLlQ/S.EYLzrEa"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
|
390
|
+
[1m[35m (1.0ms)[0m commit transaction
|
|
391
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
|
392
|
+
Processing by HomeController#index as HTML
|
|
393
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
394
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
|
395
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
396
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
397
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
398
|
+
------------------------------------------
|
|
399
|
+
AuthproGeneratorTest: test_generated_files
|
|
400
|
+
------------------------------------------
|
|
401
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
|
402
|
+
----------------------------------
|
|
403
|
+
AuthproIntegrationTest: test_login
|
|
404
|
+
----------------------------------
|
|
405
|
+
[1m[36m (1.4ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
|
406
|
+
[1m[35m (1.2ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
|
407
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.2ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
408
|
+
Migrating to CreateUsers (20140423203225)
|
|
409
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
410
|
+
[1m[36m (0.3ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
|
411
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20140423203225"]]
|
|
412
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
413
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
414
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'uwCtFVZjOBqQvw6eTUmnrQ@sample.com' LIMIT 1[0m
|
|
415
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'r3DvqInQobjZR9lVKF7rkg' LIMIT 1
|
|
416
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
417
|
+
[1m[36mSQL (2.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "r3DvqInQobjZR9lVKF7rkg"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "uwCtFVZjOBqQvw6eTUmnrQ@sample.com"], ["password_digest", "$2a$04$y14WSKtVnSbNKXk2mZabeOOkwiaSWDxyvrO9z5zml4QCbl9HhaNn2"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
|
418
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
419
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
420
|
+
Processing by HomeController#index as HTML
|
|
421
|
+
Rendered home/index.html.erb within layouts/application (1.1ms)
|
|
422
|
+
Completed 200 OK in 21ms (Views: 20.4ms | ActiveRecord: 0.0ms)
|
|
423
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
424
|
+
Processing by SessionsController#new as HTML
|
|
425
|
+
Rendered sessions/new.html.erb within layouts/application (1.0ms)
|
|
426
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
|
427
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
428
|
+
Processing by SessionsController#create as HTML
|
|
429
|
+
Parameters: {"utf8"=>"✓", "email"=>"uwCtFVZjOBqQvw6eTUmnrQ@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
430
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'uwCtFVZjOBqQvw6eTUmnrQ@sample.com' LIMIT 1[0m
|
|
431
|
+
Redirected to http://www.example.com/
|
|
432
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
|
433
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
434
|
+
Processing by HomeController#index as HTML
|
|
435
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
|
436
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'r3DvqInQobjZR9lVKF7rkg' LIMIT 1
|
|
437
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.1ms)
|
|
438
|
+
[1m[36m (2.8ms)[0m [1mDELETE FROM "users";[0m
|
|
439
|
+
[1m[35m (0.3ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
440
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
441
|
+
------------------------------------------
|
|
442
|
+
AuthproIntegrationTest: test_login_failing
|
|
443
|
+
------------------------------------------
|
|
444
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
445
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
446
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'd0X0dL-umXWXX7ZWyW1V7g@sample.com' LIMIT 1
|
|
447
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'uuaU6a10qbOv15h6pEphLw' LIMIT 1[0m
|
|
448
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
449
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "uuaU6a10qbOv15h6pEphLw"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "d0X0dL-umXWXX7ZWyW1V7g@sample.com"], ["password_digest", "$2a$04$vftYivgCOljNzpEmXMUlyO8jRIxh60EhoPkSeU8dF.x/7DuB1pl8G"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
|
450
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
451
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
452
|
+
Processing by HomeController#index as HTML
|
|
453
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
454
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
455
|
+
Processing by SessionsController#new as HTML
|
|
456
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
|
457
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
458
|
+
Processing by SessionsController#create as HTML
|
|
459
|
+
Parameters: {"utf8"=>"✓", "email"=>"d0X0dL-umXWXX7ZWyW1V7g@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
460
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'd0X0dL-umXWXX7ZWyW1V7g@sample.com' LIMIT 1
|
|
461
|
+
Completed 200 OK in 4ms (Views: 1.4ms | ActiveRecord: 0.2ms)
|
|
462
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
|
463
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
464
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
465
|
+
-----------------------------------
|
|
466
|
+
AuthproIntegrationTest: test_logout
|
|
467
|
+
-----------------------------------
|
|
468
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
469
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
470
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'l-CChuiaMKtY3ZgiRl4Ypw@sample.com' LIMIT 1
|
|
471
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'eFY6eUaIGSMXomX-sALVGQ' LIMIT 1[0m
|
|
472
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
473
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "eFY6eUaIGSMXomX-sALVGQ"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "l-CChuiaMKtY3ZgiRl4Ypw@sample.com"], ["password_digest", "$2a$04$lpn8.LtRmnwNKn27pfz2jusnB2lvZehFRvKrx50.khfkXQg5dIDM6"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
|
474
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
475
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
476
|
+
Processing by SessionsController#new as HTML
|
|
477
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
478
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
479
|
+
Processing by SessionsController#create as HTML
|
|
480
|
+
Parameters: {"utf8"=>"✓", "email"=>"l-CChuiaMKtY3ZgiRl4Ypw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
481
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'l-CChuiaMKtY3ZgiRl4Ypw@sample.com' LIMIT 1
|
|
482
|
+
Redirected to http://www.example.com/
|
|
483
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
|
484
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
485
|
+
Processing by HomeController#index as HTML
|
|
486
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'eFY6eUaIGSMXomX-sALVGQ' LIMIT 1[0m
|
|
487
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.2ms)
|
|
488
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
489
|
+
Processing by SessionsController#destroy as HTML
|
|
490
|
+
Redirected to http://www.example.com/
|
|
491
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
|
492
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
493
|
+
Processing by HomeController#index as HTML
|
|
494
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
495
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
496
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
497
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
498
|
+
-------------------------------------------
|
|
499
|
+
AuthproIntegrationTest: test_reset_password
|
|
500
|
+
-------------------------------------------
|
|
501
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.2ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
502
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
503
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '45MtyQDA5Jn97XRo56WORw@sample.com' LIMIT 1[0m
|
|
504
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'Gfq1iMl0I84DUXTXuqdF-g' LIMIT 1
|
|
460
505
|
Binary data inserted for `string` type on column `password_digest`
|
|
461
|
-
[1m[36mSQL (0.
|
|
506
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "Gfq1iMl0I84DUXTXuqdF-g"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "45MtyQDA5Jn97XRo56WORw@sample.com"], ["password_digest", "$2a$04$MqKoFACJkeqbGFxSPr0ZqOJxUo77j.Gfqu7i.kWFivYLSuF/OgdRy"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
|
507
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
508
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
509
|
+
Processing by SessionsController#new as HTML
|
|
510
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
|
511
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
512
|
+
Processing by PasswordResetsController#new as HTML
|
|
513
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
|
514
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
515
|
+
Processing by PasswordResetsController#create as HTML
|
|
516
|
+
Parameters: {"utf8"=>"✓", "email"=>"45MtyQDA5Jn97XRo56WORw@sample.com", "commit"=>"Reset password"}
|
|
517
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '45MtyQDA5Jn97XRo56WORw@sample.com' LIMIT 1[0m
|
|
518
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'I0EWouN19bC7qTWUYY_DHQ' LIMIT 1
|
|
519
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
520
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '45MtyQDA5Jn97XRo56WORw@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
521
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "I0EWouN19bC7qTWUYY_DHQ"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
|
462
522
|
[1m[35m (0.9ms)[0m commit transaction
|
|
463
|
-
|
|
523
|
+
|
|
524
|
+
Sent mail to 45MtyQDA5Jn97XRo56WORw@sample.com (9.5ms)
|
|
525
|
+
Date: Wed, 23 Apr 2014 22:32:25 +0200
|
|
526
|
+
From: from@example.com
|
|
527
|
+
To: 45MtyQDA5Jn97XRo56WORw@sample.com
|
|
528
|
+
Message-ID: <53582359b45b3_4a1d3feb4c82dbc088965@air.lan.mail>
|
|
529
|
+
Subject: Password Reset
|
|
530
|
+
Mime-Version: 1.0
|
|
531
|
+
Content-Type: text/plain;
|
|
532
|
+
charset=UTF-8
|
|
533
|
+
Content-Transfer-Encoding: 7bit
|
|
534
|
+
|
|
535
|
+
To reset your password, click the URL below.
|
|
536
|
+
|
|
537
|
+
http://localhost:3000/password_resets/I0EWouN19bC7qTWUYY_DHQ/edit
|
|
538
|
+
|
|
539
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
540
|
+
Redirected to http://www.example.com/
|
|
541
|
+
Completed 302 Found in 175ms (ActiveRecord: 1.9ms)
|
|
542
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
543
|
+
Processing by HomeController#index as HTML
|
|
544
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
545
|
+
Started GET "/password_resets/I0EWouN19bC7qTWUYY_DHQ/edit" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
546
|
+
Processing by PasswordResetsController#edit as HTML
|
|
547
|
+
Parameters: {"id"=>"I0EWouN19bC7qTWUYY_DHQ"}
|
|
548
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'I0EWouN19bC7qTWUYY_DHQ' LIMIT 1[0m
|
|
549
|
+
Completed 200 OK in 11ms (Views: 10.1ms | ActiveRecord: 0.2ms)
|
|
550
|
+
Started PATCH "/password_resets/I0EWouN19bC7qTWUYY_DHQ" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
551
|
+
Processing by PasswordResetsController#update as HTML
|
|
552
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"I0EWouN19bC7qTWUYY_DHQ"}
|
|
553
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'I0EWouN19bC7qTWUYY_DHQ' LIMIT 1
|
|
554
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
555
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '45MtyQDA5Jn97XRo56WORw@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
556
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
557
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$0vbmDx2yI6viCJ/.gDGMAOzV3P1GB1N/D6TnPcLwS/rIPLowlxZDy"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
|
558
|
+
[1m[35m (2.5ms)[0m commit transaction
|
|
559
|
+
Redirected to http://localhost:3000/
|
|
560
|
+
Completed 302 Found in 8ms (ActiveRecord: 3.1ms)
|
|
561
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
464
562
|
Processing by HomeController#index as HTML
|
|
563
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
564
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
565
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
566
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
567
|
+
--------------------------------------------------------------------------------
|
|
568
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
|
569
|
+
--------------------------------------------------------------------------------
|
|
570
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
571
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
572
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '5KSdMzJgd9L5eFBkpwofuw@sample.com' LIMIT 1
|
|
573
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'PQ2CC5qLp0iKzKz9ygowdQ' LIMIT 1[0m
|
|
574
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
575
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "PQ2CC5qLp0iKzKz9ygowdQ"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "5KSdMzJgd9L5eFBkpwofuw@sample.com"], ["password_digest", "$2a$04$0vb6tw/owWo0kPO9c64/gO3JNMwdM9D/k7MtfazlqiLMY.NzG0KJq"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
|
576
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
577
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
578
|
+
Processing by SessionsController#new as HTML
|
|
579
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
580
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
581
|
+
Processing by PasswordResetsController#new as HTML
|
|
465
582
|
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
583
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
584
|
+
Processing by PasswordResetsController#create as HTML
|
|
585
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
|
586
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
|
587
|
+
Completed 200 OK in 2ms (Views: 1.1ms | ActiveRecord: 0.2ms)
|
|
466
588
|
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
|
467
|
-
[1m[35m (0.
|
|
468
|
-
[1m[36m (0.
|
|
589
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
590
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
591
|
+
-------------------------------------------------------------------------
|
|
592
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
|
593
|
+
-------------------------------------------------------------------------
|
|
594
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
595
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
596
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'jELy6b1AMJ2RV-_hTMBSfw@sample.com' LIMIT 1
|
|
597
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'TRANIoMoWjdB6CypaeB4Tw' LIMIT 1[0m
|
|
598
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
599
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "TRANIoMoWjdB6CypaeB4Tw"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "jELy6b1AMJ2RV-_hTMBSfw@sample.com"], ["password_digest", "$2a$04$qaI9IDodXhUm0hcobDqGwOcGkzd1LiJ2V5hoQFol8QBmNEV5lKh3u"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
|
600
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
601
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
602
|
+
Processing by SessionsController#new as HTML
|
|
603
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
|
604
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
605
|
+
Processing by PasswordResetsController#new as HTML
|
|
606
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
607
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
608
|
+
Processing by PasswordResetsController#create as HTML
|
|
609
|
+
Parameters: {"utf8"=>"✓", "email"=>"jELy6b1AMJ2RV-_hTMBSfw@sample.com", "commit"=>"Reset password"}
|
|
610
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'jELy6b1AMJ2RV-_hTMBSfw@sample.com' LIMIT 1
|
|
611
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'GkNFCYU-Lfrr9R_W-iEtKQ' LIMIT 1[0m
|
|
612
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
613
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'jELy6b1AMJ2RV-_hTMBSfw@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
614
|
+
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "GkNFCYU-Lfrr9R_W-iEtKQ"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
|
615
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
616
|
+
|
|
617
|
+
Sent mail to jELy6b1AMJ2RV-_hTMBSfw@sample.com (4.7ms)
|
|
618
|
+
Date: Wed, 23 Apr 2014 22:32:25 +0200
|
|
619
|
+
From: from@example.com
|
|
620
|
+
To: jELy6b1AMJ2RV-_hTMBSfw@sample.com
|
|
621
|
+
Message-ID: <53582359d2266_4a1d3feb4c82dbc089015@air.lan.mail>
|
|
622
|
+
Subject: Password Reset
|
|
623
|
+
Mime-Version: 1.0
|
|
624
|
+
Content-Type: text/plain;
|
|
625
|
+
charset=UTF-8
|
|
626
|
+
Content-Transfer-Encoding: 7bit
|
|
627
|
+
|
|
628
|
+
To reset your password, click the URL below.
|
|
629
|
+
|
|
630
|
+
http://localhost:3000/password_resets/GkNFCYU-Lfrr9R_W-iEtKQ/edit
|
|
631
|
+
|
|
632
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
633
|
+
Redirected to http://www.example.com/
|
|
634
|
+
Completed 302 Found in 15ms (ActiveRecord: 1.3ms)
|
|
635
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
636
|
+
Processing by HomeController#index as HTML
|
|
637
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
638
|
+
Started GET "/password_resets/GkNFCYU-Lfrr9R_W-iEtKQ/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
639
|
+
Processing by PasswordResetsController#edit as HTML
|
|
640
|
+
Parameters: {"id"=>"GkNFCYU-Lfrr9R_W-iEtKQ"}
|
|
641
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'GkNFCYU-Lfrr9R_W-iEtKQ' LIMIT 1
|
|
642
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
643
|
+
Started PATCH "/password_resets/GkNFCYU-Lfrr9R_W-iEtKQ" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
644
|
+
Processing by PasswordResetsController#update as HTML
|
|
645
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"GkNFCYU-Lfrr9R_W-iEtKQ"}
|
|
646
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'GkNFCYU-Lfrr9R_W-iEtKQ' LIMIT 1[0m
|
|
647
|
+
Redirected to http://localhost:3000/password_resets/new
|
|
648
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
|
649
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
650
|
+
Processing by PasswordResetsController#new as HTML
|
|
651
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
652
|
+
[1m[35m (1.9ms)[0m DELETE FROM "users";
|
|
653
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
654
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
655
|
+
-------------------------------------------------------------------------------------------
|
|
656
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
|
657
|
+
-------------------------------------------------------------------------------------------
|
|
658
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
659
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
660
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'srAbGnRUqyCW3ioAkEOh0A@sample.com' LIMIT 1[0m
|
|
661
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'UaGAlPBUuBErMxMBVROMig' LIMIT 1
|
|
662
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
663
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "UaGAlPBUuBErMxMBVROMig"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "srAbGnRUqyCW3ioAkEOh0A@sample.com"], ["password_digest", "$2a$04$lFWqg9tmr7vMrMrtR7RFIenqMAenCRj6Pr24OIzMrGniTTJZQHpS."], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
|
664
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
665
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
666
|
+
Processing by SessionsController#new as HTML
|
|
667
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
|
668
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
669
|
+
Processing by PasswordResetsController#new as HTML
|
|
670
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
671
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
672
|
+
Processing by PasswordResetsController#create as HTML
|
|
673
|
+
Parameters: {"utf8"=>"✓", "email"=>"srAbGnRUqyCW3ioAkEOh0A@sample.com", "commit"=>"Reset password"}
|
|
674
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'srAbGnRUqyCW3ioAkEOh0A@sample.com' LIMIT 1[0m
|
|
675
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'HOb7D3_Nb2uCEO316IyzJA' LIMIT 1
|
|
676
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
677
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'srAbGnRUqyCW3ioAkEOh0A@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
678
|
+
[1m[36mSQL (0.2ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "HOb7D3_Nb2uCEO316IyzJA"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
|
679
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
680
|
+
|
|
681
|
+
Sent mail to srAbGnRUqyCW3ioAkEOh0A@sample.com (6.1ms)
|
|
682
|
+
Date: Wed, 23 Apr 2014 22:32:25 +0200
|
|
683
|
+
From: from@example.com
|
|
684
|
+
To: srAbGnRUqyCW3ioAkEOh0A@sample.com
|
|
685
|
+
Message-ID: <53582359e50ba_4a1d3feb4c82dbc0891ef@air.lan.mail>
|
|
686
|
+
Subject: Password Reset
|
|
687
|
+
Mime-Version: 1.0
|
|
688
|
+
Content-Type: text/plain;
|
|
689
|
+
charset=UTF-8
|
|
690
|
+
Content-Transfer-Encoding: 7bit
|
|
691
|
+
|
|
692
|
+
To reset your password, click the URL below.
|
|
693
|
+
|
|
694
|
+
http://localhost:3000/password_resets/HOb7D3_Nb2uCEO316IyzJA/edit
|
|
695
|
+
|
|
696
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
697
|
+
Redirected to http://www.example.com/
|
|
698
|
+
Completed 302 Found in 15ms (ActiveRecord: 1.5ms)
|
|
699
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
700
|
+
Processing by HomeController#index as HTML
|
|
701
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
702
|
+
Started GET "/password_resets/HOb7D3_Nb2uCEO316IyzJA/edit" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
703
|
+
Processing by PasswordResetsController#edit as HTML
|
|
704
|
+
Parameters: {"id"=>"HOb7D3_Nb2uCEO316IyzJA"}
|
|
705
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'HOb7D3_Nb2uCEO316IyzJA' LIMIT 1[0m
|
|
706
|
+
Completed 200 OK in 3ms (Views: 2.1ms | ActiveRecord: 0.2ms)
|
|
707
|
+
Started PATCH "/password_resets/HOb7D3_Nb2uCEO316IyzJA" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
708
|
+
Processing by PasswordResetsController#update as HTML
|
|
709
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"HOb7D3_Nb2uCEO316IyzJA"}
|
|
710
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'HOb7D3_Nb2uCEO316IyzJA' LIMIT 1
|
|
711
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
712
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'srAbGnRUqyCW3ioAkEOh0A@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
713
|
+
[1m[36m (0.0ms)[0m [1mrollback transaction[0m
|
|
714
|
+
Completed 200 OK in 6ms (Views: 2.3ms | ActiveRecord: 0.3ms)
|
|
715
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
|
716
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
717
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
718
|
+
-----------------------------------
|
|
719
|
+
AuthproIntegrationTest: test_signup
|
|
720
|
+
-----------------------------------
|
|
721
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
722
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
723
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '687nx3FquSiJVIgNdC1Npg@sample.com' LIMIT 1[0m
|
|
724
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'xA2ujYHRmwjXbJWMi6qTDQ' LIMIT 1
|
|
725
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
726
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "xA2ujYHRmwjXbJWMi6qTDQ"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "687nx3FquSiJVIgNdC1Npg@sample.com"], ["password_digest", "$2a$04$YYrzBENCwdcHf5vTcUqFMOLOgEmfw8WBu4iU.uegPAnVtrApO/khG"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
|
727
|
+
[1m[35m (1.0ms)[0m commit transaction
|
|
728
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
729
|
+
Processing by HomeController#index as HTML
|
|
730
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
731
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
|
732
|
+
Processing by UsersController#new as HTML
|
|
733
|
+
Completed 200 OK in 4ms (Views: 3.9ms | ActiveRecord: 0.0ms)
|
|
734
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:32:26 +0200
|
|
735
|
+
Processing by UsersController#create as HTML
|
|
736
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"yIQ-1KY1CnUGhrfL00hBsg@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
737
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
738
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'yIQ-1KY1CnUGhrfL00hBsg@sample.com' LIMIT 1
|
|
739
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'meBmxXyANL74gRdfqDk_ng' LIMIT 1[0m
|
|
740
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
741
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "meBmxXyANL74gRdfqDk_ng"], ["created_at", Wed, 23 Apr 2014 20:32:26 UTC +00:00], ["email", "yIQ-1KY1CnUGhrfL00hBsg@sample.com"], ["password_digest", "$2a$04$V0cFkSz3yPxefYE5fwPS6uFt0cXTxTKHfyoIKGW5OvOO4EQ0hGZ4W"], ["updated_at", Wed, 23 Apr 2014 20:32:26 UTC +00:00]]
|
|
742
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
743
|
+
Redirected to http://www.example.com/
|
|
744
|
+
Completed 302 Found in 5ms (ActiveRecord: 1.3ms)
|
|
745
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:26 +0200
|
|
746
|
+
Processing by HomeController#index as HTML
|
|
747
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
748
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
749
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
750
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
751
|
+
-------------------------------------------
|
|
752
|
+
AuthproIntegrationTest: test_signup_failing
|
|
753
|
+
-------------------------------------------
|
|
754
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
755
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
756
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'Kd3IMf701YLg3lK-B4oNdQ@sample.com' LIMIT 1[0m
|
|
757
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'BDjku0_6j4bGVwsq3KH8pg' LIMIT 1
|
|
758
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
759
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "BDjku0_6j4bGVwsq3KH8pg"], ["created_at", Wed, 23 Apr 2014 20:32:26 UTC +00:00], ["email", "Kd3IMf701YLg3lK-B4oNdQ@sample.com"], ["password_digest", "$2a$04$dEljnumAMQ1OUhOcXhHwDer/oLZMOiKujsY17MnW5M4Qv065WBR92"], ["updated_at", Wed, 23 Apr 2014 20:32:26 UTC +00:00]]
|
|
760
|
+
[1m[35m (0.6ms)[0m commit transaction
|
|
761
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:26 +0200
|
|
762
|
+
Processing by HomeController#index as HTML
|
|
763
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
764
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:32:26 +0200
|
|
765
|
+
Processing by UsersController#new as HTML
|
|
766
|
+
Completed 200 OK in 4ms (Views: 3.7ms | ActiveRecord: 0.0ms)
|
|
767
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:32:26 +0200
|
|
768
|
+
Processing by UsersController#create as HTML
|
|
769
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"Cu6nOICSO7SWAkC7GFGZvw@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
770
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
771
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'Cu6nOICSO7SWAkC7GFGZvw@sample.com' LIMIT 1
|
|
772
|
+
[1m[36m (0.0ms)[0m [1mrollback transaction[0m
|
|
773
|
+
Completed 200 OK in 6ms (Views: 2.8ms | ActiveRecord: 0.3ms)
|
|
774
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
775
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
776
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
777
|
+
---------------------------------------
|
|
778
|
+
AuthproIntegrationTest: test_visit_home
|
|
779
|
+
---------------------------------------
|
|
780
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
781
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
782
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'feqwRBO7iFEyYPgGUg9Uxw@sample.com' LIMIT 1[0m
|
|
783
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '5YQUN8EgRqkv0cU5pmwB6g' LIMIT 1
|
|
784
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
785
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "5YQUN8EgRqkv0cU5pmwB6g"], ["created_at", Wed, 23 Apr 2014 20:32:26 UTC +00:00], ["email", "feqwRBO7iFEyYPgGUg9Uxw@sample.com"], ["password_digest", "$2a$04$Gsuk/HzB4lwAnlbWhqNZ3efDaizfBhk6uxSCnEzwWzFPtNOYEaLHW"], ["updated_at", Wed, 23 Apr 2014 20:32:26 UTC +00:00]]
|
|
786
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
787
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:26 +0200
|
|
788
|
+
Processing by HomeController#index as HTML
|
|
789
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
790
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
|
791
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
792
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
793
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
794
|
+
------------------------------------------
|
|
795
|
+
AuthproGeneratorTest: test_generated_files
|
|
796
|
+
------------------------------------------
|
|
797
|
+
[1m[35m (0.2ms)[0m rollback transaction
|
|
798
|
+
----------------------------------
|
|
799
|
+
AuthproIntegrationTest: test_login
|
|
800
|
+
----------------------------------
|
|
801
|
+
[1m[36m (1.0ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
|
802
|
+
[1m[35m (0.9ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
|
803
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
804
|
+
Migrating to CreateUsers (20140423203636)
|
|
805
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
806
|
+
[1m[36m (0.3ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
|
807
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20140423203636"]]
|
|
808
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
809
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
810
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '8R8SW-L_SmPXsDhcJeT8Jg@sample.com' LIMIT 1[0m
|
|
811
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'buQpniPH-wcsUA29uHrWGA' LIMIT 1
|
|
812
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
813
|
+
[1m[36mSQL (2.7ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "buQpniPH-wcsUA29uHrWGA"], ["created_at", Wed, 23 Apr 2014 20:36:36 UTC +00:00], ["email", "8R8SW-L_SmPXsDhcJeT8Jg@sample.com"], ["password_digest", "$2a$04$vLDoDVCW06b.RLDumQVo6e4ePwud7QuBezFkm3kyn1xmWm8LFFiGC"], ["updated_at", Wed, 23 Apr 2014 20:36:36 UTC +00:00]]
|
|
814
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
815
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
|
816
|
+
Processing by HomeController#index as HTML
|
|
817
|
+
Rendered home/index.html.erb within layouts/application (1.0ms)
|
|
818
|
+
Completed 200 OK in 20ms (Views: 19.4ms | ActiveRecord: 0.0ms)
|
|
819
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
|
820
|
+
Processing by SessionsController#new as HTML
|
|
821
|
+
Rendered sessions/new.html.erb within layouts/application (1.1ms)
|
|
822
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
|
823
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
|
824
|
+
Processing by SessionsController#create as HTML
|
|
825
|
+
Parameters: {"utf8"=>"✓", "email"=>"8R8SW-L_SmPXsDhcJeT8Jg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
826
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '8R8SW-L_SmPXsDhcJeT8Jg@sample.com' LIMIT 1[0m
|
|
827
|
+
Redirected to http://www.example.com/
|
|
828
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
|
829
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
|
830
|
+
Processing by HomeController#index as HTML
|
|
831
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
|
832
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'buQpniPH-wcsUA29uHrWGA' LIMIT 1
|
|
833
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.1ms)
|
|
834
|
+
[1m[36m (2.8ms)[0m [1mDELETE FROM "users";[0m
|
|
835
|
+
[1m[35m (0.3ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
836
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
837
|
+
------------------------------------------
|
|
838
|
+
AuthproIntegrationTest: test_login_failing
|
|
839
|
+
------------------------------------------
|
|
840
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
841
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
842
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'fq0cZZFtfQMYuz6PNz_JsA@sample.com' LIMIT 1
|
|
843
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'tz4PXi_vDt38AOt1Oho9bQ' LIMIT 1[0m
|
|
844
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
845
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "tz4PXi_vDt38AOt1Oho9bQ"], ["created_at", Wed, 23 Apr 2014 20:36:36 UTC +00:00], ["email", "fq0cZZFtfQMYuz6PNz_JsA@sample.com"], ["password_digest", "$2a$04$mZjk8pjE26rr/sk5awU3y.IFs.6cfZBu42iG2T5nRiySC3u0wrSA2"], ["updated_at", Wed, 23 Apr 2014 20:36:36 UTC +00:00]]
|
|
846
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
847
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
|
848
|
+
Processing by HomeController#index as HTML
|
|
849
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
850
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
|
851
|
+
Processing by SessionsController#new as HTML
|
|
852
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
853
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
|
854
|
+
Processing by SessionsController#create as HTML
|
|
855
|
+
Parameters: {"utf8"=>"✓", "email"=>"fq0cZZFtfQMYuz6PNz_JsA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
856
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'fq0cZZFtfQMYuz6PNz_JsA@sample.com' LIMIT 1
|
|
857
|
+
Completed 200 OK in 4ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
|
858
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM "users";[0m
|
|
859
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
860
|
+
[1m[36m (0.5ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
861
|
+
-----------------------------------
|
|
862
|
+
AuthproIntegrationTest: test_logout
|
|
863
|
+
-----------------------------------
|
|
864
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
865
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
866
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'wSb9vXUmJmqlvgKktI9Tig@sample.com' LIMIT 1
|
|
867
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'dIe-U17l-aFHvXWphb1D-A' LIMIT 1[0m
|
|
868
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
869
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "dIe-U17l-aFHvXWphb1D-A"], ["created_at", Wed, 23 Apr 2014 20:36:36 UTC +00:00], ["email", "wSb9vXUmJmqlvgKktI9Tig@sample.com"], ["password_digest", "$2a$04$RGhxq/i9uSNXeAc9az8O6OGJDrzMZt0KDGjUl2/ZZ9GNOqLKTQHFS"], ["updated_at", Wed, 23 Apr 2014 20:36:36 UTC +00:00]]
|
|
870
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
871
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
|
872
|
+
Processing by SessionsController#new as HTML
|
|
873
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
874
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
|
875
|
+
Processing by SessionsController#create as HTML
|
|
876
|
+
Parameters: {"utf8"=>"✓", "email"=>"wSb9vXUmJmqlvgKktI9Tig@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
877
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'wSb9vXUmJmqlvgKktI9Tig@sample.com' LIMIT 1
|
|
878
|
+
Redirected to http://www.example.com/
|
|
879
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
|
880
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
|
881
|
+
Processing by HomeController#index as HTML
|
|
882
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'dIe-U17l-aFHvXWphb1D-A' LIMIT 1[0m
|
|
883
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.2ms)
|
|
884
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
|
885
|
+
Processing by SessionsController#destroy as HTML
|
|
886
|
+
Redirected to http://www.example.com/
|
|
887
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
|
888
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
|
889
|
+
Processing by HomeController#index as HTML
|
|
890
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
891
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
|
892
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
893
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
894
|
+
-------------------------------------------
|
|
895
|
+
AuthproIntegrationTest: test_reset_password
|
|
896
|
+
-------------------------------------------
|
|
897
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
898
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
899
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'W6IXbSAySIt_q40lX0f0Xw@sample.com' LIMIT 1[0m
|
|
900
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'buh37f9dikfGMQlDlK4UWA' LIMIT 1
|
|
901
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
902
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "buh37f9dikfGMQlDlK4UWA"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "W6IXbSAySIt_q40lX0f0Xw@sample.com"], ["password_digest", "$2a$04$97.S3HCA9JqBYT83JYanWu/XewQQP6hnf7ZVIn.Rc/AWMsaRImKKe"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
|
903
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
904
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
905
|
+
Processing by SessionsController#new as HTML
|
|
906
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
907
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
908
|
+
Processing by PasswordResetsController#new as HTML
|
|
909
|
+
Completed 200 OK in 6ms (Views: 5.3ms | ActiveRecord: 0.0ms)
|
|
910
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
911
|
+
Processing by PasswordResetsController#create as HTML
|
|
912
|
+
Parameters: {"utf8"=>"✓", "email"=>"W6IXbSAySIt_q40lX0f0Xw@sample.com", "commit"=>"Reset password"}
|
|
913
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'W6IXbSAySIt_q40lX0f0Xw@sample.com' LIMIT 1[0m
|
|
914
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '3zXg0VeMFP8GySaI3QNYHg' LIMIT 1
|
|
915
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
916
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'W6IXbSAySIt_q40lX0f0Xw@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
917
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "3zXg0VeMFP8GySaI3QNYHg"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
|
918
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
919
|
+
|
|
920
|
+
Sent mail to W6IXbSAySIt_q40lX0f0Xw@sample.com (7.4ms)
|
|
921
|
+
Date: Wed, 23 Apr 2014 22:36:37 +0200
|
|
922
|
+
From: from@example.com
|
|
923
|
+
To: W6IXbSAySIt_q40lX0f0Xw@sample.com
|
|
924
|
+
Message-ID: <535824552985f_4c033fd5ad82dbc098862@air.lan.mail>
|
|
925
|
+
Subject: Password Reset
|
|
926
|
+
Mime-Version: 1.0
|
|
927
|
+
Content-Type: text/plain;
|
|
928
|
+
charset=UTF-8
|
|
929
|
+
Content-Transfer-Encoding: 7bit
|
|
930
|
+
|
|
931
|
+
To reset your password, click the URL below.
|
|
932
|
+
|
|
933
|
+
http://localhost:3000/password_resets/3zXg0VeMFP8GySaI3QNYHg/edit
|
|
934
|
+
|
|
935
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
936
|
+
Redirected to http://www.example.com/
|
|
937
|
+
Completed 302 Found in 143ms (ActiveRecord: 1.5ms)
|
|
938
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
939
|
+
Processing by HomeController#index as HTML
|
|
940
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
941
|
+
Started GET "/password_resets/3zXg0VeMFP8GySaI3QNYHg/edit" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
942
|
+
Processing by PasswordResetsController#edit as HTML
|
|
943
|
+
Parameters: {"id"=>"3zXg0VeMFP8GySaI3QNYHg"}
|
|
944
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '3zXg0VeMFP8GySaI3QNYHg' LIMIT 1[0m
|
|
945
|
+
Completed 200 OK in 16ms (Views: 15.6ms | ActiveRecord: 0.2ms)
|
|
946
|
+
Started PATCH "/password_resets/3zXg0VeMFP8GySaI3QNYHg" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
947
|
+
Processing by PasswordResetsController#update as HTML
|
|
948
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"3zXg0VeMFP8GySaI3QNYHg"}
|
|
949
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '3zXg0VeMFP8GySaI3QNYHg' LIMIT 1
|
|
950
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
951
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'W6IXbSAySIt_q40lX0f0Xw@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
952
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
953
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$GdDkSEkos8Xa1ykoCDHM/Os2BD9GImExsD1D4UyzJXtmqOQzwv82e"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
|
954
|
+
[1m[35m (2.6ms)[0m commit transaction
|
|
955
|
+
Redirected to http://localhost:3000/
|
|
956
|
+
Completed 302 Found in 7ms (ActiveRecord: 3.2ms)
|
|
957
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
958
|
+
Processing by HomeController#index as HTML
|
|
959
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
960
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
|
961
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
962
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
963
|
+
--------------------------------------------------------------------------------
|
|
964
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
|
965
|
+
--------------------------------------------------------------------------------
|
|
966
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
967
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
968
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'JNlz9i4-qxi99fG-Ag-_Hg@sample.com' LIMIT 1
|
|
969
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'Y8i6gAti5YPWZspLomUgGg' LIMIT 1[0m
|
|
970
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
971
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "Y8i6gAti5YPWZspLomUgGg"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "JNlz9i4-qxi99fG-Ag-_Hg@sample.com"], ["password_digest", "$2a$04$h9sA6nsbefLMTTdNmNCX3.cCsKHqKn.8x9XLVhlG1/QGUJSTTotye"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
|
972
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
973
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
974
|
+
Processing by SessionsController#new as HTML
|
|
975
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
|
976
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
977
|
+
Processing by PasswordResetsController#new as HTML
|
|
978
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
979
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
980
|
+
Processing by PasswordResetsController#create as HTML
|
|
981
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
|
982
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
|
983
|
+
Completed 200 OK in 2ms (Views: 1.2ms | ActiveRecord: 0.2ms)
|
|
984
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM "users";[0m
|
|
985
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
986
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
987
|
+
-------------------------------------------------------------------------
|
|
988
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
|
989
|
+
-------------------------------------------------------------------------
|
|
990
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
991
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
992
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'doDT5TiAQJsPyWl5nkhOpQ@sample.com' LIMIT 1
|
|
993
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'YAsFiKAABy8TOOX8ErZpSg' LIMIT 1[0m
|
|
994
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
995
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "YAsFiKAABy8TOOX8ErZpSg"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "doDT5TiAQJsPyWl5nkhOpQ@sample.com"], ["password_digest", "$2a$04$ny1wia7PMMPlo3lSwBTLSuuy9hgazJ2P3N/qSdIARvBwrq8eNeWU."], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
|
996
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
997
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
998
|
+
Processing by SessionsController#new as HTML
|
|
999
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
1000
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1001
|
+
Processing by PasswordResetsController#new as HTML
|
|
1002
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
1003
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1004
|
+
Processing by PasswordResetsController#create as HTML
|
|
1005
|
+
Parameters: {"utf8"=>"✓", "email"=>"doDT5TiAQJsPyWl5nkhOpQ@sample.com", "commit"=>"Reset password"}
|
|
1006
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'doDT5TiAQJsPyWl5nkhOpQ@sample.com' LIMIT 1
|
|
1007
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'QqkY3GUKrRWVTD7sP_GfCA' LIMIT 1[0m
|
|
1008
|
+
[1m[35m (0.0ms)[0m begin transaction
|
|
1009
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'doDT5TiAQJsPyWl5nkhOpQ@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
1010
|
+
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "QqkY3GUKrRWVTD7sP_GfCA"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
|
1011
|
+
[1m[36m (0.6ms)[0m [1mcommit transaction[0m
|
|
1012
|
+
|
|
1013
|
+
Sent mail to doDT5TiAQJsPyWl5nkhOpQ@sample.com (4.4ms)
|
|
1014
|
+
Date: Wed, 23 Apr 2014 22:36:37 +0200
|
|
1015
|
+
From: from@example.com
|
|
1016
|
+
To: doDT5TiAQJsPyWl5nkhOpQ@sample.com
|
|
1017
|
+
Message-ID: <5358245548c51_4c033fd5ad82dbc0989bd@air.lan.mail>
|
|
1018
|
+
Subject: Password Reset
|
|
1019
|
+
Mime-Version: 1.0
|
|
1020
|
+
Content-Type: text/plain;
|
|
1021
|
+
charset=UTF-8
|
|
1022
|
+
Content-Transfer-Encoding: 7bit
|
|
1023
|
+
|
|
1024
|
+
To reset your password, click the URL below.
|
|
1025
|
+
|
|
1026
|
+
http://localhost:3000/password_resets/QqkY3GUKrRWVTD7sP_GfCA/edit
|
|
1027
|
+
|
|
1028
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
1029
|
+
Redirected to http://www.example.com/
|
|
1030
|
+
Completed 302 Found in 14ms (ActiveRecord: 1.4ms)
|
|
1031
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1032
|
+
Processing by HomeController#index as HTML
|
|
1033
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
1034
|
+
Started GET "/password_resets/QqkY3GUKrRWVTD7sP_GfCA/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
1035
|
+
Processing by PasswordResetsController#edit as HTML
|
|
1036
|
+
Parameters: {"id"=>"QqkY3GUKrRWVTD7sP_GfCA"}
|
|
1037
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'QqkY3GUKrRWVTD7sP_GfCA' LIMIT 1
|
|
1038
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
1039
|
+
Started PATCH "/password_resets/QqkY3GUKrRWVTD7sP_GfCA" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
1040
|
+
Processing by PasswordResetsController#update as HTML
|
|
1041
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"QqkY3GUKrRWVTD7sP_GfCA"}
|
|
1042
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'QqkY3GUKrRWVTD7sP_GfCA' LIMIT 1[0m
|
|
1043
|
+
Redirected to http://localhost:3000/password_resets/new
|
|
1044
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
|
1045
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
1046
|
+
Processing by PasswordResetsController#new as HTML
|
|
1047
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
1048
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
|
1049
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1050
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1051
|
+
-------------------------------------------------------------------------------------------
|
|
1052
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
|
1053
|
+
-------------------------------------------------------------------------------------------
|
|
1054
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1055
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1056
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'eg1JzIvsYouEj_VVjqWLug@sample.com' LIMIT 1[0m
|
|
1057
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'oWi0w5l02h7uUY0NrmxmRw' LIMIT 1
|
|
1058
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1059
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "oWi0w5l02h7uUY0NrmxmRw"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "eg1JzIvsYouEj_VVjqWLug@sample.com"], ["password_digest", "$2a$04$dhTirVbxopiTV0rDm6MKouxXWXSKlMMsNlnjdozBW0ntzaWdDtehG"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
|
1060
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
1061
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1062
|
+
Processing by SessionsController#new as HTML
|
|
1063
|
+
Completed 200 OK in 3ms (Views: 2.6ms | ActiveRecord: 0.0ms)
|
|
1064
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1065
|
+
Processing by PasswordResetsController#new as HTML
|
|
1066
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
|
1067
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1068
|
+
Processing by PasswordResetsController#create as HTML
|
|
1069
|
+
Parameters: {"utf8"=>"✓", "email"=>"eg1JzIvsYouEj_VVjqWLug@sample.com", "commit"=>"Reset password"}
|
|
1070
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'eg1JzIvsYouEj_VVjqWLug@sample.com' LIMIT 1[0m
|
|
1071
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '2UNFmt_bWvtu4cSmc32Rzw' LIMIT 1
|
|
1072
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
1073
|
+
[1m[35mUser Exists (0.3ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'eg1JzIvsYouEj_VVjqWLug@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
1074
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "2UNFmt_bWvtu4cSmc32Rzw"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
|
1075
|
+
[1m[35m (1.1ms)[0m commit transaction
|
|
1076
|
+
|
|
1077
|
+
Sent mail to eg1JzIvsYouEj_VVjqWLug@sample.com (9.4ms)
|
|
1078
|
+
Date: Wed, 23 Apr 2014 22:36:37 +0200
|
|
1079
|
+
From: from@example.com
|
|
1080
|
+
To: eg1JzIvsYouEj_VVjqWLug@sample.com
|
|
1081
|
+
Message-ID: <5358245560a03_4c033fd5ad82dbc09909@air.lan.mail>
|
|
1082
|
+
Subject: Password Reset
|
|
1083
|
+
Mime-Version: 1.0
|
|
1084
|
+
Content-Type: text/plain;
|
|
1085
|
+
charset=UTF-8
|
|
1086
|
+
Content-Transfer-Encoding: 7bit
|
|
1087
|
+
|
|
1088
|
+
To reset your password, click the URL below.
|
|
1089
|
+
|
|
1090
|
+
http://localhost:3000/password_resets/2UNFmt_bWvtu4cSmc32Rzw/edit
|
|
1091
|
+
|
|
1092
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
1093
|
+
Redirected to http://www.example.com/
|
|
1094
|
+
Completed 302 Found in 29ms (ActiveRecord: 2.5ms)
|
|
1095
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1096
|
+
Processing by HomeController#index as HTML
|
|
1097
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
|
1098
|
+
Started GET "/password_resets/2UNFmt_bWvtu4cSmc32Rzw/edit" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1099
|
+
Processing by PasswordResetsController#edit as HTML
|
|
1100
|
+
Parameters: {"id"=>"2UNFmt_bWvtu4cSmc32Rzw"}
|
|
1101
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '2UNFmt_bWvtu4cSmc32Rzw' LIMIT 1[0m
|
|
1102
|
+
Completed 200 OK in 5ms (Views: 4.0ms | ActiveRecord: 0.2ms)
|
|
1103
|
+
Started PATCH "/password_resets/2UNFmt_bWvtu4cSmc32Rzw" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1104
|
+
Processing by PasswordResetsController#update as HTML
|
|
1105
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"2UNFmt_bWvtu4cSmc32Rzw"}
|
|
1106
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '2UNFmt_bWvtu4cSmc32Rzw' LIMIT 1
|
|
1107
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
1108
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'eg1JzIvsYouEj_VVjqWLug@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
1109
|
+
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
|
1110
|
+
Completed 200 OK in 10ms (Views: 4.0ms | ActiveRecord: 0.5ms)
|
|
1111
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
|
1112
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1113
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1114
|
+
-----------------------------------
|
|
1115
|
+
AuthproIntegrationTest: test_signup
|
|
1116
|
+
-----------------------------------
|
|
1117
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1118
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1119
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'OH3v74OvExb55Ax43JASgA@sample.com' LIMIT 1[0m
|
|
1120
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'ZQJJxM_gxf1TEMe1QlQ1yg' LIMIT 1
|
|
1121
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1122
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "ZQJJxM_gxf1TEMe1QlQ1yg"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "OH3v74OvExb55Ax43JASgA@sample.com"], ["password_digest", "$2a$04$GbhJzU/AV6H8IaLJSY5j.uQY86yefb2bGpJ6iS0bg3bHs0djQ.xWa"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
|
1123
|
+
[1m[35m (0.6ms)[0m commit transaction
|
|
1124
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1125
|
+
Processing by HomeController#index as HTML
|
|
1126
|
+
Completed 200 OK in 3ms (Views: 2.3ms | ActiveRecord: 0.0ms)
|
|
1127
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1128
|
+
Processing by UsersController#new as HTML
|
|
1129
|
+
Completed 200 OK in 8ms (Views: 7.3ms | ActiveRecord: 0.0ms)
|
|
1130
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1131
|
+
Processing by UsersController#create as HTML
|
|
1132
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"G9jUVzLsIl_0OoQhYEc0Tw@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
1133
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1134
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'G9jUVzLsIl_0OoQhYEc0Tw@sample.com' LIMIT 1
|
|
1135
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 't2TvQo-vPr82acPjkt1_fw' LIMIT 1[0m
|
|
1136
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1137
|
+
[1m[35mSQL (0.6ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "t2TvQo-vPr82acPjkt1_fw"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "G9jUVzLsIl_0OoQhYEc0Tw@sample.com"], ["password_digest", "$2a$04$SaOnU3IyspKOlZVCzlv9veK.JHSA/Uy0o.95rOWsv4MyxFAfU5SXy"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
|
1138
|
+
[1m[36m (1.0ms)[0m [1mcommit transaction[0m
|
|
1139
|
+
Redirected to http://www.example.com/
|
|
1140
|
+
Completed 302 Found in 8ms (ActiveRecord: 1.9ms)
|
|
1141
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1142
|
+
Processing by HomeController#index as HTML
|
|
1143
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
|
1144
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
1145
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1146
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1147
|
+
-------------------------------------------
|
|
1148
|
+
AuthproIntegrationTest: test_signup_failing
|
|
1149
|
+
-------------------------------------------
|
|
1150
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1151
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1152
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'KHRYuY60cLcyNzKGpqGCcA@sample.com' LIMIT 1[0m
|
|
1153
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'RLnrCRrNgAYB8XPjn66Kig' LIMIT 1
|
|
1154
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1155
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "RLnrCRrNgAYB8XPjn66Kig"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "KHRYuY60cLcyNzKGpqGCcA@sample.com"], ["password_digest", "$2a$04$GEuTX2Xne0hi3kClSqcEWOz0vXbZxT.UMQkDXLfHH0Yf1fQKpBZzC"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
|
1156
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
1157
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1158
|
+
Processing by HomeController#index as HTML
|
|
1159
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
1160
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1161
|
+
Processing by UsersController#new as HTML
|
|
1162
|
+
Completed 200 OK in 5ms (Views: 4.2ms | ActiveRecord: 0.0ms)
|
|
1163
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1164
|
+
Processing by UsersController#create as HTML
|
|
1165
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"PyZeLJJMPnefPc_dwYb5HQ@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
1166
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
1167
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'PyZeLJJMPnefPc_dwYb5HQ@sample.com' LIMIT 1
|
|
1168
|
+
[1m[36m (0.0ms)[0m [1mrollback transaction[0m
|
|
1169
|
+
Completed 200 OK in 7ms (Views: 2.9ms | ActiveRecord: 0.4ms)
|
|
1170
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
|
1171
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1172
|
+
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1173
|
+
---------------------------------------
|
|
1174
|
+
AuthproIntegrationTest: test_visit_home
|
|
1175
|
+
---------------------------------------
|
|
1176
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1177
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1178
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'kRnqsgkpVx4NnT3jSKfCaA@sample.com' LIMIT 1[0m
|
|
1179
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'YbnZVfX5WBKGx4cDrTOKZQ' LIMIT 1
|
|
1180
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1181
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "YbnZVfX5WBKGx4cDrTOKZQ"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "kRnqsgkpVx4NnT3jSKfCaA@sample.com"], ["password_digest", "$2a$04$Ibm.PEreFaqt9qFExLUDAOE07N.EAyTYAKLe6qTwumC/MhPlhmHBS"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
|
1182
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
1183
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
|
1184
|
+
Processing by HomeController#index as HTML
|
|
1185
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
1186
|
+
[1m[36m (1.1ms)[0m [1mDELETE FROM "users";[0m
|
|
1187
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
1188
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
1189
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
1190
|
+
------------------------------------------
|
|
1191
|
+
AuthproGeneratorTest: test_generated_files
|
|
1192
|
+
------------------------------------------
|
|
1193
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
|
1194
|
+
----------------------------------
|
|
1195
|
+
AuthproIntegrationTest: test_login
|
|
1196
|
+
----------------------------------
|
|
1197
|
+
[1m[36m (0.9ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
|
1198
|
+
[1m[35m (0.8ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
|
1199
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1200
|
+
Migrating to CreateUsers (20140423203645)
|
|
1201
|
+
[1m[35m (0.0ms)[0m begin transaction
|
|
1202
|
+
[1m[36m (0.3ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
|
1203
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20140423203645"]]
|
|
1204
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
1205
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1206
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'OkFmpDdxYRtc2JPJZrPFdg@sample.com' LIMIT 1[0m
|
|
1207
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'K2kAUWSQOQej5S8DCLkmpQ' LIMIT 1
|
|
1208
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1209
|
+
[1m[36mSQL (3.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "K2kAUWSQOQej5S8DCLkmpQ"], ["created_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00], ["email", "OkFmpDdxYRtc2JPJZrPFdg@sample.com"], ["password_digest", "$2a$04$FIEqMa6dRWBEkU.T.tWLoOZrFZTaT5hIqDcnxFUbUwKhJjrYx05yG"], ["updated_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00]]
|
|
1210
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
1211
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1212
|
+
Processing by HomeController#index as HTML
|
|
1213
|
+
Rendered home/index.html.erb within layouts/application (1.0ms)
|
|
1214
|
+
Completed 200 OK in 21ms (Views: 20.1ms | ActiveRecord: 0.0ms)
|
|
1215
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1216
|
+
Processing by SessionsController#new as HTML
|
|
1217
|
+
Rendered sessions/new.html.erb within layouts/application (1.1ms)
|
|
1218
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
|
1219
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1220
|
+
Processing by SessionsController#create as HTML
|
|
1221
|
+
Parameters: {"utf8"=>"✓", "email"=>"OkFmpDdxYRtc2JPJZrPFdg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
1222
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'OkFmpDdxYRtc2JPJZrPFdg@sample.com' LIMIT 1[0m
|
|
1223
|
+
Redirected to http://www.example.com/
|
|
1224
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
|
1225
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1226
|
+
Processing by HomeController#index as HTML
|
|
1227
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
|
1228
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'K2kAUWSQOQej5S8DCLkmpQ' LIMIT 1
|
|
1229
|
+
Completed 200 OK in 2ms (Views: 2.2ms | ActiveRecord: 0.1ms)
|
|
1230
|
+
[1m[36m (2.7ms)[0m [1mDELETE FROM "users";[0m
|
|
1231
|
+
[1m[35m (0.3ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
1232
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
1233
|
+
------------------------------------------
|
|
1234
|
+
AuthproIntegrationTest: test_login_failing
|
|
1235
|
+
------------------------------------------
|
|
1236
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
1237
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1238
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '3j6XkNyow1vLnaR7GYWxnA@sample.com' LIMIT 1
|
|
1239
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'N99w5maCFoEPpDiWdAf7hw' LIMIT 1[0m
|
|
1240
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1241
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "N99w5maCFoEPpDiWdAf7hw"], ["created_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00], ["email", "3j6XkNyow1vLnaR7GYWxnA@sample.com"], ["password_digest", "$2a$04$k0i/Cia/0ivpK0Pr6lc6H.kn3dPZiJknBCXelUKuPhapbf0CQjEqG"], ["updated_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00]]
|
|
1242
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
1243
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1244
|
+
Processing by HomeController#index as HTML
|
|
1245
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
1246
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1247
|
+
Processing by SessionsController#new as HTML
|
|
1248
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
1249
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1250
|
+
Processing by SessionsController#create as HTML
|
|
1251
|
+
Parameters: {"utf8"=>"✓", "email"=>"3j6XkNyow1vLnaR7GYWxnA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
1252
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '3j6XkNyow1vLnaR7GYWxnA@sample.com' LIMIT 1
|
|
1253
|
+
Completed 200 OK in 4ms (Views: 1.7ms | ActiveRecord: 0.2ms)
|
|
1254
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
|
1255
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
1256
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
1257
|
+
-----------------------------------
|
|
1258
|
+
AuthproIntegrationTest: test_logout
|
|
1259
|
+
-----------------------------------
|
|
1260
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
1261
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1262
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'hvWEvqY6gVn5kohNCPwzcw@sample.com' LIMIT 1
|
|
1263
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'rGUrX9J6P_Qms60poPv5_A' LIMIT 1[0m
|
|
1264
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1265
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "rGUrX9J6P_Qms60poPv5_A"], ["created_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00], ["email", "hvWEvqY6gVn5kohNCPwzcw@sample.com"], ["password_digest", "$2a$04$WOSffz7A.YzgeAnOaVxLCuQS4GPAvixWmTW2YsGCe2vw0i.KJM/Lm"], ["updated_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00]]
|
|
1266
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
1267
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1268
|
+
Processing by SessionsController#new as HTML
|
|
1269
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
1270
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1271
|
+
Processing by SessionsController#create as HTML
|
|
1272
|
+
Parameters: {"utf8"=>"✓", "email"=>"hvWEvqY6gVn5kohNCPwzcw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
1273
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'hvWEvqY6gVn5kohNCPwzcw@sample.com' LIMIT 1
|
|
1274
|
+
Redirected to http://www.example.com/
|
|
1275
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
|
1276
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1277
|
+
Processing by HomeController#index as HTML
|
|
1278
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'rGUrX9J6P_Qms60poPv5_A' LIMIT 1[0m
|
|
1279
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.2ms)
|
|
1280
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1281
|
+
Processing by SessionsController#destroy as HTML
|
|
1282
|
+
Redirected to http://www.example.com/
|
|
1283
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
|
1284
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1285
|
+
Processing by HomeController#index as HTML
|
|
1286
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
1287
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
|
1288
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1289
|
+
[1m[35m (0.6ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1290
|
+
-------------------------------------------
|
|
1291
|
+
AuthproIntegrationTest: test_reset_password
|
|
1292
|
+
-------------------------------------------
|
|
1293
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1294
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1295
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'nmLSC43cdAmpEY5nwIYhEw@sample.com' LIMIT 1[0m
|
|
1296
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'rRqbC3K80x2QcgwFmEhS5w' LIMIT 1
|
|
1297
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1298
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "rRqbC3K80x2QcgwFmEhS5w"], ["created_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00], ["email", "nmLSC43cdAmpEY5nwIYhEw@sample.com"], ["password_digest", "$2a$04$PWOX7710ZdHb57PERWTq8OoIDA.rNdAUE9qrQCXyIidE8/byL4TY2"], ["updated_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00]]
|
|
1299
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
1300
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1301
|
+
Processing by SessionsController#new as HTML
|
|
1302
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
1303
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1304
|
+
Processing by PasswordResetsController#new as HTML
|
|
1305
|
+
Completed 200 OK in 3ms (Views: 2.4ms | ActiveRecord: 0.0ms)
|
|
1306
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
|
1307
|
+
Processing by PasswordResetsController#create as HTML
|
|
1308
|
+
Parameters: {"utf8"=>"✓", "email"=>"nmLSC43cdAmpEY5nwIYhEw@sample.com", "commit"=>"Reset password"}
|
|
1309
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'nmLSC43cdAmpEY5nwIYhEw@sample.com' LIMIT 1[0m
|
|
1310
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'a2qgIIhoGgt_-qACG1uvaw' LIMIT 1
|
|
1311
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
1312
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'nmLSC43cdAmpEY5nwIYhEw@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
1313
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "a2qgIIhoGgt_-qACG1uvaw"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00]]
|
|
1314
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
1315
|
+
|
|
1316
|
+
Sent mail to nmLSC43cdAmpEY5nwIYhEw@sample.com (7.4ms)
|
|
1317
|
+
Date: Wed, 23 Apr 2014 22:36:46 +0200
|
|
1318
|
+
From: from@example.com
|
|
1319
|
+
To: nmLSC43cdAmpEY5nwIYhEw@sample.com
|
|
1320
|
+
Message-ID: <5358245e29a3_4c1c3fffa4c2dbb476592@air.lan.mail>
|
|
1321
|
+
Subject: Password Reset
|
|
1322
|
+
Mime-Version: 1.0
|
|
1323
|
+
Content-Type: text/plain;
|
|
1324
|
+
charset=UTF-8
|
|
1325
|
+
Content-Transfer-Encoding: 7bit
|
|
1326
|
+
|
|
1327
|
+
To reset your password, click the URL below.
|
|
1328
|
+
|
|
1329
|
+
http://localhost:3000/password_resets/a2qgIIhoGgt_-qACG1uvaw/edit
|
|
1330
|
+
|
|
1331
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
1332
|
+
Redirected to http://www.example.com/
|
|
1333
|
+
Completed 302 Found in 141ms (ActiveRecord: 1.4ms)
|
|
1334
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1335
|
+
Processing by HomeController#index as HTML
|
|
1336
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
1337
|
+
Started GET "/password_resets/a2qgIIhoGgt_-qACG1uvaw/edit" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1338
|
+
Processing by PasswordResetsController#edit as HTML
|
|
1339
|
+
Parameters: {"id"=>"a2qgIIhoGgt_-qACG1uvaw"}
|
|
1340
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'a2qgIIhoGgt_-qACG1uvaw' LIMIT 1[0m
|
|
1341
|
+
Completed 200 OK in 17ms (Views: 16.0ms | ActiveRecord: 0.2ms)
|
|
1342
|
+
Started PATCH "/password_resets/a2qgIIhoGgt_-qACG1uvaw" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1343
|
+
Processing by PasswordResetsController#update as HTML
|
|
1344
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"a2qgIIhoGgt_-qACG1uvaw"}
|
|
1345
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'a2qgIIhoGgt_-qACG1uvaw' LIMIT 1
|
|
1346
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
1347
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'nmLSC43cdAmpEY5nwIYhEw@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
1348
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1349
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$EAeUEVsYueG9JEyzLlcLs.zjKJ96.8Hf7R.Dkg4aHGA6.YhZu3Svq"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
|
1350
|
+
[1m[35m (2.5ms)[0m commit transaction
|
|
1351
|
+
Redirected to http://localhost:3000/
|
|
1352
|
+
Completed 302 Found in 7ms (ActiveRecord: 3.1ms)
|
|
1353
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1354
|
+
Processing by HomeController#index as HTML
|
|
1355
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
1356
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
1357
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
1358
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
1359
|
+
--------------------------------------------------------------------------------
|
|
1360
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
|
1361
|
+
--------------------------------------------------------------------------------
|
|
1362
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
1363
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1364
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'fWMTeL102LxeiKZZzxuYkw@sample.com' LIMIT 1
|
|
1365
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'eYy4blMEYWo068MGLY_pwg' LIMIT 1[0m
|
|
1366
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1367
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "eYy4blMEYWo068MGLY_pwg"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "fWMTeL102LxeiKZZzxuYkw@sample.com"], ["password_digest", "$2a$04$9CEhoFEFH3ptspM9uojmpecfL2J/3HVita91vtxQPWlhfahvpy3W6"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
|
1368
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
1369
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1370
|
+
Processing by SessionsController#new as HTML
|
|
1371
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
1372
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1373
|
+
Processing by PasswordResetsController#new as HTML
|
|
1374
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
1375
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1376
|
+
Processing by PasswordResetsController#create as HTML
|
|
1377
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
|
1378
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
|
1379
|
+
Completed 200 OK in 2ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
|
1380
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
|
1381
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
1382
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
1383
|
+
-------------------------------------------------------------------------
|
|
1384
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
|
1385
|
+
-------------------------------------------------------------------------
|
|
1386
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
1387
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1388
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'kdVRuEN-EA1x5Zg-vqc2mA@sample.com' LIMIT 1
|
|
1389
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'QUggs54-U3x2pp-hjStLzQ' LIMIT 1[0m
|
|
1390
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1391
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "QUggs54-U3x2pp-hjStLzQ"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "kdVRuEN-EA1x5Zg-vqc2mA@sample.com"], ["password_digest", "$2a$04$ctnRHihwXTas32wE5SPCEecHKPJ.RqJHIala/9zB2tyhOhpw7a94e"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
|
1392
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
1393
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1394
|
+
Processing by SessionsController#new as HTML
|
|
1395
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
1396
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1397
|
+
Processing by PasswordResetsController#new as HTML
|
|
1398
|
+
Completed 200 OK in 1ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
1399
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1400
|
+
Processing by PasswordResetsController#create as HTML
|
|
1401
|
+
Parameters: {"utf8"=>"✓", "email"=>"kdVRuEN-EA1x5Zg-vqc2mA@sample.com", "commit"=>"Reset password"}
|
|
1402
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'kdVRuEN-EA1x5Zg-vqc2mA@sample.com' LIMIT 1
|
|
1403
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'hOAOMcELOUEyJ6gh4uYVLQ' LIMIT 1[0m
|
|
1404
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1405
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'kdVRuEN-EA1x5Zg-vqc2mA@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
1406
|
+
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "hOAOMcELOUEyJ6gh4uYVLQ"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
|
1407
|
+
[1m[36m (0.6ms)[0m [1mcommit transaction[0m
|
|
1408
|
+
|
|
1409
|
+
Sent mail to kdVRuEN-EA1x5Zg-vqc2mA@sample.com (4.6ms)
|
|
1410
|
+
Date: Wed, 23 Apr 2014 22:36:46 +0200
|
|
1411
|
+
From: from@example.com
|
|
1412
|
+
To: kdVRuEN-EA1x5Zg-vqc2mA@sample.com
|
|
1413
|
+
Message-ID: <5358245e22068_4c1c3fffa4c2dbb4766d3@air.lan.mail>
|
|
1414
|
+
Subject: Password Reset
|
|
1415
|
+
Mime-Version: 1.0
|
|
1416
|
+
Content-Type: text/plain;
|
|
1417
|
+
charset=UTF-8
|
|
1418
|
+
Content-Transfer-Encoding: 7bit
|
|
1419
|
+
|
|
1420
|
+
To reset your password, click the URL below.
|
|
1421
|
+
|
|
1422
|
+
http://localhost:3000/password_resets/hOAOMcELOUEyJ6gh4uYVLQ/edit
|
|
1423
|
+
|
|
1424
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
1425
|
+
Redirected to http://www.example.com/
|
|
1426
|
+
Completed 302 Found in 14ms (ActiveRecord: 1.2ms)
|
|
1427
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1428
|
+
Processing by HomeController#index as HTML
|
|
1429
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
1430
|
+
Started GET "/password_resets/hOAOMcELOUEyJ6gh4uYVLQ/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
1431
|
+
Processing by PasswordResetsController#edit as HTML
|
|
1432
|
+
Parameters: {"id"=>"hOAOMcELOUEyJ6gh4uYVLQ"}
|
|
1433
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'hOAOMcELOUEyJ6gh4uYVLQ' LIMIT 1
|
|
1434
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
1435
|
+
Started PATCH "/password_resets/hOAOMcELOUEyJ6gh4uYVLQ" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
1436
|
+
Processing by PasswordResetsController#update as HTML
|
|
1437
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"hOAOMcELOUEyJ6gh4uYVLQ"}
|
|
1438
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'hOAOMcELOUEyJ6gh4uYVLQ' LIMIT 1[0m
|
|
1439
|
+
Redirected to http://localhost:3000/password_resets/new
|
|
1440
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
|
1441
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
1442
|
+
Processing by PasswordResetsController#new as HTML
|
|
1443
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
1444
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
|
1445
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1446
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1447
|
+
-------------------------------------------------------------------------------------------
|
|
1448
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
|
1449
|
+
-------------------------------------------------------------------------------------------
|
|
1450
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1451
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1452
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'q-Dyu6zv21zIda--a_eS7Q@sample.com' LIMIT 1[0m
|
|
1453
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '_8mbQ-ZmG7i9KSIrWpTatw' LIMIT 1
|
|
1454
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1455
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "_8mbQ-ZmG7i9KSIrWpTatw"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "q-Dyu6zv21zIda--a_eS7Q@sample.com"], ["password_digest", "$2a$04$pDz/lnYY49Cr4cBJLuPPsuyMvB0wuQUd49RP2GaK07uPPP8UOUvt6"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
|
1456
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
1457
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1458
|
+
Processing by SessionsController#new as HTML
|
|
1459
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
|
1460
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1461
|
+
Processing by PasswordResetsController#new as HTML
|
|
1462
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
|
1463
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1464
|
+
Processing by PasswordResetsController#create as HTML
|
|
1465
|
+
Parameters: {"utf8"=>"✓", "email"=>"q-Dyu6zv21zIda--a_eS7Q@sample.com", "commit"=>"Reset password"}
|
|
1466
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'q-Dyu6zv21zIda--a_eS7Q@sample.com' LIMIT 1[0m
|
|
1467
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'hT4ZTTTnFvm-k27EoRy-uw' LIMIT 1
|
|
1468
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1469
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'q-Dyu6zv21zIda--a_eS7Q@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
1470
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "hT4ZTTTnFvm-k27EoRy-uw"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
|
1471
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
1472
|
+
|
|
1473
|
+
Sent mail to q-Dyu6zv21zIda--a_eS7Q@sample.com (8.6ms)
|
|
1474
|
+
Date: Wed, 23 Apr 2014 22:36:46 +0200
|
|
1475
|
+
From: from@example.com
|
|
1476
|
+
To: q-Dyu6zv21zIda--a_eS7Q@sample.com
|
|
1477
|
+
Message-ID: <5358245e39472_4c1c3fffa4c2dbb476777@air.lan.mail>
|
|
1478
|
+
Subject: Password Reset
|
|
1479
|
+
Mime-Version: 1.0
|
|
1480
|
+
Content-Type: text/plain;
|
|
1481
|
+
charset=UTF-8
|
|
1482
|
+
Content-Transfer-Encoding: 7bit
|
|
1483
|
+
|
|
1484
|
+
To reset your password, click the URL below.
|
|
1485
|
+
|
|
1486
|
+
http://localhost:3000/password_resets/hT4ZTTTnFvm-k27EoRy-uw/edit
|
|
1487
|
+
|
|
1488
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
1489
|
+
Redirected to http://www.example.com/
|
|
1490
|
+
Completed 302 Found in 24ms (ActiveRecord: 1.8ms)
|
|
1491
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1492
|
+
Processing by HomeController#index as HTML
|
|
1493
|
+
Completed 200 OK in 3ms (Views: 2.6ms | ActiveRecord: 0.0ms)
|
|
1494
|
+
Started GET "/password_resets/hT4ZTTTnFvm-k27EoRy-uw/edit" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1495
|
+
Processing by PasswordResetsController#edit as HTML
|
|
1496
|
+
Parameters: {"id"=>"hT4ZTTTnFvm-k27EoRy-uw"}
|
|
1497
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'hT4ZTTTnFvm-k27EoRy-uw' LIMIT 1[0m
|
|
1498
|
+
Completed 200 OK in 3ms (Views: 2.6ms | ActiveRecord: 0.2ms)
|
|
1499
|
+
Started PATCH "/password_resets/hT4ZTTTnFvm-k27EoRy-uw" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1500
|
+
Processing by PasswordResetsController#update as HTML
|
|
1501
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"hT4ZTTTnFvm-k27EoRy-uw"}
|
|
1502
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'hT4ZTTTnFvm-k27EoRy-uw' LIMIT 1
|
|
1503
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
1504
|
+
[1m[35mUser Exists (0.3ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'q-Dyu6zv21zIda--a_eS7Q@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
1505
|
+
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
|
1506
|
+
Completed 200 OK in 10ms (Views: 3.8ms | ActiveRecord: 0.6ms)
|
|
1507
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
1508
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1509
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1510
|
+
-----------------------------------
|
|
1511
|
+
AuthproIntegrationTest: test_signup
|
|
1512
|
+
-----------------------------------
|
|
1513
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1514
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1515
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '3owOjo-P8m2VafDyEOE8HQ@sample.com' LIMIT 1[0m
|
|
1516
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 's-nLSSW7rKD7tr75vNSbaQ' LIMIT 1
|
|
1517
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1518
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "s-nLSSW7rKD7tr75vNSbaQ"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "3owOjo-P8m2VafDyEOE8HQ@sample.com"], ["password_digest", "$2a$04$IpvuyRzs7K0LBzRl/Fnd3u9LezQA5eAD9cB7ZjXDhyg74M70v/Ew6"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
|
1519
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
1520
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1521
|
+
Processing by HomeController#index as HTML
|
|
1522
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
|
1523
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1524
|
+
Processing by UsersController#new as HTML
|
|
1525
|
+
Completed 200 OK in 5ms (Views: 4.7ms | ActiveRecord: 0.0ms)
|
|
1526
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1527
|
+
Processing by UsersController#create as HTML
|
|
1528
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"J80NPH11CALTuvKlE3kCRg@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
1529
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
1530
|
+
[1m[35mUser Exists (0.4ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'J80NPH11CALTuvKlE3kCRg@sample.com' LIMIT 1
|
|
1531
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'LvHbb1owyGJy_ytsfQFWOg' LIMIT 1[0m
|
|
1532
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1533
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "LvHbb1owyGJy_ytsfQFWOg"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "J80NPH11CALTuvKlE3kCRg@sample.com"], ["password_digest", "$2a$04$L5BQELp5CXX0RLAnDHCcBec3FhIcSGcPMLakHICxDb/Ug2Nfuue0K"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
|
1534
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
1535
|
+
Redirected to http://www.example.com/
|
|
1536
|
+
Completed 302 Found in 8ms (ActiveRecord: 2.1ms)
|
|
1537
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1538
|
+
Processing by HomeController#index as HTML
|
|
1539
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
1540
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
|
1541
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1542
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1543
|
+
-------------------------------------------
|
|
1544
|
+
AuthproIntegrationTest: test_signup_failing
|
|
1545
|
+
-------------------------------------------
|
|
1546
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1547
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1548
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'i5xhJ_WWMH0-ut6OqMvmlQ@sample.com' LIMIT 1[0m
|
|
1549
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '_MyL8HhR0a5JBBxxXmDqDw' LIMIT 1
|
|
1550
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1551
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "_MyL8HhR0a5JBBxxXmDqDw"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "i5xhJ_WWMH0-ut6OqMvmlQ@sample.com"], ["password_digest", "$2a$04$tic6tcr0OftCgBvI9cVlX.Hq.yG2eZs4C4W6xL5WOWvwKVLBeeEz."], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
|
1552
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
1553
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1554
|
+
Processing by HomeController#index as HTML
|
|
1555
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
1556
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1557
|
+
Processing by UsersController#new as HTML
|
|
1558
|
+
Completed 200 OK in 5ms (Views: 4.8ms | ActiveRecord: 0.0ms)
|
|
1559
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1560
|
+
Processing by UsersController#create as HTML
|
|
1561
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"EplLfTKqbHiBgOJdYrHKow@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
1562
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1563
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'EplLfTKqbHiBgOJdYrHKow@sample.com' LIMIT 1
|
|
1564
|
+
[1m[36m (0.0ms)[0m [1mrollback transaction[0m
|
|
1565
|
+
Completed 200 OK in 6ms (Views: 2.6ms | ActiveRecord: 0.3ms)
|
|
1566
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
|
1567
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1568
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1569
|
+
---------------------------------------
|
|
1570
|
+
AuthproIntegrationTest: test_visit_home
|
|
1571
|
+
---------------------------------------
|
|
1572
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1573
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1574
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'Z0Yc-gtFVcn9yHLkZ6axKg@sample.com' LIMIT 1[0m
|
|
1575
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'CSJnPxgDf59IiYxRIUZq4w' LIMIT 1
|
|
1576
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1577
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "CSJnPxgDf59IiYxRIUZq4w"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "Z0Yc-gtFVcn9yHLkZ6axKg@sample.com"], ["password_digest", "$2a$04$pEVBbBvWaj4sOFOj.4IoQ.ZXp1uDEpiJxazsuJpSQnTTbcIXNsvJG"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
|
1578
|
+
[1m[35m (0.6ms)[0m commit transaction
|
|
1579
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
|
1580
|
+
Processing by HomeController#index as HTML
|
|
1581
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
1582
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
|
1583
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
1584
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
1585
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
1586
|
+
------------------------------------------
|
|
1587
|
+
AuthproGeneratorTest: test_generated_files
|
|
1588
|
+
------------------------------------------
|
|
1589
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
|
1590
|
+
----------------------------------
|
|
1591
|
+
AuthproIntegrationTest: test_login
|
|
1592
|
+
----------------------------------
|
|
1593
|
+
[1m[36m (1.3ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
|
1594
|
+
[1m[35m (1.1ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
|
1595
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1596
|
+
Migrating to CreateUsers (20140423203816)
|
|
1597
|
+
[1m[35m (0.0ms)[0m begin transaction
|
|
1598
|
+
[1m[36m (0.3ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
|
1599
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20140423203816"]]
|
|
1600
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
1601
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1602
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'Taj-ReE3ilaNvZSJYbi0qw@sample.com' LIMIT 1[0m
|
|
1603
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '-qgW6FPGA4j2dAb6LY911A' LIMIT 1
|
|
1604
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1605
|
+
[1m[36mSQL (3.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "-qgW6FPGA4j2dAb6LY911A"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "Taj-ReE3ilaNvZSJYbi0qw@sample.com"], ["password_digest", "$2a$04$GrKqsdFHD5TrXGn.niZEf.eCypzd0qv6rpvfolOD8fdB63/WYxUPG"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1606
|
+
[1m[35m (15.4ms)[0m commit transaction
|
|
1607
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1608
|
+
Processing by HomeController#index as HTML
|
|
1609
|
+
Rendered home/index.html.erb within layouts/application (1.0ms)
|
|
1610
|
+
Completed 200 OK in 20ms (Views: 20.0ms | ActiveRecord: 0.0ms)
|
|
1611
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1612
|
+
Processing by SessionsController#new as HTML
|
|
1613
|
+
Rendered sessions/new.html.erb within layouts/application (1.2ms)
|
|
1614
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
|
1615
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1616
|
+
Processing by SessionsController#create as HTML
|
|
1617
|
+
Parameters: {"utf8"=>"✓", "email"=>"Taj-ReE3ilaNvZSJYbi0qw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
1618
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'Taj-ReE3ilaNvZSJYbi0qw@sample.com' LIMIT 1[0m
|
|
1619
|
+
Redirected to http://www.example.com/
|
|
1620
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
|
1621
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1622
|
+
Processing by HomeController#index as HTML
|
|
1623
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
|
1624
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = '-qgW6FPGA4j2dAb6LY911A' LIMIT 1
|
|
1625
|
+
Completed 200 OK in 3ms (Views: 2.3ms | ActiveRecord: 0.1ms)
|
|
1626
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
|
1627
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
1628
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
1629
|
+
------------------------------------------
|
|
1630
|
+
AuthproIntegrationTest: test_login_failing
|
|
1631
|
+
------------------------------------------
|
|
1632
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
1633
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1634
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'lKh502Xy9XPIGPG3SHtbTw@sample.com' LIMIT 1
|
|
1635
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'WihjtCBN5mUqA0pRzcFuWw' LIMIT 1[0m
|
|
1636
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1637
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "WihjtCBN5mUqA0pRzcFuWw"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "lKh502Xy9XPIGPG3SHtbTw@sample.com"], ["password_digest", "$2a$04$dY1P0zVG8UVhoJ/PQvcMVOhJo9sv3Fos1W4urSTq5z4NMSrXFPHp."], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1638
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
1639
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1640
|
+
Processing by HomeController#index as HTML
|
|
1641
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
1642
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1643
|
+
Processing by SessionsController#new as HTML
|
|
1644
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
1645
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1646
|
+
Processing by SessionsController#create as HTML
|
|
1647
|
+
Parameters: {"utf8"=>"✓", "email"=>"lKh502Xy9XPIGPG3SHtbTw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
1648
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'lKh502Xy9XPIGPG3SHtbTw@sample.com' LIMIT 1
|
|
1649
|
+
Completed 200 OK in 4ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
|
1650
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM "users";[0m
|
|
1651
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
1652
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
1653
|
+
-----------------------------------
|
|
1654
|
+
AuthproIntegrationTest: test_logout
|
|
1655
|
+
-----------------------------------
|
|
1656
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
1657
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1658
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'RYPDEYZyoFlDDXy2vMFlLg@sample.com' LIMIT 1
|
|
1659
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '0eakWOnEzli0RjkxdEWtNg' LIMIT 1[0m
|
|
1660
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1661
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "0eakWOnEzli0RjkxdEWtNg"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "RYPDEYZyoFlDDXy2vMFlLg@sample.com"], ["password_digest", "$2a$04$sEMrZZx.6a.YWCp2WTPFR.mVAfaK6hRq58i8Lv.sho8v4dj6M2EuS"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1662
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
1663
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1664
|
+
Processing by SessionsController#new as HTML
|
|
1665
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
1666
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1667
|
+
Processing by SessionsController#create as HTML
|
|
1668
|
+
Parameters: {"utf8"=>"✓", "email"=>"RYPDEYZyoFlDDXy2vMFlLg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
1669
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'RYPDEYZyoFlDDXy2vMFlLg@sample.com' LIMIT 1
|
|
1670
|
+
Redirected to http://www.example.com/
|
|
1671
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
|
1672
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1673
|
+
Processing by HomeController#index as HTML
|
|
1674
|
+
[1m[36mUser Load (0.1ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = '0eakWOnEzli0RjkxdEWtNg' LIMIT 1[0m
|
|
1675
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.1ms)
|
|
1676
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1677
|
+
Processing by SessionsController#destroy as HTML
|
|
1678
|
+
Redirected to http://www.example.com/
|
|
1679
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
|
1680
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1681
|
+
Processing by HomeController#index as HTML
|
|
1682
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
1683
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
1684
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1685
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1686
|
+
-------------------------------------------
|
|
1687
|
+
AuthproIntegrationTest: test_reset_password
|
|
1688
|
+
-------------------------------------------
|
|
1689
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1690
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1691
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'TO5_Zc8ReqFz6PTVSfXRuA@sample.com' LIMIT 1[0m
|
|
1692
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'WTg44JWeG2uHc7fCKp6B1Q' LIMIT 1
|
|
1693
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1694
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "WTg44JWeG2uHc7fCKp6B1Q"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "TO5_Zc8ReqFz6PTVSfXRuA@sample.com"], ["password_digest", "$2a$04$pTwQeczOcCE8uAGd8b/lDOSO64QSGTAxlu5kSMofuosabS10JDCwO"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1695
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
1696
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1697
|
+
Processing by SessionsController#new as HTML
|
|
1698
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
|
1699
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1700
|
+
Processing by PasswordResetsController#new as HTML
|
|
1701
|
+
Completed 200 OK in 3ms (Views: 3.1ms | ActiveRecord: 0.0ms)
|
|
1702
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1703
|
+
Processing by PasswordResetsController#create as HTML
|
|
1704
|
+
Parameters: {"utf8"=>"✓", "email"=>"TO5_Zc8ReqFz6PTVSfXRuA@sample.com", "commit"=>"Reset password"}
|
|
1705
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'TO5_Zc8ReqFz6PTVSfXRuA@sample.com' LIMIT 1[0m
|
|
1706
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'VzjG_8GMhWC_qzvhzd-UMA' LIMIT 1
|
|
1707
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
1708
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'TO5_Zc8ReqFz6PTVSfXRuA@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
1709
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "VzjG_8GMhWC_qzvhzd-UMA"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1710
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
1711
|
+
|
|
1712
|
+
Sent mail to TO5_Zc8ReqFz6PTVSfXRuA@sample.com (9.2ms)
|
|
1713
|
+
Date: Wed, 23 Apr 2014 22:38:16 +0200
|
|
1714
|
+
From: from@example.com
|
|
1715
|
+
To: TO5_Zc8ReqFz6PTVSfXRuA@sample.com
|
|
1716
|
+
Message-ID: <535824b8881e0_4c943fd08d42dbd089a7@air.lan.mail>
|
|
1717
|
+
Subject: Password Reset
|
|
1718
|
+
Mime-Version: 1.0
|
|
1719
|
+
Content-Type: text/plain;
|
|
1720
|
+
charset=UTF-8
|
|
1721
|
+
Content-Transfer-Encoding: 7bit
|
|
1722
|
+
|
|
1723
|
+
To reset your password, click the URL below.
|
|
1724
|
+
|
|
1725
|
+
http://localhost:3000/password_resets/VzjG_8GMhWC_qzvhzd-UMA/edit
|
|
1726
|
+
|
|
1727
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
1728
|
+
Redirected to http://www.example.com/
|
|
1729
|
+
Completed 302 Found in 144ms (ActiveRecord: 1.8ms)
|
|
1730
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1731
|
+
Processing by HomeController#index as HTML
|
|
1732
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
1733
|
+
Started GET "/password_resets/VzjG_8GMhWC_qzvhzd-UMA/edit" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1734
|
+
Processing by PasswordResetsController#edit as HTML
|
|
1735
|
+
Parameters: {"id"=>"VzjG_8GMhWC_qzvhzd-UMA"}
|
|
1736
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'VzjG_8GMhWC_qzvhzd-UMA' LIMIT 1[0m
|
|
1737
|
+
Completed 200 OK in 17ms (Views: 16.4ms | ActiveRecord: 0.2ms)
|
|
1738
|
+
Started PATCH "/password_resets/VzjG_8GMhWC_qzvhzd-UMA" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1739
|
+
Processing by PasswordResetsController#update as HTML
|
|
1740
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"VzjG_8GMhWC_qzvhzd-UMA"}
|
|
1741
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'VzjG_8GMhWC_qzvhzd-UMA' LIMIT 1
|
|
1742
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
1743
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'TO5_Zc8ReqFz6PTVSfXRuA@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
1744
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1745
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$yF/v3uIp8c6haXjGoS0Ty.X4V6RfoVVu79ytVyZB2WMxhZfdja9hu"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1746
|
+
[1m[35m (1.9ms)[0m commit transaction
|
|
1747
|
+
Redirected to http://localhost:3000/
|
|
1748
|
+
Completed 302 Found in 7ms (ActiveRecord: 2.5ms)
|
|
1749
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1750
|
+
Processing by HomeController#index as HTML
|
|
1751
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
1752
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
1753
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
1754
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
1755
|
+
--------------------------------------------------------------------------------
|
|
1756
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
|
1757
|
+
--------------------------------------------------------------------------------
|
|
1758
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
1759
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1760
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '7-QG87DmnuaXcP2bfOugiA@sample.com' LIMIT 1
|
|
1761
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'XXBmff89CPTViNwuRiiQ9w' LIMIT 1[0m
|
|
1762
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1763
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "XXBmff89CPTViNwuRiiQ9w"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "7-QG87DmnuaXcP2bfOugiA@sample.com"], ["password_digest", "$2a$04$2IH3V6L4KWzrvRjUVee8FuMvqD/O7p6b27FADOnUcWEdwq7Zqgc.O"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1764
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
1765
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1766
|
+
Processing by SessionsController#new as HTML
|
|
1767
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
1768
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1769
|
+
Processing by PasswordResetsController#new as HTML
|
|
1770
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
1771
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1772
|
+
Processing by PasswordResetsController#create as HTML
|
|
1773
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
|
1774
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
|
1775
|
+
Completed 200 OK in 2ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
|
1776
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
1777
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
1778
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
1779
|
+
-------------------------------------------------------------------------
|
|
1780
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
|
1781
|
+
-------------------------------------------------------------------------
|
|
1782
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
1783
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1784
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'uTGOTYCqImFSnxCLvqPOIA@sample.com' LIMIT 1
|
|
1785
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'FRfZU3b8UdKsKIZ-qY1iXw' LIMIT 1[0m
|
|
1786
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1787
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "FRfZU3b8UdKsKIZ-qY1iXw"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "uTGOTYCqImFSnxCLvqPOIA@sample.com"], ["password_digest", "$2a$04$2IlpJmpOkHwrZbeaHp7r8uZ57Npvm6C0AkHznrruXtzTgm1m7k8.e"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1788
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
1789
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1790
|
+
Processing by SessionsController#new as HTML
|
|
1791
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
1792
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1793
|
+
Processing by PasswordResetsController#new as HTML
|
|
1794
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
1795
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1796
|
+
Processing by PasswordResetsController#create as HTML
|
|
1797
|
+
Parameters: {"utf8"=>"✓", "email"=>"uTGOTYCqImFSnxCLvqPOIA@sample.com", "commit"=>"Reset password"}
|
|
1798
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'uTGOTYCqImFSnxCLvqPOIA@sample.com' LIMIT 1
|
|
1799
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 's2SPczTWdqOPU8-JL5o71A' LIMIT 1[0m
|
|
1800
|
+
[1m[35m (0.0ms)[0m begin transaction
|
|
1801
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'uTGOTYCqImFSnxCLvqPOIA@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
1802
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "s2SPczTWdqOPU8-JL5o71A"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1803
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
1804
|
+
|
|
1805
|
+
Sent mail to uTGOTYCqImFSnxCLvqPOIA@sample.com (4.8ms)
|
|
1806
|
+
Date: Wed, 23 Apr 2014 22:38:16 +0200
|
|
1807
|
+
From: from@example.com
|
|
1808
|
+
To: uTGOTYCqImFSnxCLvqPOIA@sample.com
|
|
1809
|
+
Message-ID: <535824b8a69da_4c943fd08d42dbd09014@air.lan.mail>
|
|
1810
|
+
Subject: Password Reset
|
|
1811
|
+
Mime-Version: 1.0
|
|
1812
|
+
Content-Type: text/plain;
|
|
1813
|
+
charset=UTF-8
|
|
1814
|
+
Content-Transfer-Encoding: 7bit
|
|
1815
|
+
|
|
1816
|
+
To reset your password, click the URL below.
|
|
1817
|
+
|
|
1818
|
+
http://localhost:3000/password_resets/s2SPczTWdqOPU8-JL5o71A/edit
|
|
1819
|
+
|
|
1820
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
1821
|
+
Redirected to http://www.example.com/
|
|
1822
|
+
Completed 302 Found in 15ms (ActiveRecord: 1.4ms)
|
|
1823
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1824
|
+
Processing by HomeController#index as HTML
|
|
1825
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
1826
|
+
Started GET "/password_resets/s2SPczTWdqOPU8-JL5o71A/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
1827
|
+
Processing by PasswordResetsController#edit as HTML
|
|
1828
|
+
Parameters: {"id"=>"s2SPczTWdqOPU8-JL5o71A"}
|
|
1829
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 's2SPczTWdqOPU8-JL5o71A' LIMIT 1
|
|
1830
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
1831
|
+
Started PATCH "/password_resets/s2SPczTWdqOPU8-JL5o71A" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
1832
|
+
Processing by PasswordResetsController#update as HTML
|
|
1833
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"s2SPczTWdqOPU8-JL5o71A"}
|
|
1834
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 's2SPczTWdqOPU8-JL5o71A' LIMIT 1[0m
|
|
1835
|
+
Redirected to http://localhost:3000/password_resets/new
|
|
1836
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
|
1837
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
1838
|
+
Processing by PasswordResetsController#new as HTML
|
|
1839
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
1840
|
+
[1m[35m (2.4ms)[0m DELETE FROM "users";
|
|
1841
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1842
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1843
|
+
-------------------------------------------------------------------------------------------
|
|
1844
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
|
1845
|
+
-------------------------------------------------------------------------------------------
|
|
1846
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1847
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1848
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'aoUORfpunCewwjeoChX3Mw@sample.com' LIMIT 1[0m
|
|
1849
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'GkLxV1K-8K6JptZvuTa1rw' LIMIT 1
|
|
1850
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1851
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "GkLxV1K-8K6JptZvuTa1rw"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "aoUORfpunCewwjeoChX3Mw@sample.com"], ["password_digest", "$2a$04$FiihJ7XZSoe2aqsCLRqvAeTDZLFj/pyS0m7i7ktje5XqZ.OVFd736"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1852
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
1853
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1854
|
+
Processing by SessionsController#new as HTML
|
|
1855
|
+
Completed 200 OK in 4ms (Views: 3.2ms | ActiveRecord: 0.0ms)
|
|
1856
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1857
|
+
Processing by PasswordResetsController#new as HTML
|
|
1858
|
+
Completed 200 OK in 3ms (Views: 3.0ms | ActiveRecord: 0.0ms)
|
|
1859
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1860
|
+
Processing by PasswordResetsController#create as HTML
|
|
1861
|
+
Parameters: {"utf8"=>"✓", "email"=>"aoUORfpunCewwjeoChX3Mw@sample.com", "commit"=>"Reset password"}
|
|
1862
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'aoUORfpunCewwjeoChX3Mw@sample.com' LIMIT 1[0m
|
|
1863
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'XpB-KEaz41ZMD_UzXT5Xqg' LIMIT 1
|
|
1864
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1865
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'aoUORfpunCewwjeoChX3Mw@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
1866
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "XpB-KEaz41ZMD_UzXT5Xqg"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1867
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
1868
|
+
|
|
1869
|
+
Sent mail to aoUORfpunCewwjeoChX3Mw@sample.com (9.3ms)
|
|
1870
|
+
Date: Wed, 23 Apr 2014 22:38:16 +0200
|
|
1871
|
+
From: from@example.com
|
|
1872
|
+
To: aoUORfpunCewwjeoChX3Mw@sample.com
|
|
1873
|
+
Message-ID: <535824b8bf125_4c943fd08d42dbd09185@air.lan.mail>
|
|
1874
|
+
Subject: Password Reset
|
|
1875
|
+
Mime-Version: 1.0
|
|
1876
|
+
Content-Type: text/plain;
|
|
1877
|
+
charset=UTF-8
|
|
1878
|
+
Content-Transfer-Encoding: 7bit
|
|
1879
|
+
|
|
1880
|
+
To reset your password, click the URL below.
|
|
1881
|
+
|
|
1882
|
+
http://localhost:3000/password_resets/XpB-KEaz41ZMD_UzXT5Xqg/edit
|
|
1883
|
+
|
|
1884
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
1885
|
+
Redirected to http://www.example.com/
|
|
1886
|
+
Completed 302 Found in 27ms (ActiveRecord: 1.8ms)
|
|
1887
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1888
|
+
Processing by HomeController#index as HTML
|
|
1889
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
|
1890
|
+
Started GET "/password_resets/XpB-KEaz41ZMD_UzXT5Xqg/edit" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1891
|
+
Processing by PasswordResetsController#edit as HTML
|
|
1892
|
+
Parameters: {"id"=>"XpB-KEaz41ZMD_UzXT5Xqg"}
|
|
1893
|
+
[1m[36mUser Load (0.3ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'XpB-KEaz41ZMD_UzXT5Xqg' LIMIT 1[0m
|
|
1894
|
+
Completed 200 OK in 5ms (Views: 3.7ms | ActiveRecord: 0.3ms)
|
|
1895
|
+
Started PATCH "/password_resets/XpB-KEaz41ZMD_UzXT5Xqg" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1896
|
+
Processing by PasswordResetsController#update as HTML
|
|
1897
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"XpB-KEaz41ZMD_UzXT5Xqg"}
|
|
1898
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'XpB-KEaz41ZMD_UzXT5Xqg' LIMIT 1
|
|
1899
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1900
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'aoUORfpunCewwjeoChX3Mw@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
1901
|
+
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
|
1902
|
+
Completed 200 OK in 9ms (Views: 3.7ms | ActiveRecord: 0.5ms)
|
|
1903
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
1904
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1905
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1906
|
+
-----------------------------------
|
|
1907
|
+
AuthproIntegrationTest: test_signup
|
|
1908
|
+
-----------------------------------
|
|
1909
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1910
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1911
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'RRjEJ8ChTXRwVmp2kp55LA@sample.com' LIMIT 1[0m
|
|
1912
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'cwzur2Q5PAZl8Ucv6IIpXA' LIMIT 1
|
|
1913
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1914
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "cwzur2Q5PAZl8Ucv6IIpXA"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "RRjEJ8ChTXRwVmp2kp55LA@sample.com"], ["password_digest", "$2a$04$pN0i.w.pExIJ7vbezxGNGOyieMlY2XG7jY383CQejtVMkrH2nVY7y"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1915
|
+
[1m[35m (1.3ms)[0m commit transaction
|
|
1916
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1917
|
+
Processing by HomeController#index as HTML
|
|
1918
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
1919
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1920
|
+
Processing by UsersController#new as HTML
|
|
1921
|
+
Completed 200 OK in 7ms (Views: 7.1ms | ActiveRecord: 0.0ms)
|
|
1922
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1923
|
+
Processing by UsersController#create as HTML
|
|
1924
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"0J2R9YWN6xKZf0e_zvebYA@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
1925
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1926
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '0J2R9YWN6xKZf0e_zvebYA@sample.com' LIMIT 1
|
|
1927
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'LtqAIy-Dg39R0TCnvm6dBQ' LIMIT 1[0m
|
|
1928
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1929
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "LtqAIy-Dg39R0TCnvm6dBQ"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "0J2R9YWN6xKZf0e_zvebYA@sample.com"], ["password_digest", "$2a$04$ldIVmpUTsO.6SCSHnmGO8uMpLcHUfZqVoD7DQlaz0b9KFMJt3V.8u"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1930
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
1931
|
+
Redirected to http://www.example.com/
|
|
1932
|
+
Completed 302 Found in 7ms (ActiveRecord: 1.6ms)
|
|
1933
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1934
|
+
Processing by HomeController#index as HTML
|
|
1935
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
|
1936
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
1937
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1938
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1939
|
+
-------------------------------------------
|
|
1940
|
+
AuthproIntegrationTest: test_signup_failing
|
|
1941
|
+
-------------------------------------------
|
|
1942
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1943
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1944
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'AwaDb8F6qYg8Zcp2tFzEaA@sample.com' LIMIT 1[0m
|
|
1945
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'jxb0TfJ9YP8RRN2MEjkcDQ' LIMIT 1
|
|
1946
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1947
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "jxb0TfJ9YP8RRN2MEjkcDQ"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "AwaDb8F6qYg8Zcp2tFzEaA@sample.com"], ["password_digest", "$2a$04$/bBQS.GuXyNnOoiS4HEbi.SZquEbuQRNfg/0havG8rEhwGWm7y31K"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1948
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
1949
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1950
|
+
Processing by HomeController#index as HTML
|
|
1951
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
1952
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1953
|
+
Processing by UsersController#new as HTML
|
|
1954
|
+
Completed 200 OK in 4ms (Views: 4.1ms | ActiveRecord: 0.0ms)
|
|
1955
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1956
|
+
Processing by UsersController#create as HTML
|
|
1957
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"C74ENPHf_7q6fCS4sxvuoA@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
1958
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1959
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'C74ENPHf_7q6fCS4sxvuoA@sample.com' LIMIT 1
|
|
1960
|
+
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
|
1961
|
+
Completed 200 OK in 6ms (Views: 2.6ms | ActiveRecord: 0.3ms)
|
|
1962
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
1963
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
1964
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
1965
|
+
---------------------------------------
|
|
1966
|
+
AuthproIntegrationTest: test_visit_home
|
|
1967
|
+
---------------------------------------
|
|
1968
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
1969
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
1970
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'i0k_g0xrJQJEu6w72O0Yew@sample.com' LIMIT 1[0m
|
|
1971
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'i5GlGbAlOyxyExV10qD5-w' LIMIT 1
|
|
1972
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
1973
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "i5GlGbAlOyxyExV10qD5-w"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "i0k_g0xrJQJEu6w72O0Yew@sample.com"], ["password_digest", "$2a$04$OdQVK9cfavtap5HADOY/x.sWR7XmzjPIH4FxaFJuKoR0I6hF6BK/q"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
|
1974
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
1975
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
|
1976
|
+
Processing by HomeController#index as HTML
|
|
1977
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
1978
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
|
1979
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
1980
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
1981
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1982
|
+
------------------------------------------
|
|
1983
|
+
AuthproGeneratorTest: test_generated_files
|
|
1984
|
+
------------------------------------------
|
|
1985
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
|
1986
|
+
----------------------------------
|
|
1987
|
+
AuthproIntegrationTest: test_login
|
|
1988
|
+
----------------------------------
|
|
1989
|
+
[1m[36m (0.9ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
|
1990
|
+
[1m[35m (0.1ms)[0m select sqlite_version(*)
|
|
1991
|
+
[1m[36m (0.8ms)[0m [1mCREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")[0m
|
|
1992
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
1993
|
+
Migrating to CreateUsers (20140423203816)
|
|
1994
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
1995
|
+
[1m[35m (0.4ms)[0m CREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime)
|
|
1996
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "schema_migrations" ("version") VALUES (?)[0m [["version", "20140423203816"]]
|
|
1997
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
1998
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
1999
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'eStKnzXxw_duNzumRjYr6Q@sample.com' LIMIT 1
|
|
2000
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'A8Wggfirj0cVofu2wrpybQ' LIMIT 1[0m
|
|
2001
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2002
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "A8Wggfirj0cVofu2wrpybQ"], ["created_at", "2014-04-23 20:48:08.931821"], ["email", "eStKnzXxw_duNzumRjYr6Q@sample.com"], ["password_digest", "$2a$04$SnWvZwe9bNy0xdhMxGE/luQ/uxozumS9vS./JnRkm2P8zCmjhddja"], ["updated_at", "2014-04-23 20:48:08.931821"]]
|
|
2003
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
2004
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:08 +0200
|
|
2005
|
+
Processing by HomeController#index as HTML
|
|
2006
|
+
Rendered home/index.html.erb within layouts/application (1.5ms)
|
|
2007
|
+
Completed 200 OK in 30ms (Views: 29.6ms | ActiveRecord: 0.0ms)
|
|
2008
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2009
|
+
Processing by SessionsController#new as HTML
|
|
2010
|
+
Rendered sessions/new.html.erb within layouts/application (1.2ms)
|
|
2011
|
+
Completed 200 OK in 3ms (Views: 3.3ms | ActiveRecord: 0.0ms)
|
|
2012
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2013
|
+
Processing by SessionsController#create as HTML
|
|
2014
|
+
Parameters: {"utf8"=>"✓", "email"=>"eStKnzXxw_duNzumRjYr6Q@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
2015
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'eStKnzXxw_duNzumRjYr6Q@sample.com' LIMIT 1
|
|
2016
|
+
Redirected to http://www.example.com/
|
|
2017
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
|
2018
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2019
|
+
Processing by HomeController#index as HTML
|
|
2020
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
|
2021
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'A8Wggfirj0cVofu2wrpybQ' LIMIT 1[0m
|
|
2022
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.2ms)
|
|
2023
|
+
[1m[35m (1.1ms)[0m DELETE FROM "users";
|
|
2024
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2025
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2026
|
+
------------------------------------------
|
|
2027
|
+
AuthproIntegrationTest: test_login_failing
|
|
2028
|
+
------------------------------------------
|
|
2029
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
2030
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2031
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'lPbyy5yI0N7ifeE-N9fnxA@sample.com' LIMIT 1[0m
|
|
2032
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'ukTvEvfG6k6WXCOnwK5bsA' LIMIT 1
|
|
2033
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2034
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "ukTvEvfG6k6WXCOnwK5bsA"], ["created_at", "2014-04-23 20:48:09.073122"], ["email", "lPbyy5yI0N7ifeE-N9fnxA@sample.com"], ["password_digest", "$2a$04$UpoeQOMBsAxIBJstBXBBKukuOGG1zvKlKNzPV/VN9qbUkY.AGvleK"], ["updated_at", "2014-04-23 20:48:09.073122"]]
|
|
2035
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
2036
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2037
|
+
Processing by HomeController#index as HTML
|
|
2038
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
2039
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2040
|
+
Processing by SessionsController#new as HTML
|
|
2041
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
2042
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2043
|
+
Processing by SessionsController#create as HTML
|
|
2044
|
+
Parameters: {"utf8"=>"✓", "email"=>"lPbyy5yI0N7ifeE-N9fnxA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
2045
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'lPbyy5yI0N7ifeE-N9fnxA@sample.com' LIMIT 1[0m
|
|
2046
|
+
Completed 200 OK in 4ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
|
2047
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
|
2048
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2049
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2050
|
+
-----------------------------------
|
|
2051
|
+
AuthproIntegrationTest: test_logout
|
|
2052
|
+
-----------------------------------
|
|
2053
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
2054
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2055
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'MjxKHuRtgeEo-JPKDffHEQ@sample.com' LIMIT 1[0m
|
|
2056
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'eOfnZ1veLxayGJ8FGPdblg' LIMIT 1
|
|
2057
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2058
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "eOfnZ1veLxayGJ8FGPdblg"], ["created_at", "2014-04-23 20:48:09.115442"], ["email", "MjxKHuRtgeEo-JPKDffHEQ@sample.com"], ["password_digest", "$2a$04$lHgPqd8jMnxHSMExvfu6Be9gJQwsxv7l8tv7HjkIM5n23VkNKoKey"], ["updated_at", "2014-04-23 20:48:09.115442"]]
|
|
2059
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
2060
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2061
|
+
Processing by SessionsController#new as HTML
|
|
2062
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
2063
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2064
|
+
Processing by SessionsController#create as HTML
|
|
2065
|
+
Parameters: {"utf8"=>"✓", "email"=>"MjxKHuRtgeEo-JPKDffHEQ@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
2066
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'MjxKHuRtgeEo-JPKDffHEQ@sample.com' LIMIT 1[0m
|
|
2067
|
+
Redirected to http://www.example.com/
|
|
2068
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
|
2069
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2070
|
+
Processing by HomeController#index as HTML
|
|
2071
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'eOfnZ1veLxayGJ8FGPdblg' LIMIT 1
|
|
2072
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.2ms)
|
|
2073
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2074
|
+
Processing by SessionsController#destroy as HTML
|
|
2075
|
+
Redirected to http://www.example.com/
|
|
2076
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
|
2077
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2078
|
+
Processing by HomeController#index as HTML
|
|
2079
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
2080
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
|
2081
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
2082
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
2083
|
+
-------------------------------------------
|
|
2084
|
+
AuthproIntegrationTest: test_reset_password
|
|
2085
|
+
-------------------------------------------
|
|
2086
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
2087
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2088
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'm10bqNz0T4xiHNdMCHKw6g@sample.com' LIMIT 1
|
|
2089
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'npywcY728OhgBG8T_JHJrg' LIMIT 1[0m
|
|
2090
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2091
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "npywcY728OhgBG8T_JHJrg"], ["created_at", "2014-04-23 20:48:09.166534"], ["email", "m10bqNz0T4xiHNdMCHKw6g@sample.com"], ["password_digest", "$2a$04$rOZwyeD.Fj/qYL34Gwes3uCeP4dtaQhx.Cd72ZuNu7izA2kCDgeb2"], ["updated_at", "2014-04-23 20:48:09.166534"]]
|
|
2092
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
2093
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2094
|
+
Processing by SessionsController#new as HTML
|
|
2095
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
2096
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2097
|
+
Processing by PasswordResetsController#new as HTML
|
|
2098
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
|
2099
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2100
|
+
Processing by PasswordResetsController#create as HTML
|
|
2101
|
+
Parameters: {"utf8"=>"✓", "email"=>"m10bqNz0T4xiHNdMCHKw6g@sample.com", "commit"=>"Reset password"}
|
|
2102
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'm10bqNz0T4xiHNdMCHKw6g@sample.com' LIMIT 1
|
|
2103
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '1-KxJduxHbQedINjjJShcw' LIMIT 1[0m
|
|
2104
|
+
[1m[35m (0.0ms)[0m begin transaction
|
|
2105
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'm10bqNz0T4xiHNdMCHKw6g@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
2106
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_sent_at", "2014-04-23 20:48:09.192341"], ["password_reset_token", "1-KxJduxHbQedINjjJShcw"], ["updated_at", "2014-04-23 20:48:09.193704"]]
|
|
2107
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
2108
|
+
|
|
2109
|
+
UserMailer#password_reset: processed outbound mail in 9.8ms
|
|
2110
|
+
|
|
2111
|
+
Sent mail to m10bqNz0T4xiHNdMCHKw6g@sample.com (10.2ms)
|
|
2112
|
+
Date: Wed, 23 Apr 2014 22:48:09 +0200
|
|
2113
|
+
From: from@example.com
|
|
2114
|
+
To: m10bqNz0T4xiHNdMCHKw6g@sample.com
|
|
2115
|
+
Message-ID: <5358270934158_4ddf3ff94442dbb47402a@air.lan.mail>
|
|
2116
|
+
Subject: Password Reset
|
|
2117
|
+
Mime-Version: 1.0
|
|
2118
|
+
Content-Type: text/plain;
|
|
2119
|
+
charset=UTF-8
|
|
2120
|
+
Content-Transfer-Encoding: 7bit
|
|
2121
|
+
|
|
2122
|
+
To reset your password, click the URL below.
|
|
2123
|
+
|
|
2124
|
+
http://localhost:3000/password_resets/1-KxJduxHbQedINjjJShcw/edit
|
|
2125
|
+
|
|
2126
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
2127
|
+
Redirected to http://www.example.com/
|
|
2128
|
+
Completed 302 Found in 32ms (ActiveRecord: 1.4ms)
|
|
2129
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2130
|
+
Processing by HomeController#index as HTML
|
|
2131
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
2132
|
+
Started GET "/password_resets/1-KxJduxHbQedINjjJShcw/edit" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2133
|
+
Processing by PasswordResetsController#edit as HTML
|
|
2134
|
+
Parameters: {"id"=>"1-KxJduxHbQedINjjJShcw"}
|
|
2135
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '1-KxJduxHbQedINjjJShcw' LIMIT 1
|
|
2136
|
+
Completed 200 OK in 18ms (Views: 17.1ms | ActiveRecord: 0.2ms)
|
|
2137
|
+
Started PATCH "/password_resets/1-KxJduxHbQedINjjJShcw" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2138
|
+
Processing by PasswordResetsController#update as HTML
|
|
2139
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"1-KxJduxHbQedINjjJShcw"}
|
|
2140
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '1-KxJduxHbQedINjjJShcw' LIMIT 1[0m
|
|
2141
|
+
[1m[35m (0.0ms)[0m begin transaction
|
|
2142
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'm10bqNz0T4xiHNdMCHKw6g@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
2143
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2144
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_digest", "$2a$04$7ZuRGypdvcyJ6oIQOrWhHemYz4sVe3ypEanYLqjcE5M4PKNZESJwO"], ["updated_at", "2014-04-23 20:48:09.252368"]]
|
|
2145
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
2146
|
+
Redirected to http://localhost:3000/
|
|
2147
|
+
Completed 302 Found in 5ms (ActiveRecord: 1.2ms)
|
|
2148
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2149
|
+
Processing by HomeController#index as HTML
|
|
2150
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
2151
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
|
2152
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2153
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2154
|
+
--------------------------------------------------------------------------------
|
|
2155
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
|
2156
|
+
--------------------------------------------------------------------------------
|
|
2157
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
2158
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2159
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'VzBbhpObaSnvZh5s9zMbIA@sample.com' LIMIT 1[0m
|
|
2160
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '_cyEEY2F8PthBl8Z7NjJug' LIMIT 1
|
|
2161
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2162
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "_cyEEY2F8PthBl8Z7NjJug"], ["created_at", "2014-04-23 20:48:09.278209"], ["email", "VzBbhpObaSnvZh5s9zMbIA@sample.com"], ["password_digest", "$2a$04$E9sDDN4PymHVqEB2/48OBecg8VJ3OT3DaWQ5qbQ.kZGY9LUpgxqPi"], ["updated_at", "2014-04-23 20:48:09.278209"]]
|
|
2163
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
2164
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2165
|
+
Processing by SessionsController#new as HTML
|
|
2166
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
2167
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2168
|
+
Processing by PasswordResetsController#new as HTML
|
|
2169
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
2170
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2171
|
+
Processing by PasswordResetsController#create as HTML
|
|
2172
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
|
2173
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1[0m
|
|
2174
|
+
Completed 200 OK in 3ms (Views: 1.6ms | ActiveRecord: 0.2ms)
|
|
2175
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
|
2176
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2177
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2178
|
+
-------------------------------------------------------------------------
|
|
2179
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
|
2180
|
+
-------------------------------------------------------------------------
|
|
2181
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
2182
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2183
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'OLT2SqekAjDMqzSgcnbE7Q@sample.com' LIMIT 1[0m
|
|
2184
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'nllYkxstVh-lHp1XnBO5tg' LIMIT 1
|
|
2185
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2186
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "nllYkxstVh-lHp1XnBO5tg"], ["created_at", "2014-04-23 20:48:09.324543"], ["email", "OLT2SqekAjDMqzSgcnbE7Q@sample.com"], ["password_digest", "$2a$04$/JiaExRAuI9pXyU48uHIXep15uq7J6NThUEzfcSssh1ixwKufdcJC"], ["updated_at", "2014-04-23 20:48:09.324543"]]
|
|
2187
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
2188
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2189
|
+
Processing by SessionsController#new as HTML
|
|
2190
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
|
2191
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2192
|
+
Processing by PasswordResetsController#new as HTML
|
|
2193
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
|
2194
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2195
|
+
Processing by PasswordResetsController#create as HTML
|
|
2196
|
+
Parameters: {"utf8"=>"✓", "email"=>"OLT2SqekAjDMqzSgcnbE7Q@sample.com", "commit"=>"Reset password"}
|
|
2197
|
+
[1m[36mUser Load (0.3ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'OLT2SqekAjDMqzSgcnbE7Q@sample.com' LIMIT 1[0m
|
|
2198
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'v7Ike_1veAQlIte-jOV5xQ' LIMIT 1
|
|
2199
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2200
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'OLT2SqekAjDMqzSgcnbE7Q@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
2201
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_sent_at", "2014-04-23 20:48:09.358841"], ["password_reset_token", "v7Ike_1veAQlIte-jOV5xQ"], ["updated_at", "2014-04-23 20:48:09.360507"]]
|
|
2202
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
2203
|
+
|
|
2204
|
+
UserMailer#password_reset: processed outbound mail in 9.0ms
|
|
2205
|
+
|
|
2206
|
+
Sent mail to OLT2SqekAjDMqzSgcnbE7Q@sample.com (9.0ms)
|
|
2207
|
+
Date: Wed, 23 Apr 2014 22:48:09 +0200
|
|
2208
|
+
From: from@example.com
|
|
2209
|
+
To: OLT2SqekAjDMqzSgcnbE7Q@sample.com
|
|
2210
|
+
Message-ID: <535827095b63e_4ddf3ff94442dbb47416b@air.lan.mail>
|
|
2211
|
+
Subject: Password Reset
|
|
2212
|
+
Mime-Version: 1.0
|
|
2213
|
+
Content-Type: text/plain;
|
|
2214
|
+
charset=UTF-8
|
|
2215
|
+
Content-Transfer-Encoding: 7bit
|
|
2216
|
+
|
|
2217
|
+
To reset your password, click the URL below.
|
|
2218
|
+
|
|
2219
|
+
http://localhost:3000/password_resets/v7Ike_1veAQlIte-jOV5xQ/edit
|
|
2220
|
+
|
|
2221
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
2222
|
+
Redirected to http://www.example.com/
|
|
2223
|
+
Completed 302 Found in 26ms (ActiveRecord: 1.9ms)
|
|
2224
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2225
|
+
Processing by HomeController#index as HTML
|
|
2226
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
|
2227
|
+
Started GET "/password_resets/v7Ike_1veAQlIte-jOV5xQ/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
2228
|
+
Processing by PasswordResetsController#edit as HTML
|
|
2229
|
+
Parameters: {"id"=>"v7Ike_1veAQlIte-jOV5xQ"}
|
|
2230
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'v7Ike_1veAQlIte-jOV5xQ' LIMIT 1[0m
|
|
2231
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
2232
|
+
Started PATCH "/password_resets/v7Ike_1veAQlIte-jOV5xQ" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
2233
|
+
Processing by PasswordResetsController#update as HTML
|
|
2234
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"v7Ike_1veAQlIte-jOV5xQ"}
|
|
2235
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'v7Ike_1veAQlIte-jOV5xQ' LIMIT 1
|
|
2236
|
+
Redirected to http://localhost:3000/password_resets/new
|
|
2237
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
|
2238
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
2239
|
+
Processing by PasswordResetsController#new as HTML
|
|
2240
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
2241
|
+
[1m[36m (1.2ms)[0m [1mDELETE FROM "users";[0m
|
|
2242
|
+
[1m[35m (0.3ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
2243
|
+
[1m[36m (1.2ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
2244
|
+
-------------------------------------------------------------------------------------------
|
|
2245
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
|
2246
|
+
-------------------------------------------------------------------------------------------
|
|
2247
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
2248
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2249
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '6wy6FVYS9l9-SRhPQBG9gw@sample.com' LIMIT 1
|
|
2250
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'l8XMQOVdDaPEWRH4GOfbPw' LIMIT 1[0m
|
|
2251
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2252
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "l8XMQOVdDaPEWRH4GOfbPw"], ["created_at", "2014-04-23 20:48:09.445172"], ["email", "6wy6FVYS9l9-SRhPQBG9gw@sample.com"], ["password_digest", "$2a$04$iyEysQlponJXURdZLFKl0uUiKibRe4wBSEXU5aJ7g.d5DyW1pPTJS"], ["updated_at", "2014-04-23 20:48:09.445172"]]
|
|
2253
|
+
[1m[36m (1.1ms)[0m [1mcommit transaction[0m
|
|
2254
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2255
|
+
Processing by SessionsController#new as HTML
|
|
2256
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
|
2257
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2258
|
+
Processing by PasswordResetsController#new as HTML
|
|
2259
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
|
2260
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2261
|
+
Processing by PasswordResetsController#create as HTML
|
|
2262
|
+
Parameters: {"utf8"=>"✓", "email"=>"6wy6FVYS9l9-SRhPQBG9gw@sample.com", "commit"=>"Reset password"}
|
|
2263
|
+
[1m[35mUser Load (0.4ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '6wy6FVYS9l9-SRhPQBG9gw@sample.com' LIMIT 1
|
|
2264
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'BVYp3r1ek2iKKo4Mp0bdiQ' LIMIT 1[0m
|
|
2265
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2266
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '6wy6FVYS9l9-SRhPQBG9gw@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
2267
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_sent_at", "2014-04-23 20:48:09.467727"], ["password_reset_token", "BVYp3r1ek2iKKo4Mp0bdiQ"], ["updated_at", "2014-04-23 20:48:09.468732"]]
|
|
2268
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
2269
|
+
|
|
2270
|
+
UserMailer#password_reset: processed outbound mail in 6.1ms
|
|
2271
|
+
|
|
2272
|
+
Sent mail to 6wy6FVYS9l9-SRhPQBG9gw@sample.com (7.5ms)
|
|
2273
|
+
Date: Wed, 23 Apr 2014 22:48:09 +0200
|
|
2274
|
+
From: from@example.com
|
|
2275
|
+
To: 6wy6FVYS9l9-SRhPQBG9gw@sample.com
|
|
2276
|
+
Message-ID: <5358270974bf0_4ddf3ff94442dbb474246@air.lan.mail>
|
|
2277
|
+
Subject: Password Reset
|
|
2278
|
+
Mime-Version: 1.0
|
|
2279
|
+
Content-Type: text/plain;
|
|
2280
|
+
charset=UTF-8
|
|
2281
|
+
Content-Transfer-Encoding: 7bit
|
|
2282
|
+
|
|
2283
|
+
To reset your password, click the URL below.
|
|
2284
|
+
|
|
2285
|
+
http://localhost:3000/password_resets/BVYp3r1ek2iKKo4Mp0bdiQ/edit
|
|
2286
|
+
|
|
2287
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
2288
|
+
Redirected to http://www.example.com/
|
|
2289
|
+
Completed 302 Found in 20ms (ActiveRecord: 1.6ms)
|
|
2290
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2291
|
+
Processing by HomeController#index as HTML
|
|
2292
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
|
2293
|
+
Started GET "/password_resets/BVYp3r1ek2iKKo4Mp0bdiQ/edit" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2294
|
+
Processing by PasswordResetsController#edit as HTML
|
|
2295
|
+
Parameters: {"id"=>"BVYp3r1ek2iKKo4Mp0bdiQ"}
|
|
2296
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'BVYp3r1ek2iKKo4Mp0bdiQ' LIMIT 1
|
|
2297
|
+
Completed 200 OK in 4ms (Views: 3.2ms | ActiveRecord: 0.2ms)
|
|
2298
|
+
Started PATCH "/password_resets/BVYp3r1ek2iKKo4Mp0bdiQ" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2299
|
+
Processing by PasswordResetsController#update as HTML
|
|
2300
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"BVYp3r1ek2iKKo4Mp0bdiQ"}
|
|
2301
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'BVYp3r1ek2iKKo4Mp0bdiQ' LIMIT 1[0m
|
|
2302
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2303
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '6wy6FVYS9l9-SRhPQBG9gw@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
2304
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
|
2305
|
+
Completed 200 OK in 8ms (Views: 2.9ms | ActiveRecord: 0.4ms)
|
|
2306
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
2307
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
2308
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
2309
|
+
-----------------------------------
|
|
2310
|
+
AuthproIntegrationTest: test_signup
|
|
2311
|
+
-----------------------------------
|
|
2312
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
2313
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2314
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'ADIArS_IZbzw2DAIaqInkQ@sample.com' LIMIT 1
|
|
2315
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'ppvGP13UtYkVFZfkS5TJ5Q' LIMIT 1[0m
|
|
2316
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2317
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "ppvGP13UtYkVFZfkS5TJ5Q"], ["created_at", "2014-04-23 20:48:09.531336"], ["email", "ADIArS_IZbzw2DAIaqInkQ@sample.com"], ["password_digest", "$2a$04$1mATDJKFTSDeRRwszAdVvueDlHxg6rs35EgIFKEXApaGKXtaqY6gq"], ["updated_at", "2014-04-23 20:48:09.531336"]]
|
|
2318
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
2319
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2320
|
+
Processing by HomeController#index as HTML
|
|
2321
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
2322
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2323
|
+
Processing by UsersController#new as HTML
|
|
2324
|
+
Completed 200 OK in 5ms (Views: 4.8ms | ActiveRecord: 0.0ms)
|
|
2325
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2326
|
+
Processing by UsersController#create as HTML
|
|
2327
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"S2bCrUVQSoxiXnDFjstj-Q@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
2328
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2329
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'S2bCrUVQSoxiXnDFjstj-Q@sample.com' LIMIT 1[0m
|
|
2330
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'aw1t2wwJY2_X1TrKzeG6mA' LIMIT 1
|
|
2331
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2332
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "aw1t2wwJY2_X1TrKzeG6mA"], ["created_at", "2014-04-23 20:48:09.561886"], ["email", "S2bCrUVQSoxiXnDFjstj-Q@sample.com"], ["password_digest", "$2a$04$lwT.KIR.G4SIaUIRMpO54OIzWEcpGct0wHHBK9kKtqD01a2qvtGke"], ["updated_at", "2014-04-23 20:48:09.561886"]]
|
|
2333
|
+
[1m[35m (2.5ms)[0m commit transaction
|
|
2334
|
+
Redirected to http://www.example.com/
|
|
2335
|
+
Completed 302 Found in 7ms (ActiveRecord: 2.9ms)
|
|
2336
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2337
|
+
Processing by HomeController#index as HTML
|
|
2338
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
2339
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
2340
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
2341
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
2342
|
+
-------------------------------------------
|
|
2343
|
+
AuthproIntegrationTest: test_signup_failing
|
|
2344
|
+
-------------------------------------------
|
|
2345
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
2346
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2347
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '-Y_ALui14W_xdNc_ShLX3w@sample.com' LIMIT 1
|
|
2348
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'FzfzVhT1r2jksWM5eXqXYA' LIMIT 1[0m
|
|
2349
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2350
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "FzfzVhT1r2jksWM5eXqXYA"], ["created_at", "2014-04-23 20:48:09.588681"], ["email", "-Y_ALui14W_xdNc_ShLX3w@sample.com"], ["password_digest", "$2a$04$/k9m1JrG4AREZ9DGfRXxeOljJXarZ.ZgU5voUiyKP3lSZJjLJfqvS"], ["updated_at", "2014-04-23 20:48:09.588681"]]
|
|
2351
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
2352
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2353
|
+
Processing by HomeController#index as HTML
|
|
2354
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
|
2355
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2356
|
+
Processing by UsersController#new as HTML
|
|
2357
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
|
2358
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2359
|
+
Processing by UsersController#create as HTML
|
|
2360
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"pAfcjCZVFFDoeVfE8vb45Q@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
2361
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2362
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'pAfcjCZVFFDoeVfE8vb45Q@sample.com' LIMIT 1[0m
|
|
2363
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
|
2364
|
+
Completed 200 OK in 7ms (Views: 3.0ms | ActiveRecord: 0.2ms)
|
|
2365
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
2366
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
2367
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
2368
|
+
---------------------------------------
|
|
2369
|
+
AuthproIntegrationTest: test_visit_home
|
|
2370
|
+
---------------------------------------
|
|
2371
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
2372
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2373
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'yX2kzaq2cf3I9DUp32ODQQ@sample.com' LIMIT 1
|
|
2374
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'xMmKkyPwPvaZcBm5WsRSAQ' LIMIT 1[0m
|
|
2375
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2376
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "xMmKkyPwPvaZcBm5WsRSAQ"], ["created_at", "2014-04-23 20:48:09.632185"], ["email", "yX2kzaq2cf3I9DUp32ODQQ@sample.com"], ["password_digest", "$2a$04$.RbtRUnzRYi9AOKACmZf3e4ccqOyfBdW5Iqf5iDF/FkiWfJqlFCK."], ["updated_at", "2014-04-23 20:48:09.632185"]]
|
|
2377
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
2378
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
|
2379
|
+
Processing by HomeController#index as HTML
|
|
2380
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
2381
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
|
2382
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2383
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2384
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2385
|
+
------------------------------------------
|
|
2386
|
+
AuthproGeneratorTest: test_generated_files
|
|
2387
|
+
------------------------------------------
|
|
2388
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
|
2389
|
+
----------------------------------
|
|
2390
|
+
AuthproIntegrationTest: test_login
|
|
2391
|
+
----------------------------------
|
|
2392
|
+
[1m[36m (1.2ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
|
2393
|
+
[1m[35m (0.1ms)[0m select sqlite_version(*)
|
|
2394
|
+
[1m[36m (1.1ms)[0m [1mCREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")[0m
|
|
2395
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
2396
|
+
Migrating to CreateUsers (20140423203816)
|
|
2397
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
2398
|
+
[1m[35m (0.3ms)[0m CREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime)
|
|
2399
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "schema_migrations" ("version") VALUES (?)[0m [["version", "20140423203816"]]
|
|
2400
|
+
[1m[35m (1.0ms)[0m commit transaction
|
|
2401
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
2402
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'KXtXTKcWZOrJZgM2JbV_ZA@sample.com' LIMIT 1
|
|
2403
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '7r1zuEMnGOqhlriIFaWxmw' LIMIT 1[0m
|
|
2404
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2405
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "7r1zuEMnGOqhlriIFaWxmw"], ["created_at", "2014-04-23 20:48:24.973517"], ["email", "KXtXTKcWZOrJZgM2JbV_ZA@sample.com"], ["password_digest", "$2a$04$a/DXvf2tZGuW6Yxo77r.2OzUNY0s4OCNvj6Np54tPpG9.HPs6TeRy"], ["updated_at", "2014-04-23 20:48:24.973517"]]
|
|
2406
|
+
[1m[36m (1.6ms)[0m [1mcommit transaction[0m
|
|
2407
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2408
|
+
Processing by HomeController#index as HTML
|
|
2409
|
+
Rendered home/index.html.erb within layouts/application (1.0ms)
|
|
2410
|
+
Completed 200 OK in 20ms (Views: 20.1ms | ActiveRecord: 0.0ms)
|
|
2411
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2412
|
+
Processing by SessionsController#new as HTML
|
|
2413
|
+
Rendered sessions/new.html.erb within layouts/application (1.1ms)
|
|
2414
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
|
2415
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2416
|
+
Processing by SessionsController#create as HTML
|
|
2417
|
+
Parameters: {"utf8"=>"✓", "email"=>"KXtXTKcWZOrJZgM2JbV_ZA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
2418
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'KXtXTKcWZOrJZgM2JbV_ZA@sample.com' LIMIT 1
|
|
2419
|
+
Redirected to http://www.example.com/
|
|
2420
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
|
2421
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2422
|
+
Processing by HomeController#index as HTML
|
|
2423
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
|
2424
|
+
[1m[36mUser Load (0.1ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = '7r1zuEMnGOqhlriIFaWxmw' LIMIT 1[0m
|
|
2425
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.1ms)
|
|
2426
|
+
[1m[35m (1.6ms)[0m DELETE FROM "users";
|
|
2427
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2428
|
+
[1m[35m (1.1ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2429
|
+
------------------------------------------
|
|
2430
|
+
AuthproIntegrationTest: test_login_failing
|
|
2431
|
+
------------------------------------------
|
|
2432
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
2433
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2434
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'I8bNW0WgwXLynf9GoEkBlQ@sample.com' LIMIT 1[0m
|
|
2435
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'ULhE1doS7BptGEmi4ZAHdg' LIMIT 1
|
|
2436
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2437
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "ULhE1doS7BptGEmi4ZAHdg"], ["created_at", "2014-04-23 20:48:25.084630"], ["email", "I8bNW0WgwXLynf9GoEkBlQ@sample.com"], ["password_digest", "$2a$04$QW21t1ibOzlKbJ.StXzU6..LBaEuHwB1fvnJ99VEZsriqlCb3gWQO"], ["updated_at", "2014-04-23 20:48:25.084630"]]
|
|
2438
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
2439
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2440
|
+
Processing by HomeController#index as HTML
|
|
2441
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
|
2442
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2443
|
+
Processing by SessionsController#new as HTML
|
|
2444
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
|
2445
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2446
|
+
Processing by SessionsController#create as HTML
|
|
2447
|
+
Parameters: {"utf8"=>"✓", "email"=>"I8bNW0WgwXLynf9GoEkBlQ@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
2448
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'I8bNW0WgwXLynf9GoEkBlQ@sample.com' LIMIT 1[0m
|
|
2449
|
+
Completed 200 OK in 6ms (Views: 2.6ms | ActiveRecord: 0.2ms)
|
|
2450
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
2451
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2452
|
+
[1m[35m (1.1ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2453
|
+
-----------------------------------
|
|
2454
|
+
AuthproIntegrationTest: test_logout
|
|
2455
|
+
-----------------------------------
|
|
2456
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
2457
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2458
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'xi-4Cy0wvy9r1Rzx2QeZLQ@sample.com' LIMIT 1[0m
|
|
2459
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'aoYMvWH8d_yPUfQ7CigzHw' LIMIT 1
|
|
2460
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2461
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "aoYMvWH8d_yPUfQ7CigzHw"], ["created_at", "2014-04-23 20:48:25.144316"], ["email", "xi-4Cy0wvy9r1Rzx2QeZLQ@sample.com"], ["password_digest", "$2a$04$RTSdJAf0BGgcZMKa/h6rwOtkoyRYYQqZzuch1OTCosMzgq4aBvud6"], ["updated_at", "2014-04-23 20:48:25.144316"]]
|
|
2462
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
2463
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2464
|
+
Processing by SessionsController#new as HTML
|
|
2465
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
|
2466
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2467
|
+
Processing by SessionsController#create as HTML
|
|
2468
|
+
Parameters: {"utf8"=>"✓", "email"=>"xi-4Cy0wvy9r1Rzx2QeZLQ@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
2469
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'xi-4Cy0wvy9r1Rzx2QeZLQ@sample.com' LIMIT 1[0m
|
|
2470
|
+
Redirected to http://www.example.com/
|
|
2471
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
|
2472
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2473
|
+
Processing by HomeController#index as HTML
|
|
2474
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'aoYMvWH8d_yPUfQ7CigzHw' LIMIT 1
|
|
2475
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.1ms)
|
|
2476
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2477
|
+
Processing by SessionsController#destroy as HTML
|
|
2478
|
+
Redirected to http://www.example.com/
|
|
2479
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
|
2480
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2481
|
+
Processing by HomeController#index as HTML
|
|
2482
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
2483
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
2484
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
2485
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
2486
|
+
-------------------------------------------
|
|
2487
|
+
AuthproIntegrationTest: test_reset_password
|
|
2488
|
+
-------------------------------------------
|
|
2489
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
2490
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2491
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'dAHpWaPaaGkvorpO5VAcwA@sample.com' LIMIT 1
|
|
2492
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'fRd9d-JD50I0nCzVFttimA' LIMIT 1[0m
|
|
2493
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2494
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "fRd9d-JD50I0nCzVFttimA"], ["created_at", "2014-04-23 20:48:25.195590"], ["email", "dAHpWaPaaGkvorpO5VAcwA@sample.com"], ["password_digest", "$2a$04$XX99bgm4lm9UoDar.HpmN.9eGxpgC2PdckIg1RRb7iRXE3MyYZw8a"], ["updated_at", "2014-04-23 20:48:25.195590"]]
|
|
2495
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
2496
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2497
|
+
Processing by SessionsController#new as HTML
|
|
2498
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
2499
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2500
|
+
Processing by PasswordResetsController#new as HTML
|
|
2501
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
|
2502
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2503
|
+
Processing by PasswordResetsController#create as HTML
|
|
2504
|
+
Parameters: {"utf8"=>"✓", "email"=>"dAHpWaPaaGkvorpO5VAcwA@sample.com", "commit"=>"Reset password"}
|
|
2505
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'dAHpWaPaaGkvorpO5VAcwA@sample.com' LIMIT 1
|
|
2506
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'scQt1uG4hl6duQr8wnEQcw' LIMIT 1[0m
|
|
2507
|
+
[1m[35m (0.0ms)[0m begin transaction
|
|
2508
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'dAHpWaPaaGkvorpO5VAcwA@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
2509
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_sent_at", "2014-04-23 20:48:25.220515"], ["password_reset_token", "scQt1uG4hl6duQr8wnEQcw"], ["updated_at", "2014-04-23 20:48:25.221727"]]
|
|
2510
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
2511
|
+
|
|
2512
|
+
UserMailer#password_reset: processed outbound mail in 11.7ms
|
|
2513
|
+
|
|
2514
|
+
Sent mail to dAHpWaPaaGkvorpO5VAcwA@sample.com (7.6ms)
|
|
2515
|
+
Date: Wed, 23 Apr 2014 22:48:25 +0200
|
|
2516
|
+
From: from@example.com
|
|
2517
|
+
To: dAHpWaPaaGkvorpO5VAcwA@sample.com
|
|
2518
|
+
Message-ID: <535827193ae69_4e0e3fe654c2dbb45523e@air.lan.mail>
|
|
2519
|
+
Subject: Password Reset
|
|
2520
|
+
Mime-Version: 1.0
|
|
2521
|
+
Content-Type: text/plain;
|
|
2522
|
+
charset=UTF-8
|
|
2523
|
+
Content-Transfer-Encoding: 7bit
|
|
2524
|
+
|
|
2525
|
+
To reset your password, click the URL below.
|
|
2526
|
+
|
|
2527
|
+
http://localhost:3000/password_resets/scQt1uG4hl6duQr8wnEQcw/edit
|
|
2528
|
+
|
|
2529
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
2530
|
+
Redirected to http://www.example.com/
|
|
2531
|
+
Completed 302 Found in 29ms (ActiveRecord: 1.4ms)
|
|
2532
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2533
|
+
Processing by HomeController#index as HTML
|
|
2534
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
2535
|
+
Started GET "/password_resets/scQt1uG4hl6duQr8wnEQcw/edit" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2536
|
+
Processing by PasswordResetsController#edit as HTML
|
|
2537
|
+
Parameters: {"id"=>"scQt1uG4hl6duQr8wnEQcw"}
|
|
2538
|
+
[1m[35mUser Load (0.3ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'scQt1uG4hl6duQr8wnEQcw' LIMIT 1
|
|
2539
|
+
Completed 200 OK in 14ms (Views: 12.4ms | ActiveRecord: 0.3ms)
|
|
2540
|
+
Started PATCH "/password_resets/scQt1uG4hl6duQr8wnEQcw" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2541
|
+
Processing by PasswordResetsController#update as HTML
|
|
2542
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"scQt1uG4hl6duQr8wnEQcw"}
|
|
2543
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'scQt1uG4hl6duQr8wnEQcw' LIMIT 1[0m
|
|
2544
|
+
[1m[35m (0.0ms)[0m begin transaction
|
|
2545
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'dAHpWaPaaGkvorpO5VAcwA@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
2546
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2547
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_digest", "$2a$04$UfZIZTy8Y8/2dbjDhvdza.q5IUByKMYO2r4TajpGqEp4f1OnE0bVm"], ["updated_at", "2014-04-23 20:48:25.274952"]]
|
|
2548
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
2549
|
+
Redirected to http://localhost:3000/
|
|
2550
|
+
Completed 302 Found in 5ms (ActiveRecord: 1.3ms)
|
|
2551
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2552
|
+
Processing by HomeController#index as HTML
|
|
2553
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
2554
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
2555
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2556
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2557
|
+
--------------------------------------------------------------------------------
|
|
2558
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
|
2559
|
+
--------------------------------------------------------------------------------
|
|
2560
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
2561
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2562
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'W2XGKiCRuMzIdJVKyt60TQ@sample.com' LIMIT 1[0m
|
|
2563
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '446Q2eaJDHDKq-KYNDMg3A' LIMIT 1
|
|
2564
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2565
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "446Q2eaJDHDKq-KYNDMg3A"], ["created_at", "2014-04-23 20:48:25.301966"], ["email", "W2XGKiCRuMzIdJVKyt60TQ@sample.com"], ["password_digest", "$2a$04$HlZy3firR4w7lqIPl4F/5e9o2mZHn3PRl68zSSGIJc/qDUZasc8A2"], ["updated_at", "2014-04-23 20:48:25.301966"]]
|
|
2566
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
2567
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2568
|
+
Processing by SessionsController#new as HTML
|
|
2569
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
|
2570
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2571
|
+
Processing by PasswordResetsController#new as HTML
|
|
2572
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
2573
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2574
|
+
Processing by PasswordResetsController#create as HTML
|
|
2575
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
|
2576
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1[0m
|
|
2577
|
+
Completed 200 OK in 2ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
|
2578
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
2579
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2580
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2581
|
+
-------------------------------------------------------------------------
|
|
2582
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
|
2583
|
+
-------------------------------------------------------------------------
|
|
2584
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
2585
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2586
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'pfcPhwjvfc_AxdAazzr0KQ@sample.com' LIMIT 1[0m
|
|
2587
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'KpJ4nEIvd_kZ8nUdW01hgA' LIMIT 1
|
|
2588
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2589
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "KpJ4nEIvd_kZ8nUdW01hgA"], ["created_at", "2014-04-23 20:48:25.338505"], ["email", "pfcPhwjvfc_AxdAazzr0KQ@sample.com"], ["password_digest", "$2a$04$IOapc3LmwMAbCoiitl9r1Osnzl/IQK1Atm/.b9A.aDM7fKlqxiAMy"], ["updated_at", "2014-04-23 20:48:25.338505"]]
|
|
2590
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
2591
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2592
|
+
Processing by SessionsController#new as HTML
|
|
2593
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
2594
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2595
|
+
Processing by PasswordResetsController#new as HTML
|
|
2596
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
2597
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2598
|
+
Processing by PasswordResetsController#create as HTML
|
|
2599
|
+
Parameters: {"utf8"=>"✓", "email"=>"pfcPhwjvfc_AxdAazzr0KQ@sample.com", "commit"=>"Reset password"}
|
|
2600
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'pfcPhwjvfc_AxdAazzr0KQ@sample.com' LIMIT 1[0m
|
|
2601
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '-e6XMFPVxNyyqoz_6m5hUQ' LIMIT 1
|
|
2602
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
2603
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'pfcPhwjvfc_AxdAazzr0KQ@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
2604
|
+
[1m[36mSQL (0.2ms)[0m [1mUPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_sent_at", "2014-04-23 20:48:25.355302"], ["password_reset_token", "-e6XMFPVxNyyqoz_6m5hUQ"], ["updated_at", "2014-04-23 20:48:25.356037"]]
|
|
2605
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
2606
|
+
|
|
2607
|
+
UserMailer#password_reset: processed outbound mail in 5.4ms
|
|
2608
|
+
|
|
2609
|
+
Sent mail to pfcPhwjvfc_AxdAazzr0KQ@sample.com (5.9ms)
|
|
2610
|
+
Date: Wed, 23 Apr 2014 22:48:25 +0200
|
|
2611
|
+
From: from@example.com
|
|
2612
|
+
To: pfcPhwjvfc_AxdAazzr0KQ@sample.com
|
|
2613
|
+
Message-ID: <5358271958f4d_4e0e3fe654c2dbb4553ce@air.lan.mail>
|
|
2614
|
+
Subject: Password Reset
|
|
2615
|
+
Mime-Version: 1.0
|
|
2616
|
+
Content-Type: text/plain;
|
|
2617
|
+
charset=UTF-8
|
|
2618
|
+
Content-Transfer-Encoding: 7bit
|
|
2619
|
+
|
|
2620
|
+
To reset your password, click the URL below.
|
|
2621
|
+
|
|
2622
|
+
http://localhost:3000/password_resets/-e6XMFPVxNyyqoz_6m5hUQ/edit
|
|
2623
|
+
|
|
2624
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
2625
|
+
Redirected to http://www.example.com/
|
|
2626
|
+
Completed 302 Found in 16ms (ActiveRecord: 1.3ms)
|
|
2627
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2628
|
+
Processing by HomeController#index as HTML
|
|
2629
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
2630
|
+
Started GET "/password_resets/-e6XMFPVxNyyqoz_6m5hUQ/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
2631
|
+
Processing by PasswordResetsController#edit as HTML
|
|
2632
|
+
Parameters: {"id"=>"-e6XMFPVxNyyqoz_6m5hUQ"}
|
|
2633
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '-e6XMFPVxNyyqoz_6m5hUQ' LIMIT 1[0m
|
|
2634
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
2635
|
+
Started PATCH "/password_resets/-e6XMFPVxNyyqoz_6m5hUQ" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
2636
|
+
Processing by PasswordResetsController#update as HTML
|
|
2637
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"-e6XMFPVxNyyqoz_6m5hUQ"}
|
|
2638
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '-e6XMFPVxNyyqoz_6m5hUQ' LIMIT 1
|
|
2639
|
+
Redirected to http://localhost:3000/password_resets/new
|
|
2640
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
|
2641
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
2642
|
+
Processing by PasswordResetsController#new as HTML
|
|
2643
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
2644
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
2645
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
2646
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
2647
|
+
-------------------------------------------------------------------------------------------
|
|
2648
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
|
2649
|
+
-------------------------------------------------------------------------------------------
|
|
2650
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
2651
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2652
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'KkFTmDyfYknhHbOq5ROEdQ@sample.com' LIMIT 1
|
|
2653
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'leUTVqTKRmvy28i3D6fB9w' LIMIT 1[0m
|
|
2654
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2655
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "leUTVqTKRmvy28i3D6fB9w"], ["created_at", "2014-04-23 20:48:25.411659"], ["email", "KkFTmDyfYknhHbOq5ROEdQ@sample.com"], ["password_digest", "$2a$04$nsZrUCE0kuiBnoI.amnY4O5F2pjllaQYZ1zWMgiQQcRzjcxXm0L5K"], ["updated_at", "2014-04-23 20:48:25.411659"]]
|
|
2656
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
2657
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2658
|
+
Processing by SessionsController#new as HTML
|
|
2659
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
2660
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2661
|
+
Processing by PasswordResetsController#new as HTML
|
|
2662
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
|
2663
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2664
|
+
Processing by PasswordResetsController#create as HTML
|
|
2665
|
+
Parameters: {"utf8"=>"✓", "email"=>"KkFTmDyfYknhHbOq5ROEdQ@sample.com", "commit"=>"Reset password"}
|
|
2666
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'KkFTmDyfYknhHbOq5ROEdQ@sample.com' LIMIT 1
|
|
2667
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'Fnxx4cwb4ymJpqXIec6pZw' LIMIT 1[0m
|
|
2668
|
+
[1m[35m (0.0ms)[0m begin transaction
|
|
2669
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'KkFTmDyfYknhHbOq5ROEdQ@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
2670
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_sent_at", "2014-04-23 20:48:25.436143"], ["password_reset_token", "Fnxx4cwb4ymJpqXIec6pZw"], ["updated_at", "2014-04-23 20:48:25.436913"]]
|
|
2671
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
2672
|
+
|
|
2673
|
+
UserMailer#password_reset: processed outbound mail in 4.9ms
|
|
2674
|
+
|
|
2675
|
+
Sent mail to KkFTmDyfYknhHbOq5ROEdQ@sample.com (4.5ms)
|
|
2676
|
+
Date: Wed, 23 Apr 2014 22:48:25 +0200
|
|
2677
|
+
From: from@example.com
|
|
2678
|
+
To: KkFTmDyfYknhHbOq5ROEdQ@sample.com
|
|
2679
|
+
Message-ID: <535827196c7d3_4e0e3fe654c2dbb4554cd@air.lan.mail>
|
|
2680
|
+
Subject: Password Reset
|
|
2681
|
+
Mime-Version: 1.0
|
|
2682
|
+
Content-Type: text/plain;
|
|
2683
|
+
charset=UTF-8
|
|
2684
|
+
Content-Transfer-Encoding: 7bit
|
|
2685
|
+
|
|
2686
|
+
To reset your password, click the URL below.
|
|
2687
|
+
|
|
2688
|
+
http://localhost:3000/password_resets/Fnxx4cwb4ymJpqXIec6pZw/edit
|
|
2689
|
+
|
|
2690
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
2691
|
+
Redirected to http://www.example.com/
|
|
2692
|
+
Completed 302 Found in 14ms (ActiveRecord: 1.3ms)
|
|
2693
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2694
|
+
Processing by HomeController#index as HTML
|
|
2695
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
2696
|
+
Started GET "/password_resets/Fnxx4cwb4ymJpqXIec6pZw/edit" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2697
|
+
Processing by PasswordResetsController#edit as HTML
|
|
2698
|
+
Parameters: {"id"=>"Fnxx4cwb4ymJpqXIec6pZw"}
|
|
2699
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Fnxx4cwb4ymJpqXIec6pZw' LIMIT 1
|
|
2700
|
+
Completed 200 OK in 3ms (Views: 2.1ms | ActiveRecord: 0.2ms)
|
|
2701
|
+
Started PATCH "/password_resets/Fnxx4cwb4ymJpqXIec6pZw" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2702
|
+
Processing by PasswordResetsController#update as HTML
|
|
2703
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"Fnxx4cwb4ymJpqXIec6pZw"}
|
|
2704
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Fnxx4cwb4ymJpqXIec6pZw' LIMIT 1[0m
|
|
2705
|
+
[1m[35m (0.0ms)[0m begin transaction
|
|
2706
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'KkFTmDyfYknhHbOq5ROEdQ@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
2707
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
|
2708
|
+
Completed 200 OK in 6ms (Views: 2.4ms | ActiveRecord: 0.4ms)
|
|
2709
|
+
[1m[36m (3.3ms)[0m [1mDELETE FROM "users";[0m
|
|
2710
|
+
[1m[35m (0.3ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
2711
|
+
[1m[36m (1.1ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
2712
|
+
-----------------------------------
|
|
2713
|
+
AuthproIntegrationTest: test_signup
|
|
2714
|
+
-----------------------------------
|
|
2715
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
2716
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2717
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'jQGMJWoJspQaA_h0wam9lQ@sample.com' LIMIT 1
|
|
2718
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'QZwTwLhHVut1kH7yuZJn6g' LIMIT 1[0m
|
|
2719
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2720
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "QZwTwLhHVut1kH7yuZJn6g"], ["created_at", "2014-04-23 20:48:25.490747"], ["email", "jQGMJWoJspQaA_h0wam9lQ@sample.com"], ["password_digest", "$2a$04$Rsw64EkeJiArQb9Ct.fiuezbl2I6x/1pLhNey8Tur4gEMA6P26/X."], ["updated_at", "2014-04-23 20:48:25.490747"]]
|
|
2721
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
2722
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2723
|
+
Processing by HomeController#index as HTML
|
|
2724
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
2725
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2726
|
+
Processing by UsersController#new as HTML
|
|
2727
|
+
Completed 200 OK in 4ms (Views: 4.2ms | ActiveRecord: 0.0ms)
|
|
2728
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2729
|
+
Processing by UsersController#create as HTML
|
|
2730
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"CvXFBXbwVLVp8_eDoyo87g@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
2731
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2732
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'CvXFBXbwVLVp8_eDoyo87g@sample.com' LIMIT 1[0m
|
|
2733
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'luiqMjZU7kvk5kn5Qfjn6w' LIMIT 1
|
|
2734
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2735
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "luiqMjZU7kvk5kn5Qfjn6w"], ["created_at", "2014-04-23 20:48:25.515490"], ["email", "CvXFBXbwVLVp8_eDoyo87g@sample.com"], ["password_digest", "$2a$04$7RpkwLkBqQidb2ST/yRpI.9TToSUQ5iiWBfPJavy9vBpem/n85loW"], ["updated_at", "2014-04-23 20:48:25.515490"]]
|
|
2736
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
2737
|
+
Redirected to http://www.example.com/
|
|
2738
|
+
Completed 302 Found in 6ms (ActiveRecord: 1.1ms)
|
|
2739
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2740
|
+
Processing by HomeController#index as HTML
|
|
2741
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
2742
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
2743
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
2744
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
2745
|
+
-------------------------------------------
|
|
2746
|
+
AuthproIntegrationTest: test_signup_failing
|
|
2747
|
+
-------------------------------------------
|
|
2748
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
2749
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2750
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'trgqyfKR9NHvtCHGOrHYOA@sample.com' LIMIT 1
|
|
2751
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'MW9vdkk0puBHknT7VQ2KGg' LIMIT 1[0m
|
|
2752
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2753
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "MW9vdkk0puBHknT7VQ2KGg"], ["created_at", "2014-04-23 20:48:25.542549"], ["email", "trgqyfKR9NHvtCHGOrHYOA@sample.com"], ["password_digest", "$2a$04$jok7tfEsnNzNouJi2BZYSu4.nzrnGYJip84C.9gEgO1qZo1jQK1Lu"], ["updated_at", "2014-04-23 20:48:25.542549"]]
|
|
2754
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
2755
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2756
|
+
Processing by HomeController#index as HTML
|
|
2757
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
2758
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2759
|
+
Processing by UsersController#new as HTML
|
|
2760
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
|
2761
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2762
|
+
Processing by UsersController#create as HTML
|
|
2763
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"yP93kDbj9qR8WLq-_7papw@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
2764
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2765
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'yP93kDbj9qR8WLq-_7papw@sample.com' LIMIT 1[0m
|
|
2766
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
|
2767
|
+
Completed 200 OK in 7ms (Views: 3.1ms | ActiveRecord: 0.3ms)
|
|
2768
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
|
2769
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
2770
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
2771
|
+
---------------------------------------
|
|
2772
|
+
AuthproIntegrationTest: test_visit_home
|
|
2773
|
+
---------------------------------------
|
|
2774
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
2775
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2776
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'mmI6ENLMw4d70DIQyW91sA@sample.com' LIMIT 1
|
|
2777
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'Fz7NgaZkSqN9dOaxcnDJog' LIMIT 1[0m
|
|
2778
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2779
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "Fz7NgaZkSqN9dOaxcnDJog"], ["created_at", "2014-04-23 20:48:25.586349"], ["email", "mmI6ENLMw4d70DIQyW91sA@sample.com"], ["password_digest", "$2a$04$PQDGNYV0l9lmtr24NNaq.ujHwxHMZxnp6/92Vtw/QRsu1QXHxnza."], ["updated_at", "2014-04-23 20:48:25.586349"]]
|
|
2780
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
2781
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
|
2782
|
+
Processing by HomeController#index as HTML
|
|
2783
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
2784
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
|
2785
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2786
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2787
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2788
|
+
------------------------------------------
|
|
2789
|
+
AuthproGeneratorTest: test_generated_files
|
|
2790
|
+
------------------------------------------
|
|
2791
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
|
2792
|
+
----------------------------------
|
|
2793
|
+
AuthproIntegrationTest: test_login
|
|
2794
|
+
----------------------------------
|
|
2795
|
+
[1m[36m (18.5ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
|
2796
|
+
[1m[35m (0.2ms)[0m select sqlite_version(*)
|
|
2797
|
+
[1m[36m (1.3ms)[0m [1mCREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")[0m
|
|
2798
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
2799
|
+
Migrating to CreateUsers (20140423203816)
|
|
2800
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2801
|
+
[1m[35m (0.3ms)[0m CREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime)
|
|
2802
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "schema_migrations" ("version") VALUES (?)[0m [["version", "20140423203816"]]
|
|
2803
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
2804
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
2805
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'g0-0ZMXzwU7MQqdMHszhXg@sample.com' LIMIT 1
|
|
2806
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'lStgLVfPzPvMK1aTwgLMnQ' LIMIT 1[0m
|
|
2807
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2808
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "lStgLVfPzPvMK1aTwgLMnQ"], ["created_at", "2014-04-23 21:13:45.448849"], ["email", "g0-0ZMXzwU7MQqdMHszhXg@sample.com"], ["password_digest", "$2a$04$KyHcIVPZ1mzzOqJ5xul6WO1eN0e1fchFcPPONkegRvZrghxhcdBPK"], ["updated_at", "2014-04-23 21:13:45.448849"]]
|
|
2809
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
2810
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2811
|
+
Processing by HomeController#index as HTML
|
|
2812
|
+
Rendered home/index.html.erb within layouts/application (1.1ms)
|
|
2813
|
+
Completed 200 OK in 27ms (Views: 26.7ms | ActiveRecord: 0.0ms)
|
|
2814
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2815
|
+
Processing by SessionsController#new as HTML
|
|
2816
|
+
Rendered sessions/new.html.erb within layouts/application (1.2ms)
|
|
2817
|
+
Completed 200 OK in 3ms (Views: 3.0ms | ActiveRecord: 0.0ms)
|
|
2818
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2819
|
+
Processing by SessionsController#create as HTML
|
|
2820
|
+
Parameters: {"utf8"=>"✓", "email"=>"g0-0ZMXzwU7MQqdMHszhXg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
2821
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'g0-0ZMXzwU7MQqdMHszhXg@sample.com' LIMIT 1
|
|
2822
|
+
Redirected to http://www.example.com/
|
|
2823
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
|
2824
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2825
|
+
Processing by HomeController#index as HTML
|
|
2826
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
|
2827
|
+
[1m[36mUser Load (0.1ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'lStgLVfPzPvMK1aTwgLMnQ' LIMIT 1[0m
|
|
2828
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.1ms)
|
|
2829
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
2830
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2831
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2832
|
+
------------------------------------------
|
|
2833
|
+
AuthproIntegrationTest: test_login_failing
|
|
2834
|
+
------------------------------------------
|
|
2835
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
2836
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2837
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'pJz7vi3bcW1zhQ3pt6vqJg@sample.com' LIMIT 1[0m
|
|
2838
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'vS1fahRJcrT6ZePAzOTTnw' LIMIT 1
|
|
2839
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2840
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "vS1fahRJcrT6ZePAzOTTnw"], ["created_at", "2014-04-23 21:13:45.560854"], ["email", "pJz7vi3bcW1zhQ3pt6vqJg@sample.com"], ["password_digest", "$2a$04$mC315rdLyVbbOTfa.jucAe3cWirjlY1uxeqPuFk3/1zFobXQGmSha"], ["updated_at", "2014-04-23 21:13:45.560854"]]
|
|
2841
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
2842
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2843
|
+
Processing by HomeController#index as HTML
|
|
2844
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
2845
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2846
|
+
Processing by SessionsController#new as HTML
|
|
2847
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
2848
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2849
|
+
Processing by SessionsController#create as HTML
|
|
2850
|
+
Parameters: {"utf8"=>"✓", "email"=>"pJz7vi3bcW1zhQ3pt6vqJg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
2851
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'pJz7vi3bcW1zhQ3pt6vqJg@sample.com' LIMIT 1[0m
|
|
2852
|
+
Completed 200 OK in 3ms (Views: 1.4ms | ActiveRecord: 0.2ms)
|
|
2853
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
|
2854
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2855
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2856
|
+
-----------------------------------
|
|
2857
|
+
AuthproIntegrationTest: test_logout
|
|
2858
|
+
-----------------------------------
|
|
2859
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
2860
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2861
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'LIOYGQY4ng7z7cPmSxLvIw@sample.com' LIMIT 1[0m
|
|
2862
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'KbHRciSAHJMvaIkt2LGeoA' LIMIT 1
|
|
2863
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2864
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "KbHRciSAHJMvaIkt2LGeoA"], ["created_at", "2014-04-23 21:13:45.600321"], ["email", "LIOYGQY4ng7z7cPmSxLvIw@sample.com"], ["password_digest", "$2a$04$DjjabuSZr4HYB.3r...NhO3JWtafIbDYs8MG45eCcSmiMtc8qxJ7C"], ["updated_at", "2014-04-23 21:13:45.600321"]]
|
|
2865
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
2866
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2867
|
+
Processing by SessionsController#new as HTML
|
|
2868
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
2869
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2870
|
+
Processing by SessionsController#create as HTML
|
|
2871
|
+
Parameters: {"utf8"=>"✓", "email"=>"LIOYGQY4ng7z7cPmSxLvIw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
2872
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'LIOYGQY4ng7z7cPmSxLvIw@sample.com' LIMIT 1[0m
|
|
2873
|
+
Redirected to http://www.example.com/
|
|
2874
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
|
2875
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2876
|
+
Processing by HomeController#index as HTML
|
|
2877
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'KbHRciSAHJMvaIkt2LGeoA' LIMIT 1
|
|
2878
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.1ms)
|
|
2879
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2880
|
+
Processing by SessionsController#destroy as HTML
|
|
2881
|
+
Redirected to http://www.example.com/
|
|
2882
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
|
2883
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2884
|
+
Processing by HomeController#index as HTML
|
|
2885
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
2886
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
2887
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
2888
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
2889
|
+
-------------------------------------------
|
|
2890
|
+
AuthproIntegrationTest: test_reset_password
|
|
2891
|
+
-------------------------------------------
|
|
2892
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
2893
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
2894
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '63ze0zqmhAsomBn2ERZEoQ@sample.com' LIMIT 1
|
|
2895
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '9QCZgABsekGCz1nBDmPO4A' LIMIT 1[0m
|
|
2896
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2897
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "9QCZgABsekGCz1nBDmPO4A"], ["created_at", "2014-04-23 21:13:45.649994"], ["email", "63ze0zqmhAsomBn2ERZEoQ@sample.com"], ["password_digest", "$2a$04$hefRNH.tbOPIeez2yeUWNOC0TgNgl5EapGdtpxRSJOy1wOs8yzhq2"], ["updated_at", "2014-04-23 21:13:45.649994"]]
|
|
2898
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
2899
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2900
|
+
Processing by SessionsController#new as HTML
|
|
2901
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
|
2902
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2903
|
+
Processing by PasswordResetsController#new as HTML
|
|
2904
|
+
Completed 200 OK in 3ms (Views: 2.7ms | ActiveRecord: 0.0ms)
|
|
2905
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2906
|
+
Processing by PasswordResetsController#create as HTML
|
|
2907
|
+
Parameters: {"utf8"=>"✓", "email"=>"63ze0zqmhAsomBn2ERZEoQ@sample.com", "commit"=>"Reset password"}
|
|
2908
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '63ze0zqmhAsomBn2ERZEoQ@sample.com' LIMIT 1
|
|
2909
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'WKViDZ5TxfcSzR7j5f0Utg' LIMIT 1[0m
|
|
2910
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2911
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '63ze0zqmhAsomBn2ERZEoQ@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
2912
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_sent_at", "2014-04-23 21:13:45.671792"], ["password_reset_token", "WKViDZ5TxfcSzR7j5f0Utg"], ["updated_at", "2014-04-23 21:13:45.673031"]]
|
|
2913
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
2914
|
+
|
|
2915
|
+
UserMailer#password_reset: processed outbound mail in 9.7ms
|
|
2916
|
+
|
|
2917
|
+
Sent mail to 63ze0zqmhAsomBn2ERZEoQ@sample.com (7.2ms)
|
|
2918
|
+
Date: Wed, 23 Apr 2014 23:13:45 +0200
|
|
2919
|
+
From: from@example.com
|
|
2920
|
+
To: 63ze0zqmhAsomBn2ERZEoQ@sample.com
|
|
2921
|
+
Message-ID: <53582d09a889f_50413fff0102dbb45054@air.lan.mail>
|
|
2922
|
+
Subject: Password Reset
|
|
2923
|
+
Mime-Version: 1.0
|
|
2924
|
+
Content-Type: text/plain;
|
|
2925
|
+
charset=UTF-8
|
|
2926
|
+
Content-Transfer-Encoding: 7bit
|
|
2927
|
+
|
|
2928
|
+
To reset your password, click the URL below.
|
|
2929
|
+
|
|
2930
|
+
http://localhost:3000/password_resets/WKViDZ5TxfcSzR7j5f0Utg/edit
|
|
2931
|
+
|
|
2932
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
2933
|
+
Redirected to http://www.example.com/
|
|
2934
|
+
Completed 302 Found in 26ms (ActiveRecord: 1.4ms)
|
|
2935
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2936
|
+
Processing by HomeController#index as HTML
|
|
2937
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
2938
|
+
Started GET "/password_resets/WKViDZ5TxfcSzR7j5f0Utg/edit" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2939
|
+
Processing by PasswordResetsController#edit as HTML
|
|
2940
|
+
Parameters: {"id"=>"WKViDZ5TxfcSzR7j5f0Utg"}
|
|
2941
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'WKViDZ5TxfcSzR7j5f0Utg' LIMIT 1
|
|
2942
|
+
Completed 200 OK in 12ms (Views: 11.5ms | ActiveRecord: 0.2ms)
|
|
2943
|
+
Started PATCH "/password_resets/WKViDZ5TxfcSzR7j5f0Utg" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2944
|
+
Processing by PasswordResetsController#update as HTML
|
|
2945
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"WKViDZ5TxfcSzR7j5f0Utg"}
|
|
2946
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'WKViDZ5TxfcSzR7j5f0Utg' LIMIT 1[0m
|
|
2947
|
+
[1m[35m (0.0ms)[0m begin transaction
|
|
2948
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '63ze0zqmhAsomBn2ERZEoQ@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
2949
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2950
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_digest", "$2a$04$8Hw2v1F9HaAM334Tw0xnQeZp/AVf4WBFYUKvidgKDonbXHXstXwDK"], ["updated_at", "2014-04-23 21:13:45.721266"]]
|
|
2951
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
2952
|
+
Redirected to http://localhost:3000/
|
|
2953
|
+
Completed 302 Found in 5ms (ActiveRecord: 1.4ms)
|
|
2954
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2955
|
+
Processing by HomeController#index as HTML
|
|
2956
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
|
2957
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
|
2958
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2959
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2960
|
+
--------------------------------------------------------------------------------
|
|
2961
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
|
2962
|
+
--------------------------------------------------------------------------------
|
|
2963
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
2964
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2965
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'oU6oojSM3xYJBxfya6jMpA@sample.com' LIMIT 1[0m
|
|
2966
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'QmOpM6yj43NFJiSwUN86ZQ' LIMIT 1
|
|
2967
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2968
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "QmOpM6yj43NFJiSwUN86ZQ"], ["created_at", "2014-04-23 21:13:45.745554"], ["email", "oU6oojSM3xYJBxfya6jMpA@sample.com"], ["password_digest", "$2a$04$zYfpZTGnkA//kWOEor402epYaafrFr.hyk61ExS242os/nJ2R6WI2"], ["updated_at", "2014-04-23 21:13:45.745554"]]
|
|
2969
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
2970
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2971
|
+
Processing by SessionsController#new as HTML
|
|
2972
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
2973
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2974
|
+
Processing by PasswordResetsController#new as HTML
|
|
2975
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
2976
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2977
|
+
Processing by PasswordResetsController#create as HTML
|
|
2978
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
|
2979
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1[0m
|
|
2980
|
+
Completed 200 OK in 2ms (Views: 1.1ms | ActiveRecord: 0.2ms)
|
|
2981
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
|
2982
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
2983
|
+
[1m[35m (0.6ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
2984
|
+
-------------------------------------------------------------------------
|
|
2985
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
|
2986
|
+
-------------------------------------------------------------------------
|
|
2987
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
2988
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
2989
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'vOdo4FfccrMwdTT6Wv3Q6A@sample.com' LIMIT 1[0m
|
|
2990
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '0a_nb2yK5M_AR_2n5LNZGA' LIMIT 1
|
|
2991
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
2992
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "0a_nb2yK5M_AR_2n5LNZGA"], ["created_at", "2014-04-23 21:13:45.781919"], ["email", "vOdo4FfccrMwdTT6Wv3Q6A@sample.com"], ["password_digest", "$2a$04$OViv.Qn4T6EftWakfiIv0ObD5WU7YiFgf0Z75Fo.4eX4xIhIueUG."], ["updated_at", "2014-04-23 21:13:45.781919"]]
|
|
2993
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
2994
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2995
|
+
Processing by SessionsController#new as HTML
|
|
2996
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
2997
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
2998
|
+
Processing by PasswordResetsController#new as HTML
|
|
2999
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
|
3000
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
3001
|
+
Processing by PasswordResetsController#create as HTML
|
|
3002
|
+
Parameters: {"utf8"=>"✓", "email"=>"vOdo4FfccrMwdTT6Wv3Q6A@sample.com", "commit"=>"Reset password"}
|
|
3003
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'vOdo4FfccrMwdTT6Wv3Q6A@sample.com' LIMIT 1[0m
|
|
3004
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'Skrk2jtEwmh_2VBzKRdxIA' LIMIT 1
|
|
3005
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
|
3006
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'vOdo4FfccrMwdTT6Wv3Q6A@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
3007
|
+
[1m[36mSQL (0.2ms)[0m [1mUPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_sent_at", "2014-04-23 21:13:45.798820"], ["password_reset_token", "Skrk2jtEwmh_2VBzKRdxIA"], ["updated_at", "2014-04-23 21:13:45.799545"]]
|
|
3008
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
3009
|
+
|
|
3010
|
+
UserMailer#password_reset: processed outbound mail in 5.2ms
|
|
3011
|
+
|
|
3012
|
+
Sent mail to vOdo4FfccrMwdTT6Wv3Q6A@sample.com (5.4ms)
|
|
3013
|
+
Date: Wed, 23 Apr 2014 23:13:45 +0200
|
|
3014
|
+
From: from@example.com
|
|
3015
|
+
To: vOdo4FfccrMwdTT6Wv3Q6A@sample.com
|
|
3016
|
+
Message-ID: <53582d09c5344_50413fff0102dbb45131@air.lan.mail>
|
|
3017
|
+
Subject: Password Reset
|
|
3018
|
+
Mime-Version: 1.0
|
|
3019
|
+
Content-Type: text/plain;
|
|
3020
|
+
charset=UTF-8
|
|
3021
|
+
Content-Transfer-Encoding: 7bit
|
|
3022
|
+
|
|
3023
|
+
To reset your password, click the URL below.
|
|
3024
|
+
|
|
3025
|
+
http://localhost:3000/password_resets/Skrk2jtEwmh_2VBzKRdxIA/edit
|
|
3026
|
+
|
|
3027
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
3028
|
+
Redirected to http://www.example.com/
|
|
3029
|
+
Completed 302 Found in 15ms (ActiveRecord: 1.4ms)
|
|
3030
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
3031
|
+
Processing by HomeController#index as HTML
|
|
3032
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
|
3033
|
+
Started GET "/password_resets/Skrk2jtEwmh_2VBzKRdxIA/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
3034
|
+
Processing by PasswordResetsController#edit as HTML
|
|
3035
|
+
Parameters: {"id"=>"Skrk2jtEwmh_2VBzKRdxIA"}
|
|
3036
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Skrk2jtEwmh_2VBzKRdxIA' LIMIT 1[0m
|
|
3037
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
3038
|
+
Started PATCH "/password_resets/Skrk2jtEwmh_2VBzKRdxIA" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
3039
|
+
Processing by PasswordResetsController#update as HTML
|
|
3040
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"Skrk2jtEwmh_2VBzKRdxIA"}
|
|
3041
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Skrk2jtEwmh_2VBzKRdxIA' LIMIT 1
|
|
3042
|
+
Redirected to http://localhost:3000/password_resets/new
|
|
3043
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
|
3044
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
|
3045
|
+
Processing by PasswordResetsController#new as HTML
|
|
3046
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
3047
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
|
3048
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
3049
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
3050
|
+
-------------------------------------------------------------------------------------------
|
|
3051
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
|
3052
|
+
-------------------------------------------------------------------------------------------
|
|
3053
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
3054
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
3055
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'uRdVzDbBY92eYGq84p9v6w@sample.com' LIMIT 1
|
|
3056
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'FMC394g6EWuEWt3CqGJLKA' LIMIT 1[0m
|
|
3057
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
3058
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "FMC394g6EWuEWt3CqGJLKA"], ["created_at", "2014-04-23 21:13:45.850777"], ["email", "uRdVzDbBY92eYGq84p9v6w@sample.com"], ["password_digest", "$2a$04$0xoqMPi3n1kMZqfUTCzlM.xBllL3ZpO23tzWbbX.WnOXXF1rhlB8a"], ["updated_at", "2014-04-23 21:13:45.850777"]]
|
|
3059
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
3060
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
3061
|
+
Processing by SessionsController#new as HTML
|
|
3062
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
3063
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
3064
|
+
Processing by PasswordResetsController#new as HTML
|
|
3065
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
3066
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
3067
|
+
Processing by PasswordResetsController#create as HTML
|
|
3068
|
+
Parameters: {"utf8"=>"✓", "email"=>"uRdVzDbBY92eYGq84p9v6w@sample.com", "commit"=>"Reset password"}
|
|
3069
|
+
[1m[35mUser Load (0.3ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'uRdVzDbBY92eYGq84p9v6w@sample.com' LIMIT 1
|
|
3070
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'Oo93Zljaf4F9Ie47sBMqqA' LIMIT 1[0m
|
|
3071
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
3072
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'uRdVzDbBY92eYGq84p9v6w@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
3073
|
+
[1m[35mSQL (0.4ms)[0m UPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_sent_at", "2014-04-23 21:13:45.875749"], ["password_reset_token", "Oo93Zljaf4F9Ie47sBMqqA"], ["updated_at", "2014-04-23 21:13:45.877226"]]
|
|
3074
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
3075
|
+
|
|
3076
|
+
UserMailer#password_reset: processed outbound mail in 9.4ms
|
|
3077
|
+
|
|
3078
|
+
Sent mail to uRdVzDbBY92eYGq84p9v6w@sample.com (9.1ms)
|
|
3079
|
+
Date: Wed, 23 Apr 2014 23:13:45 +0200
|
|
3080
|
+
From: from@example.com
|
|
3081
|
+
To: uRdVzDbBY92eYGq84p9v6w@sample.com
|
|
3082
|
+
Message-ID: <53582d09d999d_50413fff0102dbb452c5@air.lan.mail>
|
|
3083
|
+
Subject: Password Reset
|
|
3084
|
+
Mime-Version: 1.0
|
|
3085
|
+
Content-Type: text/plain;
|
|
3086
|
+
charset=UTF-8
|
|
3087
|
+
Content-Transfer-Encoding: 7bit
|
|
3088
|
+
|
|
3089
|
+
To reset your password, click the URL below.
|
|
3090
|
+
|
|
3091
|
+
http://localhost:3000/password_resets/Oo93Zljaf4F9Ie47sBMqqA/edit
|
|
3092
|
+
|
|
3093
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
3094
|
+
Redirected to http://www.example.com/
|
|
3095
|
+
Completed 302 Found in 26ms (ActiveRecord: 1.7ms)
|
|
3096
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
3097
|
+
Processing by HomeController#index as HTML
|
|
3098
|
+
Completed 200 OK in 2ms (Views: 2.2ms | ActiveRecord: 0.0ms)
|
|
3099
|
+
Started GET "/password_resets/Oo93Zljaf4F9Ie47sBMqqA/edit" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
3100
|
+
Processing by PasswordResetsController#edit as HTML
|
|
3101
|
+
Parameters: {"id"=>"Oo93Zljaf4F9Ie47sBMqqA"}
|
|
3102
|
+
[1m[35mUser Load (0.4ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Oo93Zljaf4F9Ie47sBMqqA' LIMIT 1
|
|
3103
|
+
Completed 200 OK in 6ms (Views: 4.6ms | ActiveRecord: 0.4ms)
|
|
3104
|
+
Started PATCH "/password_resets/Oo93Zljaf4F9Ie47sBMqqA" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
3105
|
+
Processing by PasswordResetsController#update as HTML
|
|
3106
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"Oo93Zljaf4F9Ie47sBMqqA"}
|
|
3107
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Oo93Zljaf4F9Ie47sBMqqA' LIMIT 1[0m
|
|
3108
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
3109
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'uRdVzDbBY92eYGq84p9v6w@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
3110
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
|
3111
|
+
Completed 200 OK in 9ms (Views: 3.6ms | ActiveRecord: 0.5ms)
|
|
3112
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
3113
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
3114
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
3115
|
+
-----------------------------------
|
|
3116
|
+
AuthproIntegrationTest: test_signup
|
|
3117
|
+
-----------------------------------
|
|
3118
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
3119
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
3120
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'exUgtSKONQst4XNMd6844Q@sample.com' LIMIT 1
|
|
3121
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'N28G0zxJYa9DHvjcoGhBHA' LIMIT 1[0m
|
|
3122
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
3123
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "N28G0zxJYa9DHvjcoGhBHA"], ["created_at", "2014-04-23 21:13:45.957494"], ["email", "exUgtSKONQst4XNMd6844Q@sample.com"], ["password_digest", "$2a$04$toPxAH2hr5Hr5OcLA.sJF.lUxdsyQrNhluGzDS7BCWNrmLYlFmPfK"], ["updated_at", "2014-04-23 21:13:45.957494"]]
|
|
3124
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
3125
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
3126
|
+
Processing by HomeController#index as HTML
|
|
3127
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
|
3128
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
3129
|
+
Processing by UsersController#new as HTML
|
|
3130
|
+
Completed 200 OK in 6ms (Views: 5.8ms | ActiveRecord: 0.0ms)
|
|
3131
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
3132
|
+
Processing by UsersController#create as HTML
|
|
3133
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"5GhT9bI-DqvFzCO6oQFn4g@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
3134
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
3135
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '5GhT9bI-DqvFzCO6oQFn4g@sample.com' LIMIT 1[0m
|
|
3136
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'v_gYjH2em1s_TeFwBLeckg' LIMIT 1
|
|
3137
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
3138
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "v_gYjH2em1s_TeFwBLeckg"], ["created_at", "2014-04-23 21:13:45.992267"], ["email", "5GhT9bI-DqvFzCO6oQFn4g@sample.com"], ["password_digest", "$2a$04$Dr7M0TVMAKOEg9BvpyavyeSa95uI9rRXKSvSdgYrvcWyOEWoecNSm"], ["updated_at", "2014-04-23 21:13:45.992267"]]
|
|
3139
|
+
[1m[35m (1.1ms)[0m commit transaction
|
|
3140
|
+
Redirected to http://www.example.com/
|
|
3141
|
+
Completed 302 Found in 7ms (ActiveRecord: 1.6ms)
|
|
3142
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
|
3143
|
+
Processing by HomeController#index as HTML
|
|
3144
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
|
3145
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
3146
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
3147
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
3148
|
+
-------------------------------------------
|
|
3149
|
+
AuthproIntegrationTest: test_signup_failing
|
|
3150
|
+
-------------------------------------------
|
|
3151
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
3152
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
3153
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'dItJkmo92Se5s0xj7zT8lA@sample.com' LIMIT 1
|
|
3154
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'LRqrEKiJjRiCK3-qPm39bg' LIMIT 1[0m
|
|
3155
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
3156
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "LRqrEKiJjRiCK3-qPm39bg"], ["created_at", "2014-04-23 21:13:46.029680"], ["email", "dItJkmo92Se5s0xj7zT8lA@sample.com"], ["password_digest", "$2a$04$oYD59N/OeT9B3/OkPa/Qw.Kc/vQ7yhU1wQXgapn/NE1tFWVN3GNE."], ["updated_at", "2014-04-23 21:13:46.029680"]]
|
|
3157
|
+
[1m[36m (0.6ms)[0m [1mcommit transaction[0m
|
|
3158
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:46 +0200
|
|
3159
|
+
Processing by HomeController#index as HTML
|
|
3160
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
|
3161
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 23:13:46 +0200
|
|
3162
|
+
Processing by UsersController#new as HTML
|
|
3163
|
+
Completed 200 OK in 4ms (Views: 3.8ms | ActiveRecord: 0.0ms)
|
|
3164
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 23:13:46 +0200
|
|
3165
|
+
Processing by UsersController#create as HTML
|
|
3166
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"dJMpYvbCyUcJwlEORcSxgw@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
3167
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
3168
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'dJMpYvbCyUcJwlEORcSxgw@sample.com' LIMIT 1[0m
|
|
3169
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
|
3170
|
+
Completed 200 OK in 10ms (Views: 4.5ms | ActiveRecord: 0.3ms)
|
|
3171
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
|
3172
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
3173
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
3174
|
+
---------------------------------------
|
|
3175
|
+
AuthproIntegrationTest: test_visit_home
|
|
3176
|
+
---------------------------------------
|
|
3177
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
3178
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
3179
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '0m86QYTfQuIS2OG81ew3-A@sample.com' LIMIT 1
|
|
3180
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '2MhWyjg6w6PuIPyARU8bQQ' LIMIT 1[0m
|
|
3181
|
+
Binary data inserted for `string` type on column `password_digest`
|
|
3182
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "2MhWyjg6w6PuIPyARU8bQQ"], ["created_at", "2014-04-23 21:13:46.085379"], ["email", "0m86QYTfQuIS2OG81ew3-A@sample.com"], ["password_digest", "$2a$04$Iu0qJwag03YEfckMnfJ2tePhhqx.e7ChKqtv54f7nhgYip1zAjb5y"], ["updated_at", "2014-04-23 21:13:46.085379"]]
|
|
3183
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
3184
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:46 +0200
|
|
3185
|
+
Processing by HomeController#index as HTML
|
|
3186
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
|
3187
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
|
3188
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
3189
|
+
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|