authpro 1.0.1 → 1.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +4 -4
- data/lib/authpro/version.rb +2 -2
- data/test/dummy/Gemfile +8 -6
- data/test/dummy/Gemfile.lock +69 -63
- data/test/rails/dummy/Gemfile +8 -6
- data/test/rails/dummy/Gemfile.lock +69 -63
- data/test/rails/dummy/db/migrate/{20131111172934_create_users.rb → 20140423203816_create_users.rb} +0 -0
- data/test/rails/dummy/db/test.sqlite3 +0 -0
- data/test/rails/dummy/log/test.log +2998 -277
- data/test/rails/dummy/test/fixtures/users.yml +2 -2
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/13fe41fee1fe35b49d145bcc06610705 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/2f5173deea6c795b8fdde723bb4b63af +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/357970feca3ac29060c1e3861e2c0953 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/cffd775d018f68ce5dba1ee0d951a994 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/d771ace226fc8215a3572e0aa35bb0d6 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/f7cbd26ba1d28d48de824f0e94586655 +0 -0
- data/test/test_helper.rb +2 -3
- metadata +45 -60
- data/test/dummy/log/test.log +0 -72
data/test/rails/dummy/db/migrate/{20131111172934_create_users.rb → 20140423203816_create_users.rb}
RENAMED
File without changes
|
Binary file
|
@@ -1,207 +1,135 @@
|
|
1
|
-
----------------------------------------------------------------
|
2
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
3
|
-
----------------------------------------------------------------
|
4
|
-
-----------------------
|
5
|
-
AuthproTest: test_truth
|
6
|
-
-----------------------
|
7
|
-
----------------------------------------------------------------
|
8
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
9
|
-
----------------------------------------------------------------
|
10
|
-
-----------------------
|
11
|
-
AuthproTest: test_truth
|
12
|
-
-----------------------
|
13
|
-
----------------------------------------------------------------
|
14
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
15
|
-
----------------------------------------------------------------
|
16
|
-
----------------------------------------------------------------
|
17
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
18
|
-
----------------------------------------------------------------
|
19
|
-
----------------------------------------------------------------
|
20
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
21
|
-
----------------------------------------------------------------
|
22
|
-
----------------------------------------------------------------
|
23
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
24
|
-
----------------------------------------------------------------
|
25
|
-
----------------------------------------------------------------
|
26
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
27
|
-
----------------------------------------------------------------
|
28
|
-
----------------------------------------------------------------
|
29
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
30
|
-
----------------------------------------------------------------
|
31
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
32
|
-
[1m[35m (0.0ms)[0m rollback transaction
|
33
|
-
----------------------------------------------------------------
|
34
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
35
|
-
----------------------------------------------------------------
|
36
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
37
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
38
|
-
----------------------------------------------------------------
|
39
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
40
|
-
----------------------------------------------------------------
|
41
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
42
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
43
|
-
----------------------------------------------------------------
|
44
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
45
|
-
----------------------------------------------------------------
|
46
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
47
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
48
|
-
----------------------------------------------------------------
|
49
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
50
|
-
----------------------------------------------------------------
|
51
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
52
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
53
|
-
----------------------------------------------------------------
|
54
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
55
|
-
----------------------------------------------------------------
|
56
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
57
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
58
|
-
----------------------------------------------------------------
|
59
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
60
|
-
----------------------------------------------------------------
|
61
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
62
|
-
[1m[35m (0.0ms)[0m rollback transaction
|
63
|
-
----------------------------------------------------------------
|
64
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
65
|
-
----------------------------------------------------------------
|
66
|
-
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
67
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
68
|
-
----------------------------------------------------------------
|
69
|
-
AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
70
|
-
----------------------------------------------------------------
|
71
|
-
[1m[36m (0.3ms)[0m [1mbegin transaction[0m
|
72
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
73
1
|
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
74
2
|
------------------------------------------
|
75
3
|
AuthproGeneratorTest: test_generated_files
|
76
4
|
------------------------------------------
|
77
|
-
[1m[35m (0.
|
5
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
78
6
|
----------------------------------
|
79
7
|
AuthproIntegrationTest: test_login
|
80
8
|
----------------------------------
|
81
9
|
[1m[36m (1.0ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
82
|
-
[1m[35m (
|
83
|
-
[1m[36mActiveRecord::SchemaMigration Load (0.
|
84
|
-
Migrating to CreateUsers (
|
85
|
-
[1m[35m (0.1ms)[0m begin transaction
|
86
|
-
[1m[36m (0.4ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
87
|
-
[1m[35mSQL (0.3ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20131111172934"]]
|
88
|
-
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
10
|
+
[1m[35m (1.0ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
11
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
12
|
+
Migrating to CreateUsers (20140423203148)
|
89
13
|
[1m[35m (0.1ms)[0m begin transaction
|
90
|
-
[1m[
|
91
|
-
[1m[
|
14
|
+
[1m[36m (0.3ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
15
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20140423203148"]]
|
16
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
17
|
+
[1m[35m (0.3ms)[0m begin transaction
|
18
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'vSIDz2edGIi_6erWCG9Ixw@sample.com' LIMIT 1[0m
|
19
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'JTOPXMzb0vQQbdYgBrHGkg' LIMIT 1
|
92
20
|
Binary data inserted for `string` type on column `password_digest`
|
93
|
-
[1m[36mSQL (2.
|
94
|
-
[1m[35m (
|
95
|
-
Started GET "/" for 127.0.0.1 at
|
21
|
+
[1m[36mSQL (2.7ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "JTOPXMzb0vQQbdYgBrHGkg"], ["created_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00], ["email", "vSIDz2edGIi_6erWCG9Ixw@sample.com"], ["password_digest", "$2a$04$0h7lImGNuhN.h.b0XjWvwOp.YEKYQUik5KgSaAg/k1DFByh1.jA8a"], ["updated_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00]]
|
22
|
+
[1m[35m (1.1ms)[0m commit transaction
|
23
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
96
24
|
Processing by HomeController#index as HTML
|
97
|
-
Rendered home/index.html.erb within layouts/application (1.
|
98
|
-
Completed 200 OK in
|
99
|
-
Started GET "/login" for 127.0.0.1 at
|
25
|
+
Rendered home/index.html.erb within layouts/application (1.0ms)
|
26
|
+
Completed 200 OK in 26ms (Views: 25.9ms | ActiveRecord: 0.0ms)
|
27
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
100
28
|
Processing by SessionsController#new as HTML
|
101
|
-
Rendered sessions/new.html.erb within layouts/application (
|
102
|
-
Completed 200 OK in
|
103
|
-
Started POST "/sessions" for 127.0.0.1 at
|
29
|
+
Rendered sessions/new.html.erb within layouts/application (1.1ms)
|
30
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
31
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
104
32
|
Processing by SessionsController#create as HTML
|
105
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
106
|
-
[1m[36mUser Load (0.
|
33
|
+
Parameters: {"utf8"=>"✓", "email"=>"vSIDz2edGIi_6erWCG9Ixw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
34
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'vSIDz2edGIi_6erWCG9Ixw@sample.com' LIMIT 1[0m
|
107
35
|
Redirected to http://www.example.com/
|
108
|
-
Completed 302 Found in
|
109
|
-
Started GET "/" for 127.0.0.1 at
|
36
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
37
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
110
38
|
Processing by HomeController#index as HTML
|
111
39
|
Rendered home/index.html.erb within layouts/application (0.1ms)
|
112
|
-
[1m[35mUser Load (0.
|
113
|
-
Completed 200 OK in
|
114
|
-
[1m[36m (0.
|
115
|
-
[1m[35m (0.
|
116
|
-
[1m[36m (
|
40
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'JTOPXMzb0vQQbdYgBrHGkg' LIMIT 1
|
41
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.1ms)
|
42
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
43
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
44
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
117
45
|
------------------------------------------
|
118
46
|
AuthproIntegrationTest: test_login_failing
|
119
47
|
------------------------------------------
|
120
48
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
121
49
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
122
|
-
[1m[35mUser Exists (0.
|
123
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
50
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'gZss5woFry0ZuIhRLl46SA@sample.com' LIMIT 1
|
51
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'WCJUVoRJSHng2Rnpjtz5UA' LIMIT 1[0m
|
124
52
|
Binary data inserted for `string` type on column `password_digest`
|
125
|
-
[1m[35mSQL (0.
|
126
|
-
[1m[36m (0.
|
127
|
-
Started GET "/" for 127.0.0.1 at
|
53
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "WCJUVoRJSHng2Rnpjtz5UA"], ["created_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00], ["email", "gZss5woFry0ZuIhRLl46SA@sample.com"], ["password_digest", "$2a$04$WwwDzCUJysSfjUOCVhClGOckH2BMPn3DaV0HWnxc599NsposuPKKK"], ["updated_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00]]
|
54
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
55
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
128
56
|
Processing by HomeController#index as HTML
|
129
|
-
Completed 200 OK in
|
130
|
-
Started GET "/login" for 127.0.0.1 at
|
57
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
58
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
131
59
|
Processing by SessionsController#new as HTML
|
132
|
-
Completed 200 OK in
|
133
|
-
Started POST "/sessions" for 127.0.0.1 at
|
60
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
61
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
134
62
|
Processing by SessionsController#create as HTML
|
135
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
136
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
137
|
-
Completed 200 OK in
|
138
|
-
[1m[36m (0.
|
139
|
-
[1m[35m (0.
|
140
|
-
[1m[36m (0.
|
63
|
+
Parameters: {"utf8"=>"✓", "email"=>"gZss5woFry0ZuIhRLl46SA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
64
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'gZss5woFry0ZuIhRLl46SA@sample.com' LIMIT 1
|
65
|
+
Completed 200 OK in 3ms (Views: 1.2ms | ActiveRecord: 0.2ms)
|
66
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
67
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
68
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
141
69
|
-----------------------------------
|
142
70
|
AuthproIntegrationTest: test_logout
|
143
71
|
-----------------------------------
|
144
72
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
145
73
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
146
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
147
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
74
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'S2pIwpRkmIE5irako3UrYA@sample.com' LIMIT 1
|
75
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'EwMwNIu0oonCA8-KghmDwA' LIMIT 1[0m
|
148
76
|
Binary data inserted for `string` type on column `password_digest`
|
149
|
-
[1m[35mSQL (0.
|
77
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "EwMwNIu0oonCA8-KghmDwA"], ["created_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00], ["email", "S2pIwpRkmIE5irako3UrYA@sample.com"], ["password_digest", "$2a$04$Unv5zybIczgEPS8HtPdSw.zkq.fc1yA1JmLle88yCCwiEHZAjb5ei"], ["updated_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00]]
|
150
78
|
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
151
|
-
Started GET "/login" for 127.0.0.1 at
|
79
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
152
80
|
Processing by SessionsController#new as HTML
|
153
|
-
Completed 200 OK in 2ms (Views: 1.
|
154
|
-
Started POST "/sessions" for 127.0.0.1 at
|
81
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
82
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
155
83
|
Processing by SessionsController#create as HTML
|
156
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
157
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
84
|
+
Parameters: {"utf8"=>"✓", "email"=>"S2pIwpRkmIE5irako3UrYA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
85
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'S2pIwpRkmIE5irako3UrYA@sample.com' LIMIT 1
|
158
86
|
Redirected to http://www.example.com/
|
159
|
-
Completed 302 Found in
|
160
|
-
Started GET "/" for 127.0.0.1 at
|
87
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
88
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
161
89
|
Processing by HomeController#index as HTML
|
162
|
-
[1m[36mUser Load (0.
|
163
|
-
Completed 200 OK in 2ms (Views: 1.
|
164
|
-
Started GET "/logout" for 127.0.0.1 at
|
90
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'EwMwNIu0oonCA8-KghmDwA' LIMIT 1[0m
|
91
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.2ms)
|
92
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
165
93
|
Processing by SessionsController#destroy as HTML
|
166
94
|
Redirected to http://www.example.com/
|
167
95
|
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
168
|
-
Started GET "/" for 127.0.0.1 at
|
96
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
169
97
|
Processing by HomeController#index as HTML
|
170
|
-
Completed 200 OK in 2ms (Views: 1.
|
171
|
-
[1m[35m (
|
98
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
99
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
172
100
|
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
173
|
-
[1m[35m (0.
|
101
|
+
[1m[35m (0.5ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
174
102
|
-------------------------------------------
|
175
103
|
AuthproIntegrationTest: test_reset_password
|
176
104
|
-------------------------------------------
|
177
105
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
178
106
|
[1m[35m (0.1ms)[0m begin transaction
|
179
|
-
[1m[36mUser Exists (0.
|
180
|
-
[1m[35mUser Exists (0.
|
107
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'oZo7301roOTH6SqLSiF20Q@sample.com' LIMIT 1[0m
|
108
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'mENVKXio1Qf64wvFKm2XXw' LIMIT 1
|
181
109
|
Binary data inserted for `string` type on column `password_digest`
|
182
|
-
[1m[36mSQL (0.
|
110
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "mENVKXio1Qf64wvFKm2XXw"], ["created_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00], ["email", "oZo7301roOTH6SqLSiF20Q@sample.com"], ["password_digest", "$2a$04$jr9FpHp3nz96/Uv3kbFAfujAkZIuMGLboTVlDH7qRdboUBfoG7hKi"], ["updated_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00]]
|
183
111
|
[1m[35m (0.8ms)[0m commit transaction
|
184
|
-
Started GET "/login" for 127.0.0.1 at
|
112
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
185
113
|
Processing by SessionsController#new as HTML
|
186
|
-
Completed 200 OK in
|
187
|
-
Started GET "/password_resets/new" for 127.0.0.1 at
|
114
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
115
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
188
116
|
Processing by PasswordResetsController#new as HTML
|
189
|
-
Completed 200 OK in
|
190
|
-
Started POST "/password_resets" for 127.0.0.1 at
|
117
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
118
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:31:48 +0200
|
191
119
|
Processing by PasswordResetsController#create as HTML
|
192
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
193
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
194
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
120
|
+
Parameters: {"utf8"=>"✓", "email"=>"oZo7301roOTH6SqLSiF20Q@sample.com", "commit"=>"Reset password"}
|
121
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'oZo7301roOTH6SqLSiF20Q@sample.com' LIMIT 1[0m
|
122
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'U7nsU0mcU1kjxW93-seMVA' LIMIT 1
|
195
123
|
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
196
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
197
|
-
[1m[36mSQL (0.
|
198
|
-
[1m[35m (0.
|
124
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'oZo7301roOTH6SqLSiF20Q@sample.com' AND "users"."id" != 1) LIMIT 1
|
125
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "U7nsU0mcU1kjxW93-seMVA"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:31:48 UTC +00:00]]
|
126
|
+
[1m[35m (0.8ms)[0m commit transaction
|
199
127
|
|
200
|
-
Sent mail to
|
201
|
-
Date:
|
128
|
+
Sent mail to oZo7301roOTH6SqLSiF20Q@sample.com (10.2ms)
|
129
|
+
Date: Wed, 23 Apr 2014 22:31:49 +0200
|
202
130
|
From: from@example.com
|
203
|
-
To:
|
204
|
-
Message-ID: <
|
131
|
+
To: oZo7301roOTH6SqLSiF20Q@sample.com
|
132
|
+
Message-ID: <535823351c43e_49ee3fe75882dbb899065@air.lan.mail>
|
205
133
|
Subject: Password Reset
|
206
134
|
Mime-Version: 1.0
|
207
135
|
Content-Type: text/plain;
|
@@ -210,91 +138,91 @@ Content-Transfer-Encoding: 7bit
|
|
210
138
|
|
211
139
|
To reset your password, click the URL below.
|
212
140
|
|
213
|
-
http://localhost:3000/password_resets/
|
141
|
+
http://localhost:3000/password_resets/U7nsU0mcU1kjxW93-seMVA/edit
|
214
142
|
|
215
143
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
216
144
|
Redirected to http://www.example.com/
|
217
|
-
Completed 302 Found in
|
218
|
-
Started GET "/" for 127.0.0.1 at
|
145
|
+
Completed 302 Found in 201ms (ActiveRecord: 1.5ms)
|
146
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
219
147
|
Processing by HomeController#index as HTML
|
220
148
|
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
221
|
-
Started GET "/password_resets/
|
149
|
+
Started GET "/password_resets/U7nsU0mcU1kjxW93-seMVA/edit" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
222
150
|
Processing by PasswordResetsController#edit as HTML
|
223
|
-
Parameters: {"id"=>"
|
224
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
225
|
-
Completed 200 OK in
|
226
|
-
Started PATCH "/password_resets/
|
151
|
+
Parameters: {"id"=>"U7nsU0mcU1kjxW93-seMVA"}
|
152
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'U7nsU0mcU1kjxW93-seMVA' LIMIT 1[0m
|
153
|
+
Completed 200 OK in 11ms (Views: 10.0ms | ActiveRecord: 0.2ms)
|
154
|
+
Started PATCH "/password_resets/U7nsU0mcU1kjxW93-seMVA" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
227
155
|
Processing by PasswordResetsController#update as HTML
|
228
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
229
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
156
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"U7nsU0mcU1kjxW93-seMVA"}
|
157
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'U7nsU0mcU1kjxW93-seMVA' LIMIT 1
|
230
158
|
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
231
|
-
[1m[35mUser Exists (0.
|
159
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'oZo7301roOTH6SqLSiF20Q@sample.com' AND "users"."id" != 1) LIMIT 1
|
232
160
|
Binary data inserted for `string` type on column `password_digest`
|
233
|
-
[1m[36mSQL (0.
|
234
|
-
[1m[35m (
|
161
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$QWcHzQ2oTUr0ONnx.kXZpOU4zTeORnugUuw94PEwNzitkepgoaXjy"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
162
|
+
[1m[35m (0.9ms)[0m commit transaction
|
235
163
|
Redirected to http://localhost:3000/
|
236
|
-
Completed 302 Found in 7ms (ActiveRecord:
|
237
|
-
Started GET "/" for 127.0.0.1 at
|
164
|
+
Completed 302 Found in 7ms (ActiveRecord: 1.8ms)
|
165
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
238
166
|
Processing by HomeController#index as HTML
|
239
|
-
Completed 200 OK in 1ms (Views: 1.
|
167
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
240
168
|
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
241
|
-
[1m[35m (0.
|
169
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
242
170
|
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
243
171
|
--------------------------------------------------------------------------------
|
244
172
|
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
245
173
|
--------------------------------------------------------------------------------
|
246
174
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
247
175
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
248
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
249
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
176
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'rgiDtRncDetrvKmVdfdT9Q@sample.com' LIMIT 1
|
177
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '3uU_OYgQ3ufX6NUPD-_Dwg' LIMIT 1[0m
|
250
178
|
Binary data inserted for `string` type on column `password_digest`
|
251
|
-
[1m[35mSQL (0.
|
179
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "3uU_OYgQ3ufX6NUPD-_Dwg"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "rgiDtRncDetrvKmVdfdT9Q@sample.com"], ["password_digest", "$2a$04$ASaZsbMK3yCoBITNxXgVHegoXY3tbPct5NjBDZXVDom8LyNZKCmdu"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
252
180
|
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
253
|
-
Started GET "/login" for 127.0.0.1 at
|
181
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
254
182
|
Processing by SessionsController#new as HTML
|
255
|
-
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
256
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-11-11 18:29:35 +0100
|
257
|
-
Processing by PasswordResetsController#new as HTML
|
258
183
|
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
259
|
-
Started
|
184
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
185
|
+
Processing by PasswordResetsController#new as HTML
|
186
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
187
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
260
188
|
Processing by PasswordResetsController#create as HTML
|
261
189
|
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
262
190
|
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
263
|
-
Completed 200 OK in
|
191
|
+
Completed 200 OK in 2ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
264
192
|
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
265
193
|
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
266
|
-
[1m[36m (0.
|
194
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
267
195
|
-------------------------------------------------------------------------
|
268
196
|
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
269
197
|
-------------------------------------------------------------------------
|
270
198
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
271
199
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
272
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
273
|
-
[1m[36mUser Exists (0.
|
200
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'Vj3dlIMb1aJI3AZG5y5UWA@sample.com' LIMIT 1
|
201
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'Zoa9_c8FuctQz1ErbWciVw' LIMIT 1[0m
|
274
202
|
Binary data inserted for `string` type on column `password_digest`
|
275
|
-
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "
|
203
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "Zoa9_c8FuctQz1ErbWciVw"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "Vj3dlIMb1aJI3AZG5y5UWA@sample.com"], ["password_digest", "$2a$04$APRyb4TLNjMOx0tlQPJxO.9cKuEZGFGmuRN1NfQ3CZ.FVx8yKKsdi"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
276
204
|
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
277
|
-
Started GET "/login" for 127.0.0.1 at
|
205
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
278
206
|
Processing by SessionsController#new as HTML
|
279
|
-
Completed 200 OK in 2ms (Views: 1.
|
280
|
-
Started GET "/password_resets/new" for 127.0.0.1 at
|
207
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
208
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
281
209
|
Processing by PasswordResetsController#new as HTML
|
282
210
|
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
283
|
-
Started POST "/password_resets" for 127.0.0.1 at
|
211
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
284
212
|
Processing by PasswordResetsController#create as HTML
|
285
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
286
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
287
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
213
|
+
Parameters: {"utf8"=>"✓", "email"=>"Vj3dlIMb1aJI3AZG5y5UWA@sample.com", "commit"=>"Reset password"}
|
214
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'Vj3dlIMb1aJI3AZG5y5UWA@sample.com' LIMIT 1
|
215
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'yXJaGO6lae4P1PbmadSFtg' LIMIT 1[0m
|
288
216
|
[1m[35m (0.0ms)[0m begin transaction
|
289
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
290
|
-
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "
|
291
|
-
[1m[36m (0.
|
217
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'Vj3dlIMb1aJI3AZG5y5UWA@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
218
|
+
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "yXJaGO6lae4P1PbmadSFtg"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
219
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
292
220
|
|
293
|
-
Sent mail to
|
294
|
-
Date:
|
221
|
+
Sent mail to Vj3dlIMb1aJI3AZG5y5UWA@sample.com (5.4ms)
|
222
|
+
Date: Wed, 23 Apr 2014 22:31:49 +0200
|
295
223
|
From: from@example.com
|
296
|
-
To:
|
297
|
-
Message-ID: <
|
224
|
+
To: Vj3dlIMb1aJI3AZG5y5UWA@sample.com
|
225
|
+
Message-ID: <535823353bab0_49ee3fe75882dbb89919a@air.lan.mail>
|
298
226
|
Subject: Password Reset
|
299
227
|
Mime-Version: 1.0
|
300
228
|
Content-Type: text/plain;
|
@@ -303,62 +231,62 @@ Content-Transfer-Encoding: 7bit
|
|
303
231
|
|
304
232
|
To reset your password, click the URL below.
|
305
233
|
|
306
|
-
http://localhost:3000/password_resets/
|
234
|
+
http://localhost:3000/password_resets/yXJaGO6lae4P1PbmadSFtg/edit
|
307
235
|
|
308
236
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
309
237
|
Redirected to http://www.example.com/
|
310
|
-
Completed 302 Found in
|
311
|
-
Started GET "/" for 127.0.0.1 at
|
238
|
+
Completed 302 Found in 15ms (ActiveRecord: 1.5ms)
|
239
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
312
240
|
Processing by HomeController#index as HTML
|
313
|
-
Completed 200 OK in 2ms (Views: 1.
|
314
|
-
Started GET "/password_resets/
|
241
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
242
|
+
Started GET "/password_resets/yXJaGO6lae4P1PbmadSFtg/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
315
243
|
Processing by PasswordResetsController#edit as HTML
|
316
|
-
Parameters: {"id"=>"
|
317
|
-
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
244
|
+
Parameters: {"id"=>"yXJaGO6lae4P1PbmadSFtg"}
|
245
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'yXJaGO6lae4P1PbmadSFtg' LIMIT 1
|
318
246
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
319
|
-
Started PATCH "/password_resets/
|
247
|
+
Started PATCH "/password_resets/yXJaGO6lae4P1PbmadSFtg" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
320
248
|
Processing by PasswordResetsController#update as HTML
|
321
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
322
|
-
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
249
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"yXJaGO6lae4P1PbmadSFtg"}
|
250
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'yXJaGO6lae4P1PbmadSFtg' LIMIT 1[0m
|
323
251
|
Redirected to http://localhost:3000/password_resets/new
|
324
252
|
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
325
|
-
Started GET "/password_resets/new" for 127.0.0.1 at
|
253
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
326
254
|
Processing by PasswordResetsController#new as HTML
|
327
255
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
328
|
-
[1m[35m (
|
256
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
329
257
|
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
330
|
-
[1m[35m (0.
|
258
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
331
259
|
-------------------------------------------------------------------------------------------
|
332
260
|
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
333
261
|
-------------------------------------------------------------------------------------------
|
334
262
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
335
263
|
[1m[35m (0.1ms)[0m begin transaction
|
336
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
337
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
264
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'FrQwp-vsKPH9d46yqVeZrA@sample.com' LIMIT 1[0m
|
265
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '_IigZ0GUEarQNzUJRvlUvg' LIMIT 1
|
338
266
|
Binary data inserted for `string` type on column `password_digest`
|
339
|
-
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
340
|
-
[1m[35m (0.
|
341
|
-
Started GET "/login" for 127.0.0.1 at
|
267
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "_IigZ0GUEarQNzUJRvlUvg"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "FrQwp-vsKPH9d46yqVeZrA@sample.com"], ["password_digest", "$2a$04$NgAbkgrGCyd8vRJyE2FMgu7R/jyIOM4eQTlQNMvCXL6TErviI32rq"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
268
|
+
[1m[35m (0.9ms)[0m commit transaction
|
269
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
342
270
|
Processing by SessionsController#new as HTML
|
343
|
-
Completed 200 OK in 2ms (Views: 1.
|
344
|
-
Started GET "/password_resets/new" for 127.0.0.1 at
|
271
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
272
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
345
273
|
Processing by PasswordResetsController#new as HTML
|
346
|
-
Completed 200 OK in
|
347
|
-
Started POST "/password_resets" for 127.0.0.1 at
|
274
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
275
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
348
276
|
Processing by PasswordResetsController#create as HTML
|
349
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
350
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
351
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
277
|
+
Parameters: {"utf8"=>"✓", "email"=>"FrQwp-vsKPH9d46yqVeZrA@sample.com", "commit"=>"Reset password"}
|
278
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'FrQwp-vsKPH9d46yqVeZrA@sample.com' LIMIT 1[0m
|
279
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'OojeQOotAJgQLyj_LMBX1A' LIMIT 1
|
352
280
|
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
353
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
354
|
-
[1m[36mSQL (0.
|
355
|
-
[1m[35m (0.
|
281
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'FrQwp-vsKPH9d46yqVeZrA@sample.com' AND "users"."id" != 1) LIMIT 1
|
282
|
+
[1m[36mSQL (0.2ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "OojeQOotAJgQLyj_LMBX1A"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
283
|
+
[1m[35m (0.9ms)[0m commit transaction
|
356
284
|
|
357
|
-
Sent mail to
|
358
|
-
Date:
|
285
|
+
Sent mail to FrQwp-vsKPH9d46yqVeZrA@sample.com (4.9ms)
|
286
|
+
Date: Wed, 23 Apr 2014 22:31:49 +0200
|
359
287
|
From: from@example.com
|
360
|
-
To:
|
361
|
-
Message-ID: <
|
288
|
+
To: FrQwp-vsKPH9d46yqVeZrA@sample.com
|
289
|
+
Message-ID: <5358233552f69_49ee3fe75882dbb8992e4@air.lan.mail>
|
362
290
|
Subject: Password Reset
|
363
291
|
Mime-Version: 1.0
|
364
292
|
Content-Type: text/plain;
|
@@ -367,61 +295,61 @@ Content-Transfer-Encoding: 7bit
|
|
367
295
|
|
368
296
|
To reset your password, click the URL below.
|
369
297
|
|
370
|
-
http://localhost:3000/password_resets/
|
298
|
+
http://localhost:3000/password_resets/OojeQOotAJgQLyj_LMBX1A/edit
|
371
299
|
|
372
300
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
373
301
|
Redirected to http://www.example.com/
|
374
|
-
Completed 302 Found in
|
375
|
-
Started GET "/" for 127.0.0.1 at
|
302
|
+
Completed 302 Found in 17ms (ActiveRecord: 1.4ms)
|
303
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
376
304
|
Processing by HomeController#index as HTML
|
377
|
-
Completed 200 OK in
|
378
|
-
Started GET "/password_resets/
|
305
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
306
|
+
Started GET "/password_resets/OojeQOotAJgQLyj_LMBX1A/edit" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
379
307
|
Processing by PasswordResetsController#edit as HTML
|
380
|
-
Parameters: {"id"=>"
|
381
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
308
|
+
Parameters: {"id"=>"OojeQOotAJgQLyj_LMBX1A"}
|
309
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'OojeQOotAJgQLyj_LMBX1A' LIMIT 1[0m
|
382
310
|
Completed 200 OK in 3ms (Views: 2.3ms | ActiveRecord: 0.2ms)
|
383
|
-
Started PATCH "/password_resets/
|
311
|
+
Started PATCH "/password_resets/OojeQOotAJgQLyj_LMBX1A" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
384
312
|
Processing by PasswordResetsController#update as HTML
|
385
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
386
|
-
[1m[35mUser Load (0.
|
313
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"OojeQOotAJgQLyj_LMBX1A"}
|
314
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'OojeQOotAJgQLyj_LMBX1A' LIMIT 1
|
387
315
|
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
388
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
316
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'FrQwp-vsKPH9d46yqVeZrA@sample.com' AND "users"."id" != 1) LIMIT 1
|
389
317
|
[1m[36m (0.0ms)[0m [1mrollback transaction[0m
|
390
|
-
Completed 200 OK in
|
391
|
-
[1m[35m (0.
|
392
|
-
[1m[36m (0.
|
318
|
+
Completed 200 OK in 6ms (Views: 2.3ms | ActiveRecord: 0.3ms)
|
319
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
320
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
393
321
|
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
394
322
|
-----------------------------------
|
395
323
|
AuthproIntegrationTest: test_signup
|
396
324
|
-----------------------------------
|
397
325
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
398
326
|
[1m[35m (0.1ms)[0m begin transaction
|
399
|
-
[1m[36mUser Exists (0.
|
400
|
-
[1m[35mUser Exists (0.
|
327
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'tvuWNAeD_56dstvCO6BjVg@sample.com' LIMIT 1[0m
|
328
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'LH3HROteORwVOUL0Ir0PBA' LIMIT 1
|
401
329
|
Binary data inserted for `string` type on column `password_digest`
|
402
|
-
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
403
|
-
[1m[35m (0.
|
404
|
-
Started GET "/" for 127.0.0.1 at
|
330
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "LH3HROteORwVOUL0Ir0PBA"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "tvuWNAeD_56dstvCO6BjVg@sample.com"], ["password_digest", "$2a$04$x84NnYVR9azMo7wcUDjKxe2gQ68DkU1RVKabp3QYoZgsQDdVXIh1K"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
331
|
+
[1m[35m (0.9ms)[0m commit transaction
|
332
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
405
333
|
Processing by HomeController#index as HTML
|
406
|
-
Completed 200 OK in 1ms (Views: 1.
|
407
|
-
Started GET "/signup" for 127.0.0.1 at
|
334
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
335
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
408
336
|
Processing by UsersController#new as HTML
|
409
|
-
Completed 200 OK in
|
410
|
-
Started POST "/users" for 127.0.0.1 at
|
337
|
+
Completed 200 OK in 6ms (Views: 5.4ms | ActiveRecord: 0.0ms)
|
338
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
411
339
|
Processing by UsersController#create as HTML
|
412
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
340
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"dw0ww67R5DcTPcYCP3k2iA@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
413
341
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
414
|
-
[1m[35mUser Exists (0.
|
415
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
342
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'dw0ww67R5DcTPcYCP3k2iA@sample.com' LIMIT 1
|
343
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'AmlnxmmbTR1Guflp3kCiAg' LIMIT 1[0m
|
416
344
|
Binary data inserted for `string` type on column `password_digest`
|
417
|
-
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "
|
418
|
-
[1m[36m (0.
|
345
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "AmlnxmmbTR1Guflp3kCiAg"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "dw0ww67R5DcTPcYCP3k2iA@sample.com"], ["password_digest", "$2a$04$.QlRPaftmslSs0YxTc/MwuY.TRtogQp63p98biCDxmqVm.IXvnMNK"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
346
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
419
347
|
Redirected to http://www.example.com/
|
420
|
-
Completed 302 Found in
|
421
|
-
Started GET "/" for 127.0.0.1 at
|
348
|
+
Completed 302 Found in 6ms (ActiveRecord: 1.5ms)
|
349
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
422
350
|
Processing by HomeController#index as HTML
|
423
351
|
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
424
|
-
[1m[35m (
|
352
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
425
353
|
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
426
354
|
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
427
355
|
-------------------------------------------
|
@@ -429,40 +357,2833 @@ AuthproIntegrationTest: test_signup_failing
|
|
429
357
|
-------------------------------------------
|
430
358
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
431
359
|
[1m[35m (0.1ms)[0m begin transaction
|
432
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
433
|
-
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
360
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'iFdXiLm9YLw2dUBl7xyB7A@sample.com' LIMIT 1[0m
|
361
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'rpl4AbvL5x1vjrYDd-Y_0g' LIMIT 1
|
434
362
|
Binary data inserted for `string` type on column `password_digest`
|
435
|
-
[1m[36mSQL (0.
|
436
|
-
[1m[35m (
|
437
|
-
Started GET "/" for 127.0.0.1 at
|
363
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "rpl4AbvL5x1vjrYDd-Y_0g"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "iFdXiLm9YLw2dUBl7xyB7A@sample.com"], ["password_digest", "$2a$04$y6lRLJTkwFYgzwtNTAZmv.OPyAW2lIm.vOL5g/IQGMUYbAeOVh5IG"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
364
|
+
[1m[35m (0.8ms)[0m commit transaction
|
365
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
438
366
|
Processing by HomeController#index as HTML
|
439
|
-
Completed 200 OK in 1ms (Views: 1.
|
440
|
-
Started GET "/signup" for 127.0.0.1 at
|
367
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
368
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
441
369
|
Processing by UsersController#new as HTML
|
442
|
-
Completed 200 OK in
|
443
|
-
Started POST "/users" for 127.0.0.1 at
|
370
|
+
Completed 200 OK in 4ms (Views: 4.2ms | ActiveRecord: 0.0ms)
|
371
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
444
372
|
Processing by UsersController#create as HTML
|
445
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
373
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"Kk36uaQBjdar0smAmUuS6w@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
446
374
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
447
|
-
[1m[35mUser Exists (0.
|
448
|
-
[1m[36m (0.
|
449
|
-
Completed 200 OK in
|
375
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'Kk36uaQBjdar0smAmUuS6w@sample.com' LIMIT 1
|
376
|
+
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
377
|
+
Completed 200 OK in 7ms (Views: 3.6ms | ActiveRecord: 0.3ms)
|
450
378
|
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
451
379
|
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
452
|
-
[1m[35m (0.
|
380
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
453
381
|
---------------------------------------
|
454
382
|
AuthproIntegrationTest: test_visit_home
|
455
383
|
---------------------------------------
|
456
384
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
457
385
|
[1m[35m (0.1ms)[0m begin transaction
|
458
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
459
|
-
[1m[35mUser Exists (0.
|
386
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '2EInV3A1WmZfT-WAeaBfIA@sample.com' LIMIT 1[0m
|
387
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'xUqieAtfYfRCNvC9282B7w' LIMIT 1
|
388
|
+
Binary data inserted for `string` type on column `password_digest`
|
389
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "xUqieAtfYfRCNvC9282B7w"], ["created_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00], ["email", "2EInV3A1WmZfT-WAeaBfIA@sample.com"], ["password_digest", "$2a$04$lbOxiDC4T9NtOjcKYC6zr.boH1dT7ph1UUTwVedfLlQ/S.EYLzrEa"], ["updated_at", Wed, 23 Apr 2014 20:31:49 UTC +00:00]]
|
390
|
+
[1m[35m (1.0ms)[0m commit transaction
|
391
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:31:49 +0200
|
392
|
+
Processing by HomeController#index as HTML
|
393
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
394
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
395
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
396
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
397
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
398
|
+
------------------------------------------
|
399
|
+
AuthproGeneratorTest: test_generated_files
|
400
|
+
------------------------------------------
|
401
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
402
|
+
----------------------------------
|
403
|
+
AuthproIntegrationTest: test_login
|
404
|
+
----------------------------------
|
405
|
+
[1m[36m (1.4ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
406
|
+
[1m[35m (1.2ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
407
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.2ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
408
|
+
Migrating to CreateUsers (20140423203225)
|
409
|
+
[1m[35m (0.1ms)[0m begin transaction
|
410
|
+
[1m[36m (0.3ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
411
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20140423203225"]]
|
412
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
413
|
+
[1m[35m (0.1ms)[0m begin transaction
|
414
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'uwCtFVZjOBqQvw6eTUmnrQ@sample.com' LIMIT 1[0m
|
415
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'r3DvqInQobjZR9lVKF7rkg' LIMIT 1
|
416
|
+
Binary data inserted for `string` type on column `password_digest`
|
417
|
+
[1m[36mSQL (2.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "r3DvqInQobjZR9lVKF7rkg"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "uwCtFVZjOBqQvw6eTUmnrQ@sample.com"], ["password_digest", "$2a$04$y14WSKtVnSbNKXk2mZabeOOkwiaSWDxyvrO9z5zml4QCbl9HhaNn2"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
418
|
+
[1m[35m (0.9ms)[0m commit transaction
|
419
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
420
|
+
Processing by HomeController#index as HTML
|
421
|
+
Rendered home/index.html.erb within layouts/application (1.1ms)
|
422
|
+
Completed 200 OK in 21ms (Views: 20.4ms | ActiveRecord: 0.0ms)
|
423
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
424
|
+
Processing by SessionsController#new as HTML
|
425
|
+
Rendered sessions/new.html.erb within layouts/application (1.0ms)
|
426
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
427
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
428
|
+
Processing by SessionsController#create as HTML
|
429
|
+
Parameters: {"utf8"=>"✓", "email"=>"uwCtFVZjOBqQvw6eTUmnrQ@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
430
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'uwCtFVZjOBqQvw6eTUmnrQ@sample.com' LIMIT 1[0m
|
431
|
+
Redirected to http://www.example.com/
|
432
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
433
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
434
|
+
Processing by HomeController#index as HTML
|
435
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
436
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'r3DvqInQobjZR9lVKF7rkg' LIMIT 1
|
437
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.1ms)
|
438
|
+
[1m[36m (2.8ms)[0m [1mDELETE FROM "users";[0m
|
439
|
+
[1m[35m (0.3ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
440
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
441
|
+
------------------------------------------
|
442
|
+
AuthproIntegrationTest: test_login_failing
|
443
|
+
------------------------------------------
|
444
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
445
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
446
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'd0X0dL-umXWXX7ZWyW1V7g@sample.com' LIMIT 1
|
447
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'uuaU6a10qbOv15h6pEphLw' LIMIT 1[0m
|
448
|
+
Binary data inserted for `string` type on column `password_digest`
|
449
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "uuaU6a10qbOv15h6pEphLw"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "d0X0dL-umXWXX7ZWyW1V7g@sample.com"], ["password_digest", "$2a$04$vftYivgCOljNzpEmXMUlyO8jRIxh60EhoPkSeU8dF.x/7DuB1pl8G"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
450
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
451
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
452
|
+
Processing by HomeController#index as HTML
|
453
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
454
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
455
|
+
Processing by SessionsController#new as HTML
|
456
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
457
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
458
|
+
Processing by SessionsController#create as HTML
|
459
|
+
Parameters: {"utf8"=>"✓", "email"=>"d0X0dL-umXWXX7ZWyW1V7g@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
460
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'd0X0dL-umXWXX7ZWyW1V7g@sample.com' LIMIT 1
|
461
|
+
Completed 200 OK in 4ms (Views: 1.4ms | ActiveRecord: 0.2ms)
|
462
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
463
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
464
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
465
|
+
-----------------------------------
|
466
|
+
AuthproIntegrationTest: test_logout
|
467
|
+
-----------------------------------
|
468
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
469
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
470
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'l-CChuiaMKtY3ZgiRl4Ypw@sample.com' LIMIT 1
|
471
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'eFY6eUaIGSMXomX-sALVGQ' LIMIT 1[0m
|
472
|
+
Binary data inserted for `string` type on column `password_digest`
|
473
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "eFY6eUaIGSMXomX-sALVGQ"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "l-CChuiaMKtY3ZgiRl4Ypw@sample.com"], ["password_digest", "$2a$04$lpn8.LtRmnwNKn27pfz2jusnB2lvZehFRvKrx50.khfkXQg5dIDM6"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
474
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
475
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
476
|
+
Processing by SessionsController#new as HTML
|
477
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
478
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
479
|
+
Processing by SessionsController#create as HTML
|
480
|
+
Parameters: {"utf8"=>"✓", "email"=>"l-CChuiaMKtY3ZgiRl4Ypw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
481
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'l-CChuiaMKtY3ZgiRl4Ypw@sample.com' LIMIT 1
|
482
|
+
Redirected to http://www.example.com/
|
483
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
484
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
485
|
+
Processing by HomeController#index as HTML
|
486
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'eFY6eUaIGSMXomX-sALVGQ' LIMIT 1[0m
|
487
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.2ms)
|
488
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
489
|
+
Processing by SessionsController#destroy as HTML
|
490
|
+
Redirected to http://www.example.com/
|
491
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
492
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
493
|
+
Processing by HomeController#index as HTML
|
494
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
495
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
496
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
497
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
498
|
+
-------------------------------------------
|
499
|
+
AuthproIntegrationTest: test_reset_password
|
500
|
+
-------------------------------------------
|
501
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.2ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
502
|
+
[1m[35m (0.1ms)[0m begin transaction
|
503
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '45MtyQDA5Jn97XRo56WORw@sample.com' LIMIT 1[0m
|
504
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'Gfq1iMl0I84DUXTXuqdF-g' LIMIT 1
|
460
505
|
Binary data inserted for `string` type on column `password_digest`
|
461
|
-
[1m[36mSQL (0.
|
506
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "Gfq1iMl0I84DUXTXuqdF-g"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "45MtyQDA5Jn97XRo56WORw@sample.com"], ["password_digest", "$2a$04$MqKoFACJkeqbGFxSPr0ZqOJxUo77j.Gfqu7i.kWFivYLSuF/OgdRy"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
507
|
+
[1m[35m (0.9ms)[0m commit transaction
|
508
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
509
|
+
Processing by SessionsController#new as HTML
|
510
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
511
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
512
|
+
Processing by PasswordResetsController#new as HTML
|
513
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
514
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
515
|
+
Processing by PasswordResetsController#create as HTML
|
516
|
+
Parameters: {"utf8"=>"✓", "email"=>"45MtyQDA5Jn97XRo56WORw@sample.com", "commit"=>"Reset password"}
|
517
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '45MtyQDA5Jn97XRo56WORw@sample.com' LIMIT 1[0m
|
518
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'I0EWouN19bC7qTWUYY_DHQ' LIMIT 1
|
519
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
520
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '45MtyQDA5Jn97XRo56WORw@sample.com' AND "users"."id" != 1) LIMIT 1
|
521
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "I0EWouN19bC7qTWUYY_DHQ"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
462
522
|
[1m[35m (0.9ms)[0m commit transaction
|
463
|
-
|
523
|
+
|
524
|
+
Sent mail to 45MtyQDA5Jn97XRo56WORw@sample.com (9.5ms)
|
525
|
+
Date: Wed, 23 Apr 2014 22:32:25 +0200
|
526
|
+
From: from@example.com
|
527
|
+
To: 45MtyQDA5Jn97XRo56WORw@sample.com
|
528
|
+
Message-ID: <53582359b45b3_4a1d3feb4c82dbc088965@air.lan.mail>
|
529
|
+
Subject: Password Reset
|
530
|
+
Mime-Version: 1.0
|
531
|
+
Content-Type: text/plain;
|
532
|
+
charset=UTF-8
|
533
|
+
Content-Transfer-Encoding: 7bit
|
534
|
+
|
535
|
+
To reset your password, click the URL below.
|
536
|
+
|
537
|
+
http://localhost:3000/password_resets/I0EWouN19bC7qTWUYY_DHQ/edit
|
538
|
+
|
539
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
540
|
+
Redirected to http://www.example.com/
|
541
|
+
Completed 302 Found in 175ms (ActiveRecord: 1.9ms)
|
542
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
543
|
+
Processing by HomeController#index as HTML
|
544
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
545
|
+
Started GET "/password_resets/I0EWouN19bC7qTWUYY_DHQ/edit" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
546
|
+
Processing by PasswordResetsController#edit as HTML
|
547
|
+
Parameters: {"id"=>"I0EWouN19bC7qTWUYY_DHQ"}
|
548
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'I0EWouN19bC7qTWUYY_DHQ' LIMIT 1[0m
|
549
|
+
Completed 200 OK in 11ms (Views: 10.1ms | ActiveRecord: 0.2ms)
|
550
|
+
Started PATCH "/password_resets/I0EWouN19bC7qTWUYY_DHQ" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
551
|
+
Processing by PasswordResetsController#update as HTML
|
552
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"I0EWouN19bC7qTWUYY_DHQ"}
|
553
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'I0EWouN19bC7qTWUYY_DHQ' LIMIT 1
|
554
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
555
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '45MtyQDA5Jn97XRo56WORw@sample.com' AND "users"."id" != 1) LIMIT 1
|
556
|
+
Binary data inserted for `string` type on column `password_digest`
|
557
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$0vbmDx2yI6viCJ/.gDGMAOzV3P1GB1N/D6TnPcLwS/rIPLowlxZDy"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
558
|
+
[1m[35m (2.5ms)[0m commit transaction
|
559
|
+
Redirected to http://localhost:3000/
|
560
|
+
Completed 302 Found in 8ms (ActiveRecord: 3.1ms)
|
561
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
464
562
|
Processing by HomeController#index as HTML
|
563
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
564
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
565
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
566
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
567
|
+
--------------------------------------------------------------------------------
|
568
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
569
|
+
--------------------------------------------------------------------------------
|
570
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
571
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
572
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '5KSdMzJgd9L5eFBkpwofuw@sample.com' LIMIT 1
|
573
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'PQ2CC5qLp0iKzKz9ygowdQ' LIMIT 1[0m
|
574
|
+
Binary data inserted for `string` type on column `password_digest`
|
575
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "PQ2CC5qLp0iKzKz9ygowdQ"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "5KSdMzJgd9L5eFBkpwofuw@sample.com"], ["password_digest", "$2a$04$0vb6tw/owWo0kPO9c64/gO3JNMwdM9D/k7MtfazlqiLMY.NzG0KJq"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
576
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
577
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
578
|
+
Processing by SessionsController#new as HTML
|
579
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
580
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
581
|
+
Processing by PasswordResetsController#new as HTML
|
465
582
|
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
583
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
584
|
+
Processing by PasswordResetsController#create as HTML
|
585
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
586
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
587
|
+
Completed 200 OK in 2ms (Views: 1.1ms | ActiveRecord: 0.2ms)
|
466
588
|
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
467
|
-
[1m[35m (0.
|
468
|
-
[1m[36m (0.
|
589
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
590
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
591
|
+
-------------------------------------------------------------------------
|
592
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
593
|
+
-------------------------------------------------------------------------
|
594
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
595
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
596
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'jELy6b1AMJ2RV-_hTMBSfw@sample.com' LIMIT 1
|
597
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'TRANIoMoWjdB6CypaeB4Tw' LIMIT 1[0m
|
598
|
+
Binary data inserted for `string` type on column `password_digest`
|
599
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "TRANIoMoWjdB6CypaeB4Tw"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "jELy6b1AMJ2RV-_hTMBSfw@sample.com"], ["password_digest", "$2a$04$qaI9IDodXhUm0hcobDqGwOcGkzd1LiJ2V5hoQFol8QBmNEV5lKh3u"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
600
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
601
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
602
|
+
Processing by SessionsController#new as HTML
|
603
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
604
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
605
|
+
Processing by PasswordResetsController#new as HTML
|
606
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
607
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
608
|
+
Processing by PasswordResetsController#create as HTML
|
609
|
+
Parameters: {"utf8"=>"✓", "email"=>"jELy6b1AMJ2RV-_hTMBSfw@sample.com", "commit"=>"Reset password"}
|
610
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'jELy6b1AMJ2RV-_hTMBSfw@sample.com' LIMIT 1
|
611
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'GkNFCYU-Lfrr9R_W-iEtKQ' LIMIT 1[0m
|
612
|
+
[1m[35m (0.1ms)[0m begin transaction
|
613
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'jELy6b1AMJ2RV-_hTMBSfw@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
614
|
+
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "GkNFCYU-Lfrr9R_W-iEtKQ"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
615
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
616
|
+
|
617
|
+
Sent mail to jELy6b1AMJ2RV-_hTMBSfw@sample.com (4.7ms)
|
618
|
+
Date: Wed, 23 Apr 2014 22:32:25 +0200
|
619
|
+
From: from@example.com
|
620
|
+
To: jELy6b1AMJ2RV-_hTMBSfw@sample.com
|
621
|
+
Message-ID: <53582359d2266_4a1d3feb4c82dbc089015@air.lan.mail>
|
622
|
+
Subject: Password Reset
|
623
|
+
Mime-Version: 1.0
|
624
|
+
Content-Type: text/plain;
|
625
|
+
charset=UTF-8
|
626
|
+
Content-Transfer-Encoding: 7bit
|
627
|
+
|
628
|
+
To reset your password, click the URL below.
|
629
|
+
|
630
|
+
http://localhost:3000/password_resets/GkNFCYU-Lfrr9R_W-iEtKQ/edit
|
631
|
+
|
632
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
633
|
+
Redirected to http://www.example.com/
|
634
|
+
Completed 302 Found in 15ms (ActiveRecord: 1.3ms)
|
635
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
636
|
+
Processing by HomeController#index as HTML
|
637
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
638
|
+
Started GET "/password_resets/GkNFCYU-Lfrr9R_W-iEtKQ/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
639
|
+
Processing by PasswordResetsController#edit as HTML
|
640
|
+
Parameters: {"id"=>"GkNFCYU-Lfrr9R_W-iEtKQ"}
|
641
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'GkNFCYU-Lfrr9R_W-iEtKQ' LIMIT 1
|
642
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
643
|
+
Started PATCH "/password_resets/GkNFCYU-Lfrr9R_W-iEtKQ" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
644
|
+
Processing by PasswordResetsController#update as HTML
|
645
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"GkNFCYU-Lfrr9R_W-iEtKQ"}
|
646
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'GkNFCYU-Lfrr9R_W-iEtKQ' LIMIT 1[0m
|
647
|
+
Redirected to http://localhost:3000/password_resets/new
|
648
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
649
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
650
|
+
Processing by PasswordResetsController#new as HTML
|
651
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
652
|
+
[1m[35m (1.9ms)[0m DELETE FROM "users";
|
653
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
654
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
655
|
+
-------------------------------------------------------------------------------------------
|
656
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
657
|
+
-------------------------------------------------------------------------------------------
|
658
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
659
|
+
[1m[35m (0.1ms)[0m begin transaction
|
660
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'srAbGnRUqyCW3ioAkEOh0A@sample.com' LIMIT 1[0m
|
661
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'UaGAlPBUuBErMxMBVROMig' LIMIT 1
|
662
|
+
Binary data inserted for `string` type on column `password_digest`
|
663
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "UaGAlPBUuBErMxMBVROMig"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "srAbGnRUqyCW3ioAkEOh0A@sample.com"], ["password_digest", "$2a$04$lFWqg9tmr7vMrMrtR7RFIenqMAenCRj6Pr24OIzMrGniTTJZQHpS."], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
664
|
+
[1m[35m (0.7ms)[0m commit transaction
|
665
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
666
|
+
Processing by SessionsController#new as HTML
|
667
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
668
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
669
|
+
Processing by PasswordResetsController#new as HTML
|
670
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
671
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
672
|
+
Processing by PasswordResetsController#create as HTML
|
673
|
+
Parameters: {"utf8"=>"✓", "email"=>"srAbGnRUqyCW3ioAkEOh0A@sample.com", "commit"=>"Reset password"}
|
674
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'srAbGnRUqyCW3ioAkEOh0A@sample.com' LIMIT 1[0m
|
675
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'HOb7D3_Nb2uCEO316IyzJA' LIMIT 1
|
676
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
677
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'srAbGnRUqyCW3ioAkEOh0A@sample.com' AND "users"."id" != 1) LIMIT 1
|
678
|
+
[1m[36mSQL (0.2ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "HOb7D3_Nb2uCEO316IyzJA"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
679
|
+
[1m[35m (0.9ms)[0m commit transaction
|
680
|
+
|
681
|
+
Sent mail to srAbGnRUqyCW3ioAkEOh0A@sample.com (6.1ms)
|
682
|
+
Date: Wed, 23 Apr 2014 22:32:25 +0200
|
683
|
+
From: from@example.com
|
684
|
+
To: srAbGnRUqyCW3ioAkEOh0A@sample.com
|
685
|
+
Message-ID: <53582359e50ba_4a1d3feb4c82dbc0891ef@air.lan.mail>
|
686
|
+
Subject: Password Reset
|
687
|
+
Mime-Version: 1.0
|
688
|
+
Content-Type: text/plain;
|
689
|
+
charset=UTF-8
|
690
|
+
Content-Transfer-Encoding: 7bit
|
691
|
+
|
692
|
+
To reset your password, click the URL below.
|
693
|
+
|
694
|
+
http://localhost:3000/password_resets/HOb7D3_Nb2uCEO316IyzJA/edit
|
695
|
+
|
696
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
697
|
+
Redirected to http://www.example.com/
|
698
|
+
Completed 302 Found in 15ms (ActiveRecord: 1.5ms)
|
699
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
700
|
+
Processing by HomeController#index as HTML
|
701
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
702
|
+
Started GET "/password_resets/HOb7D3_Nb2uCEO316IyzJA/edit" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
703
|
+
Processing by PasswordResetsController#edit as HTML
|
704
|
+
Parameters: {"id"=>"HOb7D3_Nb2uCEO316IyzJA"}
|
705
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'HOb7D3_Nb2uCEO316IyzJA' LIMIT 1[0m
|
706
|
+
Completed 200 OK in 3ms (Views: 2.1ms | ActiveRecord: 0.2ms)
|
707
|
+
Started PATCH "/password_resets/HOb7D3_Nb2uCEO316IyzJA" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
708
|
+
Processing by PasswordResetsController#update as HTML
|
709
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"HOb7D3_Nb2uCEO316IyzJA"}
|
710
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'HOb7D3_Nb2uCEO316IyzJA' LIMIT 1
|
711
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
712
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'srAbGnRUqyCW3ioAkEOh0A@sample.com' AND "users"."id" != 1) LIMIT 1
|
713
|
+
[1m[36m (0.0ms)[0m [1mrollback transaction[0m
|
714
|
+
Completed 200 OK in 6ms (Views: 2.3ms | ActiveRecord: 0.3ms)
|
715
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
716
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
717
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
718
|
+
-----------------------------------
|
719
|
+
AuthproIntegrationTest: test_signup
|
720
|
+
-----------------------------------
|
721
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
722
|
+
[1m[35m (0.1ms)[0m begin transaction
|
723
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '687nx3FquSiJVIgNdC1Npg@sample.com' LIMIT 1[0m
|
724
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'xA2ujYHRmwjXbJWMi6qTDQ' LIMIT 1
|
725
|
+
Binary data inserted for `string` type on column `password_digest`
|
726
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "xA2ujYHRmwjXbJWMi6qTDQ"], ["created_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00], ["email", "687nx3FquSiJVIgNdC1Npg@sample.com"], ["password_digest", "$2a$04$YYrzBENCwdcHf5vTcUqFMOLOgEmfw8WBu4iU.uegPAnVtrApO/khG"], ["updated_at", Wed, 23 Apr 2014 20:32:25 UTC +00:00]]
|
727
|
+
[1m[35m (1.0ms)[0m commit transaction
|
728
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
729
|
+
Processing by HomeController#index as HTML
|
730
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
731
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:32:25 +0200
|
732
|
+
Processing by UsersController#new as HTML
|
733
|
+
Completed 200 OK in 4ms (Views: 3.9ms | ActiveRecord: 0.0ms)
|
734
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:32:26 +0200
|
735
|
+
Processing by UsersController#create as HTML
|
736
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"yIQ-1KY1CnUGhrfL00hBsg@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
737
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
738
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'yIQ-1KY1CnUGhrfL00hBsg@sample.com' LIMIT 1
|
739
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'meBmxXyANL74gRdfqDk_ng' LIMIT 1[0m
|
740
|
+
Binary data inserted for `string` type on column `password_digest`
|
741
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "meBmxXyANL74gRdfqDk_ng"], ["created_at", Wed, 23 Apr 2014 20:32:26 UTC +00:00], ["email", "yIQ-1KY1CnUGhrfL00hBsg@sample.com"], ["password_digest", "$2a$04$V0cFkSz3yPxefYE5fwPS6uFt0cXTxTKHfyoIKGW5OvOO4EQ0hGZ4W"], ["updated_at", Wed, 23 Apr 2014 20:32:26 UTC +00:00]]
|
742
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
743
|
+
Redirected to http://www.example.com/
|
744
|
+
Completed 302 Found in 5ms (ActiveRecord: 1.3ms)
|
745
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:26 +0200
|
746
|
+
Processing by HomeController#index as HTML
|
747
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
748
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
749
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
750
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
751
|
+
-------------------------------------------
|
752
|
+
AuthproIntegrationTest: test_signup_failing
|
753
|
+
-------------------------------------------
|
754
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
755
|
+
[1m[35m (0.1ms)[0m begin transaction
|
756
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'Kd3IMf701YLg3lK-B4oNdQ@sample.com' LIMIT 1[0m
|
757
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'BDjku0_6j4bGVwsq3KH8pg' LIMIT 1
|
758
|
+
Binary data inserted for `string` type on column `password_digest`
|
759
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "BDjku0_6j4bGVwsq3KH8pg"], ["created_at", Wed, 23 Apr 2014 20:32:26 UTC +00:00], ["email", "Kd3IMf701YLg3lK-B4oNdQ@sample.com"], ["password_digest", "$2a$04$dEljnumAMQ1OUhOcXhHwDer/oLZMOiKujsY17MnW5M4Qv065WBR92"], ["updated_at", Wed, 23 Apr 2014 20:32:26 UTC +00:00]]
|
760
|
+
[1m[35m (0.6ms)[0m commit transaction
|
761
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:26 +0200
|
762
|
+
Processing by HomeController#index as HTML
|
763
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
764
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:32:26 +0200
|
765
|
+
Processing by UsersController#new as HTML
|
766
|
+
Completed 200 OK in 4ms (Views: 3.7ms | ActiveRecord: 0.0ms)
|
767
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:32:26 +0200
|
768
|
+
Processing by UsersController#create as HTML
|
769
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"Cu6nOICSO7SWAkC7GFGZvw@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
770
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
771
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'Cu6nOICSO7SWAkC7GFGZvw@sample.com' LIMIT 1
|
772
|
+
[1m[36m (0.0ms)[0m [1mrollback transaction[0m
|
773
|
+
Completed 200 OK in 6ms (Views: 2.8ms | ActiveRecord: 0.3ms)
|
774
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
775
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
776
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
777
|
+
---------------------------------------
|
778
|
+
AuthproIntegrationTest: test_visit_home
|
779
|
+
---------------------------------------
|
780
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
781
|
+
[1m[35m (0.1ms)[0m begin transaction
|
782
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'feqwRBO7iFEyYPgGUg9Uxw@sample.com' LIMIT 1[0m
|
783
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '5YQUN8EgRqkv0cU5pmwB6g' LIMIT 1
|
784
|
+
Binary data inserted for `string` type on column `password_digest`
|
785
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "5YQUN8EgRqkv0cU5pmwB6g"], ["created_at", Wed, 23 Apr 2014 20:32:26 UTC +00:00], ["email", "feqwRBO7iFEyYPgGUg9Uxw@sample.com"], ["password_digest", "$2a$04$Gsuk/HzB4lwAnlbWhqNZ3efDaizfBhk6uxSCnEzwWzFPtNOYEaLHW"], ["updated_at", Wed, 23 Apr 2014 20:32:26 UTC +00:00]]
|
786
|
+
[1m[35m (0.9ms)[0m commit transaction
|
787
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:32:26 +0200
|
788
|
+
Processing by HomeController#index as HTML
|
789
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
790
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
791
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
792
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
793
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
794
|
+
------------------------------------------
|
795
|
+
AuthproGeneratorTest: test_generated_files
|
796
|
+
------------------------------------------
|
797
|
+
[1m[35m (0.2ms)[0m rollback transaction
|
798
|
+
----------------------------------
|
799
|
+
AuthproIntegrationTest: test_login
|
800
|
+
----------------------------------
|
801
|
+
[1m[36m (1.0ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
802
|
+
[1m[35m (0.9ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
803
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
804
|
+
Migrating to CreateUsers (20140423203636)
|
805
|
+
[1m[35m (0.1ms)[0m begin transaction
|
806
|
+
[1m[36m (0.3ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
807
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20140423203636"]]
|
808
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
809
|
+
[1m[35m (0.1ms)[0m begin transaction
|
810
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '8R8SW-L_SmPXsDhcJeT8Jg@sample.com' LIMIT 1[0m
|
811
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'buQpniPH-wcsUA29uHrWGA' LIMIT 1
|
812
|
+
Binary data inserted for `string` type on column `password_digest`
|
813
|
+
[1m[36mSQL (2.7ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "buQpniPH-wcsUA29uHrWGA"], ["created_at", Wed, 23 Apr 2014 20:36:36 UTC +00:00], ["email", "8R8SW-L_SmPXsDhcJeT8Jg@sample.com"], ["password_digest", "$2a$04$vLDoDVCW06b.RLDumQVo6e4ePwud7QuBezFkm3kyn1xmWm8LFFiGC"], ["updated_at", Wed, 23 Apr 2014 20:36:36 UTC +00:00]]
|
814
|
+
[1m[35m (0.8ms)[0m commit transaction
|
815
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
816
|
+
Processing by HomeController#index as HTML
|
817
|
+
Rendered home/index.html.erb within layouts/application (1.0ms)
|
818
|
+
Completed 200 OK in 20ms (Views: 19.4ms | ActiveRecord: 0.0ms)
|
819
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
820
|
+
Processing by SessionsController#new as HTML
|
821
|
+
Rendered sessions/new.html.erb within layouts/application (1.1ms)
|
822
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
823
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
824
|
+
Processing by SessionsController#create as HTML
|
825
|
+
Parameters: {"utf8"=>"✓", "email"=>"8R8SW-L_SmPXsDhcJeT8Jg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
826
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '8R8SW-L_SmPXsDhcJeT8Jg@sample.com' LIMIT 1[0m
|
827
|
+
Redirected to http://www.example.com/
|
828
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
829
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
830
|
+
Processing by HomeController#index as HTML
|
831
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
832
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'buQpniPH-wcsUA29uHrWGA' LIMIT 1
|
833
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.1ms)
|
834
|
+
[1m[36m (2.8ms)[0m [1mDELETE FROM "users";[0m
|
835
|
+
[1m[35m (0.3ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
836
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
837
|
+
------------------------------------------
|
838
|
+
AuthproIntegrationTest: test_login_failing
|
839
|
+
------------------------------------------
|
840
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
841
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
842
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'fq0cZZFtfQMYuz6PNz_JsA@sample.com' LIMIT 1
|
843
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'tz4PXi_vDt38AOt1Oho9bQ' LIMIT 1[0m
|
844
|
+
Binary data inserted for `string` type on column `password_digest`
|
845
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "tz4PXi_vDt38AOt1Oho9bQ"], ["created_at", Wed, 23 Apr 2014 20:36:36 UTC +00:00], ["email", "fq0cZZFtfQMYuz6PNz_JsA@sample.com"], ["password_digest", "$2a$04$mZjk8pjE26rr/sk5awU3y.IFs.6cfZBu42iG2T5nRiySC3u0wrSA2"], ["updated_at", Wed, 23 Apr 2014 20:36:36 UTC +00:00]]
|
846
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
847
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
848
|
+
Processing by HomeController#index as HTML
|
849
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
850
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
851
|
+
Processing by SessionsController#new as HTML
|
852
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
853
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
854
|
+
Processing by SessionsController#create as HTML
|
855
|
+
Parameters: {"utf8"=>"✓", "email"=>"fq0cZZFtfQMYuz6PNz_JsA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
856
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'fq0cZZFtfQMYuz6PNz_JsA@sample.com' LIMIT 1
|
857
|
+
Completed 200 OK in 4ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
858
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM "users";[0m
|
859
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
860
|
+
[1m[36m (0.5ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
861
|
+
-----------------------------------
|
862
|
+
AuthproIntegrationTest: test_logout
|
863
|
+
-----------------------------------
|
864
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
865
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
866
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'wSb9vXUmJmqlvgKktI9Tig@sample.com' LIMIT 1
|
867
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'dIe-U17l-aFHvXWphb1D-A' LIMIT 1[0m
|
868
|
+
Binary data inserted for `string` type on column `password_digest`
|
869
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "dIe-U17l-aFHvXWphb1D-A"], ["created_at", Wed, 23 Apr 2014 20:36:36 UTC +00:00], ["email", "wSb9vXUmJmqlvgKktI9Tig@sample.com"], ["password_digest", "$2a$04$RGhxq/i9uSNXeAc9az8O6OGJDrzMZt0KDGjUl2/ZZ9GNOqLKTQHFS"], ["updated_at", Wed, 23 Apr 2014 20:36:36 UTC +00:00]]
|
870
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
871
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
872
|
+
Processing by SessionsController#new as HTML
|
873
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
874
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
875
|
+
Processing by SessionsController#create as HTML
|
876
|
+
Parameters: {"utf8"=>"✓", "email"=>"wSb9vXUmJmqlvgKktI9Tig@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
877
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'wSb9vXUmJmqlvgKktI9Tig@sample.com' LIMIT 1
|
878
|
+
Redirected to http://www.example.com/
|
879
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
880
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
881
|
+
Processing by HomeController#index as HTML
|
882
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'dIe-U17l-aFHvXWphb1D-A' LIMIT 1[0m
|
883
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.2ms)
|
884
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
885
|
+
Processing by SessionsController#destroy as HTML
|
886
|
+
Redirected to http://www.example.com/
|
887
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
888
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:36 +0200
|
889
|
+
Processing by HomeController#index as HTML
|
890
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
891
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
892
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
893
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
894
|
+
-------------------------------------------
|
895
|
+
AuthproIntegrationTest: test_reset_password
|
896
|
+
-------------------------------------------
|
897
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
898
|
+
[1m[35m (0.1ms)[0m begin transaction
|
899
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'W6IXbSAySIt_q40lX0f0Xw@sample.com' LIMIT 1[0m
|
900
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'buh37f9dikfGMQlDlK4UWA' LIMIT 1
|
901
|
+
Binary data inserted for `string` type on column `password_digest`
|
902
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "buh37f9dikfGMQlDlK4UWA"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "W6IXbSAySIt_q40lX0f0Xw@sample.com"], ["password_digest", "$2a$04$97.S3HCA9JqBYT83JYanWu/XewQQP6hnf7ZVIn.Rc/AWMsaRImKKe"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
903
|
+
[1m[35m (0.8ms)[0m commit transaction
|
904
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
905
|
+
Processing by SessionsController#new as HTML
|
906
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
907
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
908
|
+
Processing by PasswordResetsController#new as HTML
|
909
|
+
Completed 200 OK in 6ms (Views: 5.3ms | ActiveRecord: 0.0ms)
|
910
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
911
|
+
Processing by PasswordResetsController#create as HTML
|
912
|
+
Parameters: {"utf8"=>"✓", "email"=>"W6IXbSAySIt_q40lX0f0Xw@sample.com", "commit"=>"Reset password"}
|
913
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'W6IXbSAySIt_q40lX0f0Xw@sample.com' LIMIT 1[0m
|
914
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '3zXg0VeMFP8GySaI3QNYHg' LIMIT 1
|
915
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
916
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'W6IXbSAySIt_q40lX0f0Xw@sample.com' AND "users"."id" != 1) LIMIT 1
|
917
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "3zXg0VeMFP8GySaI3QNYHg"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
918
|
+
[1m[35m (0.8ms)[0m commit transaction
|
919
|
+
|
920
|
+
Sent mail to W6IXbSAySIt_q40lX0f0Xw@sample.com (7.4ms)
|
921
|
+
Date: Wed, 23 Apr 2014 22:36:37 +0200
|
922
|
+
From: from@example.com
|
923
|
+
To: W6IXbSAySIt_q40lX0f0Xw@sample.com
|
924
|
+
Message-ID: <535824552985f_4c033fd5ad82dbc098862@air.lan.mail>
|
925
|
+
Subject: Password Reset
|
926
|
+
Mime-Version: 1.0
|
927
|
+
Content-Type: text/plain;
|
928
|
+
charset=UTF-8
|
929
|
+
Content-Transfer-Encoding: 7bit
|
930
|
+
|
931
|
+
To reset your password, click the URL below.
|
932
|
+
|
933
|
+
http://localhost:3000/password_resets/3zXg0VeMFP8GySaI3QNYHg/edit
|
934
|
+
|
935
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
936
|
+
Redirected to http://www.example.com/
|
937
|
+
Completed 302 Found in 143ms (ActiveRecord: 1.5ms)
|
938
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
939
|
+
Processing by HomeController#index as HTML
|
940
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
941
|
+
Started GET "/password_resets/3zXg0VeMFP8GySaI3QNYHg/edit" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
942
|
+
Processing by PasswordResetsController#edit as HTML
|
943
|
+
Parameters: {"id"=>"3zXg0VeMFP8GySaI3QNYHg"}
|
944
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '3zXg0VeMFP8GySaI3QNYHg' LIMIT 1[0m
|
945
|
+
Completed 200 OK in 16ms (Views: 15.6ms | ActiveRecord: 0.2ms)
|
946
|
+
Started PATCH "/password_resets/3zXg0VeMFP8GySaI3QNYHg" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
947
|
+
Processing by PasswordResetsController#update as HTML
|
948
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"3zXg0VeMFP8GySaI3QNYHg"}
|
949
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '3zXg0VeMFP8GySaI3QNYHg' LIMIT 1
|
950
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
951
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'W6IXbSAySIt_q40lX0f0Xw@sample.com' AND "users"."id" != 1) LIMIT 1
|
952
|
+
Binary data inserted for `string` type on column `password_digest`
|
953
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$GdDkSEkos8Xa1ykoCDHM/Os2BD9GImExsD1D4UyzJXtmqOQzwv82e"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
954
|
+
[1m[35m (2.6ms)[0m commit transaction
|
955
|
+
Redirected to http://localhost:3000/
|
956
|
+
Completed 302 Found in 7ms (ActiveRecord: 3.2ms)
|
957
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
958
|
+
Processing by HomeController#index as HTML
|
959
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
960
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
961
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
962
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
963
|
+
--------------------------------------------------------------------------------
|
964
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
965
|
+
--------------------------------------------------------------------------------
|
966
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
967
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
968
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'JNlz9i4-qxi99fG-Ag-_Hg@sample.com' LIMIT 1
|
969
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'Y8i6gAti5YPWZspLomUgGg' LIMIT 1[0m
|
970
|
+
Binary data inserted for `string` type on column `password_digest`
|
971
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "Y8i6gAti5YPWZspLomUgGg"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "JNlz9i4-qxi99fG-Ag-_Hg@sample.com"], ["password_digest", "$2a$04$h9sA6nsbefLMTTdNmNCX3.cCsKHqKn.8x9XLVhlG1/QGUJSTTotye"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
972
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
973
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
974
|
+
Processing by SessionsController#new as HTML
|
975
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
976
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
977
|
+
Processing by PasswordResetsController#new as HTML
|
978
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
979
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
980
|
+
Processing by PasswordResetsController#create as HTML
|
981
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
982
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
983
|
+
Completed 200 OK in 2ms (Views: 1.2ms | ActiveRecord: 0.2ms)
|
984
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM "users";[0m
|
985
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
986
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
987
|
+
-------------------------------------------------------------------------
|
988
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
989
|
+
-------------------------------------------------------------------------
|
990
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
991
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
992
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'doDT5TiAQJsPyWl5nkhOpQ@sample.com' LIMIT 1
|
993
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'YAsFiKAABy8TOOX8ErZpSg' LIMIT 1[0m
|
994
|
+
Binary data inserted for `string` type on column `password_digest`
|
995
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "YAsFiKAABy8TOOX8ErZpSg"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "doDT5TiAQJsPyWl5nkhOpQ@sample.com"], ["password_digest", "$2a$04$ny1wia7PMMPlo3lSwBTLSuuy9hgazJ2P3N/qSdIARvBwrq8eNeWU."], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
996
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
997
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
998
|
+
Processing by SessionsController#new as HTML
|
999
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
1000
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1001
|
+
Processing by PasswordResetsController#new as HTML
|
1002
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
1003
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1004
|
+
Processing by PasswordResetsController#create as HTML
|
1005
|
+
Parameters: {"utf8"=>"✓", "email"=>"doDT5TiAQJsPyWl5nkhOpQ@sample.com", "commit"=>"Reset password"}
|
1006
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'doDT5TiAQJsPyWl5nkhOpQ@sample.com' LIMIT 1
|
1007
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'QqkY3GUKrRWVTD7sP_GfCA' LIMIT 1[0m
|
1008
|
+
[1m[35m (0.0ms)[0m begin transaction
|
1009
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'doDT5TiAQJsPyWl5nkhOpQ@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
1010
|
+
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "QqkY3GUKrRWVTD7sP_GfCA"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
1011
|
+
[1m[36m (0.6ms)[0m [1mcommit transaction[0m
|
1012
|
+
|
1013
|
+
Sent mail to doDT5TiAQJsPyWl5nkhOpQ@sample.com (4.4ms)
|
1014
|
+
Date: Wed, 23 Apr 2014 22:36:37 +0200
|
1015
|
+
From: from@example.com
|
1016
|
+
To: doDT5TiAQJsPyWl5nkhOpQ@sample.com
|
1017
|
+
Message-ID: <5358245548c51_4c033fd5ad82dbc0989bd@air.lan.mail>
|
1018
|
+
Subject: Password Reset
|
1019
|
+
Mime-Version: 1.0
|
1020
|
+
Content-Type: text/plain;
|
1021
|
+
charset=UTF-8
|
1022
|
+
Content-Transfer-Encoding: 7bit
|
1023
|
+
|
1024
|
+
To reset your password, click the URL below.
|
1025
|
+
|
1026
|
+
http://localhost:3000/password_resets/QqkY3GUKrRWVTD7sP_GfCA/edit
|
1027
|
+
|
1028
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
1029
|
+
Redirected to http://www.example.com/
|
1030
|
+
Completed 302 Found in 14ms (ActiveRecord: 1.4ms)
|
1031
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1032
|
+
Processing by HomeController#index as HTML
|
1033
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
1034
|
+
Started GET "/password_resets/QqkY3GUKrRWVTD7sP_GfCA/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
1035
|
+
Processing by PasswordResetsController#edit as HTML
|
1036
|
+
Parameters: {"id"=>"QqkY3GUKrRWVTD7sP_GfCA"}
|
1037
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'QqkY3GUKrRWVTD7sP_GfCA' LIMIT 1
|
1038
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
1039
|
+
Started PATCH "/password_resets/QqkY3GUKrRWVTD7sP_GfCA" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
1040
|
+
Processing by PasswordResetsController#update as HTML
|
1041
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"QqkY3GUKrRWVTD7sP_GfCA"}
|
1042
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'QqkY3GUKrRWVTD7sP_GfCA' LIMIT 1[0m
|
1043
|
+
Redirected to http://localhost:3000/password_resets/new
|
1044
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
1045
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
1046
|
+
Processing by PasswordResetsController#new as HTML
|
1047
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
1048
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
1049
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1050
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1051
|
+
-------------------------------------------------------------------------------------------
|
1052
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
1053
|
+
-------------------------------------------------------------------------------------------
|
1054
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1055
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1056
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'eg1JzIvsYouEj_VVjqWLug@sample.com' LIMIT 1[0m
|
1057
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'oWi0w5l02h7uUY0NrmxmRw' LIMIT 1
|
1058
|
+
Binary data inserted for `string` type on column `password_digest`
|
1059
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "oWi0w5l02h7uUY0NrmxmRw"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "eg1JzIvsYouEj_VVjqWLug@sample.com"], ["password_digest", "$2a$04$dhTirVbxopiTV0rDm6MKouxXWXSKlMMsNlnjdozBW0ntzaWdDtehG"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
1060
|
+
[1m[35m (0.7ms)[0m commit transaction
|
1061
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1062
|
+
Processing by SessionsController#new as HTML
|
1063
|
+
Completed 200 OK in 3ms (Views: 2.6ms | ActiveRecord: 0.0ms)
|
1064
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1065
|
+
Processing by PasswordResetsController#new as HTML
|
1066
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
1067
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1068
|
+
Processing by PasswordResetsController#create as HTML
|
1069
|
+
Parameters: {"utf8"=>"✓", "email"=>"eg1JzIvsYouEj_VVjqWLug@sample.com", "commit"=>"Reset password"}
|
1070
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'eg1JzIvsYouEj_VVjqWLug@sample.com' LIMIT 1[0m
|
1071
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '2UNFmt_bWvtu4cSmc32Rzw' LIMIT 1
|
1072
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
1073
|
+
[1m[35mUser Exists (0.3ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'eg1JzIvsYouEj_VVjqWLug@sample.com' AND "users"."id" != 1) LIMIT 1
|
1074
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "2UNFmt_bWvtu4cSmc32Rzw"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
1075
|
+
[1m[35m (1.1ms)[0m commit transaction
|
1076
|
+
|
1077
|
+
Sent mail to eg1JzIvsYouEj_VVjqWLug@sample.com (9.4ms)
|
1078
|
+
Date: Wed, 23 Apr 2014 22:36:37 +0200
|
1079
|
+
From: from@example.com
|
1080
|
+
To: eg1JzIvsYouEj_VVjqWLug@sample.com
|
1081
|
+
Message-ID: <5358245560a03_4c033fd5ad82dbc09909@air.lan.mail>
|
1082
|
+
Subject: Password Reset
|
1083
|
+
Mime-Version: 1.0
|
1084
|
+
Content-Type: text/plain;
|
1085
|
+
charset=UTF-8
|
1086
|
+
Content-Transfer-Encoding: 7bit
|
1087
|
+
|
1088
|
+
To reset your password, click the URL below.
|
1089
|
+
|
1090
|
+
http://localhost:3000/password_resets/2UNFmt_bWvtu4cSmc32Rzw/edit
|
1091
|
+
|
1092
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
1093
|
+
Redirected to http://www.example.com/
|
1094
|
+
Completed 302 Found in 29ms (ActiveRecord: 2.5ms)
|
1095
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1096
|
+
Processing by HomeController#index as HTML
|
1097
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
1098
|
+
Started GET "/password_resets/2UNFmt_bWvtu4cSmc32Rzw/edit" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1099
|
+
Processing by PasswordResetsController#edit as HTML
|
1100
|
+
Parameters: {"id"=>"2UNFmt_bWvtu4cSmc32Rzw"}
|
1101
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '2UNFmt_bWvtu4cSmc32Rzw' LIMIT 1[0m
|
1102
|
+
Completed 200 OK in 5ms (Views: 4.0ms | ActiveRecord: 0.2ms)
|
1103
|
+
Started PATCH "/password_resets/2UNFmt_bWvtu4cSmc32Rzw" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1104
|
+
Processing by PasswordResetsController#update as HTML
|
1105
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"2UNFmt_bWvtu4cSmc32Rzw"}
|
1106
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '2UNFmt_bWvtu4cSmc32Rzw' LIMIT 1
|
1107
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
1108
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'eg1JzIvsYouEj_VVjqWLug@sample.com' AND "users"."id" != 1) LIMIT 1
|
1109
|
+
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
1110
|
+
Completed 200 OK in 10ms (Views: 4.0ms | ActiveRecord: 0.5ms)
|
1111
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
1112
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1113
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1114
|
+
-----------------------------------
|
1115
|
+
AuthproIntegrationTest: test_signup
|
1116
|
+
-----------------------------------
|
1117
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1118
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1119
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'OH3v74OvExb55Ax43JASgA@sample.com' LIMIT 1[0m
|
1120
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'ZQJJxM_gxf1TEMe1QlQ1yg' LIMIT 1
|
1121
|
+
Binary data inserted for `string` type on column `password_digest`
|
1122
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "ZQJJxM_gxf1TEMe1QlQ1yg"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "OH3v74OvExb55Ax43JASgA@sample.com"], ["password_digest", "$2a$04$GbhJzU/AV6H8IaLJSY5j.uQY86yefb2bGpJ6iS0bg3bHs0djQ.xWa"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
1123
|
+
[1m[35m (0.6ms)[0m commit transaction
|
1124
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1125
|
+
Processing by HomeController#index as HTML
|
1126
|
+
Completed 200 OK in 3ms (Views: 2.3ms | ActiveRecord: 0.0ms)
|
1127
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1128
|
+
Processing by UsersController#new as HTML
|
1129
|
+
Completed 200 OK in 8ms (Views: 7.3ms | ActiveRecord: 0.0ms)
|
1130
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1131
|
+
Processing by UsersController#create as HTML
|
1132
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"G9jUVzLsIl_0OoQhYEc0Tw@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
1133
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1134
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'G9jUVzLsIl_0OoQhYEc0Tw@sample.com' LIMIT 1
|
1135
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 't2TvQo-vPr82acPjkt1_fw' LIMIT 1[0m
|
1136
|
+
Binary data inserted for `string` type on column `password_digest`
|
1137
|
+
[1m[35mSQL (0.6ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "t2TvQo-vPr82acPjkt1_fw"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "G9jUVzLsIl_0OoQhYEc0Tw@sample.com"], ["password_digest", "$2a$04$SaOnU3IyspKOlZVCzlv9veK.JHSA/Uy0o.95rOWsv4MyxFAfU5SXy"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
1138
|
+
[1m[36m (1.0ms)[0m [1mcommit transaction[0m
|
1139
|
+
Redirected to http://www.example.com/
|
1140
|
+
Completed 302 Found in 8ms (ActiveRecord: 1.9ms)
|
1141
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1142
|
+
Processing by HomeController#index as HTML
|
1143
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
1144
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
1145
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1146
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1147
|
+
-------------------------------------------
|
1148
|
+
AuthproIntegrationTest: test_signup_failing
|
1149
|
+
-------------------------------------------
|
1150
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1151
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1152
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'KHRYuY60cLcyNzKGpqGCcA@sample.com' LIMIT 1[0m
|
1153
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'RLnrCRrNgAYB8XPjn66Kig' LIMIT 1
|
1154
|
+
Binary data inserted for `string` type on column `password_digest`
|
1155
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "RLnrCRrNgAYB8XPjn66Kig"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "KHRYuY60cLcyNzKGpqGCcA@sample.com"], ["password_digest", "$2a$04$GEuTX2Xne0hi3kClSqcEWOz0vXbZxT.UMQkDXLfHH0Yf1fQKpBZzC"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
1156
|
+
[1m[35m (0.7ms)[0m commit transaction
|
1157
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1158
|
+
Processing by HomeController#index as HTML
|
1159
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
1160
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1161
|
+
Processing by UsersController#new as HTML
|
1162
|
+
Completed 200 OK in 5ms (Views: 4.2ms | ActiveRecord: 0.0ms)
|
1163
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1164
|
+
Processing by UsersController#create as HTML
|
1165
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"PyZeLJJMPnefPc_dwYb5HQ@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
1166
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
1167
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'PyZeLJJMPnefPc_dwYb5HQ@sample.com' LIMIT 1
|
1168
|
+
[1m[36m (0.0ms)[0m [1mrollback transaction[0m
|
1169
|
+
Completed 200 OK in 7ms (Views: 2.9ms | ActiveRecord: 0.4ms)
|
1170
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
1171
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1172
|
+
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1173
|
+
---------------------------------------
|
1174
|
+
AuthproIntegrationTest: test_visit_home
|
1175
|
+
---------------------------------------
|
1176
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1177
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1178
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'kRnqsgkpVx4NnT3jSKfCaA@sample.com' LIMIT 1[0m
|
1179
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'YbnZVfX5WBKGx4cDrTOKZQ' LIMIT 1
|
1180
|
+
Binary data inserted for `string` type on column `password_digest`
|
1181
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "YbnZVfX5WBKGx4cDrTOKZQ"], ["created_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00], ["email", "kRnqsgkpVx4NnT3jSKfCaA@sample.com"], ["password_digest", "$2a$04$Ibm.PEreFaqt9qFExLUDAOE07N.EAyTYAKLe6qTwumC/MhPlhmHBS"], ["updated_at", Wed, 23 Apr 2014 20:36:37 UTC +00:00]]
|
1182
|
+
[1m[35m (0.8ms)[0m commit transaction
|
1183
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:37 +0200
|
1184
|
+
Processing by HomeController#index as HTML
|
1185
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
1186
|
+
[1m[36m (1.1ms)[0m [1mDELETE FROM "users";[0m
|
1187
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
1188
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
1189
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
1190
|
+
------------------------------------------
|
1191
|
+
AuthproGeneratorTest: test_generated_files
|
1192
|
+
------------------------------------------
|
1193
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
1194
|
+
----------------------------------
|
1195
|
+
AuthproIntegrationTest: test_login
|
1196
|
+
----------------------------------
|
1197
|
+
[1m[36m (0.9ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
1198
|
+
[1m[35m (0.8ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
1199
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1200
|
+
Migrating to CreateUsers (20140423203645)
|
1201
|
+
[1m[35m (0.0ms)[0m begin transaction
|
1202
|
+
[1m[36m (0.3ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
1203
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20140423203645"]]
|
1204
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
1205
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1206
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'OkFmpDdxYRtc2JPJZrPFdg@sample.com' LIMIT 1[0m
|
1207
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'K2kAUWSQOQej5S8DCLkmpQ' LIMIT 1
|
1208
|
+
Binary data inserted for `string` type on column `password_digest`
|
1209
|
+
[1m[36mSQL (3.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "K2kAUWSQOQej5S8DCLkmpQ"], ["created_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00], ["email", "OkFmpDdxYRtc2JPJZrPFdg@sample.com"], ["password_digest", "$2a$04$FIEqMa6dRWBEkU.T.tWLoOZrFZTaT5hIqDcnxFUbUwKhJjrYx05yG"], ["updated_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00]]
|
1210
|
+
[1m[35m (0.9ms)[0m commit transaction
|
1211
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1212
|
+
Processing by HomeController#index as HTML
|
1213
|
+
Rendered home/index.html.erb within layouts/application (1.0ms)
|
1214
|
+
Completed 200 OK in 21ms (Views: 20.1ms | ActiveRecord: 0.0ms)
|
1215
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1216
|
+
Processing by SessionsController#new as HTML
|
1217
|
+
Rendered sessions/new.html.erb within layouts/application (1.1ms)
|
1218
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
1219
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1220
|
+
Processing by SessionsController#create as HTML
|
1221
|
+
Parameters: {"utf8"=>"✓", "email"=>"OkFmpDdxYRtc2JPJZrPFdg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
1222
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'OkFmpDdxYRtc2JPJZrPFdg@sample.com' LIMIT 1[0m
|
1223
|
+
Redirected to http://www.example.com/
|
1224
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
1225
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1226
|
+
Processing by HomeController#index as HTML
|
1227
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
1228
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'K2kAUWSQOQej5S8DCLkmpQ' LIMIT 1
|
1229
|
+
Completed 200 OK in 2ms (Views: 2.2ms | ActiveRecord: 0.1ms)
|
1230
|
+
[1m[36m (2.7ms)[0m [1mDELETE FROM "users";[0m
|
1231
|
+
[1m[35m (0.3ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
1232
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
1233
|
+
------------------------------------------
|
1234
|
+
AuthproIntegrationTest: test_login_failing
|
1235
|
+
------------------------------------------
|
1236
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
1237
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1238
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '3j6XkNyow1vLnaR7GYWxnA@sample.com' LIMIT 1
|
1239
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'N99w5maCFoEPpDiWdAf7hw' LIMIT 1[0m
|
1240
|
+
Binary data inserted for `string` type on column `password_digest`
|
1241
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "N99w5maCFoEPpDiWdAf7hw"], ["created_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00], ["email", "3j6XkNyow1vLnaR7GYWxnA@sample.com"], ["password_digest", "$2a$04$k0i/Cia/0ivpK0Pr6lc6H.kn3dPZiJknBCXelUKuPhapbf0CQjEqG"], ["updated_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00]]
|
1242
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
1243
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1244
|
+
Processing by HomeController#index as HTML
|
1245
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
1246
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1247
|
+
Processing by SessionsController#new as HTML
|
1248
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
1249
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1250
|
+
Processing by SessionsController#create as HTML
|
1251
|
+
Parameters: {"utf8"=>"✓", "email"=>"3j6XkNyow1vLnaR7GYWxnA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
1252
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '3j6XkNyow1vLnaR7GYWxnA@sample.com' LIMIT 1
|
1253
|
+
Completed 200 OK in 4ms (Views: 1.7ms | ActiveRecord: 0.2ms)
|
1254
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
1255
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
1256
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
1257
|
+
-----------------------------------
|
1258
|
+
AuthproIntegrationTest: test_logout
|
1259
|
+
-----------------------------------
|
1260
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
1261
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1262
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'hvWEvqY6gVn5kohNCPwzcw@sample.com' LIMIT 1
|
1263
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'rGUrX9J6P_Qms60poPv5_A' LIMIT 1[0m
|
1264
|
+
Binary data inserted for `string` type on column `password_digest`
|
1265
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "rGUrX9J6P_Qms60poPv5_A"], ["created_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00], ["email", "hvWEvqY6gVn5kohNCPwzcw@sample.com"], ["password_digest", "$2a$04$WOSffz7A.YzgeAnOaVxLCuQS4GPAvixWmTW2YsGCe2vw0i.KJM/Lm"], ["updated_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00]]
|
1266
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
1267
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1268
|
+
Processing by SessionsController#new as HTML
|
1269
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
1270
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1271
|
+
Processing by SessionsController#create as HTML
|
1272
|
+
Parameters: {"utf8"=>"✓", "email"=>"hvWEvqY6gVn5kohNCPwzcw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
1273
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'hvWEvqY6gVn5kohNCPwzcw@sample.com' LIMIT 1
|
1274
|
+
Redirected to http://www.example.com/
|
1275
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
1276
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1277
|
+
Processing by HomeController#index as HTML
|
1278
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'rGUrX9J6P_Qms60poPv5_A' LIMIT 1[0m
|
1279
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.2ms)
|
1280
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1281
|
+
Processing by SessionsController#destroy as HTML
|
1282
|
+
Redirected to http://www.example.com/
|
1283
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
1284
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1285
|
+
Processing by HomeController#index as HTML
|
1286
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
1287
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
1288
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1289
|
+
[1m[35m (0.6ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1290
|
+
-------------------------------------------
|
1291
|
+
AuthproIntegrationTest: test_reset_password
|
1292
|
+
-------------------------------------------
|
1293
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1294
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1295
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'nmLSC43cdAmpEY5nwIYhEw@sample.com' LIMIT 1[0m
|
1296
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'rRqbC3K80x2QcgwFmEhS5w' LIMIT 1
|
1297
|
+
Binary data inserted for `string` type on column `password_digest`
|
1298
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "rRqbC3K80x2QcgwFmEhS5w"], ["created_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00], ["email", "nmLSC43cdAmpEY5nwIYhEw@sample.com"], ["password_digest", "$2a$04$PWOX7710ZdHb57PERWTq8OoIDA.rNdAUE9qrQCXyIidE8/byL4TY2"], ["updated_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00]]
|
1299
|
+
[1m[35m (0.9ms)[0m commit transaction
|
1300
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1301
|
+
Processing by SessionsController#new as HTML
|
1302
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
1303
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1304
|
+
Processing by PasswordResetsController#new as HTML
|
1305
|
+
Completed 200 OK in 3ms (Views: 2.4ms | ActiveRecord: 0.0ms)
|
1306
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:45 +0200
|
1307
|
+
Processing by PasswordResetsController#create as HTML
|
1308
|
+
Parameters: {"utf8"=>"✓", "email"=>"nmLSC43cdAmpEY5nwIYhEw@sample.com", "commit"=>"Reset password"}
|
1309
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'nmLSC43cdAmpEY5nwIYhEw@sample.com' LIMIT 1[0m
|
1310
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'a2qgIIhoGgt_-qACG1uvaw' LIMIT 1
|
1311
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
1312
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'nmLSC43cdAmpEY5nwIYhEw@sample.com' AND "users"."id" != 1) LIMIT 1
|
1313
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "a2qgIIhoGgt_-qACG1uvaw"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:36:45 UTC +00:00]]
|
1314
|
+
[1m[35m (0.7ms)[0m commit transaction
|
1315
|
+
|
1316
|
+
Sent mail to nmLSC43cdAmpEY5nwIYhEw@sample.com (7.4ms)
|
1317
|
+
Date: Wed, 23 Apr 2014 22:36:46 +0200
|
1318
|
+
From: from@example.com
|
1319
|
+
To: nmLSC43cdAmpEY5nwIYhEw@sample.com
|
1320
|
+
Message-ID: <5358245e29a3_4c1c3fffa4c2dbb476592@air.lan.mail>
|
1321
|
+
Subject: Password Reset
|
1322
|
+
Mime-Version: 1.0
|
1323
|
+
Content-Type: text/plain;
|
1324
|
+
charset=UTF-8
|
1325
|
+
Content-Transfer-Encoding: 7bit
|
1326
|
+
|
1327
|
+
To reset your password, click the URL below.
|
1328
|
+
|
1329
|
+
http://localhost:3000/password_resets/a2qgIIhoGgt_-qACG1uvaw/edit
|
1330
|
+
|
1331
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
1332
|
+
Redirected to http://www.example.com/
|
1333
|
+
Completed 302 Found in 141ms (ActiveRecord: 1.4ms)
|
1334
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1335
|
+
Processing by HomeController#index as HTML
|
1336
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
1337
|
+
Started GET "/password_resets/a2qgIIhoGgt_-qACG1uvaw/edit" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1338
|
+
Processing by PasswordResetsController#edit as HTML
|
1339
|
+
Parameters: {"id"=>"a2qgIIhoGgt_-qACG1uvaw"}
|
1340
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'a2qgIIhoGgt_-qACG1uvaw' LIMIT 1[0m
|
1341
|
+
Completed 200 OK in 17ms (Views: 16.0ms | ActiveRecord: 0.2ms)
|
1342
|
+
Started PATCH "/password_resets/a2qgIIhoGgt_-qACG1uvaw" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1343
|
+
Processing by PasswordResetsController#update as HTML
|
1344
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"a2qgIIhoGgt_-qACG1uvaw"}
|
1345
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'a2qgIIhoGgt_-qACG1uvaw' LIMIT 1
|
1346
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
1347
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'nmLSC43cdAmpEY5nwIYhEw@sample.com' AND "users"."id" != 1) LIMIT 1
|
1348
|
+
Binary data inserted for `string` type on column `password_digest`
|
1349
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$EAeUEVsYueG9JEyzLlcLs.zjKJ96.8Hf7R.Dkg4aHGA6.YhZu3Svq"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
1350
|
+
[1m[35m (2.5ms)[0m commit transaction
|
1351
|
+
Redirected to http://localhost:3000/
|
1352
|
+
Completed 302 Found in 7ms (ActiveRecord: 3.1ms)
|
1353
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1354
|
+
Processing by HomeController#index as HTML
|
1355
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
1356
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
1357
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
1358
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
1359
|
+
--------------------------------------------------------------------------------
|
1360
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
1361
|
+
--------------------------------------------------------------------------------
|
1362
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
1363
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1364
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'fWMTeL102LxeiKZZzxuYkw@sample.com' LIMIT 1
|
1365
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'eYy4blMEYWo068MGLY_pwg' LIMIT 1[0m
|
1366
|
+
Binary data inserted for `string` type on column `password_digest`
|
1367
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "eYy4blMEYWo068MGLY_pwg"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "fWMTeL102LxeiKZZzxuYkw@sample.com"], ["password_digest", "$2a$04$9CEhoFEFH3ptspM9uojmpecfL2J/3HVita91vtxQPWlhfahvpy3W6"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
1368
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
1369
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1370
|
+
Processing by SessionsController#new as HTML
|
1371
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
1372
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1373
|
+
Processing by PasswordResetsController#new as HTML
|
1374
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
1375
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1376
|
+
Processing by PasswordResetsController#create as HTML
|
1377
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
1378
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
1379
|
+
Completed 200 OK in 2ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
1380
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
1381
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
1382
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
1383
|
+
-------------------------------------------------------------------------
|
1384
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
1385
|
+
-------------------------------------------------------------------------
|
1386
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
1387
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1388
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'kdVRuEN-EA1x5Zg-vqc2mA@sample.com' LIMIT 1
|
1389
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'QUggs54-U3x2pp-hjStLzQ' LIMIT 1[0m
|
1390
|
+
Binary data inserted for `string` type on column `password_digest`
|
1391
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "QUggs54-U3x2pp-hjStLzQ"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "kdVRuEN-EA1x5Zg-vqc2mA@sample.com"], ["password_digest", "$2a$04$ctnRHihwXTas32wE5SPCEecHKPJ.RqJHIala/9zB2tyhOhpw7a94e"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
1392
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
1393
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1394
|
+
Processing by SessionsController#new as HTML
|
1395
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
1396
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1397
|
+
Processing by PasswordResetsController#new as HTML
|
1398
|
+
Completed 200 OK in 1ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
1399
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1400
|
+
Processing by PasswordResetsController#create as HTML
|
1401
|
+
Parameters: {"utf8"=>"✓", "email"=>"kdVRuEN-EA1x5Zg-vqc2mA@sample.com", "commit"=>"Reset password"}
|
1402
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'kdVRuEN-EA1x5Zg-vqc2mA@sample.com' LIMIT 1
|
1403
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'hOAOMcELOUEyJ6gh4uYVLQ' LIMIT 1[0m
|
1404
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1405
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'kdVRuEN-EA1x5Zg-vqc2mA@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
1406
|
+
[1m[35mSQL (0.3ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "hOAOMcELOUEyJ6gh4uYVLQ"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
1407
|
+
[1m[36m (0.6ms)[0m [1mcommit transaction[0m
|
1408
|
+
|
1409
|
+
Sent mail to kdVRuEN-EA1x5Zg-vqc2mA@sample.com (4.6ms)
|
1410
|
+
Date: Wed, 23 Apr 2014 22:36:46 +0200
|
1411
|
+
From: from@example.com
|
1412
|
+
To: kdVRuEN-EA1x5Zg-vqc2mA@sample.com
|
1413
|
+
Message-ID: <5358245e22068_4c1c3fffa4c2dbb4766d3@air.lan.mail>
|
1414
|
+
Subject: Password Reset
|
1415
|
+
Mime-Version: 1.0
|
1416
|
+
Content-Type: text/plain;
|
1417
|
+
charset=UTF-8
|
1418
|
+
Content-Transfer-Encoding: 7bit
|
1419
|
+
|
1420
|
+
To reset your password, click the URL below.
|
1421
|
+
|
1422
|
+
http://localhost:3000/password_resets/hOAOMcELOUEyJ6gh4uYVLQ/edit
|
1423
|
+
|
1424
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
1425
|
+
Redirected to http://www.example.com/
|
1426
|
+
Completed 302 Found in 14ms (ActiveRecord: 1.2ms)
|
1427
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1428
|
+
Processing by HomeController#index as HTML
|
1429
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
1430
|
+
Started GET "/password_resets/hOAOMcELOUEyJ6gh4uYVLQ/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
1431
|
+
Processing by PasswordResetsController#edit as HTML
|
1432
|
+
Parameters: {"id"=>"hOAOMcELOUEyJ6gh4uYVLQ"}
|
1433
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'hOAOMcELOUEyJ6gh4uYVLQ' LIMIT 1
|
1434
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
1435
|
+
Started PATCH "/password_resets/hOAOMcELOUEyJ6gh4uYVLQ" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
1436
|
+
Processing by PasswordResetsController#update as HTML
|
1437
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"hOAOMcELOUEyJ6gh4uYVLQ"}
|
1438
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'hOAOMcELOUEyJ6gh4uYVLQ' LIMIT 1[0m
|
1439
|
+
Redirected to http://localhost:3000/password_resets/new
|
1440
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
1441
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
1442
|
+
Processing by PasswordResetsController#new as HTML
|
1443
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
1444
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
1445
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1446
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1447
|
+
-------------------------------------------------------------------------------------------
|
1448
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
1449
|
+
-------------------------------------------------------------------------------------------
|
1450
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1451
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1452
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'q-Dyu6zv21zIda--a_eS7Q@sample.com' LIMIT 1[0m
|
1453
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '_8mbQ-ZmG7i9KSIrWpTatw' LIMIT 1
|
1454
|
+
Binary data inserted for `string` type on column `password_digest`
|
1455
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "_8mbQ-ZmG7i9KSIrWpTatw"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "q-Dyu6zv21zIda--a_eS7Q@sample.com"], ["password_digest", "$2a$04$pDz/lnYY49Cr4cBJLuPPsuyMvB0wuQUd49RP2GaK07uPPP8UOUvt6"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
1456
|
+
[1m[35m (0.7ms)[0m commit transaction
|
1457
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1458
|
+
Processing by SessionsController#new as HTML
|
1459
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
1460
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1461
|
+
Processing by PasswordResetsController#new as HTML
|
1462
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
1463
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1464
|
+
Processing by PasswordResetsController#create as HTML
|
1465
|
+
Parameters: {"utf8"=>"✓", "email"=>"q-Dyu6zv21zIda--a_eS7Q@sample.com", "commit"=>"Reset password"}
|
1466
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'q-Dyu6zv21zIda--a_eS7Q@sample.com' LIMIT 1[0m
|
1467
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'hT4ZTTTnFvm-k27EoRy-uw' LIMIT 1
|
1468
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1469
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'q-Dyu6zv21zIda--a_eS7Q@sample.com' AND "users"."id" != 1) LIMIT 1
|
1470
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "hT4ZTTTnFvm-k27EoRy-uw"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
1471
|
+
[1m[35m (0.7ms)[0m commit transaction
|
1472
|
+
|
1473
|
+
Sent mail to q-Dyu6zv21zIda--a_eS7Q@sample.com (8.6ms)
|
1474
|
+
Date: Wed, 23 Apr 2014 22:36:46 +0200
|
1475
|
+
From: from@example.com
|
1476
|
+
To: q-Dyu6zv21zIda--a_eS7Q@sample.com
|
1477
|
+
Message-ID: <5358245e39472_4c1c3fffa4c2dbb476777@air.lan.mail>
|
1478
|
+
Subject: Password Reset
|
1479
|
+
Mime-Version: 1.0
|
1480
|
+
Content-Type: text/plain;
|
1481
|
+
charset=UTF-8
|
1482
|
+
Content-Transfer-Encoding: 7bit
|
1483
|
+
|
1484
|
+
To reset your password, click the URL below.
|
1485
|
+
|
1486
|
+
http://localhost:3000/password_resets/hT4ZTTTnFvm-k27EoRy-uw/edit
|
1487
|
+
|
1488
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
1489
|
+
Redirected to http://www.example.com/
|
1490
|
+
Completed 302 Found in 24ms (ActiveRecord: 1.8ms)
|
1491
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1492
|
+
Processing by HomeController#index as HTML
|
1493
|
+
Completed 200 OK in 3ms (Views: 2.6ms | ActiveRecord: 0.0ms)
|
1494
|
+
Started GET "/password_resets/hT4ZTTTnFvm-k27EoRy-uw/edit" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1495
|
+
Processing by PasswordResetsController#edit as HTML
|
1496
|
+
Parameters: {"id"=>"hT4ZTTTnFvm-k27EoRy-uw"}
|
1497
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'hT4ZTTTnFvm-k27EoRy-uw' LIMIT 1[0m
|
1498
|
+
Completed 200 OK in 3ms (Views: 2.6ms | ActiveRecord: 0.2ms)
|
1499
|
+
Started PATCH "/password_resets/hT4ZTTTnFvm-k27EoRy-uw" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1500
|
+
Processing by PasswordResetsController#update as HTML
|
1501
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"hT4ZTTTnFvm-k27EoRy-uw"}
|
1502
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'hT4ZTTTnFvm-k27EoRy-uw' LIMIT 1
|
1503
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
1504
|
+
[1m[35mUser Exists (0.3ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'q-Dyu6zv21zIda--a_eS7Q@sample.com' AND "users"."id" != 1) LIMIT 1
|
1505
|
+
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
1506
|
+
Completed 200 OK in 10ms (Views: 3.8ms | ActiveRecord: 0.6ms)
|
1507
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
1508
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1509
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1510
|
+
-----------------------------------
|
1511
|
+
AuthproIntegrationTest: test_signup
|
1512
|
+
-----------------------------------
|
1513
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1514
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1515
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '3owOjo-P8m2VafDyEOE8HQ@sample.com' LIMIT 1[0m
|
1516
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 's-nLSSW7rKD7tr75vNSbaQ' LIMIT 1
|
1517
|
+
Binary data inserted for `string` type on column `password_digest`
|
1518
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "s-nLSSW7rKD7tr75vNSbaQ"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "3owOjo-P8m2VafDyEOE8HQ@sample.com"], ["password_digest", "$2a$04$IpvuyRzs7K0LBzRl/Fnd3u9LezQA5eAD9cB7ZjXDhyg74M70v/Ew6"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
1519
|
+
[1m[35m (0.8ms)[0m commit transaction
|
1520
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1521
|
+
Processing by HomeController#index as HTML
|
1522
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
1523
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1524
|
+
Processing by UsersController#new as HTML
|
1525
|
+
Completed 200 OK in 5ms (Views: 4.7ms | ActiveRecord: 0.0ms)
|
1526
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1527
|
+
Processing by UsersController#create as HTML
|
1528
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"J80NPH11CALTuvKlE3kCRg@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
1529
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
1530
|
+
[1m[35mUser Exists (0.4ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'J80NPH11CALTuvKlE3kCRg@sample.com' LIMIT 1
|
1531
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'LvHbb1owyGJy_ytsfQFWOg' LIMIT 1[0m
|
1532
|
+
Binary data inserted for `string` type on column `password_digest`
|
1533
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "LvHbb1owyGJy_ytsfQFWOg"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "J80NPH11CALTuvKlE3kCRg@sample.com"], ["password_digest", "$2a$04$L5BQELp5CXX0RLAnDHCcBec3FhIcSGcPMLakHICxDb/Ug2Nfuue0K"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
1534
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
1535
|
+
Redirected to http://www.example.com/
|
1536
|
+
Completed 302 Found in 8ms (ActiveRecord: 2.1ms)
|
1537
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1538
|
+
Processing by HomeController#index as HTML
|
1539
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
1540
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
1541
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1542
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1543
|
+
-------------------------------------------
|
1544
|
+
AuthproIntegrationTest: test_signup_failing
|
1545
|
+
-------------------------------------------
|
1546
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1547
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1548
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'i5xhJ_WWMH0-ut6OqMvmlQ@sample.com' LIMIT 1[0m
|
1549
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '_MyL8HhR0a5JBBxxXmDqDw' LIMIT 1
|
1550
|
+
Binary data inserted for `string` type on column `password_digest`
|
1551
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "_MyL8HhR0a5JBBxxXmDqDw"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "i5xhJ_WWMH0-ut6OqMvmlQ@sample.com"], ["password_digest", "$2a$04$tic6tcr0OftCgBvI9cVlX.Hq.yG2eZs4C4W6xL5WOWvwKVLBeeEz."], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
1552
|
+
[1m[35m (0.9ms)[0m commit transaction
|
1553
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1554
|
+
Processing by HomeController#index as HTML
|
1555
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
1556
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1557
|
+
Processing by UsersController#new as HTML
|
1558
|
+
Completed 200 OK in 5ms (Views: 4.8ms | ActiveRecord: 0.0ms)
|
1559
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1560
|
+
Processing by UsersController#create as HTML
|
1561
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"EplLfTKqbHiBgOJdYrHKow@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
1562
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1563
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'EplLfTKqbHiBgOJdYrHKow@sample.com' LIMIT 1
|
1564
|
+
[1m[36m (0.0ms)[0m [1mrollback transaction[0m
|
1565
|
+
Completed 200 OK in 6ms (Views: 2.6ms | ActiveRecord: 0.3ms)
|
1566
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
1567
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1568
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1569
|
+
---------------------------------------
|
1570
|
+
AuthproIntegrationTest: test_visit_home
|
1571
|
+
---------------------------------------
|
1572
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1573
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1574
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'Z0Yc-gtFVcn9yHLkZ6axKg@sample.com' LIMIT 1[0m
|
1575
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'CSJnPxgDf59IiYxRIUZq4w' LIMIT 1
|
1576
|
+
Binary data inserted for `string` type on column `password_digest`
|
1577
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "CSJnPxgDf59IiYxRIUZq4w"], ["created_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00], ["email", "Z0Yc-gtFVcn9yHLkZ6axKg@sample.com"], ["password_digest", "$2a$04$pEVBbBvWaj4sOFOj.4IoQ.ZXp1uDEpiJxazsuJpSQnTTbcIXNsvJG"], ["updated_at", Wed, 23 Apr 2014 20:36:46 UTC +00:00]]
|
1578
|
+
[1m[35m (0.6ms)[0m commit transaction
|
1579
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:36:46 +0200
|
1580
|
+
Processing by HomeController#index as HTML
|
1581
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
1582
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
1583
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
1584
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
1585
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
1586
|
+
------------------------------------------
|
1587
|
+
AuthproGeneratorTest: test_generated_files
|
1588
|
+
------------------------------------------
|
1589
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
1590
|
+
----------------------------------
|
1591
|
+
AuthproIntegrationTest: test_login
|
1592
|
+
----------------------------------
|
1593
|
+
[1m[36m (1.3ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
1594
|
+
[1m[35m (1.1ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
1595
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1596
|
+
Migrating to CreateUsers (20140423203816)
|
1597
|
+
[1m[35m (0.0ms)[0m begin transaction
|
1598
|
+
[1m[36m (0.3ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
1599
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20140423203816"]]
|
1600
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
1601
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1602
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'Taj-ReE3ilaNvZSJYbi0qw@sample.com' LIMIT 1[0m
|
1603
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '-qgW6FPGA4j2dAb6LY911A' LIMIT 1
|
1604
|
+
Binary data inserted for `string` type on column `password_digest`
|
1605
|
+
[1m[36mSQL (3.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "-qgW6FPGA4j2dAb6LY911A"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "Taj-ReE3ilaNvZSJYbi0qw@sample.com"], ["password_digest", "$2a$04$GrKqsdFHD5TrXGn.niZEf.eCypzd0qv6rpvfolOD8fdB63/WYxUPG"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1606
|
+
[1m[35m (15.4ms)[0m commit transaction
|
1607
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1608
|
+
Processing by HomeController#index as HTML
|
1609
|
+
Rendered home/index.html.erb within layouts/application (1.0ms)
|
1610
|
+
Completed 200 OK in 20ms (Views: 20.0ms | ActiveRecord: 0.0ms)
|
1611
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1612
|
+
Processing by SessionsController#new as HTML
|
1613
|
+
Rendered sessions/new.html.erb within layouts/application (1.2ms)
|
1614
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
1615
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1616
|
+
Processing by SessionsController#create as HTML
|
1617
|
+
Parameters: {"utf8"=>"✓", "email"=>"Taj-ReE3ilaNvZSJYbi0qw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
1618
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'Taj-ReE3ilaNvZSJYbi0qw@sample.com' LIMIT 1[0m
|
1619
|
+
Redirected to http://www.example.com/
|
1620
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
1621
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1622
|
+
Processing by HomeController#index as HTML
|
1623
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
1624
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = '-qgW6FPGA4j2dAb6LY911A' LIMIT 1
|
1625
|
+
Completed 200 OK in 3ms (Views: 2.3ms | ActiveRecord: 0.1ms)
|
1626
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
1627
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
1628
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
1629
|
+
------------------------------------------
|
1630
|
+
AuthproIntegrationTest: test_login_failing
|
1631
|
+
------------------------------------------
|
1632
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
1633
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1634
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'lKh502Xy9XPIGPG3SHtbTw@sample.com' LIMIT 1
|
1635
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'WihjtCBN5mUqA0pRzcFuWw' LIMIT 1[0m
|
1636
|
+
Binary data inserted for `string` type on column `password_digest`
|
1637
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "WihjtCBN5mUqA0pRzcFuWw"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "lKh502Xy9XPIGPG3SHtbTw@sample.com"], ["password_digest", "$2a$04$dY1P0zVG8UVhoJ/PQvcMVOhJo9sv3Fos1W4urSTq5z4NMSrXFPHp."], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1638
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
1639
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1640
|
+
Processing by HomeController#index as HTML
|
1641
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
1642
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1643
|
+
Processing by SessionsController#new as HTML
|
1644
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
1645
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1646
|
+
Processing by SessionsController#create as HTML
|
1647
|
+
Parameters: {"utf8"=>"✓", "email"=>"lKh502Xy9XPIGPG3SHtbTw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
1648
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'lKh502Xy9XPIGPG3SHtbTw@sample.com' LIMIT 1
|
1649
|
+
Completed 200 OK in 4ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
1650
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM "users";[0m
|
1651
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
1652
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
1653
|
+
-----------------------------------
|
1654
|
+
AuthproIntegrationTest: test_logout
|
1655
|
+
-----------------------------------
|
1656
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
1657
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1658
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'RYPDEYZyoFlDDXy2vMFlLg@sample.com' LIMIT 1
|
1659
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '0eakWOnEzli0RjkxdEWtNg' LIMIT 1[0m
|
1660
|
+
Binary data inserted for `string` type on column `password_digest`
|
1661
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "0eakWOnEzli0RjkxdEWtNg"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "RYPDEYZyoFlDDXy2vMFlLg@sample.com"], ["password_digest", "$2a$04$sEMrZZx.6a.YWCp2WTPFR.mVAfaK6hRq58i8Lv.sho8v4dj6M2EuS"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1662
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
1663
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1664
|
+
Processing by SessionsController#new as HTML
|
1665
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
1666
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1667
|
+
Processing by SessionsController#create as HTML
|
1668
|
+
Parameters: {"utf8"=>"✓", "email"=>"RYPDEYZyoFlDDXy2vMFlLg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
1669
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'RYPDEYZyoFlDDXy2vMFlLg@sample.com' LIMIT 1
|
1670
|
+
Redirected to http://www.example.com/
|
1671
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
1672
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1673
|
+
Processing by HomeController#index as HTML
|
1674
|
+
[1m[36mUser Load (0.1ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = '0eakWOnEzli0RjkxdEWtNg' LIMIT 1[0m
|
1675
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.1ms)
|
1676
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1677
|
+
Processing by SessionsController#destroy as HTML
|
1678
|
+
Redirected to http://www.example.com/
|
1679
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
1680
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1681
|
+
Processing by HomeController#index as HTML
|
1682
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
1683
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
1684
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1685
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1686
|
+
-------------------------------------------
|
1687
|
+
AuthproIntegrationTest: test_reset_password
|
1688
|
+
-------------------------------------------
|
1689
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1690
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1691
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'TO5_Zc8ReqFz6PTVSfXRuA@sample.com' LIMIT 1[0m
|
1692
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'WTg44JWeG2uHc7fCKp6B1Q' LIMIT 1
|
1693
|
+
Binary data inserted for `string` type on column `password_digest`
|
1694
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "WTg44JWeG2uHc7fCKp6B1Q"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "TO5_Zc8ReqFz6PTVSfXRuA@sample.com"], ["password_digest", "$2a$04$pTwQeczOcCE8uAGd8b/lDOSO64QSGTAxlu5kSMofuosabS10JDCwO"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1695
|
+
[1m[35m (0.7ms)[0m commit transaction
|
1696
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1697
|
+
Processing by SessionsController#new as HTML
|
1698
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
1699
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1700
|
+
Processing by PasswordResetsController#new as HTML
|
1701
|
+
Completed 200 OK in 3ms (Views: 3.1ms | ActiveRecord: 0.0ms)
|
1702
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1703
|
+
Processing by PasswordResetsController#create as HTML
|
1704
|
+
Parameters: {"utf8"=>"✓", "email"=>"TO5_Zc8ReqFz6PTVSfXRuA@sample.com", "commit"=>"Reset password"}
|
1705
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'TO5_Zc8ReqFz6PTVSfXRuA@sample.com' LIMIT 1[0m
|
1706
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'VzjG_8GMhWC_qzvhzd-UMA' LIMIT 1
|
1707
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
1708
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'TO5_Zc8ReqFz6PTVSfXRuA@sample.com' AND "users"."id" != 1) LIMIT 1
|
1709
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "VzjG_8GMhWC_qzvhzd-UMA"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1710
|
+
[1m[35m (0.9ms)[0m commit transaction
|
1711
|
+
|
1712
|
+
Sent mail to TO5_Zc8ReqFz6PTVSfXRuA@sample.com (9.2ms)
|
1713
|
+
Date: Wed, 23 Apr 2014 22:38:16 +0200
|
1714
|
+
From: from@example.com
|
1715
|
+
To: TO5_Zc8ReqFz6PTVSfXRuA@sample.com
|
1716
|
+
Message-ID: <535824b8881e0_4c943fd08d42dbd089a7@air.lan.mail>
|
1717
|
+
Subject: Password Reset
|
1718
|
+
Mime-Version: 1.0
|
1719
|
+
Content-Type: text/plain;
|
1720
|
+
charset=UTF-8
|
1721
|
+
Content-Transfer-Encoding: 7bit
|
1722
|
+
|
1723
|
+
To reset your password, click the URL below.
|
1724
|
+
|
1725
|
+
http://localhost:3000/password_resets/VzjG_8GMhWC_qzvhzd-UMA/edit
|
1726
|
+
|
1727
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
1728
|
+
Redirected to http://www.example.com/
|
1729
|
+
Completed 302 Found in 144ms (ActiveRecord: 1.8ms)
|
1730
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1731
|
+
Processing by HomeController#index as HTML
|
1732
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
1733
|
+
Started GET "/password_resets/VzjG_8GMhWC_qzvhzd-UMA/edit" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1734
|
+
Processing by PasswordResetsController#edit as HTML
|
1735
|
+
Parameters: {"id"=>"VzjG_8GMhWC_qzvhzd-UMA"}
|
1736
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'VzjG_8GMhWC_qzvhzd-UMA' LIMIT 1[0m
|
1737
|
+
Completed 200 OK in 17ms (Views: 16.4ms | ActiveRecord: 0.2ms)
|
1738
|
+
Started PATCH "/password_resets/VzjG_8GMhWC_qzvhzd-UMA" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1739
|
+
Processing by PasswordResetsController#update as HTML
|
1740
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"VzjG_8GMhWC_qzvhzd-UMA"}
|
1741
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'VzjG_8GMhWC_qzvhzd-UMA' LIMIT 1
|
1742
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
1743
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'TO5_Zc8ReqFz6PTVSfXRuA@sample.com' AND "users"."id" != 1) LIMIT 1
|
1744
|
+
Binary data inserted for `string` type on column `password_digest`
|
1745
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$yF/v3uIp8c6haXjGoS0Ty.X4V6RfoVVu79ytVyZB2WMxhZfdja9hu"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1746
|
+
[1m[35m (1.9ms)[0m commit transaction
|
1747
|
+
Redirected to http://localhost:3000/
|
1748
|
+
Completed 302 Found in 7ms (ActiveRecord: 2.5ms)
|
1749
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1750
|
+
Processing by HomeController#index as HTML
|
1751
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
1752
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
1753
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
1754
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
1755
|
+
--------------------------------------------------------------------------------
|
1756
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
1757
|
+
--------------------------------------------------------------------------------
|
1758
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
1759
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1760
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '7-QG87DmnuaXcP2bfOugiA@sample.com' LIMIT 1
|
1761
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'XXBmff89CPTViNwuRiiQ9w' LIMIT 1[0m
|
1762
|
+
Binary data inserted for `string` type on column `password_digest`
|
1763
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "XXBmff89CPTViNwuRiiQ9w"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "7-QG87DmnuaXcP2bfOugiA@sample.com"], ["password_digest", "$2a$04$2IH3V6L4KWzrvRjUVee8FuMvqD/O7p6b27FADOnUcWEdwq7Zqgc.O"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1764
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
1765
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1766
|
+
Processing by SessionsController#new as HTML
|
1767
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
1768
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1769
|
+
Processing by PasswordResetsController#new as HTML
|
1770
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
1771
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1772
|
+
Processing by PasswordResetsController#create as HTML
|
1773
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
1774
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
1775
|
+
Completed 200 OK in 2ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
1776
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
1777
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
1778
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
1779
|
+
-------------------------------------------------------------------------
|
1780
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
1781
|
+
-------------------------------------------------------------------------
|
1782
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
1783
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1784
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'uTGOTYCqImFSnxCLvqPOIA@sample.com' LIMIT 1
|
1785
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'FRfZU3b8UdKsKIZ-qY1iXw' LIMIT 1[0m
|
1786
|
+
Binary data inserted for `string` type on column `password_digest`
|
1787
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "FRfZU3b8UdKsKIZ-qY1iXw"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "uTGOTYCqImFSnxCLvqPOIA@sample.com"], ["password_digest", "$2a$04$2IlpJmpOkHwrZbeaHp7r8uZ57Npvm6C0AkHznrruXtzTgm1m7k8.e"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1788
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
1789
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1790
|
+
Processing by SessionsController#new as HTML
|
1791
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
1792
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1793
|
+
Processing by PasswordResetsController#new as HTML
|
1794
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
1795
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1796
|
+
Processing by PasswordResetsController#create as HTML
|
1797
|
+
Parameters: {"utf8"=>"✓", "email"=>"uTGOTYCqImFSnxCLvqPOIA@sample.com", "commit"=>"Reset password"}
|
1798
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'uTGOTYCqImFSnxCLvqPOIA@sample.com' LIMIT 1
|
1799
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 's2SPczTWdqOPU8-JL5o71A' LIMIT 1[0m
|
1800
|
+
[1m[35m (0.0ms)[0m begin transaction
|
1801
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'uTGOTYCqImFSnxCLvqPOIA@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
1802
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "s2SPczTWdqOPU8-JL5o71A"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1803
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
1804
|
+
|
1805
|
+
Sent mail to uTGOTYCqImFSnxCLvqPOIA@sample.com (4.8ms)
|
1806
|
+
Date: Wed, 23 Apr 2014 22:38:16 +0200
|
1807
|
+
From: from@example.com
|
1808
|
+
To: uTGOTYCqImFSnxCLvqPOIA@sample.com
|
1809
|
+
Message-ID: <535824b8a69da_4c943fd08d42dbd09014@air.lan.mail>
|
1810
|
+
Subject: Password Reset
|
1811
|
+
Mime-Version: 1.0
|
1812
|
+
Content-Type: text/plain;
|
1813
|
+
charset=UTF-8
|
1814
|
+
Content-Transfer-Encoding: 7bit
|
1815
|
+
|
1816
|
+
To reset your password, click the URL below.
|
1817
|
+
|
1818
|
+
http://localhost:3000/password_resets/s2SPczTWdqOPU8-JL5o71A/edit
|
1819
|
+
|
1820
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
1821
|
+
Redirected to http://www.example.com/
|
1822
|
+
Completed 302 Found in 15ms (ActiveRecord: 1.4ms)
|
1823
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1824
|
+
Processing by HomeController#index as HTML
|
1825
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
1826
|
+
Started GET "/password_resets/s2SPczTWdqOPU8-JL5o71A/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
1827
|
+
Processing by PasswordResetsController#edit as HTML
|
1828
|
+
Parameters: {"id"=>"s2SPczTWdqOPU8-JL5o71A"}
|
1829
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 's2SPczTWdqOPU8-JL5o71A' LIMIT 1
|
1830
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
1831
|
+
Started PATCH "/password_resets/s2SPczTWdqOPU8-JL5o71A" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
1832
|
+
Processing by PasswordResetsController#update as HTML
|
1833
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"s2SPczTWdqOPU8-JL5o71A"}
|
1834
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 's2SPczTWdqOPU8-JL5o71A' LIMIT 1[0m
|
1835
|
+
Redirected to http://localhost:3000/password_resets/new
|
1836
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
1837
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
1838
|
+
Processing by PasswordResetsController#new as HTML
|
1839
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
1840
|
+
[1m[35m (2.4ms)[0m DELETE FROM "users";
|
1841
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1842
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1843
|
+
-------------------------------------------------------------------------------------------
|
1844
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
1845
|
+
-------------------------------------------------------------------------------------------
|
1846
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1847
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1848
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'aoUORfpunCewwjeoChX3Mw@sample.com' LIMIT 1[0m
|
1849
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'GkLxV1K-8K6JptZvuTa1rw' LIMIT 1
|
1850
|
+
Binary data inserted for `string` type on column `password_digest`
|
1851
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "GkLxV1K-8K6JptZvuTa1rw"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "aoUORfpunCewwjeoChX3Mw@sample.com"], ["password_digest", "$2a$04$FiihJ7XZSoe2aqsCLRqvAeTDZLFj/pyS0m7i7ktje5XqZ.OVFd736"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1852
|
+
[1m[35m (0.8ms)[0m commit transaction
|
1853
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1854
|
+
Processing by SessionsController#new as HTML
|
1855
|
+
Completed 200 OK in 4ms (Views: 3.2ms | ActiveRecord: 0.0ms)
|
1856
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1857
|
+
Processing by PasswordResetsController#new as HTML
|
1858
|
+
Completed 200 OK in 3ms (Views: 3.0ms | ActiveRecord: 0.0ms)
|
1859
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1860
|
+
Processing by PasswordResetsController#create as HTML
|
1861
|
+
Parameters: {"utf8"=>"✓", "email"=>"aoUORfpunCewwjeoChX3Mw@sample.com", "commit"=>"Reset password"}
|
1862
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'aoUORfpunCewwjeoChX3Mw@sample.com' LIMIT 1[0m
|
1863
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'XpB-KEaz41ZMD_UzXT5Xqg' LIMIT 1
|
1864
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1865
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'aoUORfpunCewwjeoChX3Mw@sample.com' AND "users"."id" != 1) LIMIT 1
|
1866
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "XpB-KEaz41ZMD_UzXT5Xqg"], ["password_reset_sent_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1867
|
+
[1m[35m (0.8ms)[0m commit transaction
|
1868
|
+
|
1869
|
+
Sent mail to aoUORfpunCewwjeoChX3Mw@sample.com (9.3ms)
|
1870
|
+
Date: Wed, 23 Apr 2014 22:38:16 +0200
|
1871
|
+
From: from@example.com
|
1872
|
+
To: aoUORfpunCewwjeoChX3Mw@sample.com
|
1873
|
+
Message-ID: <535824b8bf125_4c943fd08d42dbd09185@air.lan.mail>
|
1874
|
+
Subject: Password Reset
|
1875
|
+
Mime-Version: 1.0
|
1876
|
+
Content-Type: text/plain;
|
1877
|
+
charset=UTF-8
|
1878
|
+
Content-Transfer-Encoding: 7bit
|
1879
|
+
|
1880
|
+
To reset your password, click the URL below.
|
1881
|
+
|
1882
|
+
http://localhost:3000/password_resets/XpB-KEaz41ZMD_UzXT5Xqg/edit
|
1883
|
+
|
1884
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
1885
|
+
Redirected to http://www.example.com/
|
1886
|
+
Completed 302 Found in 27ms (ActiveRecord: 1.8ms)
|
1887
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1888
|
+
Processing by HomeController#index as HTML
|
1889
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
1890
|
+
Started GET "/password_resets/XpB-KEaz41ZMD_UzXT5Xqg/edit" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1891
|
+
Processing by PasswordResetsController#edit as HTML
|
1892
|
+
Parameters: {"id"=>"XpB-KEaz41ZMD_UzXT5Xqg"}
|
1893
|
+
[1m[36mUser Load (0.3ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'XpB-KEaz41ZMD_UzXT5Xqg' LIMIT 1[0m
|
1894
|
+
Completed 200 OK in 5ms (Views: 3.7ms | ActiveRecord: 0.3ms)
|
1895
|
+
Started PATCH "/password_resets/XpB-KEaz41ZMD_UzXT5Xqg" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1896
|
+
Processing by PasswordResetsController#update as HTML
|
1897
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"XpB-KEaz41ZMD_UzXT5Xqg"}
|
1898
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'XpB-KEaz41ZMD_UzXT5Xqg' LIMIT 1
|
1899
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1900
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'aoUORfpunCewwjeoChX3Mw@sample.com' AND "users"."id" != 1) LIMIT 1
|
1901
|
+
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
1902
|
+
Completed 200 OK in 9ms (Views: 3.7ms | ActiveRecord: 0.5ms)
|
1903
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
1904
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1905
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1906
|
+
-----------------------------------
|
1907
|
+
AuthproIntegrationTest: test_signup
|
1908
|
+
-----------------------------------
|
1909
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1910
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1911
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'RRjEJ8ChTXRwVmp2kp55LA@sample.com' LIMIT 1[0m
|
1912
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'cwzur2Q5PAZl8Ucv6IIpXA' LIMIT 1
|
1913
|
+
Binary data inserted for `string` type on column `password_digest`
|
1914
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "cwzur2Q5PAZl8Ucv6IIpXA"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "RRjEJ8ChTXRwVmp2kp55LA@sample.com"], ["password_digest", "$2a$04$pN0i.w.pExIJ7vbezxGNGOyieMlY2XG7jY383CQejtVMkrH2nVY7y"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1915
|
+
[1m[35m (1.3ms)[0m commit transaction
|
1916
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1917
|
+
Processing by HomeController#index as HTML
|
1918
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
1919
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1920
|
+
Processing by UsersController#new as HTML
|
1921
|
+
Completed 200 OK in 7ms (Views: 7.1ms | ActiveRecord: 0.0ms)
|
1922
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1923
|
+
Processing by UsersController#create as HTML
|
1924
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"0J2R9YWN6xKZf0e_zvebYA@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
1925
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1926
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '0J2R9YWN6xKZf0e_zvebYA@sample.com' LIMIT 1
|
1927
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'LtqAIy-Dg39R0TCnvm6dBQ' LIMIT 1[0m
|
1928
|
+
Binary data inserted for `string` type on column `password_digest`
|
1929
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "LtqAIy-Dg39R0TCnvm6dBQ"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "0J2R9YWN6xKZf0e_zvebYA@sample.com"], ["password_digest", "$2a$04$ldIVmpUTsO.6SCSHnmGO8uMpLcHUfZqVoD7DQlaz0b9KFMJt3V.8u"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1930
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
1931
|
+
Redirected to http://www.example.com/
|
1932
|
+
Completed 302 Found in 7ms (ActiveRecord: 1.6ms)
|
1933
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1934
|
+
Processing by HomeController#index as HTML
|
1935
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
1936
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
1937
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1938
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1939
|
+
-------------------------------------------
|
1940
|
+
AuthproIntegrationTest: test_signup_failing
|
1941
|
+
-------------------------------------------
|
1942
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1943
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1944
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'AwaDb8F6qYg8Zcp2tFzEaA@sample.com' LIMIT 1[0m
|
1945
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'jxb0TfJ9YP8RRN2MEjkcDQ' LIMIT 1
|
1946
|
+
Binary data inserted for `string` type on column `password_digest`
|
1947
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "jxb0TfJ9YP8RRN2MEjkcDQ"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "AwaDb8F6qYg8Zcp2tFzEaA@sample.com"], ["password_digest", "$2a$04$/bBQS.GuXyNnOoiS4HEbi.SZquEbuQRNfg/0havG8rEhwGWm7y31K"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1948
|
+
[1m[35m (0.7ms)[0m commit transaction
|
1949
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1950
|
+
Processing by HomeController#index as HTML
|
1951
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
1952
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1953
|
+
Processing by UsersController#new as HTML
|
1954
|
+
Completed 200 OK in 4ms (Views: 4.1ms | ActiveRecord: 0.0ms)
|
1955
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1956
|
+
Processing by UsersController#create as HTML
|
1957
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"C74ENPHf_7q6fCS4sxvuoA@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
1958
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1959
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'C74ENPHf_7q6fCS4sxvuoA@sample.com' LIMIT 1
|
1960
|
+
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
1961
|
+
Completed 200 OK in 6ms (Views: 2.6ms | ActiveRecord: 0.3ms)
|
1962
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
1963
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
1964
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
1965
|
+
---------------------------------------
|
1966
|
+
AuthproIntegrationTest: test_visit_home
|
1967
|
+
---------------------------------------
|
1968
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
1969
|
+
[1m[35m (0.1ms)[0m begin transaction
|
1970
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'i0k_g0xrJQJEu6w72O0Yew@sample.com' LIMIT 1[0m
|
1971
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'i5GlGbAlOyxyExV10qD5-w' LIMIT 1
|
1972
|
+
Binary data inserted for `string` type on column `password_digest`
|
1973
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "i5GlGbAlOyxyExV10qD5-w"], ["created_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00], ["email", "i0k_g0xrJQJEu6w72O0Yew@sample.com"], ["password_digest", "$2a$04$OdQVK9cfavtap5HADOY/x.sWR7XmzjPIH4FxaFJuKoR0I6hF6BK/q"], ["updated_at", Wed, 23 Apr 2014 20:38:16 UTC +00:00]]
|
1974
|
+
[1m[35m (0.7ms)[0m commit transaction
|
1975
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:38:16 +0200
|
1976
|
+
Processing by HomeController#index as HTML
|
1977
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
1978
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
1979
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
1980
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
1981
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1982
|
+
------------------------------------------
|
1983
|
+
AuthproGeneratorTest: test_generated_files
|
1984
|
+
------------------------------------------
|
1985
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
1986
|
+
----------------------------------
|
1987
|
+
AuthproIntegrationTest: test_login
|
1988
|
+
----------------------------------
|
1989
|
+
[1m[36m (0.9ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
1990
|
+
[1m[35m (0.1ms)[0m select sqlite_version(*)
|
1991
|
+
[1m[36m (0.8ms)[0m [1mCREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")[0m
|
1992
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
1993
|
+
Migrating to CreateUsers (20140423203816)
|
1994
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
1995
|
+
[1m[35m (0.4ms)[0m CREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime)
|
1996
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "schema_migrations" ("version") VALUES (?)[0m [["version", "20140423203816"]]
|
1997
|
+
[1m[35m (0.7ms)[0m commit transaction
|
1998
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
1999
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'eStKnzXxw_duNzumRjYr6Q@sample.com' LIMIT 1
|
2000
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'A8Wggfirj0cVofu2wrpybQ' LIMIT 1[0m
|
2001
|
+
Binary data inserted for `string` type on column `password_digest`
|
2002
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "A8Wggfirj0cVofu2wrpybQ"], ["created_at", "2014-04-23 20:48:08.931821"], ["email", "eStKnzXxw_duNzumRjYr6Q@sample.com"], ["password_digest", "$2a$04$SnWvZwe9bNy0xdhMxGE/luQ/uxozumS9vS./JnRkm2P8zCmjhddja"], ["updated_at", "2014-04-23 20:48:08.931821"]]
|
2003
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
2004
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:08 +0200
|
2005
|
+
Processing by HomeController#index as HTML
|
2006
|
+
Rendered home/index.html.erb within layouts/application (1.5ms)
|
2007
|
+
Completed 200 OK in 30ms (Views: 29.6ms | ActiveRecord: 0.0ms)
|
2008
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2009
|
+
Processing by SessionsController#new as HTML
|
2010
|
+
Rendered sessions/new.html.erb within layouts/application (1.2ms)
|
2011
|
+
Completed 200 OK in 3ms (Views: 3.3ms | ActiveRecord: 0.0ms)
|
2012
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2013
|
+
Processing by SessionsController#create as HTML
|
2014
|
+
Parameters: {"utf8"=>"✓", "email"=>"eStKnzXxw_duNzumRjYr6Q@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
2015
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'eStKnzXxw_duNzumRjYr6Q@sample.com' LIMIT 1
|
2016
|
+
Redirected to http://www.example.com/
|
2017
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
2018
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2019
|
+
Processing by HomeController#index as HTML
|
2020
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
2021
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'A8Wggfirj0cVofu2wrpybQ' LIMIT 1[0m
|
2022
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.2ms)
|
2023
|
+
[1m[35m (1.1ms)[0m DELETE FROM "users";
|
2024
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2025
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2026
|
+
------------------------------------------
|
2027
|
+
AuthproIntegrationTest: test_login_failing
|
2028
|
+
------------------------------------------
|
2029
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
2030
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2031
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'lPbyy5yI0N7ifeE-N9fnxA@sample.com' LIMIT 1[0m
|
2032
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'ukTvEvfG6k6WXCOnwK5bsA' LIMIT 1
|
2033
|
+
Binary data inserted for `string` type on column `password_digest`
|
2034
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "ukTvEvfG6k6WXCOnwK5bsA"], ["created_at", "2014-04-23 20:48:09.073122"], ["email", "lPbyy5yI0N7ifeE-N9fnxA@sample.com"], ["password_digest", "$2a$04$UpoeQOMBsAxIBJstBXBBKukuOGG1zvKlKNzPV/VN9qbUkY.AGvleK"], ["updated_at", "2014-04-23 20:48:09.073122"]]
|
2035
|
+
[1m[35m (0.9ms)[0m commit transaction
|
2036
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2037
|
+
Processing by HomeController#index as HTML
|
2038
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
2039
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2040
|
+
Processing by SessionsController#new as HTML
|
2041
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
2042
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2043
|
+
Processing by SessionsController#create as HTML
|
2044
|
+
Parameters: {"utf8"=>"✓", "email"=>"lPbyy5yI0N7ifeE-N9fnxA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
2045
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'lPbyy5yI0N7ifeE-N9fnxA@sample.com' LIMIT 1[0m
|
2046
|
+
Completed 200 OK in 4ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
2047
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
2048
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2049
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2050
|
+
-----------------------------------
|
2051
|
+
AuthproIntegrationTest: test_logout
|
2052
|
+
-----------------------------------
|
2053
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
2054
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2055
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'MjxKHuRtgeEo-JPKDffHEQ@sample.com' LIMIT 1[0m
|
2056
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'eOfnZ1veLxayGJ8FGPdblg' LIMIT 1
|
2057
|
+
Binary data inserted for `string` type on column `password_digest`
|
2058
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "eOfnZ1veLxayGJ8FGPdblg"], ["created_at", "2014-04-23 20:48:09.115442"], ["email", "MjxKHuRtgeEo-JPKDffHEQ@sample.com"], ["password_digest", "$2a$04$lHgPqd8jMnxHSMExvfu6Be9gJQwsxv7l8tv7HjkIM5n23VkNKoKey"], ["updated_at", "2014-04-23 20:48:09.115442"]]
|
2059
|
+
[1m[35m (0.9ms)[0m commit transaction
|
2060
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2061
|
+
Processing by SessionsController#new as HTML
|
2062
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
2063
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2064
|
+
Processing by SessionsController#create as HTML
|
2065
|
+
Parameters: {"utf8"=>"✓", "email"=>"MjxKHuRtgeEo-JPKDffHEQ@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
2066
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'MjxKHuRtgeEo-JPKDffHEQ@sample.com' LIMIT 1[0m
|
2067
|
+
Redirected to http://www.example.com/
|
2068
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
2069
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2070
|
+
Processing by HomeController#index as HTML
|
2071
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'eOfnZ1veLxayGJ8FGPdblg' LIMIT 1
|
2072
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.2ms)
|
2073
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2074
|
+
Processing by SessionsController#destroy as HTML
|
2075
|
+
Redirected to http://www.example.com/
|
2076
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
2077
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2078
|
+
Processing by HomeController#index as HTML
|
2079
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
2080
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
2081
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
2082
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
2083
|
+
-------------------------------------------
|
2084
|
+
AuthproIntegrationTest: test_reset_password
|
2085
|
+
-------------------------------------------
|
2086
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
2087
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2088
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'm10bqNz0T4xiHNdMCHKw6g@sample.com' LIMIT 1
|
2089
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'npywcY728OhgBG8T_JHJrg' LIMIT 1[0m
|
2090
|
+
Binary data inserted for `string` type on column `password_digest`
|
2091
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "npywcY728OhgBG8T_JHJrg"], ["created_at", "2014-04-23 20:48:09.166534"], ["email", "m10bqNz0T4xiHNdMCHKw6g@sample.com"], ["password_digest", "$2a$04$rOZwyeD.Fj/qYL34Gwes3uCeP4dtaQhx.Cd72ZuNu7izA2kCDgeb2"], ["updated_at", "2014-04-23 20:48:09.166534"]]
|
2092
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
2093
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2094
|
+
Processing by SessionsController#new as HTML
|
2095
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
2096
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2097
|
+
Processing by PasswordResetsController#new as HTML
|
2098
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
2099
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2100
|
+
Processing by PasswordResetsController#create as HTML
|
2101
|
+
Parameters: {"utf8"=>"✓", "email"=>"m10bqNz0T4xiHNdMCHKw6g@sample.com", "commit"=>"Reset password"}
|
2102
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'm10bqNz0T4xiHNdMCHKw6g@sample.com' LIMIT 1
|
2103
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '1-KxJduxHbQedINjjJShcw' LIMIT 1[0m
|
2104
|
+
[1m[35m (0.0ms)[0m begin transaction
|
2105
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'm10bqNz0T4xiHNdMCHKw6g@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
2106
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_sent_at", "2014-04-23 20:48:09.192341"], ["password_reset_token", "1-KxJduxHbQedINjjJShcw"], ["updated_at", "2014-04-23 20:48:09.193704"]]
|
2107
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
2108
|
+
|
2109
|
+
UserMailer#password_reset: processed outbound mail in 9.8ms
|
2110
|
+
|
2111
|
+
Sent mail to m10bqNz0T4xiHNdMCHKw6g@sample.com (10.2ms)
|
2112
|
+
Date: Wed, 23 Apr 2014 22:48:09 +0200
|
2113
|
+
From: from@example.com
|
2114
|
+
To: m10bqNz0T4xiHNdMCHKw6g@sample.com
|
2115
|
+
Message-ID: <5358270934158_4ddf3ff94442dbb47402a@air.lan.mail>
|
2116
|
+
Subject: Password Reset
|
2117
|
+
Mime-Version: 1.0
|
2118
|
+
Content-Type: text/plain;
|
2119
|
+
charset=UTF-8
|
2120
|
+
Content-Transfer-Encoding: 7bit
|
2121
|
+
|
2122
|
+
To reset your password, click the URL below.
|
2123
|
+
|
2124
|
+
http://localhost:3000/password_resets/1-KxJduxHbQedINjjJShcw/edit
|
2125
|
+
|
2126
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
2127
|
+
Redirected to http://www.example.com/
|
2128
|
+
Completed 302 Found in 32ms (ActiveRecord: 1.4ms)
|
2129
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2130
|
+
Processing by HomeController#index as HTML
|
2131
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
2132
|
+
Started GET "/password_resets/1-KxJduxHbQedINjjJShcw/edit" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2133
|
+
Processing by PasswordResetsController#edit as HTML
|
2134
|
+
Parameters: {"id"=>"1-KxJduxHbQedINjjJShcw"}
|
2135
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '1-KxJduxHbQedINjjJShcw' LIMIT 1
|
2136
|
+
Completed 200 OK in 18ms (Views: 17.1ms | ActiveRecord: 0.2ms)
|
2137
|
+
Started PATCH "/password_resets/1-KxJduxHbQedINjjJShcw" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2138
|
+
Processing by PasswordResetsController#update as HTML
|
2139
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"1-KxJduxHbQedINjjJShcw"}
|
2140
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '1-KxJduxHbQedINjjJShcw' LIMIT 1[0m
|
2141
|
+
[1m[35m (0.0ms)[0m begin transaction
|
2142
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'm10bqNz0T4xiHNdMCHKw6g@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
2143
|
+
Binary data inserted for `string` type on column `password_digest`
|
2144
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_digest", "$2a$04$7ZuRGypdvcyJ6oIQOrWhHemYz4sVe3ypEanYLqjcE5M4PKNZESJwO"], ["updated_at", "2014-04-23 20:48:09.252368"]]
|
2145
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
2146
|
+
Redirected to http://localhost:3000/
|
2147
|
+
Completed 302 Found in 5ms (ActiveRecord: 1.2ms)
|
2148
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2149
|
+
Processing by HomeController#index as HTML
|
2150
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
2151
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
2152
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2153
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2154
|
+
--------------------------------------------------------------------------------
|
2155
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
2156
|
+
--------------------------------------------------------------------------------
|
2157
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
2158
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2159
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'VzBbhpObaSnvZh5s9zMbIA@sample.com' LIMIT 1[0m
|
2160
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '_cyEEY2F8PthBl8Z7NjJug' LIMIT 1
|
2161
|
+
Binary data inserted for `string` type on column `password_digest`
|
2162
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "_cyEEY2F8PthBl8Z7NjJug"], ["created_at", "2014-04-23 20:48:09.278209"], ["email", "VzBbhpObaSnvZh5s9zMbIA@sample.com"], ["password_digest", "$2a$04$E9sDDN4PymHVqEB2/48OBecg8VJ3OT3DaWQ5qbQ.kZGY9LUpgxqPi"], ["updated_at", "2014-04-23 20:48:09.278209"]]
|
2163
|
+
[1m[35m (0.8ms)[0m commit transaction
|
2164
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2165
|
+
Processing by SessionsController#new as HTML
|
2166
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
2167
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2168
|
+
Processing by PasswordResetsController#new as HTML
|
2169
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
2170
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2171
|
+
Processing by PasswordResetsController#create as HTML
|
2172
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
2173
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1[0m
|
2174
|
+
Completed 200 OK in 3ms (Views: 1.6ms | ActiveRecord: 0.2ms)
|
2175
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
2176
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2177
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2178
|
+
-------------------------------------------------------------------------
|
2179
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
2180
|
+
-------------------------------------------------------------------------
|
2181
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
2182
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2183
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'OLT2SqekAjDMqzSgcnbE7Q@sample.com' LIMIT 1[0m
|
2184
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'nllYkxstVh-lHp1XnBO5tg' LIMIT 1
|
2185
|
+
Binary data inserted for `string` type on column `password_digest`
|
2186
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "nllYkxstVh-lHp1XnBO5tg"], ["created_at", "2014-04-23 20:48:09.324543"], ["email", "OLT2SqekAjDMqzSgcnbE7Q@sample.com"], ["password_digest", "$2a$04$/JiaExRAuI9pXyU48uHIXep15uq7J6NThUEzfcSssh1ixwKufdcJC"], ["updated_at", "2014-04-23 20:48:09.324543"]]
|
2187
|
+
[1m[35m (0.7ms)[0m commit transaction
|
2188
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2189
|
+
Processing by SessionsController#new as HTML
|
2190
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
2191
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2192
|
+
Processing by PasswordResetsController#new as HTML
|
2193
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
2194
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2195
|
+
Processing by PasswordResetsController#create as HTML
|
2196
|
+
Parameters: {"utf8"=>"✓", "email"=>"OLT2SqekAjDMqzSgcnbE7Q@sample.com", "commit"=>"Reset password"}
|
2197
|
+
[1m[36mUser Load (0.3ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'OLT2SqekAjDMqzSgcnbE7Q@sample.com' LIMIT 1[0m
|
2198
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'v7Ike_1veAQlIte-jOV5xQ' LIMIT 1
|
2199
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2200
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'OLT2SqekAjDMqzSgcnbE7Q@sample.com' AND "users"."id" != 1) LIMIT 1
|
2201
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_sent_at", "2014-04-23 20:48:09.358841"], ["password_reset_token", "v7Ike_1veAQlIte-jOV5xQ"], ["updated_at", "2014-04-23 20:48:09.360507"]]
|
2202
|
+
[1m[35m (0.9ms)[0m commit transaction
|
2203
|
+
|
2204
|
+
UserMailer#password_reset: processed outbound mail in 9.0ms
|
2205
|
+
|
2206
|
+
Sent mail to OLT2SqekAjDMqzSgcnbE7Q@sample.com (9.0ms)
|
2207
|
+
Date: Wed, 23 Apr 2014 22:48:09 +0200
|
2208
|
+
From: from@example.com
|
2209
|
+
To: OLT2SqekAjDMqzSgcnbE7Q@sample.com
|
2210
|
+
Message-ID: <535827095b63e_4ddf3ff94442dbb47416b@air.lan.mail>
|
2211
|
+
Subject: Password Reset
|
2212
|
+
Mime-Version: 1.0
|
2213
|
+
Content-Type: text/plain;
|
2214
|
+
charset=UTF-8
|
2215
|
+
Content-Transfer-Encoding: 7bit
|
2216
|
+
|
2217
|
+
To reset your password, click the URL below.
|
2218
|
+
|
2219
|
+
http://localhost:3000/password_resets/v7Ike_1veAQlIte-jOV5xQ/edit
|
2220
|
+
|
2221
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
2222
|
+
Redirected to http://www.example.com/
|
2223
|
+
Completed 302 Found in 26ms (ActiveRecord: 1.9ms)
|
2224
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2225
|
+
Processing by HomeController#index as HTML
|
2226
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
2227
|
+
Started GET "/password_resets/v7Ike_1veAQlIte-jOV5xQ/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
2228
|
+
Processing by PasswordResetsController#edit as HTML
|
2229
|
+
Parameters: {"id"=>"v7Ike_1veAQlIte-jOV5xQ"}
|
2230
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'v7Ike_1veAQlIte-jOV5xQ' LIMIT 1[0m
|
2231
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
2232
|
+
Started PATCH "/password_resets/v7Ike_1veAQlIte-jOV5xQ" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
2233
|
+
Processing by PasswordResetsController#update as HTML
|
2234
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"v7Ike_1veAQlIte-jOV5xQ"}
|
2235
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'v7Ike_1veAQlIte-jOV5xQ' LIMIT 1
|
2236
|
+
Redirected to http://localhost:3000/password_resets/new
|
2237
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
2238
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
2239
|
+
Processing by PasswordResetsController#new as HTML
|
2240
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
2241
|
+
[1m[36m (1.2ms)[0m [1mDELETE FROM "users";[0m
|
2242
|
+
[1m[35m (0.3ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
2243
|
+
[1m[36m (1.2ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
2244
|
+
-------------------------------------------------------------------------------------------
|
2245
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
2246
|
+
-------------------------------------------------------------------------------------------
|
2247
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
2248
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2249
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '6wy6FVYS9l9-SRhPQBG9gw@sample.com' LIMIT 1
|
2250
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'l8XMQOVdDaPEWRH4GOfbPw' LIMIT 1[0m
|
2251
|
+
Binary data inserted for `string` type on column `password_digest`
|
2252
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "l8XMQOVdDaPEWRH4GOfbPw"], ["created_at", "2014-04-23 20:48:09.445172"], ["email", "6wy6FVYS9l9-SRhPQBG9gw@sample.com"], ["password_digest", "$2a$04$iyEysQlponJXURdZLFKl0uUiKibRe4wBSEXU5aJ7g.d5DyW1pPTJS"], ["updated_at", "2014-04-23 20:48:09.445172"]]
|
2253
|
+
[1m[36m (1.1ms)[0m [1mcommit transaction[0m
|
2254
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2255
|
+
Processing by SessionsController#new as HTML
|
2256
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
2257
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2258
|
+
Processing by PasswordResetsController#new as HTML
|
2259
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
2260
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2261
|
+
Processing by PasswordResetsController#create as HTML
|
2262
|
+
Parameters: {"utf8"=>"✓", "email"=>"6wy6FVYS9l9-SRhPQBG9gw@sample.com", "commit"=>"Reset password"}
|
2263
|
+
[1m[35mUser Load (0.4ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '6wy6FVYS9l9-SRhPQBG9gw@sample.com' LIMIT 1
|
2264
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'BVYp3r1ek2iKKo4Mp0bdiQ' LIMIT 1[0m
|
2265
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2266
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '6wy6FVYS9l9-SRhPQBG9gw@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
2267
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_sent_at", "2014-04-23 20:48:09.467727"], ["password_reset_token", "BVYp3r1ek2iKKo4Mp0bdiQ"], ["updated_at", "2014-04-23 20:48:09.468732"]]
|
2268
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
2269
|
+
|
2270
|
+
UserMailer#password_reset: processed outbound mail in 6.1ms
|
2271
|
+
|
2272
|
+
Sent mail to 6wy6FVYS9l9-SRhPQBG9gw@sample.com (7.5ms)
|
2273
|
+
Date: Wed, 23 Apr 2014 22:48:09 +0200
|
2274
|
+
From: from@example.com
|
2275
|
+
To: 6wy6FVYS9l9-SRhPQBG9gw@sample.com
|
2276
|
+
Message-ID: <5358270974bf0_4ddf3ff94442dbb474246@air.lan.mail>
|
2277
|
+
Subject: Password Reset
|
2278
|
+
Mime-Version: 1.0
|
2279
|
+
Content-Type: text/plain;
|
2280
|
+
charset=UTF-8
|
2281
|
+
Content-Transfer-Encoding: 7bit
|
2282
|
+
|
2283
|
+
To reset your password, click the URL below.
|
2284
|
+
|
2285
|
+
http://localhost:3000/password_resets/BVYp3r1ek2iKKo4Mp0bdiQ/edit
|
2286
|
+
|
2287
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
2288
|
+
Redirected to http://www.example.com/
|
2289
|
+
Completed 302 Found in 20ms (ActiveRecord: 1.6ms)
|
2290
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2291
|
+
Processing by HomeController#index as HTML
|
2292
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
2293
|
+
Started GET "/password_resets/BVYp3r1ek2iKKo4Mp0bdiQ/edit" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2294
|
+
Processing by PasswordResetsController#edit as HTML
|
2295
|
+
Parameters: {"id"=>"BVYp3r1ek2iKKo4Mp0bdiQ"}
|
2296
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'BVYp3r1ek2iKKo4Mp0bdiQ' LIMIT 1
|
2297
|
+
Completed 200 OK in 4ms (Views: 3.2ms | ActiveRecord: 0.2ms)
|
2298
|
+
Started PATCH "/password_resets/BVYp3r1ek2iKKo4Mp0bdiQ" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2299
|
+
Processing by PasswordResetsController#update as HTML
|
2300
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"BVYp3r1ek2iKKo4Mp0bdiQ"}
|
2301
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'BVYp3r1ek2iKKo4Mp0bdiQ' LIMIT 1[0m
|
2302
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2303
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '6wy6FVYS9l9-SRhPQBG9gw@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
2304
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
2305
|
+
Completed 200 OK in 8ms (Views: 2.9ms | ActiveRecord: 0.4ms)
|
2306
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
2307
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
2308
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
2309
|
+
-----------------------------------
|
2310
|
+
AuthproIntegrationTest: test_signup
|
2311
|
+
-----------------------------------
|
2312
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
2313
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2314
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'ADIArS_IZbzw2DAIaqInkQ@sample.com' LIMIT 1
|
2315
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'ppvGP13UtYkVFZfkS5TJ5Q' LIMIT 1[0m
|
2316
|
+
Binary data inserted for `string` type on column `password_digest`
|
2317
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "ppvGP13UtYkVFZfkS5TJ5Q"], ["created_at", "2014-04-23 20:48:09.531336"], ["email", "ADIArS_IZbzw2DAIaqInkQ@sample.com"], ["password_digest", "$2a$04$1mATDJKFTSDeRRwszAdVvueDlHxg6rs35EgIFKEXApaGKXtaqY6gq"], ["updated_at", "2014-04-23 20:48:09.531336"]]
|
2318
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
2319
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2320
|
+
Processing by HomeController#index as HTML
|
2321
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
2322
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2323
|
+
Processing by UsersController#new as HTML
|
2324
|
+
Completed 200 OK in 5ms (Views: 4.8ms | ActiveRecord: 0.0ms)
|
2325
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2326
|
+
Processing by UsersController#create as HTML
|
2327
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"S2bCrUVQSoxiXnDFjstj-Q@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
2328
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2329
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'S2bCrUVQSoxiXnDFjstj-Q@sample.com' LIMIT 1[0m
|
2330
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'aw1t2wwJY2_X1TrKzeG6mA' LIMIT 1
|
2331
|
+
Binary data inserted for `string` type on column `password_digest`
|
2332
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "aw1t2wwJY2_X1TrKzeG6mA"], ["created_at", "2014-04-23 20:48:09.561886"], ["email", "S2bCrUVQSoxiXnDFjstj-Q@sample.com"], ["password_digest", "$2a$04$lwT.KIR.G4SIaUIRMpO54OIzWEcpGct0wHHBK9kKtqD01a2qvtGke"], ["updated_at", "2014-04-23 20:48:09.561886"]]
|
2333
|
+
[1m[35m (2.5ms)[0m commit transaction
|
2334
|
+
Redirected to http://www.example.com/
|
2335
|
+
Completed 302 Found in 7ms (ActiveRecord: 2.9ms)
|
2336
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2337
|
+
Processing by HomeController#index as HTML
|
2338
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
2339
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
2340
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
2341
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
2342
|
+
-------------------------------------------
|
2343
|
+
AuthproIntegrationTest: test_signup_failing
|
2344
|
+
-------------------------------------------
|
2345
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
2346
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2347
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '-Y_ALui14W_xdNc_ShLX3w@sample.com' LIMIT 1
|
2348
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'FzfzVhT1r2jksWM5eXqXYA' LIMIT 1[0m
|
2349
|
+
Binary data inserted for `string` type on column `password_digest`
|
2350
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "FzfzVhT1r2jksWM5eXqXYA"], ["created_at", "2014-04-23 20:48:09.588681"], ["email", "-Y_ALui14W_xdNc_ShLX3w@sample.com"], ["password_digest", "$2a$04$/k9m1JrG4AREZ9DGfRXxeOljJXarZ.ZgU5voUiyKP3lSZJjLJfqvS"], ["updated_at", "2014-04-23 20:48:09.588681"]]
|
2351
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
2352
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2353
|
+
Processing by HomeController#index as HTML
|
2354
|
+
Completed 200 OK in 1ms (Views: 1.0ms | ActiveRecord: 0.0ms)
|
2355
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2356
|
+
Processing by UsersController#new as HTML
|
2357
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
2358
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2359
|
+
Processing by UsersController#create as HTML
|
2360
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"pAfcjCZVFFDoeVfE8vb45Q@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
2361
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2362
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'pAfcjCZVFFDoeVfE8vb45Q@sample.com' LIMIT 1[0m
|
2363
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
2364
|
+
Completed 200 OK in 7ms (Views: 3.0ms | ActiveRecord: 0.2ms)
|
2365
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
2366
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
2367
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
2368
|
+
---------------------------------------
|
2369
|
+
AuthproIntegrationTest: test_visit_home
|
2370
|
+
---------------------------------------
|
2371
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
2372
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2373
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'yX2kzaq2cf3I9DUp32ODQQ@sample.com' LIMIT 1
|
2374
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'xMmKkyPwPvaZcBm5WsRSAQ' LIMIT 1[0m
|
2375
|
+
Binary data inserted for `string` type on column `password_digest`
|
2376
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "xMmKkyPwPvaZcBm5WsRSAQ"], ["created_at", "2014-04-23 20:48:09.632185"], ["email", "yX2kzaq2cf3I9DUp32ODQQ@sample.com"], ["password_digest", "$2a$04$.RbtRUnzRYi9AOKACmZf3e4ccqOyfBdW5Iqf5iDF/FkiWfJqlFCK."], ["updated_at", "2014-04-23 20:48:09.632185"]]
|
2377
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
2378
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:09 +0200
|
2379
|
+
Processing by HomeController#index as HTML
|
2380
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
2381
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
2382
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2383
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2384
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2385
|
+
------------------------------------------
|
2386
|
+
AuthproGeneratorTest: test_generated_files
|
2387
|
+
------------------------------------------
|
2388
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
2389
|
+
----------------------------------
|
2390
|
+
AuthproIntegrationTest: test_login
|
2391
|
+
----------------------------------
|
2392
|
+
[1m[36m (1.2ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
2393
|
+
[1m[35m (0.1ms)[0m select sqlite_version(*)
|
2394
|
+
[1m[36m (1.1ms)[0m [1mCREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")[0m
|
2395
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
2396
|
+
Migrating to CreateUsers (20140423203816)
|
2397
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
2398
|
+
[1m[35m (0.3ms)[0m CREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime)
|
2399
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "schema_migrations" ("version") VALUES (?)[0m [["version", "20140423203816"]]
|
2400
|
+
[1m[35m (1.0ms)[0m commit transaction
|
2401
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
2402
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'KXtXTKcWZOrJZgM2JbV_ZA@sample.com' LIMIT 1
|
2403
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '7r1zuEMnGOqhlriIFaWxmw' LIMIT 1[0m
|
2404
|
+
Binary data inserted for `string` type on column `password_digest`
|
2405
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "7r1zuEMnGOqhlriIFaWxmw"], ["created_at", "2014-04-23 20:48:24.973517"], ["email", "KXtXTKcWZOrJZgM2JbV_ZA@sample.com"], ["password_digest", "$2a$04$a/DXvf2tZGuW6Yxo77r.2OzUNY0s4OCNvj6Np54tPpG9.HPs6TeRy"], ["updated_at", "2014-04-23 20:48:24.973517"]]
|
2406
|
+
[1m[36m (1.6ms)[0m [1mcommit transaction[0m
|
2407
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2408
|
+
Processing by HomeController#index as HTML
|
2409
|
+
Rendered home/index.html.erb within layouts/application (1.0ms)
|
2410
|
+
Completed 200 OK in 20ms (Views: 20.1ms | ActiveRecord: 0.0ms)
|
2411
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2412
|
+
Processing by SessionsController#new as HTML
|
2413
|
+
Rendered sessions/new.html.erb within layouts/application (1.1ms)
|
2414
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
2415
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2416
|
+
Processing by SessionsController#create as HTML
|
2417
|
+
Parameters: {"utf8"=>"✓", "email"=>"KXtXTKcWZOrJZgM2JbV_ZA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
2418
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'KXtXTKcWZOrJZgM2JbV_ZA@sample.com' LIMIT 1
|
2419
|
+
Redirected to http://www.example.com/
|
2420
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
2421
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2422
|
+
Processing by HomeController#index as HTML
|
2423
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
2424
|
+
[1m[36mUser Load (0.1ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = '7r1zuEMnGOqhlriIFaWxmw' LIMIT 1[0m
|
2425
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.1ms)
|
2426
|
+
[1m[35m (1.6ms)[0m DELETE FROM "users";
|
2427
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2428
|
+
[1m[35m (1.1ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2429
|
+
------------------------------------------
|
2430
|
+
AuthproIntegrationTest: test_login_failing
|
2431
|
+
------------------------------------------
|
2432
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
2433
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2434
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'I8bNW0WgwXLynf9GoEkBlQ@sample.com' LIMIT 1[0m
|
2435
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'ULhE1doS7BptGEmi4ZAHdg' LIMIT 1
|
2436
|
+
Binary data inserted for `string` type on column `password_digest`
|
2437
|
+
[1m[36mSQL (0.3ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "ULhE1doS7BptGEmi4ZAHdg"], ["created_at", "2014-04-23 20:48:25.084630"], ["email", "I8bNW0WgwXLynf9GoEkBlQ@sample.com"], ["password_digest", "$2a$04$QW21t1ibOzlKbJ.StXzU6..LBaEuHwB1fvnJ99VEZsriqlCb3gWQO"], ["updated_at", "2014-04-23 20:48:25.084630"]]
|
2438
|
+
[1m[35m (0.8ms)[0m commit transaction
|
2439
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2440
|
+
Processing by HomeController#index as HTML
|
2441
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
2442
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2443
|
+
Processing by SessionsController#new as HTML
|
2444
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
2445
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2446
|
+
Processing by SessionsController#create as HTML
|
2447
|
+
Parameters: {"utf8"=>"✓", "email"=>"I8bNW0WgwXLynf9GoEkBlQ@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
2448
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'I8bNW0WgwXLynf9GoEkBlQ@sample.com' LIMIT 1[0m
|
2449
|
+
Completed 200 OK in 6ms (Views: 2.6ms | ActiveRecord: 0.2ms)
|
2450
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
2451
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2452
|
+
[1m[35m (1.1ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2453
|
+
-----------------------------------
|
2454
|
+
AuthproIntegrationTest: test_logout
|
2455
|
+
-----------------------------------
|
2456
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
2457
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2458
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'xi-4Cy0wvy9r1Rzx2QeZLQ@sample.com' LIMIT 1[0m
|
2459
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'aoYMvWH8d_yPUfQ7CigzHw' LIMIT 1
|
2460
|
+
Binary data inserted for `string` type on column `password_digest`
|
2461
|
+
[1m[36mSQL (0.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "aoYMvWH8d_yPUfQ7CigzHw"], ["created_at", "2014-04-23 20:48:25.144316"], ["email", "xi-4Cy0wvy9r1Rzx2QeZLQ@sample.com"], ["password_digest", "$2a$04$RTSdJAf0BGgcZMKa/h6rwOtkoyRYYQqZzuch1OTCosMzgq4aBvud6"], ["updated_at", "2014-04-23 20:48:25.144316"]]
|
2462
|
+
[1m[35m (0.8ms)[0m commit transaction
|
2463
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2464
|
+
Processing by SessionsController#new as HTML
|
2465
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
2466
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2467
|
+
Processing by SessionsController#create as HTML
|
2468
|
+
Parameters: {"utf8"=>"✓", "email"=>"xi-4Cy0wvy9r1Rzx2QeZLQ@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
2469
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'xi-4Cy0wvy9r1Rzx2QeZLQ@sample.com' LIMIT 1[0m
|
2470
|
+
Redirected to http://www.example.com/
|
2471
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
2472
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2473
|
+
Processing by HomeController#index as HTML
|
2474
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'aoYMvWH8d_yPUfQ7CigzHw' LIMIT 1
|
2475
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.1ms)
|
2476
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2477
|
+
Processing by SessionsController#destroy as HTML
|
2478
|
+
Redirected to http://www.example.com/
|
2479
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
2480
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2481
|
+
Processing by HomeController#index as HTML
|
2482
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
2483
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
2484
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
2485
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
2486
|
+
-------------------------------------------
|
2487
|
+
AuthproIntegrationTest: test_reset_password
|
2488
|
+
-------------------------------------------
|
2489
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
2490
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2491
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'dAHpWaPaaGkvorpO5VAcwA@sample.com' LIMIT 1
|
2492
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'fRd9d-JD50I0nCzVFttimA' LIMIT 1[0m
|
2493
|
+
Binary data inserted for `string` type on column `password_digest`
|
2494
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "fRd9d-JD50I0nCzVFttimA"], ["created_at", "2014-04-23 20:48:25.195590"], ["email", "dAHpWaPaaGkvorpO5VAcwA@sample.com"], ["password_digest", "$2a$04$XX99bgm4lm9UoDar.HpmN.9eGxpgC2PdckIg1RRb7iRXE3MyYZw8a"], ["updated_at", "2014-04-23 20:48:25.195590"]]
|
2495
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
2496
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2497
|
+
Processing by SessionsController#new as HTML
|
2498
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
2499
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2500
|
+
Processing by PasswordResetsController#new as HTML
|
2501
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
2502
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2503
|
+
Processing by PasswordResetsController#create as HTML
|
2504
|
+
Parameters: {"utf8"=>"✓", "email"=>"dAHpWaPaaGkvorpO5VAcwA@sample.com", "commit"=>"Reset password"}
|
2505
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'dAHpWaPaaGkvorpO5VAcwA@sample.com' LIMIT 1
|
2506
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'scQt1uG4hl6duQr8wnEQcw' LIMIT 1[0m
|
2507
|
+
[1m[35m (0.0ms)[0m begin transaction
|
2508
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'dAHpWaPaaGkvorpO5VAcwA@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
2509
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_sent_at", "2014-04-23 20:48:25.220515"], ["password_reset_token", "scQt1uG4hl6duQr8wnEQcw"], ["updated_at", "2014-04-23 20:48:25.221727"]]
|
2510
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
2511
|
+
|
2512
|
+
UserMailer#password_reset: processed outbound mail in 11.7ms
|
2513
|
+
|
2514
|
+
Sent mail to dAHpWaPaaGkvorpO5VAcwA@sample.com (7.6ms)
|
2515
|
+
Date: Wed, 23 Apr 2014 22:48:25 +0200
|
2516
|
+
From: from@example.com
|
2517
|
+
To: dAHpWaPaaGkvorpO5VAcwA@sample.com
|
2518
|
+
Message-ID: <535827193ae69_4e0e3fe654c2dbb45523e@air.lan.mail>
|
2519
|
+
Subject: Password Reset
|
2520
|
+
Mime-Version: 1.0
|
2521
|
+
Content-Type: text/plain;
|
2522
|
+
charset=UTF-8
|
2523
|
+
Content-Transfer-Encoding: 7bit
|
2524
|
+
|
2525
|
+
To reset your password, click the URL below.
|
2526
|
+
|
2527
|
+
http://localhost:3000/password_resets/scQt1uG4hl6duQr8wnEQcw/edit
|
2528
|
+
|
2529
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
2530
|
+
Redirected to http://www.example.com/
|
2531
|
+
Completed 302 Found in 29ms (ActiveRecord: 1.4ms)
|
2532
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2533
|
+
Processing by HomeController#index as HTML
|
2534
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
2535
|
+
Started GET "/password_resets/scQt1uG4hl6duQr8wnEQcw/edit" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2536
|
+
Processing by PasswordResetsController#edit as HTML
|
2537
|
+
Parameters: {"id"=>"scQt1uG4hl6duQr8wnEQcw"}
|
2538
|
+
[1m[35mUser Load (0.3ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'scQt1uG4hl6duQr8wnEQcw' LIMIT 1
|
2539
|
+
Completed 200 OK in 14ms (Views: 12.4ms | ActiveRecord: 0.3ms)
|
2540
|
+
Started PATCH "/password_resets/scQt1uG4hl6duQr8wnEQcw" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2541
|
+
Processing by PasswordResetsController#update as HTML
|
2542
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"scQt1uG4hl6duQr8wnEQcw"}
|
2543
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'scQt1uG4hl6duQr8wnEQcw' LIMIT 1[0m
|
2544
|
+
[1m[35m (0.0ms)[0m begin transaction
|
2545
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'dAHpWaPaaGkvorpO5VAcwA@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
2546
|
+
Binary data inserted for `string` type on column `password_digest`
|
2547
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_digest", "$2a$04$UfZIZTy8Y8/2dbjDhvdza.q5IUByKMYO2r4TajpGqEp4f1OnE0bVm"], ["updated_at", "2014-04-23 20:48:25.274952"]]
|
2548
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
2549
|
+
Redirected to http://localhost:3000/
|
2550
|
+
Completed 302 Found in 5ms (ActiveRecord: 1.3ms)
|
2551
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2552
|
+
Processing by HomeController#index as HTML
|
2553
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
2554
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
2555
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2556
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2557
|
+
--------------------------------------------------------------------------------
|
2558
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
2559
|
+
--------------------------------------------------------------------------------
|
2560
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
2561
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2562
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'W2XGKiCRuMzIdJVKyt60TQ@sample.com' LIMIT 1[0m
|
2563
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '446Q2eaJDHDKq-KYNDMg3A' LIMIT 1
|
2564
|
+
Binary data inserted for `string` type on column `password_digest`
|
2565
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "446Q2eaJDHDKq-KYNDMg3A"], ["created_at", "2014-04-23 20:48:25.301966"], ["email", "W2XGKiCRuMzIdJVKyt60TQ@sample.com"], ["password_digest", "$2a$04$HlZy3firR4w7lqIPl4F/5e9o2mZHn3PRl68zSSGIJc/qDUZasc8A2"], ["updated_at", "2014-04-23 20:48:25.301966"]]
|
2566
|
+
[1m[35m (0.8ms)[0m commit transaction
|
2567
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2568
|
+
Processing by SessionsController#new as HTML
|
2569
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
2570
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2571
|
+
Processing by PasswordResetsController#new as HTML
|
2572
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
2573
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2574
|
+
Processing by PasswordResetsController#create as HTML
|
2575
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
2576
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1[0m
|
2577
|
+
Completed 200 OK in 2ms (Views: 1.3ms | ActiveRecord: 0.2ms)
|
2578
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
2579
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2580
|
+
[1m[35m (0.7ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2581
|
+
-------------------------------------------------------------------------
|
2582
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
2583
|
+
-------------------------------------------------------------------------
|
2584
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
2585
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2586
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'pfcPhwjvfc_AxdAazzr0KQ@sample.com' LIMIT 1[0m
|
2587
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'KpJ4nEIvd_kZ8nUdW01hgA' LIMIT 1
|
2588
|
+
Binary data inserted for `string` type on column `password_digest`
|
2589
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "KpJ4nEIvd_kZ8nUdW01hgA"], ["created_at", "2014-04-23 20:48:25.338505"], ["email", "pfcPhwjvfc_AxdAazzr0KQ@sample.com"], ["password_digest", "$2a$04$IOapc3LmwMAbCoiitl9r1Osnzl/IQK1Atm/.b9A.aDM7fKlqxiAMy"], ["updated_at", "2014-04-23 20:48:25.338505"]]
|
2590
|
+
[1m[35m (0.8ms)[0m commit transaction
|
2591
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2592
|
+
Processing by SessionsController#new as HTML
|
2593
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
2594
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2595
|
+
Processing by PasswordResetsController#new as HTML
|
2596
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
2597
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2598
|
+
Processing by PasswordResetsController#create as HTML
|
2599
|
+
Parameters: {"utf8"=>"✓", "email"=>"pfcPhwjvfc_AxdAazzr0KQ@sample.com", "commit"=>"Reset password"}
|
2600
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'pfcPhwjvfc_AxdAazzr0KQ@sample.com' LIMIT 1[0m
|
2601
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '-e6XMFPVxNyyqoz_6m5hUQ' LIMIT 1
|
2602
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
2603
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'pfcPhwjvfc_AxdAazzr0KQ@sample.com' AND "users"."id" != 1) LIMIT 1
|
2604
|
+
[1m[36mSQL (0.2ms)[0m [1mUPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_sent_at", "2014-04-23 20:48:25.355302"], ["password_reset_token", "-e6XMFPVxNyyqoz_6m5hUQ"], ["updated_at", "2014-04-23 20:48:25.356037"]]
|
2605
|
+
[1m[35m (0.8ms)[0m commit transaction
|
2606
|
+
|
2607
|
+
UserMailer#password_reset: processed outbound mail in 5.4ms
|
2608
|
+
|
2609
|
+
Sent mail to pfcPhwjvfc_AxdAazzr0KQ@sample.com (5.9ms)
|
2610
|
+
Date: Wed, 23 Apr 2014 22:48:25 +0200
|
2611
|
+
From: from@example.com
|
2612
|
+
To: pfcPhwjvfc_AxdAazzr0KQ@sample.com
|
2613
|
+
Message-ID: <5358271958f4d_4e0e3fe654c2dbb4553ce@air.lan.mail>
|
2614
|
+
Subject: Password Reset
|
2615
|
+
Mime-Version: 1.0
|
2616
|
+
Content-Type: text/plain;
|
2617
|
+
charset=UTF-8
|
2618
|
+
Content-Transfer-Encoding: 7bit
|
2619
|
+
|
2620
|
+
To reset your password, click the URL below.
|
2621
|
+
|
2622
|
+
http://localhost:3000/password_resets/-e6XMFPVxNyyqoz_6m5hUQ/edit
|
2623
|
+
|
2624
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
2625
|
+
Redirected to http://www.example.com/
|
2626
|
+
Completed 302 Found in 16ms (ActiveRecord: 1.3ms)
|
2627
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2628
|
+
Processing by HomeController#index as HTML
|
2629
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
2630
|
+
Started GET "/password_resets/-e6XMFPVxNyyqoz_6m5hUQ/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
2631
|
+
Processing by PasswordResetsController#edit as HTML
|
2632
|
+
Parameters: {"id"=>"-e6XMFPVxNyyqoz_6m5hUQ"}
|
2633
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '-e6XMFPVxNyyqoz_6m5hUQ' LIMIT 1[0m
|
2634
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
2635
|
+
Started PATCH "/password_resets/-e6XMFPVxNyyqoz_6m5hUQ" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
2636
|
+
Processing by PasswordResetsController#update as HTML
|
2637
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"-e6XMFPVxNyyqoz_6m5hUQ"}
|
2638
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '-e6XMFPVxNyyqoz_6m5hUQ' LIMIT 1
|
2639
|
+
Redirected to http://localhost:3000/password_resets/new
|
2640
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
2641
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
2642
|
+
Processing by PasswordResetsController#new as HTML
|
2643
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
2644
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
2645
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
2646
|
+
[1m[36m (0.7ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
2647
|
+
-------------------------------------------------------------------------------------------
|
2648
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
2649
|
+
-------------------------------------------------------------------------------------------
|
2650
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
2651
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2652
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'KkFTmDyfYknhHbOq5ROEdQ@sample.com' LIMIT 1
|
2653
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'leUTVqTKRmvy28i3D6fB9w' LIMIT 1[0m
|
2654
|
+
Binary data inserted for `string` type on column `password_digest`
|
2655
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "leUTVqTKRmvy28i3D6fB9w"], ["created_at", "2014-04-23 20:48:25.411659"], ["email", "KkFTmDyfYknhHbOq5ROEdQ@sample.com"], ["password_digest", "$2a$04$nsZrUCE0kuiBnoI.amnY4O5F2pjllaQYZ1zWMgiQQcRzjcxXm0L5K"], ["updated_at", "2014-04-23 20:48:25.411659"]]
|
2656
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
2657
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2658
|
+
Processing by SessionsController#new as HTML
|
2659
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
2660
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2661
|
+
Processing by PasswordResetsController#new as HTML
|
2662
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
2663
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2664
|
+
Processing by PasswordResetsController#create as HTML
|
2665
|
+
Parameters: {"utf8"=>"✓", "email"=>"KkFTmDyfYknhHbOq5ROEdQ@sample.com", "commit"=>"Reset password"}
|
2666
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'KkFTmDyfYknhHbOq5ROEdQ@sample.com' LIMIT 1
|
2667
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'Fnxx4cwb4ymJpqXIec6pZw' LIMIT 1[0m
|
2668
|
+
[1m[35m (0.0ms)[0m begin transaction
|
2669
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'KkFTmDyfYknhHbOq5ROEdQ@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
2670
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_sent_at", "2014-04-23 20:48:25.436143"], ["password_reset_token", "Fnxx4cwb4ymJpqXIec6pZw"], ["updated_at", "2014-04-23 20:48:25.436913"]]
|
2671
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
2672
|
+
|
2673
|
+
UserMailer#password_reset: processed outbound mail in 4.9ms
|
2674
|
+
|
2675
|
+
Sent mail to KkFTmDyfYknhHbOq5ROEdQ@sample.com (4.5ms)
|
2676
|
+
Date: Wed, 23 Apr 2014 22:48:25 +0200
|
2677
|
+
From: from@example.com
|
2678
|
+
To: KkFTmDyfYknhHbOq5ROEdQ@sample.com
|
2679
|
+
Message-ID: <535827196c7d3_4e0e3fe654c2dbb4554cd@air.lan.mail>
|
2680
|
+
Subject: Password Reset
|
2681
|
+
Mime-Version: 1.0
|
2682
|
+
Content-Type: text/plain;
|
2683
|
+
charset=UTF-8
|
2684
|
+
Content-Transfer-Encoding: 7bit
|
2685
|
+
|
2686
|
+
To reset your password, click the URL below.
|
2687
|
+
|
2688
|
+
http://localhost:3000/password_resets/Fnxx4cwb4ymJpqXIec6pZw/edit
|
2689
|
+
|
2690
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
2691
|
+
Redirected to http://www.example.com/
|
2692
|
+
Completed 302 Found in 14ms (ActiveRecord: 1.3ms)
|
2693
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2694
|
+
Processing by HomeController#index as HTML
|
2695
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
2696
|
+
Started GET "/password_resets/Fnxx4cwb4ymJpqXIec6pZw/edit" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2697
|
+
Processing by PasswordResetsController#edit as HTML
|
2698
|
+
Parameters: {"id"=>"Fnxx4cwb4ymJpqXIec6pZw"}
|
2699
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Fnxx4cwb4ymJpqXIec6pZw' LIMIT 1
|
2700
|
+
Completed 200 OK in 3ms (Views: 2.1ms | ActiveRecord: 0.2ms)
|
2701
|
+
Started PATCH "/password_resets/Fnxx4cwb4ymJpqXIec6pZw" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2702
|
+
Processing by PasswordResetsController#update as HTML
|
2703
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"Fnxx4cwb4ymJpqXIec6pZw"}
|
2704
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Fnxx4cwb4ymJpqXIec6pZw' LIMIT 1[0m
|
2705
|
+
[1m[35m (0.0ms)[0m begin transaction
|
2706
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'KkFTmDyfYknhHbOq5ROEdQ@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
2707
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
2708
|
+
Completed 200 OK in 6ms (Views: 2.4ms | ActiveRecord: 0.4ms)
|
2709
|
+
[1m[36m (3.3ms)[0m [1mDELETE FROM "users";[0m
|
2710
|
+
[1m[35m (0.3ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
2711
|
+
[1m[36m (1.1ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
2712
|
+
-----------------------------------
|
2713
|
+
AuthproIntegrationTest: test_signup
|
2714
|
+
-----------------------------------
|
2715
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
2716
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2717
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'jQGMJWoJspQaA_h0wam9lQ@sample.com' LIMIT 1
|
2718
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'QZwTwLhHVut1kH7yuZJn6g' LIMIT 1[0m
|
2719
|
+
Binary data inserted for `string` type on column `password_digest`
|
2720
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "QZwTwLhHVut1kH7yuZJn6g"], ["created_at", "2014-04-23 20:48:25.490747"], ["email", "jQGMJWoJspQaA_h0wam9lQ@sample.com"], ["password_digest", "$2a$04$Rsw64EkeJiArQb9Ct.fiuezbl2I6x/1pLhNey8Tur4gEMA6P26/X."], ["updated_at", "2014-04-23 20:48:25.490747"]]
|
2721
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
2722
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2723
|
+
Processing by HomeController#index as HTML
|
2724
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
2725
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2726
|
+
Processing by UsersController#new as HTML
|
2727
|
+
Completed 200 OK in 4ms (Views: 4.2ms | ActiveRecord: 0.0ms)
|
2728
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2729
|
+
Processing by UsersController#create as HTML
|
2730
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"CvXFBXbwVLVp8_eDoyo87g@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
2731
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2732
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'CvXFBXbwVLVp8_eDoyo87g@sample.com' LIMIT 1[0m
|
2733
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'luiqMjZU7kvk5kn5Qfjn6w' LIMIT 1
|
2734
|
+
Binary data inserted for `string` type on column `password_digest`
|
2735
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "luiqMjZU7kvk5kn5Qfjn6w"], ["created_at", "2014-04-23 20:48:25.515490"], ["email", "CvXFBXbwVLVp8_eDoyo87g@sample.com"], ["password_digest", "$2a$04$7RpkwLkBqQidb2ST/yRpI.9TToSUQ5iiWBfPJavy9vBpem/n85loW"], ["updated_at", "2014-04-23 20:48:25.515490"]]
|
2736
|
+
[1m[35m (0.7ms)[0m commit transaction
|
2737
|
+
Redirected to http://www.example.com/
|
2738
|
+
Completed 302 Found in 6ms (ActiveRecord: 1.1ms)
|
2739
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2740
|
+
Processing by HomeController#index as HTML
|
2741
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
2742
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
2743
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
2744
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
2745
|
+
-------------------------------------------
|
2746
|
+
AuthproIntegrationTest: test_signup_failing
|
2747
|
+
-------------------------------------------
|
2748
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
2749
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2750
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'trgqyfKR9NHvtCHGOrHYOA@sample.com' LIMIT 1
|
2751
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'MW9vdkk0puBHknT7VQ2KGg' LIMIT 1[0m
|
2752
|
+
Binary data inserted for `string` type on column `password_digest`
|
2753
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "MW9vdkk0puBHknT7VQ2KGg"], ["created_at", "2014-04-23 20:48:25.542549"], ["email", "trgqyfKR9NHvtCHGOrHYOA@sample.com"], ["password_digest", "$2a$04$jok7tfEsnNzNouJi2BZYSu4.nzrnGYJip84C.9gEgO1qZo1jQK1Lu"], ["updated_at", "2014-04-23 20:48:25.542549"]]
|
2754
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
2755
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2756
|
+
Processing by HomeController#index as HTML
|
2757
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
2758
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2759
|
+
Processing by UsersController#new as HTML
|
2760
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
2761
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2762
|
+
Processing by UsersController#create as HTML
|
2763
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"yP93kDbj9qR8WLq-_7papw@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
2764
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2765
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'yP93kDbj9qR8WLq-_7papw@sample.com' LIMIT 1[0m
|
2766
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
2767
|
+
Completed 200 OK in 7ms (Views: 3.1ms | ActiveRecord: 0.3ms)
|
2768
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
2769
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
2770
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
2771
|
+
---------------------------------------
|
2772
|
+
AuthproIntegrationTest: test_visit_home
|
2773
|
+
---------------------------------------
|
2774
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
2775
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2776
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'mmI6ENLMw4d70DIQyW91sA@sample.com' LIMIT 1
|
2777
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'Fz7NgaZkSqN9dOaxcnDJog' LIMIT 1[0m
|
2778
|
+
Binary data inserted for `string` type on column `password_digest`
|
2779
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "Fz7NgaZkSqN9dOaxcnDJog"], ["created_at", "2014-04-23 20:48:25.586349"], ["email", "mmI6ENLMw4d70DIQyW91sA@sample.com"], ["password_digest", "$2a$04$PQDGNYV0l9lmtr24NNaq.ujHwxHMZxnp6/92Vtw/QRsu1QXHxnza."], ["updated_at", "2014-04-23 20:48:25.586349"]]
|
2780
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
2781
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 22:48:25 +0200
|
2782
|
+
Processing by HomeController#index as HTML
|
2783
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
2784
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
2785
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2786
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2787
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2788
|
+
------------------------------------------
|
2789
|
+
AuthproGeneratorTest: test_generated_files
|
2790
|
+
------------------------------------------
|
2791
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
2792
|
+
----------------------------------
|
2793
|
+
AuthproIntegrationTest: test_login
|
2794
|
+
----------------------------------
|
2795
|
+
[1m[36m (18.5ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
2796
|
+
[1m[35m (0.2ms)[0m select sqlite_version(*)
|
2797
|
+
[1m[36m (1.3ms)[0m [1mCREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")[0m
|
2798
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
2799
|
+
Migrating to CreateUsers (20140423203816)
|
2800
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2801
|
+
[1m[35m (0.3ms)[0m CREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime)
|
2802
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "schema_migrations" ("version") VALUES (?)[0m [["version", "20140423203816"]]
|
2803
|
+
[1m[35m (0.8ms)[0m commit transaction
|
2804
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
2805
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'g0-0ZMXzwU7MQqdMHszhXg@sample.com' LIMIT 1
|
2806
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'lStgLVfPzPvMK1aTwgLMnQ' LIMIT 1[0m
|
2807
|
+
Binary data inserted for `string` type on column `password_digest`
|
2808
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "lStgLVfPzPvMK1aTwgLMnQ"], ["created_at", "2014-04-23 21:13:45.448849"], ["email", "g0-0ZMXzwU7MQqdMHszhXg@sample.com"], ["password_digest", "$2a$04$KyHcIVPZ1mzzOqJ5xul6WO1eN0e1fchFcPPONkegRvZrghxhcdBPK"], ["updated_at", "2014-04-23 21:13:45.448849"]]
|
2809
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
2810
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2811
|
+
Processing by HomeController#index as HTML
|
2812
|
+
Rendered home/index.html.erb within layouts/application (1.1ms)
|
2813
|
+
Completed 200 OK in 27ms (Views: 26.7ms | ActiveRecord: 0.0ms)
|
2814
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2815
|
+
Processing by SessionsController#new as HTML
|
2816
|
+
Rendered sessions/new.html.erb within layouts/application (1.2ms)
|
2817
|
+
Completed 200 OK in 3ms (Views: 3.0ms | ActiveRecord: 0.0ms)
|
2818
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2819
|
+
Processing by SessionsController#create as HTML
|
2820
|
+
Parameters: {"utf8"=>"✓", "email"=>"g0-0ZMXzwU7MQqdMHszhXg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
2821
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'g0-0ZMXzwU7MQqdMHszhXg@sample.com' LIMIT 1
|
2822
|
+
Redirected to http://www.example.com/
|
2823
|
+
Completed 302 Found in 3ms (ActiveRecord: 0.2ms)
|
2824
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2825
|
+
Processing by HomeController#index as HTML
|
2826
|
+
Rendered home/index.html.erb within layouts/application (0.1ms)
|
2827
|
+
[1m[36mUser Load (0.1ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'lStgLVfPzPvMK1aTwgLMnQ' LIMIT 1[0m
|
2828
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.1ms)
|
2829
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
2830
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2831
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2832
|
+
------------------------------------------
|
2833
|
+
AuthproIntegrationTest: test_login_failing
|
2834
|
+
------------------------------------------
|
2835
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
2836
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2837
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'pJz7vi3bcW1zhQ3pt6vqJg@sample.com' LIMIT 1[0m
|
2838
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'vS1fahRJcrT6ZePAzOTTnw' LIMIT 1
|
2839
|
+
Binary data inserted for `string` type on column `password_digest`
|
2840
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "vS1fahRJcrT6ZePAzOTTnw"], ["created_at", "2014-04-23 21:13:45.560854"], ["email", "pJz7vi3bcW1zhQ3pt6vqJg@sample.com"], ["password_digest", "$2a$04$mC315rdLyVbbOTfa.jucAe3cWirjlY1uxeqPuFk3/1zFobXQGmSha"], ["updated_at", "2014-04-23 21:13:45.560854"]]
|
2841
|
+
[1m[35m (0.8ms)[0m commit transaction
|
2842
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2843
|
+
Processing by HomeController#index as HTML
|
2844
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
2845
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2846
|
+
Processing by SessionsController#new as HTML
|
2847
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
2848
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2849
|
+
Processing by SessionsController#create as HTML
|
2850
|
+
Parameters: {"utf8"=>"✓", "email"=>"pJz7vi3bcW1zhQ3pt6vqJg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
2851
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'pJz7vi3bcW1zhQ3pt6vqJg@sample.com' LIMIT 1[0m
|
2852
|
+
Completed 200 OK in 3ms (Views: 1.4ms | ActiveRecord: 0.2ms)
|
2853
|
+
[1m[35m (0.9ms)[0m DELETE FROM "users";
|
2854
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2855
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2856
|
+
-----------------------------------
|
2857
|
+
AuthproIntegrationTest: test_logout
|
2858
|
+
-----------------------------------
|
2859
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
2860
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2861
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'LIOYGQY4ng7z7cPmSxLvIw@sample.com' LIMIT 1[0m
|
2862
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'KbHRciSAHJMvaIkt2LGeoA' LIMIT 1
|
2863
|
+
Binary data inserted for `string` type on column `password_digest`
|
2864
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "KbHRciSAHJMvaIkt2LGeoA"], ["created_at", "2014-04-23 21:13:45.600321"], ["email", "LIOYGQY4ng7z7cPmSxLvIw@sample.com"], ["password_digest", "$2a$04$DjjabuSZr4HYB.3r...NhO3JWtafIbDYs8MG45eCcSmiMtc8qxJ7C"], ["updated_at", "2014-04-23 21:13:45.600321"]]
|
2865
|
+
[1m[35m (0.7ms)[0m commit transaction
|
2866
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2867
|
+
Processing by SessionsController#new as HTML
|
2868
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
2869
|
+
Started POST "/sessions" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2870
|
+
Processing by SessionsController#create as HTML
|
2871
|
+
Parameters: {"utf8"=>"✓", "email"=>"LIOYGQY4ng7z7cPmSxLvIw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
2872
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'LIOYGQY4ng7z7cPmSxLvIw@sample.com' LIMIT 1[0m
|
2873
|
+
Redirected to http://www.example.com/
|
2874
|
+
Completed 302 Found in 2ms (ActiveRecord: 0.2ms)
|
2875
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2876
|
+
Processing by HomeController#index as HTML
|
2877
|
+
[1m[35mUser Load (0.1ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'KbHRciSAHJMvaIkt2LGeoA' LIMIT 1
|
2878
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.1ms)
|
2879
|
+
Started GET "/logout" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2880
|
+
Processing by SessionsController#destroy as HTML
|
2881
|
+
Redirected to http://www.example.com/
|
2882
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
2883
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2884
|
+
Processing by HomeController#index as HTML
|
2885
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
2886
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
2887
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
2888
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
2889
|
+
-------------------------------------------
|
2890
|
+
AuthproIntegrationTest: test_reset_password
|
2891
|
+
-------------------------------------------
|
2892
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
2893
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
2894
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '63ze0zqmhAsomBn2ERZEoQ@sample.com' LIMIT 1
|
2895
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '9QCZgABsekGCz1nBDmPO4A' LIMIT 1[0m
|
2896
|
+
Binary data inserted for `string` type on column `password_digest`
|
2897
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "9QCZgABsekGCz1nBDmPO4A"], ["created_at", "2014-04-23 21:13:45.649994"], ["email", "63ze0zqmhAsomBn2ERZEoQ@sample.com"], ["password_digest", "$2a$04$hefRNH.tbOPIeez2yeUWNOC0TgNgl5EapGdtpxRSJOy1wOs8yzhq2"], ["updated_at", "2014-04-23 21:13:45.649994"]]
|
2898
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
2899
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2900
|
+
Processing by SessionsController#new as HTML
|
2901
|
+
Completed 200 OK in 2ms (Views: 1.5ms | ActiveRecord: 0.0ms)
|
2902
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2903
|
+
Processing by PasswordResetsController#new as HTML
|
2904
|
+
Completed 200 OK in 3ms (Views: 2.7ms | ActiveRecord: 0.0ms)
|
2905
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2906
|
+
Processing by PasswordResetsController#create as HTML
|
2907
|
+
Parameters: {"utf8"=>"✓", "email"=>"63ze0zqmhAsomBn2ERZEoQ@sample.com", "commit"=>"Reset password"}
|
2908
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '63ze0zqmhAsomBn2ERZEoQ@sample.com' LIMIT 1
|
2909
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'WKViDZ5TxfcSzR7j5f0Utg' LIMIT 1[0m
|
2910
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2911
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '63ze0zqmhAsomBn2ERZEoQ@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
2912
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_sent_at", "2014-04-23 21:13:45.671792"], ["password_reset_token", "WKViDZ5TxfcSzR7j5f0Utg"], ["updated_at", "2014-04-23 21:13:45.673031"]]
|
2913
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
2914
|
+
|
2915
|
+
UserMailer#password_reset: processed outbound mail in 9.7ms
|
2916
|
+
|
2917
|
+
Sent mail to 63ze0zqmhAsomBn2ERZEoQ@sample.com (7.2ms)
|
2918
|
+
Date: Wed, 23 Apr 2014 23:13:45 +0200
|
2919
|
+
From: from@example.com
|
2920
|
+
To: 63ze0zqmhAsomBn2ERZEoQ@sample.com
|
2921
|
+
Message-ID: <53582d09a889f_50413fff0102dbb45054@air.lan.mail>
|
2922
|
+
Subject: Password Reset
|
2923
|
+
Mime-Version: 1.0
|
2924
|
+
Content-Type: text/plain;
|
2925
|
+
charset=UTF-8
|
2926
|
+
Content-Transfer-Encoding: 7bit
|
2927
|
+
|
2928
|
+
To reset your password, click the URL below.
|
2929
|
+
|
2930
|
+
http://localhost:3000/password_resets/WKViDZ5TxfcSzR7j5f0Utg/edit
|
2931
|
+
|
2932
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
2933
|
+
Redirected to http://www.example.com/
|
2934
|
+
Completed 302 Found in 26ms (ActiveRecord: 1.4ms)
|
2935
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2936
|
+
Processing by HomeController#index as HTML
|
2937
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
2938
|
+
Started GET "/password_resets/WKViDZ5TxfcSzR7j5f0Utg/edit" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2939
|
+
Processing by PasswordResetsController#edit as HTML
|
2940
|
+
Parameters: {"id"=>"WKViDZ5TxfcSzR7j5f0Utg"}
|
2941
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'WKViDZ5TxfcSzR7j5f0Utg' LIMIT 1
|
2942
|
+
Completed 200 OK in 12ms (Views: 11.5ms | ActiveRecord: 0.2ms)
|
2943
|
+
Started PATCH "/password_resets/WKViDZ5TxfcSzR7j5f0Utg" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2944
|
+
Processing by PasswordResetsController#update as HTML
|
2945
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"WKViDZ5TxfcSzR7j5f0Utg"}
|
2946
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'WKViDZ5TxfcSzR7j5f0Utg' LIMIT 1[0m
|
2947
|
+
[1m[35m (0.0ms)[0m begin transaction
|
2948
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '63ze0zqmhAsomBn2ERZEoQ@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
2949
|
+
Binary data inserted for `string` type on column `password_digest`
|
2950
|
+
[1m[35mSQL (0.2ms)[0m UPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_digest", "$2a$04$8Hw2v1F9HaAM334Tw0xnQeZp/AVf4WBFYUKvidgKDonbXHXstXwDK"], ["updated_at", "2014-04-23 21:13:45.721266"]]
|
2951
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
2952
|
+
Redirected to http://localhost:3000/
|
2953
|
+
Completed 302 Found in 5ms (ActiveRecord: 1.4ms)
|
2954
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2955
|
+
Processing by HomeController#index as HTML
|
2956
|
+
Completed 200 OK in 1ms (Views: 1.3ms | ActiveRecord: 0.0ms)
|
2957
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
2958
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2959
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2960
|
+
--------------------------------------------------------------------------------
|
2961
|
+
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
2962
|
+
--------------------------------------------------------------------------------
|
2963
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
2964
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2965
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'oU6oojSM3xYJBxfya6jMpA@sample.com' LIMIT 1[0m
|
2966
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'QmOpM6yj43NFJiSwUN86ZQ' LIMIT 1
|
2967
|
+
Binary data inserted for `string` type on column `password_digest`
|
2968
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "QmOpM6yj43NFJiSwUN86ZQ"], ["created_at", "2014-04-23 21:13:45.745554"], ["email", "oU6oojSM3xYJBxfya6jMpA@sample.com"], ["password_digest", "$2a$04$zYfpZTGnkA//kWOEor402epYaafrFr.hyk61ExS242os/nJ2R6WI2"], ["updated_at", "2014-04-23 21:13:45.745554"]]
|
2969
|
+
[1m[35m (0.7ms)[0m commit transaction
|
2970
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2971
|
+
Processing by SessionsController#new as HTML
|
2972
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
2973
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2974
|
+
Processing by PasswordResetsController#new as HTML
|
2975
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
2976
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2977
|
+
Processing by PasswordResetsController#create as HTML
|
2978
|
+
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
2979
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1[0m
|
2980
|
+
Completed 200 OK in 2ms (Views: 1.1ms | ActiveRecord: 0.2ms)
|
2981
|
+
[1m[35m (0.8ms)[0m DELETE FROM "users";
|
2982
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
2983
|
+
[1m[35m (0.6ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
2984
|
+
-------------------------------------------------------------------------
|
2985
|
+
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
2986
|
+
-------------------------------------------------------------------------
|
2987
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
2988
|
+
[1m[35m (0.1ms)[0m begin transaction
|
2989
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'vOdo4FfccrMwdTT6Wv3Q6A@sample.com' LIMIT 1[0m
|
2990
|
+
[1m[35mUser Exists (0.0ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '0a_nb2yK5M_AR_2n5LNZGA' LIMIT 1
|
2991
|
+
Binary data inserted for `string` type on column `password_digest`
|
2992
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "0a_nb2yK5M_AR_2n5LNZGA"], ["created_at", "2014-04-23 21:13:45.781919"], ["email", "vOdo4FfccrMwdTT6Wv3Q6A@sample.com"], ["password_digest", "$2a$04$OViv.Qn4T6EftWakfiIv0ObD5WU7YiFgf0Z75Fo.4eX4xIhIueUG."], ["updated_at", "2014-04-23 21:13:45.781919"]]
|
2993
|
+
[1m[35m (0.8ms)[0m commit transaction
|
2994
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2995
|
+
Processing by SessionsController#new as HTML
|
2996
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
2997
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
2998
|
+
Processing by PasswordResetsController#new as HTML
|
2999
|
+
Completed 200 OK in 2ms (Views: 1.4ms | ActiveRecord: 0.0ms)
|
3000
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
3001
|
+
Processing by PasswordResetsController#create as HTML
|
3002
|
+
Parameters: {"utf8"=>"✓", "email"=>"vOdo4FfccrMwdTT6Wv3Q6A@sample.com", "commit"=>"Reset password"}
|
3003
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'vOdo4FfccrMwdTT6Wv3Q6A@sample.com' LIMIT 1[0m
|
3004
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'Skrk2jtEwmh_2VBzKRdxIA' LIMIT 1
|
3005
|
+
[1m[36m (0.0ms)[0m [1mbegin transaction[0m
|
3006
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'vOdo4FfccrMwdTT6Wv3Q6A@sample.com' AND "users"."id" != 1) LIMIT 1
|
3007
|
+
[1m[36mSQL (0.2ms)[0m [1mUPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_sent_at", "2014-04-23 21:13:45.798820"], ["password_reset_token", "Skrk2jtEwmh_2VBzKRdxIA"], ["updated_at", "2014-04-23 21:13:45.799545"]]
|
3008
|
+
[1m[35m (0.8ms)[0m commit transaction
|
3009
|
+
|
3010
|
+
UserMailer#password_reset: processed outbound mail in 5.2ms
|
3011
|
+
|
3012
|
+
Sent mail to vOdo4FfccrMwdTT6Wv3Q6A@sample.com (5.4ms)
|
3013
|
+
Date: Wed, 23 Apr 2014 23:13:45 +0200
|
3014
|
+
From: from@example.com
|
3015
|
+
To: vOdo4FfccrMwdTT6Wv3Q6A@sample.com
|
3016
|
+
Message-ID: <53582d09c5344_50413fff0102dbb45131@air.lan.mail>
|
3017
|
+
Subject: Password Reset
|
3018
|
+
Mime-Version: 1.0
|
3019
|
+
Content-Type: text/plain;
|
3020
|
+
charset=UTF-8
|
3021
|
+
Content-Transfer-Encoding: 7bit
|
3022
|
+
|
3023
|
+
To reset your password, click the URL below.
|
3024
|
+
|
3025
|
+
http://localhost:3000/password_resets/Skrk2jtEwmh_2VBzKRdxIA/edit
|
3026
|
+
|
3027
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
3028
|
+
Redirected to http://www.example.com/
|
3029
|
+
Completed 302 Found in 15ms (ActiveRecord: 1.4ms)
|
3030
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
3031
|
+
Processing by HomeController#index as HTML
|
3032
|
+
Completed 200 OK in 1ms (Views: 1.2ms | ActiveRecord: 0.0ms)
|
3033
|
+
Started GET "/password_resets/Skrk2jtEwmh_2VBzKRdxIA/edit" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
3034
|
+
Processing by PasswordResetsController#edit as HTML
|
3035
|
+
Parameters: {"id"=>"Skrk2jtEwmh_2VBzKRdxIA"}
|
3036
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Skrk2jtEwmh_2VBzKRdxIA' LIMIT 1[0m
|
3037
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
3038
|
+
Started PATCH "/password_resets/Skrk2jtEwmh_2VBzKRdxIA" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
3039
|
+
Processing by PasswordResetsController#update as HTML
|
3040
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"Skrk2jtEwmh_2VBzKRdxIA"}
|
3041
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Skrk2jtEwmh_2VBzKRdxIA' LIMIT 1
|
3042
|
+
Redirected to http://localhost:3000/password_resets/new
|
3043
|
+
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
3044
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-25 02:00:00 +0200
|
3045
|
+
Processing by PasswordResetsController#new as HTML
|
3046
|
+
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
3047
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
3048
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
3049
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
3050
|
+
-------------------------------------------------------------------------------------------
|
3051
|
+
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
3052
|
+
-------------------------------------------------------------------------------------------
|
3053
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
3054
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
3055
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'uRdVzDbBY92eYGq84p9v6w@sample.com' LIMIT 1
|
3056
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'FMC394g6EWuEWt3CqGJLKA' LIMIT 1[0m
|
3057
|
+
Binary data inserted for `string` type on column `password_digest`
|
3058
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "FMC394g6EWuEWt3CqGJLKA"], ["created_at", "2014-04-23 21:13:45.850777"], ["email", "uRdVzDbBY92eYGq84p9v6w@sample.com"], ["password_digest", "$2a$04$0xoqMPi3n1kMZqfUTCzlM.xBllL3ZpO23tzWbbX.WnOXXF1rhlB8a"], ["updated_at", "2014-04-23 21:13:45.850777"]]
|
3059
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
3060
|
+
Started GET "/login" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
3061
|
+
Processing by SessionsController#new as HTML
|
3062
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
3063
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
3064
|
+
Processing by PasswordResetsController#new as HTML
|
3065
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
3066
|
+
Started POST "/password_resets" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
3067
|
+
Processing by PasswordResetsController#create as HTML
|
3068
|
+
Parameters: {"utf8"=>"✓", "email"=>"uRdVzDbBY92eYGq84p9v6w@sample.com", "commit"=>"Reset password"}
|
3069
|
+
[1m[35mUser Load (0.3ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'uRdVzDbBY92eYGq84p9v6w@sample.com' LIMIT 1
|
3070
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'Oo93Zljaf4F9Ie47sBMqqA' LIMIT 1[0m
|
3071
|
+
[1m[35m (0.1ms)[0m begin transaction
|
3072
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'uRdVzDbBY92eYGq84p9v6w@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
3073
|
+
[1m[35mSQL (0.4ms)[0m UPDATE "users" SET "password_reset_sent_at" = ?, "password_reset_token" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_sent_at", "2014-04-23 21:13:45.875749"], ["password_reset_token", "Oo93Zljaf4F9Ie47sBMqqA"], ["updated_at", "2014-04-23 21:13:45.877226"]]
|
3074
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
3075
|
+
|
3076
|
+
UserMailer#password_reset: processed outbound mail in 9.4ms
|
3077
|
+
|
3078
|
+
Sent mail to uRdVzDbBY92eYGq84p9v6w@sample.com (9.1ms)
|
3079
|
+
Date: Wed, 23 Apr 2014 23:13:45 +0200
|
3080
|
+
From: from@example.com
|
3081
|
+
To: uRdVzDbBY92eYGq84p9v6w@sample.com
|
3082
|
+
Message-ID: <53582d09d999d_50413fff0102dbb452c5@air.lan.mail>
|
3083
|
+
Subject: Password Reset
|
3084
|
+
Mime-Version: 1.0
|
3085
|
+
Content-Type: text/plain;
|
3086
|
+
charset=UTF-8
|
3087
|
+
Content-Transfer-Encoding: 7bit
|
3088
|
+
|
3089
|
+
To reset your password, click the URL below.
|
3090
|
+
|
3091
|
+
http://localhost:3000/password_resets/Oo93Zljaf4F9Ie47sBMqqA/edit
|
3092
|
+
|
3093
|
+
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
3094
|
+
Redirected to http://www.example.com/
|
3095
|
+
Completed 302 Found in 26ms (ActiveRecord: 1.7ms)
|
3096
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
3097
|
+
Processing by HomeController#index as HTML
|
3098
|
+
Completed 200 OK in 2ms (Views: 2.2ms | ActiveRecord: 0.0ms)
|
3099
|
+
Started GET "/password_resets/Oo93Zljaf4F9Ie47sBMqqA/edit" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
3100
|
+
Processing by PasswordResetsController#edit as HTML
|
3101
|
+
Parameters: {"id"=>"Oo93Zljaf4F9Ie47sBMqqA"}
|
3102
|
+
[1m[35mUser Load (0.4ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Oo93Zljaf4F9Ie47sBMqqA' LIMIT 1
|
3103
|
+
Completed 200 OK in 6ms (Views: 4.6ms | ActiveRecord: 0.4ms)
|
3104
|
+
Started PATCH "/password_resets/Oo93Zljaf4F9Ie47sBMqqA" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
3105
|
+
Processing by PasswordResetsController#update as HTML
|
3106
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"Oo93Zljaf4F9Ie47sBMqqA"}
|
3107
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'Oo93Zljaf4F9Ie47sBMqqA' LIMIT 1[0m
|
3108
|
+
[1m[35m (0.1ms)[0m begin transaction
|
3109
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'uRdVzDbBY92eYGq84p9v6w@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
3110
|
+
[1m[35m (0.0ms)[0m rollback transaction
|
3111
|
+
Completed 200 OK in 9ms (Views: 3.6ms | ActiveRecord: 0.5ms)
|
3112
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
3113
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
3114
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
3115
|
+
-----------------------------------
|
3116
|
+
AuthproIntegrationTest: test_signup
|
3117
|
+
-----------------------------------
|
3118
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
3119
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
3120
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'exUgtSKONQst4XNMd6844Q@sample.com' LIMIT 1
|
3121
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'N28G0zxJYa9DHvjcoGhBHA' LIMIT 1[0m
|
3122
|
+
Binary data inserted for `string` type on column `password_digest`
|
3123
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "N28G0zxJYa9DHvjcoGhBHA"], ["created_at", "2014-04-23 21:13:45.957494"], ["email", "exUgtSKONQst4XNMd6844Q@sample.com"], ["password_digest", "$2a$04$toPxAH2hr5Hr5OcLA.sJF.lUxdsyQrNhluGzDS7BCWNrmLYlFmPfK"], ["updated_at", "2014-04-23 21:13:45.957494"]]
|
3124
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
3125
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
3126
|
+
Processing by HomeController#index as HTML
|
3127
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
3128
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
3129
|
+
Processing by UsersController#new as HTML
|
3130
|
+
Completed 200 OK in 6ms (Views: 5.8ms | ActiveRecord: 0.0ms)
|
3131
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
3132
|
+
Processing by UsersController#create as HTML
|
3133
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"5GhT9bI-DqvFzCO6oQFn4g@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
3134
|
+
[1m[35m (0.1ms)[0m begin transaction
|
3135
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '5GhT9bI-DqvFzCO6oQFn4g@sample.com' LIMIT 1[0m
|
3136
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'v_gYjH2em1s_TeFwBLeckg' LIMIT 1
|
3137
|
+
Binary data inserted for `string` type on column `password_digest`
|
3138
|
+
[1m[36mSQL (0.2ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "v_gYjH2em1s_TeFwBLeckg"], ["created_at", "2014-04-23 21:13:45.992267"], ["email", "5GhT9bI-DqvFzCO6oQFn4g@sample.com"], ["password_digest", "$2a$04$Dr7M0TVMAKOEg9BvpyavyeSa95uI9rRXKSvSdgYrvcWyOEWoecNSm"], ["updated_at", "2014-04-23 21:13:45.992267"]]
|
3139
|
+
[1m[35m (1.1ms)[0m commit transaction
|
3140
|
+
Redirected to http://www.example.com/
|
3141
|
+
Completed 302 Found in 7ms (ActiveRecord: 1.6ms)
|
3142
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:45 +0200
|
3143
|
+
Processing by HomeController#index as HTML
|
3144
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
3145
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
3146
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
3147
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
3148
|
+
-------------------------------------------
|
3149
|
+
AuthproIntegrationTest: test_signup_failing
|
3150
|
+
-------------------------------------------
|
3151
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
3152
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
3153
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'dItJkmo92Se5s0xj7zT8lA@sample.com' LIMIT 1
|
3154
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'LRqrEKiJjRiCK3-qPm39bg' LIMIT 1[0m
|
3155
|
+
Binary data inserted for `string` type on column `password_digest`
|
3156
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "LRqrEKiJjRiCK3-qPm39bg"], ["created_at", "2014-04-23 21:13:46.029680"], ["email", "dItJkmo92Se5s0xj7zT8lA@sample.com"], ["password_digest", "$2a$04$oYD59N/OeT9B3/OkPa/Qw.Kc/vQ7yhU1wQXgapn/NE1tFWVN3GNE."], ["updated_at", "2014-04-23 21:13:46.029680"]]
|
3157
|
+
[1m[36m (0.6ms)[0m [1mcommit transaction[0m
|
3158
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:46 +0200
|
3159
|
+
Processing by HomeController#index as HTML
|
3160
|
+
Completed 200 OK in 2ms (Views: 1.6ms | ActiveRecord: 0.0ms)
|
3161
|
+
Started GET "/signup" for 127.0.0.1 at 2014-04-23 23:13:46 +0200
|
3162
|
+
Processing by UsersController#new as HTML
|
3163
|
+
Completed 200 OK in 4ms (Views: 3.8ms | ActiveRecord: 0.0ms)
|
3164
|
+
Started POST "/users" for 127.0.0.1 at 2014-04-23 23:13:46 +0200
|
3165
|
+
Processing by UsersController#create as HTML
|
3166
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"dJMpYvbCyUcJwlEORcSxgw@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
3167
|
+
[1m[35m (0.1ms)[0m begin transaction
|
3168
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'dJMpYvbCyUcJwlEORcSxgw@sample.com' LIMIT 1[0m
|
3169
|
+
[1m[35m (0.1ms)[0m rollback transaction
|
3170
|
+
Completed 200 OK in 10ms (Views: 4.5ms | ActiveRecord: 0.3ms)
|
3171
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM "users";[0m
|
3172
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
3173
|
+
[1m[36m (0.6ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
3174
|
+
---------------------------------------
|
3175
|
+
AuthproIntegrationTest: test_visit_home
|
3176
|
+
---------------------------------------
|
3177
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
3178
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
3179
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '0m86QYTfQuIS2OG81ew3-A@sample.com' LIMIT 1
|
3180
|
+
[1m[36mUser Exists (0.0ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '2MhWyjg6w6PuIPyARU8bQQ' LIMIT 1[0m
|
3181
|
+
Binary data inserted for `string` type on column `password_digest`
|
3182
|
+
[1m[35mSQL (0.2ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "2MhWyjg6w6PuIPyARU8bQQ"], ["created_at", "2014-04-23 21:13:46.085379"], ["email", "0m86QYTfQuIS2OG81ew3-A@sample.com"], ["password_digest", "$2a$04$Iu0qJwag03YEfckMnfJ2tePhhqx.e7ChKqtv54f7nhgYip1zAjb5y"], ["updated_at", "2014-04-23 21:13:46.085379"]]
|
3183
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
3184
|
+
Started GET "/" for 127.0.0.1 at 2014-04-23 23:13:46 +0200
|
3185
|
+
Processing by HomeController#index as HTML
|
3186
|
+
Completed 200 OK in 1ms (Views: 1.1ms | ActiveRecord: 0.0ms)
|
3187
|
+
[1m[35m (1.0ms)[0m DELETE FROM "users";
|
3188
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
3189
|
+
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|