authpro 0.9.1 → 0.9.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +3 -3
- data/lib/authpro/version.rb +1 -1
- data/test/dummy/config/initializers/session_store.rb +1 -1
- data/test/rails/dummy/config/initializers/session_store.rb +1 -1
- data/test/rails/dummy/db/migrate/{20130328085155_create_users.rb → 20130430211809_create_users.rb} +0 -0
- data/test/rails/dummy/db/test.sqlite3 +0 -0
- data/test/rails/dummy/log/test.log +227 -227
- data/test/rails/dummy/test/fixtures/users.yml +2 -2
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/13fe41fee1fe35b49d145bcc06610705 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/2f5173deea6c795b8fdde723bb4b63af +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/357970feca3ac29060c1e3861e2c0953 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/cffd775d018f68ce5dba1ee0d951a994 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/d771ace226fc8215a3572e0aa35bb0d6 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/f7cbd26ba1d28d48de824f0e94586655 +0 -0
- metadata +6 -6
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA1:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 82223afabf2e218a462f9ef743bda7f43974de70
|
|
4
|
+
data.tar.gz: b328f0cdb9ae80f85e213978da6c53aeeb8c638b
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 69a889523735d8a5b410070ff380f3e84c292279d5b69349510c59162420846031fb1ffea4afb3f00b468d3873390efb5e36a01b0d7dc07745ce74879d0834eb
|
|
7
|
+
data.tar.gz: c30a456b3ba66cad375b3b4673ebc5a0ecea31e4518371c56e4d01a8547d97b458eb0705365773aa66611b73c1b0bb460c49c256261188b89caeec31a7bdd32c
|
data/README.md
CHANGED
|
@@ -3,11 +3,11 @@
|
|
|
3
3
|
[](https://codeclimate.com/github/ricn/authpro)
|
|
4
4
|
[](https://travis-ci.org/ricn/authpro)
|
|
5
5
|
|
|
6
|
-
Authpro is a simple authentication generator for Rails 4. It:
|
|
6
|
+
Authpro is a simple authentication generator for Rails 4.0.0.rc1 It:
|
|
7
7
|
|
|
8
|
-
* Gives you sign up, log in, remember me & password reset
|
|
8
|
+
* Gives you sign up, log in, remember me & password reset functionality
|
|
9
9
|
* Has no hidden code, special super classes or mixins
|
|
10
|
-
* Has no configuration
|
|
10
|
+
* Has no configuration.
|
|
11
11
|
|
|
12
12
|
Authpro assumes you want:
|
|
13
13
|
|
data/lib/authpro/version.rb
CHANGED
data/test/rails/dummy/db/migrate/{20130328085155_create_users.rb → 20130430211809_create_users.rb}
RENAMED
|
File without changes
|
|
Binary file
|
|
@@ -70,138 +70,138 @@ AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
|
70
70
|
----------------------------------------------------------------
|
|
71
71
|
[1m[36m (0.3ms)[0m [1mbegin transaction[0m
|
|
72
72
|
[1m[35m (0.1ms)[0m rollback transaction
|
|
73
|
+
[1m[36m (0.3ms)[0m [1mbegin transaction[0m
|
|
73
74
|
------------------------------------------
|
|
74
75
|
AuthproGeneratorTest: test_generated_files
|
|
75
76
|
------------------------------------------
|
|
76
|
-
[1m[
|
|
77
|
-
[1m[35m (0.1ms)[0m rollback transaction
|
|
77
|
+
[1m[35m (0.2ms)[0m rollback transaction
|
|
78
78
|
----------------------------------
|
|
79
79
|
AuthproIntegrationTest: test_login
|
|
80
80
|
----------------------------------
|
|
81
|
-
[1m[36m (1.
|
|
82
|
-
[1m[35m (1.
|
|
81
|
+
[1m[36m (1.3ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
|
82
|
+
[1m[35m (1.1ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
|
83
83
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
84
|
-
Migrating to CreateUsers (
|
|
84
|
+
Migrating to CreateUsers (20130430211809)
|
|
85
85
|
[1m[35m (0.1ms)[0m begin transaction
|
|
86
|
-
[1m[36m (0.
|
|
87
|
-
[1m[35mSQL (0.
|
|
88
|
-
[1m[36m (
|
|
86
|
+
[1m[36m (0.4ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
|
87
|
+
[1m[35mSQL (0.3ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20130430211809"]]
|
|
88
|
+
[1m[36m (1.1ms)[0m [1mcommit transaction[0m
|
|
89
89
|
[1m[35m (0.1ms)[0m begin transaction
|
|
90
|
-
[1m[36mUser Exists (0.
|
|
91
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
90
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '47OURNJjM8HIk18nEONqmA@sample.com' LIMIT 1[0m
|
|
91
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'cZiucLbzPEcc12nj-I-eEw' LIMIT 1
|
|
92
92
|
Binary data inserted for `string` type on column `password_digest`
|
|
93
|
-
[1m[36mSQL (
|
|
94
|
-
[1m[35m (
|
|
95
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
93
|
+
[1m[36mSQL (5.4ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "cZiucLbzPEcc12nj-I-eEw"], ["created_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00], ["email", "47OURNJjM8HIk18nEONqmA@sample.com"], ["password_digest", "$2a$04$dhblGTlG36P1wQius.B.heeECV6Ah.9t7B9Byb9sJ9gmz.afcq3B6"], ["updated_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00]]
|
|
94
|
+
[1m[35m (2.3ms)[0m commit transaction
|
|
95
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
96
96
|
Processing by HomeController#index as HTML
|
|
97
|
-
Rendered home/index.html.erb within layouts/application (
|
|
98
|
-
Completed 200 OK in
|
|
99
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
97
|
+
Rendered home/index.html.erb within layouts/application (1.5ms)
|
|
98
|
+
Completed 200 OK in 43ms (Views: 42.7ms | ActiveRecord: 0.0ms)
|
|
99
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
100
100
|
Processing by SessionsController#new as HTML
|
|
101
|
-
Rendered sessions/new.html.erb within layouts/application (
|
|
102
|
-
Completed 200 OK in
|
|
103
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
|
101
|
+
Rendered sessions/new.html.erb within layouts/application (2.1ms)
|
|
102
|
+
Completed 200 OK in 6ms (Views: 5.1ms | ActiveRecord: 0.0ms)
|
|
103
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
104
104
|
Processing by SessionsController#create as HTML
|
|
105
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
106
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
105
|
+
Parameters: {"utf8"=>"✓", "email"=>"47OURNJjM8HIk18nEONqmA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
106
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '47OURNJjM8HIk18nEONqmA@sample.com' LIMIT 1[0m
|
|
107
107
|
Redirected to http://www.example.com/
|
|
108
|
-
Completed 302 Found in
|
|
109
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
108
|
+
Completed 302 Found in 8ms (ActiveRecord: 0.2ms)
|
|
109
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
110
110
|
Processing by HomeController#index as HTML
|
|
111
111
|
Rendered home/index.html.erb within layouts/application (0.1ms)
|
|
112
|
-
[1m[35mUser Load (0.
|
|
113
|
-
Completed 200 OK in
|
|
114
|
-
[1m[36m (
|
|
112
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'cZiucLbzPEcc12nj-I-eEw' LIMIT 1
|
|
113
|
+
Completed 200 OK in 4ms (Views: 3.7ms | ActiveRecord: 0.2ms)
|
|
114
|
+
[1m[36m (1.3ms)[0m [1mDELETE FROM "users";[0m
|
|
115
115
|
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
116
|
-
[1m[36m (
|
|
116
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
117
117
|
------------------------------------------
|
|
118
118
|
AuthproIntegrationTest: test_login_failing
|
|
119
119
|
------------------------------------------
|
|
120
120
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
121
|
-
[1m[36m (0.
|
|
122
|
-
[1m[35mUser Exists (0.
|
|
123
|
-
[1m[36mUser Exists (0.
|
|
121
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
122
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'YR807SlBnnb9sKWLya8Kng@sample.com' LIMIT 1
|
|
123
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'W9TZGZfwqzstL90XhlgpHw' LIMIT 1[0m
|
|
124
124
|
Binary data inserted for `string` type on column `password_digest`
|
|
125
|
-
[1m[35mSQL (0.
|
|
126
|
-
[1m[36m (
|
|
127
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
125
|
+
[1m[35mSQL (0.7ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "W9TZGZfwqzstL90XhlgpHw"], ["created_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00], ["email", "YR807SlBnnb9sKWLya8Kng@sample.com"], ["password_digest", "$2a$04$sg8Xi.ck1WUA4561E2ZY/uIy3TZdNdwW.GDggBD45nJLwYyCdxGOe"], ["updated_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00]]
|
|
126
|
+
[1m[36m (1.2ms)[0m [1mcommit transaction[0m
|
|
127
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
128
128
|
Processing by HomeController#index as HTML
|
|
129
|
-
Completed 200 OK in
|
|
130
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
129
|
+
Completed 200 OK in 3ms (Views: 2.4ms | ActiveRecord: 0.0ms)
|
|
130
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
131
131
|
Processing by SessionsController#new as HTML
|
|
132
|
-
Completed 200 OK in
|
|
133
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
|
132
|
+
Completed 200 OK in 2ms (Views: 2.3ms | ActiveRecord: 0.0ms)
|
|
133
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
134
134
|
Processing by SessionsController#create as HTML
|
|
135
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
136
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
137
|
-
Completed 200 OK in
|
|
135
|
+
Parameters: {"utf8"=>"✓", "email"=>"YR807SlBnnb9sKWLya8Kng@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
136
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'YR807SlBnnb9sKWLya8Kng@sample.com' LIMIT 1
|
|
137
|
+
Completed 200 OK in 9ms (Views: 2.0ms | ActiveRecord: 0.2ms)
|
|
138
138
|
[1m[36m (1.1ms)[0m [1mDELETE FROM "users";[0m
|
|
139
|
-
[1m[35m (0.
|
|
139
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
140
140
|
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
141
141
|
-----------------------------------
|
|
142
142
|
AuthproIntegrationTest: test_logout
|
|
143
143
|
-----------------------------------
|
|
144
144
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
145
145
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
146
|
-
[1m[35mUser Exists (0.
|
|
147
|
-
[1m[36mUser Exists (0.
|
|
146
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '8IxygiRKzwYM6JQmJLS_Yw@sample.com' LIMIT 1
|
|
147
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'L8qzFoVJtAcabFz-qHfyEg' LIMIT 1[0m
|
|
148
148
|
Binary data inserted for `string` type on column `password_digest`
|
|
149
|
-
[1m[35mSQL (0.
|
|
150
|
-
[1m[36m (
|
|
151
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
149
|
+
[1m[35mSQL (0.6ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "L8qzFoVJtAcabFz-qHfyEg"], ["created_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00], ["email", "8IxygiRKzwYM6JQmJLS_Yw@sample.com"], ["password_digest", "$2a$04$hE.irdOg6XVflKARSsggnerFRKB44.gYCL0VACjqo/RTlYaWSGK2O"], ["updated_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00]]
|
|
150
|
+
[1m[36m (1.0ms)[0m [1mcommit transaction[0m
|
|
151
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
152
152
|
Processing by SessionsController#new as HTML
|
|
153
|
-
Completed 200 OK in
|
|
154
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
|
153
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
|
154
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
155
155
|
Processing by SessionsController#create as HTML
|
|
156
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
157
|
-
[1m[35mUser Load (0.
|
|
156
|
+
Parameters: {"utf8"=>"✓", "email"=>"8IxygiRKzwYM6JQmJLS_Yw@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
157
|
+
[1m[35mUser Load (0.3ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '8IxygiRKzwYM6JQmJLS_Yw@sample.com' LIMIT 1
|
|
158
158
|
Redirected to http://www.example.com/
|
|
159
|
-
Completed 302 Found in
|
|
160
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
159
|
+
Completed 302 Found in 7ms (ActiveRecord: 0.3ms)
|
|
160
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
161
161
|
Processing by HomeController#index as HTML
|
|
162
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = '
|
|
163
|
-
Completed 200 OK in
|
|
164
|
-
Started GET "/logout" for 127.0.0.1 at 2013-
|
|
162
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'L8qzFoVJtAcabFz-qHfyEg' LIMIT 1[0m
|
|
163
|
+
Completed 200 OK in 3ms (Views: 2.6ms | ActiveRecord: 0.2ms)
|
|
164
|
+
Started GET "/logout" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
165
165
|
Processing by SessionsController#destroy as HTML
|
|
166
166
|
Redirected to http://www.example.com/
|
|
167
|
-
Completed 302 Found in
|
|
168
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
167
|
+
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
|
168
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
169
169
|
Processing by HomeController#index as HTML
|
|
170
|
-
Completed 200 OK in
|
|
171
|
-
[1m[35m (1.
|
|
170
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
|
171
|
+
[1m[35m (1.3ms)[0m DELETE FROM "users";
|
|
172
172
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
173
|
-
[1m[35m (
|
|
173
|
+
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
174
174
|
-------------------------------------------
|
|
175
175
|
AuthproIntegrationTest: test_reset_password
|
|
176
176
|
-------------------------------------------
|
|
177
177
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
178
178
|
[1m[35m (0.1ms)[0m begin transaction
|
|
179
|
-
[1m[36mUser Exists (0.
|
|
180
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
179
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'asfOdzA9kqagHoMGLmqLpQ@sample.com' LIMIT 1[0m
|
|
180
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'quw1QSoRoeNAnNLxPSMcwA' LIMIT 1
|
|
181
181
|
Binary data inserted for `string` type on column `password_digest`
|
|
182
|
-
[1m[36mSQL (0.
|
|
183
|
-
[1m[35m (0.
|
|
184
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
182
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "quw1QSoRoeNAnNLxPSMcwA"], ["created_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00], ["email", "asfOdzA9kqagHoMGLmqLpQ@sample.com"], ["password_digest", "$2a$04$VNgqYg2fJ4nVlpmrFux8kOL/RYq.Z19TYJIpPXPBqhk4.fRCN2l3O"], ["updated_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00]]
|
|
183
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
184
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
185
185
|
Processing by SessionsController#new as HTML
|
|
186
|
-
Completed 200 OK in
|
|
187
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
|
186
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
|
187
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
188
188
|
Processing by PasswordResetsController#new as HTML
|
|
189
|
-
Completed 200 OK in
|
|
190
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
|
189
|
+
Completed 200 OK in 5ms (Views: 4.7ms | ActiveRecord: 0.0ms)
|
|
190
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-04-30 23:18:09 +0200
|
|
191
191
|
Processing by PasswordResetsController#create as HTML
|
|
192
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
193
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
194
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
|
192
|
+
Parameters: {"utf8"=>"✓", "email"=>"asfOdzA9kqagHoMGLmqLpQ@sample.com", "commit"=>"Reset password"}
|
|
193
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'asfOdzA9kqagHoMGLmqLpQ@sample.com' LIMIT 1[0m
|
|
194
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'nsOSQeEhA0-GYtx3SO4bVg' LIMIT 1
|
|
195
195
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
196
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
|
197
|
-
[1m[36mSQL (0.
|
|
198
|
-
[1m[35m (0.
|
|
196
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'asfOdzA9kqagHoMGLmqLpQ@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
197
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "nsOSQeEhA0-GYtx3SO4bVg"], ["password_reset_sent_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00], ["updated_at", Tue, 30 Apr 2013 21:18:09 UTC +00:00]]
|
|
198
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
199
199
|
|
|
200
|
-
Sent mail to
|
|
201
|
-
Date:
|
|
200
|
+
Sent mail to asfOdzA9kqagHoMGLmqLpQ@sample.com (16.0ms)
|
|
201
|
+
Date: Tue, 30 Apr 2013 23:18:10 +0200
|
|
202
202
|
From: from@example.com
|
|
203
|
-
To:
|
|
204
|
-
Message-ID: <
|
|
203
|
+
To: asfOdzA9kqagHoMGLmqLpQ@sample.com
|
|
204
|
+
Message-ID: <518035124feb6_aa053fcf45c6067086c@Richards-MacBook-Air.local.mail>
|
|
205
205
|
Subject: Password Reset
|
|
206
206
|
Mime-Version: 1.0
|
|
207
207
|
Content-Type: text/plain;
|
|
@@ -210,91 +210,91 @@ Content-Transfer-Encoding: 7bit
|
|
|
210
210
|
|
|
211
211
|
To reset your password, click the URL below.
|
|
212
212
|
|
|
213
|
-
http://localhost:3000/password_resets/
|
|
213
|
+
http://localhost:3000/password_resets/nsOSQeEhA0-GYtx3SO4bVg/edit
|
|
214
214
|
|
|
215
215
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
216
216
|
Redirected to http://www.example.com/
|
|
217
|
-
Completed 302 Found in
|
|
218
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
217
|
+
Completed 302 Found in 358ms (ActiveRecord: 1.9ms)
|
|
218
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
219
219
|
Processing by HomeController#index as HTML
|
|
220
|
-
Completed 200 OK in
|
|
221
|
-
Started GET "/password_resets/
|
|
220
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
|
221
|
+
Started GET "/password_resets/nsOSQeEhA0-GYtx3SO4bVg/edit" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
222
222
|
Processing by PasswordResetsController#edit as HTML
|
|
223
|
-
Parameters: {"id"=>"
|
|
224
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
225
|
-
Completed 200 OK in
|
|
226
|
-
Started PATCH "/password_resets/
|
|
223
|
+
Parameters: {"id"=>"nsOSQeEhA0-GYtx3SO4bVg"}
|
|
224
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'nsOSQeEhA0-GYtx3SO4bVg' LIMIT 1[0m
|
|
225
|
+
Completed 200 OK in 69ms (Views: 67.3ms | ActiveRecord: 0.2ms)
|
|
226
|
+
Started PATCH "/password_resets/nsOSQeEhA0-GYtx3SO4bVg" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
227
227
|
Processing by PasswordResetsController#update as HTML
|
|
228
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
|
229
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
230
|
-
[1m[36m (0.
|
|
231
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
|
228
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"nsOSQeEhA0-GYtx3SO4bVg"}
|
|
229
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'nsOSQeEhA0-GYtx3SO4bVg' LIMIT 1
|
|
230
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
231
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'asfOdzA9kqagHoMGLmqLpQ@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
232
232
|
Binary data inserted for `string` type on column `password_digest`
|
|
233
|
-
[1m[36mSQL (0.
|
|
234
|
-
[1m[35m (2.
|
|
233
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$mAUunAE/1JNTqGm32TFjre7tm6muzV8l2aSs/AHi.pCPATD.CMqty"], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
|
234
|
+
[1m[35m (2.2ms)[0m commit transaction
|
|
235
235
|
Redirected to http://localhost:3000/
|
|
236
|
-
Completed 302 Found in
|
|
237
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
236
|
+
Completed 302 Found in 13ms (ActiveRecord: 3.0ms)
|
|
237
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
238
238
|
Processing by HomeController#index as HTML
|
|
239
|
-
Completed 200 OK in
|
|
239
|
+
Completed 200 OK in 3ms (Views: 2.2ms | ActiveRecord: 0.0ms)
|
|
240
240
|
[1m[36m (0.9ms)[0m [1mDELETE FROM "users";[0m
|
|
241
|
-
[1m[35m (0.
|
|
242
|
-
[1m[36m (0.
|
|
241
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
242
|
+
[1m[36m (0.9ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
243
243
|
--------------------------------------------------------------------------------
|
|
244
244
|
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
|
245
245
|
--------------------------------------------------------------------------------
|
|
246
|
-
[1m[35mActiveRecord::SchemaMigration Load (0.
|
|
246
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.2ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
247
247
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
248
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
249
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
248
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'tkuZLaiyfUlLQguDAd30MQ@sample.com' LIMIT 1
|
|
249
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'v44O1HQ53ik0czx57p7EUQ' LIMIT 1[0m
|
|
250
250
|
Binary data inserted for `string` type on column `password_digest`
|
|
251
|
-
[1m[35mSQL (0.
|
|
252
|
-
[1m[36m (0.
|
|
253
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
251
|
+
[1m[35mSQL (0.6ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "v44O1HQ53ik0czx57p7EUQ"], ["created_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["email", "tkuZLaiyfUlLQguDAd30MQ@sample.com"], ["password_digest", "$2a$04$/.wJRGADPoiB2XsTcwhWpu3uQ/63uuKl.jIJYDj8VizfZZyP5Khfm"], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
|
252
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
253
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
254
254
|
Processing by SessionsController#new as HTML
|
|
255
|
-
Completed 200 OK in
|
|
256
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
|
255
|
+
Completed 200 OK in 4ms (Views: 3.6ms | ActiveRecord: 0.0ms)
|
|
256
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
257
257
|
Processing by PasswordResetsController#new as HTML
|
|
258
|
-
Completed 200 OK in
|
|
259
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
|
258
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
|
259
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
260
260
|
Processing by PasswordResetsController#create as HTML
|
|
261
261
|
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
|
262
262
|
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
|
263
|
-
Completed 200 OK in
|
|
263
|
+
Completed 200 OK in 3ms (Views: 1.7ms | ActiveRecord: 0.2ms)
|
|
264
264
|
[1m[36m (1.1ms)[0m [1mDELETE FROM "users";[0m
|
|
265
|
-
[1m[35m (0.
|
|
266
|
-
[1m[36m (
|
|
265
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
266
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
267
267
|
-------------------------------------------------------------------------
|
|
268
268
|
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
|
269
269
|
-------------------------------------------------------------------------
|
|
270
270
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
271
|
-
[1m[36m (0.
|
|
272
|
-
[1m[35mUser Exists (0.
|
|
273
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
271
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
272
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '0E1mMLUvZsMUFRb-JyFNhg@sample.com' LIMIT 1
|
|
273
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'xnqnqNGK9ZXL4Q-oIEQVkw' LIMIT 1[0m
|
|
274
274
|
Binary data inserted for `string` type on column `password_digest`
|
|
275
|
-
[1m[35mSQL (0.
|
|
276
|
-
[1m[36m (0.
|
|
277
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
275
|
+
[1m[35mSQL (0.8ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "xnqnqNGK9ZXL4Q-oIEQVkw"], ["created_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["email", "0E1mMLUvZsMUFRb-JyFNhg@sample.com"], ["password_digest", "$2a$04$eYw1YfTF1ol3PIETXM4L8u5LxxOaAWDTEbsbp3c1V9jfCPqMbSZtS"], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
|
276
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
277
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
278
278
|
Processing by SessionsController#new as HTML
|
|
279
|
-
Completed 200 OK in
|
|
280
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
|
279
|
+
Completed 200 OK in 3ms (Views: 3.0ms | ActiveRecord: 0.0ms)
|
|
280
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
281
281
|
Processing by PasswordResetsController#new as HTML
|
|
282
|
-
Completed 200 OK in
|
|
283
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
|
282
|
+
Completed 200 OK in 3ms (Views: 2.5ms | ActiveRecord: 0.0ms)
|
|
283
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
284
284
|
Processing by PasswordResetsController#create as HTML
|
|
285
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
286
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
287
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
|
285
|
+
Parameters: {"utf8"=>"✓", "email"=>"0E1mMLUvZsMUFRb-JyFNhg@sample.com", "commit"=>"Reset password"}
|
|
286
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '0E1mMLUvZsMUFRb-JyFNhg@sample.com' LIMIT 1
|
|
287
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'UZjYKNusQJRru1IUhHcbOQ' LIMIT 1[0m
|
|
288
288
|
[1m[35m (0.1ms)[0m begin transaction
|
|
289
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
|
290
|
-
[1m[35mSQL (0.4ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "
|
|
291
|
-
[1m[36m (
|
|
289
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '0E1mMLUvZsMUFRb-JyFNhg@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
290
|
+
[1m[35mSQL (0.4ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "UZjYKNusQJRru1IUhHcbOQ"], ["password_reset_sent_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
|
291
|
+
[1m[36m (1.5ms)[0m [1mcommit transaction[0m
|
|
292
292
|
|
|
293
|
-
Sent mail to
|
|
294
|
-
Date:
|
|
293
|
+
Sent mail to 0E1mMLUvZsMUFRb-JyFNhg@sample.com (10.5ms)
|
|
294
|
+
Date: Tue, 30 Apr 2013 23:18:10 +0200
|
|
295
295
|
From: from@example.com
|
|
296
|
-
To:
|
|
297
|
-
Message-ID: <
|
|
296
|
+
To: 0E1mMLUvZsMUFRb-JyFNhg@sample.com
|
|
297
|
+
Message-ID: <518035129791d_aa053fcf45c6067098b@Richards-MacBook-Air.local.mail>
|
|
298
298
|
Subject: Password Reset
|
|
299
299
|
Mime-Version: 1.0
|
|
300
300
|
Content-Type: text/plain;
|
|
@@ -303,62 +303,62 @@ Content-Transfer-Encoding: 7bit
|
|
|
303
303
|
|
|
304
304
|
To reset your password, click the URL below.
|
|
305
305
|
|
|
306
|
-
http://localhost:3000/password_resets/
|
|
306
|
+
http://localhost:3000/password_resets/UZjYKNusQJRru1IUhHcbOQ/edit
|
|
307
307
|
|
|
308
308
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
309
309
|
Redirected to http://www.example.com/
|
|
310
|
-
Completed 302 Found in
|
|
311
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
310
|
+
Completed 302 Found in 31ms (ActiveRecord: 2.4ms)
|
|
311
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
312
312
|
Processing by HomeController#index as HTML
|
|
313
|
-
Completed 200 OK in
|
|
314
|
-
Started GET "/password_resets/
|
|
313
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
|
314
|
+
Started GET "/password_resets/UZjYKNusQJRru1IUhHcbOQ/edit" for 127.0.0.1 at 2013-05-02 02:00:00 +0200
|
|
315
315
|
Processing by PasswordResetsController#edit as HTML
|
|
316
|
-
Parameters: {"id"=>"
|
|
317
|
-
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
316
|
+
Parameters: {"id"=>"UZjYKNusQJRru1IUhHcbOQ"}
|
|
317
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'UZjYKNusQJRru1IUhHcbOQ' LIMIT 1
|
|
318
318
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
319
|
-
Started PATCH "/password_resets/
|
|
319
|
+
Started PATCH "/password_resets/UZjYKNusQJRru1IUhHcbOQ" for 127.0.0.1 at 2013-05-02 02:00:00 +0200
|
|
320
320
|
Processing by PasswordResetsController#update as HTML
|
|
321
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
|
322
|
-
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
321
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"UZjYKNusQJRru1IUhHcbOQ"}
|
|
322
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'UZjYKNusQJRru1IUhHcbOQ' LIMIT 1[0m
|
|
323
323
|
Redirected to http://localhost:3000/password_resets/new
|
|
324
324
|
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
|
325
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
|
325
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-05-02 02:00:00 +0200
|
|
326
326
|
Processing by PasswordResetsController#new as HTML
|
|
327
327
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
328
|
-
[1m[35m (
|
|
328
|
+
[1m[35m (1.1ms)[0m DELETE FROM "users";
|
|
329
329
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
330
|
-
[1m[35m (
|
|
330
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
331
331
|
-------------------------------------------------------------------------------------------
|
|
332
332
|
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
|
333
333
|
-------------------------------------------------------------------------------------------
|
|
334
334
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
335
|
-
[1m[35m (0.
|
|
336
|
-
[1m[36mUser Exists (0.
|
|
337
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
335
|
+
[1m[35m (0.2ms)[0m begin transaction
|
|
336
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'nqlk8PeNSt4SJbT5j3Zffg@sample.com' LIMIT 1[0m
|
|
337
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'GPTtlmB3hKlj5KfLKAhCOw' LIMIT 1
|
|
338
338
|
Binary data inserted for `string` type on column `password_digest`
|
|
339
|
-
[1m[36mSQL (0.
|
|
340
|
-
[1m[35m (
|
|
341
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
339
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "GPTtlmB3hKlj5KfLKAhCOw"], ["created_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["email", "nqlk8PeNSt4SJbT5j3Zffg@sample.com"], ["password_digest", "$2a$04$1C6Ei54nApFCbAlzowrOi.kNs0MIWSUGlhVdUnz9HO5jFeMkHpeGK"], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
|
340
|
+
[1m[35m (1.1ms)[0m commit transaction
|
|
341
|
+
Started GET "/login" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
342
342
|
Processing by SessionsController#new as HTML
|
|
343
|
-
Completed 200 OK in
|
|
344
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
|
343
|
+
Completed 200 OK in 4ms (Views: 3.7ms | ActiveRecord: 0.0ms)
|
|
344
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
345
345
|
Processing by PasswordResetsController#new as HTML
|
|
346
|
-
Completed 200 OK in
|
|
347
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
|
346
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
|
347
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
348
348
|
Processing by PasswordResetsController#create as HTML
|
|
349
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
350
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
351
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
|
352
|
-
[1m[36m (0.
|
|
353
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
|
354
|
-
[1m[36mSQL (0.
|
|
355
|
-
[1m[35m (0.
|
|
349
|
+
Parameters: {"utf8"=>"✓", "email"=>"nqlk8PeNSt4SJbT5j3Zffg@sample.com", "commit"=>"Reset password"}
|
|
350
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'nqlk8PeNSt4SJbT5j3Zffg@sample.com' LIMIT 1[0m
|
|
351
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'H1m3GQxm5cD0zlVgd9rh7w' LIMIT 1
|
|
352
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
353
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'nqlk8PeNSt4SJbT5j3Zffg@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
354
|
+
[1m[36mSQL (0.4ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "H1m3GQxm5cD0zlVgd9rh7w"], ["password_reset_sent_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
|
355
|
+
[1m[35m (0.8ms)[0m commit transaction
|
|
356
356
|
|
|
357
|
-
Sent mail to
|
|
358
|
-
Date:
|
|
357
|
+
Sent mail to nqlk8PeNSt4SJbT5j3Zffg@sample.com (9.9ms)
|
|
358
|
+
Date: Tue, 30 Apr 2013 23:18:10 +0200
|
|
359
359
|
From: from@example.com
|
|
360
|
-
To:
|
|
361
|
-
Message-ID: <
|
|
360
|
+
To: nqlk8PeNSt4SJbT5j3Zffg@sample.com
|
|
361
|
+
Message-ID: <51803512b91aa_aa053fcf45c606701018@Richards-MacBook-Air.local.mail>
|
|
362
362
|
Subject: Password Reset
|
|
363
363
|
Mime-Version: 1.0
|
|
364
364
|
Content-Type: text/plain;
|
|
@@ -367,102 +367,102 @@ Content-Transfer-Encoding: 7bit
|
|
|
367
367
|
|
|
368
368
|
To reset your password, click the URL below.
|
|
369
369
|
|
|
370
|
-
http://localhost:3000/password_resets/
|
|
370
|
+
http://localhost:3000/password_resets/H1m3GQxm5cD0zlVgd9rh7w/edit
|
|
371
371
|
|
|
372
372
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
373
373
|
Redirected to http://www.example.com/
|
|
374
|
-
Completed 302 Found in
|
|
375
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
374
|
+
Completed 302 Found in 29ms (ActiveRecord: 1.8ms)
|
|
375
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
376
376
|
Processing by HomeController#index as HTML
|
|
377
|
-
Completed 200 OK in 2ms (Views:
|
|
378
|
-
Started GET "/password_resets/
|
|
377
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
|
378
|
+
Started GET "/password_resets/H1m3GQxm5cD0zlVgd9rh7w/edit" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
379
379
|
Processing by PasswordResetsController#edit as HTML
|
|
380
|
-
Parameters: {"id"=>"
|
|
381
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
382
|
-
Completed 200 OK in
|
|
383
|
-
Started PATCH "/password_resets/
|
|
380
|
+
Parameters: {"id"=>"H1m3GQxm5cD0zlVgd9rh7w"}
|
|
381
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'H1m3GQxm5cD0zlVgd9rh7w' LIMIT 1[0m
|
|
382
|
+
Completed 200 OK in 6ms (Views: 4.1ms | ActiveRecord: 0.2ms)
|
|
383
|
+
Started PATCH "/password_resets/H1m3GQxm5cD0zlVgd9rh7w" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
384
384
|
Processing by PasswordResetsController#update as HTML
|
|
385
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
|
386
|
-
[1m[35mUser Load (0.
|
|
387
|
-
[1m[36m (0.
|
|
388
|
-
[1m[35mUser Exists (0.
|
|
385
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"H1m3GQxm5cD0zlVgd9rh7w"}
|
|
386
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'H1m3GQxm5cD0zlVgd9rh7w' LIMIT 1
|
|
387
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
388
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'nqlk8PeNSt4SJbT5j3Zffg@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
389
389
|
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
|
390
|
-
Completed 200 OK in
|
|
391
|
-
[1m[35m (
|
|
392
|
-
[1m[36m (0.
|
|
390
|
+
Completed 200 OK in 17ms (Views: 4.9ms | ActiveRecord: 0.5ms)
|
|
391
|
+
[1m[35m (2.7ms)[0m DELETE FROM "users";
|
|
392
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
393
393
|
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
394
394
|
-----------------------------------
|
|
395
395
|
AuthproIntegrationTest: test_signup
|
|
396
396
|
-----------------------------------
|
|
397
397
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
398
|
-
[1m[35m (0.
|
|
399
|
-
[1m[36mUser Exists (0.
|
|
400
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
398
|
+
[1m[35m (0.2ms)[0m begin transaction
|
|
399
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'kp0wZabKy17WEIwj0GubnQ@sample.com' LIMIT 1[0m
|
|
400
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'syH-73PlQNuFGtoTWbzIiA' LIMIT 1
|
|
401
401
|
Binary data inserted for `string` type on column `password_digest`
|
|
402
|
-
[1m[36mSQL (0.
|
|
402
|
+
[1m[36mSQL (0.7ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "syH-73PlQNuFGtoTWbzIiA"], ["created_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["email", "kp0wZabKy17WEIwj0GubnQ@sample.com"], ["password_digest", "$2a$04$CPUEOnzuPwys/fpENWwUxOK29dLclsQO3nGdoslOxmaV9c9m0w48y"], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
|
403
403
|
[1m[35m (0.7ms)[0m commit transaction
|
|
404
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
404
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
405
405
|
Processing by HomeController#index as HTML
|
|
406
|
-
Completed 200 OK in
|
|
407
|
-
Started GET "/signup" for 127.0.0.1 at 2013-
|
|
406
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
|
407
|
+
Started GET "/signup" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
408
408
|
Processing by UsersController#new as HTML
|
|
409
|
-
Completed 200 OK in
|
|
410
|
-
Started POST "/users" for 127.0.0.1 at 2013-
|
|
409
|
+
Completed 200 OK in 9ms (Views: 7.7ms | ActiveRecord: 0.0ms)
|
|
410
|
+
Started POST "/users" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
411
411
|
Processing by UsersController#create as HTML
|
|
412
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
|
412
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"XX9v5aaGxz1w63AqEcBssw@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
413
413
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
414
|
-
[1m[35mUser Exists (0.
|
|
415
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
414
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'XX9v5aaGxz1w63AqEcBssw@sample.com' LIMIT 1
|
|
415
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'c_2flZGmo1rkyaL_kK8Pxw' LIMIT 1[0m
|
|
416
416
|
Binary data inserted for `string` type on column `password_digest`
|
|
417
|
-
[1m[35mSQL (0.
|
|
418
|
-
[1m[36m (
|
|
417
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "c_2flZGmo1rkyaL_kK8Pxw"], ["created_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00], ["email", "XX9v5aaGxz1w63AqEcBssw@sample.com"], ["password_digest", "$2a$04$I3c3jFsX4.mKTOa0wa0Qb.n67Qhnf6MhYi.D47JrHGNqq391ToTOe"], ["updated_at", Tue, 30 Apr 2013 21:18:10 UTC +00:00]]
|
|
418
|
+
[1m[36m (0.7ms)[0m [1mcommit transaction[0m
|
|
419
419
|
Redirected to http://www.example.com/
|
|
420
|
-
Completed 302 Found in
|
|
421
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
420
|
+
Completed 302 Found in 12ms (ActiveRecord: 1.5ms)
|
|
421
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:10 +0200
|
|
422
422
|
Processing by HomeController#index as HTML
|
|
423
|
-
Completed 200 OK in
|
|
424
|
-
[1m[35m (1.
|
|
425
|
-
[1m[36m (0.
|
|
423
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
|
424
|
+
[1m[35m (1.1ms)[0m DELETE FROM "users";
|
|
425
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
426
426
|
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
427
427
|
-------------------------------------------
|
|
428
428
|
AuthproIntegrationTest: test_signup_failing
|
|
429
429
|
-------------------------------------------
|
|
430
|
-
[1m[36mActiveRecord::SchemaMigration Load (0.
|
|
430
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.2ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
431
431
|
[1m[35m (0.1ms)[0m begin transaction
|
|
432
|
-
[1m[36mUser Exists (0.
|
|
433
|
-
[1m[35mUser Exists (0.
|
|
432
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'K59Kef8QZ5u69oEEbDTXFw@sample.com' LIMIT 1[0m
|
|
433
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'hwhp6NsHnL5QZ_Q1QCAOWg' LIMIT 1
|
|
434
434
|
Binary data inserted for `string` type on column `password_digest`
|
|
435
|
-
[1m[36mSQL (0.
|
|
436
|
-
[1m[35m (
|
|
437
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
435
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "hwhp6NsHnL5QZ_Q1QCAOWg"], ["created_at", Tue, 30 Apr 2013 21:18:11 UTC +00:00], ["email", "K59Kef8QZ5u69oEEbDTXFw@sample.com"], ["password_digest", "$2a$04$7bMbZi.mPe74d6YxM0jAGOx5Ayda3rmFZqnPO6CE8SEXbhBwqFQ8C"], ["updated_at", Tue, 30 Apr 2013 21:18:11 UTC +00:00]]
|
|
436
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
437
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:11 +0200
|
|
438
438
|
Processing by HomeController#index as HTML
|
|
439
|
-
Completed 200 OK in
|
|
440
|
-
Started GET "/signup" for 127.0.0.1 at 2013-
|
|
439
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
|
440
|
+
Started GET "/signup" for 127.0.0.1 at 2013-04-30 23:18:11 +0200
|
|
441
441
|
Processing by UsersController#new as HTML
|
|
442
|
-
Completed 200 OK in
|
|
443
|
-
Started POST "/users" for 127.0.0.1 at 2013-
|
|
442
|
+
Completed 200 OK in 6ms (Views: 5.9ms | ActiveRecord: 0.0ms)
|
|
443
|
+
Started POST "/users" for 127.0.0.1 at 2013-04-30 23:18:11 +0200
|
|
444
444
|
Processing by UsersController#create as HTML
|
|
445
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
|
445
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"F11CeZKJTsz4A89vD5HMJw@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
446
446
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
447
|
-
[1m[35mUser Exists (0.
|
|
448
|
-
[1m[36m (0.
|
|
449
|
-
Completed 200 OK in
|
|
450
|
-
[1m[35m (1.
|
|
451
|
-
[1m[36m (0.
|
|
452
|
-
[1m[35m (0.
|
|
447
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'F11CeZKJTsz4A89vD5HMJw@sample.com' LIMIT 1
|
|
448
|
+
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
|
449
|
+
Completed 200 OK in 15ms (Views: 4.8ms | ActiveRecord: 0.3ms)
|
|
450
|
+
[1m[35m (1.3ms)[0m DELETE FROM "users";
|
|
451
|
+
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
452
|
+
[1m[35m (0.8ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
453
453
|
---------------------------------------
|
|
454
454
|
AuthproIntegrationTest: test_visit_home
|
|
455
455
|
---------------------------------------
|
|
456
456
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
457
|
-
[1m[35m (0.
|
|
458
|
-
[1m[36mUser Exists (0.
|
|
459
|
-
[1m[35mUser Exists (0.
|
|
457
|
+
[1m[35m (0.2ms)[0m begin transaction
|
|
458
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'YODoUeyaJeNn7ICpxPs6ww@sample.com' LIMIT 1[0m
|
|
459
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '_AiHoog6iacfdZ52ngep4A' LIMIT 1
|
|
460
460
|
Binary data inserted for `string` type on column `password_digest`
|
|
461
|
-
[1m[36mSQL (0.
|
|
462
|
-
[1m[35m (
|
|
463
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
461
|
+
[1m[36mSQL (0.7ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "_AiHoog6iacfdZ52ngep4A"], ["created_at", Tue, 30 Apr 2013 21:18:11 UTC +00:00], ["email", "YODoUeyaJeNn7ICpxPs6ww@sample.com"], ["password_digest", "$2a$04$Pk0qUPrPab1zXjPmElChVeDOYs3pjw/DAef/DPvpcm7XqsHWMg.du"], ["updated_at", Tue, 30 Apr 2013 21:18:11 UTC +00:00]]
|
|
462
|
+
[1m[35m (0.7ms)[0m commit transaction
|
|
463
|
+
Started GET "/" for 127.0.0.1 at 2013-04-30 23:18:11 +0200
|
|
464
464
|
Processing by HomeController#index as HTML
|
|
465
|
-
Completed 200 OK in
|
|
466
|
-
[1m[36m (
|
|
465
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
|
466
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM "users";[0m
|
|
467
467
|
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
468
|
-
[1m[36m (
|
|
468
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
@@ -5,11 +5,11 @@ one:
|
|
|
5
5
|
password_digest: MyString
|
|
6
6
|
auth_token: MyString
|
|
7
7
|
password_reset_token: MyString
|
|
8
|
-
password_reset_sent_at: 2013-
|
|
8
|
+
password_reset_sent_at: 2013-04-30 23:18:09
|
|
9
9
|
|
|
10
10
|
two:
|
|
11
11
|
email: MyString
|
|
12
12
|
password_digest: MyString
|
|
13
13
|
auth_token: MyString
|
|
14
14
|
password_reset_token: MyString
|
|
15
|
-
password_reset_sent_at: 2013-
|
|
15
|
+
password_reset_sent_at: 2013-04-30 23:18:09
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: authpro
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 0.9.
|
|
4
|
+
version: 0.9.2
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Richard Nyström
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2013-
|
|
11
|
+
date: 2013-04-30 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: rails
|
|
@@ -16,14 +16,14 @@ dependencies:
|
|
|
16
16
|
requirements:
|
|
17
17
|
- - ~>
|
|
18
18
|
- !ruby/object:Gem::Version
|
|
19
|
-
version: 4.0.0.
|
|
19
|
+
version: 4.0.0.rc1
|
|
20
20
|
type: :runtime
|
|
21
21
|
prerelease: false
|
|
22
22
|
version_requirements: !ruby/object:Gem::Requirement
|
|
23
23
|
requirements:
|
|
24
24
|
- - ~>
|
|
25
25
|
- !ruby/object:Gem::Version
|
|
26
|
-
version: 4.0.0.
|
|
26
|
+
version: 4.0.0.rc1
|
|
27
27
|
- !ruby/object:Gem::Dependency
|
|
28
28
|
name: bcrypt-ruby
|
|
29
29
|
requirement: !ruby/object:Gem::Requirement
|
|
@@ -209,7 +209,7 @@ files:
|
|
|
209
209
|
- test/rails/dummy/config/locales/en.yml
|
|
210
210
|
- test/rails/dummy/config/routes.rb
|
|
211
211
|
- test/rails/dummy/config.ru
|
|
212
|
-
- test/rails/dummy/db/migrate/
|
|
212
|
+
- test/rails/dummy/db/migrate/20130430211809_create_users.rb
|
|
213
213
|
- test/rails/dummy/db/test.sqlite3
|
|
214
214
|
- test/rails/dummy/Gemfile
|
|
215
215
|
- test/rails/dummy/Gemfile.lock
|
|
@@ -327,7 +327,7 @@ test_files:
|
|
|
327
327
|
- test/rails/dummy/config/locales/en.yml
|
|
328
328
|
- test/rails/dummy/config/routes.rb
|
|
329
329
|
- test/rails/dummy/config.ru
|
|
330
|
-
- test/rails/dummy/db/migrate/
|
|
330
|
+
- test/rails/dummy/db/migrate/20130430211809_create_users.rb
|
|
331
331
|
- test/rails/dummy/db/test.sqlite3
|
|
332
332
|
- test/rails/dummy/Gemfile
|
|
333
333
|
- test/rails/dummy/Gemfile.lock
|