authpro 0.9.2 → 0.9.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +1 -1
- data/lib/authpro/version.rb +1 -1
- data/test/rails/dummy/db/migrate/{20130430211809_create_users.rb → 20130612192336_create_users.rb} +0 -0
- data/test/rails/dummy/db/test.sqlite3 +0 -0
- data/test/rails/dummy/log/test.log +215 -215
- data/test/rails/dummy/test/fixtures/users.yml +2 -2
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/13fe41fee1fe35b49d145bcc06610705 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/2f5173deea6c795b8fdde723bb4b63af +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/357970feca3ac29060c1e3861e2c0953 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/cffd775d018f68ce5dba1ee0d951a994 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/d771ace226fc8215a3572e0aa35bb0d6 +0 -0
- data/test/rails/dummy/tmp/cache/assets/test/sprockets/f7cbd26ba1d28d48de824f0e94586655 +0 -0
- metadata +8 -8
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA1:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 0e420e681d69ecd86571fe05235af63b1a848a83
|
|
4
|
+
data.tar.gz: eab409a0f70eb3c73c73d392632e5b7af95b2871
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: b771696a51f644e7d19bab9fa2c5571b8f3555eee548a64b82b6153044db1603894d100f79b62fe483829bd3aa340ce8c5babd861670aba0d0af8a3adc36eadc
|
|
7
|
+
data.tar.gz: 2e41f8e1dd615c91675febd466af34cb5b69947067e2e5435246689993b4fc585512cdadc47548f25b93e61669992cb0930496e24e94cbfbe001c8496e00af9f
|
data/README.md
CHANGED
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
[](https://codeclimate.com/github/ricn/authpro)
|
|
4
4
|
[](https://travis-ci.org/ricn/authpro)
|
|
5
5
|
|
|
6
|
-
Authpro is a simple authentication generator for Rails 4.0.0.
|
|
6
|
+
Authpro is a simple authentication generator for Rails 4.0.0.rc2 It:
|
|
7
7
|
|
|
8
8
|
* Gives you sign up, log in, remember me & password reset functionality
|
|
9
9
|
* Has no hidden code, special super classes or mixins
|
data/lib/authpro/version.rb
CHANGED
data/test/rails/dummy/db/migrate/{20130430211809_create_users.rb → 20130612192336_create_users.rb}
RENAMED
|
File without changes
|
|
Binary file
|
|
@@ -70,138 +70,138 @@ AuthproGeneratorTest: test_Assert_all_files_are_properly_created
|
|
|
70
70
|
----------------------------------------------------------------
|
|
71
71
|
[1m[36m (0.3ms)[0m [1mbegin transaction[0m
|
|
72
72
|
[1m[35m (0.1ms)[0m rollback transaction
|
|
73
|
-
[1m[36m (0.
|
|
73
|
+
[1m[36m (0.4ms)[0m [1mbegin transaction[0m
|
|
74
74
|
------------------------------------------
|
|
75
75
|
AuthproGeneratorTest: test_generated_files
|
|
76
76
|
------------------------------------------
|
|
77
|
-
[1m[35m (0.
|
|
77
|
+
[1m[35m (0.3ms)[0m rollback transaction
|
|
78
78
|
----------------------------------
|
|
79
79
|
AuthproIntegrationTest: test_login
|
|
80
80
|
----------------------------------
|
|
81
81
|
[1m[36m (1.3ms)[0m [1mCREATE TABLE "schema_migrations" ("version" varchar(255) NOT NULL) [0m
|
|
82
|
-
[1m[35m (1.
|
|
82
|
+
[1m[35m (1.2ms)[0m CREATE UNIQUE INDEX "unique_schema_migrations" ON "schema_migrations" ("version")
|
|
83
83
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
84
|
-
Migrating to CreateUsers (
|
|
84
|
+
Migrating to CreateUsers (20130612192336)
|
|
85
85
|
[1m[35m (0.1ms)[0m begin transaction
|
|
86
86
|
[1m[36m (0.4ms)[0m [1mCREATE TABLE "users" ("id" INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, "email" varchar(255), "password_digest" varchar(255), "auth_token" varchar(255), "password_reset_token" varchar(255), "password_reset_sent_at" datetime, "created_at" datetime, "updated_at" datetime) [0m
|
|
87
|
-
[1m[35mSQL (0.
|
|
88
|
-
[1m[36m (
|
|
87
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "schema_migrations" ("version") VALUES (?) [["version", "20130612192336"]]
|
|
88
|
+
[1m[36m (0.8ms)[0m [1mcommit transaction[0m
|
|
89
89
|
[1m[35m (0.1ms)[0m begin transaction
|
|
90
|
-
[1m[36mUser Exists (0.
|
|
91
|
-
[1m[35mUser Exists (0.
|
|
90
|
+
[1m[36mUser Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'DzkL7IpcWwk0_2sBAGrccA@sample.com' LIMIT 1[0m
|
|
91
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'QauPmVim9Nsjt4ni1KPr1g' LIMIT 1
|
|
92
92
|
Binary data inserted for `string` type on column `password_digest`
|
|
93
|
-
[1m[36mSQL (
|
|
94
|
-
[1m[35m (2.
|
|
95
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
93
|
+
[1m[36mSQL (3.9ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "QauPmVim9Nsjt4ni1KPr1g"], ["created_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00], ["email", "DzkL7IpcWwk0_2sBAGrccA@sample.com"], ["password_digest", "$2a$04$.UWNG1wutCHbi3UhCvP6suLEW.Ha6cUerJ7LFgXM4aZLeVepb.aAW"], ["updated_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00]]
|
|
94
|
+
[1m[35m (2.4ms)[0m commit transaction
|
|
95
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
96
96
|
Processing by HomeController#index as HTML
|
|
97
97
|
Rendered home/index.html.erb within layouts/application (1.5ms)
|
|
98
|
-
Completed 200 OK in
|
|
99
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
98
|
+
Completed 200 OK in 42ms (Views: 41.5ms | ActiveRecord: 0.0ms)
|
|
99
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
100
100
|
Processing by SessionsController#new as HTML
|
|
101
|
-
Rendered sessions/new.html.erb within layouts/application (
|
|
102
|
-
Completed 200 OK in
|
|
103
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
|
101
|
+
Rendered sessions/new.html.erb within layouts/application (1.9ms)
|
|
102
|
+
Completed 200 OK in 5ms (Views: 4.7ms | ActiveRecord: 0.0ms)
|
|
103
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
104
104
|
Processing by SessionsController#create as HTML
|
|
105
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
106
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
105
|
+
Parameters: {"utf8"=>"✓", "email"=>"DzkL7IpcWwk0_2sBAGrccA@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
106
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'DzkL7IpcWwk0_2sBAGrccA@sample.com' LIMIT 1[0m
|
|
107
107
|
Redirected to http://www.example.com/
|
|
108
108
|
Completed 302 Found in 8ms (ActiveRecord: 0.2ms)
|
|
109
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
109
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
110
110
|
Processing by HomeController#index as HTML
|
|
111
111
|
Rendered home/index.html.erb within layouts/application (0.1ms)
|
|
112
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = '
|
|
113
|
-
Completed 200 OK in 4ms (Views: 3.
|
|
114
|
-
[1m[36m (
|
|
115
|
-
[1m[35m (0.
|
|
116
|
-
[1m[36m (1.
|
|
112
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."auth_token" = 'QauPmVim9Nsjt4ni1KPr1g' LIMIT 1
|
|
113
|
+
Completed 200 OK in 4ms (Views: 3.6ms | ActiveRecord: 0.2ms)
|
|
114
|
+
[1m[36m (2.9ms)[0m [1mDELETE FROM "users";[0m
|
|
115
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
116
|
+
[1m[36m (1.1ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
117
117
|
------------------------------------------
|
|
118
118
|
AuthproIntegrationTest: test_login_failing
|
|
119
119
|
------------------------------------------
|
|
120
120
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
121
|
-
[1m[36m (0.
|
|
122
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
123
|
-
[1m[36mUser Exists (0.
|
|
121
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
122
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'V3pHg_EtCu3b9MH4V6t41w@sample.com' LIMIT 1
|
|
123
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'pZHmr-RrGQp99Wrn81mb6A' LIMIT 1[0m
|
|
124
124
|
Binary data inserted for `string` type on column `password_digest`
|
|
125
|
-
[1m[35mSQL (0.
|
|
126
|
-
[1m[36m (1.
|
|
127
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
125
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "pZHmr-RrGQp99Wrn81mb6A"], ["created_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00], ["email", "V3pHg_EtCu3b9MH4V6t41w@sample.com"], ["password_digest", "$2a$04$zCSbd0PPM46mHIdFlj0zxedTH8hGHJexKDKMRGV1gMPD9mIPN/7ZC"], ["updated_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00]]
|
|
126
|
+
[1m[36m (1.0ms)[0m [1mcommit transaction[0m
|
|
127
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
128
128
|
Processing by HomeController#index as HTML
|
|
129
|
-
Completed 200 OK in
|
|
130
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
129
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
|
130
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
131
131
|
Processing by SessionsController#new as HTML
|
|
132
|
-
Completed 200 OK in 2ms (Views: 2.
|
|
133
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
|
132
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
|
133
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
134
134
|
Processing by SessionsController#create as HTML
|
|
135
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
136
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
137
|
-
Completed 200 OK in
|
|
135
|
+
Parameters: {"utf8"=>"✓", "email"=>"V3pHg_EtCu3b9MH4V6t41w@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
136
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'V3pHg_EtCu3b9MH4V6t41w@sample.com' LIMIT 1
|
|
137
|
+
Completed 200 OK in 8ms (Views: 1.9ms | ActiveRecord: 0.2ms)
|
|
138
138
|
[1m[36m (1.1ms)[0m [1mDELETE FROM "users";[0m
|
|
139
|
-
[1m[35m (0.
|
|
140
|
-
[1m[36m (
|
|
139
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
140
|
+
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
141
141
|
-----------------------------------
|
|
142
142
|
AuthproIntegrationTest: test_logout
|
|
143
143
|
-----------------------------------
|
|
144
144
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
145
145
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
146
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
147
|
-
[1m[36mUser Exists (0.
|
|
146
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'sAON3N3SA5qR_nrpOkl2Kg@sample.com' LIMIT 1
|
|
147
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'WQEGF_uHbcEMrlb4nDisgg' LIMIT 1[0m
|
|
148
148
|
Binary data inserted for `string` type on column `password_digest`
|
|
149
|
-
[1m[35mSQL (0.
|
|
150
|
-
[1m[36m (
|
|
151
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
149
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "WQEGF_uHbcEMrlb4nDisgg"], ["created_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00], ["email", "sAON3N3SA5qR_nrpOkl2Kg@sample.com"], ["password_digest", "$2a$04$v1Qdvvh7il61jQD4rqJDXOa6B.e10.lPG77K96mYYIUFjmaMvvRpi"], ["updated_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00]]
|
|
150
|
+
[1m[36m (0.9ms)[0m [1mcommit transaction[0m
|
|
151
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
152
152
|
Processing by SessionsController#new as HTML
|
|
153
|
-
Completed 200 OK in 3ms (Views:
|
|
154
|
-
Started POST "/sessions" for 127.0.0.1 at 2013-
|
|
153
|
+
Completed 200 OK in 3ms (Views: 3.0ms | ActiveRecord: 0.0ms)
|
|
154
|
+
Started POST "/sessions" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
155
155
|
Processing by SessionsController#create as HTML
|
|
156
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
157
|
-
[1m[35mUser Load (0.
|
|
156
|
+
Parameters: {"utf8"=>"✓", "email"=>"sAON3N3SA5qR_nrpOkl2Kg@sample.com", "password"=>"[FILTERED]", "commit"=>"Log in"}
|
|
157
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'sAON3N3SA5qR_nrpOkl2Kg@sample.com' LIMIT 1
|
|
158
158
|
Redirected to http://www.example.com/
|
|
159
|
-
Completed 302 Found in 7ms (ActiveRecord: 0.
|
|
160
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
159
|
+
Completed 302 Found in 7ms (ActiveRecord: 0.2ms)
|
|
160
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
161
161
|
Processing by HomeController#index as HTML
|
|
162
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = '
|
|
163
|
-
Completed 200 OK in 3ms (Views: 2.
|
|
164
|
-
Started GET "/logout" for 127.0.0.1 at 2013-
|
|
162
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."auth_token" = 'WQEGF_uHbcEMrlb4nDisgg' LIMIT 1[0m
|
|
163
|
+
Completed 200 OK in 3ms (Views: 2.4ms | ActiveRecord: 0.2ms)
|
|
164
|
+
Started GET "/logout" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
165
165
|
Processing by SessionsController#destroy as HTML
|
|
166
166
|
Redirected to http://www.example.com/
|
|
167
167
|
Completed 302 Found in 1ms (ActiveRecord: 0.0ms)
|
|
168
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
168
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
169
169
|
Processing by HomeController#index as HTML
|
|
170
170
|
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
|
171
|
-
[1m[35m (1.
|
|
171
|
+
[1m[35m (1.1ms)[0m DELETE FROM "users";
|
|
172
172
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
173
173
|
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
174
174
|
-------------------------------------------
|
|
175
175
|
AuthproIntegrationTest: test_reset_password
|
|
176
176
|
-------------------------------------------
|
|
177
177
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
178
|
-
[1m[35m (0.
|
|
179
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
180
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
178
|
+
[1m[35m (0.2ms)[0m begin transaction
|
|
179
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'rHyEHIbiokDFG8C58Ji9Vg@sample.com' LIMIT 1[0m
|
|
180
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'eRWANRnbNsz1Yw7XlUiqRw' LIMIT 1
|
|
181
181
|
Binary data inserted for `string` type on column `password_digest`
|
|
182
|
-
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
|
183
|
-
[1m[35m (
|
|
184
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
182
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "eRWANRnbNsz1Yw7XlUiqRw"], ["created_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00], ["email", "rHyEHIbiokDFG8C58Ji9Vg@sample.com"], ["password_digest", "$2a$04$BkI1bmLH.qOvXqsWAzzVv.eEc9JLmFgcqJrhBwxr5LUEbRzRMyPGu"], ["updated_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00]]
|
|
183
|
+
[1m[35m (1.0ms)[0m commit transaction
|
|
184
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
185
185
|
Processing by SessionsController#new as HTML
|
|
186
|
-
Completed 200 OK in 3ms (Views: 2.
|
|
187
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
|
186
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
|
187
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
188
188
|
Processing by PasswordResetsController#new as HTML
|
|
189
|
-
Completed 200 OK in 5ms (Views: 4.
|
|
190
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
|
189
|
+
Completed 200 OK in 5ms (Views: 4.3ms | ActiveRecord: 0.0ms)
|
|
190
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-06-12 21:23:36 +0200
|
|
191
191
|
Processing by PasswordResetsController#create as HTML
|
|
192
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
193
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
194
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
|
192
|
+
Parameters: {"utf8"=>"✓", "email"=>"rHyEHIbiokDFG8C58Ji9Vg@sample.com", "commit"=>"Reset password"}
|
|
193
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = 'rHyEHIbiokDFG8C58Ji9Vg@sample.com' LIMIT 1[0m
|
|
194
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'ea5SASkjA6HgRtbKQXwsqA' LIMIT 1
|
|
195
195
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
196
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
|
197
|
-
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "
|
|
198
|
-
[1m[35m (
|
|
196
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'rHyEHIbiokDFG8C58Ji9Vg@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
197
|
+
[1m[36mSQL (0.5ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "ea5SASkjA6HgRtbKQXwsqA"], ["password_reset_sent_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00], ["updated_at", Wed, 12 Jun 2013 19:23:36 UTC +00:00]]
|
|
198
|
+
[1m[35m (1.3ms)[0m commit transaction
|
|
199
199
|
|
|
200
|
-
Sent mail to
|
|
201
|
-
Date:
|
|
200
|
+
Sent mail to rHyEHIbiokDFG8C58Ji9Vg@sample.com (17.0ms)
|
|
201
|
+
Date: Wed, 12 Jun 2013 21:23:37 +0200
|
|
202
202
|
From: from@example.com
|
|
203
|
-
To:
|
|
204
|
-
Message-ID: <
|
|
203
|
+
To: rHyEHIbiokDFG8C58Ji9Vg@sample.com
|
|
204
|
+
Message-ID: <51b8cab94a2ff_35fc3fc18c46066c43c1@Richards-MacBook-Air.local.mail>
|
|
205
205
|
Subject: Password Reset
|
|
206
206
|
Mime-Version: 1.0
|
|
207
207
|
Content-Type: text/plain;
|
|
@@ -210,91 +210,91 @@ Content-Transfer-Encoding: 7bit
|
|
|
210
210
|
|
|
211
211
|
To reset your password, click the URL below.
|
|
212
212
|
|
|
213
|
-
http://localhost:3000/password_resets/
|
|
213
|
+
http://localhost:3000/password_resets/ea5SASkjA6HgRtbKQXwsqA/edit
|
|
214
214
|
|
|
215
215
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
216
216
|
Redirected to http://www.example.com/
|
|
217
|
-
Completed 302 Found in
|
|
218
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
217
|
+
Completed 302 Found in 427ms (ActiveRecord: 2.3ms)
|
|
218
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
219
219
|
Processing by HomeController#index as HTML
|
|
220
220
|
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
|
221
|
-
Started GET "/password_resets/
|
|
221
|
+
Started GET "/password_resets/ea5SASkjA6HgRtbKQXwsqA/edit" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
222
222
|
Processing by PasswordResetsController#edit as HTML
|
|
223
|
-
Parameters: {"id"=>"
|
|
224
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
225
|
-
Completed 200 OK in
|
|
226
|
-
Started PATCH "/password_resets/
|
|
223
|
+
Parameters: {"id"=>"ea5SASkjA6HgRtbKQXwsqA"}
|
|
224
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'ea5SASkjA6HgRtbKQXwsqA' LIMIT 1[0m
|
|
225
|
+
Completed 200 OK in 70ms (Views: 68.0ms | ActiveRecord: 0.2ms)
|
|
226
|
+
Started PATCH "/password_resets/ea5SASkjA6HgRtbKQXwsqA" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
227
227
|
Processing by PasswordResetsController#update as HTML
|
|
228
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
|
229
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
228
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"ea5SASkjA6HgRtbKQXwsqA"}
|
|
229
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'ea5SASkjA6HgRtbKQXwsqA' LIMIT 1
|
|
230
230
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
231
|
-
[1m[35mUser Exists (0.
|
|
231
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = 'rHyEHIbiokDFG8C58Ji9Vg@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
232
232
|
Binary data inserted for `string` type on column `password_digest`
|
|
233
|
-
[1m[36mSQL (0.
|
|
234
|
-
[1m[35m (
|
|
233
|
+
[1m[36mSQL (0.7ms)[0m [1mUPDATE "users" SET "password_digest" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_digest", "$2a$04$YXvBWLknHbjX60hGblll9enrpVDiaLNqmfoeUcE.CHlPkrc8u9cDe"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
|
234
|
+
[1m[35m (1.1ms)[0m commit transaction
|
|
235
235
|
Redirected to http://localhost:3000/
|
|
236
|
-
Completed 302 Found in
|
|
237
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
236
|
+
Completed 302 Found in 15ms (ActiveRecord: 2.3ms)
|
|
237
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
238
238
|
Processing by HomeController#index as HTML
|
|
239
|
-
Completed 200 OK in
|
|
240
|
-
[1m[36m (
|
|
239
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
|
240
|
+
[1m[36m (1.1ms)[0m [1mDELETE FROM "users";[0m
|
|
241
241
|
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
242
|
-
[1m[36m (0.
|
|
242
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
243
243
|
--------------------------------------------------------------------------------
|
|
244
244
|
AuthproIntegrationTest: test_reset_password_failing_because_email_does_not_exist
|
|
245
245
|
--------------------------------------------------------------------------------
|
|
246
|
-
[1m[35mActiveRecord::SchemaMigration Load (0.
|
|
247
|
-
[1m[36m (0.
|
|
248
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
249
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
246
|
+
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
247
|
+
[1m[36m (0.2ms)[0m [1mbegin transaction[0m
|
|
248
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'GSPbFRgY_iDZSwHXjWugMQ@sample.com' LIMIT 1
|
|
249
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'JhNFHHPNA9Atwv2NAukgFg' LIMIT 1[0m
|
|
250
250
|
Binary data inserted for `string` type on column `password_digest`
|
|
251
|
-
[1m[35mSQL (0.
|
|
252
|
-
[1m[36m (
|
|
253
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
251
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "JhNFHHPNA9Atwv2NAukgFg"], ["created_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["email", "GSPbFRgY_iDZSwHXjWugMQ@sample.com"], ["password_digest", "$2a$04$QhjCnhltY7BomOQhAXc.u.iKbwQDBxnCRaS9JozXuI.gHzxIWxf/m"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
|
252
|
+
[1m[36m (1.0ms)[0m [1mcommit transaction[0m
|
|
253
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
254
254
|
Processing by SessionsController#new as HTML
|
|
255
|
-
Completed 200 OK in
|
|
256
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
|
255
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
|
256
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
257
257
|
Processing by PasswordResetsController#new as HTML
|
|
258
|
-
Completed 200 OK in
|
|
259
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
|
258
|
+
Completed 200 OK in 3ms (Views: 2.2ms | ActiveRecord: 0.0ms)
|
|
259
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
260
260
|
Processing by PasswordResetsController#create as HTML
|
|
261
261
|
Parameters: {"utf8"=>"✓", "email"=>"nosense@example.com", "commit"=>"Reset password"}
|
|
262
262
|
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'nosense@example.com' LIMIT 1
|
|
263
263
|
Completed 200 OK in 3ms (Views: 1.7ms | ActiveRecord: 0.2ms)
|
|
264
|
-
[1m[36m (1.
|
|
265
|
-
[1m[35m (0.
|
|
264
|
+
[1m[36m (1.4ms)[0m [1mDELETE FROM "users";[0m
|
|
265
|
+
[1m[35m (0.1ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
266
266
|
[1m[36m (1.0ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
267
267
|
-------------------------------------------------------------------------
|
|
268
268
|
AuthproIntegrationTest: test_reset_password_failing_because_of_expiration
|
|
269
269
|
-------------------------------------------------------------------------
|
|
270
270
|
[1m[35mActiveRecord::SchemaMigration Load (0.1ms)[0m SELECT "schema_migrations".* FROM "schema_migrations"
|
|
271
|
-
[1m[36m (0.
|
|
272
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
273
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
271
|
+
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
272
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'hY7A32WAJgdVtVej3uyi5g@sample.com' LIMIT 1
|
|
273
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '8o-MB9zyNwYt9IVgNPmKUw' LIMIT 1[0m
|
|
274
274
|
Binary data inserted for `string` type on column `password_digest`
|
|
275
|
-
[1m[35mSQL (0.
|
|
276
|
-
[1m[36m (
|
|
277
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
275
|
+
[1m[35mSQL (0.5ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "8o-MB9zyNwYt9IVgNPmKUw"], ["created_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["email", "hY7A32WAJgdVtVej3uyi5g@sample.com"], ["password_digest", "$2a$04$3oq3TCo/rW986jrZblLJ3e1ZgB4TTtX2Bwe7khW0qft.KyUUtgEBS"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
|
276
|
+
[1m[36m (1.1ms)[0m [1mcommit transaction[0m
|
|
277
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
278
278
|
Processing by SessionsController#new as HTML
|
|
279
|
-
Completed 200 OK in 3ms (Views:
|
|
280
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
|
279
|
+
Completed 200 OK in 3ms (Views: 2.8ms | ActiveRecord: 0.0ms)
|
|
280
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
281
281
|
Processing by PasswordResetsController#new as HTML
|
|
282
|
-
Completed 200 OK in
|
|
283
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
|
282
|
+
Completed 200 OK in 2ms (Views: 2.1ms | ActiveRecord: 0.0ms)
|
|
283
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
284
284
|
Processing by PasswordResetsController#create as HTML
|
|
285
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
286
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
287
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
|
285
|
+
Parameters: {"utf8"=>"✓", "email"=>"hY7A32WAJgdVtVej3uyi5g@sample.com", "commit"=>"Reset password"}
|
|
286
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."email" = 'hY7A32WAJgdVtVej3uyi5g@sample.com' LIMIT 1
|
|
287
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'sq8KXg_h7YN8zeqN_8KUrA' LIMIT 1[0m
|
|
288
288
|
[1m[35m (0.1ms)[0m begin transaction
|
|
289
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
|
290
|
-
[1m[35mSQL (0.4ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "
|
|
291
|
-
[1m[36m (
|
|
289
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE ("users"."email" = 'hY7A32WAJgdVtVej3uyi5g@sample.com' AND "users"."id" != 1) LIMIT 1[0m
|
|
290
|
+
[1m[35mSQL (0.4ms)[0m UPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1 [["password_reset_token", "sq8KXg_h7YN8zeqN_8KUrA"], ["password_reset_sent_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
|
291
|
+
[1m[36m (2.5ms)[0m [1mcommit transaction[0m
|
|
292
292
|
|
|
293
|
-
Sent mail to
|
|
294
|
-
Date:
|
|
293
|
+
Sent mail to hY7A32WAJgdVtVej3uyi5g@sample.com (11.5ms)
|
|
294
|
+
Date: Wed, 12 Jun 2013 21:23:37 +0200
|
|
295
295
|
From: from@example.com
|
|
296
|
-
To:
|
|
297
|
-
Message-ID: <
|
|
296
|
+
To: hY7A32WAJgdVtVej3uyi5g@sample.com
|
|
297
|
+
Message-ID: <51b8cab990e96_35fc3fc18c46066c4484@Richards-MacBook-Air.local.mail>
|
|
298
298
|
Subject: Password Reset
|
|
299
299
|
Mime-Version: 1.0
|
|
300
300
|
Content-Type: text/plain;
|
|
@@ -303,62 +303,62 @@ Content-Transfer-Encoding: 7bit
|
|
|
303
303
|
|
|
304
304
|
To reset your password, click the URL below.
|
|
305
305
|
|
|
306
|
-
http://localhost:3000/password_resets/
|
|
306
|
+
http://localhost:3000/password_resets/sq8KXg_h7YN8zeqN_8KUrA/edit
|
|
307
307
|
|
|
308
308
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
309
309
|
Redirected to http://www.example.com/
|
|
310
|
-
Completed 302 Found in 31ms (ActiveRecord:
|
|
311
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
310
|
+
Completed 302 Found in 31ms (ActiveRecord: 3.3ms)
|
|
311
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
312
312
|
Processing by HomeController#index as HTML
|
|
313
|
-
Completed 200 OK in 2ms (Views:
|
|
314
|
-
Started GET "/password_resets/
|
|
313
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
|
314
|
+
Started GET "/password_resets/sq8KXg_h7YN8zeqN_8KUrA/edit" for 127.0.0.1 at 2013-06-14 02:00:00 +0200
|
|
315
315
|
Processing by PasswordResetsController#edit as HTML
|
|
316
|
-
Parameters: {"id"=>"
|
|
317
|
-
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
316
|
+
Parameters: {"id"=>"sq8KXg_h7YN8zeqN_8KUrA"}
|
|
317
|
+
[1m[35mUser Load (0.0ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'sq8KXg_h7YN8zeqN_8KUrA' LIMIT 1
|
|
318
318
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
319
|
-
Started PATCH "/password_resets/
|
|
319
|
+
Started PATCH "/password_resets/sq8KXg_h7YN8zeqN_8KUrA" for 127.0.0.1 at 2013-06-14 02:00:00 +0200
|
|
320
320
|
Processing by PasswordResetsController#update as HTML
|
|
321
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
|
322
|
-
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
321
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"sq8KXg_h7YN8zeqN_8KUrA"}
|
|
322
|
+
[1m[36mUser Load (0.0ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'sq8KXg_h7YN8zeqN_8KUrA' LIMIT 1[0m
|
|
323
323
|
Redirected to http://localhost:3000/password_resets/new
|
|
324
324
|
Completed 302 Found in 0ms (ActiveRecord: 0.0ms)
|
|
325
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
|
325
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-14 02:00:00 +0200
|
|
326
326
|
Processing by PasswordResetsController#new as HTML
|
|
327
327
|
Completed 200 OK in 0ms (Views: 0.0ms | ActiveRecord: 0.0ms)
|
|
328
|
-
[1m[35m (1.
|
|
328
|
+
[1m[35m (1.3ms)[0m DELETE FROM "users";
|
|
329
329
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
330
330
|
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
331
331
|
-------------------------------------------------------------------------------------------
|
|
332
332
|
AuthproIntegrationTest: test_reset_password_failing_because_we_enter_a_new_invalid_password
|
|
333
333
|
-------------------------------------------------------------------------------------------
|
|
334
334
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
335
|
-
[1m[35m (0.
|
|
336
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
337
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
335
|
+
[1m[35m (0.1ms)[0m begin transaction
|
|
336
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '2Al7mLnQuesv4vv_OtUbEA@sample.com' LIMIT 1[0m
|
|
337
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '3Qa6ypXf8yiK6HmtXuAvJw' LIMIT 1
|
|
338
338
|
Binary data inserted for `string` type on column `password_digest`
|
|
339
|
-
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
|
340
|
-
[1m[35m (1.
|
|
341
|
-
Started GET "/login" for 127.0.0.1 at 2013-
|
|
339
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "3Qa6ypXf8yiK6HmtXuAvJw"], ["created_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["email", "2Al7mLnQuesv4vv_OtUbEA@sample.com"], ["password_digest", "$2a$04$oQSzqn4CIUMqp/S9MLWxHudg.HlhF6BEa6IrwKTDAILAUhrkaLkiq"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
|
340
|
+
[1m[35m (1.0ms)[0m commit transaction
|
|
341
|
+
Started GET "/login" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
342
342
|
Processing by SessionsController#new as HTML
|
|
343
|
-
Completed 200 OK in
|
|
344
|
-
Started GET "/password_resets/new" for 127.0.0.1 at 2013-
|
|
343
|
+
Completed 200 OK in 3ms (Views: 2.9ms | ActiveRecord: 0.0ms)
|
|
344
|
+
Started GET "/password_resets/new" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
345
345
|
Processing by PasswordResetsController#new as HTML
|
|
346
|
-
Completed 200 OK in 2ms (Views: 2.
|
|
347
|
-
Started POST "/password_resets" for 127.0.0.1 at 2013-
|
|
346
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
|
347
|
+
Started POST "/password_resets" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
348
348
|
Processing by PasswordResetsController#create as HTML
|
|
349
|
-
Parameters: {"utf8"=>"✓", "email"=>"
|
|
350
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '
|
|
351
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = '
|
|
349
|
+
Parameters: {"utf8"=>"✓", "email"=>"2Al7mLnQuesv4vv_OtUbEA@sample.com", "commit"=>"Reset password"}
|
|
350
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."email" = '2Al7mLnQuesv4vv_OtUbEA@sample.com' LIMIT 1[0m
|
|
351
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."password_reset_token" = 'sV_1C6JHjHsEKyAq-6dvTg' LIMIT 1
|
|
352
352
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
353
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
|
354
|
-
[1m[36mSQL (0.
|
|
355
|
-
[1m[35m (
|
|
353
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '2Al7mLnQuesv4vv_OtUbEA@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
354
|
+
[1m[36mSQL (0.3ms)[0m [1mUPDATE "users" SET "password_reset_token" = ?, "password_reset_sent_at" = ?, "updated_at" = ? WHERE "users"."id" = 1[0m [["password_reset_token", "sV_1C6JHjHsEKyAq-6dvTg"], ["password_reset_sent_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
|
355
|
+
[1m[35m (2.6ms)[0m commit transaction
|
|
356
356
|
|
|
357
|
-
Sent mail to
|
|
358
|
-
Date:
|
|
357
|
+
Sent mail to 2Al7mLnQuesv4vv_OtUbEA@sample.com (11.5ms)
|
|
358
|
+
Date: Wed, 12 Jun 2013 21:23:37 +0200
|
|
359
359
|
From: from@example.com
|
|
360
|
-
To:
|
|
361
|
-
Message-ID: <
|
|
360
|
+
To: 2Al7mLnQuesv4vv_OtUbEA@sample.com
|
|
361
|
+
Message-ID: <51b8cab9b14d5_35fc3fc18c46066c45c@Richards-MacBook-Air.local.mail>
|
|
362
362
|
Subject: Password Reset
|
|
363
363
|
Mime-Version: 1.0
|
|
364
364
|
Content-Type: text/plain;
|
|
@@ -367,102 +367,102 @@ Content-Transfer-Encoding: 7bit
|
|
|
367
367
|
|
|
368
368
|
To reset your password, click the URL below.
|
|
369
369
|
|
|
370
|
-
http://localhost:3000/password_resets/
|
|
370
|
+
http://localhost:3000/password_resets/sV_1C6JHjHsEKyAq-6dvTg/edit
|
|
371
371
|
|
|
372
372
|
If you did not request your password to be reset, just ignore this email and your password will continue to stay the same.
|
|
373
373
|
Redirected to http://www.example.com/
|
|
374
|
-
Completed 302 Found in
|
|
375
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
374
|
+
Completed 302 Found in 31ms (ActiveRecord: 3.4ms)
|
|
375
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
376
376
|
Processing by HomeController#index as HTML
|
|
377
|
-
Completed 200 OK in 2ms (Views:
|
|
378
|
-
Started GET "/password_resets/
|
|
377
|
+
Completed 200 OK in 2ms (Views: 1.9ms | ActiveRecord: 0.0ms)
|
|
378
|
+
Started GET "/password_resets/sV_1C6JHjHsEKyAq-6dvTg/edit" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
379
379
|
Processing by PasswordResetsController#edit as HTML
|
|
380
|
-
Parameters: {"id"=>"
|
|
381
|
-
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
382
|
-
Completed 200 OK in
|
|
383
|
-
Started PATCH "/password_resets/
|
|
380
|
+
Parameters: {"id"=>"sV_1C6JHjHsEKyAq-6dvTg"}
|
|
381
|
+
[1m[36mUser Load (0.2ms)[0m [1mSELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'sV_1C6JHjHsEKyAq-6dvTg' LIMIT 1[0m
|
|
382
|
+
Completed 200 OK in 8ms (Views: 6.5ms | ActiveRecord: 0.2ms)
|
|
383
|
+
Started PATCH "/password_resets/sV_1C6JHjHsEKyAq-6dvTg" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
384
384
|
Processing by PasswordResetsController#update as HTML
|
|
385
|
-
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"
|
|
386
|
-
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = '
|
|
385
|
+
Parameters: {"utf8"=>"✓", "user"=>{"password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Change password", "id"=>"sV_1C6JHjHsEKyAq-6dvTg"}
|
|
386
|
+
[1m[35mUser Load (0.2ms)[0m SELECT "users".* FROM "users" WHERE "users"."password_reset_token" = 'sV_1C6JHjHsEKyAq-6dvTg' LIMIT 1
|
|
387
387
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
388
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '
|
|
388
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE ("users"."email" = '2Al7mLnQuesv4vv_OtUbEA@sample.com' AND "users"."id" != 1) LIMIT 1
|
|
389
389
|
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
|
390
|
-
Completed 200 OK in
|
|
391
|
-
[1m[35m (2.
|
|
390
|
+
Completed 200 OK in 77ms (Views: 4.9ms | ActiveRecord: 0.6ms)
|
|
391
|
+
[1m[35m (2.9ms)[0m DELETE FROM "users";
|
|
392
392
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
393
|
-
[1m[35m (1.
|
|
393
|
+
[1m[35m (1.1ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
394
394
|
-----------------------------------
|
|
395
395
|
AuthproIntegrationTest: test_signup
|
|
396
396
|
-----------------------------------
|
|
397
397
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
398
398
|
[1m[35m (0.2ms)[0m begin transaction
|
|
399
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
400
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
399
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '92CEzDVvm9kt3HDRIfo5Vw@sample.com' LIMIT 1[0m
|
|
400
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'UsdwaLZtSQazTpAigNHk_w' LIMIT 1
|
|
401
401
|
Binary data inserted for `string` type on column `password_digest`
|
|
402
|
-
[1m[36mSQL (0.
|
|
403
|
-
[1m[35m (0.
|
|
404
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
402
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "UsdwaLZtSQazTpAigNHk_w"], ["created_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["email", "92CEzDVvm9kt3HDRIfo5Vw@sample.com"], ["password_digest", "$2a$04$yHROM2XR1mGDqQNxW28ab.gTL569MbJCetgZGT6AMuI1AI//llxx6"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
|
403
|
+
[1m[35m (0.9ms)[0m commit transaction
|
|
404
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
405
405
|
Processing by HomeController#index as HTML
|
|
406
|
-
Completed 200 OK in 2ms (Views:
|
|
407
|
-
Started GET "/signup" for 127.0.0.1 at 2013-
|
|
406
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
|
407
|
+
Started GET "/signup" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
408
408
|
Processing by UsersController#new as HTML
|
|
409
|
-
Completed 200 OK in
|
|
410
|
-
Started POST "/users" for 127.0.0.1 at 2013-
|
|
409
|
+
Completed 200 OK in 8ms (Views: 7.2ms | ActiveRecord: 0.0ms)
|
|
410
|
+
Started POST "/users" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
411
411
|
Processing by UsersController#create as HTML
|
|
412
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
|
412
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"dZKY36adIKWS_SRGqCt6Ww@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
413
413
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
414
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
415
|
-
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
414
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = 'dZKY36adIKWS_SRGqCt6Ww@sample.com' LIMIT 1
|
|
415
|
+
[1m[36mUser Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '45TvgLMDmJn2Xfz6io91LQ' LIMIT 1[0m
|
|
416
416
|
Binary data inserted for `string` type on column `password_digest`
|
|
417
|
-
[1m[35mSQL (0.
|
|
418
|
-
[1m[36m (
|
|
417
|
+
[1m[35mSQL (0.4ms)[0m INSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?) [["auth_token", "45TvgLMDmJn2Xfz6io91LQ"], ["created_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["email", "dZKY36adIKWS_SRGqCt6Ww@sample.com"], ["password_digest", "$2a$04$1GmSxJpZkJSX2npImm.qV.9bGtqpFus6CtZrwBv1SSrznWd3aluQi"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
|
418
|
+
[1m[36m (1.0ms)[0m [1mcommit transaction[0m
|
|
419
419
|
Redirected to http://www.example.com/
|
|
420
|
-
Completed 302 Found in
|
|
421
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
420
|
+
Completed 302 Found in 11ms (ActiveRecord: 1.7ms)
|
|
421
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
422
422
|
Processing by HomeController#index as HTML
|
|
423
|
-
Completed 200 OK in 2ms (Views: 1.
|
|
424
|
-
[1m[35m (1.
|
|
423
|
+
Completed 200 OK in 2ms (Views: 1.7ms | ActiveRecord: 0.0ms)
|
|
424
|
+
[1m[35m (1.2ms)[0m DELETE FROM "users";
|
|
425
425
|
[1m[36m (0.2ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
426
426
|
[1m[35m (1.0ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
427
427
|
-------------------------------------------
|
|
428
428
|
AuthproIntegrationTest: test_signup_failing
|
|
429
429
|
-------------------------------------------
|
|
430
|
-
[1m[36mActiveRecord::SchemaMigration Load (0.
|
|
430
|
+
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
431
431
|
[1m[35m (0.1ms)[0m begin transaction
|
|
432
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
433
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
432
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '7LbtRHwo2e97T-hBHUGxXg@sample.com' LIMIT 1[0m
|
|
433
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = 'ocViu-hY4J7yzS48-YQm2w' LIMIT 1
|
|
434
434
|
Binary data inserted for `string` type on column `password_digest`
|
|
435
|
-
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "
|
|
435
|
+
[1m[36mSQL (0.5ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "ocViu-hY4J7yzS48-YQm2w"], ["created_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00], ["email", "7LbtRHwo2e97T-hBHUGxXg@sample.com"], ["password_digest", "$2a$04$RvPLAdsaboAeoM9iFk4AkOj6s3UGB/B36Jc/Gk7fOpwnex1OLwlAS"], ["updated_at", Wed, 12 Jun 2013 19:23:37 UTC +00:00]]
|
|
436
436
|
[1m[35m (0.9ms)[0m commit transaction
|
|
437
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
437
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:37 +0200
|
|
438
438
|
Processing by HomeController#index as HTML
|
|
439
|
-
Completed 200 OK in 2ms (Views:
|
|
440
|
-
Started GET "/signup" for 127.0.0.1 at 2013-
|
|
439
|
+
Completed 200 OK in 2ms (Views: 1.8ms | ActiveRecord: 0.0ms)
|
|
440
|
+
Started GET "/signup" for 127.0.0.1 at 2013-06-12 21:23:38 +0200
|
|
441
441
|
Processing by UsersController#new as HTML
|
|
442
|
-
Completed 200 OK in
|
|
443
|
-
Started POST "/users" for 127.0.0.1 at 2013-
|
|
442
|
+
Completed 200 OK in 5ms (Views: 4.8ms | ActiveRecord: 0.0ms)
|
|
443
|
+
Started POST "/users" for 127.0.0.1 at 2013-06-12 21:23:38 +0200
|
|
444
444
|
Processing by UsersController#create as HTML
|
|
445
|
-
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"
|
|
445
|
+
Parameters: {"utf8"=>"✓", "user"=>{"email"=>"8rmw1L4dxcunIFh7wiAtFQ@sample.com", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"}
|
|
446
446
|
[1m[36m (0.1ms)[0m [1mbegin transaction[0m
|
|
447
|
-
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
447
|
+
[1m[35mUser Exists (0.2ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."email" = '8rmw1L4dxcunIFh7wiAtFQ@sample.com' LIMIT 1
|
|
448
448
|
[1m[36m (0.1ms)[0m [1mrollback transaction[0m
|
|
449
|
-
Completed 200 OK in
|
|
450
|
-
[1m[35m (1.
|
|
451
|
-
[1m[36m (0.
|
|
452
|
-
[1m[35m (0.
|
|
449
|
+
Completed 200 OK in 14ms (Views: 4.8ms | ActiveRecord: 0.3ms)
|
|
450
|
+
[1m[35m (1.1ms)[0m DELETE FROM "users";
|
|
451
|
+
[1m[36m (0.1ms)[0m [1mSELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';[0m
|
|
452
|
+
[1m[35m (0.9ms)[0m DELETE FROM sqlite_sequence where name = 'users';
|
|
453
453
|
---------------------------------------
|
|
454
454
|
AuthproIntegrationTest: test_visit_home
|
|
455
455
|
---------------------------------------
|
|
456
456
|
[1m[36mActiveRecord::SchemaMigration Load (0.1ms)[0m [1mSELECT "schema_migrations".* FROM "schema_migrations"[0m
|
|
457
457
|
[1m[35m (0.2ms)[0m begin transaction
|
|
458
|
-
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = '
|
|
459
|
-
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '
|
|
458
|
+
[1m[36mUser Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "users" WHERE "users"."email" = 'Bx1IuCV9F8EByAcq0_Ul0A@sample.com' LIMIT 1[0m
|
|
459
|
+
[1m[35mUser Exists (0.1ms)[0m SELECT 1 AS one FROM "users" WHERE "users"."auth_token" = '8kWAAWcblhcq2QCImdJS5w' LIMIT 1
|
|
460
460
|
Binary data inserted for `string` type on column `password_digest`
|
|
461
|
-
[1m[36mSQL (0.
|
|
462
|
-
[1m[35m (
|
|
463
|
-
Started GET "/" for 127.0.0.1 at 2013-
|
|
461
|
+
[1m[36mSQL (0.6ms)[0m [1mINSERT INTO "users" ("auth_token", "created_at", "email", "password_digest", "updated_at") VALUES (?, ?, ?, ?, ?)[0m [["auth_token", "8kWAAWcblhcq2QCImdJS5w"], ["created_at", Wed, 12 Jun 2013 19:23:38 UTC +00:00], ["email", "Bx1IuCV9F8EByAcq0_Ul0A@sample.com"], ["password_digest", "$2a$04$8eEkPwZWb2R1yCWNuyjdQOJwlkuHqRBwjr7pYEV9A4zUBITYs9Odq"], ["updated_at", Wed, 12 Jun 2013 19:23:38 UTC +00:00]]
|
|
462
|
+
[1m[35m (1.0ms)[0m commit transaction
|
|
463
|
+
Started GET "/" for 127.0.0.1 at 2013-06-12 21:23:38 +0200
|
|
464
464
|
Processing by HomeController#index as HTML
|
|
465
|
-
Completed 200 OK in 2ms (Views:
|
|
466
|
-
[1m[36m (1.
|
|
467
|
-
[1m[35m (0.
|
|
468
|
-
[1m[36m (
|
|
465
|
+
Completed 200 OK in 2ms (Views: 2.0ms | ActiveRecord: 0.0ms)
|
|
466
|
+
[1m[36m (1.2ms)[0m [1mDELETE FROM "users";[0m
|
|
467
|
+
[1m[35m (0.2ms)[0m SELECT name FROM sqlite_master WHERE type='table' AND name='sqlite_sequence';
|
|
468
|
+
[1m[36m (0.8ms)[0m [1mDELETE FROM sqlite_sequence where name = 'users';[0m
|
|
@@ -5,11 +5,11 @@ one:
|
|
|
5
5
|
password_digest: MyString
|
|
6
6
|
auth_token: MyString
|
|
7
7
|
password_reset_token: MyString
|
|
8
|
-
password_reset_sent_at: 2013-
|
|
8
|
+
password_reset_sent_at: 2013-06-12 21:23:36
|
|
9
9
|
|
|
10
10
|
two:
|
|
11
11
|
email: MyString
|
|
12
12
|
password_digest: MyString
|
|
13
13
|
auth_token: MyString
|
|
14
14
|
password_reset_token: MyString
|
|
15
|
-
password_reset_sent_at: 2013-
|
|
15
|
+
password_reset_sent_at: 2013-06-12 21:23:36
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: authpro
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 0.9.
|
|
4
|
+
version: 0.9.3
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Richard Nyström
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2013-
|
|
11
|
+
date: 2013-06-12 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: rails
|
|
@@ -16,14 +16,14 @@ dependencies:
|
|
|
16
16
|
requirements:
|
|
17
17
|
- - ~>
|
|
18
18
|
- !ruby/object:Gem::Version
|
|
19
|
-
version: 4.0.0.
|
|
19
|
+
version: 4.0.0.rc2
|
|
20
20
|
type: :runtime
|
|
21
21
|
prerelease: false
|
|
22
22
|
version_requirements: !ruby/object:Gem::Requirement
|
|
23
23
|
requirements:
|
|
24
24
|
- - ~>
|
|
25
25
|
- !ruby/object:Gem::Version
|
|
26
|
-
version: 4.0.0.
|
|
26
|
+
version: 4.0.0.rc2
|
|
27
27
|
- !ruby/object:Gem::Dependency
|
|
28
28
|
name: bcrypt-ruby
|
|
29
29
|
requirement: !ruby/object:Gem::Requirement
|
|
@@ -72,14 +72,14 @@ dependencies:
|
|
|
72
72
|
requirements:
|
|
73
73
|
- - ~>
|
|
74
74
|
- !ruby/object:Gem::Version
|
|
75
|
-
version: 1.0.
|
|
75
|
+
version: 1.0.1
|
|
76
76
|
type: :development
|
|
77
77
|
prerelease: false
|
|
78
78
|
version_requirements: !ruby/object:Gem::Requirement
|
|
79
79
|
requirements:
|
|
80
80
|
- - ~>
|
|
81
81
|
- !ruby/object:Gem::Version
|
|
82
|
-
version: 1.0.
|
|
82
|
+
version: 1.0.1
|
|
83
83
|
- !ruby/object:Gem::Dependency
|
|
84
84
|
name: timecop
|
|
85
85
|
requirement: !ruby/object:Gem::Requirement
|
|
@@ -209,7 +209,7 @@ files:
|
|
|
209
209
|
- test/rails/dummy/config/locales/en.yml
|
|
210
210
|
- test/rails/dummy/config/routes.rb
|
|
211
211
|
- test/rails/dummy/config.ru
|
|
212
|
-
- test/rails/dummy/db/migrate/
|
|
212
|
+
- test/rails/dummy/db/migrate/20130612192336_create_users.rb
|
|
213
213
|
- test/rails/dummy/db/test.sqlite3
|
|
214
214
|
- test/rails/dummy/Gemfile
|
|
215
215
|
- test/rails/dummy/Gemfile.lock
|
|
@@ -327,7 +327,7 @@ test_files:
|
|
|
327
327
|
- test/rails/dummy/config/locales/en.yml
|
|
328
328
|
- test/rails/dummy/config/routes.rb
|
|
329
329
|
- test/rails/dummy/config.ru
|
|
330
|
-
- test/rails/dummy/db/migrate/
|
|
330
|
+
- test/rails/dummy/db/migrate/20130612192336_create_users.rb
|
|
331
331
|
- test/rails/dummy/db/test.sqlite3
|
|
332
332
|
- test/rails/dummy/Gemfile
|
|
333
333
|
- test/rails/dummy/Gemfile.lock
|