authpwn_rails 0.22.1 → 0.23.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/VERSION +1 -1
- data/authpwn_rails.gemspec +2 -2
- data/lib/authpwn_rails/session_controller.rb +2 -2
- data/test/session_controller_api_test.rb +3 -3
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 1e1833219b3e30ef2c4dcfea8e9db3f859432358
|
4
|
+
data.tar.gz: 070791087328bc3eff02000c00dea2d4574b9795
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 0e25e39c6abe53a9a8b9474d5a4ec95c6590e30f17226fd80f219728c2159fa3421ebfaf79d3c92e588b84a77c138ff15e4a68677f28fba1b53488bfbf1ce038
|
7
|
+
data.tar.gz: 9c06cdbe6f9622f89feafcf81d035caf6f120c2e369ad348afebf7cca64fc2e007378cbaa9f930da32b1a281bd4ba35442d5fd12e46dfe73a16483f671382495
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
0.
|
1
|
+
0.23.0
|
data/authpwn_rails.gemspec
CHANGED
@@ -2,11 +2,11 @@
|
|
2
2
|
# DO NOT EDIT THIS FILE DIRECTLY
|
3
3
|
# Instead, edit Jeweler::Tasks in Rakefile, and run 'rake gemspec'
|
4
4
|
# -*- encoding: utf-8 -*-
|
5
|
-
# stub: authpwn_rails 0.
|
5
|
+
# stub: authpwn_rails 0.23.0 ruby lib
|
6
6
|
|
7
7
|
Gem::Specification.new do |s|
|
8
8
|
s.name = "authpwn_rails"
|
9
|
-
s.version = "0.
|
9
|
+
s.version = "0.23.0"
|
10
10
|
|
11
11
|
s.required_rubygems_version = Gem::Requirement.new(">= 0") if s.respond_to? :required_rubygems_version=
|
12
12
|
s.require_paths = ["lib"]
|
@@ -221,7 +221,7 @@ module SessionController
|
|
221
221
|
self.set_session_current_user nil
|
222
222
|
respond_to do |format|
|
223
223
|
format.html { redirect_to session_url }
|
224
|
-
format.json { head :
|
224
|
+
format.json { head :no_content }
|
225
225
|
end
|
226
226
|
end
|
227
227
|
|
@@ -272,7 +272,7 @@ module SessionController
|
|
272
272
|
format.html do
|
273
273
|
redirect_to session_url, notice: 'Password updated'
|
274
274
|
end
|
275
|
-
format.json { head :
|
275
|
+
format.json { head :no_content }
|
276
276
|
else
|
277
277
|
format.html { render action: :password_change }
|
278
278
|
format.json { render json: { error: :invalid } }
|
@@ -373,7 +373,7 @@ class SessionControllerApiTest < ActionController::TestCase
|
|
373
373
|
set_session_current_user @user
|
374
374
|
delete :destroy, format: 'json'
|
375
375
|
|
376
|
-
assert_response :
|
376
|
+
assert_response :no_content
|
377
377
|
end
|
378
378
|
|
379
379
|
test "api_token request" do
|
@@ -591,7 +591,7 @@ class SessionControllerApiTest < ActionController::TestCase
|
|
591
591
|
post :change_password, format: 'json', params: {
|
592
592
|
credential: { old_password: 'pa55w0rd', password: 'hacks',
|
593
593
|
password_confirmation: 'hacks' } }
|
594
|
-
assert_response :
|
594
|
+
assert_response :no_content
|
595
595
|
assert_equal @user, User.authenticate_signin(Session.new(email:
|
596
596
|
@email_credential.email, password: 'hacks')), 'password not changed'
|
597
597
|
end
|
@@ -627,7 +627,7 @@ class SessionControllerApiTest < ActionController::TestCase
|
|
627
627
|
@password_credential.destroy
|
628
628
|
post :change_password, format: 'json', params: {
|
629
629
|
credential: { password: 'hacks', password_confirmation: 'hacks' } }
|
630
|
-
assert_response :
|
630
|
+
assert_response :no_content
|
631
631
|
assert_equal @user, User.authenticate_signin(Session.new(email:
|
632
632
|
@email_credential.email, password: 'hacks')), 'password not changed'
|
633
633
|
end
|