rails_blog_engine 0.0.1 → 0.0.2
Sign up to get free protection for your applications and to get access to all the features.
- data/.gitignore +12 -0
- data/.rspec +1 -0
- data/Gemfile +24 -0
- data/Guardfile +21 -0
- data/Procfile +1 -0
- data/TODO.txt +31 -0
- data/app/assets/images/rails_blog_engine/.gitkeep +0 -0
- data/app/controllers/rails_blog_engine/comments_controller.rb +1 -1
- data/app/controllers/rails_blog_engine/posts_controller.rb +1 -1
- data/lib/rails_blog_engine.rb +2 -0
- data/lib/rails_blog_engine/version.rb +1 -1
- data/rails_blog_engine.gemspec +64 -0
- data/script/rails +6 -0
- data/spec/acceptance/acceptance_helper.rb +4 -0
- data/spec/acceptance/rails_blog_engine/posts_admin_spec.rb +33 -0
- data/spec/acceptance/rails_blog_engine/posts_spec.rb +74 -0
- data/spec/acceptance/rails_blog_engine/spam_filtering_spec.rb +110 -0
- data/spec/acceptance/support/helpers.rb +18 -0
- data/spec/acceptance/support/paths.rb +5 -0
- data/spec/controllers/rails_blog_engine/comments_controller_spec.rb +22 -0
- data/spec/controllers/rails_blog_engine/posts_controller_spec.rb +81 -0
- data/spec/dummy/Rakefile +7 -0
- data/spec/dummy/app/assets/javascripts/application.js +10 -0
- data/spec/dummy/app/assets/stylesheets/application.css +8 -0
- data/spec/dummy/app/controllers/application_controller.rb +3 -0
- data/spec/dummy/app/controllers/home_controller.rb +4 -0
- data/spec/dummy/app/helpers/application_helper.rb +2 -0
- data/spec/dummy/app/mailers/.gitkeep +0 -0
- data/spec/dummy/app/models/.gitkeep +0 -0
- data/spec/dummy/app/models/ability.rb +11 -0
- data/spec/dummy/app/models/user.rb +9 -0
- data/spec/dummy/app/views/home/index.html.haml +2 -0
- data/spec/dummy/app/views/layouts/application.html.erb +15 -0
- data/spec/dummy/config.ru +4 -0
- data/spec/dummy/config/application.rb +54 -0
- data/spec/dummy/config/boot.rb +10 -0
- data/spec/dummy/config/database.yml +25 -0
- data/spec/dummy/config/environment.rb +5 -0
- data/spec/dummy/config/environments/development.rb +30 -0
- data/spec/dummy/config/environments/production.rb +60 -0
- data/spec/dummy/config/environments/test.rb +42 -0
- data/spec/dummy/config/initializers/backtrace_silencers.rb +7 -0
- data/spec/dummy/config/initializers/devise.rb +211 -0
- data/spec/dummy/config/initializers/inflections.rb +10 -0
- data/spec/dummy/config/initializers/mime_types.rb +5 -0
- data/spec/dummy/config/initializers/rails_blog_engine.rb +13 -0
- data/spec/dummy/config/initializers/secret_token.rb +7 -0
- data/spec/dummy/config/initializers/session_store.rb +8 -0
- data/spec/dummy/config/initializers/wrap_parameters.rb +14 -0
- data/spec/dummy/config/locales/devise.en.yml +58 -0
- data/spec/dummy/config/locales/en.yml +5 -0
- data/spec/dummy/config/routes.rb +6 -0
- data/spec/dummy/db/migrate/20110913113004_devise_create_users.rb +28 -0
- data/spec/dummy/db/schema.rb +67 -0
- data/spec/dummy/lib/assets/.gitkeep +0 -0
- data/spec/dummy/log/.gitkeep +0 -0
- data/spec/dummy/public/404.html +26 -0
- data/spec/dummy/public/422.html +26 -0
- data/spec/dummy/public/500.html +26 -0
- data/spec/dummy/public/favicon.ico +0 -0
- data/spec/dummy/script/rails +6 -0
- data/spec/helpers/rails_blog_engine/application_helper_spec.rb +56 -0
- data/spec/helpers/rails_blog_engine/comments_helper_spec.rb +14 -0
- data/spec/helpers/rails_blog_engine/posts_helper_spec.rb +14 -0
- data/spec/lib/generators/rails_blog_engine/install_generator_spec.rb +78 -0
- data/spec/lib/rails_blog_engine/filters/base_spec.rb +13 -0
- data/spec/lib/rails_blog_engine/filters/code_spec.rb +16 -0
- data/spec/lib/rails_blog_engine/filters_spec.rb +58 -0
- data/spec/models/rails_blog_engine/comment_spec.rb +84 -0
- data/spec/models/rails_blog_engine/post_spec.rb +121 -0
- data/spec/spec_helper.rb +36 -0
- data/spec/support/blueprints.rb +25 -0
- data/spec/support/javascript.rb +27 -0
- data/spec/support/vcr.rb +8 -0
- data/spec/vcr_cassettes/rakismet-ham.yml +30 -0
- data/spec/vcr_cassettes/rakismet-spam.yml +30 -0
- data/spec/vcr_cassettes/rakismet-train-as-ham.yml +32 -0
- data/spec/vcr_cassettes/rakismet-train-as-spam.yml +32 -0
- metadata +175 -101
@@ -0,0 +1,7 @@
|
|
1
|
+
# Be sure to restart your server when you modify this file.
|
2
|
+
|
3
|
+
# You can add backtrace silencers for libraries that you're using but don't wish to see in your backtraces.
|
4
|
+
# Rails.backtrace_cleaner.add_silencer { |line| line =~ /my_noisy_library/ }
|
5
|
+
|
6
|
+
# You can also remove all the silencers if you're trying to debug a problem that might stem from framework code.
|
7
|
+
# Rails.backtrace_cleaner.remove_silencers!
|
@@ -0,0 +1,211 @@
|
|
1
|
+
# Use this hook to configure devise mailer, warden hooks and so forth. The first
|
2
|
+
# four configuration values can also be set straight in your models.
|
3
|
+
Devise.setup do |config|
|
4
|
+
# ==> Mailer Configuration
|
5
|
+
# Configure the e-mail address which will be shown in Devise::Mailer,
|
6
|
+
# note that it will be overwritten if you use your own mailer class with default "from" parameter.
|
7
|
+
config.mailer_sender = "please-change-me-at-config-initializers-devise@example.com"
|
8
|
+
|
9
|
+
# Configure the class responsible to send e-mails.
|
10
|
+
# config.mailer = "Devise::Mailer"
|
11
|
+
|
12
|
+
# ==> ORM configuration
|
13
|
+
# Load and configure the ORM. Supports :active_record (default) and
|
14
|
+
# :mongoid (bson_ext recommended) by default. Other ORMs may be
|
15
|
+
# available as additional gems.
|
16
|
+
require 'devise/orm/active_record'
|
17
|
+
|
18
|
+
# ==> Configuration for any authentication mechanism
|
19
|
+
# Configure which keys are used when authenticating a user. The default is
|
20
|
+
# just :email. You can configure it to use [:username, :subdomain], so for
|
21
|
+
# authenticating a user, both parameters are required. Remember that those
|
22
|
+
# parameters are used only when authenticating and not when retrieving from
|
23
|
+
# session. If you need permissions, you should implement that in a before filter.
|
24
|
+
# You can also supply a hash where the value is a boolean determining whether
|
25
|
+
# or not authentication should be aborted when the value is not present.
|
26
|
+
# config.authentication_keys = [ :email ]
|
27
|
+
|
28
|
+
# Configure parameters from the request object used for authentication. Each entry
|
29
|
+
# given should be a request method and it will automatically be passed to the
|
30
|
+
# find_for_authentication method and considered in your model lookup. For instance,
|
31
|
+
# if you set :request_keys to [:subdomain], :subdomain will be used on authentication.
|
32
|
+
# The same considerations mentioned for authentication_keys also apply to request_keys.
|
33
|
+
# config.request_keys = []
|
34
|
+
|
35
|
+
# Configure which authentication keys should be case-insensitive.
|
36
|
+
# These keys will be downcased upon creating or modifying a user and when used
|
37
|
+
# to authenticate or find a user. Default is :email.
|
38
|
+
config.case_insensitive_keys = [ :email ]
|
39
|
+
|
40
|
+
# Configure which authentication keys should have whitespace stripped.
|
41
|
+
# These keys will have whitespace before and after removed upon creating or
|
42
|
+
# modifying a user and when used to authenticate or find a user. Default is :email.
|
43
|
+
config.strip_whitespace_keys = [ :email ]
|
44
|
+
|
45
|
+
# Tell if authentication through request.params is enabled. True by default.
|
46
|
+
# config.params_authenticatable = true
|
47
|
+
|
48
|
+
# Tell if authentication through HTTP Basic Auth is enabled. False by default.
|
49
|
+
# config.http_authenticatable = false
|
50
|
+
|
51
|
+
# If http headers should be returned for AJAX requests. True by default.
|
52
|
+
# config.http_authenticatable_on_xhr = true
|
53
|
+
|
54
|
+
# The realm used in Http Basic Authentication. "Application" by default.
|
55
|
+
# config.http_authentication_realm = "Application"
|
56
|
+
|
57
|
+
# It will change confirmation, password recovery and other workflows
|
58
|
+
# to behave the same regardless if the e-mail provided was right or wrong.
|
59
|
+
# Does not affect registerable.
|
60
|
+
# config.paranoid = true
|
61
|
+
|
62
|
+
# ==> Configuration for :database_authenticatable
|
63
|
+
# For bcrypt, this is the cost for hashing the password and defaults to 10. If
|
64
|
+
# using other encryptors, it sets how many times you want the password re-encrypted.
|
65
|
+
#
|
66
|
+
# Limiting the stretches to just one in testing will increase the performance of
|
67
|
+
# your test suite dramatically. However, it is STRONGLY RECOMMENDED to not use
|
68
|
+
# a value less than 10 in other environments.
|
69
|
+
config.stretches = Rails.env.test? ? 1 : 10
|
70
|
+
|
71
|
+
# Setup a pepper to generate the encrypted password.
|
72
|
+
# config.pepper = "3840847391d28342ced0a1494a75a47918965c24e9631ea806a84241f5cab5ec374d8805ac7d3e0c4a866745708121713925d544453aee53a423dd6810872287"
|
73
|
+
|
74
|
+
# ==> Configuration for :confirmable
|
75
|
+
# The time you want to give your user to confirm his account. During this time
|
76
|
+
# he will be able to access your application without confirming. Default is 0.days
|
77
|
+
# When confirm_within is zero, the user won't be able to sign in without confirming.
|
78
|
+
# You can use this to let your user access some features of your application
|
79
|
+
# without confirming the account, but blocking it after a certain period
|
80
|
+
# (ie 2 days).
|
81
|
+
# config.confirm_within = 2.days
|
82
|
+
|
83
|
+
# Defines which key will be used when confirming an account
|
84
|
+
# config.confirmation_keys = [ :email ]
|
85
|
+
|
86
|
+
# ==> Configuration for :rememberable
|
87
|
+
# The time the user will be remembered without asking for credentials again.
|
88
|
+
# config.remember_for = 2.weeks
|
89
|
+
|
90
|
+
# If true, a valid remember token can be re-used between multiple browsers.
|
91
|
+
# config.remember_across_browsers = true
|
92
|
+
|
93
|
+
# If true, extends the user's remember period when remembered via cookie.
|
94
|
+
# config.extend_remember_period = false
|
95
|
+
|
96
|
+
# If true, uses the password salt as remember token. This should be turned
|
97
|
+
# to false if you are not using database authenticatable.
|
98
|
+
config.use_salt_as_remember_token = true
|
99
|
+
|
100
|
+
# Options to be passed to the created cookie. For instance, you can set
|
101
|
+
# :secure => true in order to force SSL only cookies.
|
102
|
+
# config.cookie_options = {}
|
103
|
+
|
104
|
+
# ==> Configuration for :validatable
|
105
|
+
# Range for password length. Default is 6..128.
|
106
|
+
# config.password_length = 6..128
|
107
|
+
|
108
|
+
# Email regex used to validate email formats. It simply asserts that
|
109
|
+
# an one (and only one) @ exists in the given string. This is mainly
|
110
|
+
# to give user feedback and not to assert the e-mail validity.
|
111
|
+
# config.email_regexp = /\A[^@]+@[^@]+\z/
|
112
|
+
|
113
|
+
# ==> Configuration for :timeoutable
|
114
|
+
# The time you want to timeout the user session without activity. After this
|
115
|
+
# time the user will be asked for credentials again. Default is 30 minutes.
|
116
|
+
# config.timeout_in = 30.minutes
|
117
|
+
|
118
|
+
# ==> Configuration for :lockable
|
119
|
+
# Defines which strategy will be used to lock an account.
|
120
|
+
# :failed_attempts = Locks an account after a number of failed attempts to sign in.
|
121
|
+
# :none = No lock strategy. You should handle locking by yourself.
|
122
|
+
# config.lock_strategy = :failed_attempts
|
123
|
+
|
124
|
+
# Defines which key will be used when locking and unlocking an account
|
125
|
+
# config.unlock_keys = [ :email ]
|
126
|
+
|
127
|
+
# Defines which strategy will be used to unlock an account.
|
128
|
+
# :email = Sends an unlock link to the user email
|
129
|
+
# :time = Re-enables login after a certain amount of time (see :unlock_in below)
|
130
|
+
# :both = Enables both strategies
|
131
|
+
# :none = No unlock strategy. You should handle unlocking by yourself.
|
132
|
+
# config.unlock_strategy = :both
|
133
|
+
|
134
|
+
# Number of authentication tries before locking an account if lock_strategy
|
135
|
+
# is failed attempts.
|
136
|
+
# config.maximum_attempts = 20
|
137
|
+
|
138
|
+
# Time interval to unlock the account if :time is enabled as unlock_strategy.
|
139
|
+
# config.unlock_in = 1.hour
|
140
|
+
|
141
|
+
# ==> Configuration for :recoverable
|
142
|
+
#
|
143
|
+
# Defines which key will be used when recovering the password for an account
|
144
|
+
# config.reset_password_keys = [ :email ]
|
145
|
+
|
146
|
+
# Time interval you can reset your password with a reset password key.
|
147
|
+
# Don't put a too small interval or your users won't have the time to
|
148
|
+
# change their passwords.
|
149
|
+
config.reset_password_within = 2.hours
|
150
|
+
|
151
|
+
# ==> Configuration for :encryptable
|
152
|
+
# Allow you to use another encryption algorithm besides bcrypt (default). You can use
|
153
|
+
# :sha1, :sha512 or encryptors from others authentication tools as :clearance_sha1,
|
154
|
+
# :authlogic_sha512 (then you should set stretches above to 20 for default behavior)
|
155
|
+
# and :restful_authentication_sha1 (then you should set stretches to 10, and copy
|
156
|
+
# REST_AUTH_SITE_KEY to pepper)
|
157
|
+
# config.encryptor = :sha512
|
158
|
+
|
159
|
+
# ==> Configuration for :token_authenticatable
|
160
|
+
# Defines name of the authentication token params key
|
161
|
+
# config.token_authentication_key = :auth_token
|
162
|
+
|
163
|
+
# If true, authentication through token does not store user in session and needs
|
164
|
+
# to be supplied on each request. Useful if you are using the token as API token.
|
165
|
+
# config.stateless_token = false
|
166
|
+
|
167
|
+
# ==> Scopes configuration
|
168
|
+
# Turn scoped views on. Before rendering "sessions/new", it will first check for
|
169
|
+
# "users/sessions/new". It's turned off by default because it's slower if you
|
170
|
+
# are using only default views.
|
171
|
+
# config.scoped_views = false
|
172
|
+
|
173
|
+
# Configure the default scope given to Warden. By default it's the first
|
174
|
+
# devise role declared in your routes (usually :user).
|
175
|
+
# config.default_scope = :user
|
176
|
+
|
177
|
+
# Configure sign_out behavior.
|
178
|
+
# Sign_out action can be scoped (i.e. /users/sign_out affects only :user scope).
|
179
|
+
# The default is true, which means any logout action will sign out all active scopes.
|
180
|
+
# config.sign_out_all_scopes = true
|
181
|
+
|
182
|
+
# ==> Navigation configuration
|
183
|
+
# Lists the formats that should be treated as navigational. Formats like
|
184
|
+
# :html, should redirect to the sign in page when the user does not have
|
185
|
+
# access, but formats like :xml or :json, should return 401.
|
186
|
+
#
|
187
|
+
# If you have any extra navigational formats, like :iphone or :mobile, you
|
188
|
+
# should add them to the navigational formats lists.
|
189
|
+
#
|
190
|
+
# The :"*/*" and "*/*" formats below is required to match Internet
|
191
|
+
# Explorer requests.
|
192
|
+
# config.navigational_formats = [:"*/*", "*/*", :html]
|
193
|
+
|
194
|
+
# The default HTTP method used to sign out a resource. Default is :delete.
|
195
|
+
config.sign_out_via = :delete
|
196
|
+
|
197
|
+
# ==> OmniAuth
|
198
|
+
# Add a new OmniAuth provider. Check the wiki for more information on setting
|
199
|
+
# up on your models and hooks.
|
200
|
+
# config.omniauth :github, 'APP_ID', 'APP_SECRET', :scope => 'user,public_repo'
|
201
|
+
|
202
|
+
# ==> Warden configuration
|
203
|
+
# If you want to use other strategies, that are not supported by Devise, or
|
204
|
+
# change the failure app, you can configure them inside the config.warden block.
|
205
|
+
#
|
206
|
+
# config.warden do |manager|
|
207
|
+
# manager.failure_app = AnotherApp
|
208
|
+
# manager.intercept_401 = false
|
209
|
+
# manager.default_strategies(:scope => :user).unshift :some_external_strategy
|
210
|
+
# end
|
211
|
+
end
|
@@ -0,0 +1,10 @@
|
|
1
|
+
# Be sure to restart your server when you modify this file.
|
2
|
+
|
3
|
+
# Add new inflection rules using the following format
|
4
|
+
# (all these examples are active by default):
|
5
|
+
# ActiveSupport::Inflector.inflections do |inflect|
|
6
|
+
# inflect.plural /^(ox)$/i, '\1en'
|
7
|
+
# inflect.singular /^(ox)en/i, '\1'
|
8
|
+
# inflect.irregular 'person', 'people'
|
9
|
+
# inflect.uncountable %w( fish sheep )
|
10
|
+
# end
|
@@ -0,0 +1,13 @@
|
|
1
|
+
# Configure RailsBlogEngine here.
|
2
|
+
|
3
|
+
# If you want to activate the built-in spam filter, visit http://akismet.com/
|
4
|
+
# and sign up for an API key.
|
5
|
+
Rails.application.config.rakismet.key = ENV['RAKISMET_KEY']
|
6
|
+
|
7
|
+
# The URL of your blog, for use by Akismet's spam filter.
|
8
|
+
Rails.application.config.rakismet.url = ENV['RAKISMET_URL']
|
9
|
+
|
10
|
+
# Disable the Akismet middleware, because it isn't needed by
|
11
|
+
# rails_blog_engine. If you use Akismet elsewhere in your application, you
|
12
|
+
# may to set this back to true.
|
13
|
+
Rails.application.config.rakismet.use_middleware = false
|
@@ -0,0 +1,7 @@
|
|
1
|
+
# Be sure to restart your server when you modify this file.
|
2
|
+
|
3
|
+
# Your secret key for verifying the integrity of signed cookies.
|
4
|
+
# If you change this key, all old signed cookies will become invalid!
|
5
|
+
# Make sure the secret is at least 30 characters and all random,
|
6
|
+
# no regular words or you'll be exposed to dictionary attacks.
|
7
|
+
Dummy::Application.config.secret_token = 'a11b1680cb4b14a47907d1ac87cfe8a2beba7807fbd2e7272d230b7f805c588e77b9282453385164245ab25cf78aa6976d6778aef6be58ab93876419a941e539'
|
@@ -0,0 +1,8 @@
|
|
1
|
+
# Be sure to restart your server when you modify this file.
|
2
|
+
|
3
|
+
Dummy::Application.config.session_store :cookie_store, :key => '_dummy_session'
|
4
|
+
|
5
|
+
# Use the database for sessions instead of the cookie-based default,
|
6
|
+
# which shouldn't be used to store highly confidential information
|
7
|
+
# (create the session table with "rails generate session_migration")
|
8
|
+
# Dummy::Application.config.session_store :active_record_store
|
@@ -0,0 +1,14 @@
|
|
1
|
+
# Be sure to restart your server when you modify this file.
|
2
|
+
#
|
3
|
+
# This file contains settings for ActionController::ParamsWrapper which
|
4
|
+
# is enabled by default.
|
5
|
+
|
6
|
+
# Enable parameter wrapping for JSON. You can disable this by setting :format to an empty array.
|
7
|
+
ActiveSupport.on_load(:action_controller) do
|
8
|
+
wrap_parameters :format => [:json]
|
9
|
+
end
|
10
|
+
|
11
|
+
# Disable root element in JSON by default.
|
12
|
+
ActiveSupport.on_load(:active_record) do
|
13
|
+
self.include_root_in_json = false
|
14
|
+
end
|
@@ -0,0 +1,58 @@
|
|
1
|
+
# Additional translations at http://github.com/plataformatec/devise/wiki/I18n
|
2
|
+
|
3
|
+
en:
|
4
|
+
errors:
|
5
|
+
messages:
|
6
|
+
expired: "has expired, please request a new one"
|
7
|
+
not_found: "not found"
|
8
|
+
already_confirmed: "was already confirmed, please try signing in"
|
9
|
+
not_locked: "was not locked"
|
10
|
+
not_saved:
|
11
|
+
one: "1 error prohibited this %{resource} from being saved:"
|
12
|
+
other: "%{count} errors prohibited this %{resource} from being saved:"
|
13
|
+
|
14
|
+
devise:
|
15
|
+
failure:
|
16
|
+
already_authenticated: 'You are already signed in.'
|
17
|
+
unauthenticated: 'You need to sign in or sign up before continuing.'
|
18
|
+
unconfirmed: 'You have to confirm your account before continuing.'
|
19
|
+
locked: 'Your account is locked.'
|
20
|
+
invalid: 'Invalid email or password.'
|
21
|
+
invalid_token: 'Invalid authentication token.'
|
22
|
+
timeout: 'Your session expired, please sign in again to continue.'
|
23
|
+
inactive: 'Your account was not activated yet.'
|
24
|
+
sessions:
|
25
|
+
signed_in: 'Signed in successfully.'
|
26
|
+
signed_out: 'Signed out successfully.'
|
27
|
+
passwords:
|
28
|
+
send_instructions: 'You will receive an email with instructions about how to reset your password in a few minutes.'
|
29
|
+
updated: 'Your password was changed successfully. You are now signed in.'
|
30
|
+
updated_not_active: 'Your password was changed successfully.'
|
31
|
+
send_paranoid_instructions: "If your e-mail exists on our database, you will receive a password recovery link on your e-mail"
|
32
|
+
confirmations:
|
33
|
+
send_instructions: 'You will receive an email with instructions about how to confirm your account in a few minutes.'
|
34
|
+
send_paranoid_instructions: 'If your e-mail exists on our database, you will receive an email with instructions about how to confirm your account in a few minutes.'
|
35
|
+
confirmed: 'Your account was successfully confirmed. You are now signed in.'
|
36
|
+
registrations:
|
37
|
+
signed_up: 'Welcome! You have signed up successfully.'
|
38
|
+
inactive_signed_up: 'You have signed up successfully. However, we could not sign you in because your account is %{reason}.'
|
39
|
+
updated: 'You updated your account successfully.'
|
40
|
+
destroyed: 'Bye! Your account was successfully cancelled. We hope to see you again soon.'
|
41
|
+
reasons:
|
42
|
+
inactive: 'inactive'
|
43
|
+
unconfirmed: 'unconfirmed'
|
44
|
+
locked: 'locked'
|
45
|
+
unlocks:
|
46
|
+
send_instructions: 'You will receive an email with instructions about how to unlock your account in a few minutes.'
|
47
|
+
unlocked: 'Your account was successfully unlocked. You are now signed in.'
|
48
|
+
send_paranoid_instructions: 'If your account exists, you will receive an email with instructions about how to unlock it in a few minutes.'
|
49
|
+
omniauth_callbacks:
|
50
|
+
success: 'Successfully authorized from %{kind} account.'
|
51
|
+
failure: 'Could not authorize you from %{kind} because "%{reason}".'
|
52
|
+
mailer:
|
53
|
+
confirmation_instructions:
|
54
|
+
subject: 'Confirmation instructions'
|
55
|
+
reset_password_instructions:
|
56
|
+
subject: 'Reset password instructions'
|
57
|
+
unlock_instructions:
|
58
|
+
subject: 'Unlock Instructions'
|
@@ -0,0 +1,28 @@
|
|
1
|
+
class DeviseCreateUsers < ActiveRecord::Migration
|
2
|
+
def self.up
|
3
|
+
create_table(:users) do |t|
|
4
|
+
t.database_authenticatable :null => false
|
5
|
+
t.recoverable
|
6
|
+
t.rememberable
|
7
|
+
t.trackable
|
8
|
+
|
9
|
+
# t.encryptable
|
10
|
+
# t.confirmable
|
11
|
+
# t.lockable :lock_strategy => :failed_attempts, :unlock_strategy => :both
|
12
|
+
# t.token_authenticatable
|
13
|
+
|
14
|
+
|
15
|
+
t.timestamps
|
16
|
+
end
|
17
|
+
|
18
|
+
add_index :users, :email, :unique => true
|
19
|
+
add_index :users, :reset_password_token, :unique => true
|
20
|
+
# add_index :users, :confirmation_token, :unique => true
|
21
|
+
# add_index :users, :unlock_token, :unique => true
|
22
|
+
# add_index :users, :authentication_token, :unique => true
|
23
|
+
end
|
24
|
+
|
25
|
+
def self.down
|
26
|
+
drop_table :users
|
27
|
+
end
|
28
|
+
end
|
@@ -0,0 +1,67 @@
|
|
1
|
+
# encoding: UTF-8
|
2
|
+
# This file is auto-generated from the current state of the database. Instead
|
3
|
+
# of editing this file, please use the migrations feature of Active Record to
|
4
|
+
# incrementally modify your database, and then regenerate this schema definition.
|
5
|
+
#
|
6
|
+
# Note that this schema.rb definition is the authoritative source for your
|
7
|
+
# database schema. If you need to create the application database on another
|
8
|
+
# system, you should be using db:schema:load, not running all the migrations
|
9
|
+
# from scratch. The latter is a flawed and unsustainable approach (the more migrations
|
10
|
+
# you'll amass, the slower it'll run and the greater likelihood for issues).
|
11
|
+
#
|
12
|
+
# It's strongly recommended to check this file into your version control system.
|
13
|
+
|
14
|
+
ActiveRecord::Schema.define(:version => 20111125111958) do
|
15
|
+
|
16
|
+
create_table "rails_blog_engine_comments", :force => true do |t|
|
17
|
+
t.integer "post_id"
|
18
|
+
t.string "author_byline"
|
19
|
+
t.string "author_email"
|
20
|
+
t.string "author_url"
|
21
|
+
t.string "author_ip"
|
22
|
+
t.string "author_user_agent"
|
23
|
+
t.boolean "author_can_post"
|
24
|
+
t.string "referrer"
|
25
|
+
t.string "state"
|
26
|
+
t.text "body"
|
27
|
+
t.datetime "created_at"
|
28
|
+
t.datetime "updated_at"
|
29
|
+
end
|
30
|
+
|
31
|
+
add_index "rails_blog_engine_comments", ["author_email"], :name => "index_rails_blog_engine_comments_on_author_email"
|
32
|
+
add_index "rails_blog_engine_comments", ["post_id"], :name => "index_rails_blog_engine_comments_on_post_id"
|
33
|
+
|
34
|
+
create_table "rails_blog_engine_posts", :force => true do |t|
|
35
|
+
t.string "title"
|
36
|
+
t.text "body"
|
37
|
+
t.datetime "created_at"
|
38
|
+
t.datetime "updated_at"
|
39
|
+
t.string "state"
|
40
|
+
t.datetime "published_at"
|
41
|
+
t.string "permalink"
|
42
|
+
t.integer "author_id"
|
43
|
+
t.string "author_type"
|
44
|
+
t.string "author_byline"
|
45
|
+
end
|
46
|
+
|
47
|
+
add_index "rails_blog_engine_posts", ["permalink"], :name => "index_rails_blog_engine_posts_on_permalink"
|
48
|
+
|
49
|
+
create_table "users", :force => true do |t|
|
50
|
+
t.string "email", :default => "", :null => false
|
51
|
+
t.string "encrypted_password", :limit => 128, :default => "", :null => false
|
52
|
+
t.string "reset_password_token"
|
53
|
+
t.datetime "reset_password_sent_at"
|
54
|
+
t.datetime "remember_created_at"
|
55
|
+
t.integer "sign_in_count", :default => 0
|
56
|
+
t.datetime "current_sign_in_at"
|
57
|
+
t.datetime "last_sign_in_at"
|
58
|
+
t.string "current_sign_in_ip"
|
59
|
+
t.string "last_sign_in_ip"
|
60
|
+
t.datetime "created_at"
|
61
|
+
t.datetime "updated_at"
|
62
|
+
end
|
63
|
+
|
64
|
+
add_index "users", ["email"], :name => "index_users_on_email", :unique => true
|
65
|
+
add_index "users", ["reset_password_token"], :name => "index_users_on_reset_password_token", :unique => true
|
66
|
+
|
67
|
+
end
|