touchpass 0.0.8.1

Sign up to get free protection for your applications and to get access to all the features.
data/.gitignore ADDED
@@ -0,0 +1,3 @@
1
+ .DS_Store
2
+ log/*
3
+ pkg/*
data/.rspec ADDED
@@ -0,0 +1,2 @@
1
+ --color
2
+ --format progress
data/Gemfile ADDED
@@ -0,0 +1,16 @@
1
+ source 'http://rubygems.org'
2
+
3
+ gem 'httparty', '~> 0.8.0'
4
+ gem 'thor', '~> 0.14.6'
5
+ gem 'geocoder', '~> 1.1.0'
6
+ gem 'json', '~> 1.6.5'
7
+ gem 'xml-simple', '~> 1.1.1'
8
+
9
+ group :development, :test do
10
+ gem 'guard'
11
+ gem 'growl'
12
+ gem 'guard-rspec'
13
+ gem 'rspec-core'
14
+ gem 'rspec-mocks'
15
+ gem 'rspec-expectations'
16
+ end
data/Gemfile.lock ADDED
@@ -0,0 +1,38 @@
1
+ GEM
2
+ remote: http://rubygems.org/
3
+ specs:
4
+ diff-lcs (1.1.3)
5
+ ffi (1.0.11)
6
+ geocoder (1.1.1)
7
+ growl (1.0.3)
8
+ guard (1.0.0)
9
+ ffi (>= 0.5.0)
10
+ thor (~> 0.14.6)
11
+ guard-rspec (0.6.0)
12
+ guard (>= 0.10.0)
13
+ httparty (0.8.1)
14
+ multi_json
15
+ multi_xml
16
+ json (1.6.5)
17
+ multi_json (1.1.0)
18
+ multi_xml (0.4.1)
19
+ rspec-core (2.8.0)
20
+ rspec-expectations (2.8.0)
21
+ diff-lcs (~> 1.1.2)
22
+ rspec-mocks (2.8.0)
23
+ thor (0.14.6)
24
+
25
+ PLATFORMS
26
+ ruby
27
+
28
+ DEPENDENCIES
29
+ geocoder (~> 1.1.0)
30
+ growl
31
+ guard
32
+ guard-rspec
33
+ httparty (~> 0.8.0)
34
+ json
35
+ rspec-core
36
+ rspec-expectations
37
+ rspec-mocks
38
+ thor (~> 0.14.6)
data/Guardfile ADDED
@@ -0,0 +1,9 @@
1
+ # A sample Guardfile
2
+ # More info at https://github.com/guard/guard#readme
3
+
4
+ guard 'rspec', :version => 2 do
5
+ watch(%r{^spec/.+_spec\.rb$})
6
+ watch(%r{^lib/(.+)\.rb$}) { |m| "spec/lib/#{m[1]}_spec.rb" }
7
+ watch('spec/spec_helper.rb') { "spec" }
8
+ end
9
+
data/Rakefile ADDED
@@ -0,0 +1 @@
1
+ require 'bundler/gem_tasks'
@@ -0,0 +1,30 @@
1
+ module Touchpass
2
+ class VerificationsController < ApplicationController
3
+
4
+ unloadable
5
+
6
+ def create
7
+ verification = Touchpass::Rp::Verification.new
8
+ response = verification.create params[:to_user], {:address => params[:address], :message => params[:message]}
9
+ respond_to do |format|
10
+ format.js { render :json => response.to_json }
11
+ end
12
+ end
13
+
14
+ def show
15
+ verification = Touchpass::Rp::Verification.new
16
+ response = verification.show params[:id]
17
+ respond_to do |format|
18
+ format.js { render :json => response.to_json }
19
+ end
20
+ end
21
+
22
+ def cancel
23
+ verification = Touchpass::Rp::Verification.new
24
+ response = verification.cancel params[:id]
25
+ respond_to do |format|
26
+ format.js { render :json => response.to_json }
27
+ end
28
+ end
29
+ end
30
+ end
data/bin/tpcli.rb ADDED
@@ -0,0 +1,248 @@
1
+ #!/usr/bin/env ruby
2
+
3
+ # Geodica Touchpass
4
+ # (C) Copyright 2009-2012 Geodica, a Carpadium Pty Ltd Venture
5
+ # All rights reserved
6
+
7
+ require 'rubygems'
8
+ require 'thor'
9
+ require 'httparty'
10
+ require 'openssl'
11
+ require 'fileutils'
12
+ require 'base64'
13
+ require 'xmlsimple'
14
+
15
+ $:.unshift(File.join(File.dirname(__FILE__), "/../lib"))
16
+ require "touchpass"
17
+
18
+ class TpCLI < Thor
19
+
20
+ DFT_API_KEY = ENV["TPC_API_KEY"]
21
+ DFT_HOST = ENV["TPC_HOST"]
22
+ DFT_DEBUG = ENV["TPC_DEBUG"]
23
+ DFT_OUTPUT = "json"
24
+
25
+ attr_accessor :touchpass_client
26
+
27
+ desc "register_party", "Register new Verifying Party"
28
+ method_option :email, :aliases => "-e", :required => true
29
+ method_option :username, :aliases => "-u", :required => true
30
+ method_option :password, :aliases => "-p", :required => true
31
+ method_option :hostname, :aliases => "-h"
32
+ method_option :output, :aliases => "-o"
33
+ method_option :debug, :aliases => "-d"
34
+ def register_party
35
+ setup(options)
36
+ output @touchpass_client.register_party(options)
37
+ end
38
+
39
+ desc "authenticate_party", "Authenticate Party"
40
+ method_option :login, :aliases => "-l", :required => true
41
+ method_option :password, :aliases => "-p", :required => true
42
+ method_option :hostname, :aliases => "-h"
43
+ method_option :output, :aliases => "-o"
44
+ method_option :debug, :aliases => "-d"
45
+ def authenticate_party
46
+ setup(options)
47
+ output @touchpass_client.authenticate_party(options)
48
+ end
49
+
50
+ desc "show_party", "Show Party details"
51
+ method_option :username, :aliases => "-u"
52
+ method_option :id
53
+ method_option :api_key, :required => true, :default => DFT_API_KEY
54
+ method_option :hostname, :aliases => "-h"
55
+ method_option :output, :aliases => "-o"
56
+ method_option :debug, :aliases => "-d"
57
+ def show_party
58
+ setup(options)
59
+ output @touchpass_client.get_party(options)
60
+ end
61
+
62
+ desc "update_party", "Update Party details"
63
+ method_option :username, :aliases => "-u"
64
+ method_option :id
65
+ method_option :email, :aliases => "-e"
66
+ method_option :first_name
67
+ method_option :last_name
68
+ method_option :api_key, :required => true
69
+ method_option :hostname, :aliases => "-h"
70
+ method_option :output, :aliases => "-o"
71
+ method_option :debug, :aliases => "-d"
72
+ def update_party
73
+ setup(options)
74
+ output @touchpass_client.update_party(options)
75
+ end
76
+
77
+ desc "register_device", "Register new Device"
78
+ method_option :username, :aliases => "-u", :required => true
79
+ method_option :udid, :required => true
80
+ method_option :name, :aliases => "-n", :required => true
81
+ method_option :messaging_type, :aliases => "-mt"
82
+ method_option :messaging_value, :aliases => "-mv"
83
+ method_option :api_key, :required => true
84
+ method_option :hostname, :aliases => "-h"
85
+ method_option :output, :aliases => "-o"
86
+ method_option :debug, :aliases => "-d"
87
+ def register_device
88
+ setup(options)
89
+ output @touchpass_client.register_device(options)
90
+ end
91
+
92
+ desc "show_devices", "Show Party Devices"
93
+ method_option :username, :aliases => "-u", :required => true
94
+ method_option :api_key, :required => true, :default => DFT_API_KEY
95
+ method_option :hostname, :aliases => "-h"
96
+ method_option :output, :aliases => "-o"
97
+ method_option :debug, :aliases => "-d"
98
+ def show_devices
99
+ setup(options)
100
+ output @touchpass_client.get_devices(options)
101
+ end
102
+
103
+ desc "show_device", "Show Device details"
104
+ method_option :username, :aliases => "-u", :required => true
105
+ method_option :id, :required => true
106
+ method_option :api_key, :required => true, :default => DFT_API_KEY
107
+ method_option :hostname, :aliases => "-h"
108
+ method_option :output, :aliases => "-o"
109
+ method_option :debug, :aliases => "-d"
110
+ def show_device
111
+ setup(options)
112
+ output @touchpass_client.get_device(options)
113
+ end
114
+
115
+ desc "update_device", "Update Device details"
116
+ method_option :username, :aliases => "-u", :required => true
117
+ method_option :id, :required => true
118
+ method_option :name, :aliases => "-n"
119
+ method_option :messaging_type, :aliases => "-mt"
120
+ method_option :messaging_value, :aliases => "-mv"
121
+ method_option :update_pub_key
122
+ method_option :api_key, :required => true
123
+ method_option :hostname, :aliases => "-h"
124
+ method_option :output, :aliases => "-o"
125
+ method_option :debug, :aliases => "-d"
126
+ def update_device
127
+ setup(options)
128
+ output @touchpass_client.update_device(options)
129
+ end
130
+
131
+ desc "remove_device", "Remove Device"
132
+ method_option :username, :aliases => "-u", :required => true
133
+ method_option :id, :required => true
134
+ method_option :api_key, :required => true
135
+ method_option :hostname, :aliases => "-h"
136
+ method_option :output, :aliases => "-o"
137
+ method_option :debug, :aliases => "-d"
138
+ def remove_device
139
+ setup(options)
140
+ output @touchpass_client.remove_device(options)
141
+ end
142
+
143
+ desc "create_verification", "Create new Verification"
144
+ method_option :to_party, :aliases => "-t", :required => true
145
+ method_option :to_device_id, :aliases => "-D"
146
+ method_option :message, :aliases => "-m"
147
+ method_option :address, :aliases => "-a" # Required for location verfication
148
+ method_option :resolution, :aliases => "-r"
149
+ method_option :api_key, :required => true
150
+ method_option :hostname, :aliases => "-h"
151
+ method_option :output, :aliases => "-o"
152
+ method_option :debug, :aliases => "-d"
153
+ def create_verification
154
+ setup(options)
155
+ output @touchpass_client.create_verification(options)
156
+ end
157
+
158
+ desc "show_verifications", "Show Verifications"
159
+ method_option :username, :aliases => "-u"
160
+ method_option :party_id
161
+ method_option :api_key, :required => true
162
+ method_option :hostname, :aliases => "-h"
163
+ method_option :output, :aliases => "-o"
164
+ method_option :debug, :aliases => "-d"
165
+ def show_verifications
166
+ setup(options)
167
+ output @touchpass_client.get_verifications(options)
168
+ end
169
+
170
+ desc "show_verification", "Show Verification details"
171
+ method_option :id, :aliases => "-i", :required => true
172
+ method_option :device_id # For decrypting message (optional)
173
+ method_option :api_key, :required => true
174
+ method_option :hostname, :aliases => "-h"
175
+ method_option :output, :aliases => "-o"
176
+ method_option :debug, :aliases => "-d"
177
+ def show_verification
178
+ setup(options)
179
+ output @touchpass_client.get_verification(options)
180
+ end
181
+
182
+ desc "update_verification", "Update Verification"
183
+ method_option :id, :required => true
184
+ method_option :device_id, :required => true, :aliases => "-d"
185
+ method_option :address, :aliases => "-a"
186
+ method_option :api_key, :required => true
187
+ method_option :hostname, :aliases => "-h"
188
+ method_option :output, :aliases => "-o"
189
+ method_option :debug, :aliases => "-d"
190
+ def update_verification
191
+ setup(options)
192
+ output @touchpass_client.update_verification(options)
193
+ end
194
+
195
+ desc "cancel_verification", "Cancel Verification"
196
+ method_option :id, :required => true
197
+ method_option :api_key, :required => true, :default => DFT_API_KEY
198
+ method_option :hostname, :aliases => "-h"
199
+ method_option :output, :aliases => "-o"
200
+ method_option :debug, :aliases => "-d"
201
+ def cancel_verification
202
+ setup(options)
203
+ output @touchpass_client.cancel_verification(options)
204
+ end
205
+
206
+ desc "reject_verification", "Reject Verification"
207
+ method_option :id, :required => true
208
+ method_option :api_key, :required => true, :default => DFT_API_KEY
209
+ method_option :hostname, :aliases => "-h"
210
+ method_option :output, :aliases => "-o"
211
+ method_option :debug, :aliases => "-d"
212
+ def reject_verification
213
+ setup(options)
214
+ output @touchpass_client.reject_verification(options)
215
+ end
216
+
217
+ private
218
+
219
+ # Construct a Touchpass:Client instance
220
+ def setup(options)
221
+ @output = (options[:output] || DFT_OUTPUT).to_sym
222
+ unless [:xml, :json].include?(@output)
223
+ puts "error: output format '#{@output}' is not supported, use xml or json"
224
+ exit 1
225
+ end
226
+
227
+ hostname = options[:hostname] || DFT_HOST
228
+ debug = options[:debug] || DFT_DEBUG
229
+ api_key = options[:api_key] || DFT_API_KEY
230
+
231
+ @touchpass_client = Touchpass::Client.new(hostname, debug)
232
+ @touchpass_client.api_key = api_key
233
+ @touchpass_client
234
+ end
235
+
236
+ def output(response)
237
+ case @output
238
+ when :xml
239
+ puts XmlSimple.xml_out(response, 'NoAttr' => true, 'RootName' => 'response')
240
+ when :json
241
+ puts JSON.pretty_generate(response)
242
+ end
243
+ end
244
+
245
+ end
246
+
247
+ # Kick off the Touchpass CLI
248
+ TpCLI.start
data/config/routes.rb ADDED
@@ -0,0 +1,8 @@
1
+ #config/routes.rb
2
+ Rails.application.routes.draw do |map|
3
+ scope :module => 'touchpass' do
4
+ get "touchpass/verifications/:id" => 'verifications#show'
5
+ post "touchpass/verifications" => 'verifications#create'
6
+ put "touchpass/verifications/:id/cancel" => 'verifications#cancel'
7
+ end
8
+ end
data/lib/engine.rb ADDED
@@ -0,0 +1,4 @@
1
+ module Touchpass
2
+ class Engine < Rails::Engine
3
+ end
4
+ end
@@ -0,0 +1,204 @@
1
+ # Use this hook to configure devise mailer, warden hooks and so forth. The first
2
+ # four configuration values can also be set straight in your models.
3
+ Devise.setup do |config|
4
+ # ==> Mailer Configuration
5
+ # Configure the e-mail address which will be shown in DeviseMailer.
6
+ config.mailer_sender = "please-change-me-at-config-initializers-devise@example.com"
7
+
8
+ # Configure the class responsible to send e-mails.
9
+ # config.mailer = "Devise::Mailer"
10
+
11
+ # ==> ORM configuration
12
+ # Load and configure the ORM. Supports :active_record (default) and
13
+ # :mongoid (bson_ext recommended) by default. Other ORMs may be
14
+ # available as additional gems.
15
+ require 'devise/orm/active_record'
16
+
17
+ # ==> Configuration for any authentication mechanism
18
+ # Configure which keys are used when authenticating a user. The default is
19
+ # just :email. You can configure it to use [:username, :subdomain], so for
20
+ # authenticating a user, both parameters are required. Remember that those
21
+ # parameters are used only when authenticating and not when retrieving from
22
+ # session. If you need permissions, you should implement that in a before filter.
23
+ # You can also supply a hash where the value is a boolean determining whether
24
+ # or not authentication should be aborted when the value is not present.
25
+ config.authentication_keys = [ :login ]
26
+
27
+ # Configure parameters from the request object used for authentication. Each entry
28
+ # given should be a request method and it will automatically be passed to the
29
+ # find_for_authentication method and considered in your model lookup. For instance,
30
+ # if you set :request_keys to [:subdomain], :subdomain will be used on authentication.
31
+ # The same considerations mentioned for authentication_keys also apply to request_keys.
32
+ # config.request_keys = []
33
+
34
+ # Configure which authentication keys should be case-insensitive.
35
+ # These keys will be downcased upon creating or modifying a user and when used
36
+ # to authenticate or find a user. Default is :email.
37
+ config.case_insensitive_keys = [ :email ]
38
+
39
+ # Configure which authentication keys should have whitespace stripped.
40
+ # These keys will have whitespace before and after removed upon creating or
41
+ # modifying a user and when used to authenticate or find a user. Default is :email.
42
+ config.strip_whitespace_keys = [ :email ]
43
+
44
+ # Tell if authentication through request.params is enabled. True by default.
45
+ # config.params_authenticatable = true
46
+
47
+ # Tell if authentication through HTTP Basic Auth is enabled. False by default.
48
+ # config.http_authenticatable = false
49
+
50
+ # If http headers should be returned for AJAX requests. True by default.
51
+ # config.http_authenticatable_on_xhr = true
52
+
53
+ # The realm used in Http Basic Authentication. "Application" by default.
54
+ # config.http_authentication_realm = "Application"
55
+
56
+ # It will change confirmation, password recovery and other workflows
57
+ # to behave the same regardless if the e-mail provided was right or wrong.
58
+ # Does not affect registerable.
59
+ # config.paranoid = true
60
+
61
+ # ==> Configuration for :database_authenticatable
62
+ # For bcrypt, this is the cost for hashing the password and defaults to 10. If
63
+ # using other encryptors, it sets how many times you want the password re-encrypted.
64
+ config.stretches = 10
65
+
66
+ # Setup a pepper to generate the encrypted password.
67
+ # config.pepper = "c4d6f4a2a9f3f649d369ccf29bfd125a8b897383bf858c3069f3e9b248f3295ff79fa43241e7caa07db43e004d5f078af7e4853539e02cb104b3a0965b95923a"
68
+
69
+ # ==> Configuration for :confirmable
70
+ # The time you want to give your user to confirm his account. During this time
71
+ # he will be able to access your application without confirming. Default is 0.days
72
+ # When confirm_within is zero, the user won't be able to sign in without confirming.
73
+ # You can use this to let your user access some features of your application
74
+ # without confirming the account, but blocking it after a certain period
75
+ # (ie 2 days).
76
+ # config.confirm_within = 2.days
77
+
78
+ # Defines which key will be used when confirming an account
79
+ # config.confirmation_keys = [ :email ]
80
+
81
+ # ==> Configuration for :rememberable
82
+ # The time the user will be remembered without asking for credentials again.
83
+ # config.remember_for = 2.weeks
84
+
85
+ # If true, a valid remember token can be re-used between multiple browsers.
86
+ # config.remember_across_browsers = true
87
+
88
+ # If true, extends the user's remember period when remembered via cookie.
89
+ # config.extend_remember_period = false
90
+
91
+ # If true, uses the password salt as remember token. This should be turned
92
+ # to false if you are not using database authenticatable.
93
+ config.use_salt_as_remember_token = true
94
+
95
+ # Options to be passed to the created cookie. For instance, you can set
96
+ # :secure => true in order to force SSL only cookies.
97
+ # config.cookie_options = {}
98
+
99
+ # ==> Configuration for :validatable
100
+ # Range for password length. Default is 6..128.
101
+ # config.password_length = 6..128
102
+
103
+ # Regex to use to validate the email address
104
+ # config.email_regexp = /\A([\w\.%\+\-]+)@([\w\-]+\.)+([\w]{2,})\z/i
105
+
106
+ # ==> Configuration for :timeoutable
107
+ # The time you want to timeout the user session without activity. After this
108
+ # time the user will be asked for credentials again. Default is 30 minutes.
109
+ # config.timeout_in = 30.minutes
110
+
111
+ # ==> Configuration for :lockable
112
+ # Defines which strategy will be used to lock an account.
113
+ # :failed_attempts = Locks an account after a number of failed attempts to sign in.
114
+ # :none = No lock strategy. You should handle locking by yourself.
115
+ # config.lock_strategy = :failed_attempts
116
+
117
+ # Defines which key will be used when locking and unlocking an account
118
+ # config.unlock_keys = [ :email ]
119
+
120
+ # Defines which strategy will be used to unlock an account.
121
+ # :email = Sends an unlock link to the user email
122
+ # :time = Re-enables login after a certain amount of time (see :unlock_in below)
123
+ # :both = Enables both strategies
124
+ # :none = No unlock strategy. You should handle unlocking by yourself.
125
+ # config.unlock_strategy = :both
126
+
127
+ # Number of authentication tries before locking an account if lock_strategy
128
+ # is failed attempts.
129
+ # config.maximum_attempts = 20
130
+
131
+ # Time interval to unlock the account if :time is enabled as unlock_strategy.
132
+ # config.unlock_in = 1.hour
133
+
134
+ # ==> Configuration for :recoverable
135
+ #
136
+ # Defines which key will be used when recovering the password for an account
137
+ # config.reset_password_keys = [ :email ]
138
+
139
+ # Time interval you can reset your password with a reset password key.
140
+ # Don't put a too small interval or your users won't have the time to
141
+ # change their passwords.
142
+ config.reset_password_within = 2.hours
143
+
144
+ # ==> Configuration for :encryptable
145
+ # Allow you to use another encryption algorithm besides bcrypt (default). You can use
146
+ # :sha1, :sha512 or encryptors from others authentication tools as :clearance_sha1,
147
+ # :authlogic_sha512 (then you should set stretches above to 20 for default behavior)
148
+ # and :restful_authentication_sha1 (then you should set stretches to 10, and copy
149
+ # REST_AUTH_SITE_KEY to pepper)
150
+ # config.encryptor = :sha512
151
+
152
+ # ==> Configuration for :token_authenticatable
153
+ # Defines name of the authentication token params key
154
+ config.token_authentication_key = :api_key
155
+
156
+ # If true, authentication through token does not store user in session and needs
157
+ # to be supplied on each request. Useful if you are using the token as API token.
158
+ # config.stateless_token = false
159
+
160
+ # ==> Scopes configuration
161
+ # Turn scoped views on. Before rendering "sessions/new", it will first check for
162
+ # "users/sessions/new". It's turned off by default because it's slower if you
163
+ # are using only default views.
164
+ # config.scoped_views = false
165
+
166
+ # Configure the default scope given to Warden. By default it's the first
167
+ # devise role declared in your routes (usually :user).
168
+ # config.default_scope = :user
169
+
170
+ # Configure sign_out behavior.
171
+ # Sign_out action can be scoped (i.e. /users/sign_out affects only :user scope).
172
+ # The default is true, which means any logout action will sign out all active scopes.
173
+ # config.sign_out_all_scopes = true
174
+
175
+ # ==> Navigation configuration
176
+ # Lists the formats that should be treated as navigational. Formats like
177
+ # :html, should redirect to the sign in page when the user does not have
178
+ # access, but formats like :xml or :json, should return 401.
179
+ #
180
+ # If you have any extra navigational formats, like :iphone or :mobile, you
181
+ # should add them to the navigational formats lists.
182
+ #
183
+ # The :"*/*" and "*/*" formats below is required to match Internet
184
+ # Explorer requests.
185
+ # config.navigational_formats = [:"*/*", "*/*", :html]
186
+
187
+ # The default HTTP method used to sign out a resource. Default is :delete.
188
+ config.sign_out_via = :delete
189
+
190
+ # ==> OmniAuth
191
+ # Add a new OmniAuth provider. Check the wiki for more information on setting
192
+ # up on your models and hooks.
193
+ # config.omniauth :github, 'APP_ID', 'APP_SECRET', :scope => 'user,public_repo'
194
+
195
+ # ==> Warden configuration
196
+ # If you want to use other strategies, that are not supported by Devise, or
197
+ # change the failure app, you can configure them inside the config.warden block.
198
+ #
199
+ # config.warden do |manager|
200
+ # manager.failure_app = AnotherApp
201
+ # manager.intercept_401 = false
202
+ # manager.default_strategies(:scope => :user).unshift :some_external_strategy
203
+ # end
204
+ end
@@ -0,0 +1,24 @@
1
+ # Use this hook to configure Touchpass.
2
+ Touchpass.setup do |config|
3
+ # Touchpass Username.
4
+ config.username = "YOUR_TOUCHPASS_USERNAME"
5
+
6
+ # Touchpass API Key.
7
+ config.api_key = "YOUR_TOUCHPASS_API_KEY"
8
+
9
+ # Touchpass Host.
10
+ config.host = Rails.env == 'production' ? "touchpass.geodica.com" : "localhost"
11
+
12
+ # Touchpass Port.
13
+ config.port = Rails.env == 'production' ? "443" : "3000"
14
+
15
+ # Turn https on.
16
+ config.use_https = true
17
+
18
+ # Turn Location Verification on.
19
+ #config.location_verification = true
20
+
21
+ # Defines which resolution will be used when creating Location Verification.
22
+ # STREET, LOCAL, METRO or REGIONAL
23
+ #config.resolution = "LOCAL"
24
+ end
@@ -0,0 +1,53 @@
1
+ # Additional translations at http://github.com/plataformatec/devise/wiki/I18n
2
+
3
+ en:
4
+ errors:
5
+ messages:
6
+ expired: "has expired, please request a new one"
7
+ not_found: "not found"
8
+ already_confirmed: "was already confirmed, please try signing in"
9
+ not_locked: "was not locked"
10
+ not_saved:
11
+ one: "1 error prohibited this %{resource} from being saved:"
12
+ other: "%{count} errors prohibited this %{resource} from being saved:"
13
+
14
+ devise:
15
+ failure:
16
+ already_authenticated: 'You are already signed in.'
17
+ unauthenticated: 'You need to sign in or sign up before continuing.'
18
+ unconfirmed: 'You have to confirm your account before continuing.'
19
+ locked: 'Your account is locked.'
20
+ invalid: 'Invalid email or password.'
21
+ invalid_token: 'Invalid authentication token.'
22
+ timeout: 'Your session expired, please sign in again to continue.'
23
+ inactive: 'Your account was not activated yet.'
24
+ sessions:
25
+ signed_in: 'Signed in successfully.'
26
+ signed_out: 'Signed out successfully.'
27
+ passwords:
28
+ send_instructions: 'You will receive an email with instructions about how to reset your password in a few minutes.'
29
+ updated: 'Your password was changed successfully. You are now signed in.'
30
+ send_paranoid_instructions: "If your e-mail exists on our database, you will receive a password recovery link on your e-mail"
31
+ confirmations:
32
+ send_instructions: 'You will receive an email with instructions about how to confirm your account in a few minutes.'
33
+ send_paranoid_instructions: 'If your e-mail exists on our database, you will receive an email with instructions about how to confirm your account in a few minutes.'
34
+ confirmed: 'Your account was successfully confirmed. You are now signed in.'
35
+ registrations:
36
+ signed_up: 'Welcome! You have signed up successfully.'
37
+ inactive_signed_up: 'You have signed up successfully. However, we could not sign you in because your account is %{reason}.'
38
+ updated: 'You updated your account successfully.'
39
+ destroyed: 'Bye! Your account was successfully cancelled. We hope to see you again soon.'
40
+ unlocks:
41
+ send_instructions: 'You will receive an email with instructions about how to unlock your account in a few minutes.'
42
+ unlocked: 'Your account was successfully unlocked. You are now signed in.'
43
+ send_paranoid_instructions: 'If your account exists, you will receive an email with instructions about how to unlock it in a few minutes.'
44
+ omniauth_callbacks:
45
+ success: 'Successfully authorized from %{kind} account.'
46
+ failure: 'Could not authorize you from %{kind} because "%{reason}".'
47
+ mailer:
48
+ confirmation_instructions:
49
+ subject: 'Confirmation instructions'
50
+ reset_password_instructions:
51
+ subject: 'Reset password instructions'
52
+ unlock_instructions:
53
+ subject: 'Unlock Instructions'