aboutsummaryrefslogtreecommitdiffstats
path: root/activerecord/test/cases/secure_token_test.rb
Commit message (Collapse)AuthorAgeFilesLines
* Use frozen-string-literal in ActiveRecordKir Shatrov2017-07-191-0/+2
|
* Revert "Merge pull request #29540 from kirs/rubocop-frozen-string"Matthew Draper2017-07-021-1/+0
| | | | | This reverts commit 3420a14590c0e6915d8b6c242887f74adb4120f9, reversing changes made to afb66a5a598ce4ac74ad84b125a5abf046dcf5aa.
* Enforce frozen string in RubocopKir Shatrov2017-07-011-0/+1
|
* assert_equal takes expectation firstAkira Matsuda2016-12-261-1/+1
|
* applies new string literal convention in activerecord/testXavier Noria2016-08-061-2/+2
| | | | | The current code base is not uniform. After some discussion, we have chosen to go with double quotes by default.
* Revert "Merge pull request #20835 from ↵Kasper Timm Hansen2016-01-141-14/+0
| | | | | | | | | | | | | glittershark/if-and-unless-in-secure-token" This reverts commit 224eddfc0eeff6555ae88691306e61c7a9e8b758, reversing changes made to 9d681fc74c6251d5f2b93fa9576c9b2113116680. When merging the pull request, I misunderstood `has_secure_token` as declaring a model has a token from birth and through the rest of its lifetime. Therefore, supporting conditional creation doesn't make sense. You should never mark a model as having a secure token if there's a time when it shouldn't have it on creation.
* Split out token `if` tests to trigger `before_create`.Kasper Timm Hansen2016-01-091-1/+5
| | | | | | | | | When running passing condition assertions in the same test the user had already been saved at that point. Split out so we have a not yet persisted user. Rename condition tests to improve clarity a bit.
* Support :if and :unless in has_secure_tokenGriffin Smith2016-01-091-0/+10
| | | | | Pass through :if and :unless options from has_secure_token to the generated before_create callback
* Do not overwrite secret token value when already present.Wojciech Wnętrzak2015-02-121-0/+7
| | | | | | | ``` user = User.create(token: "custom-secure-token") user.token # => "custom-secure-token" ```
* Switch Secure Token generation to Base58robertomiranda2015-01-091-14/+0
| | | | | | Update Secure Token Doc [ci skip] remove require securerandom, core_ext/securerandom already do that ref 7e006057
* Clean up secure_token_testJon Atack2015-01-051-5/+5
|
* Add has_secure_token to Active Recordrobertomiranda2015-01-041-0/+39
Update SecureToken Docs Add Changelog entry for has_secure_token [ci skip]