I hereby claim:
- I am blacksails on github.
- I am blacksails (https://keybase.io/blacksails) on keybase.
- I have a public key ASBFSG3s3HXZ6v8DKBbgA5mCCSHiTaygr9WGoySKhIp3fAo
To claim this, I am signing this object:
| function dotfiles { | |
| /usr/bin/git --git-dir=$HOME/.files/ --work-tree=$HOME $@ | |
| } | |
| git clone --bare https://github.com/blacksails/dotfiles.git $HOME/.files | |
| dotfiles checkout | |
| if [ $? = 0 ] | |
| then | |
| echo "Checked out dotfiles." | |
| else | |
| echo "Backing up pre-existing dotfiles."; |
| kubectl config view --minify -o jsonpath='{.users[0].user.auth-provider.config.id-token}' | pbcopy |
I hereby claim:
To claim this, I am signing this object:
| defmodule Avalonia.User do | |
| use Avalonia.Web, :model | |
| import Comeonin.Password, only: [strong_password?: 2] | |
| import Comeonin.Bcrypt, only: [hashpwsalt: 1] | |
| schema "users" do | |
| field :email, :string | |
| field :password, :string, virtual: true | |
| field :password_digest, :string |
| Avalonia.AuthControllerTest | |
| * logout should delete the session cookie (617.5ms) | |
| * creates valid token and sets it in cookie (581.2ms) | |
| * we get an error if the password does not match the password_digest (550.0ms) | |
| * we get an error if the email is not found (1.2ms) | |
| Finished in 1.9 seconds (0.1s on load, 1.7s on tests) | |
| 4 tests, 0 failures |
| @email "[email protected]" | |
| @pw "Foobar12345!" | |
| setup do | |
| conn = conn() |> put_req_header("accept", "application/json") | |
| {:ok, conn: conn} | |
| end | |
| test "creates valid token and sets it in cookie" do | |
| changeset = User.changeset(%User{}, %{email: @email, password: @pw}) |
| setup do | |
| user = User.changeset(%User{}, %{ | |
| email: "[email protected]", | |
| password: "Foobar12345!"}) | |
| |> Repo.insert! | |
| role = Role.changeset(%Role{}, %{name: "some_role"}) | |
| |> Repo.insert! | |
| {:ok, user: user, role: role} | |
| end |
| # Test looks like this | |
| test "call should set current_user to nil if auth fails" do | |
| conn = post(conn, auth_path(conn, :login), | |
| auth: %{@credentials | password: "cheesesticks"}) | |
| conn = VerifySession.call(conn, []) | |
| refute conn.private.current_user | |
| end | |
| # This is what happens at the endpoint: | |
| conn |
| iex(6)> VestasAPI.Repo.all assoc(p, :project_users) | |
| ** (Protocol.UndefinedError) protocol Ecto.Queryable not implemented for ProjectUser, the given module does not exist | |
| (ecto) lib/ecto/queryable.ex:33: Ecto.Queryable.Atom.to_query/1 | |
| (ecto) lib/ecto/query/builder/from.ex:88: Ecto.Query.Builder.From.apply/2 | |
| (ecto) lib/ecto/association.ex:314: Ecto.Association.Has.assoc_query/2 |