SHARE
TWEET

Untitled

a guest Apr 27th, 2018 340 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. ActionMailer::Base.smtp_settings = {
  2.     :address => "smpt.gmail.com",
  3.     :port => "587",
  4.     :domain => "ipaddress",
  5.     :user_name => "stunningsethu.0097@gmail.com",
  6.     :password => "password",
  7.     :authentication => "plain",
  8.     :enable_starttls_auto => true
  9. }
  10.    
  11. Devise::Mailer#reset_password_instructions: processed outbound mail in 10.4ms
  12. Sent mail to sethunagakarthi.m@irco.com (4.3ms)
  13. Date: Fri, 27 Apr 2018 11:11:34 +0530
  14. From: PyraMIDtool@irco.com
  15. Reply-To: PyraMIDtool@irco.com
  16. To: sethunagakarthi.m@irco.com
  17. Message-ID: <5ae2b80e7e502_34142b2a9a15f8fc349e3@iradmin-OptiPlex-3040.mail>
  18. Subject: Reset password instructions
  19. Mime-Version: 1.0
  20. Content-Type: text/html;
  21.  charset=UTF-8
  22. Content-Transfer-Encoding: 7bit
  23.  
  24. <p>Hello sethunagakarthi.m@irco.com!</p>
  25.  
  26. <p>Someone has requested a link to change your password. You can do this through the link below.</p>
  27.  
  28. <p><a href="http://localhost:3000/users/password/edit?reset_password_token=nN_7q6hTJETUzLM4jNeM">Change my password</a></p>
  29.  
  30. <p>If you didn't request this, please ignore this email.</p>
  31. <p>Your password won't change until you access the link above and create a new one.</p>
  32.  
  33. Redirected to http://localhost:3000/users/sign_in
  34. Completed 302 Found in 322ms (ActiveRecord: 285.2ms)
  35.    
  36. # Use this hook to configure devise mailer, warden hooks and so forth.
  37. # Many of these configuration options can be set straight in your model.
  38. Devise.setup do |config|
  39.   # The secret key used by Devise. Devise uses this key to generate
  40.   # random tokens. Changing this key will render invalid all existing
  41.   # confirmation, reset password and unlock tokens in the database.
  42.   # Devise will use the `secret_key_base` as its `secret_key`
  43.   # by default. You can change it below and use your own secret key.
  44.   # config.secret_key = '94b46ce945cf69c1b34d34da55436d8020a2f43490728cc999076ff34e963a446e8513e2c353c6eb50c2963aeaa2560b1f292171f0bacba88070c104c2551815'
  45.  
  46.   # ==> Mailer Configuration
  47.   # Configure the e-mail address which will be shown in Devise::Mailer,
  48.   # note that it will be overwritten if you use your own mailer class
  49.   # with default "from" parameter.
  50.   config.mailer_sender = 'PyraMIDtool@irco.com'
  51.  
  52.   # Configure the class responsible to send e-mails.
  53.   config.mailer = 'Devise::Mailer'
  54.  
  55.   # Configure the parent class responsible to send e-mails.
  56.   # config.parent_mailer = 'ActionMailer::Base'
  57.  
  58.   # ==> ORM configuration
  59.   # Load and configure the ORM. Supports :active_record (default) and
  60.   # :mongoid (bson_ext recommended) by default. Other ORMs may be
  61.   # available as additional gems.
  62.   require 'devise/orm/active_record'
  63.  
  64.   # ==> Configuration for any authentication mechanism
  65.   # Configure which keys are used when authenticating a user. The default is
  66.   # just :email. You can configure it to use [:username, :subdomain], so for
  67.   # authenticating a user, both parameters are required. Remember that those
  68.   # parameters are used only when authenticating and not when retrieving from
  69.   # session. If you need permissions, you should implement that in a before filter.
  70.   # You can also supply a hash where the value is a boolean determining whether
  71.   # or not authentication should be aborted when the value is not present.
  72.   config.authentication_keys = [:corp_id]
  73.  
  74.   # Configure parameters from the request object used for authentication. Each entry
  75.   # given should be a request method and it will automatically be passed to the
  76.   # find_for_authentication method and considered in your model lookup. For instance,
  77.   # if you set :request_keys to [:subdomain], :subdomain will be used on authentication.
  78.   # The same considerations mentioned for authentication_keys also apply to request_keys.
  79.   # config.request_keys = []
  80.  
  81.   # Configure which authentication keys should be case-insensitive.
  82.   # These keys will be downcased upon creating or modifying a user and when used
  83.   # to authenticate or find a user. Default is :email.
  84.   config.case_insensitive_keys = [:email]
  85.  
  86.   # Configure which authentication keys should have whitespace stripped.
  87.   # These keys will have whitespace before and after removed upon creating or
  88.   # modifying a user and when used to authenticate or find a user. Default is :email.
  89.   config.strip_whitespace_keys = [:email]
  90.  
  91.   # Tell if authentication through request.params is enabled. True by default.
  92.   # It can be set to an array that will enable params authentication only for the
  93.   # given strategies, for example, `config.params_authenticatable = [:database]` will
  94.   # enable it only for database (email + password) authentication.
  95.   # config.params_authenticatable = true
  96.  
  97.   # Tell if authentication through HTTP Auth is enabled. False by default.
  98.   # It can be set to an array that will enable http authentication only for the
  99.   # given strategies, for example, `config.http_authenticatable = [:database]` will
  100.   # enable it only for database authentication. The supported strategies are:
  101.   # :database      = Support basic authentication with authentication key + password
  102.   # config.http_authenticatable = false
  103.  
  104.   # If 401 status code should be returned for AJAX requests. True by default.
  105.   # config.http_authenticatable_on_xhr = true
  106.  
  107.   # The realm used in Http Basic Authentication. 'Application' by default.
  108.   # config.http_authentication_realm = 'Application'
  109.  
  110.   # It will change confirmation, password recovery and other workflows
  111.   # to behave the same regardless if the e-mail provided was right or wrong.
  112.   # Does not affect registerable.
  113.   # config.paranoid = true
  114.  
  115.   # By default Devise will store the user in session. You can skip storage for
  116.   # particular strategies by setting this option.
  117.   # Notice that if you are skipping storage for all authentication paths, you
  118.   # may want to disable generating routes to Devise's sessions controller by
  119.   # passing skip: :sessions to `devise_for` in your config/routes.rb
  120.   config.skip_session_storage = [:http_auth]
  121.  
  122.   # By default, Devise cleans up the CSRF token on authentication to
  123.   # avoid CSRF token fixation attacks. This means that, when using AJAX
  124.   # requests for sign in and sign up, you need to get a new CSRF token
  125.   # from the server. You can disable this option at your own risk.
  126.   # config.clean_up_csrf_token_on_authentication = true
  127.  
  128.   # When false, Devise will not attempt to reload routes on eager load.
  129.   # This can reduce the time taken to boot the app but if your application
  130.   # requires the Devise mappings to be loaded during boot time the application
  131.   # won't boot properly.
  132.   # config.reload_routes = true
  133.  
  134.   # ==> Configuration for :database_authenticatable
  135.   # For bcrypt, this is the cost for hashing the password and defaults to 11. If
  136.   # using other algorithms, it sets how many times you want the password to be hashed.
  137.   #
  138.   # Limiting the stretches to just one in testing will increase the performance of
  139.   # your test suite dramatically. However, it is STRONGLY RECOMMENDED to not use
  140.   # a value less than 10 in other environments. Note that, for bcrypt (the default
  141.   # algorithm), the cost increases exponentially with the number of stretches (e.g.
  142.   # a value of 20 is already extremely slow: approx. 60 seconds for 1 calculation).
  143.   config.stretches = Rails.env.test? ? 1 : 11
  144.  
  145.   # Set up a pepper to generate the hashed password.
  146.   # config.pepper = 'd937edcd8ba852daed548479e1a6ac22d6c7aefebacc316e0236e2362421b1258dc40d36a1766fda4f9db96bc9ea4b53cc43d6178b1b3f2b6e089588f724811d'
  147.  
  148.   # Send a notification to the original email when the user's email is changed.
  149.   # config.send_email_changed_notification = false
  150.  
  151.   # Send a notification email when the user's password is changed.
  152.   # config.send_password_change_notification = false
  153.  
  154.   # ==> Configuration for :confirmable
  155.   # A period that the user is allowed to access the website even without
  156.   # confirming their account. For instance, if set to 2.days, the user will be
  157.   # able to access the website for two days without confirming their account,
  158.   # access will be blocked just in the third day. Default is 0.days, meaning
  159.   # the user cannot access the website without confirming their account.
  160.   # config.allow_unconfirmed_access_for = 2.days
  161.  
  162.   # A period that the user is allowed to confirm their account before their
  163.   # token becomes invalid. For example, if set to 3.days, the user can confirm
  164.   # their account within 3 days after the mail was sent, but on the fourth day
  165.   # their account can't be confirmed with the token any more.
  166.   # Default is nil, meaning there is no restriction on how long a user can take
  167.   # before confirming their account.
  168.   # config.confirm_within = 3.days
  169.  
  170.   # If true, requires any email changes to be confirmed (exactly the same way as
  171.   # initial account confirmation) to be applied. Requires additional unconfirmed_email
  172.   # db field (see migrations). Until confirmed, new email is stored in
  173.   # unconfirmed_email column, and copied to email column on successful confirmation.
  174.   config.reconfirmable = true
  175.  
  176.   # Defines which key will be used when confirming an account
  177.   # config.confirmation_keys = [:email]
  178.  
  179.   # ==> Configuration for :rememberable
  180.   # The time the user will be remembered without asking for credentials again.
  181.   # config.remember_for = 2.weeks
  182.  
  183.   # Invalidates all the remember me tokens when the user signs out.
  184.   config.expire_all_remember_me_on_sign_out = true
  185.  
  186.   # If true, extends the user's remember period when remembered via cookie.
  187.   # config.extend_remember_period = false
  188.  
  189.   # Options to be passed to the created cookie. For instance, you can set
  190.   # secure: true in order to force SSL only cookies.
  191.   # config.rememberable_options = {}
  192.  
  193.   # ==> Configuration for :validatable
  194.   # Range for password length.
  195.   config.password_length = 6..128
  196.  
  197.   # Email regex used to validate email formats. It simply asserts that
  198.   # one (and only one) @ exists in the given string. This is mainly
  199.   # to give user feedback and not to assert the e-mail validity.
  200.   config.email_regexp = /A[^@s]+@[^@s]+z/
  201.  
  202.   # ==> Configuration for :timeoutable
  203.   # The time you want to timeout the user session without activity. After this
  204.   # time the user will be asked for credentials again. Default is 30 minutes.
  205.   # config.timeout_in = 30.minutes
  206.  
  207.   # ==> Configuration for :lockable
  208.   # Defines which strategy will be used to lock an account.
  209.   # :failed_attempts = Locks an account after a number of failed attempts to sign in.
  210.   # :none            = No lock strategy. You should handle locking by yourself.
  211.   # config.lock_strategy = :failed_attempts
  212.  
  213.   # Defines which key will be used when locking and unlocking an account
  214.   # config.unlock_keys = [:email]
  215.  
  216.   # Defines which strategy will be used to unlock an account.
  217.   # :email = Sends an unlock link to the user email
  218.   # :time  = Re-enables login after a certain amount of time (see :unlock_in below)
  219.   # :both  = Enables both strategies
  220.   # :none  = No unlock strategy. You should handle unlocking by yourself.
  221.   # config.unlock_strategy = :both
  222.  
  223.   # Number of authentication tries before locking an account if lock_strategy
  224.   # is failed attempts.
  225.   # config.maximum_attempts = 20
  226.  
  227.   # Time interval to unlock the account if :time is enabled as unlock_strategy.
  228.   config.unlock_in = 1.hour
  229.  
  230.   # Warn on the last attempt before the account is locked.
  231.   # config.last_attempt_warning = true
  232.  
  233.   # ==> Configuration for :recoverable
  234.   #
  235.   # Defines which key will be used when recovering the password for an account
  236.   config.reset_password_keys = [:email]
  237.  
  238.   # Time interval you can reset your password with a reset password key.
  239.   # Don't put a too small interval or your users won't have the time to
  240.   # change their passwords.
  241.   config.reset_password_within = 6.hours
  242.  
  243.   # When set to false, does not sign a user in automatically after their password is
  244.   # reset. Defaults to true, so a user is signed in automatically after a reset.
  245.   # config.sign_in_after_reset_password = true
  246.  
  247.   # ==> Configuration for :encryptable
  248.   # Allow you to use another hashing or encryption algorithm besides bcrypt (default).
  249.   # You can use :sha1, :sha512 or algorithms from others authentication tools as
  250.   # :clearance_sha1, :authlogic_sha512 (then you should set stretches above to 20
  251.   # for default behavior) and :restful_authentication_sha1 (then you should set
  252.   # stretches to 10, and copy REST_AUTH_SITE_KEY to pepper).
  253.   #
  254.   # Require the `devise-encryptable` gem when using anything other than bcrypt
  255.   # config.encryptor = :sha512
  256.  
  257.   # ==> Scopes configuration
  258.   # Turn scoped views on. Before rendering "sessions/new", it will first check for
  259.   # "users/sessions/new". It's turned off by default because it's slower if you
  260.   # are using only default views.
  261.   config.scoped_views = true
  262.  
  263.   # Configure the default scope given to Warden. By default it's the first
  264.   # devise role declared in your routes (usually :user).
  265.   # config.default_scope = :user
  266.  
  267.   # Set this configuration to false if you want /users/sign_out to sign out
  268.   # only the current scope. By default, Devise signs out all scopes.
  269.   # config.sign_out_all_scopes = true
  270.  
  271.   # ==> Navigation configuration
  272.   # Lists the formats that should be treated as navigational. Formats like
  273.   # :html, should redirect to the sign in page when the user does not have
  274.   # access, but formats like :xml or :json, should return 401.
  275.   #
  276.   # If you have any extra navigational formats, like :iphone or :mobile, you
  277.   # should add them to the navigational formats lists.
  278.   #
  279.   # The "*/*" below is required to match Internet Explorer requests.
  280.   # config.navigational_formats = ['*/*', :html]
  281.  
  282.   # The default HTTP method used to sign out a resource. Default is :delete.
  283.   config.sign_out_via = :delete
  284.  
  285.   # ==> OmniAuth
  286.   # Add a new OmniAuth provider. Check the wiki for more information on setting
  287.   # up on your models and hooks.
  288.   # config.omniauth :github, 'APP_ID', 'APP_SECRET', scope: 'user,public_repo'
  289.  
  290.   # ==> Warden configuration
  291.   # If you want to use other strategies, that are not supported by Devise, or
  292.   # change the failure app, you can configure them inside the config.warden block.
  293.   #
  294.   # config.warden do |manager|
  295.   #   manager.intercept_401 = false
  296.   #   manager.default_strategies(scope: :user).unshift :some_external_strategy
  297.   # end
  298.  
  299.   # ==> Mountable engine configurations
  300.   # When using Devise inside an engine, let's call it `MyEngine`, and this engine
  301.   # is mountable, there are some extra configurations to be taken into account.
  302.   # The following options are available, assuming the engine is mounted as:
  303.   #
  304.   #     mount MyEngine, at: '/my_engine'
  305.   #
  306.   # The router that invoked `devise_for`, in the example above, would be:
  307.   # config.router_name = :my_engine
  308.   #
  309.   # When using OmniAuth, Devise cannot automatically set OmniAuth path,
  310.   # so you need to do it manually. For the users scope, it would be:
  311.   # config.omniauth_path_prefix = '/my_engine/users/auth'
  312. end
  313.    
  314. Rails.application.configure do
  315.   # Settings specified here will take precedence over those in config/application.rb.
  316.  
  317.   # In the development environment your application's code is reloaded on
  318.   # every request. This slows down response time but is perfect for development
  319.   # since you don't have to restart the web server when you make code changes.
  320.   config.cache_classes = false
  321.  
  322.   # Do not eager load code on boot.
  323.   config.eager_load = false
  324.  
  325.   # Show full error reports.
  326.   config.consider_all_requests_local = true
  327.  
  328.   # Enable/disable caching. By default caching is disabled.
  329.   if Rails.root.join('tmp/caching-dev.txt').exist?
  330.     config.action_controller.perform_caching = true
  331.  
  332.     config.cache_store = :memory_store
  333.     config.public_file_server.headers = {
  334.       'Cache-Control' => "public, max-age=#{2.days.seconds.to_i}"
  335.     }
  336.   else
  337.     config.action_controller.perform_caching = false
  338.  
  339.     config.cache_store = :null_store
  340.   end
  341.  
  342.   # Don't care if the mailer can't send.
  343.   config.action_mailer.raise_delivery_errors = false
  344.  
  345.   config.action_mailer.perform_caching = false
  346.  
  347.   # Print deprecation notices to the Rails logger.
  348.   config.active_support.deprecation = :log
  349.  
  350.   # Raise an error on page load if there are pending migrations.
  351.   config.active_record.migration_error = :page_load
  352.  
  353.   # Debug mode disables concatenation and preprocessing of assets.
  354.   # This option may cause significant delays in view rendering with a large
  355.   # number of complex assets.
  356.   config.assets.debug = true
  357.  
  358.   # Suppress logger output for asset requests.
  359.   config.assets.quiet = true
  360.   # SMTP setting for email
  361.   config.action_mailer.delivery_method = :smtp
  362.   # SMTP settings for gmail
  363.   config.action_mailer.default_url_options = { :host => 'localhost:3000' }
  364.  
  365.   config.action_mailer.smtp_settings = {
  366.     :address              => "smtp.gmail.com",
  367.     :port                 => 587,
  368.     :user_name            => "stunningsethu.0097@gmail.com",
  369.     :password             => "37386908",
  370.     :authentication       => "plain",
  371.     :enable_starttls_auto => true
  372.   }
  373.  
  374.   ENV["APPLICATION_URL"] = "http://localhost:3000"
  375.   ENV["IP_ADDRESSS"] = "10.200.102.74"
  376.   ENV["USER_NAME"] = "lbaaz"
  377.   ENV["PASSWORD"] = "August@2018"
  378.   ENV["JENKINS_USERNAME"] = "lbaaz"
  379.   ENV["JENKINS_PASSWORD"] = "Trane100"
  380.  
  381.   # Raises error for missing translations
  382.   # config.action_view.raise_on_missing_translations = true
  383.  
  384.   # Use an evented file watcher to asynchronously detect changes in source code,
  385.   # routes, locales, etc. This feature depends on the listen gem.
  386.   config.file_watcher = ActiveSupport::EventedFileUpdateChecker
  387. end
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top