Commit c79fbc9e32777bf7e7d6e79392184d754f109a6a

Authored by Victor Costa
1 parent 0107868d

rails3: fix some access_control tests

vendor/plugins/access_control/test/acts_as_accessor_test.rb
... ... @@ -2,6 +2,11 @@ require 'test/unit'
2 2 require File.dirname(__FILE__) + '/test_helper'
3 3  
4 4 class ActAsAccessorTest < Test::Unit::TestCase
  5 +
  6 + def setup
  7 + RoleAssignment.attr_accessible :accessor
  8 + end
  9 +
5 10 def test_can_have_role_in_respect_to_an_resource
6 11 res = AccessControlTestResource.create!(:name => 'bla')
7 12 a = AccessControlTestAccessor.create!(:name => 'ze')
... ... @@ -30,7 +35,7 @@ class ActAsAccessorTest &lt; Test::Unit::TestCase
30 35 res = AccessControlTestResource.create!(:name => 'bla')
31 36 a = AccessControlTestAccessor.create!(:name => 'ze')
32 37 role = Role.create!(:name => 'just_an_author', :permissions => ['bli'])
33   - ra = RoleAssignment.create!(:accessor => a, :role => role, :resource => res)
  38 + ra = RoleAssignment.create!(:accessor => a, :role_id => role.id, :resource_id => res.id)
34 39  
35 40 assert a.role_assignments.include?(ra)
36 41 assert a.remove_role(role, res)
... ...
vendor/plugins/access_control/test/debug.log 0 → 100644
... ... @@ -0,0 +1,1842 @@
  1 +# Logfile created on 2014-05-21 14:01:31 +0000 by logger.rb/31641
  2 + [1m[35m (104.6ms)[0m DROP TABLE "access_control_test_roles"
  3 + [1m[36m (172.2ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  4 + [1m[35m (20.1ms)[0m DROP TABLE "access_control_test_role_assignments"
  5 + [1m[36m (164.3ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  6 + [1m[35m (20.0ms)[0m DROP TABLE "access_control_test_accessors"
  7 + [1m[36m (77.0ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  8 + [1m[35m (21.1ms)[0m DROP TABLE "access_control_test_resources"
  9 + [1m[36m (110.3ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  10 + [1m[35m (0.6ms)[0m SELECT version FROM "schema_migrations"
  11 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  12 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  13 + [1m[36m (14.6ms)[0m [1mCOMMIT[0m
  14 + [1m[35m (0.1ms)[0m BEGIN
  15 + [1m[36mSQL (1.0ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  16 + [1m[35m (17.1ms)[0m COMMIT
  17 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  18 + [1m[35mRole Exists (1.0ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  19 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  20 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_content_author"], ["name", "just_a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  21 + [1m[36m (11.9ms)[0m [1mCOMMIT[0m
  22 + [1m[35mRoleAssignment Load (0.6ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  23 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  24 + [1m[35mRole Load (0.6ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1
  25 + [1m[36mAccessControlTestAccessor Load (0.4ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1[0m
  26 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]]
  27 + [1m[36mAccessControlTestResource Load (0.3ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1[0m
  28 + [1m[35m (16.4ms)[0m COMMIT
  29 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  30 + [1m[35m (0.1ms)[0m COMMIT
  31 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  32 + [1m[35m (0.2ms)[0m COMMIT
  33 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  34 + [1m[35m (0.1ms)[0m BEGIN
  35 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  36 + [1m[35m (13.2ms)[0m COMMIT
  37 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  38 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  39 + [1m[36m (18.4ms)[0m [1mCOMMIT[0m
  40 + [1m[35m (0.1ms)[0m BEGIN
  41 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  42 + [1m[35mRole Exists (0.2ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  43 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_just_a_moderator"], ["name", "just_a_moderator"], ["permissions", "---\n- bli\n"], ["system", false]]
  44 + [1m[35m (19.2ms)[0m COMMIT
  45 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 2 AND "access_control_test_role_assignments"."resource_id" = 2 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  46 + [1m[35m (0.1ms)[0m BEGIN
  47 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 2 LIMIT 1[0m
  48 + [1m[35mAccessControlTestAccessor Load (0.3ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 2 LIMIT 1
  49 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 2], ["resource_type", "AccessControlTestResource"], ["role_id", 2]]
  50 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 2 LIMIT 1
  51 + [1m[36m (12.2ms)[0m [1mCOMMIT[0m
  52 + [1m[35m (0.2ms)[0m BEGIN
  53 + [1m[36m (0.2ms)[0m [1mCOMMIT[0m
  54 + [1m[35m (1.1ms)[0m BEGIN
  55 + [1m[36m (0.7ms)[0m [1mCOMMIT[0m
  56 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'
  57 + [1m[36mAccessControlTestResource Load (0.5ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (2)[0m
  58 + [1m[35mRole Load (0.3ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (2)
  59 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  60 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  61 + [1m[36m (11.3ms)[0m [1mCOMMIT[0m
  62 + [1m[35m (0.1ms)[0m BEGIN
  63 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  64 + [1m[35m (19.6ms)[0m COMMIT
  65 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  66 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  67 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  68 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_member"], ["name", "just_a_member"], ["permissions", "---\n- bli\n"], ["system", false]]
  69 + [1m[36m (17.5ms)[0m [1mCOMMIT[0m
  70 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 3 AND "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  71 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  72 + [1m[35mRole Load (0.4ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 3 LIMIT 1
  73 + [1m[36mAccessControlTestAccessor Load (0.3ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 3 LIMIT 1[0m
  74 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 3], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 3], ["resource_type", "AccessControlTestResource"], ["role_id", 3]]
  75 + [1m[36mAccessControlTestResource Load (0.3ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 3 LIMIT 1[0m
  76 + [1m[35m (13.8ms)[0m COMMIT
  77 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  78 + [1m[35m (0.1ms)[0m COMMIT
  79 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  80 + [1m[35m (0.2ms)[0m COMMIT
  81 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  82 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (3)
  83 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (3)[0m
  84 + [1m[35m (0.1ms)[0m BEGIN
  85 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  86 + [1m[35m (13.3ms)[0m COMMIT
  87 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  88 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  89 + [1m[36m (10.6ms)[0m [1mCOMMIT[0m
  90 + [1m[35m (0.2ms)[0m BEGIN
  91 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  92 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  93 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_a_content_author"], ["name", "a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  94 + [1m[35m (18.2ms)[0m COMMIT
  95 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  96 + [1m[35m (0.1ms)[0m BEGIN
  97 + [1m[36mRole Load (0.4ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 4 LIMIT 1[0m
  98 + [1m[35mAccessControlTestAccessor Load (0.3ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 4 LIMIT 1
  99 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 4], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 4], ["resource_type", "AccessControlTestResource"], ["role_id", 4]]
  100 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 4 LIMIT 1
  101 + [1m[36m (12.4ms)[0m [1mCOMMIT[0m
  102 + [1m[35m (0.1ms)[0m BEGIN
  103 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  104 + [1m[35m (0.1ms)[0m BEGIN
  105 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  106 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  107 + [1m[36mRoleAssignment Load (0.3ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  108 + [1m[35m (0.1ms)[0m BEGIN
  109 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  110 + [1m[35m (15.1ms)[0m COMMIT
  111 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  112 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  113 + [1m[36m (18.5ms)[0m [1mCOMMIT[0m
  114 + [1m[35m (0.1ms)[0m BEGIN
  115 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  116 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  117 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_an_author"], ["name", "an_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  118 + [1m[35m (19.1ms)[0m COMMIT
  119 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  120 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 5 AND "access_control_test_role_assignments"."resource_id" = 5 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  121 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  122 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  123 + [1m[36m (16.1ms)[0m [1mCOMMIT[0m
  124 + [1m[35m (0.1ms)[0m BEGIN
  125 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  126 + [1m[35m (18.6ms)[0m COMMIT
  127 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  128 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  129 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  130 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_another_content_author"], ["name", "another_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  131 + [1m[36m (18.9ms)[0m [1mCOMMIT[0m
  132 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 6 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 6 AND "access_control_test_role_assignments"."resource_id" = 6 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  133 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  134 + [1m[35mRole Load (0.4ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 6 LIMIT 1
  135 + [1m[36mAccessControlTestAccessor Load (0.3ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 6 LIMIT 1[0m
  136 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 6], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 6], ["resource_type", "AccessControlTestResource"], ["role_id", 6]]
  137 + [1m[36mAccessControlTestResource Load (0.3ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 6 LIMIT 1[0m
  138 + [1m[35m (12.9ms)[0m COMMIT
  139 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  140 + [1m[35m (0.2ms)[0m COMMIT
  141 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  142 + [1m[35m (0.1ms)[0m COMMIT
  143 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  144 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  145 + [1m[36m (17.1ms)[0m [1mCOMMIT[0m
  146 + [1m[35m (0.1ms)[0m BEGIN
  147 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  148 + [1m[35m (18.5ms)[0m COMMIT
  149 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  150 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  151 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  152 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_an_author"], ["name", "just_an_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  153 + [1m[36m (17.4ms)[0m [1mCOMMIT[0m
  154 + [1m[35m (0.2ms)[0m BEGIN
  155 + [1m[36mRole Load (0.5ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 7 LIMIT 1[0m
  156 + [1m[35m (0.3ms)[0m ROLLBACK
  157 + [1m[35m (36.5ms)[0m DROP TABLE "access_control_test_roles"
  158 + [1m[36m (139.4ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  159 + [1m[35m (20.1ms)[0m DROP TABLE "access_control_test_role_assignments"
  160 + [1m[36m (181.0ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  161 + [1m[35m (19.9ms)[0m DROP TABLE "access_control_test_accessors"
  162 + [1m[36m (110.3ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  163 + [1m[35m (21.1ms)[0m DROP TABLE "access_control_test_resources"
  164 + [1m[36m (116.9ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  165 + [1m[35m (0.6ms)[0m SELECT version FROM "schema_migrations"
  166 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  167 + [1m[35mSQL (0.9ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  168 + [1m[36m (12.6ms)[0m [1mCOMMIT[0m
  169 + [1m[35m (0.1ms)[0m BEGIN
  170 + [1m[36mSQL (0.9ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  171 + [1m[35m (12.8ms)[0m COMMIT
  172 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  173 + [1m[35mRole Exists (1.1ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  174 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  175 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_content_author"], ["name", "just_a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  176 + [1m[36m (14.0ms)[0m [1mCOMMIT[0m
  177 + [1m[35mRoleAssignment Load (0.6ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  178 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  179 + [1m[35mRole Load (0.5ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1
  180 + [1m[36mAccessControlTestAccessor Load (0.4ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1[0m
  181 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]]
  182 + [1m[36mAccessControlTestResource Load (0.4ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1[0m
  183 + [1m[35m (13.9ms)[0m COMMIT
  184 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  185 + [1m[35m (0.1ms)[0m COMMIT
  186 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  187 + [1m[35m (0.1ms)[0m COMMIT
  188 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  189 + [1m[35m (0.1ms)[0m BEGIN
  190 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  191 + [1m[35m (18.3ms)[0m COMMIT
  192 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  193 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  194 + [1m[36m (18.4ms)[0m [1mCOMMIT[0m
  195 + [1m[35m (0.1ms)[0m BEGIN
  196 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  197 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  198 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_just_a_moderator"], ["name", "just_a_moderator"], ["permissions", "---\n- bli\n"], ["system", false]]
  199 + [1m[35m (18.6ms)[0m COMMIT
  200 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 2 AND "access_control_test_role_assignments"."resource_id" = 2 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  201 + [1m[35m (0.1ms)[0m BEGIN
  202 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 2 LIMIT 1[0m
  203 + [1m[35mAccessControlTestAccessor Load (0.3ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 2 LIMIT 1
  204 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 2], ["resource_type", "AccessControlTestResource"], ["role_id", 2]]
  205 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 2 LIMIT 1
  206 + [1m[36m (12.4ms)[0m [1mCOMMIT[0m
  207 + [1m[35m (0.1ms)[0m BEGIN
  208 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  209 + [1m[35m (0.1ms)[0m BEGIN
  210 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  211 + [1m[35mRoleAssignment Load (0.3ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'
  212 + [1m[36mAccessControlTestResource Load (0.6ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (2)[0m
  213 + [1m[35mRole Load (0.3ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (2)
  214 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  215 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  216 + [1m[36m (19.0ms)[0m [1mCOMMIT[0m
  217 + [1m[35m (0.1ms)[0m BEGIN
  218 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  219 + [1m[35m (10.7ms)[0m COMMIT
  220 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  221 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  222 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  223 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_member"], ["name", "just_a_member"], ["permissions", "---\n- bli\n"], ["system", false]]
  224 + [1m[36m (17.1ms)[0m [1mCOMMIT[0m
  225 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 3 AND "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  226 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  227 + [1m[35mRole Load (0.9ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 3 LIMIT 1
  228 + [1m[36mAccessControlTestAccessor Load (0.3ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 3 LIMIT 1[0m
  229 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 3], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 3], ["resource_type", "AccessControlTestResource"], ["role_id", 3]]
  230 + [1m[36mAccessControlTestResource Load (0.9ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 3 LIMIT 1[0m
  231 + [1m[35m (12.4ms)[0m COMMIT
  232 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  233 + [1m[35m (0.1ms)[0m COMMIT
  234 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  235 + [1m[35m (0.1ms)[0m COMMIT
  236 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  237 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (3)
  238 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (3)[0m
  239 + [1m[35m (0.1ms)[0m BEGIN
  240 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  241 + [1m[35m (13.1ms)[0m COMMIT
  242 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  243 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  244 + [1m[36m (11.8ms)[0m [1mCOMMIT[0m
  245 + [1m[35m (0.2ms)[0m BEGIN
  246 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  247 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  248 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_a_content_author"], ["name", "a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  249 + [1m[35m (15.6ms)[0m COMMIT
  250 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  251 + [1m[35m (0.1ms)[0m BEGIN
  252 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 4 LIMIT 1[0m
  253 + [1m[35mAccessControlTestAccessor Load (0.3ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 4 LIMIT 1
  254 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 4], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 4], ["resource_type", "AccessControlTestResource"], ["role_id", 4]]
  255 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 4 LIMIT 1
  256 + [1m[36m (13.1ms)[0m [1mCOMMIT[0m
  257 + [1m[35m (0.1ms)[0m BEGIN
  258 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  259 + [1m[35m (0.1ms)[0m BEGIN
  260 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  261 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  262 + [1m[36mRoleAssignment Load (0.3ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  263 + [1m[35m (0.1ms)[0m BEGIN
  264 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  265 + [1m[35m (15.1ms)[0m COMMIT
  266 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  267 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  268 + [1m[36m (18.5ms)[0m [1mCOMMIT[0m
  269 + [1m[35m (0.1ms)[0m BEGIN
  270 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  271 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  272 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_an_author"], ["name", "an_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  273 + [1m[35m (19.3ms)[0m COMMIT
  274 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  275 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 5 AND "access_control_test_role_assignments"."resource_id" = 5 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  276 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  277 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  278 + [1m[36m (16.1ms)[0m [1mCOMMIT[0m
  279 + [1m[35m (0.2ms)[0m BEGIN
  280 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  281 + [1m[35m (19.7ms)[0m COMMIT
  282 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  283 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  284 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  285 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_another_content_author"], ["name", "another_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  286 + [1m[36m (16.3ms)[0m [1mCOMMIT[0m
  287 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 6 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 6 AND "access_control_test_role_assignments"."resource_id" = 6 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  288 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  289 + [1m[35mRole Load (0.3ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 6 LIMIT 1
  290 + [1m[36mAccessControlTestAccessor Load (0.2ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 6 LIMIT 1[0m
  291 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 6], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 6], ["resource_type", "AccessControlTestResource"], ["role_id", 6]]
  292 + [1m[36mAccessControlTestResource Load (0.2ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 6 LIMIT 1[0m
  293 + [1m[35m (13.3ms)[0m COMMIT
  294 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  295 + [1m[35m (0.1ms)[0m COMMIT
  296 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  297 + [1m[35m (0.1ms)[0m COMMIT
  298 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  299 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  300 + [1m[36m (17.4ms)[0m [1mCOMMIT[0m
  301 + [1m[35m (0.1ms)[0m BEGIN
  302 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  303 + [1m[35m (18.5ms)[0m COMMIT
  304 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  305 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  306 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  307 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_an_author"], ["name", "just_an_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  308 + [1m[36m (19.3ms)[0m [1mCOMMIT[0m
  309 + [1m[35m (40.1ms)[0m DROP TABLE "access_control_test_roles"
  310 + [1m[36m (172.5ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  311 + [1m[35m (20.0ms)[0m DROP TABLE "access_control_test_role_assignments"
  312 + [1m[36m (197.7ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  313 + [1m[35m (20.0ms)[0m DROP TABLE "access_control_test_accessors"
  314 + [1m[36m (115.2ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  315 + [1m[35m (21.1ms)[0m DROP TABLE "access_control_test_resources"
  316 + [1m[36m (105.6ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  317 + [1m[35m (20.2ms)[0m SELECT version FROM "schema_migrations"
  318 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  319 + [1m[35mSQL (0.5ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  320 + [1m[36m (14.6ms)[0m [1mCOMMIT[0m
  321 + [1m[35m (0.2ms)[0m BEGIN
  322 + [1m[36mSQL (1.0ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  323 + [1m[35m (16.1ms)[0m COMMIT
  324 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  325 + [1m[35mRole Exists (1.0ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  326 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  327 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_content_author"], ["name", "just_a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  328 + [1m[36m (12.4ms)[0m [1mCOMMIT[0m
  329 + [1m[35mRoleAssignment Load (0.6ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  330 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  331 + [1m[35mRole Load (0.5ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1
  332 + [1m[36mAccessControlTestAccessor Load (0.4ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1[0m
  333 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]]
  334 + [1m[36mAccessControlTestResource Load (0.3ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1[0m
  335 + [1m[35m (17.0ms)[0m COMMIT
  336 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  337 + [1m[35m (0.2ms)[0m COMMIT
  338 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  339 + [1m[35m (0.1ms)[0m COMMIT
  340 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  341 + [1m[35m (0.1ms)[0m BEGIN
  342 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  343 + [1m[35m (10.8ms)[0m COMMIT
  344 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  345 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  346 + [1m[36m (18.3ms)[0m [1mCOMMIT[0m
  347 + [1m[35m (0.1ms)[0m BEGIN
  348 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  349 + [1m[35mRole Exists (0.2ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  350 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_just_a_moderator"], ["name", "just_a_moderator"], ["permissions", "---\n- bli\n"], ["system", false]]
  351 + [1m[35m (18.6ms)[0m COMMIT
  352 + [1m[36mRoleAssignment Load (0.5ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 2 AND "access_control_test_role_assignments"."resource_id" = 2 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  353 + [1m[35m (0.2ms)[0m BEGIN
  354 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 2 LIMIT 1[0m
  355 + [1m[35mAccessControlTestAccessor Load (0.3ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 2 LIMIT 1
  356 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 2], ["resource_type", "AccessControlTestResource"], ["role_id", 2]]
  357 + [1m[35mAccessControlTestResource Load (0.2ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 2 LIMIT 1
  358 + [1m[36m (12.3ms)[0m [1mCOMMIT[0m
  359 + [1m[35m (0.1ms)[0m BEGIN
  360 + [1m[36m (0.2ms)[0m [1mCOMMIT[0m
  361 + [1m[35m (0.1ms)[0m BEGIN
  362 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  363 + [1m[35mRoleAssignment Load (0.3ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'
  364 + [1m[36mAccessControlTestResource Load (0.4ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (2)[0m
  365 + [1m[35mRole Load (0.3ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (2)
  366 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  367 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  368 + [1m[36m (12.7ms)[0m [1mCOMMIT[0m
  369 + [1m[35m (0.2ms)[0m BEGIN
  370 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  371 + [1m[35m (18.3ms)[0m COMMIT
  372 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  373 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  374 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  375 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_member"], ["name", "just_a_member"], ["permissions", "---\n- bli\n"], ["system", false]]
  376 + [1m[36m (16.9ms)[0m [1mCOMMIT[0m
  377 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 3 AND "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  378 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  379 + [1m[35mRole Load (0.3ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 3 LIMIT 1
  380 + [1m[36mAccessControlTestAccessor Load (0.3ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 3 LIMIT 1[0m
  381 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 3], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 3], ["resource_type", "AccessControlTestResource"], ["role_id", 3]]
  382 + [1m[36mAccessControlTestResource Load (0.2ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 3 LIMIT 1[0m
  383 + [1m[35m (13.7ms)[0m COMMIT
  384 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  385 + [1m[35m (0.2ms)[0m COMMIT
  386 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  387 + [1m[35m (0.1ms)[0m COMMIT
  388 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  389 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (3)
  390 + [1m[36mRole Load (0.4ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (3)[0m
  391 + [1m[35m (0.1ms)[0m BEGIN
  392 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  393 + [1m[35m (12.5ms)[0m COMMIT
  394 + [1m[36m (0.0ms)[0m [1mBEGIN[0m
  395 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  396 + [1m[36m (11.8ms)[0m [1mCOMMIT[0m
  397 + [1m[35m (0.2ms)[0m BEGIN
  398 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  399 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  400 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_a_content_author"], ["name", "a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  401 + [1m[35m (17.1ms)[0m COMMIT
  402 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  403 + [1m[35m (0.2ms)[0m BEGIN
  404 + [1m[36mRole Load (0.4ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 4 LIMIT 1[0m
  405 + [1m[35mAccessControlTestAccessor Load (0.3ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 4 LIMIT 1
  406 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 4], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 4], ["resource_type", "AccessControlTestResource"], ["role_id", 4]]
  407 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 4 LIMIT 1
  408 + [1m[36m (13.4ms)[0m [1mCOMMIT[0m
  409 + [1m[35m (0.1ms)[0m BEGIN
  410 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  411 + [1m[35m (0.1ms)[0m BEGIN
  412 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  413 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  414 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  415 + [1m[35m (0.1ms)[0m BEGIN
  416 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  417 + [1m[35m (12.6ms)[0m COMMIT
  418 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  419 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  420 + [1m[36m (18.5ms)[0m [1mCOMMIT[0m
  421 + [1m[35m (0.2ms)[0m BEGIN
  422 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  423 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  424 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_an_author"], ["name", "an_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  425 + [1m[35m (18.4ms)[0m COMMIT
  426 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  427 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 5 AND "access_control_test_role_assignments"."resource_id" = 5 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  428 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  429 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  430 + [1m[36m (15.2ms)[0m [1mCOMMIT[0m
  431 + [1m[35m (0.1ms)[0m BEGIN
  432 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  433 + [1m[35m (19.6ms)[0m COMMIT
  434 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  435 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  436 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  437 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_another_content_author"], ["name", "another_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  438 + [1m[36m (17.4ms)[0m [1mCOMMIT[0m
  439 + [1m[35mRoleAssignment Load (0.5ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 6 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 6 AND "access_control_test_role_assignments"."resource_id" = 6 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  440 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  441 + [1m[35mRole Load (0.3ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 6 LIMIT 1
  442 + [1m[36mAccessControlTestAccessor Load (0.3ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 6 LIMIT 1[0m
  443 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 6], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 6], ["resource_type", "AccessControlTestResource"], ["role_id", 6]]
  444 + [1m[36mAccessControlTestResource Load (0.2ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 6 LIMIT 1[0m
  445 + [1m[35m (12.2ms)[0m COMMIT
  446 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  447 + [1m[35m (0.2ms)[0m COMMIT
  448 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  449 + [1m[35m (0.1ms)[0m COMMIT
  450 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  451 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  452 + [1m[36m (16.5ms)[0m [1mCOMMIT[0m
  453 + [1m[35m (0.2ms)[0m BEGIN
  454 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  455 + [1m[35m (18.2ms)[0m COMMIT
  456 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  457 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  458 + [1m[36mRole Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  459 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_an_author"], ["name", "just_an_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  460 + [1m[36m (56.1ms)[0m [1mCOMMIT[0m
  461 + [1m[35m (0.2ms)[0m BEGIN
  462 + [1m[36mRole Load (0.4ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 7 LIMIT 1[0m
  463 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 7], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 7], ["resource_type", nil], ["role_id", 7]]
  464 + [1m[36m (12.8ms)[0m [1mCOMMIT[0m
  465 + [1m[35mRoleAssignment Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 7 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."id" = 6 LIMIT 1
  466 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 7 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 7 AND "access_control_test_role_assignments"."resource_id" = 7 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  467 + [1m[35m (28.2ms)[0m DROP TABLE "access_control_test_roles"
  468 + [1m[36m (224.8ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  469 + [1m[35m (20.2ms)[0m DROP TABLE "access_control_test_role_assignments"
  470 + [1m[36m (191.5ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  471 + [1m[35m (13.0ms)[0m DROP TABLE "access_control_test_accessors"
  472 + [1m[36m (116.5ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  473 + [1m[35m (11.7ms)[0m DROP TABLE "access_control_test_resources"
  474 + [1m[36m (108.0ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  475 + [1m[35m (0.4ms)[0m SELECT version FROM "schema_migrations"
  476 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  477 + [1m[35mSQL (0.5ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  478 + [1m[36m (13.6ms)[0m [1mCOMMIT[0m
  479 + [1m[35m (0.1ms)[0m BEGIN
  480 + [1m[36mSQL (0.6ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  481 + [1m[35m (16.4ms)[0m COMMIT
  482 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  483 + [1m[35mRole Exists (0.6ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  484 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  485 + [1m[35mSQL (0.6ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_content_author"], ["name", "just_a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  486 + [1m[36m (13.1ms)[0m [1mCOMMIT[0m
  487 + [1m[35mRoleAssignment Load (0.3ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  488 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  489 + [1m[35mRole Load (0.4ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1
  490 + [1m[36mAccessControlTestAccessor Load (0.3ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1[0m
  491 + [1m[35mSQL (0.5ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]]
  492 + [1m[36mAccessControlTestResource Load (0.2ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1[0m
  493 + [1m[35m (13.2ms)[0m COMMIT
  494 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  495 + [1m[35m (0.1ms)[0m COMMIT
  496 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  497 + [1m[35m (0.1ms)[0m COMMIT
  498 + [1m[36mRoleAssignment Load (0.3ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  499 + [1m[35m (0.1ms)[0m BEGIN
  500 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  501 + [1m[35m (13.8ms)[0m COMMIT
  502 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  503 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  504 + [1m[36m (12.1ms)[0m [1mCOMMIT[0m
  505 + [1m[35m (0.1ms)[0m BEGIN
  506 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  507 + [1m[35mRole Exists (0.2ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  508 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_just_a_moderator"], ["name", "just_a_moderator"], ["permissions", "---\n- bli\n"], ["system", false]]
  509 + [1m[35m (16.8ms)[0m COMMIT
  510 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 2 AND "access_control_test_role_assignments"."resource_id" = 2 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  511 + [1m[35m (0.1ms)[0m BEGIN
  512 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 2 LIMIT 1[0m
  513 + [1m[35mAccessControlTestAccessor Load (0.2ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 2 LIMIT 1
  514 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 2], ["resource_type", "AccessControlTestResource"], ["role_id", 2]]
  515 + [1m[35mAccessControlTestResource Load (0.2ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 2 LIMIT 1
  516 + [1m[36m (16.8ms)[0m [1mCOMMIT[0m
  517 + [1m[35m (0.1ms)[0m BEGIN
  518 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  519 + [1m[35m (0.1ms)[0m BEGIN
  520 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  521 + [1m[35mRoleAssignment Load (0.3ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'
  522 + [1m[36mAccessControlTestResource Load (0.3ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (2)[0m
  523 + [1m[35mRole Load (0.2ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (2)
  524 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  525 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  526 + [1m[36m (12.9ms)[0m [1mCOMMIT[0m
  527 + [1m[35m (0.1ms)[0m BEGIN
  528 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  529 + [1m[35m (10.8ms)[0m COMMIT
  530 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  531 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  532 + [1m[36mRole Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  533 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_member"], ["name", "just_a_member"], ["permissions", "---\n- bli\n"], ["system", false]]
  534 + [1m[36m (18.5ms)[0m [1mCOMMIT[0m
  535 + [1m[35mRoleAssignment Load (0.3ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 3 AND "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  536 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  537 + [1m[35mRole Load (0.2ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 3 LIMIT 1
  538 + [1m[36mAccessControlTestAccessor Load (0.2ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 3 LIMIT 1[0m
  539 + [1m[35mSQL (0.1ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 3], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 3], ["resource_type", "AccessControlTestResource"], ["role_id", 3]]
  540 + [1m[36mAccessControlTestResource Load (0.1ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 3 LIMIT 1[0m
  541 + [1m[35m (16.0ms)[0m COMMIT
  542 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  543 + [1m[35m (0.1ms)[0m COMMIT
  544 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  545 + [1m[35m (0.1ms)[0m COMMIT
  546 + [1m[36mRoleAssignment Load (0.3ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  547 + [1m[35mAccessControlTestResource Load (0.2ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (3)
  548 + [1m[36mRole Load (0.2ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (3)[0m
  549 + [1m[35m (0.1ms)[0m BEGIN
  550 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  551 + [1m[35m (19.5ms)[0m COMMIT
  552 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  553 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  554 + [1m[36m (10.7ms)[0m [1mCOMMIT[0m
  555 + [1m[35m (0.1ms)[0m BEGIN
  556 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  557 + [1m[35mRole Exists (0.2ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  558 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_a_content_author"], ["name", "a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  559 + [1m[35m (18.6ms)[0m COMMIT
  560 + [1m[36mRoleAssignment Load (0.3ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  561 + [1m[35m (0.1ms)[0m BEGIN
  562 + [1m[36mRole Load (0.2ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 4 LIMIT 1[0m
  563 + [1m[35mAccessControlTestAccessor Load (0.2ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 4 LIMIT 1
  564 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 4], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 4], ["resource_type", "AccessControlTestResource"], ["role_id", 4]]
  565 + [1m[35mAccessControlTestResource Load (0.2ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 4 LIMIT 1
  566 + [1m[36m (15.8ms)[0m [1mCOMMIT[0m
  567 + [1m[35m (0.1ms)[0m BEGIN
  568 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  569 + [1m[35m (0.1ms)[0m BEGIN
  570 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  571 + [1m[35mRoleAssignment Load (0.3ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  572 + [1m[36mRoleAssignment Load (0.1ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  573 + [1m[35m (0.0ms)[0m BEGIN
  574 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  575 + [1m[35m (17.2ms)[0m COMMIT
  576 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  577 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  578 + [1m[36m (10.9ms)[0m [1mCOMMIT[0m
  579 + [1m[35m (0.1ms)[0m BEGIN
  580 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  581 + [1m[35mRole Exists (0.2ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  582 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_an_author"], ["name", "an_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  583 + [1m[35m (17.3ms)[0m COMMIT
  584 + [1m[36mRoleAssignment Load (0.3ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  585 + [1m[35mRoleAssignment Load (0.2ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 5 AND "access_control_test_role_assignments"."resource_id" = 5 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  586 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  587 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  588 + [1m[36m (27.0ms)[0m [1mCOMMIT[0m
  589 + [1m[35m (0.1ms)[0m BEGIN
  590 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  591 + [1m[35m (10.8ms)[0m COMMIT
  592 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  593 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  594 + [1m[36mRole Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  595 + [1m[35mSQL (0.1ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_another_content_author"], ["name", "another_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  596 + [1m[36m (17.9ms)[0m [1mCOMMIT[0m
  597 + [1m[35mRoleAssignment Load (0.3ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 6 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 6 AND "access_control_test_role_assignments"."resource_id" = 6 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  598 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  599 + [1m[35mRole Load (0.3ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 6 LIMIT 1
  600 + [1m[36mAccessControlTestAccessor Load (0.2ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 6 LIMIT 1[0m
  601 + [1m[35mSQL (0.1ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 6], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 6], ["resource_type", "AccessControlTestResource"], ["role_id", 6]]
  602 + [1m[36mAccessControlTestResource Load (0.1ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 6 LIMIT 1[0m
  603 + [1m[35m (15.7ms)[0m COMMIT
  604 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  605 + [1m[35m (0.0ms)[0m COMMIT
  606 + [1m[36m (0.0ms)[0m [1mBEGIN[0m
  607 + [1m[35m (0.1ms)[0m COMMIT
  608 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  609 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  610 + [1m[36m (18.8ms)[0m [1mCOMMIT[0m
  611 + [1m[35m (0.1ms)[0m BEGIN
  612 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  613 + [1m[35m (10.8ms)[0m COMMIT
  614 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  615 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  616 + [1m[36mRole Exists (0.1ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  617 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_an_author"], ["name", "just_an_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  618 + [1m[36m (18.1ms)[0m [1mCOMMIT[0m
  619 + [1m[35m (0.1ms)[0m BEGIN
  620 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 7 LIMIT 1[0m
  621 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 7], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 7], ["resource_type", nil], ["role_id", 7]]
  622 + [1m[36m (17.5ms)[0m [1mCOMMIT[0m
  623 + [1m[35mRoleAssignment Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 7 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."id" = 6 LIMIT 1
  624 + [1m[36mRoleAssignment Load (0.2ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 7 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 7 AND "access_control_test_role_assignments"."resource_id" = 7 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  625 + [1m[35m (20.1ms)[0m DROP TABLE "access_control_test_roles"
  626 + [1m[36m (225.9ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  627 + [1m[35m (21.6ms)[0m DROP TABLE "access_control_test_role_assignments"
  628 + [1m[36m (196.4ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  629 + [1m[35m (20.9ms)[0m DROP TABLE "access_control_test_accessors"
  630 + [1m[36m (113.9ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  631 + [1m[35m (21.3ms)[0m DROP TABLE "access_control_test_resources"
  632 + [1m[36m (115.3ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  633 + [1m[35m (0.7ms)[0m SELECT version FROM "schema_migrations"
  634 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  635 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "other_user"]]
  636 + [1m[36m (12.7ms)[0m [1mCOMMIT[0m
  637 + [1m[35m (0.2ms)[0m BEGIN
  638 + [1m[36mRole Exists (1.1ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'other_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  639 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_other_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  640 + [1m[36mSQL (0.8ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_other_role"], ["name", "other_role"], ["permissions", "---\n- do_some_stuff\n"], ["system", false]]
  641 + [1m[35m (19.5ms)[0m COMMIT
  642 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  643 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "some_resource"]]
  644 + [1m[36m (16.9ms)[0m [1mCOMMIT[0m
  645 + [1m[35mRoleAssignment Load (0.6ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  646 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  647 + [1m[35mRole Load (0.6ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1
  648 + [1m[36mAccessControlTestAccessor Load (0.5ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1[0m
  649 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]]
  650 + [1m[36mAccessControlTestResource Load (0.2ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1[0m
  651 + [1m[35m (19.5ms)[0m COMMIT
  652 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  653 + [1m[35m (0.1ms)[0m COMMIT
  654 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  655 + [1m[35m (0.1ms)[0m COMMIT
  656 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  657 + [1m[35mAccessControlTestResource Load (0.4ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (1)
  658 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (1)[0m
  659 + [1m[35m (28.7ms)[0m DROP TABLE "access_control_test_roles"
  660 + [1m[36m (160.3ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  661 + [1m[35m (21.3ms)[0m DROP TABLE "access_control_test_role_assignments"
  662 + [1m[36m (160.3ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  663 + [1m[35m (11.4ms)[0m DROP TABLE "access_control_test_accessors"
  664 + [1m[36m (103.8ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  665 + [1m[35m (11.4ms)[0m DROP TABLE "access_control_test_resources"
  666 + [1m[36m (99.1ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  667 + [1m[35m (0.3ms)[0m SELECT version FROM "schema_migrations"
  668 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  669 + [1m[35mRole Exists (0.7ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  670 + [1m[36mRole Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  671 + [1m[35mSQL (0.5ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]]
  672 + [1m[36m (11.3ms)[0m [1mCOMMIT[0m
  673 + [1m[35m (0.2ms)[0m BEGIN
  674 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1[0m
  675 + [1m[35m (0.1ms)[0m ROLLBACK
  676 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  677 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  678 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  679 + [1m[35m (0.1ms)[0m ROLLBACK
  680 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  681 + [1m[35m (0.1ms)[0m ROLLBACK
  682 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  683 + [1m[35mRole Exists (0.2ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  684 + [1m[36mRole Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  685 + [1m[35m (0.1ms)[0m ROLLBACK
  686 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  687 + [1m[35mSQL (0.5ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  688 + [1m[36m (108.3ms)[0m [1mCOMMIT[0m
  689 + [1m[35m (0.1ms)[0m BEGIN
  690 + [1m[36mSQL (0.5ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "Resource A"]]
  691 + [1m[35m (30.8ms)[0m COMMIT
  692 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  693 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]]
  694 + [1m[36m (11.6ms)[0m [1mCOMMIT[0m
  695 + [1m[35m (0.1ms)[0m BEGIN
  696 + [1m[36m (0.1ms)[0m [1mROLLBACK[0m
  697 + [1m[35m (38.4ms)[0m DROP TABLE "access_control_test_roles"
  698 + [1m[36m (184.1ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  699 + [1m[35m (20.2ms)[0m DROP TABLE "access_control_test_role_assignments"
  700 + [1m[36m (197.7ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  701 + [1m[35m (19.7ms)[0m DROP TABLE "access_control_test_accessors"
  702 + [1m[36m (109.4ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  703 + [1m[35m (21.4ms)[0m DROP TABLE "access_control_test_resources"
  704 + [1m[36m (99.3ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  705 + [1m[35m (0.7ms)[0m SELECT version FROM "schema_migrations"
  706 + [1m[36mSQL (12.3ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  707 + [1m[35m (0.3ms)[0m BEGIN
  708 + [1m[36mRole Exists (0.8ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  709 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  710 + [1m[36mSQL (0.8ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_permissive_role"], ["name", "permissive_role"], ["permissions", "---\n- edit_profile\n"], ["system", false]]
  711 + [1m[35m (15.1ms)[0m COMMIT
  712 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  713 + [1m[35mRole Exists (0.5ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  714 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  715 + [1m[35m (0.3ms)[0m UPDATE "access_control_test_roles" SET "permissions" = '---
  716 +- edit_profile
  717 +- post_content
  718 +' WHERE "access_control_test_roles"."id" = 1
  719 + [1m[36m (13.3ms)[0m [1mCOMMIT[0m
  720 + [1m[35mSQL (15.5ms)[0m DELETE FROM "access_control_test_roles"
  721 + [1m[36m (0.4ms)[0m [1mSELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" [0m
  722 + [1m[35m (0.2ms)[0m BEGIN
  723 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  724 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  725 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_any_role"], ["name", "any_role"], ["permissions", nil], ["system", false]]
  726 + [1m[35m (12.6ms)[0m COMMIT
  727 + [1m[36m (0.3ms)[0m [1mSELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" [0m
  728 + [1m[35mSQL (10.9ms)[0m DELETE FROM "access_control_test_roles"
  729 + [1m[36mSQL (0.2ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  730 + [1m[35m (0.1ms)[0m BEGIN
  731 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  732 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  733 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_test_role"], ["name", "Test Role"], ["permissions", nil], ["system", false]]
  734 + [1m[35m (19.6ms)[0m COMMIT
  735 + [1m[36mSQL (11.6ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  736 + [1m[35m (0.1ms)[0m BEGIN
  737 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  738 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  739 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]]
  740 + [1m[35m (20.3ms)[0m COMMIT
  741 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  742 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  743 + [1m[36m (17.7ms)[0m [1mCOMMIT[0m
  744 + [1m[35mSQL (17.0ms)[0m DELETE FROM "access_control_test_roles"
  745 + [1m[36mSQL (0.2ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  746 + [1m[35m (0.2ms)[0m BEGIN
  747 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  748 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  749 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]]
  750 + [1m[35m (17.1ms)[0m COMMIT
  751 + [1m[36mSQL (11.0ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  752 + [1m[35mSQL (0.2ms)[0m DELETE FROM "access_control_test_roles"
  753 + [1m[36mSQL (0.3ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  754 + [1m[35m (0.1ms)[0m BEGIN
  755 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  756 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'foo' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  757 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "foo"], ["name", "Test Role"], ["permissions", nil], ["system", false]]
  758 + [1m[35m (20.0ms)[0m COMMIT
  759 + [1m[36mSQL (11.6ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  760 + [1m[35mSQL (0.2ms)[0m DELETE FROM "access_control_test_roles"
  761 + [1m[36mSQL (0.2ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  762 + [1m[35mSQL (0.2ms)[0m DELETE FROM "access_control_test_roles"
  763 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  764 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'unique key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  765 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  766 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "my_key"], ["name", "unique key"], ["permissions", nil], ["system", false]]
  767 + [1m[36m (17.6ms)[0m [1mCOMMIT[0m
  768 + [1m[35mRole Exists (0.6ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" IS NULL AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  769 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  770 + [1m[35mSQL (15.6ms)[0m DELETE FROM "access_control_test_roles"
  771 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  772 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  773 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  774 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_role_name"], ["name", "role_name"], ["permissions", nil], ["system", false]]
  775 + [1m[36m (12.7ms)[0m [1mCOMMIT[0m
  776 + [1m[35m (0.2ms)[0m BEGIN
  777 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  778 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  779 + [1m[36m (0.1ms)[0m [1mROLLBACK[0m
  780 + [1m[35m (98.5ms)[0m DROP TABLE "access_control_test_roles"
  781 + [1m[36m (182.0ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  782 + [1m[35m (25.1ms)[0m DROP TABLE "access_control_test_role_assignments"
  783 + [1m[36m (116.7ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  784 + [1m[35m (11.9ms)[0m DROP TABLE "access_control_test_accessors"
  785 + [1m[36m (111.5ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  786 + [1m[35m (21.4ms)[0m DROP TABLE "access_control_test_resources"
  787 + [1m[36m (86.4ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  788 + [1m[35m (0.4ms)[0m SELECT version FROM "schema_migrations"
  789 + [1m[36mSQL (0.5ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  790 + [1m[35m (0.2ms)[0m BEGIN
  791 + [1m[36mRole Exists (0.9ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  792 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  793 + [1m[36mSQL (0.8ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_permissive_role"], ["name", "permissive_role"], ["permissions", "---\n- edit_profile\n"], ["system", false]]
  794 + [1m[35m (16.3ms)[0m COMMIT
  795 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  796 + [1m[35mRole Exists (0.5ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  797 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  798 + [1m[35m (0.3ms)[0m UPDATE "access_control_test_roles" SET "permissions" = '---
  799 +- edit_profile
  800 +- post_content
  801 +' WHERE "access_control_test_roles"."id" = 1
  802 + [1m[36m (13.0ms)[0m [1mCOMMIT[0m
  803 + [1m[35mSQL (14.1ms)[0m DELETE FROM "access_control_test_roles"
  804 + [1m[36m (0.3ms)[0m [1mSELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" [0m
  805 + [1m[35m (0.1ms)[0m BEGIN
  806 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  807 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  808 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_any_role"], ["name", "any_role"], ["permissions", nil], ["system", false]]
  809 + [1m[35m (16.5ms)[0m COMMIT
  810 + [1m[36m (0.3ms)[0m [1mSELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" [0m
  811 + [1m[35mSQL (20.1ms)[0m DELETE FROM "access_control_test_roles"
  812 + [1m[36mSQL (0.2ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  813 + [1m[35m (0.2ms)[0m BEGIN
  814 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  815 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  816 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_test_role"], ["name", "Test Role"], ["permissions", nil], ["system", false]]
  817 + [1m[35m (17.0ms)[0m COMMIT
  818 + [1m[36mSQL (12.7ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  819 + [1m[35m (0.1ms)[0m BEGIN
  820 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  821 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  822 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]]
  823 + [1m[35m (18.1ms)[0m COMMIT
  824 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  825 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  826 + [1m[36m (19.1ms)[0m [1mCOMMIT[0m
  827 + [1m[35m (0.2ms)[0m BEGIN
  828 + [1m[36mSQL (1.0ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", nil], ["resource_type", nil], ["role_id", 4]]
  829 + [1m[35m (15.5ms)[0m COMMIT
  830 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  831 + [1m[35mRoleAssignment Load (0.6ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 4
  832 + [1m[36mSQL (0.5ms)[0m [1mDELETE FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = $1[0m [["id", 1]]
  833 + [1m[35mAccessControlTestAccessor Load (0.4ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1
  834 + [1m[36mSQL (0.5ms)[0m [1mDELETE FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = $1[0m [["id", 4]]
  835 + [1m[35m (12.5ms)[0m COMMIT
  836 + [1m[36mRoleAssignment Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = 1 LIMIT 1[0m
  837 + [1m[35mSQL (0.2ms)[0m DELETE FROM "access_control_test_roles"
  838 + [1m[36mSQL (0.2ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  839 + [1m[35m (0.1ms)[0m BEGIN
  840 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  841 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  842 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]]
  843 + [1m[35m (13.7ms)[0m COMMIT
  844 + [1m[36mSQL (11.1ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  845 + [1m[35mSQL (0.3ms)[0m DELETE FROM "access_control_test_roles"
  846 + [1m[36mSQL (0.3ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  847 + [1m[35m (0.1ms)[0m BEGIN
  848 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  849 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'foo' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  850 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "foo"], ["name", "Test Role"], ["permissions", nil], ["system", false]]
  851 + [1m[35m (19.0ms)[0m COMMIT
  852 + [1m[36mSQL (11.3ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  853 + [1m[35mSQL (0.3ms)[0m DELETE FROM "access_control_test_roles"
  854 + [1m[36mSQL (0.2ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  855 + [1m[35mSQL (0.2ms)[0m DELETE FROM "access_control_test_roles"
  856 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  857 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'unique key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  858 + [1m[36mRole Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  859 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "my_key"], ["name", "unique key"], ["permissions", nil], ["system", false]]
  860 + [1m[36m (18.0ms)[0m [1mCOMMIT[0m
  861 + [1m[35mRole Exists (0.5ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" IS NULL AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  862 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  863 + [1m[35mSQL (15.0ms)[0m DELETE FROM "access_control_test_roles"
  864 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  865 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  866 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  867 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_role_name"], ["name", "role_name"], ["permissions", nil], ["system", false]]
  868 + [1m[36m (19.8ms)[0m [1mCOMMIT[0m
  869 + [1m[35m (0.2ms)[0m BEGIN
  870 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  871 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  872 + [1m[36m (0.1ms)[0m [1mROLLBACK[0m
  873 + [1m[35m (33.7ms)[0m DROP TABLE "access_control_test_roles"
  874 + [1m[36m (141.1ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  875 + [1m[35m (20.3ms)[0m DROP TABLE "access_control_test_role_assignments"
  876 + [1m[36m (182.5ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  877 + [1m[35m (20.3ms)[0m DROP TABLE "access_control_test_accessors"
  878 + [1m[36m (112.7ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  879 + [1m[35m (20.1ms)[0m DROP TABLE "access_control_test_resources"
  880 + [1m[36m (99.3ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  881 + [1m[35m (0.7ms)[0m SELECT version FROM "schema_migrations"
  882 + [1m[36mSQL (0.6ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  883 + [1m[35m (0.2ms)[0m BEGIN
  884 + [1m[36mRole Exists (0.9ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  885 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  886 + [1m[36mSQL (0.7ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_permissive_role"], ["name", "permissive_role"], ["permissions", "---\n- edit_profile\n"], ["system", false]]
  887 + [1m[35m (11.2ms)[0m COMMIT
  888 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  889 + [1m[35mRole Exists (0.5ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  890 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  891 + [1m[35m (0.3ms)[0m UPDATE "access_control_test_roles" SET "permissions" = '---
  892 +- edit_profile
  893 +- post_content
  894 +' WHERE "access_control_test_roles"."id" = 1
  895 + [1m[36m (13.0ms)[0m [1mCOMMIT[0m
  896 + [1m[35mSQL (14.9ms)[0m DELETE FROM "access_control_test_roles"
  897 + [1m[36m (0.3ms)[0m [1mSELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" [0m
  898 + [1m[35m (0.2ms)[0m BEGIN
  899 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  900 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  901 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_any_role"], ["name", "any_role"], ["permissions", nil], ["system", false]]
  902 + [1m[35m (18.3ms)[0m COMMIT
  903 + [1m[36m (0.3ms)[0m [1mSELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" [0m
  904 + [1m[35mSQL (20.1ms)[0m DELETE FROM "access_control_test_roles"
  905 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  906 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  907 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'some_unprobable_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  908 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "some_unprobable_key"], ["name", "a test role"], ["permissions", nil], ["system", false]]
  909 + [1m[36m (13.6ms)[0m [1mCOMMIT[0m
  910 + [1m[35mSQL (12.9ms)[0m DELETE FROM "access_control_test_roles"
  911 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  912 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  913 + [1m[36mRole Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  914 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_test_role"], ["name", "Test Role"], ["permissions", nil], ["system", false]]
  915 + [1m[36m (18.1ms)[0m [1mCOMMIT[0m
  916 + [1m[35mSQL (12.5ms)[0m DELETE FROM "access_control_test_roles"
  917 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  918 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  919 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  920 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]]
  921 + [1m[36m (17.8ms)[0m [1mCOMMIT[0m
  922 + [1m[35m (0.2ms)[0m BEGIN
  923 + [1m[36mSQL (0.7ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "accessor"]]
  924 + [1m[35m (19.0ms)[0m COMMIT
  925 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  926 + [1m[35mSQL (0.9ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", nil], ["resource_type", nil], ["role_id", 5]]
  927 + [1m[36m (16.0ms)[0m [1mCOMMIT[0m
  928 + [1m[35m (0.1ms)[0m BEGIN
  929 + [1m[36mRoleAssignment Load (0.6ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 5[0m
  930 + [1m[35mSQL (0.4ms)[0m DELETE FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = $1 [["id", 1]]
  931 + [1m[36mAccessControlTestAccessor Load (0.4ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1[0m
  932 + [1m[35mSQL (0.3ms)[0m DELETE FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = $1 [["id", 5]]
  933 + [1m[36m (13.9ms)[0m [1mCOMMIT[0m
  934 + [1m[35mRoleAssignment Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = 1 LIMIT 1
  935 + [1m[36mSQL (0.2ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  936 + [1m[35mSQL (0.2ms)[0m DELETE FROM "access_control_test_roles"
  937 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  938 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  939 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  940 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]]
  941 + [1m[36m (13.9ms)[0m [1mCOMMIT[0m
  942 + [1m[35mSQL (11.2ms)[0m DELETE FROM "access_control_test_roles"
  943 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  944 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  945 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'some_unprobable_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  946 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "some_unprobable_key"], ["name", "a test role"], ["permissions", nil], ["system", true]]
  947 + [1m[36m (13.0ms)[0m [1mCOMMIT[0m
  948 + [1m[35mSQL (11.0ms)[0m DELETE FROM "access_control_test_roles"
  949 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  950 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'not to be removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  951 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_not_to_be_removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  952 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_not_to_be_removed"], ["name", "not to be removed"], ["permissions", "--- []\n"], ["system", true]]
  953 + [1m[36m (19.4ms)[0m [1mCOMMIT[0m
  954 + [1m[35m (0.3ms)[0m SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"
  955 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  956 + [1m[35mRoleAssignment Load (0.3ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 8
  957 + [1m[36m (0.1ms)[0m [1mROLLBACK[0m
  958 + [1m[35m (0.2ms)[0m SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"
  959 + [1m[36mSQL (15.7ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  960 + [1m[35m (0.1ms)[0m BEGIN
  961 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  962 + [1m[35mRole Exists (0.2ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'foo' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  963 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "foo"], ["name", "Test Role"], ["permissions", nil], ["system", false]]
  964 + [1m[35m (13.2ms)[0m COMMIT
  965 + [1m[36mSQL (11.2ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  966 + [1m[35mSQL (0.3ms)[0m DELETE FROM "access_control_test_roles"
  967 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  968 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'to be removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  969 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_to_be_removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  970 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_to_be_removed"], ["name", "to be removed"], ["permissions", "--- []\n"], ["system", false]]
  971 + [1m[36m (20.2ms)[0m [1mCOMMIT[0m
  972 + [1m[35m (0.3ms)[0m SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"
  973 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  974 + [1m[35mRoleAssignment Load (0.3ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 10
  975 + [1m[36mSQL (0.2ms)[0m [1mDELETE FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = $1[0m [["id", 10]]
  976 + [1m[35m (17.3ms)[0m COMMIT
  977 + [1m[36m (0.3ms)[0m [1mSELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" [0m
  978 + [1m[35mSQL (0.2ms)[0m DELETE FROM "access_control_test_roles"
  979 + [1m[36mSQL (0.3ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  980 + [1m[35m (0.2ms)[0m BEGIN
  981 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'unique key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  982 + [1m[35mRole Exists (0.2ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  983 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "my_key"], ["name", "unique key"], ["permissions", nil], ["system", false]]
  984 + [1m[35m (16.0ms)[0m COMMIT
  985 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" IS NULL AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  986 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  987 + [1m[36mSQL (15.1ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  988 + [1m[35m (0.1ms)[0m BEGIN
  989 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  990 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  991 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_role_name"], ["name", "role_name"], ["permissions", nil], ["system", false]]
  992 + [1m[35m (18.6ms)[0m COMMIT
  993 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  994 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  995 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  996 + [1m[35m (0.1ms)[0m ROLLBACK
  997 + [1m[35m (19.2ms)[0m DROP TABLE "access_control_test_roles"
  998 + [1m[36m (160.8ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  999 + [1m[35m (21.7ms)[0m DROP TABLE "access_control_test_role_assignments"
  1000 + [1m[36m (152.3ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1001 + [1m[35m (21.3ms)[0m DROP TABLE "access_control_test_accessors"
  1002 + [1m[36m (78.0ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1003 + [1m[35m (20.0ms)[0m DROP TABLE "access_control_test_resources"
  1004 + [1m[36m (107.7ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1005 + [1m[35m (0.7ms)[0m SELECT version FROM "schema_migrations"
  1006 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1007 + [1m[35mRole Exists (1.1ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1008 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1009 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]]
  1010 + [1m[36m (14.5ms)[0m [1mCOMMIT[0m
  1011 + [1m[35m (0.1ms)[0m BEGIN
  1012 + [1m[36mRole Load (0.6ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1[0m
  1013 + [1m[35m (0.2ms)[0m ROLLBACK
  1014 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1015 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1016 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1017 + [1m[35m (0.2ms)[0m ROLLBACK
  1018 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1019 + [1m[35m (0.1ms)[0m ROLLBACK
  1020 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1021 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1022 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1023 + [1m[35m (0.2ms)[0m ROLLBACK
  1024 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1025 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1026 + [1m[36m (38.8ms)[0m [1mCOMMIT[0m
  1027 + [1m[35m (0.1ms)[0m BEGIN
  1028 + [1m[36mSQL (0.7ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "Resource A"]]
  1029 + [1m[35m (93.0ms)[0m COMMIT
  1030 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1031 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]]
  1032 + [1m[36m (19.1ms)[0m [1mCOMMIT[0m
  1033 + [1m[35m (0.1ms)[0m BEGIN
  1034 + [1m[36m (0.1ms)[0m [1mROLLBACK[0m
  1035 + [1m[35m (32.3ms)[0m DROP TABLE "access_control_test_roles"
  1036 + [1m[36m (221.2ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  1037 + [1m[35m (21.6ms)[0m DROP TABLE "access_control_test_role_assignments"
  1038 + [1m[36m (196.3ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1039 + [1m[35m (21.1ms)[0m DROP TABLE "access_control_test_accessors"
  1040 + [1m[36m (106.8ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1041 + [1m[35m (20.2ms)[0m DROP TABLE "access_control_test_resources"
  1042 + [1m[36m (115.4ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1043 + [1m[35m (19.0ms)[0m SELECT version FROM "schema_migrations"
  1044 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1045 + [1m[35mRole Exists (1.0ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1046 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1047 + [1m[35mSQL (0.6ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]]
  1048 + [1m[36m (16.8ms)[0m [1mCOMMIT[0m
  1049 + [1m[35m (0.2ms)[0m BEGIN
  1050 + [1m[36mRole Load (0.5ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1[0m
  1051 + [1m[35m (0.3ms)[0m ROLLBACK
  1052 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1053 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1054 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1055 + [1m[35m (0.1ms)[0m ROLLBACK
  1056 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1057 + [1m[35m (0.1ms)[0m ROLLBACK
  1058 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1059 + [1m[35mRole Exists (0.2ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1060 + [1m[36mRole Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1061 + [1m[35m (0.1ms)[0m ROLLBACK
  1062 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1063 + [1m[35mSQL (0.4ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1064 + [1m[36m (38.9ms)[0m [1mCOMMIT[0m
  1065 + [1m[35m (0.1ms)[0m BEGIN
  1066 + [1m[36mSQL (0.6ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "Resource A"]]
  1067 + [1m[35m (17.6ms)[0m COMMIT
  1068 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1069 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]]
  1070 + [1m[36m (19.2ms)[0m [1mCOMMIT[0m
  1071 + [1m[35m (0.1ms)[0m BEGIN
  1072 + [1m[36m (0.1ms)[0m [1mROLLBACK[0m
  1073 + [1m[35m (29.7ms)[0m DROP TABLE "access_control_test_roles"
  1074 + [1m[36m (149.1ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  1075 + [1m[35m (20.4ms)[0m DROP TABLE "access_control_test_role_assignments"
  1076 + [1m[36m (199.2ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1077 + [1m[35m (21.3ms)[0m DROP TABLE "access_control_test_accessors"
  1078 + [1m[36m (114.7ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1079 + [1m[35m (13.0ms)[0m DROP TABLE "access_control_test_resources"
  1080 + [1m[36m (107.5ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1081 + [1m[35m (0.5ms)[0m SELECT version FROM "schema_migrations"
  1082 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1083 + [1m[35mRole Exists (1.1ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1084 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1085 + [1m[35mSQL (0.6ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]]
  1086 + [1m[36m (11.2ms)[0m [1mCOMMIT[0m
  1087 + [1m[35m (0.1ms)[0m BEGIN
  1088 + [1m[36mRole Load (0.5ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1[0m
  1089 + [1m[35m (0.3ms)[0m ROLLBACK
  1090 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1091 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1092 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1093 + [1m[35m (0.1ms)[0m ROLLBACK
  1094 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1095 + [1m[35m (0.1ms)[0m ROLLBACK
  1096 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1097 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1098 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1099 + [1m[35m (0.1ms)[0m ROLLBACK
  1100 + [1m[36m (0.0ms)[0m [1mBEGIN[0m
  1101 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1102 + [1m[36m (95.7ms)[0m [1mCOMMIT[0m
  1103 + [1m[35m (0.1ms)[0m BEGIN
  1104 + [1m[36mSQL (0.8ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "Resource A"]]
  1105 + [1m[35m (32.1ms)[0m COMMIT
  1106 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1107 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]]
  1108 + [1m[36m (19.4ms)[0m [1mCOMMIT[0m
  1109 + [1m[35m (0.2ms)[0m BEGIN
  1110 + [1m[36m (0.1ms)[0m [1mROLLBACK[0m
  1111 + [1m[35m (21.2ms)[0m DROP TABLE "access_control_test_roles"
  1112 + [1m[36m (140.9ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  1113 + [1m[35m (21.5ms)[0m DROP TABLE "access_control_test_role_assignments"
  1114 + [1m[36m (169.2ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1115 + [1m[35m (20.4ms)[0m DROP TABLE "access_control_test_accessors"
  1116 + [1m[36m (115.9ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1117 + [1m[35m (21.3ms)[0m DROP TABLE "access_control_test_resources"
  1118 + [1m[36m (111.4ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1119 + [1m[35m (0.7ms)[0m SELECT version FROM "schema_migrations"
  1120 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1121 + [1m[35mRole Exists (1.1ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1122 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1123 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]]
  1124 + [1m[36m (12.1ms)[0m [1mCOMMIT[0m
  1125 + [1m[35m (0.2ms)[0m BEGIN
  1126 + [1m[36mRole Load (0.5ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1[0m
  1127 + [1m[35m (0.3ms)[0m ROLLBACK
  1128 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1129 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1130 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1131 + [1m[35m (0.1ms)[0m ROLLBACK
  1132 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1133 + [1m[35m (0.1ms)[0m ROLLBACK
  1134 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1135 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1136 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1137 + [1m[35m (0.2ms)[0m ROLLBACK
  1138 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1139 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1140 + [1m[36m (29.5ms)[0m [1mCOMMIT[0m
  1141 + [1m[35m (0.1ms)[0m BEGIN
  1142 + [1m[36mSQL (0.7ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "Resource A"]]
  1143 + [1m[35m (19.5ms)[0m COMMIT
  1144 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1145 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]]
  1146 + [1m[36m (10.8ms)[0m [1mCOMMIT[0m
  1147 + [1m[35m (0.2ms)[0m BEGIN
  1148 + [1m[36m (0.1ms)[0m [1mROLLBACK[0m
  1149 + [1m[35m (33.2ms)[0m DROP TABLE "access_control_test_roles"
  1150 + [1m[36m (152.3ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  1151 + [1m[35m (21.8ms)[0m DROP TABLE "access_control_test_role_assignments"
  1152 + [1m[36m (160.7ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1153 + [1m[35m (20.0ms)[0m DROP TABLE "access_control_test_accessors"
  1154 + [1m[36m (121.0ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1155 + [1m[35m (20.2ms)[0m DROP TABLE "access_control_test_resources"
  1156 + [1m[36m (107.5ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1157 + [1m[35m (0.7ms)[0m SELECT version FROM "schema_migrations"
  1158 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1159 + [1m[35mRole Exists (1.1ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1160 + [1m[36mRole Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1161 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]]
  1162 + [1m[36m (12.6ms)[0m [1mCOMMIT[0m
  1163 + [1m[35m (0.1ms)[0m BEGIN
  1164 + [1m[36mRole Load (0.6ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1[0m
  1165 + [1m[35m (0.2ms)[0m ROLLBACK
  1166 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1167 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1168 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1169 + [1m[35m (0.2ms)[0m ROLLBACK
  1170 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1171 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1172 + [1m[36m (43.2ms)[0m [1mCOMMIT[0m
  1173 + [1m[35m (0.2ms)[0m BEGIN
  1174 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1175 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1176 + [1m[36mSQL (0.8ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", true], ["resource_id", nil], ["resource_type", nil], ["role_id", nil]]
  1177 + [1m[35m (18.5ms)[0m COMMIT
  1178 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1179 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1180 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1181 + [1m[35m (0.1ms)[0m ROLLBACK
  1182 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1183 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1184 + [1m[36m (16.6ms)[0m [1mCOMMIT[0m
  1185 + [1m[35m (0.1ms)[0m BEGIN
  1186 + [1m[36mSQL (0.8ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "Resource A"]]
  1187 + [1m[35m (18.0ms)[0m COMMIT
  1188 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1189 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]]
  1190 + [1m[36m (19.4ms)[0m [1mCOMMIT[0m
  1191 + [1m[35m (0.1ms)[0m BEGIN
  1192 + [1m[36m (0.2ms)[0m [1mROLLBACK[0m
  1193 + [1m[35m (32.3ms)[0m DROP TABLE "access_control_test_roles"
  1194 + [1m[36m (140.7ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  1195 + [1m[35m (20.6ms)[0m DROP TABLE "access_control_test_role_assignments"
  1196 + [1m[36m (170.2ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1197 + [1m[35m (20.2ms)[0m DROP TABLE "access_control_test_accessors"
  1198 + [1m[36m (115.9ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1199 + [1m[35m (21.5ms)[0m DROP TABLE "access_control_test_resources"
  1200 + [1m[36m (111.3ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1201 + [1m[35m (0.6ms)[0m SELECT version FROM "schema_migrations"
  1202 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1203 + [1m[35mRole Exists (1.1ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1204 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1205 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]]
  1206 + [1m[36m (15.9ms)[0m [1mCOMMIT[0m
  1207 + [1m[35m (0.2ms)[0m BEGIN
  1208 + [1m[36mRole Load (0.5ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1[0m
  1209 + [1m[35m (0.2ms)[0m ROLLBACK
  1210 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1211 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1212 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1213 + [1m[35m (0.1ms)[0m ROLLBACK
  1214 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1215 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1216 + [1m[36m (42.5ms)[0m [1mCOMMIT[0m
  1217 + [1m[35m (0.2ms)[0m BEGIN
  1218 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1219 + [1m[35mRole Exists (0.2ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1220 + [1m[36mSQL (0.9ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", true], ["resource_id", nil], ["resource_type", nil], ["role_id", nil]]
  1221 + [1m[35m (82.3ms)[0m COMMIT
  1222 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1223 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1224 + [1m[36mRole Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1225 + [1m[35m (0.1ms)[0m ROLLBACK
  1226 + [1m[35m (29.2ms)[0m DROP TABLE "access_control_test_roles"
  1227 + [1m[36m (160.6ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  1228 + [1m[35m (20.5ms)[0m DROP TABLE "access_control_test_role_assignments"
  1229 + [1m[36m (153.7ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1230 + [1m[35m (20.1ms)[0m DROP TABLE "access_control_test_accessors"
  1231 + [1m[36m (112.7ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1232 + [1m[35m (20.1ms)[0m DROP TABLE "access_control_test_resources"
  1233 + [1m[36m (99.3ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1234 + [1m[35m (0.6ms)[0m SELECT version FROM "schema_migrations"
  1235 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1236 + [1m[35mRole Exists (1.1ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1237 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1238 + [1m[35mSQL (0.6ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]]
  1239 + [1m[36m (15.2ms)[0m [1mCOMMIT[0m
  1240 + [1m[35m (0.2ms)[0m BEGIN
  1241 + [1m[36mRole Load (0.5ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1[0m
  1242 + [1m[35m (0.3ms)[0m ROLLBACK
  1243 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1244 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1245 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1246 + [1m[35m (0.2ms)[0m ROLLBACK
  1247 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1248 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1249 + [1m[36m (32.4ms)[0m [1mCOMMIT[0m
  1250 + [1m[35m (0.1ms)[0m BEGIN
  1251 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1252 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1253 + [1m[36mSQL (0.9ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", true], ["resource_id", nil], ["resource_type", nil], ["role_id", nil]]
  1254 + [1m[35m (15.5ms)[0m COMMIT
  1255 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1256 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1257 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1258 + [1m[35m (0.2ms)[0m ROLLBACK
  1259 + [1m[35m (13.3ms)[0m DROP TABLE "access_control_test_roles"
  1260 + [1m[36m (175.9ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  1261 + [1m[35m (21.5ms)[0m DROP TABLE "access_control_test_role_assignments"
  1262 + [1m[36m (138.2ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1263 + [1m[35m (21.0ms)[0m DROP TABLE "access_control_test_accessors"
  1264 + [1m[36m (98.6ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1265 + [1m[35m (20.1ms)[0m DROP TABLE "access_control_test_resources"
  1266 + [1m[36m (118.7ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1267 + [1m[35m (0.6ms)[0m SELECT version FROM "schema_migrations"
  1268 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1269 + [1m[35mRole Exists (1.1ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1270 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1271 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]]
  1272 + [1m[36m (18.2ms)[0m [1mCOMMIT[0m
  1273 + [1m[35m (0.1ms)[0m BEGIN
  1274 + [1m[36mRole Load (0.5ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1[0m
  1275 + [1m[35m (0.3ms)[0m ROLLBACK
  1276 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1277 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1278 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1279 + [1m[35m (0.2ms)[0m ROLLBACK
  1280 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1281 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1282 + [1m[36m (13.5ms)[0m [1mCOMMIT[0m
  1283 + [1m[35m (0.1ms)[0m BEGIN
  1284 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1285 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1286 + [1m[36mSQL (0.9ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", true], ["resource_id", nil], ["resource_type", nil], ["role_id", nil]]
  1287 + [1m[35m (15.3ms)[0m COMMIT
  1288 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1289 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1290 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1291 + [1m[35m (0.1ms)[0m ROLLBACK
  1292 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1293 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1294 + [1m[36m (16.9ms)[0m [1mCOMMIT[0m
  1295 + [1m[35m (0.1ms)[0m BEGIN
  1296 + [1m[36mSQL (0.8ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "Resource A"]]
  1297 + [1m[35m (20.2ms)[0m COMMIT
  1298 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1299 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]]
  1300 + [1m[36m (18.5ms)[0m [1mCOMMIT[0m
  1301 + [1m[35m (39.0ms)[0m DROP TABLE "access_control_test_roles"
  1302 + [1m[36m (153.2ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  1303 + [1m[35m (22.1ms)[0m DROP TABLE "access_control_test_role_assignments"
  1304 + [1m[36m (161.5ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1305 + [1m[35m (21.7ms)[0m DROP TABLE "access_control_test_accessors"
  1306 + [1m[36m (120.6ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1307 + [1m[35m (21.6ms)[0m DROP TABLE "access_control_test_resources"
  1308 + [1m[36m (99.9ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1309 + [1m[35m (0.7ms)[0m SELECT version FROM "schema_migrations"
  1310 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1311 + [1m[35mRole Exists (1.1ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1312 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1313 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]]
  1314 + [1m[36m (11.3ms)[0m [1mCOMMIT[0m
  1315 + [1m[35m (0.1ms)[0m BEGIN
  1316 + [1m[36mRole Load (0.6ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1[0m
  1317 + [1m[35m (0.2ms)[0m ROLLBACK
  1318 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1319 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1320 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1321 + [1m[35m (0.1ms)[0m ROLLBACK
  1322 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1323 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1324 + [1m[36m (121.2ms)[0m [1mCOMMIT[0m
  1325 + [1m[35m (0.2ms)[0m BEGIN
  1326 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1327 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1328 + [1m[36mSQL (0.9ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", true], ["resource_id", nil], ["resource_type", nil], ["role_id", nil]]
  1329 + [1m[35m (32.5ms)[0m COMMIT
  1330 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1331 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1332 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1333 + [1m[35m (0.1ms)[0m ROLLBACK
  1334 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1335 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1336 + [1m[36m (15.2ms)[0m [1mCOMMIT[0m
  1337 + [1m[35m (0.1ms)[0m BEGIN
  1338 + [1m[36mSQL (0.8ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "Resource A"]]
  1339 + [1m[35m (19.7ms)[0m COMMIT
  1340 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1341 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]]
  1342 + [1m[36m (11.2ms)[0m [1mCOMMIT[0m
  1343 + [1m[35m (0.1ms)[0m BEGIN
  1344 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1345 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1346 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", nil], ["role_id", nil]]
  1347 + [1m[35m (13.0ms)[0m COMMIT
  1348 + [1m[35m (32.1ms)[0m DROP TABLE "access_control_test_roles"
  1349 + [1m[36m (154.5ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  1350 + [1m[35m (25.1ms)[0m DROP TABLE "access_control_test_role_assignments"
  1351 + [1m[36m (217.0ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1352 + [1m[35m (21.7ms)[0m DROP TABLE "access_control_test_accessors"
  1353 + [1m[36m (79.0ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1354 + [1m[35m (21.7ms)[0m DROP TABLE "access_control_test_resources"
  1355 + [1m[36m (87.5ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1356 + [1m[35m (12.6ms)[0m SELECT version FROM "schema_migrations"
  1357 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1358 + [1m[35mRole Exists (1.1ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1359 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1360 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]]
  1361 + [1m[36m (17.6ms)[0m [1mCOMMIT[0m
  1362 + [1m[35m (0.1ms)[0m BEGIN
  1363 + [1m[36mRole Load (0.5ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1[0m
  1364 + [1m[35m (0.3ms)[0m ROLLBACK
  1365 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1366 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1367 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1368 + [1m[35m (0.1ms)[0m ROLLBACK
  1369 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1370 + [1m[35mSQL (0.9ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1371 + [1m[36m (42.9ms)[0m [1mCOMMIT[0m
  1372 + [1m[35m (0.1ms)[0m BEGIN
  1373 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1374 + [1m[35mRole Exists (0.2ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1375 + [1m[36mSQL (0.7ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", true], ["resource_id", nil], ["resource_type", nil], ["role_id", nil]]
  1376 + [1m[35m (15.1ms)[0m COMMIT
  1377 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1378 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1379 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1380 + [1m[35m (0.1ms)[0m ROLLBACK
  1381 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1382 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]]
  1383 + [1m[36m (14.4ms)[0m [1mCOMMIT[0m
  1384 + [1m[35m (0.1ms)[0m BEGIN
  1385 + [1m[36mSQL (0.8ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "Resource A"]]
  1386 + [1m[35m (18.7ms)[0m COMMIT
  1387 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1388 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]]
  1389 + [1m[36m (17.8ms)[0m [1mCOMMIT[0m
  1390 + [1m[35m (0.1ms)[0m BEGIN
  1391 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1392 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1393 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", nil]]
  1394 + [1m[35m (18.5ms)[0m COMMIT
  1395 + [1m[35m (34.1ms)[0m DROP TABLE "access_control_test_roles"
  1396 + [1m[36m (226.9ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  1397 + [1m[35m (21.6ms)[0m DROP TABLE "access_control_test_role_assignments"
  1398 + [1m[36m (160.2ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1399 + [1m[35m (20.0ms)[0m DROP TABLE "access_control_test_accessors"
  1400 + [1m[36m (128.8ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1401 + [1m[35m (20.0ms)[0m DROP TABLE "access_control_test_resources"
  1402 + [1m[36m (119.2ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1403 + [1m[35m (0.6ms)[0m SELECT version FROM "schema_migrations"
  1404 + [1m[36mSQL (0.6ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  1405 + [1m[35m (0.2ms)[0m BEGIN
  1406 + [1m[36mRole Exists (0.6ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1407 + [1m[35mRole Exists (0.2ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1408 + [1m[36mSQL (0.4ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_permissive_role"], ["name", "permissive_role"], ["permissions", "---\n- edit_profile\n"], ["system", false]]
  1409 + [1m[35m (17.6ms)[0m COMMIT
  1410 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1411 + [1m[35mRole Exists (0.5ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1412 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1413 + [1m[35m (0.3ms)[0m UPDATE "access_control_test_roles" SET "permissions" = '---
  1414 +- edit_profile
  1415 +- post_content
  1416 +' WHERE "access_control_test_roles"."id" = 1
  1417 + [1m[36m (11.5ms)[0m [1mCOMMIT[0m
  1418 + [1m[35mSQL (14.9ms)[0m DELETE FROM "access_control_test_roles"
  1419 + [1m[36m (0.3ms)[0m [1mSELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" [0m
  1420 + [1m[35m (0.1ms)[0m BEGIN
  1421 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1422 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1423 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_any_role"], ["name", "any_role"], ["permissions", nil], ["system", false]]
  1424 + [1m[35m (11.2ms)[0m COMMIT
  1425 + [1m[36m (0.3ms)[0m [1mSELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" [0m
  1426 + [1m[35mSQL (12.2ms)[0m DELETE FROM "access_control_test_roles"
  1427 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1428 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1429 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'some_unprobable_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1430 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "some_unprobable_key"], ["name", "a test role"], ["permissions", nil], ["system", false]]
  1431 + [1m[36m (11.9ms)[0m [1mCOMMIT[0m
  1432 + [1m[35mSQL (12.2ms)[0m DELETE FROM "access_control_test_roles"
  1433 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1434 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1435 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1436 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_test_role"], ["name", "Test Role"], ["permissions", nil], ["system", false]]
  1437 + [1m[36m (18.1ms)[0m [1mCOMMIT[0m
  1438 + [1m[35mSQL (11.1ms)[0m DELETE FROM "access_control_test_roles"
  1439 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1440 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1441 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1442 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]]
  1443 + [1m[36m (19.2ms)[0m [1mCOMMIT[0m
  1444 + [1m[35m (0.1ms)[0m BEGIN
  1445 + [1m[36mSQL (0.8ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "accessor"]]
  1446 + [1m[35m (17.5ms)[0m COMMIT
  1447 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1448 + [1m[35mSQL (1.0ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", nil], ["resource_type", nil], ["role_id", 5]]
  1449 + [1m[36m (19.4ms)[0m [1mCOMMIT[0m
  1450 + [1m[35m (0.2ms)[0m BEGIN
  1451 + [1m[36mRoleAssignment Load (0.5ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 5[0m
  1452 + [1m[35mSQL (0.5ms)[0m DELETE FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = $1 [["id", 1]]
  1453 + [1m[36mAccessControlTestAccessor Load (0.4ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1[0m
  1454 + [1m[35mSQL (0.4ms)[0m DELETE FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = $1 [["id", 5]]
  1455 + [1m[36m (11.3ms)[0m [1mCOMMIT[0m
  1456 + [1m[35mRoleAssignment Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = 1 LIMIT 1
  1457 + [1m[36mSQL (0.2ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  1458 + [1m[35mSQL (0.2ms)[0m DELETE FROM "access_control_test_roles"
  1459 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1460 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1461 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1462 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]]
  1463 + [1m[36m (16.3ms)[0m [1mCOMMIT[0m
  1464 + [1m[35mSQL (18.8ms)[0m DELETE FROM "access_control_test_roles"
  1465 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1466 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1467 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'some_unprobable_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1468 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "some_unprobable_key"], ["name", "a test role"], ["permissions", nil], ["system", true]]
  1469 + [1m[36m (11.6ms)[0m [1mCOMMIT[0m
  1470 + [1m[35mSQL (12.2ms)[0m DELETE FROM "access_control_test_roles"
  1471 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1472 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'not to be removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1473 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_not_to_be_removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1474 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_not_to_be_removed"], ["name", "not to be removed"], ["permissions", "--- []\n"], ["system", true]]
  1475 + [1m[36m (11.4ms)[0m [1mCOMMIT[0m
  1476 + [1m[35m (0.3ms)[0m SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"
  1477 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1478 + [1m[35mRoleAssignment Load (0.3ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 8
  1479 + [1m[36m (0.1ms)[0m [1mROLLBACK[0m
  1480 + [1m[35m (0.3ms)[0m SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"
  1481 + [1m[36mSQL (17.4ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  1482 + [1m[35m (0.2ms)[0m BEGIN
  1483 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1484 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'foo' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1485 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "foo"], ["name", "Test Role"], ["permissions", nil], ["system", false]]
  1486 + [1m[35m (11.9ms)[0m COMMIT
  1487 + [1m[36mSQL (12.3ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  1488 + [1m[35mSQL (0.3ms)[0m DELETE FROM "access_control_test_roles"
  1489 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1490 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'to be removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1491 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_to_be_removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1492 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_to_be_removed"], ["name", "to be removed"], ["permissions", "--- []\n"], ["system", false]]
  1493 + [1m[36m (10.8ms)[0m [1mCOMMIT[0m
  1494 + [1m[35m (0.3ms)[0m SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"
  1495 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1496 + [1m[35mRoleAssignment Load (0.3ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 10
  1497 + [1m[36mSQL (0.2ms)[0m [1mDELETE FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = $1[0m [["id", 10]]
  1498 + [1m[35m (17.3ms)[0m COMMIT
  1499 + [1m[36m (0.3ms)[0m [1mSELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" [0m
  1500 + [1m[35mSQL (0.3ms)[0m DELETE FROM "access_control_test_roles"
  1501 + [1m[36mSQL (0.2ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  1502 + [1m[35m (0.1ms)[0m BEGIN
  1503 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'unique key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1504 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1505 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "my_key"], ["name", "unique key"], ["permissions", nil], ["system", false]]
  1506 + [1m[35m (17.7ms)[0m COMMIT
  1507 + [1m[36mRole Exists (0.5ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" IS NULL AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1508 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1509 + [1m[36mSQL (10.8ms)[0m [1mDELETE FROM "access_control_test_roles"[0m
  1510 + [1m[35m (0.2ms)[0m BEGIN
  1511 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1512 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1513 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_role_name"], ["name", "role_name"], ["permissions", nil], ["system", false]]
  1514 + [1m[35m (19.4ms)[0m COMMIT
  1515 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1516 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1517 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1518 + [1m[35m (0.1ms)[0m ROLLBACK
  1519 + [1m[35m (21.7ms)[0m DROP TABLE "access_control_test_roles"
  1520 + [1m[36m (206.8ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  1521 + [1m[35m (21.6ms)[0m DROP TABLE "access_control_test_role_assignments"
  1522 + [1m[36m (155.4ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1523 + [1m[35m (21.5ms)[0m DROP TABLE "access_control_test_accessors"
  1524 + [1m[36m (107.4ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1525 + [1m[35m (20.1ms)[0m DROP TABLE "access_control_test_resources"
  1526 + [1m[36m (119.2ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1527 + [1m[35m (0.7ms)[0m SELECT version FROM "schema_migrations"
  1528 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1529 + [1m[35mSQL (0.6ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  1530 + [1m[36m (20.0ms)[0m [1mCOMMIT[0m
  1531 + [1m[35m (0.2ms)[0m BEGIN
  1532 + [1m[36mSQL (0.9ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  1533 + [1m[35m (19.7ms)[0m COMMIT
  1534 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1535 + [1m[35mRole Exists (1.1ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1536 + [1m[36mRole Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1537 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_content_author"], ["name", "just_a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  1538 + [1m[36m (13.6ms)[0m [1mCOMMIT[0m
  1539 + [1m[35mRoleAssignment Load (0.6ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  1540 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1541 + [1m[35mRole Load (0.5ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1
  1542 + [1m[36mAccessControlTestAccessor Load (0.4ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1[0m
  1543 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]]
  1544 + [1m[36mAccessControlTestResource Load (0.4ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1[0m
  1545 + [1m[35m (16.2ms)[0m COMMIT
  1546 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1547 + [1m[35m (0.1ms)[0m COMMIT
  1548 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1549 + [1m[35m (0.2ms)[0m COMMIT
  1550 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  1551 + [1m[35m (0.1ms)[0m BEGIN
  1552 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  1553 + [1m[35m (18.3ms)[0m COMMIT
  1554 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1555 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  1556 + [1m[36m (18.5ms)[0m [1mCOMMIT[0m
  1557 + [1m[35m (0.2ms)[0m BEGIN
  1558 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1559 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1560 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_just_a_moderator"], ["name", "just_a_moderator"], ["permissions", "---\n- bli\n"], ["system", false]]
  1561 + [1m[35m (19.0ms)[0m COMMIT
  1562 + [1m[36mRoleAssignment Load (0.3ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 2 AND "access_control_test_role_assignments"."resource_id" = 2 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  1563 + [1m[35m (0.1ms)[0m BEGIN
  1564 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 2 LIMIT 1[0m
  1565 + [1m[35mAccessControlTestAccessor Load (0.3ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 2 LIMIT 1
  1566 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 2], ["resource_type", "AccessControlTestResource"], ["role_id", 2]]
  1567 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 2 LIMIT 1
  1568 + [1m[36m (12.8ms)[0m [1mCOMMIT[0m
  1569 + [1m[35m (0.1ms)[0m BEGIN
  1570 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  1571 + [1m[35m (0.1ms)[0m BEGIN
  1572 + [1m[36m (0.2ms)[0m [1mCOMMIT[0m
  1573 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'
  1574 + [1m[36mAccessControlTestResource Load (0.5ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (2)[0m
  1575 + [1m[35mRole Load (0.3ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (2)
  1576 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1577 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  1578 + [1m[36m (14.9ms)[0m [1mCOMMIT[0m
  1579 + [1m[35m (0.2ms)[0m BEGIN
  1580 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  1581 + [1m[35m (18.3ms)[0m COMMIT
  1582 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1583 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1584 + [1m[36mRole Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1585 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_member"], ["name", "just_a_member"], ["permissions", "---\n- bli\n"], ["system", false]]
  1586 + [1m[36m (17.3ms)[0m [1mCOMMIT[0m
  1587 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 3 AND "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  1588 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1589 + [1m[35mRole Load (0.3ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 3 LIMIT 1
  1590 + [1m[36mAccessControlTestAccessor Load (0.3ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 3 LIMIT 1[0m
  1591 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 3], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 3], ["resource_type", "AccessControlTestResource"], ["role_id", 3]]
  1592 + [1m[36mAccessControlTestResource Load (0.3ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 3 LIMIT 1[0m
  1593 + [1m[35m (13.8ms)[0m COMMIT
  1594 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1595 + [1m[35m (0.1ms)[0m COMMIT
  1596 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1597 + [1m[35m (0.1ms)[0m COMMIT
  1598 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  1599 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (3)
  1600 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (3)[0m
  1601 + [1m[35m (0.2ms)[0m BEGIN
  1602 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  1603 + [1m[35m (13.7ms)[0m COMMIT
  1604 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1605 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  1606 + [1m[36m (23.4ms)[0m [1mCOMMIT[0m
  1607 + [1m[35m (0.1ms)[0m BEGIN
  1608 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1609 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1610 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_a_content_author"], ["name", "a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  1611 + [1m[35m (18.8ms)[0m COMMIT
  1612 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  1613 + [1m[35m (0.1ms)[0m BEGIN
  1614 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 4 LIMIT 1[0m
  1615 + [1m[35mAccessControlTestAccessor Load (0.3ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 4 LIMIT 1
  1616 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 4], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 4], ["resource_type", "AccessControlTestResource"], ["role_id", 4]]
  1617 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 4 LIMIT 1
  1618 + [1m[36m (16.1ms)[0m [1mCOMMIT[0m
  1619 + [1m[35m (0.2ms)[0m BEGIN
  1620 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  1621 + [1m[35m (0.1ms)[0m BEGIN
  1622 + [1m[36m (0.2ms)[0m [1mCOMMIT[0m
  1623 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  1624 + [1m[36mRoleAssignment Load (0.3ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  1625 + [1m[35m (0.2ms)[0m BEGIN
  1626 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  1627 + [1m[35m (14.3ms)[0m COMMIT
  1628 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1629 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  1630 + [1m[36m (18.5ms)[0m [1mCOMMIT[0m
  1631 + [1m[35m (0.1ms)[0m BEGIN
  1632 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1633 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1634 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_an_author"], ["name", "an_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  1635 + [1m[35m (19.1ms)[0m COMMIT
  1636 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  1637 + [1m[35mRoleAssignment Load (0.3ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 5 AND "access_control_test_role_assignments"."resource_id" = 5 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  1638 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1639 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  1640 + [1m[36m (15.7ms)[0m [1mCOMMIT[0m
  1641 + [1m[35m (0.1ms)[0m BEGIN
  1642 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  1643 + [1m[35m (19.8ms)[0m COMMIT
  1644 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1645 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1646 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1647 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_another_content_author"], ["name", "another_content_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  1648 + [1m[36m (16.4ms)[0m [1mCOMMIT[0m
  1649 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 6 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 6 AND "access_control_test_role_assignments"."resource_id" = 6 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  1650 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1651 + [1m[35mRole Load (0.4ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 6 LIMIT 1
  1652 + [1m[36mAccessControlTestAccessor Load (0.3ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 6 LIMIT 1[0m
  1653 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 6], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 6], ["resource_type", "AccessControlTestResource"], ["role_id", 6]]
  1654 + [1m[36mAccessControlTestResource Load (0.2ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 6 LIMIT 1[0m
  1655 + [1m[35m (12.3ms)[0m COMMIT
  1656 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1657 + [1m[35m (0.1ms)[0m COMMIT
  1658 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1659 + [1m[35m (0.1ms)[0m COMMIT
  1660 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1661 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  1662 + [1m[36m (16.9ms)[0m [1mCOMMIT[0m
  1663 + [1m[35m (0.1ms)[0m BEGIN
  1664 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  1665 + [1m[35m (18.6ms)[0m COMMIT
  1666 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1667 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1668 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1669 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_an_author"], ["name", "just_an_author"], ["permissions", "---\n- bli\n"], ["system", false]]
  1670 + [1m[36m (13.0ms)[0m [1mCOMMIT[0m
  1671 + [1m[35m (0.2ms)[0m BEGIN
  1672 + [1m[36mRole Load (0.5ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 7 LIMIT 1[0m
  1673 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 7], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 7], ["resource_type", nil], ["role_id", 7]]
  1674 + [1m[36m (15.4ms)[0m [1mCOMMIT[0m
  1675 + [1m[35mRoleAssignment Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 7 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."id" = 6 LIMIT 1
  1676 + [1m[36mRoleAssignment Load (0.3ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 7 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 7 AND "access_control_test_role_assignments"."resource_id" = 7 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  1677 + [1m[35m (32.7ms)[0m DROP TABLE "access_control_test_roles"
  1678 + [1m[36m (165.1ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  1679 + [1m[35m (21.5ms)[0m DROP TABLE "access_control_test_role_assignments"
  1680 + [1m[36m (154.2ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1681 + [1m[35m (20.4ms)[0m DROP TABLE "access_control_test_accessors"
  1682 + [1m[36m (108.2ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1683 + [1m[35m (21.7ms)[0m DROP TABLE "access_control_test_resources"
  1684 + [1m[36m (120.6ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1685 + [1m[35m (0.6ms)[0m SELECT version FROM "schema_migrations"
  1686 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1687 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  1688 + [1m[36m (18.8ms)[0m [1mCOMMIT[0m
  1689 + [1m[35m (0.1ms)[0m BEGIN
  1690 + [1m[36mSQL (1.0ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  1691 + [1m[35m (17.3ms)[0m COMMIT
  1692 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1693 + [1m[35mRole Exists (1.0ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'some member role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1694 + [1m[36mRole Exists (0.2ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_some_member_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1695 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_some_member_role"], ["name", "some member role"], ["permissions", "---\n- bli\n"], ["system", false]]
  1696 + [1m[36m (104.8ms)[0m [1mCOMMIT[0m
  1697 + [1m[35m (0.2ms)[0m BEGIN
  1698 + [1m[36mRole Exists (0.5ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'some admin role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1699 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_some_admin_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1700 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_some_admin_role"], ["name", "some admin role"], ["permissions", "---\n- bla\n"], ["system", false]]
  1701 + [1m[35m (14.6ms)[0m COMMIT
  1702 + [1m[36mRoleAssignment Load (0.6ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  1703 + [1m[35m (0.2ms)[0m BEGIN
  1704 + [1m[36mRole Load (0.4ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1[0m
  1705 + [1m[35mAccessControlTestAccessor Load (0.4ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1
  1706 + [1m[36mSQL (0.7ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]]
  1707 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1
  1708 + [1m[36m (57.6ms)[0m [1mCOMMIT[0m
  1709 + [1m[35m (0.1ms)[0m BEGIN
  1710 + [1m[36m (0.2ms)[0m [1mCOMMIT[0m
  1711 + [1m[35m (0.2ms)[0m BEGIN
  1712 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  1713 + [1m[35mRoleAssignment Load (0.5ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 2 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  1714 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1715 + [1m[35mRole Load (0.3ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 2 LIMIT 1
  1716 + [1m[36mAccessControlTestAccessor Load (0.2ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1[0m
  1717 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 2]]
  1718 + [1m[36mAccessControlTestResource Load (0.2ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1[0m
  1719 + [1m[35m (17.2ms)[0m COMMIT
  1720 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1721 + [1m[35m (0.1ms)[0m COMMIT
  1722 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1723 + [1m[35m (0.1ms)[0m COMMIT
  1724 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  1725 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (1)
  1726 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (1, 2)[0m
  1727 + [1m[35mRoleAssignment Load (0.3ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'
  1728 + [1m[36mAccessControlTestResource Load (0.4ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (1)[0m
  1729 + [1m[35mRole Load (0.3ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (1, 2)
  1730 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1731 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]]
  1732 + [1m[36m (42.3ms)[0m [1mCOMMIT[0m
  1733 + [1m[35m (0.1ms)[0m BEGIN
  1734 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id"[0m [["name", "ze"]]
  1735 + [1m[35m (19.0ms)[0m COMMIT
  1736 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1737 + [1m[35mRole Exists (0.4ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'some new role for member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1738 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_some_new_role_for_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1739 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_some_new_role_for_member"], ["name", "some new role for member"], ["permissions", "---\n- bli\n"], ["system", false]]
  1740 + [1m[36m (40.0ms)[0m [1mCOMMIT[0m
  1741 + [1m[35mRoleAssignment Load (0.5ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 3 AND "access_control_test_role_assignments"."resource_id" = 2 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  1742 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1743 + [1m[35mRole Load (0.3ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 3 LIMIT 1
  1744 + [1m[36mAccessControlTestAccessor Load (0.3ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 2 LIMIT 1[0m
  1745 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 2], ["resource_type", "AccessControlTestResource"], ["role_id", 3]]
  1746 + [1m[36mAccessControlTestResource Load (0.3ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 2 LIMIT 1[0m
  1747 + [1m[35m (12.1ms)[0m COMMIT
  1748 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1749 + [1m[35m (0.1ms)[0m COMMIT
  1750 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1751 + [1m[35m (0.1ms)[0m COMMIT
  1752 + [1m[36mRoleAssignment Load (0.3ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  1753 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (2)
  1754 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (3)[0m
  1755 + [1m[35m (0.2ms)[0m BEGIN
  1756 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  1757 + [1m[35m (63.7ms)[0m COMMIT
  1758 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1759 + [1m[35mSQL (0.3ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  1760 + [1m[36m (18.9ms)[0m [1mCOMMIT[0m
  1761 + [1m[35m (0.2ms)[0m BEGIN
  1762 + [1m[36mRole Exists (0.4ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'some wrenked role for member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1763 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_some_wrenked_role_for_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1764 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_some_wrenked_role_for_member"], ["name", "some wrenked role for member"], ["permissions", "---\n- bli\n"], ["system", false]]
  1765 + [1m[35m (79.8ms)[0m COMMIT
  1766 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  1767 + [1m[35m (0.1ms)[0m BEGIN
  1768 + [1m[36mRole Load (0.4ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 4 LIMIT 1[0m
  1769 + [1m[35mAccessControlTestAccessor Load (0.3ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 3 LIMIT 1
  1770 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 3], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 3], ["resource_type", "AccessControlTestResource"], ["role_id", 4]]
  1771 + [1m[35mAccessControlTestResource Load (0.3ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 3 LIMIT 1
  1772 + [1m[36m (15.9ms)[0m [1mCOMMIT[0m
  1773 + [1m[35m (0.1ms)[0m BEGIN
  1774 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  1775 + [1m[35m (0.0ms)[0m BEGIN
  1776 + [1m[36m (0.0ms)[0m [1mCOMMIT[0m
  1777 + [1m[35mRoleAssignment Load (0.4ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'
  1778 + [1m[36mAccessControlTestResource Load (0.3ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (3)[0m
  1779 + [1m[35mRole Load (0.3ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (4)
  1780 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  1781 + [1m[35m (0.1ms)[0m BEGIN
  1782 + [1m[36mSQL (0.4ms)[0m [1mDELETE FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = $1[0m [["id", 4]]
  1783 + [1m[35m (63.1ms)[0m COMMIT
  1784 + [1m[36mAccessControlTestResource Load (0.5ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = $1 LIMIT 1[0m [["id", 3]]
  1785 + [1m[35mAccessControlTestAccessor Load (0.4ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = $1 LIMIT 1 [["id", 3]]
  1786 + [1m[36mRoleAssignment Load (0.3ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  1787 + [1m[35m (0.1ms)[0m BEGIN
  1788 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id"[0m [["name", "bla"]]
  1789 + [1m[35m (14.7ms)[0m COMMIT
  1790 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1791 + [1m[35mSQL (0.2ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]]
  1792 + [1m[36m (20.3ms)[0m [1mCOMMIT[0m
  1793 + [1m[35m (0.1ms)[0m BEGIN
  1794 + [1m[36mRole Exists (0.3ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'some tested member role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1795 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_some_tested_member_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1796 + [1m[36mSQL (0.3ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_some_tested_member_role"], ["name", "some tested member role"], ["permissions", "---\n- bli\n"], ["system", false]]
  1797 + [1m[35m (16.6ms)[0m COMMIT
  1798 + [1m[36mRoleAssignment Load (0.3ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 5 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'[0m
  1799 + [1m[35m (0.1ms)[0m BEGIN
  1800 + [1m[36mRole Load (0.2ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 5 LIMIT 1[0m
  1801 + [1m[35mAccessControlTestAccessor Load (0.2ms)[0m SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 4 LIMIT 1
  1802 + [1m[36mSQL (0.2ms)[0m [1mINSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id"[0m [["accessor_id", 4], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 4], ["resource_type", "AccessControlTestResource"], ["role_id", 5]]
  1803 + [1m[35mAccessControlTestResource Load (0.2ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 4 LIMIT 1
  1804 + [1m[36m (17.2ms)[0m [1mCOMMIT[0m
  1805 + [1m[35m (0.1ms)[0m BEGIN
  1806 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  1807 + [1m[35m (0.1ms)[0m BEGIN
  1808 + [1m[36m (0.1ms)[0m [1mCOMMIT[0m
  1809 + [1m[35m (21.6ms)[0m DROP TABLE "access_control_test_roles"
  1810 + [1m[36m (225.5ms)[0m [1mCREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer) [0m
  1811 + [1m[35m (22.5ms)[0m DROP TABLE "access_control_test_role_assignments"
  1812 + [1m[36m (175.9ms)[0m [1mCREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean) [0m
  1813 + [1m[35m (20.3ms)[0m DROP TABLE "access_control_test_accessors"
  1814 + [1m[36m (99.9ms)[0m [1mCREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255)) [0m
  1815 + [1m[35m (23.4ms)[0m DROP TABLE "access_control_test_resources"
  1816 + [1m[36m (112.1ms)[0m [1mCREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255)) [0m
  1817 + [1m[35m (0.5ms)[0m SELECT version FROM "schema_migrations"
  1818 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1819 + [1m[35mSQL (0.7ms)[0m INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "other_user"]]
  1820 + [1m[36m (59.3ms)[0m [1mCOMMIT[0m
  1821 + [1m[35m (0.2ms)[0m BEGIN
  1822 + [1m[36mRole Exists (1.1ms)[0m [1mSELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'other_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1[0m
  1823 + [1m[35mRole Exists (0.3ms)[0m SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_other_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1
  1824 + [1m[36mSQL (0.7ms)[0m [1mINSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id"[0m [["environment_id", nil], ["key", "profile_other_role"], ["name", "other_role"], ["permissions", "---\n- do_some_stuff\n"], ["system", false]]
  1825 + [1m[35m (13.8ms)[0m COMMIT
  1826 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1827 + [1m[35mSQL (0.9ms)[0m INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "some_resource"]]
  1828 + [1m[36m (19.0ms)[0m [1mCOMMIT[0m
  1829 + [1m[35mRoleAssignment Load (0.6ms)[0m SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource'
  1830 + [1m[36m (0.2ms)[0m [1mBEGIN[0m
  1831 + [1m[35mRole Load (0.5ms)[0m SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1
  1832 + [1m[36mAccessControlTestAccessor Load (0.6ms)[0m [1mSELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1[0m
  1833 + [1m[35mSQL (0.8ms)[0m INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]]
  1834 + [1m[36mAccessControlTestResource Load (0.3ms)[0m [1mSELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1[0m
  1835 + [1m[35m (13.3ms)[0m COMMIT
  1836 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1837 + [1m[35m (0.1ms)[0m COMMIT
  1838 + [1m[36m (0.1ms)[0m [1mBEGIN[0m
  1839 + [1m[35m (0.2ms)[0m COMMIT
  1840 + [1m[36mRoleAssignment Load (0.4ms)[0m [1mSELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor'[0m
  1841 + [1m[35mAccessControlTestResource Load (0.4ms)[0m SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (1)
  1842 + [1m[36mRole Load (0.3ms)[0m [1mSELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (1)[0m
... ...
vendor/plugins/access_control/test/role_assignment_test.rb
1 1 require File.dirname(__FILE__) + '/test_helper'
2 2  
3 3 class RoleAssignmentTest < Test::Unit::TestCase
4   -
  4 +
  5 + def setup
  6 + RoleAssignment.attr_accessible :is_global, :role, :accessor, :resource
  7 + end
  8 +
5 9 def test_has_global_permission
6 10 role = Role.create(:name => 'new_role', :permissions => ['permission'])
7   - ra = RoleAssignment.create(:role => role, :is_global => true)
  11 + ra = RoleAssignment.create(:role_id => role.id, :is_global => true)
8 12 assert ra.has_permission?('permission', 'global')
9 13 assert !ra.has_permission?('not_permitted', 'global')
10 14 end
11 15  
12 16 def test_has_global_permission_with_global_resource
13 17 role = Role.create(:name => 'new_role', :permissions => ['permission'])
14   - ra = RoleAssignment.create(:role => role, :is_global => true)
  18 + accessor = AccessControlTestAccessor.create(:name => 'accessor')
  19 + ra = RoleAssignment.create!(:role => role, :is_global => true, :accessor => accessor)
15 20 assert ra.has_permission?('permission', 'global')
16 21 assert !ra.has_permission?('not_permitted', 'global')
17 22 end
18 23  
19 24 def test_has_specific_permission
20 25 role = Role.create(:name => 'new_role', :permissions => ['permission'])
21   - accessor = AccessControlTestAccessor.create(:name => 'accessor')
22   - resource_A = AccessControlTestResource.create(:name => 'Resource A')
23   - resource_B = AccessControlTestResource.create(:name => 'Resource B')
24   - ra = RoleAssignment.create(:accessor => accessor, :role => role, :resource => resource_A)
  26 + accessor = AccessControlTestAccessor.create!(:name => 'accessor')
  27 + resource_A = AccessControlTestResource.create!(:name => 'Resource A')
  28 + resource_B = AccessControlTestResource.create!(:name => 'Resource B')
  29 + ra = RoleAssignment.create!(:accessor => accessor, :role => role, :resource => resource_A)
25 30 assert !ra.new_record?
26 31 assert_equal role, ra.role
27 32 assert_equal accessor, ra.accessor
... ...
vendor/plugins/access_control/test/role_test.rb
... ... @@ -4,6 +4,8 @@ require File.join(File.dirname(__FILE__), &#39;test_helper&#39;)
4 4 class RoleTest < Test::Unit::TestCase
5 5  
6 6 def setup
  7 + RoleAssignment.attr_accessible :role, :accessor
  8 + Role.attr_accessible :system
7 9 Role.delete_all
8 10 end
9 11  
... ... @@ -23,7 +25,7 @@ class RoleTest &lt; Test::Unit::TestCase
23 25 def test_uniqueness_of_key
24 26 Role.create!(:name => 'unique key', :key => 'my_key')
25 27 role = Role.new(:key => 'my_key'); role.valid?
26   - assert role.errors.invalid?(:key)
  28 + assert role.errors.include?(:key)
27 29 end
28 30  
29 31 def test_permission_setting
... ...
vendor/plugins/access_control/test/test_helper.rb
... ... @@ -5,7 +5,7 @@ require &#39;test/unit&#39;
5 5 require 'mocha'
6 6  
7 7 # from Rails
8   -require 'test_help'
  8 +require 'rails/test_help'
9 9  
10 10 # load the database schema for the tests
11 11 ActiveRecord::Base.logger = Logger.new(File.dirname(__FILE__) + "/debug.log")
... ... @@ -18,6 +18,7 @@ RoleAssignment.set_table_name &#39;access_control_test_role_assignments&#39;
18 18 class AccessControlTestAccessor < ActiveRecord::Base
19 19 set_table_name 'access_control_test_accessors'
20 20 acts_as_accessor
  21 + attr_accessible :name
21 22 def cache_keys(arg)
22 23 []
23 24 end
... ... @@ -31,6 +32,8 @@ class AccessControlTestResource &lt; ActiveRecord::Base
31 32 set_table_name 'access_control_test_resources'
32 33 acts_as_accessible
33 34 PERMISSIONS[self.class.name] = {'bla' => N_('Bla')}
  35 +
  36 + attr_accessible :name
34 37 end
35 38  
36 39 # controller to test protection
... ...