From c79fbc9e32777bf7e7d6e79392184d754f109a6a Mon Sep 17 00:00:00 2001 From: Victor Costa Date: Wed, 21 May 2014 11:15:38 -0300 Subject: [PATCH] rails3: fix some access_control tests --- vendor/plugins/access_control/test/acts_as_accessor_test.rb | 7 ++++++- vendor/plugins/access_control/test/debug.log | 1842 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ vendor/plugins/access_control/test/role_assignment_test.rb | 19 ++++++++++++------- vendor/plugins/access_control/test/role_test.rb | 4 +++- vendor/plugins/access_control/test/test_helper.rb | 5 ++++- 5 files changed, 1867 insertions(+), 10 deletions(-) create mode 100644 vendor/plugins/access_control/test/debug.log diff --git a/vendor/plugins/access_control/test/acts_as_accessor_test.rb b/vendor/plugins/access_control/test/acts_as_accessor_test.rb index c568643..f20ebcd 100644 --- a/vendor/plugins/access_control/test/acts_as_accessor_test.rb +++ b/vendor/plugins/access_control/test/acts_as_accessor_test.rb @@ -2,6 +2,11 @@ require 'test/unit' require File.dirname(__FILE__) + '/test_helper' class ActAsAccessorTest < Test::Unit::TestCase + + def setup + RoleAssignment.attr_accessible :accessor + end + def test_can_have_role_in_respect_to_an_resource res = AccessControlTestResource.create!(:name => 'bla') a = AccessControlTestAccessor.create!(:name => 'ze') @@ -30,7 +35,7 @@ class ActAsAccessorTest < Test::Unit::TestCase res = AccessControlTestResource.create!(:name => 'bla') a = AccessControlTestAccessor.create!(:name => 'ze') role = Role.create!(:name => 'just_an_author', :permissions => ['bli']) - ra = RoleAssignment.create!(:accessor => a, :role => role, :resource => res) + ra = RoleAssignment.create!(:accessor => a, :role_id => role.id, :resource_id => res.id) assert a.role_assignments.include?(ra) assert a.remove_role(role, res) diff --git a/vendor/plugins/access_control/test/debug.log b/vendor/plugins/access_control/test/debug.log new file mode 100644 index 0000000..39f9ed2 --- /dev/null +++ b/vendor/plugins/access_control/test/debug.log @@ -0,0 +1,1842 @@ +# Logfile created on 2014-05-21 14:01:31 +0000 by logger.rb/31641 +  (104.6ms) DROP TABLE "access_control_test_roles" +  (172.2ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (20.1ms) DROP TABLE "access_control_test_role_assignments" +  (164.3ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (20.0ms) DROP TABLE "access_control_test_accessors" +  (77.0ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (21.1ms) DROP TABLE "access_control_test_resources" +  (110.3ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.6ms) SELECT version FROM "schema_migrations" +  (0.1ms) BEGIN + SQL (0.8ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (14.6ms) COMMIT +  (0.1ms) BEGIN + SQL (1.0ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (17.1ms) COMMIT +  (0.1ms) BEGIN + Role Exists (1.0ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.7ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_content_author"], ["name", "just_a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (11.9ms) COMMIT + RoleAssignment Load (0.6ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + Role Load (0.6ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 + AccessControlTestAccessor Load (0.4ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1 +  (16.4ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.2ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (13.2ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.4ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_moderator"], ["name", "just_a_moderator"], ["permissions", "---\n- bli\n"], ["system", false]] +  (19.2ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 2 AND "access_control_test_role_assignments"."resource_id" = 2 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 2 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 2 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 2], ["resource_type", "AccessControlTestResource"], ["role_id", 2]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 2 LIMIT 1 +  (12.2ms) COMMIT +  (0.2ms) BEGIN +  (0.2ms) COMMIT +  (1.1ms) BEGIN +  (0.7ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.5ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (2) + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (2) +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (11.3ms) COMMIT +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (19.6ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_member"], ["name", "just_a_member"], ["permissions", "---\n- bli\n"], ["system", false]] +  (17.5ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 3 AND "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.4ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 3 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 3 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 3], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 3], ["resource_type", "AccessControlTestResource"], ["role_id", 3]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 3 LIMIT 1 +  (13.8ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.2ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (3) + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (3) +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (13.3ms) COMMIT +  (0.2ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (10.6ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_content_author"], ["name", "a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (18.2ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.4ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 4 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 4 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 4], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 4], ["resource_type", "AccessControlTestResource"], ["role_id", 4]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 4 LIMIT 1 +  (12.4ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (15.1ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.5ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_an_author"], ["name", "an_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (19.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 5 AND "access_control_test_role_assignments"."resource_id" = 5 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (16.1ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.6ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_another_content_author"], ["name", "another_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (18.9ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 6 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 6 AND "access_control_test_role_assignments"."resource_id" = 6 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + Role Load (0.4ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 6 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 6 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 6], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 6], ["resource_type", "AccessControlTestResource"], ["role_id", 6]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 6 LIMIT 1 +  (12.9ms) COMMIT +  (0.1ms) BEGIN +  (0.2ms) COMMIT +  (0.2ms) BEGIN +  (0.1ms) COMMIT +  (0.2ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (17.1ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.5ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_an_author"], ["name", "just_an_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (17.4ms) COMMIT +  (0.2ms) BEGIN + Role Load (0.5ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 7 LIMIT 1 +  (0.3ms) ROLLBACK +  (36.5ms) DROP TABLE "access_control_test_roles" +  (139.4ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (20.1ms) DROP TABLE "access_control_test_role_assignments" +  (181.0ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (19.9ms) DROP TABLE "access_control_test_accessors" +  (110.3ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (21.1ms) DROP TABLE "access_control_test_resources" +  (116.9ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.6ms) SELECT version FROM "schema_migrations" +  (0.2ms) BEGIN + SQL (0.9ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (12.6ms) COMMIT +  (0.1ms) BEGIN + SQL (0.9ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (12.8ms) COMMIT +  (0.1ms) BEGIN + Role Exists (1.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_content_author"], ["name", "just_a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (14.0ms) COMMIT + RoleAssignment Load (0.6ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + Role Load (0.5ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 + AccessControlTestAccessor Load (0.4ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1 + SQL (0.7ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]] + AccessControlTestResource Load (0.4ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1 +  (13.9ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (18.3ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.4ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_moderator"], ["name", "just_a_moderator"], ["permissions", "---\n- bli\n"], ["system", false]] +  (18.6ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 2 AND "access_control_test_role_assignments"."resource_id" = 2 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 2 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 2 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 2], ["resource_type", "AccessControlTestResource"], ["role_id", 2]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 2 LIMIT 1 +  (12.4ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.6ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (2) + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (2) +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (19.0ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (10.7ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_member"], ["name", "just_a_member"], ["permissions", "---\n- bli\n"], ["system", false]] +  (17.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 3 AND "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.9ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 3 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 3 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 3], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 3], ["resource_type", "AccessControlTestResource"], ["role_id", 3]] + AccessControlTestResource Load (0.9ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 3 LIMIT 1 +  (12.4ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (3) + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (3) +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (13.1ms) COMMIT +  (0.2ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (11.8ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_content_author"], ["name", "a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (15.6ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 4 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 4 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 4], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 4], ["resource_type", "AccessControlTestResource"], ["role_id", 4]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 4 LIMIT 1 +  (13.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (15.1ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.5ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_an_author"], ["name", "an_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (19.3ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 5 AND "access_control_test_role_assignments"."resource_id" = 5 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (16.1ms) COMMIT +  (0.2ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (19.7ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_another_content_author"], ["name", "another_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (16.3ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 6 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 6 AND "access_control_test_role_assignments"."resource_id" = 6 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 6 LIMIT 1 + AccessControlTestAccessor Load (0.2ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 6 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 6], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 6], ["resource_type", "AccessControlTestResource"], ["role_id", 6]] + AccessControlTestResource Load (0.2ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 6 LIMIT 1 +  (13.3ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (17.4ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.5ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_an_author"], ["name", "just_an_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (19.3ms) COMMIT +  (40.1ms) DROP TABLE "access_control_test_roles" +  (172.5ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (20.0ms) DROP TABLE "access_control_test_role_assignments" +  (197.7ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (20.0ms) DROP TABLE "access_control_test_accessors" +  (115.2ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (21.1ms) DROP TABLE "access_control_test_resources" +  (105.6ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (20.2ms) SELECT version FROM "schema_migrations" +  (0.1ms) BEGIN + SQL (0.5ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (14.6ms) COMMIT +  (0.2ms) BEGIN + SQL (1.0ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (16.1ms) COMMIT +  (0.1ms) BEGIN + Role Exists (1.0ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_content_author"], ["name", "just_a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (12.4ms) COMMIT + RoleAssignment Load (0.6ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + Role Load (0.5ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 + AccessControlTestAccessor Load (0.4ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1 + SQL (0.7ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1 +  (17.0ms) COMMIT +  (0.1ms) BEGIN +  (0.2ms) COMMIT +  (0.2ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (10.8ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.3ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_moderator"], ["name", "just_a_moderator"], ["permissions", "---\n- bli\n"], ["system", false]] +  (18.6ms) COMMIT + RoleAssignment Load (0.5ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 2 AND "access_control_test_role_assignments"."resource_id" = 2 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 2 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 2 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 2], ["resource_type", "AccessControlTestResource"], ["role_id", 2]] + AccessControlTestResource Load (0.2ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 2 LIMIT 1 +  (12.3ms) COMMIT +  (0.1ms) BEGIN +  (0.2ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.4ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (2) + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (2) +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (12.7ms) COMMIT +  (0.2ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.3ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_member"], ["name", "just_a_member"], ["permissions", "---\n- bli\n"], ["system", false]] +  (16.9ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 3 AND "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 3 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 3 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 3], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 3], ["resource_type", "AccessControlTestResource"], ["role_id", 3]] + AccessControlTestResource Load (0.2ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 3 LIMIT 1 +  (13.7ms) COMMIT +  (0.1ms) BEGIN +  (0.2ms) COMMIT +  (0.2ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (3) + Role Load (0.4ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (3) +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (12.5ms) COMMIT +  (0.0ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (11.8ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_content_author"], ["name", "a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (17.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + Role Load (0.4ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 4 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 4 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 4], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 4], ["resource_type", "AccessControlTestResource"], ["role_id", 4]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 4 LIMIT 1 +  (13.4ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (12.6ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.5ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_an_author"], ["name", "an_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (18.4ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 5 AND "access_control_test_role_assignments"."resource_id" = 5 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (15.2ms) COMMIT +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (19.6ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_another_content_author"], ["name", "another_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (17.4ms) COMMIT + RoleAssignment Load (0.5ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 6 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 6 AND "access_control_test_role_assignments"."resource_id" = 6 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 6 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 6 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 6], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 6], ["resource_type", "AccessControlTestResource"], ["role_id", 6]] + AccessControlTestResource Load (0.2ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 6 LIMIT 1 +  (12.2ms) COMMIT +  (0.1ms) BEGIN +  (0.2ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (16.5ms) COMMIT +  (0.2ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.2ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_an_author"], ["name", "just_an_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (56.1ms) COMMIT +  (0.2ms) BEGIN + Role Load (0.4ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 7 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 7], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 7], ["resource_type", nil], ["role_id", 7]] +  (12.8ms) COMMIT + RoleAssignment Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 7 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."id" = 6 LIMIT 1 + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 7 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 7 AND "access_control_test_role_assignments"."resource_id" = 7 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (28.2ms) DROP TABLE "access_control_test_roles" +  (224.8ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (20.2ms) DROP TABLE "access_control_test_role_assignments" +  (191.5ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (13.0ms) DROP TABLE "access_control_test_accessors" +  (116.5ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (11.7ms) DROP TABLE "access_control_test_resources" +  (108.0ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.4ms) SELECT version FROM "schema_migrations" +  (0.1ms) BEGIN + SQL (0.5ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (13.6ms) COMMIT +  (0.1ms) BEGIN + SQL (0.6ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (16.4ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.6ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.6ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_content_author"], ["name", "just_a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (13.1ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.4ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1 + SQL (0.5ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]] + AccessControlTestResource Load (0.2ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1 +  (13.2ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (13.8ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (12.1ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_moderator"], ["name", "just_a_moderator"], ["permissions", "---\n- bli\n"], ["system", false]] +  (16.8ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 2 AND "access_control_test_role_assignments"."resource_id" = 2 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 2 LIMIT 1 + AccessControlTestAccessor Load (0.2ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 2 LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 2], ["resource_type", "AccessControlTestResource"], ["role_id", 2]] + AccessControlTestResource Load (0.2ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 2 LIMIT 1 +  (16.8ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (2) + Role Load (0.2ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (2) +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (12.9ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (10.8ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_member"], ["name", "just_a_member"], ["permissions", "---\n- bli\n"], ["system", false]] +  (18.5ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 3 AND "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.2ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 3 LIMIT 1 + AccessControlTestAccessor Load (0.2ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 3 LIMIT 1 + SQL (0.1ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 3], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 3], ["resource_type", "AccessControlTestResource"], ["role_id", 3]] + AccessControlTestResource Load (0.1ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 3 LIMIT 1 +  (16.0ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.2ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (3) + Role Load (0.2ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (3) +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (19.5ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (10.7ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_content_author"], ["name", "a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (18.6ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.2ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 4 LIMIT 1 + AccessControlTestAccessor Load (0.2ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 4 LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 4], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 4], ["resource_type", "AccessControlTestResource"], ["role_id", 4]] + AccessControlTestResource Load (0.2ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 4 LIMIT 1 +  (15.8ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' + RoleAssignment Load (0.1ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' +  (0.0ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (17.2ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (10.9ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_an_author"], ["name", "an_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (17.3ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + RoleAssignment Load (0.2ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 5 AND "access_control_test_role_assignments"."resource_id" = 5 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (27.0ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (10.8ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.1ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_another_content_author"], ["name", "another_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (17.9ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 6 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 6 AND "access_control_test_role_assignments"."resource_id" = 6 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 6 LIMIT 1 + AccessControlTestAccessor Load (0.2ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 6 LIMIT 1 + SQL (0.1ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 6], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 6], ["resource_type", "AccessControlTestResource"], ["role_id", 6]] + AccessControlTestResource Load (0.1ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 6 LIMIT 1 +  (15.7ms) COMMIT +  (0.1ms) BEGIN +  (0.0ms) COMMIT +  (0.0ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (18.8ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (10.8ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_an_author"], ["name", "just_an_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (18.1ms) COMMIT +  (0.1ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 7 LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 7], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 7], ["resource_type", nil], ["role_id", 7]] +  (17.5ms) COMMIT + RoleAssignment Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 7 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."id" = 6 LIMIT 1 + RoleAssignment Load (0.2ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 7 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 7 AND "access_control_test_role_assignments"."resource_id" = 7 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (20.1ms) DROP TABLE "access_control_test_roles" +  (225.9ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (21.6ms) DROP TABLE "access_control_test_role_assignments" +  (196.4ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (20.9ms) DROP TABLE "access_control_test_accessors" +  (113.9ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (21.3ms) DROP TABLE "access_control_test_resources" +  (115.3ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.7ms) SELECT version FROM "schema_migrations" +  (0.2ms) BEGIN + SQL (0.8ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "other_user"]] +  (12.7ms) COMMIT +  (0.2ms) BEGIN + Role Exists (1.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'other_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_other_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_other_role"], ["name", "other_role"], ["permissions", "---\n- do_some_stuff\n"], ["system", false]] +  (19.5ms) COMMIT +  (0.1ms) BEGIN + SQL (0.7ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "some_resource"]] +  (16.9ms) COMMIT + RoleAssignment Load (0.6ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + Role Load (0.6ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 + AccessControlTestAccessor Load (0.5ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1 + SQL (0.7ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]] + AccessControlTestResource Load (0.2ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1 +  (19.5ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.4ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (1) + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (1) +  (28.7ms) DROP TABLE "access_control_test_roles" +  (160.3ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (21.3ms) DROP TABLE "access_control_test_role_assignments" +  (160.3ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (11.4ms) DROP TABLE "access_control_test_accessors" +  (103.8ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (11.4ms) DROP TABLE "access_control_test_resources" +  (99.1ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.3ms) SELECT version FROM "schema_migrations" +  (0.2ms) BEGIN + Role Exists (0.7ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.5ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]] +  (11.3ms) COMMIT +  (0.2ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN + SQL (0.5ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (108.3ms) COMMIT +  (0.1ms) BEGIN + SQL (0.5ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource A"]] +  (30.8ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]] +  (11.6ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) ROLLBACK +  (38.4ms) DROP TABLE "access_control_test_roles" +  (184.1ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (20.2ms) DROP TABLE "access_control_test_role_assignments" +  (197.7ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (19.7ms) DROP TABLE "access_control_test_accessors" +  (109.4ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (21.4ms) DROP TABLE "access_control_test_resources" +  (99.3ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.7ms) SELECT version FROM "schema_migrations" + SQL (12.3ms) DELETE FROM "access_control_test_roles" +  (0.3ms) BEGIN + Role Exists (0.8ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_permissive_role"], ["name", "permissive_role"], ["permissions", "---\n- edit_profile\n"], ["system", false]] +  (15.1ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.5ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.3ms) UPDATE "access_control_test_roles" SET "permissions" = '--- +- edit_profile +- post_content +' WHERE "access_control_test_roles"."id" = 1 +  (13.3ms) COMMIT + SQL (15.5ms) DELETE FROM "access_control_test_roles" +  (0.4ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"  +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_any_role"], ["name", "any_role"], ["permissions", nil], ["system", false]] +  (12.6ms) COMMIT +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"  + SQL (10.9ms) DELETE FROM "access_control_test_roles" + SQL (0.2ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_test_role"], ["name", "Test Role"], ["permissions", nil], ["system", false]] +  (19.6ms) COMMIT + SQL (11.6ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]] +  (20.3ms) COMMIT +  (0.2ms) BEGIN + SQL (0.7ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (17.7ms) COMMIT + SQL (17.0ms) DELETE FROM "access_control_test_roles" + SQL (0.2ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]] +  (17.1ms) COMMIT + SQL (11.0ms) DELETE FROM "access_control_test_roles" + SQL (0.2ms) DELETE FROM "access_control_test_roles" + SQL (0.3ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'foo' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "foo"], ["name", "Test Role"], ["permissions", nil], ["system", false]] +  (20.0ms) COMMIT + SQL (11.6ms) DELETE FROM "access_control_test_roles" + SQL (0.2ms) DELETE FROM "access_control_test_roles" + SQL (0.2ms) DELETE FROM "access_control_test_roles" + SQL (0.2ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'unique key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "my_key"], ["name", "unique key"], ["permissions", nil], ["system", false]] +  (17.6ms) COMMIT + Role Exists (0.6ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" IS NULL AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (15.6ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_role_name"], ["name", "role_name"], ["permissions", nil], ["system", false]] +  (12.7ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (98.5ms) DROP TABLE "access_control_test_roles" +  (182.0ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (25.1ms) DROP TABLE "access_control_test_role_assignments" +  (116.7ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (11.9ms) DROP TABLE "access_control_test_accessors" +  (111.5ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (21.4ms) DROP TABLE "access_control_test_resources" +  (86.4ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.4ms) SELECT version FROM "schema_migrations" + SQL (0.5ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.9ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_permissive_role"], ["name", "permissive_role"], ["permissions", "---\n- edit_profile\n"], ["system", false]] +  (16.3ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.5ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.3ms) UPDATE "access_control_test_roles" SET "permissions" = '--- +- edit_profile +- post_content +' WHERE "access_control_test_roles"."id" = 1 +  (13.0ms) COMMIT + SQL (14.1ms) DELETE FROM "access_control_test_roles" +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"  +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_any_role"], ["name", "any_role"], ["permissions", nil], ["system", false]] +  (16.5ms) COMMIT +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"  + SQL (20.1ms) DELETE FROM "access_control_test_roles" + SQL (0.2ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_test_role"], ["name", "Test Role"], ["permissions", nil], ["system", false]] +  (17.0ms) COMMIT + SQL (12.7ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]] +  (18.1ms) COMMIT +  (0.1ms) BEGIN + SQL (0.8ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (19.1ms) COMMIT +  (0.2ms) BEGIN + SQL (1.0ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", nil], ["resource_type", nil], ["role_id", 4]] +  (15.5ms) COMMIT +  (0.2ms) BEGIN + RoleAssignment Load (0.6ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 4 + SQL (0.5ms) DELETE FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = $1 [["id", 1]] + AccessControlTestAccessor Load (0.4ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1 + SQL (0.5ms) DELETE FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = $1 [["id", 4]] +  (12.5ms) COMMIT + RoleAssignment Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = 1 LIMIT 1 + SQL (0.2ms) DELETE FROM "access_control_test_roles" + SQL (0.2ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]] +  (13.7ms) COMMIT + SQL (11.1ms) DELETE FROM "access_control_test_roles" + SQL (0.3ms) DELETE FROM "access_control_test_roles" + SQL (0.3ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'foo' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "foo"], ["name", "Test Role"], ["permissions", nil], ["system", false]] +  (19.0ms) COMMIT + SQL (11.3ms) DELETE FROM "access_control_test_roles" + SQL (0.3ms) DELETE FROM "access_control_test_roles" + SQL (0.2ms) DELETE FROM "access_control_test_roles" + SQL (0.2ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'unique key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "my_key"], ["name", "unique key"], ["permissions", nil], ["system", false]] +  (18.0ms) COMMIT + Role Exists (0.5ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" IS NULL AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (15.0ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_role_name"], ["name", "role_name"], ["permissions", nil], ["system", false]] +  (19.8ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (33.7ms) DROP TABLE "access_control_test_roles" +  (141.1ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (20.3ms) DROP TABLE "access_control_test_role_assignments" +  (182.5ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (20.3ms) DROP TABLE "access_control_test_accessors" +  (112.7ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (20.1ms) DROP TABLE "access_control_test_resources" +  (99.3ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.7ms) SELECT version FROM "schema_migrations" + SQL (0.6ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.9ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.7ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_permissive_role"], ["name", "permissive_role"], ["permissions", "---\n- edit_profile\n"], ["system", false]] +  (11.2ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.5ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.3ms) UPDATE "access_control_test_roles" SET "permissions" = '--- +- edit_profile +- post_content +' WHERE "access_control_test_roles"."id" = 1 +  (13.0ms) COMMIT + SQL (14.9ms) DELETE FROM "access_control_test_roles" +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"  +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_any_role"], ["name", "any_role"], ["permissions", nil], ["system", false]] +  (18.3ms) COMMIT +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"  + SQL (20.1ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'some_unprobable_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "some_unprobable_key"], ["name", "a test role"], ["permissions", nil], ["system", false]] +  (13.6ms) COMMIT + SQL (12.9ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_test_role"], ["name", "Test Role"], ["permissions", nil], ["system", false]] +  (18.1ms) COMMIT + SQL (12.5ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]] +  (17.8ms) COMMIT +  (0.2ms) BEGIN + SQL (0.7ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (19.0ms) COMMIT +  (0.2ms) BEGIN + SQL (0.9ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", nil], ["resource_type", nil], ["role_id", 5]] +  (16.0ms) COMMIT +  (0.1ms) BEGIN + RoleAssignment Load (0.6ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 5 + SQL (0.4ms) DELETE FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = $1 [["id", 1]] + AccessControlTestAccessor Load (0.4ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1 + SQL (0.3ms) DELETE FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = $1 [["id", 5]] +  (13.9ms) COMMIT + RoleAssignment Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = 1 LIMIT 1 + SQL (0.2ms) DELETE FROM "access_control_test_roles" + SQL (0.2ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]] +  (13.9ms) COMMIT + SQL (11.2ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'some_unprobable_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "some_unprobable_key"], ["name", "a test role"], ["permissions", nil], ["system", true]] +  (13.0ms) COMMIT + SQL (11.0ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'not to be removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_not_to_be_removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_not_to_be_removed"], ["name", "not to be removed"], ["permissions", "--- []\n"], ["system", true]] +  (19.4ms) COMMIT +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" +  (0.1ms) BEGIN + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 8 +  (0.1ms) ROLLBACK +  (0.2ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" + SQL (15.7ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'foo' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "foo"], ["name", "Test Role"], ["permissions", nil], ["system", false]] +  (13.2ms) COMMIT + SQL (11.2ms) DELETE FROM "access_control_test_roles" + SQL (0.3ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'to be removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_to_be_removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_to_be_removed"], ["name", "to be removed"], ["permissions", "--- []\n"], ["system", false]] +  (20.2ms) COMMIT +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" +  (0.2ms) BEGIN + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 10 + SQL (0.2ms) DELETE FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = $1 [["id", 10]] +  (17.3ms) COMMIT +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"  + SQL (0.2ms) DELETE FROM "access_control_test_roles" + SQL (0.3ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'unique key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "my_key"], ["name", "unique key"], ["permissions", nil], ["system", false]] +  (16.0ms) COMMIT + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" IS NULL AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (15.1ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_role_name"], ["name", "role_name"], ["permissions", nil], ["system", false]] +  (18.6ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (19.2ms) DROP TABLE "access_control_test_roles" +  (160.8ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (21.7ms) DROP TABLE "access_control_test_role_assignments" +  (152.3ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (21.3ms) DROP TABLE "access_control_test_accessors" +  (78.0ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (20.0ms) DROP TABLE "access_control_test_resources" +  (107.7ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.7ms) SELECT version FROM "schema_migrations" +  (0.1ms) BEGIN + Role Exists (1.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.7ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]] +  (14.5ms) COMMIT +  (0.1ms) BEGIN + Role Load (0.6ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 +  (0.2ms) ROLLBACK +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.2ms) ROLLBACK +  (0.1ms) BEGIN +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.2ms) ROLLBACK +  (0.1ms) BEGIN + SQL (0.8ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (38.8ms) COMMIT +  (0.1ms) BEGIN + SQL (0.7ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource A"]] +  (93.0ms) COMMIT +  (0.2ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]] +  (19.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) ROLLBACK +  (32.3ms) DROP TABLE "access_control_test_roles" +  (221.2ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (21.6ms) DROP TABLE "access_control_test_role_assignments" +  (196.3ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (21.1ms) DROP TABLE "access_control_test_accessors" +  (106.8ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (20.2ms) DROP TABLE "access_control_test_resources" +  (115.4ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (19.0ms) SELECT version FROM "schema_migrations" +  (0.1ms) BEGIN + Role Exists (1.0ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.6ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]] +  (16.8ms) COMMIT +  (0.2ms) BEGIN + Role Load (0.5ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 +  (0.3ms) ROLLBACK +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN + SQL (0.4ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (38.9ms) COMMIT +  (0.1ms) BEGIN + SQL (0.6ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource A"]] +  (17.6ms) COMMIT +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]] +  (19.2ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) ROLLBACK +  (29.7ms) DROP TABLE "access_control_test_roles" +  (149.1ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (20.4ms) DROP TABLE "access_control_test_role_assignments" +  (199.2ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (21.3ms) DROP TABLE "access_control_test_accessors" +  (114.7ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (13.0ms) DROP TABLE "access_control_test_resources" +  (107.5ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.5ms) SELECT version FROM "schema_migrations" +  (0.1ms) BEGIN + Role Exists (1.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.6ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]] +  (11.2ms) COMMIT +  (0.1ms) BEGIN + Role Load (0.5ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 +  (0.3ms) ROLLBACK +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.0ms) BEGIN + SQL (0.7ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (95.7ms) COMMIT +  (0.1ms) BEGIN + SQL (0.8ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource A"]] +  (32.1ms) COMMIT +  (0.2ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]] +  (19.4ms) COMMIT +  (0.2ms) BEGIN +  (0.1ms) ROLLBACK +  (21.2ms) DROP TABLE "access_control_test_roles" +  (140.9ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (21.5ms) DROP TABLE "access_control_test_role_assignments" +  (169.2ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (20.4ms) DROP TABLE "access_control_test_accessors" +  (115.9ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (21.3ms) DROP TABLE "access_control_test_resources" +  (111.4ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.7ms) SELECT version FROM "schema_migrations" +  (0.2ms) BEGIN + Role Exists (1.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]] +  (12.1ms) COMMIT +  (0.2ms) BEGIN + Role Load (0.5ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 +  (0.3ms) ROLLBACK +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.2ms) ROLLBACK +  (0.1ms) BEGIN + SQL (0.8ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (29.5ms) COMMIT +  (0.1ms) BEGIN + SQL (0.7ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource A"]] +  (19.5ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]] +  (10.8ms) COMMIT +  (0.2ms) BEGIN +  (0.1ms) ROLLBACK +  (33.2ms) DROP TABLE "access_control_test_roles" +  (152.3ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (21.8ms) DROP TABLE "access_control_test_role_assignments" +  (160.7ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (20.0ms) DROP TABLE "access_control_test_accessors" +  (121.0ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (20.2ms) DROP TABLE "access_control_test_resources" +  (107.5ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.7ms) SELECT version FROM "schema_migrations" +  (0.1ms) BEGIN + Role Exists (1.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]] +  (12.6ms) COMMIT +  (0.1ms) BEGIN + Role Load (0.6ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 +  (0.2ms) ROLLBACK +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.2ms) ROLLBACK +  (0.1ms) BEGIN + SQL (0.7ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (43.2ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", true], ["resource_id", nil], ["resource_type", nil], ["role_id", nil]] +  (18.5ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (16.6ms) COMMIT +  (0.1ms) BEGIN + SQL (0.8ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource A"]] +  (18.0ms) COMMIT +  (0.2ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]] +  (19.4ms) COMMIT +  (0.1ms) BEGIN +  (0.2ms) ROLLBACK +  (32.3ms) DROP TABLE "access_control_test_roles" +  (140.7ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (20.6ms) DROP TABLE "access_control_test_role_assignments" +  (170.2ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (20.2ms) DROP TABLE "access_control_test_accessors" +  (115.9ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (21.5ms) DROP TABLE "access_control_test_resources" +  (111.3ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.6ms) SELECT version FROM "schema_migrations" +  (0.2ms) BEGIN + Role Exists (1.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.7ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]] +  (15.9ms) COMMIT +  (0.2ms) BEGIN + Role Load (0.5ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 +  (0.2ms) ROLLBACK +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN + SQL (0.7ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (42.5ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.9ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", true], ["resource_id", nil], ["resource_type", nil], ["role_id", nil]] +  (82.3ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (29.2ms) DROP TABLE "access_control_test_roles" +  (160.6ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (20.5ms) DROP TABLE "access_control_test_role_assignments" +  (153.7ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (20.1ms) DROP TABLE "access_control_test_accessors" +  (112.7ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (20.1ms) DROP TABLE "access_control_test_resources" +  (99.3ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.6ms) SELECT version FROM "schema_migrations" +  (0.2ms) BEGIN + Role Exists (1.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.6ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]] +  (15.2ms) COMMIT +  (0.2ms) BEGIN + Role Load (0.5ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 +  (0.3ms) ROLLBACK +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.2ms) ROLLBACK +  (0.1ms) BEGIN + SQL (0.7ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (32.4ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.9ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", true], ["resource_id", nil], ["resource_type", nil], ["role_id", nil]] +  (15.5ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.2ms) ROLLBACK +  (13.3ms) DROP TABLE "access_control_test_roles" +  (175.9ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (21.5ms) DROP TABLE "access_control_test_role_assignments" +  (138.2ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (21.0ms) DROP TABLE "access_control_test_accessors" +  (98.6ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (20.1ms) DROP TABLE "access_control_test_resources" +  (118.7ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.6ms) SELECT version FROM "schema_migrations" +  (0.1ms) BEGIN + Role Exists (1.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]] +  (18.2ms) COMMIT +  (0.1ms) BEGIN + Role Load (0.5ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 +  (0.3ms) ROLLBACK +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.2ms) ROLLBACK +  (0.1ms) BEGIN + SQL (0.8ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (13.5ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.9ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", true], ["resource_id", nil], ["resource_type", nil], ["role_id", nil]] +  (15.3ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (16.9ms) COMMIT +  (0.1ms) BEGIN + SQL (0.8ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource A"]] +  (20.2ms) COMMIT +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]] +  (18.5ms) COMMIT +  (39.0ms) DROP TABLE "access_control_test_roles" +  (153.2ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (22.1ms) DROP TABLE "access_control_test_role_assignments" +  (161.5ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (21.7ms) DROP TABLE "access_control_test_accessors" +  (120.6ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (21.6ms) DROP TABLE "access_control_test_resources" +  (99.9ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.7ms) SELECT version FROM "schema_migrations" +  (0.1ms) BEGIN + Role Exists (1.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]] +  (11.3ms) COMMIT +  (0.1ms) BEGIN + Role Load (0.6ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 +  (0.2ms) ROLLBACK +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.2ms) BEGIN + SQL (0.7ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (121.2ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.9ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", true], ["resource_id", nil], ["resource_type", nil], ["role_id", nil]] +  (32.5ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (15.2ms) COMMIT +  (0.1ms) BEGIN + SQL (0.8ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource A"]] +  (19.7ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]] +  (11.2ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", nil], ["role_id", nil]] +  (13.0ms) COMMIT +  (32.1ms) DROP TABLE "access_control_test_roles" +  (154.5ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (25.1ms) DROP TABLE "access_control_test_role_assignments" +  (217.0ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (21.7ms) DROP TABLE "access_control_test_accessors" +  (79.0ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (21.7ms) DROP TABLE "access_control_test_resources" +  (87.5ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (12.6ms) SELECT version FROM "schema_migrations" +  (0.2ms) BEGIN + Role Exists (1.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_new_role"], ["name", "new_role"], ["permissions", "---\n- permission\n"], ["system", false]] +  (17.6ms) COMMIT +  (0.1ms) BEGIN + Role Load (0.5ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 +  (0.3ms) ROLLBACK +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.2ms) BEGIN + SQL (0.9ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (42.9ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.7ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", true], ["resource_id", nil], ["resource_type", nil], ["role_id", nil]] +  (15.1ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (14.4ms) COMMIT +  (0.1ms) BEGIN + SQL (0.8ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource A"]] +  (18.7ms) COMMIT +  (0.2ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "Resource B"]] +  (17.8ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_new_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", nil]] +  (18.5ms) COMMIT +  (34.1ms) DROP TABLE "access_control_test_roles" +  (226.9ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (21.6ms) DROP TABLE "access_control_test_role_assignments" +  (160.2ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (20.0ms) DROP TABLE "access_control_test_accessors" +  (128.8ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (20.0ms) DROP TABLE "access_control_test_resources" +  (119.2ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.6ms) SELECT version FROM "schema_migrations" + SQL (0.6ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.6ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.4ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_permissive_role"], ["name", "permissive_role"], ["permissions", "---\n- edit_profile\n"], ["system", false]] +  (17.6ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.5ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_permissive_role' AND "access_control_test_roles"."id" != 1 AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.3ms) UPDATE "access_control_test_roles" SET "permissions" = '--- +- edit_profile +- post_content +' WHERE "access_control_test_roles"."id" = 1 +  (11.5ms) COMMIT + SQL (14.9ms) DELETE FROM "access_control_test_roles" +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"  +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_any_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_any_role"], ["name", "any_role"], ["permissions", nil], ["system", false]] +  (11.2ms) COMMIT +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"  + SQL (12.2ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'some_unprobable_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "some_unprobable_key"], ["name", "a test role"], ["permissions", nil], ["system", false]] +  (11.9ms) COMMIT + SQL (12.2ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_test_role"], ["name", "Test Role"], ["permissions", nil], ["system", false]] +  (18.1ms) COMMIT + SQL (11.1ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]] +  (19.2ms) COMMIT +  (0.1ms) BEGIN + SQL (0.8ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "accessor"]] +  (17.5ms) COMMIT +  (0.1ms) BEGIN + SQL (1.0ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", nil], ["resource_type", nil], ["role_id", 5]] +  (19.4ms) COMMIT +  (0.2ms) BEGIN + RoleAssignment Load (0.5ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 5 + SQL (0.5ms) DELETE FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = $1 [["id", 1]] + AccessControlTestAccessor Load (0.4ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1 + SQL (0.4ms) DELETE FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = $1 [["id", 5]] +  (11.3ms) COMMIT + RoleAssignment Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = 1 LIMIT 1 + SQL (0.2ms) DELETE FROM "access_control_test_roles" + SQL (0.2ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_test_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_test_role"], ["name", "a test role"], ["permissions", "---\n- perm1\n"], ["system", false]] +  (16.3ms) COMMIT + SQL (18.8ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a test role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'some_unprobable_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "some_unprobable_key"], ["name", "a test role"], ["permissions", nil], ["system", true]] +  (11.6ms) COMMIT + SQL (12.2ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'not to be removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_not_to_be_removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_not_to_be_removed"], ["name", "not to be removed"], ["permissions", "--- []\n"], ["system", true]] +  (11.4ms) COMMIT +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" +  (0.1ms) BEGIN + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 8 +  (0.1ms) ROLLBACK +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" + SQL (17.4ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'Test Role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'foo' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "foo"], ["name", "Test Role"], ["permissions", nil], ["system", false]] +  (11.9ms) COMMIT + SQL (12.3ms) DELETE FROM "access_control_test_roles" + SQL (0.3ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'to be removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_to_be_removed' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_to_be_removed"], ["name", "to be removed"], ["permissions", "--- []\n"], ["system", false]] +  (10.8ms) COMMIT +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles" +  (0.2ms) BEGIN + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."role_id" = 10 + SQL (0.2ms) DELETE FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = $1 [["id", 10]] +  (17.3ms) COMMIT +  (0.3ms) SELECT COUNT(DISTINCT "access_control_test_roles"."id") FROM "access_control_test_roles"  + SQL (0.3ms) DELETE FROM "access_control_test_roles" + SQL (0.2ms) DELETE FROM "access_control_test_roles" +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'unique key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "my_key"], ["name", "unique key"], ["permissions", nil], ["system", false]] +  (17.7ms) COMMIT + Role Exists (0.5ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" IS NULL AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'my_key' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (10.8ms) DELETE FROM "access_control_test_roles" +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_role_name"], ["name", "role_name"], ["permissions", nil], ["system", false]] +  (19.4ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_role_name' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 +  (0.1ms) ROLLBACK +  (21.7ms) DROP TABLE "access_control_test_roles" +  (206.8ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (21.6ms) DROP TABLE "access_control_test_role_assignments" +  (155.4ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (21.5ms) DROP TABLE "access_control_test_accessors" +  (107.4ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (20.1ms) DROP TABLE "access_control_test_resources" +  (119.2ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.7ms) SELECT version FROM "schema_migrations" +  (0.2ms) BEGIN + SQL (0.6ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (20.0ms) COMMIT +  (0.2ms) BEGIN + SQL (0.9ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (19.7ms) COMMIT +  (0.2ms) BEGIN + Role Exists (1.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_content_author"], ["name", "just_a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (13.6ms) COMMIT + RoleAssignment Load (0.6ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + Role Load (0.5ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 + AccessControlTestAccessor Load (0.4ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1 + SQL (0.7ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]] + AccessControlTestResource Load (0.4ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1 +  (16.2ms) COMMIT +  (0.2ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.2ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (18.3ms) COMMIT +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.5ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_moderator' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_moderator"], ["name", "just_a_moderator"], ["permissions", "---\n- bli\n"], ["system", false]] +  (19.0ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 2 AND "access_control_test_role_assignments"."resource_id" = 2 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 2 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 2 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 2], ["resource_type", "AccessControlTestResource"], ["role_id", 2]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 2 LIMIT 1 +  (12.8ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.2ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.5ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (2) + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (2) +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (14.9ms) COMMIT +  (0.2ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.3ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_a_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_a_member"], ["name", "just_a_member"], ["permissions", "---\n- bli\n"], ["system", false]] +  (17.3ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 3 AND "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 3 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 3 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 3], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 3], ["resource_type", "AccessControlTestResource"], ["role_id", 3]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 3 LIMIT 1 +  (13.8ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (3) + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (3) +  (0.2ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (13.7ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (23.4ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_a_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_a_content_author"], ["name", "a_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (18.8ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 4 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 4 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 4], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 4], ["resource_type", "AccessControlTestResource"], ["role_id", 4]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 4 LIMIT 1 +  (16.1ms) COMMIT +  (0.2ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.2ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' +  (0.2ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (14.3ms) COMMIT +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.5ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_an_author"], ["name", "an_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (19.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 5 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 5 AND "access_control_test_role_assignments"."resource_id" = 5 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (15.7ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (19.8ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_another_content_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_another_content_author"], ["name", "another_content_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (16.4ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 6 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 6 AND "access_control_test_role_assignments"."resource_id" = 6 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + Role Load (0.4ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 6 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 6 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 6], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 6], ["resource_type", "AccessControlTestResource"], ["role_id", 6]] + AccessControlTestResource Load (0.2ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 6 LIMIT 1 +  (12.3ms) COMMIT +  (0.2ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (16.9ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.6ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_just_an_author' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_just_an_author"], ["name", "just_an_author"], ["permissions", "---\n- bli\n"], ["system", false]] +  (13.0ms) COMMIT +  (0.2ms) BEGIN + Role Load (0.5ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 7 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 7], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 7], ["resource_type", nil], ["role_id", 7]] +  (15.4ms) COMMIT + RoleAssignment Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 7 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."id" = 6 LIMIT 1 + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 7 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 7 AND "access_control_test_role_assignments"."resource_id" = 7 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (32.7ms) DROP TABLE "access_control_test_roles" +  (165.1ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (21.5ms) DROP TABLE "access_control_test_role_assignments" +  (154.2ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (20.4ms) DROP TABLE "access_control_test_accessors" +  (108.2ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (21.7ms) DROP TABLE "access_control_test_resources" +  (120.6ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.6ms) SELECT version FROM "schema_migrations" +  (0.2ms) BEGIN + SQL (0.8ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (18.8ms) COMMIT +  (0.1ms) BEGIN + SQL (1.0ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (17.3ms) COMMIT +  (0.1ms) BEGIN + Role Exists (1.0ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'some member role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.2ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_some_member_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_some_member_role"], ["name", "some member role"], ["permissions", "---\n- bli\n"], ["system", false]] +  (104.8ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.5ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'some admin role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_some_admin_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_some_admin_role"], ["name", "some admin role"], ["permissions", "---\n- bla\n"], ["system", false]] +  (14.6ms) COMMIT + RoleAssignment Load (0.6ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + Role Load (0.4ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 + AccessControlTestAccessor Load (0.4ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1 + SQL (0.7ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1 +  (57.6ms) COMMIT +  (0.1ms) BEGIN +  (0.2ms) COMMIT +  (0.2ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.5ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 2 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 2 LIMIT 1 + AccessControlTestAccessor Load (0.2ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 2]] + AccessControlTestResource Load (0.2ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1 +  (17.2ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (1) + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (1, 2) + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.4ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (1) + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (1, 2) +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (42.3ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (19.0ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'some new role for member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_some_new_role_for_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_some_new_role_for_member"], ["name", "some new role for member"], ["permissions", "---\n- bli\n"], ["system", false]] +  (40.0ms) COMMIT + RoleAssignment Load (0.5ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 3 AND "access_control_test_role_assignments"."resource_id" = 2 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 3 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 2 LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 2], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 2], ["resource_type", "AccessControlTestResource"], ["role_id", 3]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 2 LIMIT 1 +  (12.1ms) COMMIT +  (0.2ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 2 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (2) + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (3) +  (0.2ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (63.7ms) COMMIT +  (0.1ms) BEGIN + SQL (0.3ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (18.9ms) COMMIT +  (0.2ms) BEGIN + Role Exists (0.4ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'some wrenked role for member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_some_wrenked_role_for_member' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_some_wrenked_role_for_member"], ["name", "some wrenked role for member"], ["permissions", "---\n- bli\n"], ["system", false]] +  (79.8ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 4 AND "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.4ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 4 LIMIT 1 + AccessControlTestAccessor Load (0.3ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 3 LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 3], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 3], ["resource_type", "AccessControlTestResource"], ["role_id", 4]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 3 LIMIT 1 +  (15.9ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.0ms) BEGIN +  (0.0ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (3) + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (4) + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."resource_id" = 3 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + SQL (0.4ms) DELETE FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."id" = $1 [["id", 4]] +  (63.1ms) COMMIT + AccessControlTestResource Load (0.5ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = $1 LIMIT 1 [["id", 3]] + AccessControlTestAccessor Load (0.4ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = $1 LIMIT 1 [["id", 3]] + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 3 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "bla"]] +  (14.7ms) COMMIT +  (0.1ms) BEGIN + SQL (0.2ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "ze"]] +  (20.3ms) COMMIT +  (0.1ms) BEGIN + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'some tested member role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_some_tested_member_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.3ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_some_tested_member_role"], ["name", "some tested member role"], ["permissions", "---\n- bli\n"], ["system", false]] +  (16.6ms) COMMIT + RoleAssignment Load (0.3ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 4 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 5 AND "access_control_test_role_assignments"."resource_id" = 4 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.1ms) BEGIN + Role Load (0.2ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 5 LIMIT 1 + AccessControlTestAccessor Load (0.2ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 4 LIMIT 1 + SQL (0.2ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 4], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 4], ["resource_type", "AccessControlTestResource"], ["role_id", 5]] + AccessControlTestResource Load (0.2ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 4 LIMIT 1 +  (17.2ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (21.6ms) DROP TABLE "access_control_test_roles" +  (225.5ms) CREATE TABLE "access_control_test_roles" ("id" serial primary key, "name" character varying(255), "permissions" character varying(255), "key" character varying(255), "system" boolean DEFAULT 'f', "environment_id" integer)  +  (22.5ms) DROP TABLE "access_control_test_role_assignments" +  (175.9ms) CREATE TABLE "access_control_test_role_assignments" ("id" serial primary key, "role_id" integer, "accessor_id" integer, "accessor_type" character varying(255), "resource_id" integer, "resource_type" character varying(255), "is_global" boolean)  +  (20.3ms) DROP TABLE "access_control_test_accessors" +  (99.9ms) CREATE TABLE "access_control_test_accessors" ("id" serial primary key, "name" character varying(255))  +  (23.4ms) DROP TABLE "access_control_test_resources" +  (112.1ms) CREATE TABLE "access_control_test_resources" ("id" serial primary key, "name" character varying(255))  +  (0.5ms) SELECT version FROM "schema_migrations" +  (0.1ms) BEGIN + SQL (0.7ms) INSERT INTO "access_control_test_accessors" ("name") VALUES ($1) RETURNING "id" [["name", "other_user"]] +  (59.3ms) COMMIT +  (0.2ms) BEGIN + Role Exists (1.1ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."name" = 'other_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + Role Exists (0.3ms) SELECT 1 AS one FROM "access_control_test_roles" WHERE ("access_control_test_roles"."key" = 'profile_other_role' AND "access_control_test_roles"."environment_id" IS NULL) LIMIT 1 + SQL (0.7ms) INSERT INTO "access_control_test_roles" ("environment_id", "key", "name", "permissions", "system") VALUES ($1, $2, $3, $4, $5) RETURNING "id" [["environment_id", nil], ["key", "profile_other_role"], ["name", "other_role"], ["permissions", "---\n- do_some_stuff\n"], ["system", false]] +  (13.8ms) COMMIT +  (0.1ms) BEGIN + SQL (0.9ms) INSERT INTO "access_control_test_resources" ("name") VALUES ($1) RETURNING "id" [["name", "some_resource"]] +  (19.0ms) COMMIT + RoleAssignment Load (0.6ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' AND "access_control_test_role_assignments"."role_id" = 1 AND "access_control_test_role_assignments"."resource_id" = 1 AND "access_control_test_role_assignments"."resource_type" = 'AccessControlTestResource' +  (0.2ms) BEGIN + Role Load (0.5ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" = 1 LIMIT 1 + AccessControlTestAccessor Load (0.6ms) SELECT "access_control_test_accessors".* FROM "access_control_test_accessors" WHERE "access_control_test_accessors"."id" = 1 LIMIT 1 + SQL (0.8ms) INSERT INTO "access_control_test_role_assignments" ("accessor_id", "accessor_type", "is_global", "resource_id", "resource_type", "role_id") VALUES ($1, $2, $3, $4, $5, $6) RETURNING "id" [["accessor_id", 1], ["accessor_type", "AccessControlTestAccessor"], ["is_global", nil], ["resource_id", 1], ["resource_type", "AccessControlTestResource"], ["role_id", 1]] + AccessControlTestResource Load (0.3ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" = 1 LIMIT 1 +  (13.3ms) COMMIT +  (0.1ms) BEGIN +  (0.1ms) COMMIT +  (0.1ms) BEGIN +  (0.2ms) COMMIT + RoleAssignment Load (0.4ms) SELECT "access_control_test_role_assignments".* FROM "access_control_test_role_assignments" WHERE "access_control_test_role_assignments"."accessor_id" = 1 AND "access_control_test_role_assignments"."accessor_type" = 'AccessControlTestAccessor' + AccessControlTestResource Load (0.4ms) SELECT "access_control_test_resources".* FROM "access_control_test_resources" WHERE "access_control_test_resources"."id" IN (1) + Role Load (0.3ms) SELECT "access_control_test_roles".* FROM "access_control_test_roles" WHERE "access_control_test_roles"."id" IN (1) diff --git a/vendor/plugins/access_control/test/role_assignment_test.rb b/vendor/plugins/access_control/test/role_assignment_test.rb index 75d6ff7..a933e79 100644 --- a/vendor/plugins/access_control/test/role_assignment_test.rb +++ b/vendor/plugins/access_control/test/role_assignment_test.rb @@ -1,27 +1,32 @@ require File.dirname(__FILE__) + '/test_helper' class RoleAssignmentTest < Test::Unit::TestCase - + + def setup + RoleAssignment.attr_accessible :is_global, :role, :accessor, :resource + end + def test_has_global_permission role = Role.create(:name => 'new_role', :permissions => ['permission']) - ra = RoleAssignment.create(:role => role, :is_global => true) + ra = RoleAssignment.create(:role_id => role.id, :is_global => true) assert ra.has_permission?('permission', 'global') assert !ra.has_permission?('not_permitted', 'global') end def test_has_global_permission_with_global_resource role = Role.create(:name => 'new_role', :permissions => ['permission']) - ra = RoleAssignment.create(:role => role, :is_global => true) + accessor = AccessControlTestAccessor.create(:name => 'accessor') + ra = RoleAssignment.create!(:role => role, :is_global => true, :accessor => accessor) assert ra.has_permission?('permission', 'global') assert !ra.has_permission?('not_permitted', 'global') end def test_has_specific_permission role = Role.create(:name => 'new_role', :permissions => ['permission']) - accessor = AccessControlTestAccessor.create(:name => 'accessor') - resource_A = AccessControlTestResource.create(:name => 'Resource A') - resource_B = AccessControlTestResource.create(:name => 'Resource B') - ra = RoleAssignment.create(:accessor => accessor, :role => role, :resource => resource_A) + accessor = AccessControlTestAccessor.create!(:name => 'accessor') + resource_A = AccessControlTestResource.create!(:name => 'Resource A') + resource_B = AccessControlTestResource.create!(:name => 'Resource B') + ra = RoleAssignment.create!(:accessor => accessor, :role => role, :resource => resource_A) assert !ra.new_record? assert_equal role, ra.role assert_equal accessor, ra.accessor diff --git a/vendor/plugins/access_control/test/role_test.rb b/vendor/plugins/access_control/test/role_test.rb index e93803c..7775d4c 100644 --- a/vendor/plugins/access_control/test/role_test.rb +++ b/vendor/plugins/access_control/test/role_test.rb @@ -4,6 +4,8 @@ require File.join(File.dirname(__FILE__), 'test_helper') class RoleTest < Test::Unit::TestCase def setup + RoleAssignment.attr_accessible :role, :accessor + Role.attr_accessible :system Role.delete_all end @@ -23,7 +25,7 @@ class RoleTest < Test::Unit::TestCase def test_uniqueness_of_key Role.create!(:name => 'unique key', :key => 'my_key') role = Role.new(:key => 'my_key'); role.valid? - assert role.errors.invalid?(:key) + assert role.errors.include?(:key) end def test_permission_setting diff --git a/vendor/plugins/access_control/test/test_helper.rb b/vendor/plugins/access_control/test/test_helper.rb index c9233e3..cacf278 100644 --- a/vendor/plugins/access_control/test/test_helper.rb +++ b/vendor/plugins/access_control/test/test_helper.rb @@ -5,7 +5,7 @@ require 'test/unit' require 'mocha' # from Rails -require 'test_help' +require 'rails/test_help' # load the database schema for the tests ActiveRecord::Base.logger = Logger.new(File.dirname(__FILE__) + "/debug.log") @@ -18,6 +18,7 @@ RoleAssignment.set_table_name 'access_control_test_role_assignments' class AccessControlTestAccessor < ActiveRecord::Base set_table_name 'access_control_test_accessors' acts_as_accessor + attr_accessible :name def cache_keys(arg) [] end @@ -31,6 +32,8 @@ class AccessControlTestResource < ActiveRecord::Base set_table_name 'access_control_test_resources' acts_as_accessible PERMISSIONS[self.class.name] = {'bla' => N_('Bla')} + + attr_accessible :name end # controller to test protection -- libgit2 0.21.2