devise_invitable
Invitation tool
Adds support to Devise for sending invitations by email with password setting
An invitation strategy for devise
3k stars
38 watching
552 forks
Language: Ruby
last commit: 2 months ago
Linked from 1 awesome list
deviseinvitationrailsruby
Related projects:
Repository | Description | Stars |
---|---|---|
json-schema-faker/json-schema-faker | Provides consistent and meaningful fake data for systems using JSON Schema | 3,301 |
faker-ruby/faker | A library for generating fake data such as names, addresses, and phone numbers. | 11,290 |
fakerphp/faker | Generates fake data for testing and development purposes. | 3,642 |
dius/java-faker | Generates fake data for testing and development purposes | 4,785 |
emanueleminotto/fakerserviceprovider | A service provider for generating fake data in web applications using the Faker library | 16 |
faker-js/faker | Generates realistic fake data in JavaScript for testing and development purposes | 13,181 |
danibram/mocker-data-generator | Generates fake data based on predefined schemas and random data generators | 429 |
jhipster/generator-jhipster | A development platform to generate and deploy modern web applications using various frameworks and tools. | 21,622 |
unclecheese/silverstripe-mock-dataobjects | A module providing intelligent content generation and mock data functionality for DataObjects in a PHP-based content management system. | 18 |
willdurand/bazingafakerbundle | Generates fake data for PHP models using the Faker library | 276 |
elixirs/faker | Generates fake data for testing and development purposes. | 1,086 |
rust-ethereum/ethabi | Encodes and decodes function calls and their output in smart contracts | 518 |
dhensby/silverstripe-masquerade | A module to allow users to impersonate other users in a web application without changing passwords or requiring workarounds. | 16 |
gesjeremie/faker-elixir | Generates fake data for testing and seeding databases in Elixir applications. | 148 |
ben0xa/honeycreds | Detects network credential injection attempts by simulating legitimate credentials | 215 |