devise-bootstrap 0.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +17 -0
- data/Gemfile +31 -0
- data/LICENSE.txt +22 -0
- data/README.md +29 -0
- data/Rakefile +1 -0
- data/app/controllers/devise/confirmations_controller.rb +47 -0
- data/app/controllers/devise/omniauth_callbacks_controller.rb +30 -0
- data/app/controllers/devise/passwords_controller.rb +70 -0
- data/app/controllers/devise/registrations_controller.rb +137 -0
- data/app/controllers/devise/sessions_controller.rb +53 -0
- data/app/controllers/devise/unlocks_controller.rb +46 -0
- data/app/controllers/devise_controller.rb +176 -0
- data/app/helpers/devise_helper.rb +25 -0
- data/app/mailers/devise/mailer.rb +20 -0
- data/app/views/devise/confirmations/new.html.erb +12 -0
- data/app/views/devise/mailer/confirmation_instructions.html.erb +5 -0
- data/app/views/devise/mailer/reset_password_instructions.html.erb +8 -0
- data/app/views/devise/mailer/unlock_instructions.html.erb +7 -0
- data/app/views/devise/passwords/edit.html.erb +16 -0
- data/app/views/devise/passwords/new.html.erb +12 -0
- data/app/views/devise/registrations/edit.html.erb +29 -0
- data/app/views/devise/registrations/new.html.erb +18 -0
- data/app/views/devise/sessions/new.html.erb +17 -0
- data/app/views/devise/shared/_links.erb +25 -0
- data/app/views/devise/unlocks/new.html.erb +12 -0
- data/config/locales/en.yml +59 -0
- data/devise-bootstrap.gemspec +30 -0
- data/gemfiles/Gemfile.rails-3.2-stable +29 -0
- data/gemfiles/Gemfile.rails-4.0-stable +29 -0
- data/gemfiles/Gemfile.rails-head +29 -0
- data/lib/devise/bootstrap.rb +7 -0
- data/lib/devise/bootstrap/version.rb +5 -0
- data/lib/devise/devise.rb +491 -0
- data/lib/devise/devise/controllers/helpers.rb +213 -0
- data/lib/devise/devise/controllers/rememberable.rb +47 -0
- data/lib/devise/devise/controllers/scoped_views.rb +17 -0
- data/lib/devise/devise/controllers/sign_in_out.rb +103 -0
- data/lib/devise/devise/controllers/store_location.rb +50 -0
- data/lib/devise/devise/controllers/url_helpers.rb +67 -0
- data/lib/devise/devise/delegator.rb +16 -0
- data/lib/devise/devise/failure_app.rb +205 -0
- data/lib/devise/devise/hooks/activatable.rb +11 -0
- data/lib/devise/devise/hooks/csrf_cleaner.rb +5 -0
- data/lib/devise/devise/hooks/forgetable.rb +9 -0
- data/lib/devise/devise/hooks/lockable.rb +7 -0
- data/lib/devise/devise/hooks/proxy.rb +21 -0
- data/lib/devise/devise/hooks/rememberable.rb +7 -0
- data/lib/devise/devise/hooks/timeoutable.rb +28 -0
- data/lib/devise/devise/hooks/trackable.rb +9 -0
- data/lib/devise/devise/mailers/helpers.rb +90 -0
- data/lib/devise/devise/mapping.rb +172 -0
- data/lib/devise/devise/models.rb +119 -0
- data/lib/devise/devise/models/authenticatable.rb +284 -0
- data/lib/devise/devise/models/confirmable.rb +295 -0
- data/lib/devise/devise/models/database_authenticatable.rb +164 -0
- data/lib/devise/devise/models/lockable.rb +196 -0
- data/lib/devise/devise/models/omniauthable.rb +27 -0
- data/lib/devise/devise/models/recoverable.rb +131 -0
- data/lib/devise/devise/models/registerable.rb +25 -0
- data/lib/devise/devise/models/rememberable.rb +129 -0
- data/lib/devise/devise/models/timeoutable.rb +49 -0
- data/lib/devise/devise/models/trackable.rb +35 -0
- data/lib/devise/devise/models/validatable.rb +66 -0
- data/lib/devise/devise/modules.rb +28 -0
- data/lib/devise/devise/omniauth.rb +28 -0
- data/lib/devise/devise/omniauth/config.rb +45 -0
- data/lib/devise/devise/omniauth/url_helpers.rb +18 -0
- data/lib/devise/devise/orm/active_record.rb +3 -0
- data/lib/devise/devise/orm/mongoid.rb +3 -0
- data/lib/devise/devise/parameter_filter.rb +40 -0
- data/lib/devise/devise/parameter_sanitizer.rb +99 -0
- data/lib/devise/devise/rails.rb +56 -0
- data/lib/devise/devise/rails/routes.rb +496 -0
- data/lib/devise/devise/rails/warden_compat.rb +22 -0
- data/lib/devise/devise/strategies/authenticatable.rb +167 -0
- data/lib/devise/devise/strategies/base.rb +20 -0
- data/lib/devise/devise/strategies/database_authenticatable.rb +23 -0
- data/lib/devise/devise/strategies/rememberable.rb +55 -0
- data/lib/devise/devise/test_helpers.rb +132 -0
- data/lib/devise/devise/time_inflector.rb +14 -0
- data/lib/devise/devise/token_generator.rb +70 -0
- data/lib/devise/devise/version.rb +3 -0
- data/lib/devise/generators/active_record/devise_generator.rb +73 -0
- data/lib/devise/generators/active_record/templates/migration.rb +18 -0
- data/lib/devise/generators/active_record/templates/migration_existing.rb +25 -0
- data/lib/devise/generators/devise/devise_generator.rb +26 -0
- data/lib/devise/generators/devise/install_generator.rb +29 -0
- data/lib/devise/generators/devise/orm_helpers.rb +51 -0
- data/lib/devise/generators/devise/views_generator.rb +135 -0
- data/lib/devise/generators/mongoid/devise_generator.rb +55 -0
- data/lib/devise/generators/templates/README +35 -0
- data/lib/devise/generators/templates/devise.rb +260 -0
- data/lib/devise/generators/templates/markerb/confirmation_instructions.markerb +5 -0
- data/lib/devise/generators/templates/markerb/reset_password_instructions.markerb +8 -0
- data/lib/devise/generators/templates/markerb/unlock_instructions.markerb +7 -0
- data/lib/devise/generators/templates/simple_form_for/confirmations/new.html.erb +16 -0
- data/lib/devise/generators/templates/simple_form_for/passwords/edit.html.erb +19 -0
- data/lib/devise/generators/templates/simple_form_for/passwords/new.html.erb +15 -0
- data/lib/devise/generators/templates/simple_form_for/registrations/edit.html.erb +27 -0
- data/lib/devise/generators/templates/simple_form_for/registrations/new.html.erb +17 -0
- data/lib/devise/generators/templates/simple_form_for/sessions/new.html.erb +15 -0
- data/lib/devise/generators/templates/simple_form_for/unlocks/new.html.erb +16 -0
- metadata +250 -0
|
@@ -0,0 +1,164 @@
|
|
|
1
|
+
require 'devise/strategies/database_authenticatable'
|
|
2
|
+
require 'bcrypt'
|
|
3
|
+
|
|
4
|
+
module Devise
|
|
5
|
+
# Digests the password using bcrypt.
|
|
6
|
+
def self.bcrypt(klass, password)
|
|
7
|
+
::BCrypt::Password.create("#{password}#{klass.pepper}", cost: klass.stretches).to_s
|
|
8
|
+
end
|
|
9
|
+
|
|
10
|
+
module Models
|
|
11
|
+
# Authenticatable Module, responsible for encrypting password and validating
|
|
12
|
+
# authenticity of a user while signing in.
|
|
13
|
+
#
|
|
14
|
+
# == Options
|
|
15
|
+
#
|
|
16
|
+
# DatabaseAuthenticable adds the following options to devise_for:
|
|
17
|
+
#
|
|
18
|
+
# * +pepper+: a random string used to provide a more secure hash. Use
|
|
19
|
+
# `rake secret` to generate new keys.
|
|
20
|
+
#
|
|
21
|
+
# * +stretches+: the cost given to bcrypt.
|
|
22
|
+
#
|
|
23
|
+
# == Examples
|
|
24
|
+
#
|
|
25
|
+
# User.find(1).valid_password?('password123') # returns true/false
|
|
26
|
+
#
|
|
27
|
+
module DatabaseAuthenticatable
|
|
28
|
+
extend ActiveSupport::Concern
|
|
29
|
+
|
|
30
|
+
included do
|
|
31
|
+
attr_reader :password, :current_password
|
|
32
|
+
attr_accessor :password_confirmation
|
|
33
|
+
end
|
|
34
|
+
|
|
35
|
+
def self.required_fields(klass)
|
|
36
|
+
[:encrypted_password] + klass.authentication_keys
|
|
37
|
+
end
|
|
38
|
+
|
|
39
|
+
# Generates password encryption based on the given value.
|
|
40
|
+
def password=(new_password)
|
|
41
|
+
@password = new_password
|
|
42
|
+
self.encrypted_password = password_digest(@password) if @password.present?
|
|
43
|
+
end
|
|
44
|
+
|
|
45
|
+
# Verifies whether an password (ie from sign in) is the user password.
|
|
46
|
+
def valid_password?(password)
|
|
47
|
+
return false if encrypted_password.blank?
|
|
48
|
+
bcrypt = ::BCrypt::Password.new(encrypted_password)
|
|
49
|
+
password = ::BCrypt::Engine.hash_secret("#{password}#{self.class.pepper}", bcrypt.salt)
|
|
50
|
+
Devise.secure_compare(password, encrypted_password)
|
|
51
|
+
end
|
|
52
|
+
|
|
53
|
+
# Set password and password confirmation to nil
|
|
54
|
+
def clean_up_passwords
|
|
55
|
+
self.password = self.password_confirmation = nil
|
|
56
|
+
end
|
|
57
|
+
|
|
58
|
+
# Update record attributes when :current_password matches, otherwise
|
|
59
|
+
# returns error on :current_password.
|
|
60
|
+
#
|
|
61
|
+
# This method also rejects the password field if it is blank (allowing
|
|
62
|
+
# users to change relevant information like the e-mail without changing
|
|
63
|
+
# their password). In case the password field is rejected, the confirmation
|
|
64
|
+
# is also rejected as long as it is also blank.
|
|
65
|
+
def update_with_password(params, *options)
|
|
66
|
+
current_password = params.delete(:current_password)
|
|
67
|
+
|
|
68
|
+
if params[:password].blank?
|
|
69
|
+
params.delete(:password)
|
|
70
|
+
params.delete(:password_confirmation) if params[:password_confirmation].blank?
|
|
71
|
+
end
|
|
72
|
+
|
|
73
|
+
result = if valid_password?(current_password)
|
|
74
|
+
update_attributes(params, *options)
|
|
75
|
+
else
|
|
76
|
+
self.assign_attributes(params, *options)
|
|
77
|
+
self.valid?
|
|
78
|
+
self.errors.add(:current_password, current_password.blank? ? :blank : :invalid)
|
|
79
|
+
false
|
|
80
|
+
end
|
|
81
|
+
|
|
82
|
+
clean_up_passwords
|
|
83
|
+
result
|
|
84
|
+
end
|
|
85
|
+
|
|
86
|
+
# Updates record attributes without asking for the current password.
|
|
87
|
+
# Never allows a change to the current password. If you are using this
|
|
88
|
+
# method, you should probably override this method to protect other
|
|
89
|
+
# attributes you would not like to be updated without a password.
|
|
90
|
+
#
|
|
91
|
+
# Example:
|
|
92
|
+
#
|
|
93
|
+
# def update_without_password(params, *options)
|
|
94
|
+
# params.delete(:email)
|
|
95
|
+
# super(params)
|
|
96
|
+
# end
|
|
97
|
+
#
|
|
98
|
+
def update_without_password(params, *options)
|
|
99
|
+
params.delete(:password)
|
|
100
|
+
params.delete(:password_confirmation)
|
|
101
|
+
|
|
102
|
+
result = update_attributes(params, *options)
|
|
103
|
+
clean_up_passwords
|
|
104
|
+
result
|
|
105
|
+
end
|
|
106
|
+
|
|
107
|
+
# Destroy record when :current_password matches, otherwise returns
|
|
108
|
+
# error on :current_password. It also automatically rejects
|
|
109
|
+
# :current_password if it is blank.
|
|
110
|
+
def destroy_with_password(current_password)
|
|
111
|
+
result = if valid_password?(current_password)
|
|
112
|
+
destroy
|
|
113
|
+
else
|
|
114
|
+
self.valid?
|
|
115
|
+
self.errors.add(:current_password, current_password.blank? ? :blank : :invalid)
|
|
116
|
+
false
|
|
117
|
+
end
|
|
118
|
+
|
|
119
|
+
result
|
|
120
|
+
end
|
|
121
|
+
|
|
122
|
+
# A callback initiated after successfully authenticating. This can be
|
|
123
|
+
# used to insert your own logic that is only run after the user successfully
|
|
124
|
+
# authenticates.
|
|
125
|
+
#
|
|
126
|
+
# Example:
|
|
127
|
+
#
|
|
128
|
+
# def after_database_authentication
|
|
129
|
+
# self.update_attribute(:invite_code, nil)
|
|
130
|
+
# end
|
|
131
|
+
#
|
|
132
|
+
def after_database_authentication
|
|
133
|
+
end
|
|
134
|
+
|
|
135
|
+
# A reliable way to expose the salt regardless of the implementation.
|
|
136
|
+
def authenticatable_salt
|
|
137
|
+
encrypted_password[0,29] if encrypted_password
|
|
138
|
+
end
|
|
139
|
+
|
|
140
|
+
protected
|
|
141
|
+
|
|
142
|
+
# Digests the password using bcrypt. Custom encryption should override
|
|
143
|
+
# this method to apply their own algorithm.
|
|
144
|
+
#
|
|
145
|
+
# See https://github.com/plataformatec/devise-encryptable for examples
|
|
146
|
+
# of other encryption engines.
|
|
147
|
+
def password_digest(password)
|
|
148
|
+
Devise.bcrypt(self.class, password)
|
|
149
|
+
end
|
|
150
|
+
|
|
151
|
+
module ClassMethods
|
|
152
|
+
Devise::Models.config(self, :pepper, :stretches)
|
|
153
|
+
|
|
154
|
+
# We assume this method already gets the sanitized values from the
|
|
155
|
+
# DatabaseAuthenticatable strategy. If you are using this method on
|
|
156
|
+
# your own, be sure to sanitize the conditions hash to only include
|
|
157
|
+
# the proper fields.
|
|
158
|
+
def find_for_database_authentication(conditions)
|
|
159
|
+
find_for_authentication(conditions)
|
|
160
|
+
end
|
|
161
|
+
end
|
|
162
|
+
end
|
|
163
|
+
end
|
|
164
|
+
end
|
|
@@ -0,0 +1,196 @@
|
|
|
1
|
+
require "devise/hooks/lockable"
|
|
2
|
+
|
|
3
|
+
module Devise
|
|
4
|
+
module Models
|
|
5
|
+
# Handles blocking a user access after a certain number of attempts.
|
|
6
|
+
# Lockable accepts two different strategies to unlock a user after it's
|
|
7
|
+
# blocked: email and time. The former will send an email to the user when
|
|
8
|
+
# the lock happens, containing a link to unlock its account. The second
|
|
9
|
+
# will unlock the user automatically after some configured time (ie 2.hours).
|
|
10
|
+
# It's also possible to setup lockable to use both email and time strategies.
|
|
11
|
+
#
|
|
12
|
+
# == Options
|
|
13
|
+
#
|
|
14
|
+
# Lockable adds the following options to +devise+:
|
|
15
|
+
#
|
|
16
|
+
# * +maximum_attempts+: how many attempts should be accepted before blocking the user.
|
|
17
|
+
# * +lock_strategy+: lock the user account by :failed_attempts or :none.
|
|
18
|
+
# * +unlock_strategy+: unlock the user account by :time, :email, :both or :none.
|
|
19
|
+
# * +unlock_in+: the time you want to lock the user after to lock happens. Only available when unlock_strategy is :time or :both.
|
|
20
|
+
# * +unlock_keys+: the keys you want to use when locking and unlocking an account
|
|
21
|
+
#
|
|
22
|
+
module Lockable
|
|
23
|
+
extend ActiveSupport::Concern
|
|
24
|
+
|
|
25
|
+
delegate :lock_strategy_enabled?, :unlock_strategy_enabled?, to: "self.class"
|
|
26
|
+
|
|
27
|
+
def self.required_fields(klass)
|
|
28
|
+
attributes = []
|
|
29
|
+
attributes << :failed_attempts if klass.lock_strategy_enabled?(:failed_attempts)
|
|
30
|
+
attributes << :locked_at if klass.unlock_strategy_enabled?(:time)
|
|
31
|
+
attributes << :unlock_token if klass.unlock_strategy_enabled?(:email)
|
|
32
|
+
|
|
33
|
+
attributes
|
|
34
|
+
end
|
|
35
|
+
|
|
36
|
+
# Lock a user setting its locked_at to actual time.
|
|
37
|
+
# * +opts+: Hash options if you don't want to send email
|
|
38
|
+
# when you lock access, you could pass the next hash
|
|
39
|
+
# `{ send_instructions: false } as option`.
|
|
40
|
+
def lock_access!(opts = { })
|
|
41
|
+
self.locked_at = Time.now.utc
|
|
42
|
+
|
|
43
|
+
if unlock_strategy_enabled?(:email) && opts.fetch(:send_instructions, true)
|
|
44
|
+
send_unlock_instructions
|
|
45
|
+
else
|
|
46
|
+
save(validate: false)
|
|
47
|
+
end
|
|
48
|
+
end
|
|
49
|
+
|
|
50
|
+
# Unlock a user by cleaning locked_at and failed_attempts.
|
|
51
|
+
def unlock_access!
|
|
52
|
+
self.locked_at = nil
|
|
53
|
+
self.failed_attempts = 0 if respond_to?(:failed_attempts=)
|
|
54
|
+
self.unlock_token = nil if respond_to?(:unlock_token=)
|
|
55
|
+
save(validate: false)
|
|
56
|
+
end
|
|
57
|
+
|
|
58
|
+
# Verifies whether a user is locked or not.
|
|
59
|
+
def access_locked?
|
|
60
|
+
!!locked_at && !lock_expired?
|
|
61
|
+
end
|
|
62
|
+
|
|
63
|
+
# Send unlock instructions by email
|
|
64
|
+
def send_unlock_instructions
|
|
65
|
+
raw, enc = Devise.token_generator.generate(self.class, :unlock_token)
|
|
66
|
+
self.unlock_token = enc
|
|
67
|
+
self.save(validate: false)
|
|
68
|
+
send_devise_notification(:unlock_instructions, raw, {})
|
|
69
|
+
raw
|
|
70
|
+
end
|
|
71
|
+
|
|
72
|
+
# Resend the unlock instructions if the user is locked.
|
|
73
|
+
def resend_unlock_instructions
|
|
74
|
+
if_access_locked { send_unlock_instructions }
|
|
75
|
+
end
|
|
76
|
+
|
|
77
|
+
# Overwrites active_for_authentication? from Devise::Models::Activatable for locking purposes
|
|
78
|
+
# by verifying whether a user is active to sign in or not based on locked?
|
|
79
|
+
def active_for_authentication?
|
|
80
|
+
super && !access_locked?
|
|
81
|
+
end
|
|
82
|
+
|
|
83
|
+
# Overwrites invalid_message from Devise::Models::Authenticatable to define
|
|
84
|
+
# the correct reason for blocking the sign in.
|
|
85
|
+
def inactive_message
|
|
86
|
+
access_locked? ? :locked : super
|
|
87
|
+
end
|
|
88
|
+
|
|
89
|
+
# Overwrites valid_for_authentication? from Devise::Models::Authenticatable
|
|
90
|
+
# for verifying whether a user is allowed to sign in or not. If the user
|
|
91
|
+
# is locked, it should never be allowed.
|
|
92
|
+
def valid_for_authentication?
|
|
93
|
+
return super unless persisted? && lock_strategy_enabled?(:failed_attempts)
|
|
94
|
+
|
|
95
|
+
# Unlock the user if the lock is expired, no matter
|
|
96
|
+
# if the user can login or not (wrong password, etc)
|
|
97
|
+
unlock_access! if lock_expired?
|
|
98
|
+
|
|
99
|
+
if super && !access_locked?
|
|
100
|
+
true
|
|
101
|
+
else
|
|
102
|
+
self.failed_attempts ||= 0
|
|
103
|
+
self.failed_attempts += 1
|
|
104
|
+
if attempts_exceeded?
|
|
105
|
+
lock_access! unless access_locked?
|
|
106
|
+
else
|
|
107
|
+
save(validate: false)
|
|
108
|
+
end
|
|
109
|
+
false
|
|
110
|
+
end
|
|
111
|
+
end
|
|
112
|
+
|
|
113
|
+
def unauthenticated_message
|
|
114
|
+
# If set to paranoid mode, do not show the locked message because it
|
|
115
|
+
# leaks the existence of an account.
|
|
116
|
+
if Devise.paranoid
|
|
117
|
+
super
|
|
118
|
+
elsif lock_strategy_enabled?(:failed_attempts) && last_attempt?
|
|
119
|
+
:last_attempt
|
|
120
|
+
elsif lock_strategy_enabled?(:failed_attempts) && attempts_exceeded?
|
|
121
|
+
:locked
|
|
122
|
+
else
|
|
123
|
+
super
|
|
124
|
+
end
|
|
125
|
+
end
|
|
126
|
+
|
|
127
|
+
protected
|
|
128
|
+
|
|
129
|
+
def attempts_exceeded?
|
|
130
|
+
self.failed_attempts >= self.class.maximum_attempts
|
|
131
|
+
end
|
|
132
|
+
|
|
133
|
+
def last_attempt?
|
|
134
|
+
self.failed_attempts == self.class.maximum_attempts - 1
|
|
135
|
+
end
|
|
136
|
+
|
|
137
|
+
# Tells if the lock is expired if :time unlock strategy is active
|
|
138
|
+
def lock_expired?
|
|
139
|
+
if unlock_strategy_enabled?(:time)
|
|
140
|
+
locked_at && locked_at < self.class.unlock_in.ago
|
|
141
|
+
else
|
|
142
|
+
false
|
|
143
|
+
end
|
|
144
|
+
end
|
|
145
|
+
|
|
146
|
+
# Checks whether the record is locked or not, yielding to the block
|
|
147
|
+
# if it's locked, otherwise adds an error to email.
|
|
148
|
+
def if_access_locked
|
|
149
|
+
if access_locked?
|
|
150
|
+
yield
|
|
151
|
+
else
|
|
152
|
+
self.errors.add(Devise.unlock_keys.first, :not_locked)
|
|
153
|
+
false
|
|
154
|
+
end
|
|
155
|
+
end
|
|
156
|
+
|
|
157
|
+
module ClassMethods
|
|
158
|
+
# Attempt to find a user by its unlock keys. If a record is found, send new
|
|
159
|
+
# unlock instructions to it. If not user is found, returns a new user
|
|
160
|
+
# with an email not found error.
|
|
161
|
+
# Options must contain the user's unlock keys
|
|
162
|
+
def send_unlock_instructions(attributes={})
|
|
163
|
+
lockable = find_or_initialize_with_errors(unlock_keys, attributes, :not_found)
|
|
164
|
+
lockable.resend_unlock_instructions if lockable.persisted?
|
|
165
|
+
lockable
|
|
166
|
+
end
|
|
167
|
+
|
|
168
|
+
# Find a user by its unlock token and try to unlock it.
|
|
169
|
+
# If no user is found, returns a new user with an error.
|
|
170
|
+
# If the user is not locked, creates an error for the user
|
|
171
|
+
# Options must have the unlock_token
|
|
172
|
+
def unlock_access_by_token(unlock_token)
|
|
173
|
+
original_token = unlock_token
|
|
174
|
+
unlock_token = Devise.token_generator.digest(self, :unlock_token, unlock_token)
|
|
175
|
+
|
|
176
|
+
lockable = find_or_initialize_with_error_by(:unlock_token, unlock_token)
|
|
177
|
+
lockable.unlock_access! if lockable.persisted?
|
|
178
|
+
lockable.unlock_token = original_token
|
|
179
|
+
lockable
|
|
180
|
+
end
|
|
181
|
+
|
|
182
|
+
# Is the unlock enabled for the given unlock strategy?
|
|
183
|
+
def unlock_strategy_enabled?(strategy)
|
|
184
|
+
[:both, strategy].include?(self.unlock_strategy)
|
|
185
|
+
end
|
|
186
|
+
|
|
187
|
+
# Is the lock enabled for the given lock strategy?
|
|
188
|
+
def lock_strategy_enabled?(strategy)
|
|
189
|
+
self.lock_strategy == strategy
|
|
190
|
+
end
|
|
191
|
+
|
|
192
|
+
Devise::Models.config(self, :maximum_attempts, :lock_strategy, :unlock_strategy, :unlock_in, :unlock_keys)
|
|
193
|
+
end
|
|
194
|
+
end
|
|
195
|
+
end
|
|
196
|
+
end
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
require 'devise/omniauth'
|
|
2
|
+
|
|
3
|
+
module Devise
|
|
4
|
+
module Models
|
|
5
|
+
# Adds OmniAuth support to your model.
|
|
6
|
+
#
|
|
7
|
+
# == Options
|
|
8
|
+
#
|
|
9
|
+
# Oauthable adds the following options to devise_for:
|
|
10
|
+
#
|
|
11
|
+
# * +omniauth_providers+: Which providers are available to this model. It expects an array:
|
|
12
|
+
#
|
|
13
|
+
# devise_for :database_authenticatable, :omniauthable, omniauth_providers: [:twitter]
|
|
14
|
+
#
|
|
15
|
+
module Omniauthable
|
|
16
|
+
extend ActiveSupport::Concern
|
|
17
|
+
|
|
18
|
+
def self.required_fields(klass)
|
|
19
|
+
[]
|
|
20
|
+
end
|
|
21
|
+
|
|
22
|
+
module ClassMethods
|
|
23
|
+
Devise::Models.config(self, :omniauth_providers)
|
|
24
|
+
end
|
|
25
|
+
end
|
|
26
|
+
end
|
|
27
|
+
end
|
|
@@ -0,0 +1,131 @@
|
|
|
1
|
+
module Devise
|
|
2
|
+
module Models
|
|
3
|
+
|
|
4
|
+
# Recoverable takes care of resetting the user password and send reset instructions.
|
|
5
|
+
#
|
|
6
|
+
# ==Options
|
|
7
|
+
#
|
|
8
|
+
# Recoverable adds the following options to devise_for:
|
|
9
|
+
#
|
|
10
|
+
# * +reset_password_keys+: the keys you want to use when recovering the password for an account
|
|
11
|
+
#
|
|
12
|
+
# == Examples
|
|
13
|
+
#
|
|
14
|
+
# # resets the user password and save the record, true if valid passwords are given, otherwise false
|
|
15
|
+
# User.find(1).reset_password!('password123', 'password123')
|
|
16
|
+
#
|
|
17
|
+
# # only resets the user password, without saving the record
|
|
18
|
+
# user = User.find(1)
|
|
19
|
+
# user.reset_password('password123', 'password123')
|
|
20
|
+
#
|
|
21
|
+
# # creates a new token and send it with instructions about how to reset the password
|
|
22
|
+
# User.find(1).send_reset_password_instructions
|
|
23
|
+
#
|
|
24
|
+
module Recoverable
|
|
25
|
+
extend ActiveSupport::Concern
|
|
26
|
+
|
|
27
|
+
def self.required_fields(klass)
|
|
28
|
+
[:reset_password_sent_at, :reset_password_token]
|
|
29
|
+
end
|
|
30
|
+
|
|
31
|
+
# Update password saving the record and clearing token. Returns true if
|
|
32
|
+
# the passwords are valid and the record was saved, false otherwise.
|
|
33
|
+
def reset_password!(new_password, new_password_confirmation)
|
|
34
|
+
self.password = new_password
|
|
35
|
+
self.password_confirmation = new_password_confirmation
|
|
36
|
+
|
|
37
|
+
if valid?
|
|
38
|
+
clear_reset_password_token
|
|
39
|
+
after_password_reset
|
|
40
|
+
end
|
|
41
|
+
|
|
42
|
+
save
|
|
43
|
+
end
|
|
44
|
+
|
|
45
|
+
# Resets reset password token and send reset password instructions by email.
|
|
46
|
+
# Returns the token sent in the e-mail.
|
|
47
|
+
def send_reset_password_instructions
|
|
48
|
+
raw, enc = Devise.token_generator.generate(self.class, :reset_password_token)
|
|
49
|
+
|
|
50
|
+
self.reset_password_token = enc
|
|
51
|
+
self.reset_password_sent_at = Time.now.utc
|
|
52
|
+
self.save(validate: false)
|
|
53
|
+
|
|
54
|
+
send_devise_notification(:reset_password_instructions, raw, {})
|
|
55
|
+
raw
|
|
56
|
+
end
|
|
57
|
+
|
|
58
|
+
# Checks if the reset password token sent is within the limit time.
|
|
59
|
+
# We do this by calculating if the difference between today and the
|
|
60
|
+
# sending date does not exceed the confirm in time configured.
|
|
61
|
+
# Returns true if the resource is not responding to reset_password_sent_at at all.
|
|
62
|
+
# reset_password_within is a model configuration, must always be an integer value.
|
|
63
|
+
#
|
|
64
|
+
# Example:
|
|
65
|
+
#
|
|
66
|
+
# # reset_password_within = 1.day and reset_password_sent_at = today
|
|
67
|
+
# reset_password_period_valid? # returns true
|
|
68
|
+
#
|
|
69
|
+
# # reset_password_within = 5.days and reset_password_sent_at = 4.days.ago
|
|
70
|
+
# reset_password_period_valid? # returns true
|
|
71
|
+
#
|
|
72
|
+
# # reset_password_within = 5.days and reset_password_sent_at = 5.days.ago
|
|
73
|
+
# reset_password_period_valid? # returns false
|
|
74
|
+
#
|
|
75
|
+
# # reset_password_within = 0.days
|
|
76
|
+
# reset_password_period_valid? # will always return false
|
|
77
|
+
#
|
|
78
|
+
def reset_password_period_valid?
|
|
79
|
+
reset_password_sent_at && reset_password_sent_at.utc >= self.class.reset_password_within.ago
|
|
80
|
+
end
|
|
81
|
+
|
|
82
|
+
protected
|
|
83
|
+
|
|
84
|
+
# Removes reset_password token
|
|
85
|
+
def clear_reset_password_token
|
|
86
|
+
self.reset_password_token = nil
|
|
87
|
+
self.reset_password_sent_at = nil
|
|
88
|
+
end
|
|
89
|
+
|
|
90
|
+
def after_password_reset
|
|
91
|
+
end
|
|
92
|
+
|
|
93
|
+
module ClassMethods
|
|
94
|
+
# Attempt to find a user by its email. If a record is found, send new
|
|
95
|
+
# password instructions to it. If user is not found, returns a new user
|
|
96
|
+
# with an email not found error.
|
|
97
|
+
# Attributes must contain the user's email
|
|
98
|
+
def send_reset_password_instructions(attributes={})
|
|
99
|
+
recoverable = find_or_initialize_with_errors(reset_password_keys, attributes, :not_found)
|
|
100
|
+
recoverable.send_reset_password_instructions if recoverable.persisted?
|
|
101
|
+
recoverable
|
|
102
|
+
end
|
|
103
|
+
|
|
104
|
+
# Attempt to find a user by its reset_password_token to reset its
|
|
105
|
+
# password. If a user is found and token is still valid, reset its password and automatically
|
|
106
|
+
# try saving the record. If not user is found, returns a new user
|
|
107
|
+
# containing an error in reset_password_token attribute.
|
|
108
|
+
# Attributes must contain reset_password_token, password and confirmation
|
|
109
|
+
def reset_password_by_token(attributes={})
|
|
110
|
+
original_token = attributes[:reset_password_token]
|
|
111
|
+
reset_password_token = Devise.token_generator.digest(self, :reset_password_token, original_token)
|
|
112
|
+
|
|
113
|
+
recoverable = find_or_initialize_with_error_by(:reset_password_token, reset_password_token)
|
|
114
|
+
|
|
115
|
+
if recoverable.persisted?
|
|
116
|
+
if recoverable.reset_password_period_valid?
|
|
117
|
+
recoverable.reset_password!(attributes[:password], attributes[:password_confirmation])
|
|
118
|
+
else
|
|
119
|
+
recoverable.errors.add(:reset_password_token, :expired)
|
|
120
|
+
end
|
|
121
|
+
end
|
|
122
|
+
|
|
123
|
+
recoverable.reset_password_token = original_token
|
|
124
|
+
recoverable
|
|
125
|
+
end
|
|
126
|
+
|
|
127
|
+
Devise::Models.config(self, :reset_password_keys, :reset_password_within)
|
|
128
|
+
end
|
|
129
|
+
end
|
|
130
|
+
end
|
|
131
|
+
end
|