jobshop 0.0.163 → 0.0.167

Sign up to get free protection for your applications and to get access to all the features.
Files changed (90) hide show
  1. checksums.yaml +5 -5
  2. data/README.md +3 -3
  3. data/Rakefile +8 -17
  4. data/app/controllers/jobshop/application_controller.rb +5 -4
  5. data/app/controllers/jobshop/places_controller.rb +0 -4
  6. data/app/controllers/jobshop/users_controller.rb +0 -3
  7. data/app/mailers/jobshop/application_mailer.rb +0 -2
  8. data/app/mailers/jobshop/rfq_responder_mailer.rb +18 -0
  9. data/app/models/jobshop/ability.rb +1 -1
  10. data/app/models/jobshop/customer.rb +30 -0
  11. data/app/models/jobshop/customer/category.rb +19 -0
  12. data/app/models/jobshop/customer/contact.rb +28 -0
  13. data/app/models/jobshop/employee.rb +46 -0
  14. data/app/models/jobshop/employment.rb +25 -0
  15. data/app/models/jobshop/employment_version.rb +10 -0
  16. data/app/models/jobshop/inspection/boolean_criterion.rb +2 -2
  17. data/app/models/jobshop/inspection/deviation_criterion.rb +4 -4
  18. data/app/models/jobshop/inspection/limit_criterion.rb +6 -4
  19. data/app/models/jobshop/inspection/report.rb +2 -0
  20. data/app/models/jobshop/inspection/result.rb +2 -2
  21. data/app/models/jobshop/mailman.rb +22 -0
  22. data/app/models/jobshop/order.rb +2 -6
  23. data/app/models/jobshop/order_line.rb +2 -3
  24. data/app/models/jobshop/organization.rb +15 -6
  25. data/app/models/jobshop/place.rb +2 -0
  26. data/app/models/jobshop/product.rb +0 -3
  27. data/app/models/jobshop/rfq.rb +12 -6
  28. data/app/models/jobshop/user.rb +2 -17
  29. data/app/views/jobshop/rfq_responder_mailer/verified_contact.html.erb +5 -0
  30. data/app/views/jobshop/rfq_responder_mailer/verified_contact.text.erb +3 -0
  31. data/app/views/layouts/jobshop/application.html.haml +15 -0
  32. data/app/views/layouts/jobshop/mailer.html.erb +13 -0
  33. data/config/initializers/devise.rb +290 -0
  34. data/config/locales/devise.en.yml +64 -0
  35. data/config/routes.rb +1 -2
  36. data/db/migrate/20170311194758_initialize_jobshop.rb +42 -2
  37. data/db/migrate/20171216021339_create_organizations.rb +1 -4
  38. data/db/migrate/20171216021400_create_employees.rb +47 -0
  39. data/db/migrate/20171216021554_create_people.rb +13 -18
  40. data/db/migrate/20171216021853_create_customers.rb +57 -0
  41. data/db/migrate/20171216022020_create_places.rb +8 -9
  42. data/db/migrate/20171216022135_create_products.rb +6 -13
  43. data/db/migrate/20171216022605_create_orders.rb +19 -36
  44. data/db/migrate/20171216023018_create_roles.rb +5 -3
  45. data/db/migrate/20171216035357_create_things.rb +4 -4
  46. data/db/migrate/20171219022118_create_routing_processes.rb +15 -15
  47. data/db/migrate/20180107203241_create_inspections.rb +15 -14
  48. data/db/migrate/20181117023949_create_rfqs.rb +27 -19
  49. data/db/migrate/20181118014603_create_mailmen.rb +6 -4
  50. data/db/seeds.rb +126 -0
  51. data/lib/generators/jobshop/app/app_generator.rb +1 -1
  52. data/lib/generators/jobshop/app/templates/Procfile.tt +1 -0
  53. data/lib/generators/jobshop/app/templates/config/database.yml.tt +5 -5
  54. data/lib/generators/jobshop/{dummy/dummy_generator.rb → canary/canary_generator.rb} +13 -14
  55. data/lib/generators/jobshop/{dummy → canary}/templates/config/boot.rb.tt +0 -0
  56. data/lib/jobshop.rb +41 -12
  57. data/lib/jobshop/cli.rb +16 -82
  58. data/lib/jobshop/cli/app_generator.rb +38 -0
  59. data/lib/jobshop/cli/application.rb +14 -0
  60. data/lib/jobshop/cli/canary.rb +52 -0
  61. data/lib/jobshop/configuration.rb +16 -11
  62. data/lib/jobshop/engine.rb +39 -28
  63. data/lib/jobshop/helpers/migration.rb +78 -2
  64. data/lib/jobshop/mailroom/base_handler.rb +33 -0
  65. data/lib/jobshop/mailroom/null_handler.rb +10 -0
  66. data/lib/jobshop/mailroom/postmaster.rb +77 -0
  67. data/lib/jobshop/mailroom/rfq_handler.rb +39 -0
  68. data/lib/jobshop/version.rb +3 -1
  69. data/lib/tasks/jobshop_tasks.rake +7 -6
  70. metadata +98 -69
  71. data/app/controllers/concerns/email_token_validation.rb +0 -59
  72. data/app/controllers/concerns/jobshop/authentication_handler.rb +0 -15
  73. data/app/controllers/concerns/jobshop/authorization_handler.rb +0 -29
  74. data/app/controllers/jobshop/session_activations_controller.rb +0 -13
  75. data/app/controllers/jobshop/sessions_controller.rb +0 -20
  76. data/app/email_handlers/jobshop/rfq_handler.rb +0 -43
  77. data/app/models/jobshop/company.rb +0 -35
  78. data/app/models/jobshop/company/type.rb +0 -17
  79. data/app/models/jobshop/company_person.rb +0 -15
  80. data/app/models/jobshop/person.rb +0 -30
  81. data/app/models/jobshop/session_activation.rb +0 -30
  82. data/app/serializers/jobshop/test_user_serializer.rb +0 -10
  83. data/app/services/jobshop/authentication_service.rb +0 -20
  84. data/app/services/jobshop/authorization_service.rb +0 -30
  85. data/app/services/jobshop/jwt_service.rb +0 -17
  86. data/db/migrate/20171216021853_create_companies.rb +0 -64
  87. data/db/migrate/20171216023022_create_sessions.rb +0 -23
  88. data/lib/jobshop/cli/spinner.rb +0 -21
  89. data/lib/jobshop/dummy_app.rb +0 -190
  90. data/lib/jobshop/postmaster.rb +0 -89
@@ -1,5 +1,9 @@
1
1
  # frozen_string_literals: true
2
2
 
3
+ # +Jobshop::Mailman+
4
+ #
5
+ # A Mailman is responsible for handling incoming email and dispatching it to its
6
+ # approrpriate handler. If no handler is found, the email is rejected.
3
7
  module Jobshop
4
8
  class Mailman < ApplicationRecord
5
9
  self.primary_keys = %i[ organization_id address ]
@@ -7,5 +11,23 @@ module Jobshop
7
11
  belongs_to :organization, inverse_of: :mailmen
8
12
 
9
13
  validates :address, presence: true
14
+
15
+ class << self
16
+ def handler_for(message)
17
+ to = Mail::Address.new(message.to.first)
18
+
19
+ mailbox = to.local.split("+").first
20
+ address = "#{mailbox}@#{to.domain}"
21
+ mailman = find_by(address: address)
22
+
23
+ klass = if mailman
24
+ mailman.handler_type.constantize
25
+ else
26
+ Mailroom::NullHandler
27
+ end
28
+
29
+ klass.new(message, mailman)
30
+ end
31
+ end
10
32
  end
11
33
  end
@@ -6,13 +6,9 @@ module Jobshop
6
6
 
7
7
  after_initialize { self.order_id ||= SecureRandom.uuid if new_record? }
8
8
 
9
- belongs_to :organization, inverse_of: :orders
9
+ belongs_to :organization, -> { readonly }, inverse_of: :orders
10
10
 
11
- belongs_to :created_by, class_name: "Jobshop::Person",
12
- foreign_key: %i[ organization_id created_by_id ]
13
-
14
- belongs_to :company, inverse_of: :orders,
15
- foreign_key: %i[ organization_id company_id ]
11
+ belongs_to :customer, foreign_key: %i[ organization_id customer_id ]
16
12
 
17
13
  has_many :order_lines, inverse_of: :order,
18
14
  foreign_key: %i[ organization_id order_id ]
@@ -4,10 +4,9 @@ module Jobshop
4
4
  class OrderLine < ApplicationRecord
5
5
  self.primary_keys = %i[ organization_id order_id order_line_id ]
6
6
 
7
- belongs_to :organization
7
+ after_initialize { self.order_line_id ||= SecureRandom.hex if new_record? }
8
8
 
9
- belongs_to :created_by, class_name: "Jobshop::Person",
10
- foreign_key: %i[ organization_id created_by_id ]
9
+ belongs_to :organization
11
10
 
12
11
  belongs_to :order, inverse_of: :order_lines,
13
12
  foreign_key: %i[ organization_id order_id ]
@@ -7,12 +7,22 @@ module Jobshop
7
7
  has_many :collections, inverse_of: :organization,
8
8
  dependent: :restrict_with_exception
9
9
 
10
- has_many :companies, inverse_of: :organization,
10
+ has_many :customers, inverse_of: :organization,
11
11
  dependent: :restrict_with_exception
12
12
 
13
- has_many :company_types, inverse_of: :organization,
13
+ has_many :customer_categories, inverse_of: :organization,
14
14
  dependent: :restrict_with_exception,
15
- class_name: "Jobshop::Company::Type"
15
+ class_name: "Jobshop::Customer::Category"
16
+
17
+ has_many :customer_contacts, inverse_of: :organization,
18
+ dependent: :restrict_with_exception,
19
+ class_name: "Jobshop::Customer::Contact"
20
+
21
+ has_many :employees, -> { merge(Jobshop::Employee.active) },
22
+ inverse_of: :organization, dependent: :restrict_with_exception
23
+
24
+ has_many :employments, inverse_of: :organization,
25
+ dependent: :restrict_with_exception
16
26
 
17
27
  has_many :inspection_reports, inverse_of: :organization,
18
28
  dependent: :restrict_with_exception,
@@ -24,9 +34,6 @@ module Jobshop
24
34
  has_many :orders, inverse_of: :organization,
25
35
  dependent: :restrict_with_exception
26
36
 
27
- has_many :people, inverse_of: :organization,
28
- dependent: :restrict_with_exception
29
-
30
37
  has_many :places, inverse_of: :organization,
31
38
  dependent: :restrict_with_exception
32
39
 
@@ -48,6 +55,7 @@ module Jobshop
48
55
  has_many :users, inverse_of: :organization,
49
56
  dependent: :restrict_with_exception
50
57
 
58
+ =begin
51
59
  scope :grouped_by_email, ->(email_addresses) {
52
60
  Jobshop::User
53
61
  .where(email: email_addresses)
@@ -57,5 +65,6 @@ module Jobshop
57
65
  (organizations[user.email] ||= []) << user.organization
58
66
  }
59
67
  }
68
+ =end
60
69
  end
61
70
  end
@@ -4,6 +4,8 @@ module Jobshop
4
4
  class Place < ApplicationRecord
5
5
  self.primary_keys = %i[ organization_id place_id ]
6
6
 
7
+ after_initialize { self.place_id ||= SecureRandom.hex if new_record? }
8
+
7
9
  belongs_to :organization, inverse_of: :places
8
10
 
9
11
  validates :name,
@@ -8,9 +8,6 @@ module Jobshop
8
8
 
9
9
  belongs_to :organization, inverse_of: :products
10
10
 
11
- belongs_to :created_by, class_name: "Jobshop::Person",
12
- foreign_key: %i[ organization_id created_by_id ]
13
-
14
11
  has_one :routing_process, inverse_of: :product,
15
12
  foreign_key: %i[ organization_id product_id ]
16
13
 
@@ -4,19 +4,25 @@ module Jobshop
4
4
  class RFQ < ApplicationRecord
5
5
  self.primary_keys = %i[ organization_id rfq_id ]
6
6
 
7
- before_validation(on: :create) { self.rfq_id ||= SecureRandom.uuid }
7
+ after_initialize { self.rfq_id ||= SecureRandom.uuid if new_record? }
8
+ after_create { reload }
8
9
 
9
10
  belongs_to :organization, inverse_of: :rfqs
10
11
 
11
- belongs_to :company, inverse_of: :rfqs, optional: true,
12
- foreign_key: %i[ organization_id company_id ]
12
+ belongs_to :customer, inverse_of: :rfqs, optional: true,
13
+ foreign_key: %i[ organization_id customer_id ]
14
+
15
+ belongs_to :requested_by, class_name: "Jobshop::Customer::Contact",
16
+ primary_key: %i[ organization_id customer_id contact_id ],
17
+ foreign_key: %i[ organization_id customer_id requested_by_id ],
18
+ optional: true
13
19
 
14
20
  has_many :rfq_lines, inverse_of: :rfq,
15
21
  foreign_key: %i[ organization_id rfq_id ]
16
22
 
17
- def company=(value)
18
- company_id = (Jobshop::Company === value) ? value.company_id : value
19
- write_attribute(:company_id, company_id)
23
+ def customer=(value)
24
+ customer_id = (Jobshop::Customer === value) ? value.customer_id : value
25
+ write_attribute(:customer_id, customer_id)
20
26
  end
21
27
  end
22
28
  end
@@ -13,33 +13,18 @@ module Jobshop
13
13
 
14
14
  has_many :roles, through: :role_assignments
15
15
 
16
- has_many :sessions, inverse_of: :user, dependent: :destroy,
17
- foreign_key: %i[ organization_id user_id ]
18
-
19
16
  validates :email,
20
17
  presence: { if: :email_required? },
21
18
  format: { if: :email_required?, with: /\A[^@\s]+@[^@\s]+\z/ },
22
19
  uniqueness: { if: :email_changed?, scope: :organization_id, case_sensitive: false }
23
20
 
24
- validates :password_digest, presence: true
21
+ validates :encrypted_password, presence: true
25
22
 
26
23
  validates :password,
27
24
  presence: { if: :password_required? },
28
25
  confirmation: { if: :password_required? }
29
26
 
30
- has_secure_password
31
-
32
- def activate_session
33
- session_activations.activate(SecureRandom.hex).activation_token
34
- end
35
-
36
- def exclusive_session(id)
37
- session_activations.exclusive(id)
38
- end
39
-
40
- def session_active?(id)
41
- session_activations.active?(id)
42
- end
27
+ devise :database_authenticatable
43
28
 
44
29
  private
45
30
  def password_required?
@@ -0,0 +1,5 @@
1
+ <h1>RFQResponder#verified_contact</h1>
2
+
3
+ <p>
4
+ <%= @greeting %>, find me in app/views/jobshop/rfq_responder_mailer/verified_contact.html.erb
5
+ </p>
@@ -0,0 +1,3 @@
1
+ RFQResponder#verified_contactasf
2
+
3
+ <%= @greeting %>, find me in app/views/jobshop/rfq_responder_mailer/verified_contact.text.erb
@@ -0,0 +1,15 @@
1
+ !!!
2
+ %html{ lang: "en" }
3
+ %head
4
+ %meta(charset="UTF-8")
5
+ %meta(http-equiv="X-UA-Compatible" content="IE=edge")
6
+ %meta(name="viewport" content="width=device-width, initial-scale=1.0")
7
+
8
+ %title Jobshop
9
+
10
+ =# stylesheet_link_tag "jobshop/application", media: "all", "data-turbolinks-track": "reload"
11
+ =# javascript_include_tag "jobshop/application", "data-turbolinks-track": "reload"
12
+ = csrf_meta_tags
13
+
14
+ %body{ class: :body_class }
15
+ = content_for?(:body) ? yield(:body) : yield
@@ -0,0 +1,13 @@
1
+ <!DOCTYPE html>
2
+ <html>
3
+ <head>
4
+ <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
5
+ <style>
6
+ /* Email styles need to be inline */
7
+ </style>
8
+ </head>
9
+
10
+ <body>
11
+ <%= yield %>
12
+ </body>
13
+ </html>
@@ -0,0 +1,290 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Use this hook to configure devise mailer, warden hooks and so forth.
4
+ # Many of these configuration options can be set straight in your model.
5
+ Devise.setup do |config|
6
+ # The secret key used by Devise. Devise uses this key to generate
7
+ # random tokens. Changing this key will render invalid all existing
8
+ # confirmation, reset password and unlock tokens in the database.
9
+ # Devise will use the `secret_key_base` as its `secret_key`
10
+ # by default. You can change it below and use your own secret key.
11
+ config.secret_key = SecureRandom.hex(64)
12
+
13
+ # ==> Controller configuration
14
+ # Configure the parent class to the devise controllers.
15
+ config.parent_controller = "Jobshop::ApplicationController"
16
+
17
+ # ==> Mailer Configuration
18
+ # Configure the e-mail address which will be shown in Devise::Mailer,
19
+ # note that it will be overwritten if you use your own mailer class
20
+ # with default "from" parameter.
21
+ config.mailer_sender = "noreply@jobshop.test"
22
+
23
+ # Configure the class responsible to send e-mails.
24
+ # config.mailer = 'Devise::Mailer'
25
+
26
+ # Configure the parent class responsible to send e-mails.
27
+ # config.parent_mailer = 'ActionMailer::Base'
28
+
29
+ # ==> ORM configuration
30
+ # Load and configure the ORM. Supports :active_record (default) and
31
+ # :mongoid (bson_ext recommended) by default. Other ORMs may be
32
+ # available as additional gems.
33
+ require "devise/orm/active_record"
34
+
35
+ # ==> Configuration for any authentication mechanism
36
+ # Configure which keys are used when authenticating a user. The default is
37
+ # just :email. You can configure it to use [:username, :subdomain], so for
38
+ # authenticating a user, both parameters are required. Remember that those
39
+ # parameters are used only when authenticating and not when retrieving from
40
+ # session. If you need permissions, you should implement that in a before filter.
41
+ # You can also supply a hash where the value is a boolean determining whether
42
+ # or not authentication should be aborted when the value is not present.
43
+ # config.authentication_keys = [:email]
44
+
45
+ # Configure parameters from the request object used for authentication. Each entry
46
+ # given should be a request method and it will automatically be passed to the
47
+ # find_for_authentication method and considered in your model lookup. For instance,
48
+ # if you set :request_keys to [:subdomain], :subdomain will be used on authentication.
49
+ # The same considerations mentioned for authentication_keys also apply to request_keys.
50
+ # config.request_keys = []
51
+
52
+ # Configure which authentication keys should be case-insensitive.
53
+ # These keys will be downcased upon creating or modifying a user and when used
54
+ # to authenticate or find a user. Default is :email.
55
+ config.case_insensitive_keys = [:email]
56
+
57
+ # Configure which authentication keys should have whitespace stripped.
58
+ # These keys will have whitespace before and after removed upon creating or
59
+ # modifying a user and when used to authenticate or find a user. Default is :email.
60
+ config.strip_whitespace_keys = [:email]
61
+
62
+ # Tell if authentication through request.params is enabled. True by default.
63
+ # It can be set to an array that will enable params authentication only for the
64
+ # given strategies, for example, `config.params_authenticatable = [:database]` will
65
+ # enable it only for database (email + password) authentication.
66
+ # config.params_authenticatable = true
67
+
68
+ # Tell if authentication through HTTP Auth is enabled. False by default.
69
+ # It can be set to an array that will enable http authentication only for the
70
+ # given strategies, for example, `config.http_authenticatable = [:database]` will
71
+ # enable it only for database authentication. The supported strategies are:
72
+ # :database = Support basic authentication with authentication key + password
73
+ # config.http_authenticatable = false
74
+
75
+ # If 401 status code should be returned for AJAX requests. True by default.
76
+ # config.http_authenticatable_on_xhr = true
77
+
78
+ # The realm used in Http Basic Authentication. 'Application' by default.
79
+ # config.http_authentication_realm = 'Application'
80
+
81
+ # It will change confirmation, password recovery and other workflows
82
+ # to behave the same regardless if the e-mail provided was right or wrong.
83
+ # Does not affect registerable.
84
+ # config.paranoid = true
85
+
86
+ # By default Devise will store the user in session. You can skip storage for
87
+ # particular strategies by setting this option.
88
+ # Notice that if you are skipping storage for all authentication paths, you
89
+ # may want to disable generating routes to Devise's sessions controller by
90
+ # passing skip: :sessions to `devise_for` in your config/routes.rb
91
+ config.skip_session_storage = [ :http_auth ]
92
+
93
+ # By default, Devise cleans up the CSRF token on authentication to
94
+ # avoid CSRF token fixation attacks. This means that, when using AJAX
95
+ # requests for sign in and sign up, you need to get a new CSRF token
96
+ # from the server. You can disable this option at your own risk.
97
+ # config.clean_up_csrf_token_on_authentication = true
98
+
99
+ # When false, Devise will not attempt to reload routes on eager load.
100
+ # This can reduce the time taken to boot the app but if your application
101
+ # requires the Devise mappings to be loaded during boot time the application
102
+ # won't boot properly.
103
+ # config.reload_routes = true
104
+
105
+ # ==> Configuration for :database_authenticatable
106
+ # For bcrypt, this is the cost for hashing the password and defaults to 11. If
107
+ # using other algorithms, it sets how many times you want the password to be hashed.
108
+ #
109
+ # Limiting the stretches to just one in testing will increase the performance of
110
+ # your test suite dramatically. However, it is STRONGLY RECOMMENDED to not use
111
+ # a value less than 10 in other environments. Note that, for bcrypt (the default
112
+ # algorithm), the cost increases exponentially with the number of stretches (e.g.
113
+ # a value of 20 is already extremely slow: approx. 60 seconds for 1 calculation).
114
+ config.stretches = Rails.env.test? ? 1 : 11
115
+
116
+ # Set up a pepper to generate the hashed password.
117
+ # config.pepper = 'b01590d70ea710efb1e564f5a44bc66a5bdd4ba3a135a9703a8fb3a7a2ca336639f7821f270815ab272f0dde6897e8478e0dc987a58f4e5d4889813499f3c193'
118
+
119
+ # Send a notification to the original email when the user's email is changed.
120
+ # config.send_email_changed_notification = false
121
+
122
+ # Send a notification email when the user's password is changed.
123
+ # config.send_password_change_notification = false
124
+
125
+ # ==> Configuration for :confirmable
126
+ # A period that the user is allowed to access the website even without
127
+ # confirming their account. For instance, if set to 2.days, the user will be
128
+ # able to access the website for two days without confirming their account,
129
+ # access will be blocked just in the third day. Default is 0.days, meaning
130
+ # the user cannot access the website without confirming their account.
131
+ # config.allow_unconfirmed_access_for = 2.days
132
+
133
+ # A period that the user is allowed to confirm their account before their
134
+ # token becomes invalid. For example, if set to 3.days, the user can confirm
135
+ # their account within 3 days after the mail was sent, but on the fourth day
136
+ # their account can't be confirmed with the token any more.
137
+ # Default is nil, meaning there is no restriction on how long a user can take
138
+ # before confirming their account.
139
+ # config.confirm_within = 3.days
140
+
141
+ # If true, requires any email changes to be confirmed (exactly the same way as
142
+ # initial account confirmation) to be applied. Requires additional unconfirmed_email
143
+ # db field (see migrations). Until confirmed, new email is stored in
144
+ # unconfirmed_email column, and copied to email column on successful confirmation.
145
+ config.reconfirmable = true
146
+
147
+ # Defines which key will be used when confirming an account
148
+ # config.confirmation_keys = [:email]
149
+
150
+ # ==> Configuration for :rememberable
151
+ # The time the user will be remembered without asking for credentials again.
152
+ # config.remember_for = 2.weeks
153
+
154
+ # Invalidates all the remember me tokens when the user signs out.
155
+ config.expire_all_remember_me_on_sign_out = true
156
+
157
+ # If true, extends the user's remember period when remembered via cookie.
158
+ # config.extend_remember_period = false
159
+
160
+ # Options to be passed to the created cookie. For instance, you can set
161
+ # secure: true in order to force SSL only cookies.
162
+ # config.rememberable_options = {}
163
+
164
+ # ==> Configuration for :validatable
165
+ # Range for password length.
166
+ config.password_length = 6..128
167
+
168
+ # Email regex used to validate email formats. It simply asserts that
169
+ # one (and only one) @ exists in the given string. This is mainly
170
+ # to give user feedback and not to assert the e-mail validity.
171
+ config.email_regexp = /\A[^@\s]+@[^@\s]+\z/
172
+
173
+ # ==> Configuration for :timeoutable
174
+ # The time you want to timeout the user session without activity. After this
175
+ # time the user will be asked for credentials again. Default is 30 minutes.
176
+ # config.timeout_in = 30.minutes
177
+
178
+ # ==> Configuration for :lockable
179
+ # Defines which strategy will be used to lock an account.
180
+ # :failed_attempts = Locks an account after a number of failed attempts to sign in.
181
+ # :none = No lock strategy. You should handle locking by yourself.
182
+ # config.lock_strategy = :failed_attempts
183
+
184
+ # Defines which key will be used when locking and unlocking an account
185
+ # config.unlock_keys = [:email]
186
+
187
+ # Defines which strategy will be used to unlock an account.
188
+ # :email = Sends an unlock link to the user email
189
+ # :time = Re-enables login after a certain amount of time (see :unlock_in below)
190
+ # :both = Enables both strategies
191
+ # :none = No unlock strategy. You should handle unlocking by yourself.
192
+ # config.unlock_strategy = :both
193
+
194
+ # Number of authentication tries before locking an account if lock_strategy
195
+ # is failed attempts.
196
+ # config.maximum_attempts = 20
197
+
198
+ # Time interval to unlock the account if :time is enabled as unlock_strategy.
199
+ # config.unlock_in = 1.hour
200
+
201
+ # Warn on the last attempt before the account is locked.
202
+ # config.last_attempt_warning = true
203
+
204
+ # ==> Configuration for :recoverable
205
+ #
206
+ # Defines which key will be used when recovering the password for an account
207
+ # config.reset_password_keys = [:email]
208
+
209
+ # Time interval you can reset your password with a reset password key.
210
+ # Don't put a too small interval or your users won't have the time to
211
+ # change their passwords.
212
+ config.reset_password_within = 6.hours
213
+
214
+ # When set to false, does not sign a user in automatically after their password is
215
+ # reset. Defaults to true, so a user is signed in automatically after a reset.
216
+ # config.sign_in_after_reset_password = true
217
+
218
+ # ==> Configuration for :encryptable
219
+ # Allow you to use another hashing or encryption algorithm besides bcrypt (default).
220
+ # You can use :sha1, :sha512 or algorithms from others authentication tools as
221
+ # :clearance_sha1, :authlogic_sha512 (then you should set stretches above to 20
222
+ # for default behavior) and :restful_authentication_sha1 (then you should set
223
+ # stretches to 10, and copy REST_AUTH_SITE_KEY to pepper).
224
+ #
225
+ # Require the `devise-encryptable` gem when using anything other than bcrypt
226
+ # config.encryptor = :sha512
227
+
228
+ # ==> Scopes configuration
229
+ # Turn scoped views on. Before rendering "sessions/new", it will first check for
230
+ # "users/sessions/new". It's turned off by default because it's slower if you
231
+ # are using only default views.
232
+ config.scoped_views = true
233
+
234
+ # Configure the default scope given to Warden. By default it's the first
235
+ # devise role declared in your routes (usually :user).
236
+ # config.default_scope = :user
237
+
238
+ # Set this configuration to false if you want /users/sign_out to sign out
239
+ # only the current scope. By default, Devise signs out all scopes.
240
+ # config.sign_out_all_scopes = true
241
+
242
+ # ==> Navigation configuration
243
+ # Lists the formats that should be treated as navigational. Formats like
244
+ # :html, should redirect to the sign in page when the user does not have
245
+ # access, but formats like :xml or :json, should return 401.
246
+ #
247
+ # If you have any extra navigational formats, like :iphone or :mobile, you
248
+ # should add them to the navigational formats lists.
249
+ #
250
+ # The "*/*" below is required to match Internet Explorer requests.
251
+ # config.navigational_formats = ['*/*', :html]
252
+
253
+ # The default HTTP method used to sign out a resource. Default is :delete.
254
+ config.sign_out_via = :delete
255
+
256
+ # ==> OmniAuth
257
+ # Add a new OmniAuth provider. Check the wiki for more information on setting
258
+ # up on your models and hooks.
259
+ # config.omniauth :github, 'APP_ID', 'APP_SECRET', scope: 'user,public_repo'
260
+
261
+ # ==> Warden configuration
262
+ # If you want to use other strategies, that are not supported by Devise, or
263
+ # change the failure app, you can configure them inside the config.warden block.
264
+ #
265
+ # config.warden do |manager|
266
+ # manager.intercept_401 = false
267
+ # manager.default_strategies(scope: :user).unshift :some_external_strategy
268
+ # end
269
+
270
+ # ==> Mountable engine configurations
271
+ # When using Devise inside an engine, let's call it `MyEngine`, and this engine
272
+ # is mountable, there are some extra configurations to be taken into account.
273
+ # The following options are available, assuming the engine is mounted as:
274
+ #
275
+ # mount MyEngine, at: '/my_engine'
276
+ #
277
+ # The router that invoked `devise_for`, in the example above, would be:
278
+ config.router_name = :jobshop
279
+
280
+ # When using OmniAuth, Devise cannot automatically set OmniAuth path,
281
+ # so you need to do it manually. For the users scope, it would be:
282
+ # config.omniauth_path_prefix = '/my_engine/users/auth'
283
+
284
+ # ==> Turbolinks configuration
285
+ # If your app is using Turbolinks, Turbolinks::Controller needs to be included to make redirection work correctly:
286
+ #
287
+ # ActiveSupport.on_load(:devise_failure_app) do
288
+ # include Turbolinks::Controller
289
+ # end
290
+ end