sorcery 0.5.2 → 0.5.3
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of sorcery might be problematic. Click here for more details.
- data/README.rdoc +1 -1
- data/VERSION +1 -1
- data/lib/sorcery/controller.rb +5 -3
- data/lib/sorcery/controller/submodules/activity_logging.rb +10 -6
- data/lib/sorcery/controller/submodules/brute_force_protection.rb +6 -3
- data/lib/sorcery/controller/submodules/http_basic_auth.rb +10 -5
- data/lib/sorcery/controller/submodules/remember_me.rb +13 -4
- data/lib/sorcery/controller/submodules/session_timeout.rb +3 -1
- data/lib/sorcery/crypto_providers/aes256.rb +8 -5
- data/lib/sorcery/crypto_providers/bcrypt.rb +12 -6
- data/lib/sorcery/crypto_providers/sha256.rb +2 -1
- data/lib/sorcery/crypto_providers/sha512.rb +2 -1
- data/lib/sorcery/initializers/initializer.rb +125 -36
- data/lib/sorcery/model.rb +28 -15
- data/lib/sorcery/model/adapters/active_record.rb +2 -2
- data/lib/sorcery/model/adapters/mongoid.rb +2 -2
- data/lib/sorcery/model/submodules/activity_logging.rb +7 -6
- data/lib/sorcery/model/submodules/brute_force_protection.rb +10 -6
- data/lib/sorcery/model/submodules/external.rb +4 -2
- data/lib/sorcery/model/submodules/remember_me.rb +4 -3
- data/lib/sorcery/model/submodules/reset_password.rb +16 -8
- data/lib/sorcery/model/submodules/user_activation.rb +23 -10
- data/lib/sorcery/model/temporary_token.rb +3 -2
- data/lib/sorcery/test_helpers/internal.rb +2 -1
- data/lib/sorcery/test_helpers/internal/rails.rb +5 -1
- data/sorcery.gemspec +16 -2
- data/spec/Gemfile.lock +1 -1
- data/spec/rails3/Gemfile.lock +1 -1
- data/spec/rails3/spec/user_activation_spec.rb +2 -168
- data/spec/rails3/spec/user_activity_logging_spec.rb +2 -30
- data/spec/rails3/spec/user_brute_force_protection_spec.rb +2 -35
- data/spec/rails3/spec/user_oauth_spec.rb +2 -26
- data/spec/rails3/spec/user_remember_me_spec.rb +2 -45
- data/spec/rails3/spec/user_reset_password_spec.rb +3 -168
- data/spec/rails3/spec/user_spec.rb +3 -283
- data/spec/rails3_mongoid/Gemfile.lock +1 -1
- data/spec/rails3_mongoid/app/models/authentication.rb +3 -3
- data/spec/rails3_mongoid/spec/user_activation_spec.rb +2 -171
- data/spec/rails3_mongoid/spec/user_activity_logging_spec.rb +2 -25
- data/spec/rails3_mongoid/spec/user_brute_force_protection_spec.rb +2 -35
- data/spec/rails3_mongoid/spec/user_oauth_spec.rb +2 -28
- data/spec/rails3_mongoid/spec/user_remember_me_spec.rb +2 -45
- data/spec/rails3_mongoid/spec/user_reset_password_spec.rb +2 -176
- data/spec/rails3_mongoid/spec/user_spec.rb +3 -285
- data/spec/shared_examples/user_activation_shared_examples.rb +173 -0
- data/spec/shared_examples/user_activity_logging_shared_examples.rb +27 -0
- data/spec/shared_examples/user_brute_force_protection_shared_examples.rb +37 -0
- data/spec/shared_examples/user_oauth_shared_examples.rb +30 -0
- data/spec/shared_examples/user_remember_me_shared_examples.rb +47 -0
- data/spec/shared_examples/user_reset_password_shared_examples.rb +177 -0
- data/spec/shared_examples/user_shared_examples.rb +292 -0
- data/spec/sinatra/Gemfile.lock +1 -1
- data/spec/sinatra_modular/Gemfile.lock +1 -1
- metadata +16 -2
data/README.rdoc
CHANGED
@@ -29,7 +29,7 @@ Example Rails 3 app using sorcery: https://github.com/NoamB/sorcery-example-app
|
|
29
29
|
|
30
30
|
Example Sinatra app using sorcery: https://github.com/NoamB/sorcery-example-app-sinatra
|
31
31
|
|
32
|
-
Documentation: http://rubydoc.info/gems/sorcery/0.5.
|
32
|
+
Documentation: http://rubydoc.info/gems/sorcery/0.5.3/frames
|
33
33
|
|
34
34
|
Check out the tutorials in the github wiki!
|
35
35
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
0.5.
|
1
|
+
0.5.3
|
data/lib/sorcery/controller.rb
CHANGED
@@ -62,7 +62,8 @@ module Sorcery
|
|
62
62
|
@current_user ||= login_from_session || login_from_other_sources unless @current_user == false
|
63
63
|
end
|
64
64
|
|
65
|
-
# used when a user tries to access a page while logged out, is asked to login,
|
65
|
+
# used when a user tries to access a page while logged out, is asked to login,
|
66
|
+
# and we want to return him back to the page he originally wanted.
|
66
67
|
def redirect_back_or_to(url, flash_hash = {})
|
67
68
|
redirect_to(session[:return_to_url] || url, :flash => flash_hash)
|
68
69
|
end
|
@@ -115,11 +116,12 @@ module Sorcery
|
|
115
116
|
class << self
|
116
117
|
attr_accessor :submodules,
|
117
118
|
|
118
|
-
:user_class, # what class to use as the user class.
|
119
|
+
:user_class, # what class to use as the user class.
|
119
120
|
|
120
121
|
:not_authenticated_action, # what controller action to call for non-authenticated users.
|
121
122
|
|
122
|
-
:save_return_to_url, # when a non logged in user tries to enter a page that requires
|
123
|
+
:save_return_to_url, # when a non logged in user tries to enter a page that requires
|
124
|
+
# login, save the URL he wanted to reach,
|
123
125
|
# and send him there after login.
|
124
126
|
|
125
127
|
:login_sources,
|
@@ -1,13 +1,16 @@
|
|
1
1
|
module Sorcery
|
2
2
|
module Controller
|
3
3
|
module Submodules
|
4
|
-
# This submodule keeps track of events such as login, logout,
|
4
|
+
# This submodule keeps track of events such as login, logout,
|
5
|
+
# and last activity time, per user.
|
5
6
|
# It helps in estimating which users are active now in the site.
|
6
|
-
# This cannot be determined absolutely because a user might be
|
7
|
-
|
8
|
-
# This is the controller part of the submodule, which adds hooks
|
7
|
+
# This cannot be determined absolutely because a user might be
|
8
|
+
# reading a page without clicking anything for a while.
|
9
|
+
# This is the controller part of the submodule, which adds hooks
|
10
|
+
# to register user events,
|
9
11
|
# and methods to collect active users data for use in the app.
|
10
|
-
# see Socery::Model::Submodules::ActivityLogging for configuration
|
12
|
+
# see Socery::Model::Submodules::ActivityLogging for configuration
|
13
|
+
# options.
|
11
14
|
module ActivityLogging
|
12
15
|
def self.included(base)
|
13
16
|
base.send(:include, InstanceMethods)
|
@@ -21,7 +24,8 @@ module Sorcery
|
|
21
24
|
def current_users
|
22
25
|
Config.user_class.current_users
|
23
26
|
# A possible patch here:
|
24
|
-
# we'll add the current_user to the users list if he's not in it
|
27
|
+
# we'll add the current_user to the users list if he's not in it
|
28
|
+
# (can happen when he was inactive for more than activity timeout):
|
25
29
|
#
|
26
30
|
# users.unshift!(current_user) if logged_in? && users.find {|u| u.id == current_user.id}.nil?
|
27
31
|
#
|
@@ -1,9 +1,12 @@
|
|
1
1
|
module Sorcery
|
2
2
|
module Controller
|
3
3
|
module Submodules
|
4
|
-
# This module helps protect user accounts by locking them down after too
|
5
|
-
#
|
6
|
-
#
|
4
|
+
# This module helps protect user accounts by locking them down after too
|
5
|
+
# many failed attemps to login were detected.
|
6
|
+
# This is the controller part of the submodule which takes care of
|
7
|
+
# updating the failed logins and resetting them.
|
8
|
+
# See Sorcery::Model::Submodules::BruteForceProtection for configuration
|
9
|
+
# options.
|
7
10
|
module BruteForceProtection
|
8
11
|
def self.included(base)
|
9
12
|
base.send(:include, InstanceMethods)
|
@@ -2,8 +2,10 @@ module Sorcery
|
|
2
2
|
module Controller
|
3
3
|
module Submodules
|
4
4
|
# This submodule integrates HTTP Basic authentication into sorcery.
|
5
|
-
# You are provided with a before filter, require_login_from_http_basic,
|
6
|
-
#
|
5
|
+
# You are provided with a before filter, require_login_from_http_basic,
|
6
|
+
# which requests the browser for authentication.
|
7
|
+
# Then the rest of the submodule takes care of logging the user in
|
8
|
+
# into the session, so that the next requests will keep him logged in.
|
7
9
|
module HttpBasicAuth
|
8
10
|
def self.included(base)
|
9
11
|
base.send(:include, InstanceMethods)
|
@@ -28,9 +30,12 @@ module Sorcery
|
|
28
30
|
# The method sets a session when requesting the user's credentials.
|
29
31
|
# This is a trick to overcome the way HTTP authentication works (explained below):
|
30
32
|
#
|
31
|
-
# Once the user fills the credentials once, the browser will always send it to the
|
32
|
-
#
|
33
|
-
#
|
33
|
+
# Once the user fills the credentials once, the browser will always send it to the
|
34
|
+
# server when visiting the website, until the browser is closed.
|
35
|
+
# This causes wierd behaviour if the user logs out. The session is reset, yet the
|
36
|
+
# user is re-logged in by the before_filter calling 'login_from_basic_auth'.
|
37
|
+
# To overcome this, we set a session when requesting the password, which logout will
|
38
|
+
# reset, and that's how we know if we need to request for HTTP auth again.
|
34
39
|
def require_login_from_http_basic
|
35
40
|
(request_http_basic_authentication(realm_name_by_controller) and (session[:http_authentication_used] = true) and return) if (request.authorization.nil? || session[:http_authentication_used].nil?)
|
36
41
|
require_login
|
@@ -1,7 +1,8 @@
|
|
1
1
|
module Sorcery
|
2
2
|
module Controller
|
3
3
|
module Submodules
|
4
|
-
# The Remember Me submodule takes care of setting the user's cookie so that he will
|
4
|
+
# The Remember Me submodule takes care of setting the user's cookie so that he will
|
5
|
+
# be automatically logged in to the site on every visit,
|
5
6
|
# until the cookie expires.
|
6
7
|
# See Sorcery::Model::Submodules::RememberMe for configuration options.
|
7
8
|
module RememberMe
|
@@ -16,7 +17,7 @@ module Sorcery
|
|
16
17
|
# This method sets the cookie and calls the user to save the token and the expiration to db.
|
17
18
|
def remember_me!
|
18
19
|
current_user.remember_me!
|
19
|
-
|
20
|
+
set_remember_me_cookie!(current_user)
|
20
21
|
end
|
21
22
|
|
22
23
|
# Clears the cookie and clears the token from the db.
|
@@ -33,17 +34,25 @@ module Sorcery
|
|
33
34
|
remember_me! if credentials.size == 3 && credentials[2]
|
34
35
|
end
|
35
36
|
|
36
|
-
# Checks the cookie for a remember me token, tried to find a user with that token
|
37
|
+
# Checks the cookie for a remember me token, tried to find a user with that token
|
38
|
+
# and logs the user in if found.
|
37
39
|
# Runs as a login source. See 'current_user' method for how it is used.
|
38
40
|
def login_from_cookie
|
39
41
|
user = cookies[:remember_me_token] && Config.user_class.find_by_remember_me_token(cookies[:remember_me_token])
|
40
42
|
if user && user.remember_me_token?
|
41
|
-
|
43
|
+
set_remember_me_cookie!(user)
|
42
44
|
@current_user = user
|
43
45
|
else
|
44
46
|
@current_user = false
|
45
47
|
end
|
46
48
|
end
|
49
|
+
|
50
|
+
def set_remember_me_cookie!(user)
|
51
|
+
cookies[:remember_me_token] = {
|
52
|
+
:value => user.send(user.sorcery_config.remember_me_token_attribute_name),
|
53
|
+
:expires => user.send(user.sorcery_config.remember_me_token_expires_at_attribute_name)
|
54
|
+
}
|
55
|
+
end
|
47
56
|
end
|
48
57
|
|
49
58
|
end
|
@@ -9,7 +9,9 @@ module Sorcery
|
|
9
9
|
Config.module_eval do
|
10
10
|
class << self
|
11
11
|
attr_accessor :session_timeout, # how long in seconds to keep the session alive.
|
12
|
-
|
12
|
+
|
13
|
+
:session_timeout_from_last_action # use the last action as the beginning of session
|
14
|
+
# timeout.
|
13
15
|
|
14
16
|
def merge_session_timeout_defaults!
|
15
17
|
@defaults.merge!(:@session_timeout => 3600, # 1.hour
|
@@ -2,18 +2,21 @@ require "openssl"
|
|
2
2
|
|
3
3
|
module Sorcery
|
4
4
|
module CryptoProviders
|
5
|
-
# This encryption method is reversible if you have the supplied key.
|
5
|
+
# This encryption method is reversible if you have the supplied key.
|
6
|
+
# So in order to use this encryption method you must supply it with a key first.
|
6
7
|
# In an initializer, or before your application initializes, you should do the following:
|
7
8
|
#
|
8
9
|
# Sorcery::Model::ConfigAES256.key = "my 32 bytes long key"
|
9
10
|
#
|
10
|
-
# My final comment is that this is a strong encryption method,
|
11
|
+
# My final comment is that this is a strong encryption method,
|
12
|
+
# but its main weakness is that its reversible. If you do not need to reverse the hash
|
11
13
|
# then you should consider Sha512 or BCrypt instead.
|
12
14
|
#
|
13
15
|
# Keep your key in a safe place, some even say the key should be stored on a separate server.
|
14
|
-
# This won't hurt performance because the only time it will try and access the key on the
|
15
|
-
#
|
16
|
-
#
|
16
|
+
# This won't hurt performance because the only time it will try and access the key on the
|
17
|
+
# separate server is during initialization, which only
|
18
|
+
# happens once. The reasoning behind this is if someone does compromise your server they
|
19
|
+
# won't have the key also. Basically, you don't want to store the key with the lock.
|
17
20
|
class AES256
|
18
21
|
class << self
|
19
22
|
attr_writer :key
|
@@ -2,9 +2,12 @@ require 'bcrypt'
|
|
2
2
|
|
3
3
|
module Sorcery
|
4
4
|
module CryptoProviders
|
5
|
-
# For most apps Sha512 is plenty secure, but if you are building an app that stores nuclear
|
6
|
-
#
|
7
|
-
#
|
5
|
+
# For most apps Sha512 is plenty secure, but if you are building an app that stores nuclear
|
6
|
+
# launch codes you might want to consier BCrypt. This is an extremely
|
7
|
+
# secure hashing algorithm, mainly because it is slow.
|
8
|
+
# A brute force attack on a BCrypt encrypted password would take much longer than a brute force attack on a
|
9
|
+
# password encrypted with a Sha algorithm. Keep in mind you are sacrificing performance by using this,
|
10
|
+
# generating a password takes exponentially longer than any
|
8
11
|
# of the Sha algorithms. I did some benchmarking to save you some time with your decision:
|
9
12
|
#
|
10
13
|
# require "bcrypt"
|
@@ -37,8 +40,10 @@ module Sorcery
|
|
37
40
|
# You are good to go!
|
38
41
|
class BCrypt
|
39
42
|
class << self
|
40
|
-
# This is the :cost option for the BCrpyt library.
|
41
|
-
#
|
43
|
+
# This is the :cost option for the BCrpyt library.
|
44
|
+
# The higher the cost the more secure it is and the longer is take the generate a hash. By default this is 10.
|
45
|
+
# Set this to whatever you want, play around with it to get that perfect balance between
|
46
|
+
# security and performance.
|
42
47
|
def cost
|
43
48
|
@cost ||= 10
|
44
49
|
end
|
@@ -57,7 +62,8 @@ module Sorcery
|
|
57
62
|
hash == join_tokens(tokens)
|
58
63
|
end
|
59
64
|
|
60
|
-
# This method is used as a flag to tell Sorcery to "resave" the password
|
65
|
+
# This method is used as a flag to tell Sorcery to "resave" the password
|
66
|
+
# upon a successful login, using the new cost
|
61
67
|
def cost_matches?(hash)
|
62
68
|
hash = new_from_hash(hash)
|
63
69
|
if hash.nil? || hash == {}
|
@@ -1,7 +1,8 @@
|
|
1
1
|
require "digest/sha2"
|
2
2
|
|
3
3
|
module Sorcery
|
4
|
-
# The activate_sorcery method has a custom_crypto_provider configuration option.
|
4
|
+
# The activate_sorcery method has a custom_crypto_provider configuration option.
|
5
|
+
# This allows you to use any type of encryption you like.
|
5
6
|
# Just create a class with a class level encrypt and matches? method. See example below.
|
6
7
|
#
|
7
8
|
# === Example
|
@@ -1,7 +1,8 @@
|
|
1
1
|
require "digest/sha2"
|
2
2
|
|
3
3
|
module Sorcery
|
4
|
-
# The activate_sorcery method has a custom_crypto_provider configuration option.
|
4
|
+
# The activate_sorcery method has a custom_crypto_provider configuration option.
|
5
|
+
# This allows you to use any type of encryption you like.
|
5
6
|
# Just create a class with a class level encrypt and matches? method. See example below.
|
6
7
|
#
|
7
8
|
# === Example
|
@@ -1,25 +1,35 @@
|
|
1
1
|
# The first thing you need to configure is which modules you need in your app.
|
2
2
|
# The default is nothing which will include only core features (password encryption, login/logout).
|
3
|
-
# Available submodules are: :user_activation, :http_basic_auth, :remember_me,
|
3
|
+
# Available submodules are: :user_activation, :http_basic_auth, :remember_me,
|
4
|
+
# :reset_password, :session_timeout, :brute_force_protection, :activity_logging, :external
|
4
5
|
Rails.application.config.sorcery.submodules = []
|
5
6
|
|
6
7
|
# Here you can configure each submodule's features.
|
7
8
|
Rails.application.config.sorcery.configure do |config|
|
8
9
|
# -- core --
|
9
|
-
# config.not_authenticated_action = :not_authenticated # what controller action to call for
|
10
|
-
|
11
|
-
#
|
10
|
+
# config.not_authenticated_action = :not_authenticated # what controller action to call for
|
11
|
+
# non-authenticated users.
|
12
|
+
# You can also override 'not_authenticated'
|
13
|
+
# instead.
|
14
|
+
|
15
|
+
# config.save_return_to_url = true # when a non logged in user tries to enter
|
16
|
+
# a page that requires login,
|
17
|
+
# save the URL he wanted to reach,
|
18
|
+
# and send him there after login, using
|
19
|
+
# 'redirect_back_or_to'.
|
12
20
|
|
13
21
|
# -- session timeout --
|
14
22
|
# config.session_timeout = 3600 # how long in seconds to keep the session alive.
|
15
|
-
# config.session_timeout_from_last_action = false # use the last action as the beginning of
|
23
|
+
# config.session_timeout_from_last_action = false # use the last action as the beginning of
|
24
|
+
# session timeout.
|
16
25
|
|
17
26
|
# -- http_basic_auth --
|
18
27
|
# config.controller_to_realm_map = {"application" => "Application"} # What realm to display for which controller name.
|
19
28
|
# For example {"My App" => "Application"}
|
20
29
|
|
21
30
|
# -- external --
|
22
|
-
# config.external_providers = [] # What providers are supported by this app,
|
31
|
+
# config.external_providers = [] # What providers are supported by this app,
|
32
|
+
# i.e. [:twitter, :facebook] .
|
23
33
|
#
|
24
34
|
# config.twitter.key = "eYVNBjBDi33aa9GkA3w"
|
25
35
|
# config.twitter.secret = "XpbeSdCoaKSmQGSeokz5qcUATClRW5u08QWNfv71N8"
|
@@ -34,56 +44,135 @@ Rails.application.config.sorcery.configure do |config|
|
|
34
44
|
# --- user config ---
|
35
45
|
config.user_config do |user|
|
36
46
|
# -- core --
|
37
|
-
# user.username_attribute_name = :username # change default username
|
38
|
-
|
47
|
+
# user.username_attribute_name = :username # change default username
|
48
|
+
# attribute, for example,
|
49
|
+
# to use :email as the login.
|
50
|
+
|
51
|
+
# user.password_attribute_name = :password # change *virtual* password
|
52
|
+
# attribute, the one which is used
|
53
|
+
# until an encrypted one is
|
54
|
+
# generated.
|
55
|
+
|
39
56
|
# user.email_attribute_name = :email # change default email attribute.
|
40
|
-
|
41
|
-
# user.
|
57
|
+
|
58
|
+
# user.crypted_password_attribute_name = :crypted_password # change default crypted_password
|
59
|
+
# attribute.
|
60
|
+
|
61
|
+
# user.salt_join_token = "" # what pattern to use to join the
|
62
|
+
# password with the salt
|
63
|
+
|
42
64
|
# user.salt_attribute_name = :salt # change default salt attribute.
|
43
|
-
|
44
|
-
# user.
|
45
|
-
|
46
|
-
|
47
|
-
# user.
|
65
|
+
|
66
|
+
# user.stretches = nil # how many times to apply
|
67
|
+
# encryption to the password.
|
68
|
+
|
69
|
+
# user.encryption_key = nil # encryption key used to encrypt
|
70
|
+
# reversible encryptions such as
|
71
|
+
# AES256.
|
72
|
+
|
73
|
+
# user.custom_encryption_provider = nil # use an external encryption
|
74
|
+
# class.
|
75
|
+
|
76
|
+
# user.encryption_algorithm = :bcrypt # encryption algorithm name. See
|
77
|
+
# 'encryption_algorithm=' for
|
78
|
+
# available options.
|
79
|
+
|
80
|
+
# user.subclasses_inherit_config = false # make this configuration
|
81
|
+
# inheritable for subclasses.
|
82
|
+
# Useful for ActiveRecord's STI.
|
48
83
|
|
49
84
|
# -- user_activation --
|
50
|
-
# user.activation_state_attribute_name = :activation_state # the attribute name to hold
|
51
|
-
|
52
|
-
|
53
|
-
|
85
|
+
# user.activation_state_attribute_name = :activation_state # the attribute name to hold
|
86
|
+
# activation state
|
87
|
+
# (active/pending).
|
88
|
+
|
89
|
+
# user.activation_token_attribute_name = :activation_token # the attribute name to hold
|
90
|
+
# activation code (sent by email).
|
91
|
+
|
92
|
+
# user.activation_token_expires_at_attribute_name = :activation_token_expires_at # the attribute name to hold
|
93
|
+
# activation code expiration date.
|
94
|
+
|
95
|
+
# user.activation_token_expiration_period = nil # how many seconds before the
|
96
|
+
# activation code expires. nil for
|
97
|
+
# never expires.
|
98
|
+
|
54
99
|
# user.user_activation_mailer = nil # your mailer class. Required.
|
55
|
-
|
56
|
-
# user.
|
57
|
-
|
100
|
+
|
101
|
+
# user.activation_needed_email_method_name = :activation_needed_email # activation needed email method
|
102
|
+
# on your mailer class.
|
103
|
+
|
104
|
+
# user.activation_success_email_method_name = :activation_success_email # activation success email method
|
105
|
+
# on your mailer class.
|
106
|
+
|
107
|
+
# user.prevent_non_active_users_to_login = true # do you want to prevent or allow
|
108
|
+
# users that did not activate by
|
109
|
+
# email to login?
|
58
110
|
|
59
111
|
# -- reset_password --
|
60
|
-
# user.reset_password_token_attribute_name = :reset_password_token # reset password code
|
61
|
-
|
62
|
-
|
112
|
+
# user.reset_password_token_attribute_name = :reset_password_token # reset password code
|
113
|
+
# attribute name.
|
114
|
+
|
115
|
+
# user.reset_password_token_expires_at_attribute_name = :reset_password_token_expires_at # expires at attribute
|
116
|
+
# name.
|
117
|
+
|
118
|
+
# user.reset_password_email_sent_at_attribute_name = :reset_password_email_sent_at # when was email sent,
|
119
|
+
# used for hammering
|
120
|
+
# protection.
|
121
|
+
|
63
122
|
# user.reset_password_mailer = nil # mailer class. Needed.
|
64
|
-
|
65
|
-
# user.
|
66
|
-
|
123
|
+
|
124
|
+
# user.reset_password_email_method_name = :reset_password_email # reset password email
|
125
|
+
# method on your mailer
|
126
|
+
# class.
|
127
|
+
|
128
|
+
# user.reset_password_expiration_period = nil # how many seconds
|
129
|
+
# before the reset
|
130
|
+
# request expires. nil
|
131
|
+
# for never expires.
|
132
|
+
|
133
|
+
# user.reset_password_time_between_emails = 5 * 60 # hammering protection,
|
134
|
+
# how long to wait
|
135
|
+
# before allowing
|
136
|
+
# another email to be
|
137
|
+
# sent.
|
67
138
|
|
68
139
|
# -- brute_force_protection --
|
69
140
|
# user.failed_logins_count_attribute_name = :failed_logins_count # failed logins attribute name.
|
70
|
-
|
141
|
+
|
142
|
+
# user.lock_expires_at_attribute_name = :lock_expires_at # this field indicates whether
|
143
|
+
# user is banned and when it will
|
144
|
+
# be active again.
|
145
|
+
|
71
146
|
# user.consecutive_login_retries_amount_limit = 50 # how many failed logins allowed.
|
72
|
-
|
147
|
+
|
148
|
+
# user.login_lock_time_period = 60 * 60 # how long the user should be
|
149
|
+
# banned. in seconds. 0 for
|
150
|
+
# permanent.
|
73
151
|
|
74
152
|
# -- activity logging --
|
75
153
|
# user.last_login_at_attribute_name = :last_login_at # last login attribute name.
|
76
154
|
# user.last_logout_at_attribute_name = :last_logout_at # last logout attribute name.
|
77
155
|
# user.last_activity_at_attribute_name = :last_activity_at # last activity attribute name.
|
78
|
-
# user.activity_timeout = 10 * 60 # how long since last activity is
|
156
|
+
# user.activity_timeout = 10 * 60 # how long since last activity is
|
157
|
+
# the user defined logged out?
|
79
158
|
|
80
159
|
# -- external --
|
81
|
-
# user.authentications_class = nil # class which holds the various
|
82
|
-
|
83
|
-
|
84
|
-
|
160
|
+
# user.authentications_class = nil # class which holds the various
|
161
|
+
# external provider data for this
|
162
|
+
# user.
|
163
|
+
|
164
|
+
# user.authentications_user_id_attribute_name = :user_id # user's identifier in
|
165
|
+
# authentications class.
|
166
|
+
|
167
|
+
# user.provider_attribute_name = :provider # provider's identifier in
|
168
|
+
# authentications class.
|
169
|
+
|
170
|
+
# user.provider_uid_attribute_name = :uid # user's external unique
|
171
|
+
# identifier in authentications
|
172
|
+
# class.
|
85
173
|
end
|
86
174
|
|
87
175
|
# This line must come after the 'user config' block.
|
88
|
-
config.
|
176
|
+
config.user_class = User # define which model authenticates
|
177
|
+
# with sorcery.
|
89
178
|
end
|