Sha256: 473cf59f3e21a675b1dabcd153518b53cf30e83cbaa966ddfce471738c89e54b
Contents?: true
Size: 1.99 KB
Versions: 6
Compression:
Stored size: 1.99 KB
Contents
module Spree module Admin class BaseController < Spree::BaseController helper 'spree/search' helper 'spree/admin/navigation' layout '/spree/layouts/admin' protected def check_alerts return unless current_user and should_check_alerts? unless session.has_key? :alerts begin session[:alerts] = Spree::Alert.current(request.host) filter_dismissed_alerts Spree::Config.set :last_check_for_spree_alerts => DateTime.now.to_s rescue session[:alerts] = nil end end end def should_check_alerts? return false if not Spree::Config[:check_for_spree_alerts] last_check = Spree::Config[:last_check_for_spree_alerts] return true if last_check.blank? DateTime.parse(last_check) < 12.hours.ago end def flash_message_for(object, event_sym) resource_desc = object.class.model_name.human resource_desc += " \"#{object.name}\"" if object.respond_to?(:name) && object.name.present? I18n.t(event_sym, :resource => resource_desc) end def render_js_for_destroy render :partial => '/spree/admin/shared/destroy' end # Index request for JSON needs to pass a CSRF token in order to prevent JSON Hijacking def check_json_authenticity return unless request.format.js? or request.format.json? return unless protect_against_forgery? auth_token = params[request_forgery_protection_token] unless (auth_token and form_authenticity_token == URI.unescape(auth_token)) raise(ActionController::InvalidAuthenticityToken) end end def filter_dismissed_alerts return unless session[:alerts] dismissed = (Spree::Config[:dismissed_spree_alerts] || '').split(',') session[:alerts].reject! { |a| dismissed.include? a.id.to_s } end end end end
Version data entries
6 entries across 6 versions & 1 rubygems