require 'devise/strategies/database_authenticatable' require 'bcrypt' module Devise module Models # Authenticatable Module, responsible for encrypting password and validating # authenticity of a user while signing in. # # == Options # # DatabaseAuthenticable adds the following options to devise_for: # # * +stretches+: the cost given to bcrypt. # # == Examples # # User.find(1).valid_password?('password123') # returns true/false # module DatabaseAuthenticatable extend ActiveSupport::Concern included do attr_reader :password, :current_password attr_accessor :password_confirmation before_save :downcase_keys end # Generates password encryption based on the given value. def password=(new_password) @password = new_password self.encrypted_password = password_digest(@password) if @password.present? end # Verifies whether an password (ie from sign in) is the user password. def valid_password?(password) bcrypt = ::BCrypt::Password.new(self.encrypted_password) password = ::BCrypt::Engine.hash_secret("#{password}#{self.class.pepper}", bcrypt.salt) Devise.secure_compare(password, self.encrypted_password) end # Set password and password confirmation to nil def clean_up_passwords self.password = self.password_confirmation = nil end # Update record attributes when :current_password matches, otherwise returns # error on :current_password. It also automatically rejects :password and # :password_confirmation if they are blank. def update_with_password(params={}) current_password = params.delete(:current_password) if params[:password].blank? params.delete(:password) params.delete(:password_confirmation) if params[:password_confirmation].blank? end result = if valid_password?(current_password) update_attributes(params) else self.errors.add(:current_password, current_password.blank? ? :blank : :invalid) self.attributes = params false end clean_up_passwords result end def after_database_authentication end # A reliable way to expose the salt regardless of the implementation. def authenticatable_salt self.encrypted_password[0,29] if self.encrypted_password end protected # Downcase case-insensitive keys def downcase_keys self.class.case_insensitive_keys.each { |k| self[k].try(:downcase!) } end # Digests the password using bcrypt. def password_digest(password) ::BCrypt::Password.create("#{password}#{self.class.pepper}", :cost => self.class.stretches).to_s end module ClassMethods Devise::Models.config(self, :pepper, :stretches) # We assume this method already gets the sanitized values from the # DatabaseAuthenticatable strategy. If you are using this method on # your own, be sure to sanitize the conditions hash to only include # the proper fields. def find_for_database_authentication(conditions) find_for_authentication(conditions) end end end end end