Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # == Schema Information
- #
- # Table name: users
- #
- # id | int(11) | NO | PRI | NULL | auto_increment |
- # login | varchar(255) | YES | | NULL | |
- # email | varchar(255) | YES | | NULL | |
- # crypted_password | varchar(40) | YES | | NULL | |
- # salt | varchar(40) | YES | | NULL | |
- # created_at | datetime | YES | | NULL | |
- # updated_at | datetime | YES | | NULL | |
- # remember_token | varchar(255) | YES | | NULL | |
- # remember_token_expires_at | datetime | YES | | NULL | |
- # activated_at | datetime | YES | | NULL | |
- require 'digest/sha1'
- class User < ActiveRecord::Base
- has_many :accounts
- # Virtual attribute for the unencrypted password
- attr_accessor :password
- validates_presence_of :login, :email
- validates_presence_of :password, :if => :password_required?
- validates_presence_of :password_confirmation, :if => :password_required?
- validates_length_of :password, :within => 4..40, :if => :password_required?
- validates_length_of :login, :within => 3..40
- validates_length_of :email, :within => 3..100
- validates_confirmation_of :password, :if => :password_required?
- validates_uniqueness_of :login, :email, :case_sensitive => false
- before_save :encrypt_password
- # before_create :make_activation_code
- # prevents a user from submitting a crafted form that bypasses activation
- # anything else you want your user to change should be added here.
- attr_accessible :login, :email, :password, :password_confirmation
- def active?
- # the existence of an activation at means they have been activated
- #puts self.activated_at
- self.activated_at.nil? == false
- end
- # Authenticates a user by their login name and unencrypted password. Returns the user or nil.
- def self.authenticate(login, password)
- u = find :first, :conditions => ['login = ?', login] # need to get the salt
- u && u.authenticated?(password) ? u : nil
- end
- # Encrypts some data with the salt.
- def self.encrypt(password, salt)
- Digest::SHA1.hexdigest("--#{salt}--#{password}--")
- end
- # Encrypts the password with the user salt
- def encrypt(password)
- self.class.encrypt(password, salt)
- end
- def authenticated?(password)
- crypted_password == encrypt(password)
- end
- def remember_token?
- remember_token_expires_at && Time.now.utc < remember_token_expires_at
- end
- # These create and unset the fields required for remembering users between browser closes
- def remember_me
- remember_me_for 2.weeks
- end
- def remember_me_for(time)
- remember_me_until time.from_now.utc
- end
- def remember_me_until(time)
- self.remember_token_expires_at = time
- self.remember_token = encrypt("#{email}--#{remember_token_expires_at}")
- save(false)
- end
- def forget_me
- self.remember_token_expires_at = nil
- self.remember_token = nil
- save(false)
- end
- # Returns true if the user has just been activated.
- def recently_activated?
- @activated
- end
- protected
- # before filter
- def encrypt_password
- return if password.blank?
- self.salt = Digest::SHA1.hexdigest("--#{Time.now.to_s}--#{login}--") if new_record?
- self.crypted_password = encrypt(password)
- end
- def password_required?
- crypted_password.blank? || !password.blank?
- end
- end
Add Comment
Please, Sign In to add comment