Module: DeviseTokenAuth::Concerns::User
- Extended by:
- ActiveSupport::Concern
- Defined in:
- app/models/devise_token_auth/concerns/user.rb
Class Method Summary collapse
Instance Method Summary collapse
- #build_auth_header(token, client = 'default') ⇒ Object
- #build_auth_url(base_url, args) ⇒ Object
- #confirmed? ⇒ Boolean
-
#create_new_auth_token(client = nil) ⇒ Object
update user’s auth token (should happen on each request).
- #extend_batch_buffer(token, client) ⇒ Object
-
#send_confirmation_notification? ⇒ Boolean
this must be done from the controller so that additional params can be passed on from the client.
-
#token_can_be_reused?(token, client) ⇒ Boolean
allow batch requests to use the previous token.
- #token_is_current?(token, client) ⇒ Boolean
- #token_validation_response ⇒ Object
- #update_auth_header(token, client = 'default') ⇒ Object
- #valid_token?(token, client = 'default') ⇒ Boolean
Class Method Details
.tokens_match?(token_hash, token) ⇒ Boolean
6 7 8 9 10 11 12 13 |
# File 'app/models/devise_token_auth/concerns/user.rb', line 6 def self.tokens_match?(token_hash, token) @token_equality_cache ||= {} key = "#{token_hash}/#{token}" result = @token_equality_cache[key] ||= DeviseTokenAuth::TokenFactory.token_hash_is_token?(token_hash, token) @token_equality_cache = {} if @token_equality_cache.size > 10000 result end |
Instance Method Details
#build_auth_header(token, client = 'default') ⇒ Object
163 164 165 166 167 168 169 170 171 172 173 174 175 |
# File 'app/models/devise_token_auth/concerns/user.rb', line 163 def build_auth_header(token, client = 'default') # client may use expiry to prevent validation request if expired # must be cast as string or headers will break expiry = tokens[client]['expiry'] || tokens[client][:expiry] { DeviseTokenAuth.headers_names[:"access-token"] => token, DeviseTokenAuth.headers_names[:"token-type"] => 'Bearer', DeviseTokenAuth.headers_names[:"client"] => client, DeviseTokenAuth.headers_names[:"expiry"] => expiry.to_s, DeviseTokenAuth.headers_names[:"uid"] => uid } end |
#build_auth_url(base_url, args) ⇒ Object
185 186 187 188 189 190 |
# File 'app/models/devise_token_auth/concerns/user.rb', line 185 def build_auth_url(base_url, args) args[:uid] = uid args[:expiry] = tokens[args[:client_id]]['expiry'] DeviseTokenAuth::Url.generate(base_url, args) end |
#confirmed? ⇒ Boolean
197 198 199 |
# File 'app/models/devise_token_auth/concerns/user.rb', line 197 def confirmed? devise_modules.exclude?(:confirmable) || super end |
#create_new_auth_token(client = nil) ⇒ Object
update user’s auth token (should happen on each request)
151 152 153 154 155 156 157 158 159 160 161 |
# File 'app/models/devise_token_auth/concerns/user.rb', line 151 def create_new_auth_token(client = nil) now = Time.zone.now token = create_token( client: client, last_token: tokens.fetch(client, {})['token'], updated_at: now ) update_auth_header(token.token, token.client) end |
#extend_batch_buffer(token, client) ⇒ Object
192 193 194 195 |
# File 'app/models/devise_token_auth/concerns/user.rb', line 192 def extend_batch_buffer(token, client) tokens[client]['updated_at'] = Time.zone.now update_auth_header(token, client) end |
#send_confirmation_notification? ⇒ Boolean
this must be done from the controller so that additional params can be passed on from the client
113 |
# File 'app/models/devise_token_auth/concerns/user.rb', line 113 def send_confirmation_notification?; false; end |
#token_can_be_reused?(token, client) ⇒ Boolean
allow batch requests to use the previous token
133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 |
# File 'app/models/devise_token_auth/concerns/user.rb', line 133 def token_can_be_reused?(token, client) # ghetto HashWithIndifferentAccess updated_at = tokens[client]['updated_at'] || tokens[client][:updated_at] last_token = tokens[client]['last_token'] || tokens[client][:last_token] return true if ( # ensure that the last token and its creation time exist updated_at && last_token && # ensure that previous token falls within the batch buffer throttle time of the last request updated_at.to_time > Time.zone.now - DeviseTokenAuth.batch_request_buffer_throttle && # ensure that the token is valid DeviseTokenAuth::TokenFactory.valid_token_hash?(last_token) ) end |
#token_is_current?(token, client) ⇒ Boolean
115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 |
# File 'app/models/devise_token_auth/concerns/user.rb', line 115 def token_is_current?(token, client) # ghetto HashWithIndifferentAccess expiry = tokens[client]['expiry'] || tokens[client][:expiry] token_hash = tokens[client]['token'] || tokens[client][:token] return true if ( # ensure that expiry and token are set expiry && token && # ensure that the token has not yet expired DateTime.strptime(expiry.to_s, '%s') > Time.zone.now && # ensure that the token is valid DeviseTokenAuth::Concerns::User.tokens_match?(token_hash, token) ) end |
#token_validation_response ⇒ Object
201 202 203 |
# File 'app/models/devise_token_auth/concerns/user.rb', line 201 def token_validation_response as_json(except: %i[tokens created_at updated_at]) end |
#update_auth_header(token, client = 'default') ⇒ Object
177 178 179 180 181 182 183 |
# File 'app/models/devise_token_auth/concerns/user.rb', line 177 def update_auth_header(token, client = 'default') headers = build_auth_header(token, client) clean_old_tokens save! headers end |
#valid_token?(token, client = 'default') ⇒ Boolean
102 103 104 105 106 107 108 109 |
# File 'app/models/devise_token_auth/concerns/user.rb', line 102 def valid_token?(token, client = 'default') return false unless tokens[client] return true if token_is_current?(token, client) return true if token_can_be_reused?(token, client) # return false if none of the above conditions are met false end |