Files
grecia/app/models/verification/email.rb
Javi Martín 7ca55c44e0 Apply Rails/SaveBang rubocop rule
Having exceptions is better than having silent bugs.

There are a few methods I've kept the same way they were.

The `RelatedContentScore#score_with_opposite` method is a bit peculiar:
it creates scores for both itself and the opposite related content,
which means the opposite related content will try to create the same
scores as well.

We've already got a test to check `Budget::Ballot#add_investment` when
creating a line fails ("Edge case voting a non-elegible investment").

Finally, the method `User#send_oauth_confirmation_instructions` doesn't
update the record when the email address isn't already present, leading
to the test "Try to register with the email of an already existing user,
when an unconfirmed email was provided by oauth" fo fail if we raise an
exception for an invalid user. That's because updating a user's email
doesn't update the database automatically, but instead a confirmation
email is sent.

There are also a few false positives for classes which don't have bang
methods (like the GraphQL classes) or destroying attachments.

For these reasons, I'm adding the rule with a "Refactor" severity,
meaning it's a rule we can break if necessary.
2019-10-23 14:39:31 +02:00

38 lines
892 B
Ruby

class Verification::Email
include ActiveModel::Model
attr_accessor :verified_user, :recipient, :plain_token, :encrypted_token
validates :verified_user, presence: true
validates :recipient, presence: true
def initialize(verified_user)
@verified_user = verified_user
@recipient = @verified_user&.email
end
def save
return false unless valid?
generate_token
user.update!(email_verification_token: @plain_token)
end
def user
User.where(document_number: verified_user.document_number).first
end
def generate_token
@plain_token, @encrypted_token = Devise.token_generator.generate(User, :email_verification_token)
end
def self.find(user, token)
valid_token?(user, token)
end
def self.valid_token?(user, token)
Devise.token_generator.digest(User, :email_verification_token, user.email_verification_token) == token
end
end