72 lines
2.2 KiB
Ruby
72 lines
2.2 KiB
Ruby
Devise.setup do |config|
|
|
# ==> Security Extension
|
|
# Configure security extension for devise
|
|
|
|
# Should the password expire (e.g 3.months)
|
|
# config.expire_password_after = false
|
|
config.expire_password_after = 1.year
|
|
|
|
# Need 1 char of A-Z, a-z and 0-9
|
|
# config.password_regex = /(?=.*\\d)(?=.*[a-z])(?=.*[A-Z])/
|
|
|
|
# How many passwords to keep in archive
|
|
#config.password_archiving_count = 5
|
|
|
|
# Deny old password (true, false, count)
|
|
# config.deny_old_passwords = true
|
|
|
|
# enable email validation for :secure_validatable. (true, false, validation_options)
|
|
# dependency: need an email validator like rails_email_validator
|
|
# config.email_validation = true
|
|
# captcha integration for recover form
|
|
# config.captcha_for_recover = true
|
|
|
|
# captcha integration for sign up form
|
|
# config.captcha_for_sign_up = true
|
|
|
|
# captcha integration for sign in form
|
|
# config.captcha_for_sign_in = true
|
|
|
|
# captcha integration for unlock form
|
|
# config.captcha_for_unlock = true
|
|
|
|
# captcha integration for confirmation form
|
|
# config.captcha_for_confirmation = true
|
|
|
|
# Time period for account expiry from last_activity_at
|
|
# config.expire_after = 90.days
|
|
end
|
|
|
|
module Devise
|
|
module Models
|
|
module PasswordExpirable
|
|
def need_change_password?
|
|
self.administrator? && password_expired?
|
|
end
|
|
|
|
def password_expired?
|
|
self.password_changed_at < self.expire_password_after.ago
|
|
end
|
|
end
|
|
|
|
module SecureValidatable
|
|
def self.included(base)
|
|
base.extend ClassMethods
|
|
assert_secure_validations_api!(base)
|
|
base.class_eval do
|
|
validate :current_equal_password_validation
|
|
end
|
|
end
|
|
|
|
def current_equal_password_validation
|
|
if !self.new_record? && !self.encrypted_password_change.nil? && !self.erased?
|
|
dummy = self.class.new
|
|
dummy.encrypted_password = self.encrypted_password_change.first
|
|
dummy.password_salt = self.password_salt_change.first if self.respond_to? :password_salt_change and not self.password_salt_change.nil?
|
|
self.errors.add(:password, :equal_to_current_password) if dummy.valid_password?(self.password)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|