mirror of
https://github.com/heartcombo/devise.git
synced 2022-11-09 12:18:31 -05:00
67 lines
1.9 KiB
Ruby
67 lines
1.9 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'devise/strategies/authenticatable'
|
|
|
|
module Devise
|
|
module Strategies
|
|
# Remember the user through the remember token. This strategy is responsible
|
|
# to verify whether there is a cookie with the remember token, and to
|
|
# recreate the user from this cookie if it exists. Must be called *before*
|
|
# authenticatable.
|
|
class Rememberable < Authenticatable
|
|
# A valid strategy for rememberable needs a remember token in the cookies.
|
|
def valid?
|
|
@remember_cookie = nil
|
|
remember_cookie.present?
|
|
end
|
|
|
|
# To authenticate a user we deserialize the cookie and attempt finding
|
|
# the record in the database. If the attempt fails, we pass to another
|
|
# strategy handle the authentication.
|
|
def authenticate!
|
|
resource = mapping.to.serialize_from_cookie(*remember_cookie)
|
|
|
|
unless resource
|
|
cookies.delete(remember_key)
|
|
return pass
|
|
end
|
|
|
|
if validate(resource)
|
|
remember_me(resource) if extend_remember_me?(resource)
|
|
resource.after_remembered
|
|
success!(resource)
|
|
end
|
|
end
|
|
|
|
# No need to clean up the CSRF when using rememberable.
|
|
# In fact, cleaning it up here would be a bug because
|
|
# rememberable is triggered on GET requests which means
|
|
# we would render a page on first access with all csrf
|
|
# tokens expired.
|
|
def clean_up_csrf?
|
|
false
|
|
end
|
|
|
|
private
|
|
|
|
def extend_remember_me?(resource)
|
|
resource.respond_to?(:extend_remember_period) && resource.extend_remember_period
|
|
end
|
|
|
|
def remember_me?
|
|
true
|
|
end
|
|
|
|
def remember_key
|
|
mapping.to.rememberable_options.fetch(:key, "remember_#{scope}_token")
|
|
end
|
|
|
|
def remember_cookie
|
|
@remember_cookie ||= cookies.signed[remember_key]
|
|
end
|
|
|
|
end
|
|
end
|
|
end
|
|
|
|
Warden::Strategies.add(:rememberable, Devise::Strategies::Rememberable)
|