2014-03-18 07:25:49 -04:00
|
|
|
class PasswordsController < Devise::PasswordsController
|
2015-10-01 21:47:27 -04:00
|
|
|
before_action :resource_from_email, only: [:create]
|
|
|
|
before_action :prevent_ldap_reset, only: [:create]
|
|
|
|
before_action :throttle_reset, only: [:create]
|
2015-05-11 14:31:31 -04:00
|
|
|
|
2015-05-13 22:29:15 -04:00
|
|
|
def edit
|
|
|
|
super
|
|
|
|
reset_password_token = Devise.token_generator.digest(
|
|
|
|
User,
|
|
|
|
:reset_password_token,
|
|
|
|
resource.reset_password_token
|
|
|
|
)
|
|
|
|
|
|
|
|
unless reset_password_token.nil?
|
|
|
|
user = User.where(
|
|
|
|
reset_password_token: reset_password_token
|
|
|
|
).first_or_initialize
|
|
|
|
|
|
|
|
unless user.reset_password_period_valid?
|
|
|
|
flash[:alert] = 'Your password reset token has expired.'
|
2015-05-13 23:57:16 -04:00
|
|
|
redirect_to(new_user_password_url(user_email: user['email']))
|
2015-05-13 22:29:15 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2015-09-30 15:38:21 -04:00
|
|
|
|
2015-10-01 21:47:27 -04:00
|
|
|
protected
|
|
|
|
|
|
|
|
def resource_from_email
|
|
|
|
email = resource_params[:email]
|
|
|
|
self.resource = resource_class.find_by_email(email)
|
|
|
|
end
|
|
|
|
|
|
|
|
def prevent_ldap_reset
|
|
|
|
return unless resource && resource.ldap_user?
|
|
|
|
|
|
|
|
redirect_to after_sending_reset_password_instructions_path_for(resource_name),
|
|
|
|
alert: "Cannot reset password for LDAP user."
|
|
|
|
end
|
|
|
|
|
|
|
|
def throttle_reset
|
|
|
|
return unless resource && resource.recently_sent_password_reset?
|
2015-09-30 15:38:21 -04:00
|
|
|
|
2015-12-09 12:45:26 -05:00
|
|
|
# Throttle reset attempts, but return a normal message to
|
|
|
|
# avoid user enumeration attack.
|
|
|
|
redirect_to new_user_session_path,
|
|
|
|
notice: I18n.t('devise.passwords.send_paranoid_instructions')
|
2015-09-30 15:38:21 -04:00
|
|
|
end
|
2014-03-18 07:25:49 -04:00
|
|
|
end
|