Module: DeviseTokenAuth::Concerns::User

Extended by:
ActiveSupport::Concern
Defined in:
app/models/devise_token_auth/concerns/user.rb

Class Method Summary collapse

Instance Method Summary collapse

Class Method Details

.tokens_match?(token_hash, token) ⇒ Boolean

Returns:

  • (Boolean)


6
7
8
9
10
11
12
13
# File 'app/models/devise_token_auth/concerns/user.rb', line 6

def self.tokens_match?(token_hash, token)
  @token_equality_cache ||= {}

  key = "#{token_hash}/#{token}"
  result = @token_equality_cache[key] ||= DeviseTokenAuth::TokenFactory.token_hash_is_token?(token_hash, token)
  @token_equality_cache = {} if @token_equality_cache.size > 10000
  result
end

Instance Method Details

#build_auth_header(token, client = 'default') ⇒ Object



167
168
169
170
171
172
173
174
175
176
177
178
179
# File 'app/models/devise_token_auth/concerns/user.rb', line 167

def build_auth_header(token, client = 'default')
  # client may use expiry to prevent validation request if expired
  # must be cast as string or headers will break
  expiry = tokens[client]['expiry'] || tokens[client][:expiry]

  {
    DeviseTokenAuth.headers_names[:"access-token"] => token,
    DeviseTokenAuth.headers_names[:"token-type"]   => 'Bearer',
    DeviseTokenAuth.headers_names[:"client"]       => client,
    DeviseTokenAuth.headers_names[:"expiry"]       => expiry.to_s,
    DeviseTokenAuth.headers_names[:"uid"]          => uid
  }
end

#build_auth_url(base_url, args) ⇒ Object



189
190
191
192
193
194
# File 'app/models/devise_token_auth/concerns/user.rb', line 189

def build_auth_url(base_url, args)
  args[:uid]    = uid
  args[:expiry] = tokens[args[:client_id]]['expiry']

  DeviseTokenAuth::Url.generate(base_url, args)
end

#confirmed?Boolean

Returns:

  • (Boolean)


201
202
203
# File 'app/models/devise_token_auth/concerns/user.rb', line 201

def confirmed?
  devise_modules.exclude?(:confirmable) || super
end

#create_new_auth_token(client = nil) ⇒ Object

update user’s auth token (should happen on each request)



155
156
157
158
159
160
161
162
163
164
165
# File 'app/models/devise_token_auth/concerns/user.rb', line 155

def create_new_auth_token(client = nil)
  now = Time.zone.now

  token = create_token(
    client: client,
    last_token: tokens.fetch(client, {})['token'],
    updated_at: now.to_s(:rfc822)
  )

  update_auth_header(token.token, token.client)
end

#extend_batch_buffer(token, client) ⇒ Object



196
197
198
199
# File 'app/models/devise_token_auth/concerns/user.rb', line 196

def extend_batch_buffer(token, client)
  tokens[client]['updated_at'] = Time.zone.now.to_s(:rfc822)
  update_auth_header(token, client)
end

#send_confirmation_notification?Boolean

this must be done from the controller so that additional params can be passed on from the client

Returns:

  • (Boolean)


117
# File 'app/models/devise_token_auth/concerns/user.rb', line 117

def send_confirmation_notification?; false; end

#token_can_be_reused?(token, client) ⇒ Boolean

allow batch requests to use the previous token

Returns:

  • (Boolean)


137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
# File 'app/models/devise_token_auth/concerns/user.rb', line 137

def token_can_be_reused?(token, client)
  # ghetto HashWithIndifferentAccess
  updated_at = tokens[client]['updated_at'] || tokens[client][:updated_at]
  last_token_hash = tokens[client]['last_token'] || tokens[client][:last_token]

  return true if (
    # ensure that the last token and its creation time exist
    updated_at && last_token_hash &&

    # ensure that previous token falls within the batch buffer throttle time of the last request
    updated_at.to_time > Time.zone.now - DeviseTokenAuth.batch_request_buffer_throttle &&

    # ensure that the token is valid
    DeviseTokenAuth::TokenFactory.token_hash_is_token?(last_token_hash, token)
  )
end

#token_is_current?(token, client) ⇒ Boolean

Returns:

  • (Boolean)


119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
# File 'app/models/devise_token_auth/concerns/user.rb', line 119

def token_is_current?(token, client)
  # ghetto HashWithIndifferentAccess
  expiry     = tokens[client]['expiry'] || tokens[client][:expiry]
  token_hash = tokens[client]['token'] || tokens[client][:token]

  return true if (
    # ensure that expiry and token are set
    expiry && token &&

    # ensure that the token has not yet expired
    DateTime.strptime(expiry.to_s, '%s') > Time.zone.now &&

    # ensure that the token is valid
    DeviseTokenAuth::Concerns::User.tokens_match?(token_hash, token)
  )
end

#token_validation_responseObject



205
206
207
# File 'app/models/devise_token_auth/concerns/user.rb', line 205

def token_validation_response
  as_json(except: %i[tokens created_at updated_at])
end

#update_auth_header(token, client = 'default') ⇒ Object



181
182
183
184
185
186
187
# File 'app/models/devise_token_auth/concerns/user.rb', line 181

def update_auth_header(token, client = 'default')
  headers = build_auth_header(token, client)
  clean_old_tokens
  save!

  headers
end

#valid_token?(token, client = 'default') ⇒ Boolean

Returns:

  • (Boolean)


106
107
108
109
110
111
112
113
# File 'app/models/devise_token_auth/concerns/user.rb', line 106

def valid_token?(token, client = 'default')
  return false unless tokens[client]
  return true if token_is_current?(token, client)
  return true if token_can_be_reused?(token, client)

  # return false if none of the above conditions are met
  false
end