Source code
GitHub
# File activemodel/lib/active_model/secure_password.rb, line 183
def initialize(attribute, reset_token:)
attr_reader attribute
define_method("#{attribute}=") do |unencrypted_password|
if unencrypted_password.nil?
instance_variable_set("@#{attribute}", nil)
self.public_send("#{attribute}_digest=", nil)
elsif !unencrypted_password.empty?
instance_variable_set("@#{attribute}", unencrypted_password)
cost = ActiveModel::SecurePassword.min_cost ? BCrypt::Engine::MIN_COST : BCrypt::Engine.cost
self.public_send("#{attribute}_digest=", BCrypt::Password.create(unencrypted_password, cost: cost))
end
end
attr_accessor :"#{attribute}_confirmation", :"#{attribute}_challenge"
# Returns +self+ if the password is correct, otherwise +false+.
#
# class User < ActiveRecord::Base
# has_secure_password validations: false
# end
#
# user = User.new(name: 'david', password: 'mUc3m00RsqyRe')
# user.save
# user.authenticate_password('notright') # => false
# user.authenticate_password('mUc3m00RsqyRe') # => user
define_method("authenticate_#{attribute}") do |unencrypted_password|
attribute_digest = public_send("#{attribute}_digest")
attribute_digest.present? && BCrypt::Password.new(attribute_digest).is_password?(unencrypted_password) && self
end
# Returns the salt, a small chunk of random data added to the password before it's hashed.
define_method("#{attribute}_salt") do
attribute_digest = public_send("#{attribute}_digest")
attribute_digest.present? ? BCrypt::Password.new(attribute_digest).salt : nil
end
alias_method :authenticate, :authenticate_password if attribute == :password
if reset_token
# Returns the class-level configured reset token for the password.
define_method("#{attribute}_reset_token") do
generate_token_for(:"#{attribute}_reset")
end
end
end