@@ -40,9 +40,9 @@ DATABASE_PASSWORD="" |
||
40 | 40 |
# Should Rails force all requests to use SSL? |
41 | 41 |
FORCE_SSL=false |
42 | 42 |
|
43 |
-############################ |
|
44 |
-# Allowing Signups # |
|
45 |
-############################ |
|
43 |
+################################################ |
|
44 |
+# User authentication and registration # |
|
45 |
+################################################ |
|
46 | 46 |
|
47 | 47 |
# This invitation code will be required for users to signup with your Huginn installation. |
48 | 48 |
# You can see its use in user.rb. PLEASE CHANGE THIS! |
@@ -51,6 +51,36 @@ INVITATION_CODE=try-huginn |
||
51 | 51 |
# If you don't want to require new users to have an invitation code in order to sign up, set this to true. |
52 | 52 |
SKIP_INVITATION_CODE=false |
53 | 53 |
|
54 |
+# If you'd like to require new users to confirm their email address after sign up, set this to true. |
|
55 |
+REQUIRE_CONFIRMED_EMAIL=false |
|
56 |
+ |
|
57 |
+# If REQUIRE_CONFIRMED_EMAIL is true, set this to the duration in which a user needs to confirm their email address. |
|
58 |
+ALLOW_UNCONFIRMED_ACCESS_FOR=2.days |
|
59 |
+ |
|
60 |
+# Duration for which the above confirmation token is valid |
|
61 |
+CONFIRM_WITHIN=3.days |
|
62 |
+ |
|
63 |
+# Minimum password length |
|
64 |
+MIN_PASSWORD_LENGTH=8 |
|
65 |
+ |
|
66 |
+# Duration for which the reset password token is valid |
|
67 |
+RESET_PASSWORD_WITHIN=6.hours |
|
68 |
+ |
|
69 |
+# Set to 'failed_attempts' to lock user accounts for the UNLOCK_AFTER period they fail MAX_FAILED_LOGIN_ATTEMPTS login attempts. Set to 'none' to allow unlimited failed login attempts. |
|
70 |
+LOCK_STRATEGY=failed_attempts |
|
71 |
+ |
|
72 |
+# After how many failed login attempts the account is locked when LOCK_STRATEGY is set to failed_attempts. |
|
73 |
+MAX_FAILED_LOGIN_ATTEMPTS=10 |
|
74 |
+ |
|
75 |
+# Can be set to 'email', 'time', 'both' or 'none'. 'none' requires manual unlocking of your users! |
|
76 |
+UNLOCK_STRATEGY=both |
|
77 |
+ |
|
78 |
+# Duration after which the user is unlocked when UNLOCK_STRATEGY is 'both' or 'time' and LOCK_STRATEGY is 'failed_attempts' |
|
79 |
+UNLOCK_AFTER=1.hour |
|
80 |
+ |
|
81 |
+# Duration for which the user will be remembered without asking for credentials again. |
|
82 |
+REMEMBER_FOR=4.weeks |
|
83 |
+ |
|
54 | 84 |
############################# |
55 | 85 |
# Email Configuration # |
56 | 86 |
############################# |
@@ -1,8 +1,10 @@ |
||
1 | 1 |
# Huginn is designed to be a multi-User system. Users have many Agents (and Events created by those Agents). |
2 | 2 |
class User < ActiveRecord::Base |
3 |
- devise :database_authenticatable, :registerable, |
|
4 |
- :recoverable, :rememberable, :trackable, :validatable, :lockable, |
|
5 |
- :omniauthable |
|
3 |
+ DEVISE_MODULES = [:database_authenticatable, :registerable, |
|
4 |
+ :recoverable, :rememberable, :trackable, |
|
5 |
+ :validatable, :lockable, :omniauthable, |
|
6 |
+ (ENV['REQUIRE_CONFIRMED_EMAIL'] == 'true' ? :confirmable : nil)].compact |
|
7 |
+ devise *DEVISE_MODULES |
|
6 | 8 |
|
7 | 9 |
INVITATION_CODES = [ENV['INVITATION_CODE'] || 'try-huginn'] |
8 | 10 |
|
@@ -103,7 +103,7 @@ Devise.setup do |config| |
||
103 | 103 |
# able to access the website for two days without confirming their account, |
104 | 104 |
# access will be blocked just in the third day. Default is 0.days, meaning |
105 | 105 |
# the user cannot access the website without confirming their account. |
106 |
- # config.allow_unconfirmed_access_for = 2.days |
|
106 |
+ config.allow_unconfirmed_access_for = Utils.parse_duration(ENV['ALLOW_UNCONFIRMED_ACCESS_FOR']).presence || 2.days |
|
107 | 107 |
|
108 | 108 |
# A period that the user is allowed to confirm their account before their |
109 | 109 |
# token becomes invalid. For example, if set to 3.days, the user can confirm |
@@ -111,7 +111,7 @@ Devise.setup do |config| |
||
111 | 111 |
# their account can't be confirmed with the token any more. |
112 | 112 |
# Default is nil, meaning there is no restriction on how long a user can take |
113 | 113 |
# before confirming their account. |
114 |
- # config.confirm_within = 3.days |
|
114 |
+ config.confirm_within = Utils.parse_duration(ENV['CONFIRM_WITHIN']).presence || 3.days |
|
115 | 115 |
|
116 | 116 |
# If true, requires any email changes to be confirmed (exactly the same way as |
117 | 117 |
# initial account confirmation) to be applied. Requires additional unconfirmed_email |
@@ -124,7 +124,7 @@ Devise.setup do |config| |
||
124 | 124 |
|
125 | 125 |
# ==> Configuration for :rememberable |
126 | 126 |
# The time the user will be remembered without asking for credentials again. |
127 |
- config.remember_for = 4.weeks |
|
127 |
+ config.remember_for = Utils.parse_duration(ENV['REMEMBER_FOR']).presence || 4.weeks |
|
128 | 128 |
|
129 | 129 |
# Invalidates all the remember me tokens when the user signs out. |
130 | 130 |
config.expire_all_remember_me_on_sign_out = true |
@@ -142,7 +142,7 @@ Devise.setup do |config| |
||
142 | 142 |
|
143 | 143 |
# ==> Configuration for :validatable |
144 | 144 |
# Range for password length. |
145 |
- config.password_length = 8..128 |
|
145 |
+ config.password_length = (Utils.if_present(ENV['MIN_PASSWORD_LENGTH'], :to_i) || 8)..128 |
|
146 | 146 |
|
147 | 147 |
# Email regex used to validate email formats. It simply asserts that |
148 | 148 |
# one (and only one) @ exists in the given string. This is mainly |
@@ -158,7 +158,7 @@ Devise.setup do |config| |
||
158 | 158 |
# Defines which strategy will be used to lock an account. |
159 | 159 |
# :failed_attempts = Locks an account after a number of failed attempts to sign in. |
160 | 160 |
# :none = No lock strategy. You should handle locking by yourself. |
161 |
- config.lock_strategy = :failed_attempts |
|
161 |
+ config.lock_strategy = Utils.if_present(ENV['LOCK_STRATEGY'], :to_sym) || :failed_attempts |
|
162 | 162 |
|
163 | 163 |
# Defines which key will be used when locking and unlocking an account |
164 | 164 |
config.unlock_keys = [ :email ] |
@@ -168,14 +168,14 @@ Devise.setup do |config| |
||
168 | 168 |
# :time = Re-enables login after a certain amount of time (see :unlock_in below) |
169 | 169 |
# :both = Enables both strategies |
170 | 170 |
# :none = No unlock strategy. You should handle unlocking by yourself. |
171 |
- config.unlock_strategy = :both |
|
171 |
+ config.unlock_strategy = Utils.if_present(ENV['UNLOCK_STRATEGY'], :to_sym) || :both |
|
172 | 172 |
|
173 | 173 |
# Number of authentication tries before locking an account if lock_strategy |
174 | 174 |
# is failed attempts. |
175 |
- config.maximum_attempts = 10 |
|
175 |
+ config.maximum_attempts = Utils.if_present(ENV['MAX_FAILED_LOGIN_ATTEMPTS'], :to_i) || 10 |
|
176 | 176 |
|
177 | 177 |
# Time interval to unlock the account if :time is enabled as unlock_strategy. |
178 |
- config.unlock_in = 1.hour |
|
178 |
+ config.unlock_in = Utils.parse_duration(ENV['UNLOCK_AFTER']).presence || 1.hour |
|
179 | 179 |
|
180 | 180 |
# Warn on the last attempt before the account is locked. |
181 | 181 |
# config.last_attempt_warning = true |
@@ -188,7 +188,7 @@ Devise.setup do |config| |
||
188 | 188 |
# Time interval you can reset your password with a reset password key. |
189 | 189 |
# Don't put a too small interval or your users won't have the time to |
190 | 190 |
# change their passwords. |
191 |
- config.reset_password_within = 6.hours |
|
191 |
+ config.reset_password_within = Utils.parse_duration(ENV['RESET_PASSWORD_WITHIN']).presence || 6.hours |
|
192 | 192 |
|
193 | 193 |
# ==> Configuration for :encryptable |
194 | 194 |
# Allow you to use another encryption algorithm besides bcrypt (default). You can use |
@@ -0,0 +1,17 @@ |
||
1 |
+class AddConfirmableAttributesToUsers < ActiveRecord::Migration |
|
2 |
+ def change |
|
3 |
+ change_table(:users) do |t| |
|
4 |
+ ## Confirmable |
|
5 |
+ t.string :confirmation_token |
|
6 |
+ t.datetime :confirmed_at |
|
7 |
+ t.datetime :confirmation_sent_at |
|
8 |
+ t.string :unconfirmed_email # Only if using reconfirmable |
|
9 |
+ end |
|
10 |
+ |
|
11 |
+ add_index :users, :confirmation_token, unique: true |
|
12 |
+ |
|
13 |
+ if ENV['REQUIRE_CONFIRMED_EMAIL'] != 'true' && ActiveRecord::Base.connection.column_exists?(:users, :confirmed_at) |
|
14 |
+ User.update_all('confirmed_at = NOW()') |
|
15 |
+ end |
|
16 |
+ end |
|
17 |
+end |
@@ -130,4 +130,25 @@ module Utils |
||
130 | 130 |
def self.sort_tuples!(array, orders = []) |
131 | 131 |
TupleSorter.sort!(array, orders) |
132 | 132 |
end |
133 |
+ |
|
134 |
+ def self.parse_duration(string) |
|
135 |
+ return nil if string.blank? |
|
136 |
+ case string.strip |
|
137 |
+ when /\A(\d+)\.(\w+)\z/ |
|
138 |
+ $1.to_i.send($2.to_s) |
|
139 |
+ when /\A(\d+)\z/ |
|
140 |
+ $1.to_i |
|
141 |
+ else |
|
142 |
+ STDERR.puts "WARNING: Invalid duration format: '#{string.strip}'" |
|
143 |
+ nil |
|
144 |
+ end |
|
145 |
+ end |
|
146 |
+ |
|
147 |
+ def self.if_present(string, method) |
|
148 |
+ if string.present? |
|
149 |
+ string.send(method) |
|
150 |
+ else |
|
151 |
+ nil |
|
152 |
+ end |
|
153 |
+ end |
|
133 | 154 |
end |
@@ -11,3 +11,4 @@ WUNDERLIST_OAUTH_KEY=wunderoauthkey |
||
11 | 11 |
EVERNOTE_OAUTH_KEY=evernoteoauthkey |
12 | 12 |
EVERNOTE_OAUTH_SECRET=evernoteoauthsecret |
13 | 13 |
FAILED_JOBS_TO_KEEP=2 |
14 |
+REQUIRE_CONFIRMED_EMAIL=false |
@@ -172,4 +172,33 @@ describe Utils do |
||
172 | 172 |
expect(tuples).to eq expected |
173 | 173 |
end |
174 | 174 |
end |
175 |
+ |
|
176 |
+ context "#parse_duration" do |
|
177 |
+ it "works with correct arguments" do |
|
178 |
+ expect(Utils.parse_duration('2.days')).to eq(2.days) |
|
179 |
+ expect(Utils.parse_duration('2.seconds')).to eq(2) |
|
180 |
+ expect(Utils.parse_duration('2')).to eq(2) |
|
181 |
+ end |
|
182 |
+ |
|
183 |
+ it "returns nil when passed nil" do |
|
184 |
+ expect(Utils.parse_duration(nil)).to be_nil |
|
185 |
+ end |
|
186 |
+ |
|
187 |
+ it "warns and returns nil when not parseable" do |
|
188 |
+ mock(STDERR).puts("WARNING: Invalid duration format: 'bogus'") |
|
189 |
+ expect(Utils.parse_duration('bogus')).to be_nil |
|
190 |
+ end |
|
191 |
+ end |
|
192 |
+ |
|
193 |
+ context "#if_present" do |
|
194 |
+ it "returns nil when passed nil" do |
|
195 |
+ expect(Utils.if_present(nil, :to_i)).to be_nil |
|
196 |
+ end |
|
197 |
+ |
|
198 |
+ it "calls the specified method when the argument is present" do |
|
199 |
+ argument = mock() |
|
200 |
+ mock(argument).to_i { 1 } |
|
201 |
+ expect(Utils.if_present(argument, :to_i)).to eq(1) |
|
202 |
+ end |
|
203 |
+ end |
|
175 | 204 |
end |