has_secure_password
- 1.0.0
- 1.1.6
- 1.2.6
- 2.0.3
- 2.1.0
- 2.2.1
- 2.3.8
- 3.0.0
- 3.0.9
- 3.1.0 (0)
- 3.2.1 (4)
- 3.2.8 (0)
- 3.2.13 (0)
- 4.0.2 (9)
- 4.1.8 (0)
- 4.2.1 (5)
- 4.2.7 (0)
- 4.2.9 (0)
- 5.0.0.1 (0)
- 5.1.7 (0)
- 5.2.3 (0)
- 6.0.0 (16)
- 6.1.3.1 (-2)
- 6.1.7.7 (0)
- 7.0.0 (0)
- 7.1.3.2 (38)
- 7.1.3.4 (0)
- What's this?
has_secure_password(attribute = :password, validations: true)
public
Adds methods to set and authenticate against a BCrypt password. This mechanism requires you to have a XXX_digest attribute, where XXX is the attribute name of your desired password.
The following validations are added automatically:
-
Password must be present on creation
-
Password length should be less than or equal to 72 bytes
-
Confirmation of password (using a XXX_confirmation attribute)
If confirmation validation is not needed, simply leave out the value for XXX_confirmation (i.e. don’t provide a form field for it). When this attribute has a nil value, the validation will not be triggered.
Additionally, a XXX_challenge attribute is created. When set to a value other than nil, it will validate against the currently persisted password. This validation relies on dirty tracking, as provided by ActiveModel::Dirty; if dirty tracking methods are not defined, this validation will fail.
All of the above validations can be omitted by passing validations: false as an argument. This allows complete customizability of validation behavior.
To use has_secure_password, add bcrypt (~> 3.1.7) to your Gemfile:
gem 'bcrypt', '~> 3.1.7'
Examples
Using Active Record (which automatically includes ActiveModel::SecurePassword)
# Schema: User(name:string, password_digest:string, recovery_password_digest:string) class User < ActiveRecord::Base has_secure_password has_secure_password :recovery_password, validations: false end user = User.new(name: "david", password: "", password_confirmation: "nomatch") user.save # => false, password required user.password = "vr00m" user.save # => false, confirmation doesn't match user.password_confirmation = "vr00m" user.save # => true user.authenticate("notright") # => false user.authenticate("vr00m") # => user User.find_by(name: "david")&.authenticate("notright") # => false User.find_by(name: "david")&.authenticate("vr00m") # => user user.recovery_password = "42password" user.recovery_password_digest # => "$2a$04$iOfhwahFymCs5weB3BNH/uXkTG65HR.qpW.bNhEjFP3ftli3o5DQC" user.save # => true user.authenticate_recovery_password("42password") # => user user.update(password: "pwn3d", password_challenge: "") # => false, challenge doesn't authenticate user.update(password: "nohack4u", password_challenge: "vr00m") # => true user.authenticate("vr00m") # => false, old password user.authenticate("nohack4u") # => user
Conditionally requiring a password
class Account include ActiveModel::SecurePassword attr_accessor :is_guest, :password_digest has_secure_password def errors super.tap { |errors| errors.delete(:password, :blank) if is_guest } end end account = Account.new account.valid? # => false, password required account.is_guest = true account.valid? # => true