has_secure_password
- 1.0.0
- 1.1.6
- 1.2.6
- 2.0.3
- 2.1.0
- 2.2.1
- 2.3.8
- 3.0.0
- 3.0.9
- 3.1.0 (0)
- 3.2.1 (4)
- 3.2.8 (0)
- 3.2.13 (0)
- 4.0.2 (9)
- 4.1.8 (0)
- 4.2.1 (5)
- 4.2.7 (0)
- 4.2.9 (0)
- 5.0.0.1 (0)
- 5.1.7 (0)
- 5.2.3 (0)
- 6.0.0 (16)
- 6.1.3.1 (-2)
- 6.1.7.7 (0)
- 7.0.0 (0)
- 7.1.3.2 (38)
- 7.1.3.4 (0)
- What's this?
has_secure_password(options = {})
public
Adds methods to set and authenticate against a BCrypt password. This mechanism requires you to have a password_digest attribute.
The following validations are added automatically:
-
Password must be present on creation
-
Password length should be less than or equal to 72 characters
-
Confirmation of password (using a password_confirmation attribute)
If password confirmation validation is not needed, simply leave out the value for password_confirmation (i.e. don’t provide a form field for it). When this attribute has a nil value, the validation will not be triggered.
For further customizability, it is possible to supress the default validations by passing validations: false as an argument.
Add bcrypt (~> 3.1.7) to Gemfile to use #has_secure_password:
gem 'bcrypt', '~> 3.1.7'
Example using Active Record (which automatically includes ActiveModel::SecurePassword):
# Schema: User(name:string, password_digest:string) class User < ActiveRecord::Base has_secure_password end user = User.new(name: 'david', password: '', password_confirmation: 'nomatch') user.save # => false, password required user.password = 'mUc3m00RsqyRe' user.save # => false, confirmation doesn't match user.password_confirmation = 'mUc3m00RsqyRe' user.save # => true user.authenticate('notright') # => false user.authenticate('mUc3m00RsqyRe') # => user User.find_by(name: 'david').try(:authenticate, 'notright') # => false User.find_by(name: 'david').try(:authenticate, 'mUc3m00RsqyRe') # => user