summaryrefslogtreecommitdiff
path: root/app/models/user.rb
diff options
context:
space:
mode:
authorLuke Shumaker <LukeShu@sbcglobal.net>2014-03-03 18:41:50 -0500
committerLuke Shumaker <LukeShu@sbcglobal.net>2014-03-03 18:41:50 -0500
commit21f151629004dbcd28b4576f256ad213aee1bdb2 (patch)
tree29d184ea286379055990ed4d7871fc3b326bbf81 /app/models/user.rb
parentcd69a777235e96266d4ed101ef22de7ed1308dd5 (diff)
app/models/user.rb: indent
Diffstat (limited to 'app/models/user.rb')
-rw-r--r--app/models/user.rb247
1 files changed, 105 insertions, 142 deletions
diff --git a/app/models/user.rb b/app/models/user.rb
index 55a7da0..a4fafa0 100644
--- a/app/models/user.rb
+++ b/app/models/user.rb
@@ -1,158 +1,121 @@
class User < ActiveRecord::Base
-before_save { self.email = email.downcase }
-before_save { self.user_name = user_name.downcase }
-
-=begin
-
-Rails looks for the create_remember_token and runs the method
-before anything else.
-
-This method cannot be called by a user since it is denoted
-as private.
-
-=end
-
-before_create :create_remember_token
-
-=begin
-
-VAILD_EMAIL is the regex used to valid a user given email.
-
-A break down of the regex is listed below.
-
-/ -------------> Start of the regex
-\A ------------> match start of a string
-[\w+\-.]+ -----> at least one owrd character, plus, hyphen, or
- dot
-@ -------------> literal ampersand
-[a-z\d\-.]+ ---> at least one letter, digit, hyphen, or dot
-(?:\.[a-z]+) --> ensures that the error of example@foo..com
- does not occur
-\z ------------> match end of a string
-/ -------------> end of the regex
-i -------------> case sensative
-
-=end
-
+ before_save { self.email = email.downcase }
+ before_save { self.user_name = user_name.downcase }
+
+ ##
+ # Rails looks for the create_remember_token and runs the method
+ # before anything else.
+ #
+ # This method cannot be called by a user since it is denoted
+ # as private.
+ before_create :create_remember_token
+
+ ##
+ # VAILD_EMAIL is the regex used to valid a user given email.
+ #
+ # A break down of the regex is listed below.
+ #
+ # / -------------> Start of the regex
+ # \A ------------> match start of a string
+ # [\w+\-.]+ -----> at least one owrd character, plus, hyphen,
+ # or dot
+ # @ -------------> literal ampersand
+ # [a-z\d\-.]+ ---> at least one letter, digit, hyphen, or dot
+ # (?:\.[a-z]+) --> ensures that the error of example@foo..com
+ # does not occur
+ # \z ------------> match end of a string
+ # / -------------> end of the regex
+ # i -------------> case insensative
VALID_EMAIL_REG = /\A[\w+\-.]+@[a-z\d\-.]+(?:\.[a-z]+)\z/i
-=begin
-
-VALID_USER_NAME checks to make sure a user's user_name
-is in the proper format.
-
-=end
-
+ ##
+ # VALID_USER_NAME checks to make sure a user's user_name
+ # is in the proper format.
VALID_USER_NAME_REG = /[a-zA-Z0-9\-]/
-=begin
-
-The following lines put a user accout through a series of
-validations in order to make sure all of their information
-is in the proper format.
-
-validates :symbol_to_be_valided
-
-presence: determines whether or not a symbol is filled or not
-length: ensures there is a length limit on the symbol
-format: checks the format of given information to ensure
- validity
-
-=end
-
- validates :name, presence: true, length: { maximum: 50 }
- validates :email, presence: true, format: {with:
- VALID_EMAIL_REG},
- uniqueness: { case_sensitive: false }
- validates :user_name, presence: true, length:{maximum: 50},
- format: {with: VALID_USER_NAME_REG },
- uniqueness: {case_sensitive: false }
-
-=begin
-
-Instead of adding password and password_confirmation
-attributes, requiring the presence of a password,
-requirin that pw and pw_com match, and add an authenticate
-method to compare an encrypted password to the
-password_digest to authenticate users, I can just add
-has_secure_password which does all of this for me.
-
-=end
-
+ ##
+ # The following lines put a user accout through a series of
+ # validations in order to make sure all of their information
+ # is in the proper format.
+ #
+ # validates :symbol_to_be_valided
+ #
+ # - presence: determines whether or not a symbol is filled or not
+ # - length: ensures there is a length limit on the symbol
+ # - format: checks the format of given information to ensure
+ # validity
+ validates(:name, presence: true, length: { maximum: 50 })
+ validates(:email, presence: true, format: {with:
+ VALID_EMAIL_REG},
+ uniqueness: { case_sensitive: false })
+ validates(:user_name, presence: true, length:{maximum: 50},
+ format: {with: VALID_USER_NAME_REG },
+ uniqueness: {case_sensitive: false })
+
+ ##
+ # Instead of adding password and password_confirmation
+ # attributes, requiring the presence of a password,
+ # requirin that pw and pw_com match, and add an authenticate
+ # method to compare an encrypted password to the
+ # password_digest to authenticate users, I can just add
+ # has_secure_password which does all of this for me.
has_secure_password
validates :password, length: { minimum: 6 }
-=begin
-
- Create a random remember token for the user. This will be
- changed every time the user creates a new session.
-
- By changing the cookie every new session, any hijacked sessions
- (where the attacker steals a cookie to sign in as a certain
- user) will expire the next time the user signs back in.
-
- The random string is of length 16 composed of A-Z, a-z, 0-9
- This is the browser's cookie value.
-
-=end
-
- def User.new_remember_token
- SecureRandom.urlsafe_base64
- end
-
-=begin
-
- Encrypt the remember token.
- This is the encrypted version of the cookie stored on
- the database.
-
- The reasoning for storing a hashed token is so that even if
- the database is compromised, the atacker won't be able to use
- the remember tokens to sign in.
-
-=end
-
- def User.hash(token)
- Digest::SHA1.hexdigest(token.to_s)
- end
+ ##
+ # Create a random remember token for the user. This will be
+ # changed every time the user creates a new session.
+ #
+ # By changing the cookie every new session, any hijacked sessions
+ # (where the attacker steals a cookie to sign in as a certain
+ # user) will expire the next time the user signs back in.
+ #
+ # The random string is of length 16 composed of A-Z, a-z, 0-9
+ # This is the browser's cookie value.
+ def User.new_remember_token
+ SecureRandom.urlsafe_base64
+ end
+
+ ##
+ # Encrypt the remember token.
+ # This is the encrypted version of the cookie stored on
+ # the database.
+ #
+ # The reasoning for storing a hashed token is so that even if
+ # the database is compromised, the atacker won't be able to use
+ # the remember tokens to sign in.
+ def User.hash(token)
+ Digest::SHA1.hexdigest(token.to_s)
+ end
+
+ ##
+ # SHA-1 (Secure Hash Algorithm) is a US engineered hash
+ # function that produces a 20 byte hash value which typically
+ # forms a hexadecimal number 40 digits long.
+ # The reason I am not using the Bcrypt algorithm is because
+ # SHA-1 is much faster and I will be calling this on
+ # every page a user accesses.
+ #
+ # https://en.wikipedia.org/wiki/SHA-1
-=begin
-
-SHA-1 (Secure Hash Algorithm) is a US engineered hash
-function that produces a 20 byte hash value which typically
-forms a hexadecimal number 40 digits long.
-The reason I am not using the Bcrypt algorithm is because
-SHA-1 is much faster and I will be calling this on
-every page a user accesses.
-
-https://en.wikipedia.org/wiki/SHA-1
-
-=end
# Everything under private is hidden so you cannot call.
private
-=begin
-
- Create_remember_token in order to ensure a user always has
- a remember token.
-
-=end
- def create_remember_token
- self.remember_token = User.hash(User.new_remember_token)
- end
-
-=begin
-
-In order to ensure that someone did not accidently submit
-two accounts rapidly (which would throw off the validates
-for user_name and email), I added an index to the Users
-email and user_name in the database to ensure uniqueness
-This also gives and index to the user_name and email
-so finding a user SHOULD be easier for the database.
-
-=end
-
+ ##
+ # Create_remember_token in order to ensure a user always has
+ # a remember token.
+ def create_remember_token
+ self.remember_token = User.hash(User.new_remember_token)
+ end
+
+ ##
+ # In order to ensure that someone did not accidently submit
+ # two accounts rapidly (which would throw off the validates
+ # for user_name and email), I added an index to the Users
+ # email and user_name in the database to ensure uniqueness
+ # This also gives and index to the user_name and email
+ # so finding a user SHOULD be easier for the database.
end