@@ -84,19 +84,13 @@ def sorcery_config
8484 def authenticate ( *credentials , &block )
8585 raise ArgumentError , 'at least 2 arguments required' if credentials . size < 2
8686
87- if credentials [ 0 ] . blank?
88- return authentication_response ( return_value : false , failure : :invalid_login , &block )
89- end
87+ return authentication_response ( return_value : false , failure : :invalid_login , &block ) if credentials [ 0 ] . blank?
9088
91- if @sorcery_config . downcase_username_before_authenticating
92- credentials [ 0 ] . downcase!
93- end
89+ credentials [ 0 ] . downcase! if @sorcery_config . downcase_username_before_authenticating
9490
9591 user = sorcery_adapter . find_by_credentials ( credentials )
9692
97- unless user
98- return authentication_response ( failure : :invalid_login , &block )
99- end
93+ return authentication_response ( failure : :invalid_login , &block ) unless user
10094
10195 set_encryption_attributes
10296
@@ -107,9 +101,7 @@ def authenticate(*credentials, &block)
107101 @sorcery_config . before_authenticate . each do |callback |
108102 success , reason = user . send ( callback )
109103
110- unless success
111- return authentication_response ( user : user , failure : reason , &block )
112- end
104+ return authentication_response ( user : user , failure : reason , &block ) unless success
113105 end
114106
115107 unless user . valid_password? ( credentials [ 1 ] )
@@ -132,9 +124,15 @@ def encrypt(*tokens)
132124 # FIXME: This method of passing config to the hashing provider is
133125 # questionable, and has been refactored in Sorcery v1.
134126 def set_encryption_attributes
135- @sorcery_config . encryption_provider . stretches = @sorcery_config . stretches if @sorcery_config . encryption_provider . respond_to? ( :stretches ) && @sorcery_config . stretches
136- @sorcery_config . encryption_provider . join_token = @sorcery_config . salt_join_token if @sorcery_config . encryption_provider . respond_to? ( :join_token ) && @sorcery_config . salt_join_token
137- @sorcery_config . encryption_provider . pepper = @sorcery_config . pepper if @sorcery_config . encryption_provider . respond_to? ( :pepper ) && @sorcery_config . pepper
127+ if @sorcery_config . encryption_provider . respond_to? ( :stretches ) && @sorcery_config . stretches
128+ @sorcery_config . encryption_provider . stretches = @sorcery_config . stretches
129+ end
130+ if @sorcery_config . encryption_provider . respond_to? ( :join_token ) && @sorcery_config . salt_join_token
131+ @sorcery_config . encryption_provider . join_token = @sorcery_config . salt_join_token
132+ end
133+ return unless @sorcery_config . encryption_provider . respond_to? ( :pepper ) && @sorcery_config . pepper
134+
135+ @sorcery_config . encryption_provider . pepper = @sorcery_config . pepper
138136 end
139137
140138 protected
@@ -191,7 +189,9 @@ def valid_password?(pass)
191189 # encrypts password with salt and saves it.
192190 def encrypt_password
193191 config = sorcery_config
194- send ( :"#{ config . salt_attribute_name } =" , new_salt = TemporaryToken . generate_random_token ) unless config . salt_attribute_name . nil?
192+ unless config . salt_attribute_name . nil?
193+ send ( :"#{ config . salt_attribute_name } =" , new_salt = TemporaryToken . generate_random_token )
194+ end
195195 send ( :"#{ config . crypted_password_attribute_name } =" , self . class . encrypt ( send ( config . password_attribute_name ) , new_salt ) )
196196 end
197197
0 commit comments