@@ -82,19 +82,13 @@ def sorcery_config
8282 def authenticate ( *credentials , &block )
8383 raise ArgumentError , 'at least 2 arguments required' if credentials . size < 2
8484
85- if credentials [ 0 ] . blank?
86- return authentication_response ( return_value : false , failure : :invalid_login , &block )
87- end
85+ return authentication_response ( return_value : false , failure : :invalid_login , &block ) if credentials [ 0 ] . blank?
8886
89- if @sorcery_config . downcase_username_before_authenticating
90- credentials [ 0 ] . downcase!
91- end
87+ credentials [ 0 ] . downcase! if @sorcery_config . downcase_username_before_authenticating
9288
9389 user = sorcery_adapter . find_by_credentials ( credentials )
9490
95- unless user
96- return authentication_response ( failure : :invalid_login , &block )
97- end
91+ return authentication_response ( failure : :invalid_login , &block ) unless user
9892
9993 set_encryption_attributes
10094
@@ -105,9 +99,7 @@ def authenticate(*credentials, &block)
10599 @sorcery_config . before_authenticate . each do |callback |
106100 success , reason = user . send ( callback )
107101
108- unless success
109- return authentication_response ( user : user , failure : reason , &block )
110- end
102+ return authentication_response ( user : user , failure : reason , &block ) unless success
111103 end
112104
113105 unless user . valid_password? ( credentials [ 1 ] )
@@ -130,9 +122,15 @@ def encrypt(*tokens)
130122 # FIXME: This method of passing config to the hashing provider is
131123 # questionable, and has been refactored in Sorcery v1.
132124 def set_encryption_attributes
133- @sorcery_config . encryption_provider . stretches = @sorcery_config . stretches if @sorcery_config . encryption_provider . respond_to? ( :stretches ) && @sorcery_config . stretches
134- @sorcery_config . encryption_provider . join_token = @sorcery_config . salt_join_token if @sorcery_config . encryption_provider . respond_to? ( :join_token ) && @sorcery_config . salt_join_token
135- @sorcery_config . encryption_provider . pepper = @sorcery_config . pepper if @sorcery_config . encryption_provider . respond_to? ( :pepper ) && @sorcery_config . pepper
125+ if @sorcery_config . encryption_provider . respond_to? ( :stretches ) && @sorcery_config . stretches
126+ @sorcery_config . encryption_provider . stretches = @sorcery_config . stretches
127+ end
128+ if @sorcery_config . encryption_provider . respond_to? ( :join_token ) && @sorcery_config . salt_join_token
129+ @sorcery_config . encryption_provider . join_token = @sorcery_config . salt_join_token
130+ end
131+ return unless @sorcery_config . encryption_provider . respond_to? ( :pepper ) && @sorcery_config . pepper
132+
133+ @sorcery_config . encryption_provider . pepper = @sorcery_config . pepper
136134 end
137135
138136 protected
@@ -189,7 +187,9 @@ def valid_password?(pass)
189187 # encrypts password with salt and saves it.
190188 def encrypt_password
191189 config = sorcery_config
192- send ( :"#{ config . salt_attribute_name } =" , new_salt = TemporaryToken . generate_random_token ) unless config . salt_attribute_name . nil?
190+ unless config . salt_attribute_name . nil?
191+ send ( :"#{ config . salt_attribute_name } =" , new_salt = TemporaryToken . generate_random_token )
192+ end
193193 send ( :"#{ config . crypted_password_attribute_name } =" , self . class . encrypt ( send ( config . password_attribute_name ) , new_salt ) )
194194 end
195195
0 commit comments