config/initializers/devise.rb
Line is too long. [84/80] Open
Open
# Configure parameters from the request object used for authentication. Each entry
- Exclude checks
Line is too long. [82/80] Open
Open
# Turn scoped views on. Before rendering "sessions/new", it will first check for
- Exclude checks
Inconsistent indentation detected. Open
Open
config.scoped_views = true
- Read upRead up
- Exclude checks
This cops checks for inconsistent indentation.
Example:
class A
def test
puts 'hello'
puts 'world'
end
end
Line is too long. [85/80] Open
Open
# modifying a user and when used to authenticate or find a user. Default is :email.
- Exclude checks
Line is too long. [83/80] Open
Open
# given strategies, for example, `config.http_authenticatable = [:database]` will
- Exclude checks
Line is too long. [84/80] Open
Open
# unconfirmed_email column, and copied to email column on successful confirmation.
- Exclude checks
Line is too long. [154/80] Open
Open
# config.secret_key = '4e789158e78971272578915e94ac402b8856475095bef772786c8020c098d8f58a18e58dfd616dabdc7010635a2d6c80626136145a02c9d258afba62f314c70c'
- Exclude checks
Line is too long. [83/80] Open
Open
# session. If you need permissions, you should implement that in a before filter.
- Exclude checks
Line is too long. [84/80] Open
Open
# :database = Support basic authentication with authentication key + password
- Exclude checks
Line is too long. [81/80] Open
Open
# It can be set to an array that will enable params authentication only for the
- Exclude checks
Line is too long. [82/80] Open
Open
# a value less than 10 in other environments. Note that, for bcrypt (the default
- Exclude checks
Line is too long. [89/80] Open
Open
# The same considerations mentioned for authentication_keys also apply to request_keys.
- Exclude checks
Line is too long. [81/80] Open
Open
# :clearance_sha1, :authlogic_sha512 (then you should set stretches above to 20
- Exclude checks
Line is too long. [150/80] Open
Open
# config.pepper = 'd7335cf05a88f8bdf671de1cb78906587cee4bd8a5c47bfac11edc0c0214f80d977d762a6ea9a1d20251814bfcafae7bef033f5c769152a4c50954cf2badb187'
- Exclude checks
Line is too long. [83/80] Open
Open
# :time = Re-enables login after a certain amount of time (see :unlock_in below)
- Exclude checks
Incorrect indentation detected (column 2 instead of 3). Open
Open
# are using only default views.
- Read upRead up
- Exclude checks
This cops checks the indentation of comments.
Example:
# bad
# comment here
def method_name
end
# comment here
a = 'hello'
# yet another comment
if true
true
end
# good
# comment here
def method_name
end
# comment here
a = 'hello'
# yet another comment
if true
true
end
Line is too long. [85/80] Open
Open
# given strategies, for example, `config.params_authenticatable = [:database]` will
- Exclude checks
Line is too long. [86/80] Open
Open
# initial account confirmation) to be applied. Requires additional unconfirmed_email
- Exclude checks
Line is too long. [86/80] Open
Open
# Allow you to use another hashing or encryption algorithm besides bcrypt (default).
- Exclude checks
Line is too long. [82/80] Open
Open
# Limiting the stretches to just one in testing will increase the performance of
- Exclude checks
Line is too long. [83/80] Open
Open
# a value of 20 is already extremely slow: approx. 60 seconds for 1 calculation).
- Exclude checks
Line is too long. [85/80] Open
Open
config.mailer_sender = 'please-change-me-at-config-initializers-devise@example.com'
- Exclude checks
Line is too long. [88/80] Open
Open
# if you set :request_keys to [:subdomain], :subdomain will be used on authentication.
- Exclude checks
Line is too long. [84/80] Open
Open
# When set to false, does not sign a user in automatically after their password is
- Exclude checks
Line is too long. [81/80] Open
Open
# When using Devise inside an engine, let's call it `MyEngine`, and this engine
- Exclude checks
Line is too long. [85/80] Open
Open
# find_for_authentication method and considered in your model lookup. For instance,
- Exclude checks
Line is too long. [83/80] Open
Open
# algorithm), the cost increases exponentially with the number of stretches (e.g.
- Exclude checks
Line is too long. [85/80] Open
Open
# :failed_attempts = Locks an account after a number of failed attempts to sign in.
- Exclude checks
Line is too long. [86/80] Open
Open
# using other algorithms, it sets how many times you want the password to be hashed.
- Exclude checks
Line is too long. [82/80] Open
Open
# change the failure app, you can configure them inside the config.warden block.
- Exclude checks