19 Matching Annotations
- Mar 2023
-
stackoverflow.com stackoverflow.com
-
What you're actually trying to do is to have the exact same behaviour that native Devise implementation but on an Engine via API
-
-
-
github.com github.com
-
More maintained alternative: https://github.com/tinfoil/devise-two-factor
Tags
Annotators
URL
-
- Apr 2021
-
github.com github.com
-
# authenticated :user, lambda {|u| u.role == "admin"} do # root to: "admin/dashboard#show", as: :user_root # end
-
-
github.com github.com
-
class LoggedInConstraint def self.matches?(request) request.env['warden'].authenticate? end end
(have not tried)
-
-
stackoverflow.com stackoverflow.com
-
authenticated :user do root 'calendars#index', as: :authenticated_root end unauthenticated :user do root 'pages#home', as: :unauthenticated_root end
-
- Mar 2021
-
trailblazer.to trailblazer.to
-
definitely less rough to work with than Devise
-
- Feb 2021
- May 2020
-
github.com github.com
-
# If you are using devise, you must extend engines's controller with devise helpers in order to get current_user PolicyManager::UserTermsController.send(:include, Devise::Controllers::Helpers)
Tags
Annotators
URL
-
- Apr 2020
-
github.com github.com
-
github.com github.com
Tags
Annotators
URL
-
-
github.com github.com
-
github.com github.com
-
I need that model created despite being invalid, so it actually works in my favor (I have an after-signup profile creation process users through
-
-
github.com github.com
-
github.com github.com
-
Prefer over this: https://github.com/michaelbanfield/devise-pwned_password
-