@ -52,6 +52,8 @@ class User < ApplicationRecord
devise :registerable , :recoverable , :rememberable , :trackable , :validatable ,
:confirmable
devise :pam_authenticatable if ENV [ 'PAM_ENABLED' ] == 'true'
devise :omniauthable
belongs_to :account , inverse_of : :user
@ -96,7 +98,7 @@ class User < ApplicationRecord
def pam_conflict?
return false unless Devise . pam_authentication
encrypted_password . present? && is_pam_account ?
encrypted_password . present? && pam_managed_user ?
end
def pam_get_name
@ -267,7 +269,7 @@ class User < ApplicationRecord
end
def self . pam_get_user ( attributes = { } )
if attributes [ :email ]
return nil unless attributes [ :email ]
resource =
if Devise . check_at_sign && ! attributes [ :email ] . index ( '@' )
joins ( :account ) . find_by ( accounts : { username : attributes [ :email ] } )
@ -278,12 +280,12 @@ class User < ApplicationRecord
if resource . blank?
resource = new ( email : attributes [ :email ] )
if Devise . check_at_sign && ! resource [ :email ] . index ( '@' )
resource [ :email ] = " #{ attributes [ :email ] } @ #{ resource . find_pam_suffix } "
resource [ :email ] = Rpam2 . getenv ( resource . find_pam_service , attributes [ :email ] , attributes [ :password ] , 'email' , false )
resource [ :email ] = " #{ attributes [ :email ] } @ #{ resource . find_pam_suffix } " unless resource [ :email ]
end
end
resource
end
end
def self . ldap_get_user ( attributes = { } )
resource = joins ( :account ) . find_by ( accounts : { username : attributes [ Devise . ldap_uid . to_sym ] . first } )