+# == Schema Information
+#
+# Table name: oauth_tokens
+#
+# id :integer not null, primary key
+# user_id :integer
+# type :string(20)
+# client_application_id :integer
+# token :string(50)
+# secret :string(50)
+# authorized_at :datetime
+# invalidated_at :datetime
+# created_at :datetime
+# updated_at :datetime
+# allow_read_prefs :boolean default(FALSE), not null
+# allow_write_prefs :boolean default(FALSE), not null
+# allow_write_diary :boolean default(FALSE), not null
+# allow_write_api :boolean default(FALSE), not null
+# allow_read_gpx :boolean default(FALSE), not null
+# allow_write_gpx :boolean default(FALSE), not null
+# callback_url :string
+# verifier :string(20)
+# scope :string
+# valid_to :datetime
+# allow_write_notes :boolean default(FALSE), not null
+#
+# Indexes
+#
+# index_oauth_tokens_on_token (token) UNIQUE
+# index_oauth_tokens_on_user_id (user_id)
+#
+# Foreign Keys
+#
+# oauth_tokens_client_application_id_fkey (client_application_id => client_applications.id)
+# oauth_tokens_user_id_fkey (user_id => users.id)
+#
+
class AccessToken < OauthToken
belongs_to :user
belongs_to :client_application
scope :valid, -> { where(:invalidated_at => nil) }
- validates_presence_of :user, :secret
+ validates :user, :secret, :presence => true
before_create :set_authorized_at
-protected
+ def includes_scope?(scope)
+ self[:"allow_#{scope}"]
+ end
+
+ protected
def set_authorized_at
self.authorized_at = Time.now