Files
openfoodnetwork/app/controllers/spree/admin/search_controller.rb

28 lines
937 B
Ruby

module Spree
module Admin
class SearchController < Spree::Admin::BaseController
# http://spreecommerce.com/blog/2010/11/02/json-hijacking-vulnerability/
before_filter :check_json_authenticity, :only => :index
respond_to :json
# TODO: Clean this up by moving searching out to user_class_extensions
# And then JSON building with something like Active Model Serializers
def users
if params[:ids]
@users = Spree.user_class.where(:id => params[:ids].split(','))
else
@users = Spree.user_class.ransack({
:m => 'or',
:email_start => params[:q],
:ship_address_firstname_start => params[:q],
:ship_address_lastname_start => params[:q],
:bill_address_firstname_start => params[:q],
:bill_address_lastname_start => params[:q]
}).result.limit(10)
end
end
end
end
end