2019-10-12 21:52:04 +05:30
# frozen_string_literal: true
module SessionsHelper
2021-09-30 23:02:18 +05:30
include Gitlab :: Utils :: StrongMemoize
def recently_confirmed_com?
strong_memoize ( :recently_confirmed_com ) do
2022-05-07 20:08:51 +05:30
:: Gitlab . com? &&
2021-09-30 23:02:18 +05:30
! ! flash [ :notice ] & . include? ( t ( :confirmed , scope : [ :devise , :confirmations ] ) )
end
end
2019-10-12 21:52:04 +05:30
def unconfirmed_email?
flash [ :alert ] == t ( :unconfirmed , scope : [ :devise , :failure ] )
end
2019-12-26 22:10:19 +05:30
# By default, all sessions are given the same expiration time configured in
# the session store (e.g. 1 week). However, unauthenticated users can
# generate a lot of sessions, primarily for CSRF verification. It makes
# sense to reduce the TTL for unauthenticated to something much lower than
# the default (e.g. 1 hour) to limit Redis memory. In addition, Rails
# creates a new session after login, so the short TTL doesn't even need to
# be extended.
def limit_session_time
2021-11-11 11:23:49 +05:30
set_session_time ( Settings . gitlab [ 'unauthenticated_session_expire_delay' ] )
end
def ensure_authenticated_session_time
set_session_time ( nil )
end
def set_session_time ( expiry_s )
2019-12-26 22:10:19 +05:30
# Rack sets this header, but not all tests may have it: https://github.com/rack/rack/blob/fdcd03a3c5a1c51d1f96fc97f9dfa1a9deac0c77/lib/rack/session/abstract/id.rb#L251-L259
return unless request . env [ 'rack.session.options' ]
2021-11-11 11:23:49 +05:30
# This works because Rack uses these options every time a request is handled, and redis-store
# uses the Rack setting first:
# 1. https://github.com/rack/rack/blob/fdcd03a3c5a1c51d1f96fc97f9dfa1a9deac0c77/lib/rack/session/abstract/id.rb#L342
# 2. https://github.com/redis-store/redis-store/blob/3acfa95f4eb6260c714fdb00a3d84be8eedc13b2/lib/redis/store/ttl.rb#L32
request . env [ 'rack.session.options' ] [ :expire_after ] = expiry_s
2019-12-26 22:10:19 +05:30
end
2022-08-13 15:12:31 +05:30
def send_rate_limited? ( user )
Gitlab :: ApplicationRateLimiter . peek ( :email_verification_code_send , scope : user )
end
def obfuscated_email ( email )
regex = :: Gitlab :: UntrustedRegexp . new ( '^(..?)(.*)(@.?)(.*)(\..*)$' )
match = regex . match ( email )
return email unless match
2022-11-25 23:54:43 +05:30
match [ 1 ] + '*' * ( match [ 2 ] || '' ) . length + match [ 3 ] + '*' * ( match [ 4 ] || '' ) . length + match [ 5 ]
2022-08-13 15:12:31 +05:30
end
2019-10-12 21:52:04 +05:30
end