debian-mirror-gitlab/app/controllers/registrations_controller.rb

129 lines
3.8 KiB
Ruby
Raw Normal View History

2018-12-05 23:21:45 +05:30
# frozen_string_literal: true
2014-09-02 18:07:02 +05:30
class RegistrationsController < Devise::RegistrationsController
include Recaptcha::Verify
2018-11-08 19:23:39 +05:30
include AcceptsPendingInvitations
2014-09-02 18:07:02 +05:30
2019-09-04 21:01:54 +05:30
prepend_before_action :check_captcha, only: :create
2018-03-17 18:26:18 +05:30
before_action :whitelist_query_limiting, only: [:destroy]
2018-11-08 19:23:39 +05:30
before_action :ensure_terms_accepted,
if: -> { Gitlab::CurrentSettings.current_application_settings.enforce_terms? },
only: [:create]
2018-03-17 18:26:18 +05:30
2015-04-26 12:48:37 +05:30
def new
redirect_to(new_user_session_path)
end
def create
2017-08-17 22:00:37 +05:30
# To avoid duplicate form fields on the login page, the registration form
# names fields using `new_user`, but Devise still wants the params in
# `user`.
if params["new_#{resource_name}"].present? && params[resource_name].blank?
params[resource_name] = params.delete(:"new_#{resource_name}")
end
2016-06-02 11:05:42 +05:30
2019-09-04 21:01:54 +05:30
accept_pending_invitations
super do |new_user|
persist_accepted_terms_if_required(new_user)
end
2017-08-17 22:00:37 +05:30
rescue Gitlab::Access::AccessDeniedError
redirect_to(new_user_session_path)
end
2014-09-02 18:07:02 +05:30
def destroy
2018-03-17 18:26:18 +05:30
if destroy_confirmation_valid?
current_user.delete_async(deleted_by: current_user)
session.try(:destroy)
redirect_to new_user_session_path, status: 303, notice: s_('Profiles|Account scheduled for removal.')
else
redirect_to profile_account_path, status: 303, alert: destroy_confirmation_failure_message
2014-09-02 18:07:02 +05:30
end
end
protected
2018-11-08 19:23:39 +05:30
def persist_accepted_terms_if_required(new_user)
return unless new_user.persisted?
return unless Gitlab::CurrentSettings.current_application_settings.enforce_terms?
if terms_accepted?
terms = ApplicationSetting::Term.latest
Users::RespondToTermsService.new(new_user, terms).execute(accepted: true)
end
end
2018-03-17 18:26:18 +05:30
def destroy_confirmation_valid?
if current_user.confirm_deletion_with_password?
current_user.valid_password?(params[:password])
else
current_user.username == params[:username]
end
end
def destroy_confirmation_failure_message
if current_user.confirm_deletion_with_password?
s_('Profiles|Invalid password')
else
s_('Profiles|Invalid username')
end
end
2016-09-13 17:45:13 +05:30
def build_resource(hash = nil)
2014-09-02 18:07:02 +05:30
super
end
2016-06-02 11:05:42 +05:30
def after_sign_up_path_for(user)
2018-03-17 18:26:18 +05:30
Gitlab::AppLogger.info("User Created: username=#{user.username} email=#{user.email} ip=#{request.remote_ip} confirmed:#{user.confirmed?}")
2018-11-08 19:23:39 +05:30
user.confirmed? ? stored_location_for(user) || dashboard_projects_path : users_almost_there_path
2014-09-02 18:07:02 +05:30
end
2018-03-17 18:26:18 +05:30
def after_inactive_sign_up_path_for(resource)
Gitlab::AppLogger.info("User Created: username=#{resource.username} email=#{resource.email} ip=#{request.remote_ip} confirmed:false")
2016-06-02 11:05:42 +05:30
users_almost_there_path
2014-09-02 18:07:02 +05:30
end
private
2019-09-04 21:01:54 +05:30
def check_captcha
return unless Feature.enabled?(:registrations_recaptcha, default_enabled: true)
return unless Gitlab::Recaptcha.load_configurations!
return if verify_recaptcha
flash[:alert] = _('There was an error with the reCAPTCHA. Please solve the reCAPTCHA again.')
flash.delete :recaptcha_error
render action: 'new'
end
2014-09-02 18:07:02 +05:30
def sign_up_params
2017-08-17 22:00:37 +05:30
params.require(:user).permit(:username, :email, :email_confirmation, :name, :password)
2014-09-02 18:07:02 +05:30
end
def resource_name
:user
end
def resource
2017-08-17 22:00:37 +05:30
@resource ||= Users::BuildService.new(current_user, sign_up_params).execute
end
def devise_mapping
@devise_mapping ||= Devise.mappings[:user]
end
2018-03-17 18:26:18 +05:30
def whitelist_query_limiting
Gitlab::QueryLimiting.whitelist('https://gitlab.com/gitlab-org/gitlab-ce/issues/42380')
end
2018-11-08 19:23:39 +05:30
def ensure_terms_accepted
return if terms_accepted?
redirect_to new_user_session_path, alert: _('You must accept our Terms of Service and privacy policy in order to register an account')
end
def terms_accepted?
Gitlab::Utils.to_boolean(params[:terms_opt_in])
end
2014-09-02 18:07:02 +05:30
end