2016-11-16 02:56:29 +11:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2016-03-06 08:43:05 +11:00
|
|
|
class Auth::SessionsController < Devise::SessionsController
|
2016-03-28 09:06:52 +11:00
|
|
|
include Devise::Controllers::Rememberable
|
|
|
|
|
2016-03-06 08:43:05 +11:00
|
|
|
layout 'auth'
|
2016-03-28 09:06:52 +11:00
|
|
|
|
2017-01-29 06:43:38 +11:00
|
|
|
skip_before_action :require_no_authentication, only: [:create]
|
Change unconfirmed user login behaviour (#11375)
Allow access to account settings, 2FA, authorized applications, and
account deletions to unconfirmed and pending users, as well as
users who had their accounts disabled. Suspended users cannot update
their e-mail or password or delete their account.
Display account status on account settings page, for example, when
an account is frozen, limited, unconfirmed or pending review.
After sign up, login users straight away and show a simple page that
tells them the status of their account with links to account settings
and logout, to reduce onboarding friction and allow users to correct
wrongly typed e-mail addresses.
Move the final sign-up step of SSO integrations to be the same
as above to reduce code duplication.
2019-07-22 18:48:50 +10:00
|
|
|
skip_before_action :require_functional!
|
|
|
|
|
2017-10-11 09:52:25 +11:00
|
|
|
before_action :set_instance_presenter, only: [:new]
|
2018-07-31 09:14:33 +10:00
|
|
|
before_action :set_body_classes
|
2017-01-28 06:28:46 +11:00
|
|
|
|
2018-02-23 11:16:17 +11:00
|
|
|
def new
|
|
|
|
Devise.omniauth_configs.each do |provider, config|
|
2018-03-08 21:18:26 +11:00
|
|
|
return redirect_to(omniauth_authorize_path(resource_name, provider)) if config.strategy.redirect_at_sign_in
|
2018-02-23 11:16:17 +11:00
|
|
|
end
|
2018-03-08 21:18:26 +11:00
|
|
|
|
2018-02-23 11:16:17 +11:00
|
|
|
super
|
|
|
|
end
|
|
|
|
|
2016-03-28 09:06:52 +11:00
|
|
|
def create
|
2019-09-16 05:08:39 +10:00
|
|
|
self.resource = begin
|
|
|
|
if user_params[:email].blank? && session[:otp_user_id].present?
|
|
|
|
User.find(session[:otp_user_id])
|
|
|
|
else
|
|
|
|
warden.authenticate!(auth_options)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
if resource.otp_required_for_login?
|
|
|
|
if user_params[:otp_attempt].present? && session[:otp_user_id].present?
|
|
|
|
authenticate_with_two_factor_via_otp(resource)
|
|
|
|
else
|
|
|
|
prompt_for_two_factor(resource)
|
|
|
|
end
|
|
|
|
else
|
|
|
|
authenticate_and_respond(resource)
|
2016-03-28 09:06:52 +11:00
|
|
|
end
|
|
|
|
end
|
2016-09-27 07:55:21 +10:00
|
|
|
|
2017-01-29 06:43:38 +11:00
|
|
|
def destroy
|
2018-09-09 12:10:44 +10:00
|
|
|
tmp_stored_location = stored_location_for(:user)
|
2017-01-29 06:43:38 +11:00
|
|
|
super
|
2019-09-19 00:37:27 +10:00
|
|
|
session.delete(:challenge_passed_at)
|
2017-05-27 21:04:28 +10:00
|
|
|
flash.delete(:notice)
|
2018-09-09 12:10:44 +10:00
|
|
|
store_location_for(:user, tmp_stored_location) if continue_after?
|
2017-01-29 06:43:38 +11:00
|
|
|
end
|
|
|
|
|
2016-09-27 07:55:21 +10:00
|
|
|
protected
|
|
|
|
|
2017-01-29 06:43:38 +11:00
|
|
|
def user_params
|
|
|
|
params.require(:user).permit(:email, :password, :otp_attempt)
|
2017-01-28 06:28:46 +11:00
|
|
|
end
|
|
|
|
|
2017-05-26 22:14:03 +10:00
|
|
|
def after_sign_in_path_for(resource)
|
2016-10-04 01:38:22 +11:00
|
|
|
last_url = stored_location_for(:user)
|
|
|
|
|
2017-05-26 22:14:03 +10:00
|
|
|
if home_paths(resource).include?(last_url)
|
2016-10-04 01:38:22 +11:00
|
|
|
root_path
|
|
|
|
else
|
|
|
|
last_url || root_path
|
|
|
|
end
|
2016-09-27 07:55:21 +10:00
|
|
|
end
|
2017-01-29 06:43:38 +11:00
|
|
|
|
2018-03-08 21:18:26 +11:00
|
|
|
def after_sign_out_path_for(_resource_or_scope)
|
|
|
|
Devise.omniauth_configs.each_value do |config|
|
|
|
|
return root_path if config.strategy.redirect_at_sign_in
|
|
|
|
end
|
|
|
|
|
|
|
|
super
|
|
|
|
end
|
|
|
|
|
2017-01-29 06:43:38 +11:00
|
|
|
def valid_otp_attempt?(user)
|
2017-04-15 21:26:03 +10:00
|
|
|
user.validate_and_consume_otp!(user_params[:otp_attempt]) ||
|
|
|
|
user.invalidate_otp_backup_code!(user_params[:otp_attempt])
|
2019-09-16 05:08:39 +10:00
|
|
|
rescue OpenSSL::Cipher::CipherError
|
2017-04-27 23:18:21 +10:00
|
|
|
false
|
2017-01-29 06:43:38 +11:00
|
|
|
end
|
|
|
|
|
|
|
|
def authenticate_with_two_factor_via_otp(user)
|
|
|
|
if valid_otp_attempt?(user)
|
|
|
|
session.delete(:otp_user_id)
|
2019-09-16 05:08:39 +10:00
|
|
|
authenticate_and_respond(user)
|
2017-01-29 06:43:38 +11:00
|
|
|
else
|
|
|
|
flash.now[:alert] = I18n.t('users.invalid_otp_token')
|
|
|
|
prompt_for_two_factor(user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def prompt_for_two_factor(user)
|
|
|
|
session[:otp_user_id] = user.id
|
|
|
|
render :two_factor
|
|
|
|
end
|
2017-05-26 22:14:03 +10:00
|
|
|
|
2019-09-16 05:08:39 +10:00
|
|
|
def authenticate_and_respond(user)
|
|
|
|
sign_in(user)
|
|
|
|
remember_me(user)
|
|
|
|
|
|
|
|
respond_with user, location: after_sign_in_path_for(user)
|
|
|
|
end
|
|
|
|
|
2017-05-26 22:14:03 +10:00
|
|
|
private
|
|
|
|
|
2017-10-11 09:52:25 +11:00
|
|
|
def set_instance_presenter
|
|
|
|
@instance_presenter = InstancePresenter.new
|
|
|
|
end
|
|
|
|
|
2018-07-31 09:14:33 +10:00
|
|
|
def set_body_classes
|
|
|
|
@body_classes = 'lighter'
|
|
|
|
end
|
|
|
|
|
2017-05-26 22:14:03 +10:00
|
|
|
def home_paths(resource)
|
|
|
|
paths = [about_path]
|
2019-09-16 05:08:39 +10:00
|
|
|
|
2017-05-26 22:14:03 +10:00
|
|
|
if single_user_mode? && resource.is_a?(User)
|
|
|
|
paths << short_account_path(username: resource.account)
|
|
|
|
end
|
2019-09-16 05:08:39 +10:00
|
|
|
|
2017-05-26 22:14:03 +10:00
|
|
|
paths
|
|
|
|
end
|
2018-09-07 13:42:16 +10:00
|
|
|
|
2018-09-09 12:10:44 +10:00
|
|
|
def continue_after?
|
|
|
|
truthy_param?(:continue)
|
|
|
|
end
|
2016-03-06 08:43:05 +11:00
|
|
|
end
|