Merge pull request #4758 from tomhughes/login-referer
Stop using the session to persist the referer during login
This commit is contained in:
commit
8a5c9a8052
5 changed files with 31 additions and 40 deletions
|
@ -54,11 +54,7 @@ class UsersController < ApplicationController
|
|||
|
||||
def new
|
||||
@title = t ".title"
|
||||
@referer = if params[:referer]
|
||||
safe_referer(params[:referer])
|
||||
else
|
||||
session[:referer]
|
||||
end
|
||||
@referer = safe_referer(params[:referer])
|
||||
|
||||
parse_oauth_referer @referer
|
||||
|
||||
|
@ -94,10 +90,6 @@ class UsersController < ApplicationController
|
|||
self.current_user = User.new(user_params)
|
||||
|
||||
if check_signup_allowed(current_user.email)
|
||||
session[:referer] = safe_referer(params[:referer]) if params[:referer]
|
||||
|
||||
Rails.logger.info "create: #{session[:referer]}"
|
||||
|
||||
if current_user.auth_uid.present?
|
||||
# We are creating an account with external authentication and
|
||||
# no password was specified so create a random one
|
||||
|
@ -115,7 +107,7 @@ class UsersController < ApplicationController
|
|||
else
|
||||
# Save the user record
|
||||
session[:new_user] = current_user.slice("email", "display_name", "pass_crypt", "pass_crypt_confirmation")
|
||||
save_new_user params[:email_hmac]
|
||||
save_new_user params[:email_hmac], params[:referer]
|
||||
end
|
||||
end
|
||||
end
|
||||
|
@ -200,6 +192,7 @@ class UsersController < ApplicationController
|
|||
##
|
||||
# omniauth success callback
|
||||
def auth_success
|
||||
referer = request.env["omniauth.params"]["referer"]
|
||||
auth_info = request.env["omniauth.auth"]
|
||||
|
||||
provider = auth_info[:provider]
|
||||
|
@ -233,7 +226,7 @@ class UsersController < ApplicationController
|
|||
session[:new_user]["auth_uid"] = uid
|
||||
|
||||
email_hmac = UsersController.message_hmac(email) if email_verified && email
|
||||
save_new_user email_hmac
|
||||
save_new_user email_hmac, referer
|
||||
else
|
||||
user = User.find_by(:auth_provider => provider, :auth_uid => uid)
|
||||
|
||||
|
@ -246,13 +239,13 @@ class UsersController < ApplicationController
|
|||
if user
|
||||
case user.status
|
||||
when "pending"
|
||||
unconfirmed_login(user)
|
||||
unconfirmed_login(user, referer)
|
||||
when "active", "confirmed"
|
||||
successful_login(user, request.env["omniauth.params"]["referer"])
|
||||
successful_login(user, referer)
|
||||
when "suspended"
|
||||
failed_login({ :partial => "sessions/suspended_flash" })
|
||||
failed_login({ :partial => "sessions/suspended_flash" }, user.display_name, referer)
|
||||
else
|
||||
failed_login t("sessions.new.auth failure")
|
||||
failed_login(t("sessions.new.auth failure"), user.display_name, referer)
|
||||
end
|
||||
else
|
||||
email_hmac = UsersController.message_hmac(email) if email_verified && email
|
||||
|
@ -281,7 +274,7 @@ class UsersController < ApplicationController
|
|||
|
||||
private
|
||||
|
||||
def save_new_user(email_hmac)
|
||||
def save_new_user(email_hmac, referer = nil)
|
||||
new_user = session.delete(:new_user)
|
||||
self.current_user = User.new(new_user)
|
||||
if check_signup_allowed(current_user.email)
|
||||
|
@ -306,11 +299,10 @@ class UsersController < ApplicationController
|
|||
|
||||
flash[:matomo_goal] = Settings.matomo["goals"]["signup"] if defined?(Settings.matomo)
|
||||
|
||||
referer = welcome_path(welcome_options)
|
||||
referer = welcome_path(welcome_options(referer))
|
||||
|
||||
if current_user.status == "active"
|
||||
session[:referer] = referer
|
||||
successful_login(current_user)
|
||||
successful_login(current_user, referer)
|
||||
else
|
||||
session[:pending_user] = current_user.id
|
||||
UserMailer.signup_confirm(current_user, current_user.generate_token_for(:new_user), referer).deliver_later
|
||||
|
@ -322,8 +314,8 @@ class UsersController < ApplicationController
|
|||
end
|
||||
end
|
||||
|
||||
def welcome_options
|
||||
uri = URI(session[:referer]) if session[:referer].present?
|
||||
def welcome_options(referer = nil)
|
||||
uri = URI(referer) if referer.present?
|
||||
|
||||
return { "oauth_return_url" => uri&.to_s } if uri&.path == oauth_authorization_path
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue