render :action => "new"
elsif current_user.auth_provider.present?
# Verify external authenticator before moving on
- session[:new_user] = current_user.attributes.slice("email", "display_name", "pass_crypt")
+ session[:new_user] = current_user.slice("email", "display_name", "pass_crypt", "pass_crypt_confirmation")
redirect_to auth_url(current_user.auth_provider, current_user.auth_uid), :status => :temporary_redirect
else
# Save the user record
- session[:new_user] = current_user.attributes.slice("email", "display_name", "pass_crypt")
+ session[:new_user] = current_user.slice("email", "display_name", "pass_crypt", "pass_crypt_confirmation")
redirect_to :action => :terms
end
end
flash[:matomo_goal] = Settings.matomo["goals"]["signup"] if defined?(Settings.matomo)
- uri = URI(session[:referer]) if session[:referer].present?
- welcome_options = {}
- welcome_options["oauth_return_url"] = uri&.to_s if uri&.path == oauth_authorization_path
-
- begin
- %r{map=(.*)/(.*)/(.*)}.match(uri.fragment) do |m|
- editor = Rack::Utils.parse_query(uri.query).slice("editor")
- welcome_options = { "zoom" => m[1],
- "lat" => m[2],
- "lon" => m[3] }.merge(editor).merge(welcome_options)
- end
- rescue StandardError
- # Use default
- end
referer = welcome_path(welcome_options)
if current_user.status == "active"
private
+ def welcome_options
+ uri = URI(session[:referer]) if session[:referer].present?
+
+ return { "oauth_return_url" => uri&.to_s } if uri&.path == oauth_authorization_path
+
+ begin
+ %r{map=(.*)/(.*)/(.*)}.match(uri.fragment) do |m|
+ editor = Rack::Utils.parse_query(uri.query).slice("editor")
+ return { "zoom" => m[1], "lat" => m[2], "lon" => m[3] }.merge(editor)
+ end
+ rescue StandardError
+ # Use default
+ end
+ end
+
##
# ensure that there is a "user" instance variable
def lookup_user_by_name
domain_mx_servers(domain)
end
+ return true if Acl.allow_account_creation(request.remote_ip, :domain => domain, :mx => mx_servers)
+
blocked = Acl.no_account_creation(request.remote_ip, :domain => domain, :mx => mx_servers)
blocked ||= SIGNUP_IP_LIMITER && !SIGNUP_IP_LIMITER.allow?(request.remote_ip)