X-Git-Url: https://git.openstreetmap.org./rails.git/blobdiff_plain/8024a38be4618919310982cd0648c510dcb73d28..0030c7753740820fab12455dd841cd39c58b6475:/app/controllers/application_controller.rb diff --git a/app/controllers/application_controller.rb b/app/controllers/application_controller.rb index 657cb27e3..655017847 100644 --- a/app/controllers/application_controller.rb +++ b/app/controllers/application_controller.rb @@ -4,6 +4,9 @@ class ApplicationController < ActionController::Base if STATUS == :database_readonly or STATUS == :database_offline session :off + + def self.cache_sweeper(*sweepers) + end end def authorize_web @@ -11,10 +14,20 @@ class ApplicationController < ActionController::Base @user = User.find(session[:user], :conditions => {:status => ["active", "confirmed", "suspended"]}) if @user.status == "suspended" - session[:user] = nil + session.delete(:user) session_expires_automatically redirect_to :controller => "user", :action => "suspended" + + # don't allow access to any auth-requiring part of the site unless + # the new CTs have been seen (and accept/decline chosen). + elsif !@user.terms_seen and flash[:skip_terms].nil? + flash[:notice] = t 'user.terms.you need to accept or decline' + if params[:referer] + redirect_to :controller => "user", :action => "terms", :referer => params[:referer] + else + redirect_to :controller => "user", :action => "terms", :referer => request.request_uri + end end elsif session[:token] @user = User.authenticate(:token => session[:token]) @@ -40,7 +53,7 @@ class ApplicationController < ActionController::Base # method, otherwise an OAuth token was used, which has to be checked. unless current_token.nil? unless current_token.read_attribute(cap) - render :text => "OAuth token doesn't have that capability.", :status => :forbidden + report_error "OAuth token doesn't have that capability.", :forbidden return false end end @@ -51,11 +64,14 @@ class ApplicationController < ActionController::Base def require_cookies if request.cookies["_osm_session"].to_s == "" if params[:cookie_test].nil? + session[:cookie_test] = true redirect_to params.merge(:cookie_test => "true") return false else flash.now[:warning] = t 'application.require_cookies.cookies_needed' end + else + session.delete(:cookie_test) end end @@ -71,6 +87,11 @@ class ApplicationController < ActionController::Base end def require_allow_write_api require_capability(:allow_write_api) + + if REQUIRE_TERMS_AGREED and @user.terms_agreed.nil? + report_error "You must accept the contributor terms before you can edit.", :forbidden + return false + end end def require_allow_read_gpx require_capability(:allow_read_gpx) @@ -104,15 +125,15 @@ class ApplicationController < ActionController::Base # check if the user has been banned if not @user.active_blocks.empty? # NOTE: need slightly more helpful message than this. - render :text => t('application.setup_user_auth.blocked'), :status => :forbidden + report_error t('application.setup_user_auth.blocked'), :forbidden end # if the user hasn't seen the contributor terms then don't # allow editing - they have to go to the web site and see # (but can decline) the CTs to continue. - if REQUIRE_TERMS_SEEN and not @user.terms_seen + if REQUIRE_TERMS_SEEN and not @user.terms_seen and flash[:skip_terms].nil? set_locale - render :text => t('application.setup_user_auth.need_to_see_terms'), :status => :forbidden + report_error t('application.setup_user_auth.need_to_see_terms'), :forbidden end end end