X-Git-Url: https://git.openstreetmap.org./rails.git/blobdiff_plain/f8de0c1811a21a552541acd2288d191e872ca434..edfbbf7336a38162b2d996ebca21918a5d6039a0:/app/controllers/user_controller.rb diff --git a/app/controllers/user_controller.rb b/app/controllers/user_controller.rb index be3ab86fb..3a0e0a149 100644 --- a/app/controllers/user_controller.rb +++ b/app/controllers/user_controller.rb @@ -227,7 +227,7 @@ class UserController < ApplicationController @user.status = "pending" - if @user.auth_provider.present? && @user.auth_uid.present? && @user.pass_crypt.empty? + if @user.auth_provider.present? && @user.pass_crypt.empty? # We are creating an account with external authentication and # no password was specified so create a random one @user.pass_crypt = SecureRandom.base64(16) @@ -237,7 +237,7 @@ class UserController < ApplicationController if @user.invalid? # Something is wrong with a new user, so rerender the form render :action => "new" - elsif @user.auth_provider.present? && @user.auth_uid.present? + elsif @user.auth_provider.present? # Verify external authenticator before moving on session[:new_user] = @user redirect_to auth_url(@user.auth_provider, @user.auth_uid) @@ -250,16 +250,14 @@ class UserController < ApplicationController end def login - if params[:username] || params[:openid_url] - session[:referer] ||= params[:referer] + session[:referer] = params[:referer] if params[:referer] - if params[:openid_url].present? - session[:remember_me] ||= params[:remember_me_openid] - redirect_to auth_url("openid", params[:openid_url]) - else - session[:remember_me] ||= params[:remember_me] - password_authentication(params[:username], params[:password]) - end + if params[:username].present? && params[:password].present? + session[:remember_me] ||= params[:remember_me] + password_authentication(params[:username], params[:password]) + elsif params[:openid_url].present? + session[:remember_me] ||= params[:remember_me_openid] + redirect_to auth_url("openid", params[:openid_url]) end end @@ -496,11 +494,21 @@ class UserController < ApplicationController when "openid" email_verified = uid.match(%r{https://www.google.com/accounts/o8/id?(.*)}) || uid.match(%r{https://me.yahoo.com/(.*)}) + when "google" + email_verified = true else email_verified = false end - if user = User.find_by_auth_provider_and_auth_uid(provider, uid) + user = User.find_by_auth_provider_and_auth_uid(provider, uid) + + if user.nil? && provider == "google" + openid_url = auth_info[:extra][:id_info]["openid_id"] + user = User.find_by_auth_provider_and_auth_uid("openid", openid_url) if openid_url + user.update(:auth_provider => provider, :auth_uid => uid) if user + end + + if user case user.status when "pending" then unconfirmed_login(user) @@ -537,7 +545,7 @@ class UserController < ApplicationController # omniauth failure callback def auth_failure flash[:error] = t("user.auth_failure." + params[:message]) - redirect_to params[:origin] + redirect_to params[:origin] || login_url end private @@ -572,7 +580,7 @@ class UserController < ApplicationController def openid_expand_url(openid_url) if openid_url.nil? return nil - elsif openid_url.match(/(.*)gmail.com(\/?)$/) || openid_url.match(/(.*)googlemail.com(\/?)$/) + elsif openid_url.match(%r{(.*)gmail.com(/?)$}) || openid_url.match(%r{(.*)googlemail.com(/?)$}) # Special case gmail.com as it is potentially a popular OpenID # provider and, unlike yahoo.com, where it works automatically, Google # have hidden their OpenID endpoint somewhere obscure this making it @@ -668,8 +676,7 @@ class UserController < ApplicationController user.preferred_editor = params[:user][:preferred_editor] end - if params[:user][:auth_provider].nil? || params[:user][:auth_provider].blank? || - params[:user][:auth_uid].nil? || params[:user][:auth_uid].blank? + if params[:user][:auth_provider].nil? || params[:user][:auth_provider].blank? user.auth_provider = nil user.auth_uid = nil end