Retrospring/app/controllers/application_controller.rb

62 lines
2.0 KiB
Ruby

class ApplicationController < ActionController::Base
# Prevent CSRF attacks by raising an exception.
# For APIs, you may want to use :null_session instead.
protect_from_forgery with: :exception
before_action :sentry_user_context
before_action :configure_permitted_parameters, if: :devise_controller?
before_action :check_locale
before_action :banned?
before_action :find_active_announcements
# check if user wants to read
def check_locale
return I18n.locale = "en" if Rails.env.test?
I18n.locale = "en"
cookies[:lang] = I18n.locale
end
# check if user got hit by the banhammer of doom
def banned?
if current_user.present? && current_user.banned?
name = current_user.screen_name
# obligatory '2001: A Space Odyssey' reference
flash[:notice] = t("user.sessions.create.banned", name:)
current_ban = current_user.bans.current.first
unless current_ban&.reason.nil?
flash[:notice] += "\n#{t('user.sessions.create.reason', reason: current_ban.reason)}"
end
unless current_ban&.permanent?
# TODO format banned_until
flash[:notice] += "\n#{t('user.sessions.create.until', time: current_ban.expires_at)}"
end
sign_out current_user
redirect_to new_user_session_path
end
end
def find_active_announcements
@active_announcements ||= Announcement.find_active
end
include ApplicationHelper
protected
def configure_permitted_parameters
devise_parameter_sanitizer.permit(:sign_up) { |u| u.permit(:screen_name, :email, :password, :password_confirmation, :remember_me) }
devise_parameter_sanitizer.permit(:sign_in) { |u| u.permit(:login, :screen_name, :email, :password, :remember_me) }
devise_parameter_sanitizer.permit(:account_update) { |u| u.permit(:screen_name, :email, :password, :password_confirmation, :current_password) }
end
def sentry_user_context
if current_user.present?
Sentry.set_user({ id: current_user.id })
else
Sentry.set_user({ ip_address: request.ip })
end
end
end