Merge branch 'add-recaptcha-support' into 'master'
Add support for Google reCAPTCHA in user registration to prevent spammers To do: - [x] Failing reCAPTCHA test causes all the fields to be lost - ~~[ ] Improve styling of reCAPTCHA box~~ (not possible) - ~~[ ] Put settings in `application_settings` (?)~~ ![image](/uploads/d38ca89820d3c0066fb8aeb645fd77f0/image.png) ![image](/uploads/6b050749963691b023d076682abcf736/image.png) Page when you fail CAPTCHA: ![image](/uploads/bc4846f0a5144985bc41dfa75eeab4c1/image.png) See merge request !2216
This commit is contained in:
commit
202010e33f
11 changed files with 121 additions and 10 deletions
|
@ -1,6 +1,7 @@
|
|||
Please view this file on the master branch, on stable branches it's out of date.
|
||||
|
||||
v 8.4.0 (unreleased)
|
||||
- Add support for Google reCAPTCHA in user registration to prevent spammers (Stan Hu)
|
||||
- Implement new UI for group page
|
||||
- Implement search inside emoji picker
|
||||
- Add API support for looking up a user by username (Stan Hu)
|
||||
|
|
3
Gemfile
3
Gemfile
|
@ -35,6 +35,9 @@ gem 'omniauth-twitter', '~> 1.2.0'
|
|||
gem 'omniauth_crowd'
|
||||
gem 'rack-oauth2', '~> 1.2.1'
|
||||
|
||||
# reCAPTCHA protection
|
||||
gem 'recaptcha', require: 'recaptcha/rails'
|
||||
|
||||
# Two-factor authentication
|
||||
gem 'devise-two-factor', '~> 2.0.0'
|
||||
gem 'rqrcode-rails3', '~> 0.1.7'
|
||||
|
|
|
@ -568,6 +568,8 @@ GEM
|
|||
trollop
|
||||
rdoc (3.12.2)
|
||||
json (~> 1.4)
|
||||
recaptcha (1.0.2)
|
||||
json
|
||||
redcarpet (3.3.3)
|
||||
redis (3.2.2)
|
||||
redis-actionpack (4.0.1)
|
||||
|
@ -930,6 +932,7 @@ DEPENDENCIES
|
|||
raphael-rails (~> 2.1.2)
|
||||
rblineprof
|
||||
rdoc (~> 3.6)
|
||||
recaptcha
|
||||
redcarpet (~> 3.3.3)
|
||||
redis-namespace
|
||||
redis-rails (~> 4.0.0)
|
||||
|
|
|
@ -1,10 +1,21 @@
|
|||
class RegistrationsController < Devise::RegistrationsController
|
||||
before_action :signup_enabled?
|
||||
include Recaptcha::Verify
|
||||
|
||||
def new
|
||||
redirect_to(new_user_session_path)
|
||||
end
|
||||
|
||||
def create
|
||||
if !Gitlab.config.recaptcha.enabled || verify_recaptcha
|
||||
super
|
||||
else
|
||||
flash[:alert] = "There was an error with the reCAPTCHA code below. Please re-enter the code."
|
||||
flash.delete :recaptcha_error
|
||||
render action: 'new'
|
||||
end
|
||||
end
|
||||
|
||||
def destroy
|
||||
DeleteUserService.new(current_user).execute(current_user)
|
||||
|
||||
|
@ -38,4 +49,16 @@ class RegistrationsController < Devise::RegistrationsController
|
|||
def sign_up_params
|
||||
params.require(:user).permit(:username, :email, :name, :password, :password_confirmation)
|
||||
end
|
||||
|
||||
def resource_name
|
||||
:user
|
||||
end
|
||||
|
||||
def resource
|
||||
@resource ||= User.new(sign_up_params)
|
||||
end
|
||||
|
||||
def devise_mapping
|
||||
@devise_mapping ||= Devise.mappings[:user]
|
||||
end
|
||||
end
|
||||
|
|
|
@ -1,5 +1,6 @@
|
|||
class SessionsController < Devise::SessionsController
|
||||
include AuthenticatesWithTwoFactor
|
||||
include Recaptcha::ClientHelper
|
||||
|
||||
prepend_before_action :authenticate_with_two_factor, only: [:create]
|
||||
prepend_before_action :store_redirect_path, only: [:new]
|
||||
|
@ -40,7 +41,7 @@ class SessionsController < Devise::SessionsController
|
|||
User.find(session[:otp_user_id])
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
def store_redirect_path
|
||||
redirect_path =
|
||||
if request.referer.present? && (params['redirect_to_referer'] == 'yes')
|
||||
|
@ -87,14 +88,14 @@ class SessionsController < Devise::SessionsController
|
|||
provider = Gitlab.config.omniauth.auto_sign_in_with_provider
|
||||
return unless provider.present?
|
||||
|
||||
# Auto sign in with an Omniauth provider only if the standard "you need to sign-in" alert is
|
||||
# registered or no alert at all. In case of another alert (such as a blocked user), it is safer
|
||||
# Auto sign in with an Omniauth provider only if the standard "you need to sign-in" alert is
|
||||
# registered or no alert at all. In case of another alert (such as a blocked user), it is safer
|
||||
# to do nothing to prevent redirection loops with certain Omniauth providers.
|
||||
return unless flash[:alert].blank? || flash[:alert] == I18n.t('devise.failure.unauthenticated')
|
||||
|
||||
|
||||
# Prevent alert from popping up on the first page shown after authentication.
|
||||
flash[:alert] = nil
|
||||
|
||||
flash[:alert] = nil
|
||||
|
||||
redirect_to user_omniauth_authorize_path(provider.to_sym)
|
||||
end
|
||||
|
||||
|
|
|
@ -6,17 +6,21 @@
|
|||
.login-heading
|
||||
%h3 Create an account
|
||||
.login-body
|
||||
- user = params[:user].present? ? params[:user] : {}
|
||||
= form_for(resource, as: resource_name, url: registration_path(resource_name)) do |f|
|
||||
.devise-errors
|
||||
= devise_error_messages!
|
||||
%div
|
||||
= f.text_field :name, class: "form-control top", placeholder: "Name", required: true
|
||||
= f.text_field :name, class: "form-control top", value: user[:name], placeholder: "Name", required: true
|
||||
%div
|
||||
= f.text_field :username, class: "form-control middle", placeholder: "Username", required: true
|
||||
= f.text_field :username, class: "form-control middle", value: user[:username], placeholder: "Username", required: true
|
||||
%div
|
||||
= f.email_field :email, class: "form-control middle", placeholder: "Email", required: true
|
||||
= f.email_field :email, class: "form-control middle", value: user[:email], placeholder: "Email", required: true
|
||||
.form-group.append-bottom-20#password-strength
|
||||
= f.password_field :password, class: "form-control bottom", id: "user_password_sign_up", placeholder: "Password", required: true
|
||||
= f.password_field :password, class: "form-control bottom", value: user[:password], id: "user_password_sign_up", placeholder: "Password", required: true
|
||||
%div
|
||||
- if Gitlab.config.recaptcha.enabled
|
||||
= recaptcha_tags
|
||||
%div
|
||||
= f.submit "Sign up", class: "btn-create btn"
|
||||
|
||||
|
|
|
@ -346,6 +346,12 @@ production: &base
|
|||
# cas3:
|
||||
# session_duration: 28800
|
||||
|
||||
# reCAPTCHA settings. See: http://www.google.com/recaptcha
|
||||
recaptcha:
|
||||
enabled: false
|
||||
public_key: 'YOUR_PUBLIC_KEY'
|
||||
private_key: 'YOUR_PRIVATE_KEY'
|
||||
|
||||
# Shared file storage settings
|
||||
shared:
|
||||
# path: /mnt/gitlab # Default: shared
|
||||
|
|
|
@ -131,6 +131,13 @@ Settings.omniauth.cas3['session_duration'] ||= 8.hours
|
|||
Settings.omniauth['session_tickets'] ||= Settingslogic.new({})
|
||||
Settings.omniauth.session_tickets['cas3'] = 'ticket'
|
||||
|
||||
# ReCAPTCHA settings
|
||||
Settings['recaptcha'] ||= Settingslogic.new({})
|
||||
Settings.recaptcha['enabled'] = false if Settings.recaptcha['enabled'].nil?
|
||||
Settings.recaptcha['public_key'] ||= Settings.recaptcha['public_key']
|
||||
Settings.recaptcha['private_key'] ||= Settings.recaptcha['private_key']
|
||||
|
||||
|
||||
Settings['shared'] ||= Settingslogic.new({})
|
||||
Settings.shared['path'] = File.expand_path(Settings.shared['path'] || "shared", Rails.root)
|
||||
|
||||
|
|
6
config/initializers/recaptcha.rb
Normal file
6
config/initializers/recaptcha.rb
Normal file
|
@ -0,0 +1,6 @@
|
|||
if Gitlab.config.recaptcha.enabled
|
||||
Recaptcha.configure do |config|
|
||||
config.public_key = Gitlab.config.recaptcha['public_key']
|
||||
config.private_key = Gitlab.config.recaptcha['private_key']
|
||||
end
|
||||
end
|
|
@ -13,6 +13,7 @@ See the documentation below for details on how to configure these services.
|
|||
- [Slack](slack.md) Integrate with the Slack chat service
|
||||
- [OAuth2 provider](oauth_provider.md) OAuth2 application creation
|
||||
- [Gmail actions buttons](gmail_action_buttons_for_gitlab.md) Adds GitLab actions to messages
|
||||
- [reCAPTCHA](recaptcha.md) Configure GitLab to use Google reCAPTCHA for new users
|
||||
|
||||
GitLab Enterprise Edition contains [advanced JIRA support](http://doc.gitlab.com/ee/integration/jira.html) and [advanced Jenkins support](http://doc.gitlab.com/ee/integration/jenkins.html).
|
||||
|
||||
|
|
56
doc/integration/recaptcha.md
Normal file
56
doc/integration/recaptcha.md
Normal file
|
@ -0,0 +1,56 @@
|
|||
# reCAPTCHA
|
||||
|
||||
GitLab leverages [Google's reCAPTCHA](https://www.google.com/recaptcha/intro/index.html)
|
||||
to protect against spam and abuse. GitLab displays the CAPTCHA form on the sign-up page
|
||||
to confirm that a real user, not a bot, is attempting to create an account.
|
||||
|
||||
## Configuration
|
||||
|
||||
To use reCAPTCHA, first you must create a public and private key.
|
||||
|
||||
1. Go to the URL: https://www.google.com/recaptcha/admin
|
||||
|
||||
1. Fill out the form necessary to obtain reCAPTCHA keys.
|
||||
|
||||
1. On your GitLab server, open the configuration file.
|
||||
|
||||
For omnibus package:
|
||||
|
||||
```sh
|
||||
sudo editor /etc/gitlab/gitlab.rb
|
||||
```
|
||||
|
||||
For installations from source:
|
||||
|
||||
```sh
|
||||
cd /home/git/gitlab
|
||||
|
||||
sudo -u git -H editor config/gitlab.yml
|
||||
```
|
||||
|
||||
1. Enable reCAPTCHA and add the settings:
|
||||
|
||||
For omnibus package:
|
||||
|
||||
```ruby
|
||||
gitlab_rails['recaptcha_enabled'] = true
|
||||
gitlab_rails['recaptcha_public_key'] = 'YOUR_PUBLIC_KEY'
|
||||
gitlab_rails['recaptcha_private_key'] = 'YOUR_PUBLIC_KEY'
|
||||
```
|
||||
|
||||
For installation from source:
|
||||
|
||||
```
|
||||
recaptcha:
|
||||
enabled: true
|
||||
public_key: 'YOUR_PUBLIC_KEY'
|
||||
private_key: 'YOUR_PRIVATE_KEY'
|
||||
```
|
||||
|
||||
1. Change 'YOUR_PUBLIC_KEY' to the public key from step 2.
|
||||
|
||||
1. Change 'YOUR_PRIVATE_KEY' to the private key from step 2.
|
||||
|
||||
1. Save the configuration file.
|
||||
|
||||
1. Restart GitLab.
|
Loading…
Reference in a new issue