gitlab-org--gitlab-foss/app/controllers/omniauth_callbacks_controller.rb

110 lines
3.3 KiB
Ruby
Raw Normal View History

2012-01-28 08:23:17 -05:00
class OmniauthCallbacksController < Devise::OmniauthCallbacksController
2015-05-27 10:37:22 -04:00
2015-11-11 23:25:31 -05:00
protect_from_forgery except: [:kerberos, :saml, :cas3]
2015-05-27 10:37:22 -04:00
Gitlab.config.omniauth.providers.each do |provider|
2012-09-12 01:23:20 -04:00
define_method provider['name'] do
handle_omniauth
end
end
# Extend the standard message generation to accept our custom exception
def failure_message
exception = env["omniauth.error"]
error = exception.error_reason if exception.respond_to?(:error_reason)
error ||= exception.error if exception.respond_to?(:error)
error ||= exception.message if exception.respond_to?(:message)
error ||= env["omniauth.error.type"].to_s
error.to_s.humanize if error
end
2012-08-03 11:27:39 -04:00
# We only find ourselves here
# if the authentication to LDAP was successful.
2012-01-28 08:23:17 -05:00
def ldap
@user = Gitlab::LDAP::User.new(oauth)
@user.save if @user.changed? # will also save new users
gl_user = @user.gl_user
gl_user.remember_me = params[:remember_me] if @user.persisted?
2014-06-12 10:01:23 -04:00
# Do additional LDAP checks for the user filter and EE features
if @user.allowed?
2015-07-03 07:54:50 -04:00
log_audit_event(gl_user, with: :ldap)
sign_in_and_redirect(gl_user)
else
flash[:alert] = "Access denied for your LDAP account."
redirect_to new_user_session_path
2014-06-12 10:01:23 -04:00
end
2012-01-28 08:23:17 -05:00
end
2014-06-24 08:16:52 -04:00
def omniauth_error
@provider = params[:provider]
@error = params[:error]
render 'errors/omniauth_error', layout: "errors", status: 422
end
2015-11-11 23:25:31 -05:00
def cas3
ticket = params['ticket']
if ticket
handle_service_ticket oauth['provider'], ticket
end
handle_omniauth
end
2012-08-03 11:27:39 -04:00
private
def handle_omniauth
if current_user
# Add new authentication method
current_user.identities.find_or_create_by(extern_uid: oauth['uid'], provider: oauth['provider'])
2015-07-03 07:54:50 -04:00
log_audit_event(current_user, with: oauth['provider'])
redirect_to profile_account_path, notice: 'Authentication method updated'
2012-08-03 11:27:39 -04:00
else
@user = Gitlab::OAuth::User.new(oauth)
@user.save
2012-08-03 11:27:39 -04:00
# Only allow properly saved users to login.
if @user.persisted? && @user.valid?
2015-07-03 07:54:50 -04:00
log_audit_event(@user.gl_user, with: oauth['provider'])
sign_in_and_redirect(@user.gl_user)
else
error_message =
if @user.gl_user.errors.any?
@user.gl_user.errors.map do |attribute, message|
"#{attribute} #{message}"
end.join(", ")
else
''
end
redirect_to omniauth_error_path(oauth['provider'], error: error_message) and return
2012-08-03 11:27:39 -04:00
end
end
2015-10-03 01:56:37 -04:00
rescue Gitlab::OAuth::SignupDisabledError
label = Gitlab::OAuth::Provider.label_for(oauth['provider'])
message = "Signing in using your #{label} account without a pre-existing GitLab account is not allowed."
2015-05-12 06:50:06 -04:00
if current_application_settings.signup_enabled?
message << " Create a GitLab account first, and then connect it to your #{label} account."
2015-05-12 06:50:06 -04:00
end
flash[:notice] = message
2015-10-03 01:56:37 -04:00
redirect_to new_user_session_path
2012-08-03 11:27:39 -04:00
end
2013-09-03 17:06:29 -04:00
2015-11-11 23:25:31 -05:00
def handle_service_ticket provider, ticket
Gitlab::OAuth::Session.create provider, ticket
session[:service_tickets] ||= {}
session[:service_tickets][provider] = ticket
end
2013-09-03 17:06:29 -04:00
def oauth
@oauth ||= request.env['omniauth.auth']
end
2015-07-03 07:54:50 -04:00
def log_audit_event(user, options = {})
AuditEventService.new(user, user, options).
for_authentication.security_event
end
2012-01-28 08:23:17 -05:00
end