2018-09-14 01:42:05 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2012-01-28 08:23:17 -05:00
|
|
|
class OmniauthCallbacksController < Devise::OmniauthCallbacksController
|
2020-09-24 11:09:51 -04:00
|
|
|
include AuthenticatesWithTwoFactorForAdminMode
|
2017-06-07 04:45:34 -04:00
|
|
|
include Devise::Controllers::Rememberable
|
2019-03-18 10:36:34 -04:00
|
|
|
include AuthHelper
|
2019-12-11 07:08:10 -05:00
|
|
|
include InitializesCurrentUserMode
|
2020-05-12 23:08:26 -04:00
|
|
|
include KnownSignIn
|
|
|
|
|
|
|
|
after_action :verify_known_sign_in
|
2015-05-27 10:37:22 -04:00
|
|
|
|
2019-01-19 15:41:39 -05:00
|
|
|
protect_from_forgery except: [:kerberos, :saml, :cas3, :failure], with: :exception, prepend: true
|
2015-05-27 10:37:22 -04:00
|
|
|
|
2020-10-05 08:08:47 -04:00
|
|
|
feature_category :authentication_and_authorization
|
|
|
|
|
2018-04-23 11:03:01 -04:00
|
|
|
def handle_omniauth
|
|
|
|
omniauth_flow(Gitlab::Auth::OAuth)
|
|
|
|
end
|
|
|
|
|
2018-04-22 19:15:48 -04:00
|
|
|
AuthHelper.providers_for_base_controller.each do |provider|
|
|
|
|
alias_method provider, :handle_omniauth
|
2012-09-12 01:23:20 -04:00
|
|
|
end
|
2012-07-16 18:31:28 -04:00
|
|
|
|
2018-03-20 09:49:51 -04:00
|
|
|
# Extend the standard implementation to also increment
|
|
|
|
# the number of failed sign in attempts
|
|
|
|
def failure
|
2018-03-22 06:34:42 -04:00
|
|
|
if params[:username].present? && AuthHelper.form_based_provider?(failed_strategy.name)
|
|
|
|
user = User.by_login(params[:username])
|
2018-03-20 09:49:51 -04:00
|
|
|
|
2018-03-22 06:34:42 -04:00
|
|
|
user&.increment_failed_attempts!
|
2020-08-11 11:10:08 -04:00
|
|
|
log_failed_login(params[:username], failed_strategy.name)
|
2018-03-22 06:34:42 -04:00
|
|
|
end
|
2018-03-20 09:49:51 -04:00
|
|
|
|
|
|
|
super
|
|
|
|
end
|
|
|
|
|
2012-07-16 18:31:28 -04:00
|
|
|
# Extend the standard message generation to accept our custom exception
|
|
|
|
def failure_message
|
2018-04-22 19:17:49 -04:00
|
|
|
exception = request.env["omniauth.error"]
|
2019-12-20 04:24:38 -05:00
|
|
|
error = exception.error_reason if exception.respond_to?(:error_reason)
|
2012-07-21 04:04:05 -04:00
|
|
|
error ||= exception.error if exception.respond_to?(:error)
|
|
|
|
error ||= exception.message if exception.respond_to?(:message)
|
2018-04-22 19:17:49 -04:00
|
|
|
error ||= request.env["omniauth.error.type"].to_s
|
2016-01-28 13:31:48 -05:00
|
|
|
|
2018-04-18 10:03:27 -04:00
|
|
|
error.to_s.humanize if error
|
2012-01-28 08:23:17 -05:00
|
|
|
end
|
|
|
|
|
2016-02-18 17:01:07 -05:00
|
|
|
def saml
|
2018-04-18 10:03:27 -04:00
|
|
|
omniauth_flow(Gitlab::Auth::Saml)
|
2019-08-19 09:19:19 -04:00
|
|
|
rescue Gitlab::Auth::Saml::IdentityLinker::UnverifiedRequest
|
|
|
|
redirect_unverified_saml_initiation
|
2016-02-18 17:01:07 -05:00
|
|
|
end
|
|
|
|
|
2015-11-11 23:25:31 -05:00
|
|
|
def cas3
|
|
|
|
ticket = params['ticket']
|
|
|
|
if ticket
|
|
|
|
handle_service_ticket oauth['provider'], ticket
|
|
|
|
end
|
2018-01-11 11:34:01 -05:00
|
|
|
|
2015-11-11 23:25:31 -05:00
|
|
|
handle_omniauth
|
|
|
|
end
|
|
|
|
|
2017-01-06 14:07:27 -05:00
|
|
|
def authentiq
|
|
|
|
if params['sid']
|
|
|
|
handle_service_ticket oauth['provider'], params['sid']
|
|
|
|
end
|
2018-01-11 11:34:01 -05:00
|
|
|
|
2017-01-06 14:07:27 -05:00
|
|
|
handle_omniauth
|
|
|
|
end
|
|
|
|
|
2018-03-15 11:01:13 -04:00
|
|
|
def auth0
|
|
|
|
if oauth['uid'].blank?
|
|
|
|
fail_auth0_login
|
|
|
|
else
|
|
|
|
handle_omniauth
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-09-04 09:18:36 -04:00
|
|
|
def salesforce
|
|
|
|
if oauth.dig('extra', 'email_verified')
|
|
|
|
handle_omniauth
|
|
|
|
else
|
|
|
|
fail_salesforce_login
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-09-10 14:08:54 -04:00
|
|
|
def atlassian_oauth2
|
|
|
|
omniauth_flow(Gitlab::Auth::Atlassian)
|
|
|
|
end
|
|
|
|
|
2012-08-03 11:27:39 -04:00
|
|
|
private
|
|
|
|
|
2020-08-11 11:10:08 -04:00
|
|
|
def log_failed_login(user, provider)
|
|
|
|
# overridden in EE
|
|
|
|
end
|
|
|
|
|
2020-04-24 11:09:37 -04:00
|
|
|
def after_omniauth_failure_path_for(scope)
|
|
|
|
if Feature.enabled?(:user_mode_in_session)
|
|
|
|
return new_admin_session_path if current_user_mode.admin_mode_requested?
|
|
|
|
end
|
|
|
|
|
|
|
|
super
|
|
|
|
end
|
|
|
|
|
2018-04-18 10:03:27 -04:00
|
|
|
def omniauth_flow(auth_module, identity_linker: nil)
|
2018-06-04 17:28:18 -04:00
|
|
|
if fragment = request.env.dig('omniauth.params', 'redirect_fragment').presence
|
|
|
|
store_redirect_fragment(fragment)
|
2018-05-22 16:04:19 -04:00
|
|
|
end
|
|
|
|
|
2012-08-03 11:27:39 -04:00
|
|
|
if current_user
|
2019-03-18 10:36:34 -04:00
|
|
|
return render_403 unless link_provider_allowed?(oauth['provider'])
|
|
|
|
|
2015-07-03 07:54:50 -04:00
|
|
|
log_audit_event(current_user, with: oauth['provider'])
|
2019-05-06 12:18:03 -04:00
|
|
|
|
2019-12-11 07:08:10 -05:00
|
|
|
if Feature.enabled?(:user_mode_in_session)
|
2020-03-13 08:09:22 -04:00
|
|
|
return admin_mode_flow(auth_module::User) if current_user_mode.admin_mode_requested?
|
2019-12-11 07:08:10 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
identity_linker ||= auth_module::IdentityLinker.new(current_user, oauth, session)
|
2019-05-06 12:18:03 -04:00
|
|
|
link_identity(identity_linker)
|
2018-04-18 10:03:27 -04:00
|
|
|
|
2018-04-23 06:56:44 -04:00
|
|
|
if identity_linker.changed?
|
2018-04-18 10:03:27 -04:00
|
|
|
redirect_identity_linked
|
2018-04-22 19:05:12 -04:00
|
|
|
elsif identity_linker.failed?
|
2018-04-22 14:08:08 -04:00
|
|
|
redirect_identity_link_failed(identity_linker.error_message)
|
2018-04-18 10:03:27 -04:00
|
|
|
else
|
|
|
|
redirect_identity_exists
|
|
|
|
end
|
|
|
|
else
|
|
|
|
sign_in_user_flow(auth_module::User)
|
2012-08-03 11:27:39 -04:00
|
|
|
end
|
2018-04-18 10:03:27 -04:00
|
|
|
end
|
|
|
|
|
2019-05-06 12:18:03 -04:00
|
|
|
def link_identity(identity_linker)
|
|
|
|
identity_linker.link
|
|
|
|
end
|
|
|
|
|
2018-04-18 10:03:27 -04:00
|
|
|
def redirect_identity_exists
|
|
|
|
redirect_to after_sign_in_path_for(current_user)
|
|
|
|
end
|
|
|
|
|
2018-04-22 14:08:08 -04:00
|
|
|
def redirect_identity_link_failed(error_message)
|
2019-04-08 10:17:45 -04:00
|
|
|
redirect_to profile_account_path, notice: _("Authentication failed: %{error_message}") % { error_message: error_message }
|
2018-04-22 14:08:08 -04:00
|
|
|
end
|
|
|
|
|
2018-04-18 10:03:27 -04:00
|
|
|
def redirect_identity_linked
|
2019-04-08 10:17:45 -04:00
|
|
|
redirect_to profile_account_path, notice: _('Authentication method updated')
|
2012-08-03 11:27:39 -04:00
|
|
|
end
|
2013-09-03 17:06:29 -04:00
|
|
|
|
2016-05-30 06:08:53 -04:00
|
|
|
def handle_service_ticket(provider, ticket)
|
2018-02-23 07:10:39 -05:00
|
|
|
Gitlab::Auth::OAuth::Session.create provider, ticket
|
2015-11-11 23:25:31 -05:00
|
|
|
session[:service_tickets] ||= {}
|
|
|
|
session[:service_tickets][provider] = ticket
|
|
|
|
end
|
|
|
|
|
2019-02-06 12:28:35 -05:00
|
|
|
def build_auth_user(auth_user_class)
|
|
|
|
auth_user_class.new(oauth)
|
|
|
|
end
|
|
|
|
|
2018-04-18 10:03:27 -04:00
|
|
|
def sign_in_user_flow(auth_user_class)
|
2019-02-06 12:28:35 -05:00
|
|
|
auth_user = build_auth_user(auth_user_class)
|
2018-04-18 10:03:27 -04:00
|
|
|
user = auth_user.find_and_update!
|
|
|
|
|
|
|
|
if auth_user.valid_sign_in?
|
|
|
|
log_audit_event(user, with: oauth['provider'])
|
|
|
|
|
|
|
|
set_remember_me(user)
|
2018-01-11 11:34:01 -05:00
|
|
|
|
2018-06-25 11:32:03 -04:00
|
|
|
if user.two_factor_enabled? && !auth_user.bypass_two_factor?
|
2018-04-18 10:03:27 -04:00
|
|
|
prompt_for_two_factor(user)
|
2016-06-30 15:54:07 -04:00
|
|
|
else
|
2019-10-09 20:06:44 -04:00
|
|
|
if user.deactivated?
|
|
|
|
user.activate
|
|
|
|
flash[:notice] = _('Welcome back! Your account had been deactivated due to inactivity but is now reactivated.')
|
|
|
|
end
|
|
|
|
|
2019-07-26 03:05:50 -04:00
|
|
|
sign_in_and_redirect(user, event: :authentication)
|
2016-06-30 15:54:07 -04:00
|
|
|
end
|
2016-02-18 17:01:07 -05:00
|
|
|
else
|
2018-04-18 10:03:27 -04:00
|
|
|
fail_login(user)
|
2016-02-18 17:01:07 -05:00
|
|
|
end
|
2018-04-18 10:03:27 -04:00
|
|
|
rescue Gitlab::Auth::OAuth::User::SigninDisabledForProviderError
|
|
|
|
handle_disabled_provider
|
|
|
|
rescue Gitlab::Auth::OAuth::User::SignupDisabledError
|
|
|
|
handle_signup_error
|
2016-02-18 17:01:07 -05:00
|
|
|
end
|
|
|
|
|
2016-04-07 17:45:33 -04:00
|
|
|
def handle_signup_error
|
2018-02-23 07:10:39 -05:00
|
|
|
label = Gitlab::Auth::OAuth::Provider.label_for(oauth['provider'])
|
2019-04-08 10:17:45 -04:00
|
|
|
message = [_("Signing in using your %{label} account without a pre-existing GitLab account is not allowed.") % { label: label }]
|
2016-04-07 17:45:33 -04:00
|
|
|
|
2018-02-02 13:39:55 -05:00
|
|
|
if Gitlab::CurrentSettings.allow_signup?
|
2019-04-08 10:17:45 -04:00
|
|
|
message << _("Create a GitLab account first, and then connect it to your %{label} account.") % { label: label }
|
2016-04-07 17:45:33 -04:00
|
|
|
end
|
|
|
|
|
2020-01-08 13:07:32 -05:00
|
|
|
flash[:alert] = message.join(' ')
|
2016-04-07 17:45:33 -04:00
|
|
|
redirect_to new_user_session_path
|
|
|
|
end
|
|
|
|
|
2013-09-03 17:06:29 -04:00
|
|
|
def oauth
|
|
|
|
@oauth ||= request.env['omniauth.auth']
|
|
|
|
end
|
2017-08-15 13:44:37 -04:00
|
|
|
|
2018-04-18 10:03:27 -04:00
|
|
|
def fail_login(user)
|
2020-08-11 11:10:08 -04:00
|
|
|
log_failed_login(user.username, oauth['provider'])
|
|
|
|
|
2020-09-02 11:10:54 -04:00
|
|
|
@provider = Gitlab::Auth::OAuth::Provider.label_for(params[:action])
|
|
|
|
@error = user.errors.full_messages.to_sentence
|
2017-08-07 16:10:24 -04:00
|
|
|
|
2020-09-02 11:10:54 -04:00
|
|
|
render 'errors/omniauth_error', layout: "oauth_error", status: :unprocessable_entity
|
2017-08-07 16:10:24 -04:00
|
|
|
end
|
2017-08-15 13:44:37 -04:00
|
|
|
|
2018-03-15 11:01:13 -04:00
|
|
|
def fail_auth0_login
|
2019-09-04 09:18:36 -04:00
|
|
|
fail_login_with_message(_('Wrong extern UID provided. Make sure Auth0 is configured correctly.'))
|
|
|
|
end
|
|
|
|
|
|
|
|
def fail_salesforce_login
|
|
|
|
fail_login_with_message(_('Email not verified. Please verify your email in Salesforce.'))
|
|
|
|
end
|
|
|
|
|
|
|
|
def fail_login_with_message(message)
|
|
|
|
flash[:alert] = message
|
2018-03-15 11:01:13 -04:00
|
|
|
|
|
|
|
redirect_to new_user_session_path
|
|
|
|
end
|
2019-08-19 09:19:19 -04:00
|
|
|
|
|
|
|
def redirect_unverified_saml_initiation
|
|
|
|
redirect_to profile_account_path, notice: _('Request to link SAML account must be authorized')
|
|
|
|
end
|
2018-03-15 11:01:13 -04:00
|
|
|
|
2018-01-09 11:47:31 -05:00
|
|
|
def handle_disabled_provider
|
2018-02-23 07:10:39 -05:00
|
|
|
label = Gitlab::Auth::OAuth::Provider.label_for(oauth['provider'])
|
2019-04-08 10:17:45 -04:00
|
|
|
flash[:alert] = _("Signing in using %{label} has been disabled") % { label: label }
|
2018-01-09 11:47:31 -05:00
|
|
|
|
|
|
|
redirect_to new_user_session_path
|
|
|
|
end
|
|
|
|
|
2015-07-03 07:54:50 -04:00
|
|
|
def log_audit_event(user, options = {})
|
2017-06-21 09:48:12 -04:00
|
|
|
AuditEventService.new(user, user, options)
|
|
|
|
.for_authentication.security_event
|
2015-07-03 07:54:50 -04:00
|
|
|
end
|
2017-06-07 04:45:34 -04:00
|
|
|
|
2018-04-18 10:03:27 -04:00
|
|
|
def set_remember_me(user)
|
|
|
|
return unless remember_me?
|
|
|
|
|
|
|
|
if user.two_factor_enabled?
|
|
|
|
params[:remember_me] = '1'
|
|
|
|
else
|
|
|
|
remember_me(user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-06-07 04:45:34 -04:00
|
|
|
def remember_me?
|
|
|
|
request_params = request.env['omniauth.params']
|
2017-07-03 15:37:37 -04:00
|
|
|
(request_params['remember_me'] == '1') if request_params.present?
|
2017-06-07 04:45:34 -04:00
|
|
|
end
|
2018-05-22 16:04:19 -04:00
|
|
|
|
|
|
|
def store_redirect_fragment(redirect_fragment)
|
|
|
|
key = stored_location_key_for(:user)
|
|
|
|
location = session[key]
|
2018-06-04 17:28:18 -04:00
|
|
|
if uri = parse_uri(location)
|
2018-05-22 16:04:19 -04:00
|
|
|
uri.fragment = redirect_fragment
|
|
|
|
store_location_for(:user, uri.to_s)
|
|
|
|
end
|
|
|
|
end
|
2019-12-11 07:08:10 -05:00
|
|
|
|
2020-03-13 08:09:22 -04:00
|
|
|
def admin_mode_flow(auth_user_class)
|
|
|
|
auth_user = build_auth_user(auth_user_class)
|
|
|
|
|
|
|
|
return fail_admin_mode_invalid_credentials unless omniauth_identity_matches_current_user?
|
|
|
|
|
|
|
|
if current_user.two_factor_enabled? && !auth_user.bypass_two_factor?
|
|
|
|
admin_mode_prompt_for_two_factor(current_user)
|
|
|
|
else
|
|
|
|
# Can only reach here if the omniauth identity matches current user
|
|
|
|
# and current_user is an admin that requested admin mode
|
2019-12-11 07:08:10 -05:00
|
|
|
current_user_mode.enable_admin_mode!(skip_password_validation: true)
|
|
|
|
|
|
|
|
redirect_to stored_location_for(:redirect) || admin_root_path, notice: _('Admin mode enabled')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def omniauth_identity_matches_current_user?
|
|
|
|
current_user.matches_identity?(oauth['provider'], oauth['uid'])
|
|
|
|
end
|
|
|
|
|
|
|
|
def fail_admin_mode_invalid_credentials
|
|
|
|
redirect_to new_admin_session_path, alert: _('Invalid login or password')
|
|
|
|
end
|
2012-01-28 08:23:17 -05:00
|
|
|
end
|
2019-09-13 09:26:31 -04:00
|
|
|
|
|
|
|
OmniauthCallbacksController.prepend_if_ee('EE::OmniauthCallbacksController')
|