2013-09-03 17:04:27 -04:00
|
|
|
# OAuth extension for User model
|
|
|
|
#
|
|
|
|
# * Find GitLab user based on omniauth uid and provider
|
|
|
|
# * Create new user from omniauth data
|
|
|
|
#
|
|
|
|
module Gitlab
|
|
|
|
module OAuth
|
|
|
|
class User
|
|
|
|
class << self
|
|
|
|
attr_reader :auth
|
|
|
|
|
|
|
|
def find(auth)
|
|
|
|
@auth = auth
|
|
|
|
find_by_uid_and_provider
|
|
|
|
end
|
|
|
|
|
|
|
|
def create(auth)
|
|
|
|
@auth = auth
|
|
|
|
password = Devise.friendly_token[0, 8].downcase
|
|
|
|
opts = {
|
|
|
|
extern_uid: uid,
|
|
|
|
provider: provider,
|
|
|
|
name: name,
|
|
|
|
username: username,
|
|
|
|
email: email,
|
|
|
|
password: password,
|
|
|
|
password_confirmation: password,
|
|
|
|
}
|
|
|
|
|
2014-06-26 16:24:17 -04:00
|
|
|
user = model.build_user(opts)
|
2013-12-09 05:06:12 -05:00
|
|
|
user.skip_confirmation!
|
2014-04-07 07:09:29 -04:00
|
|
|
|
2014-04-07 09:36:33 -04:00
|
|
|
# Services like twitter and github does not return email via oauth
|
|
|
|
# In this case we generate temporary email and force user to fill it later
|
2014-04-07 07:09:29 -04:00
|
|
|
if user.email.blank?
|
|
|
|
user.generate_tmp_oauth_email
|
2014-05-09 05:37:27 -04:00
|
|
|
elsif provider != "ldap"
|
2014-04-07 09:36:33 -04:00
|
|
|
# Google oauth returns email but dont return nickname
|
|
|
|
# So we use part of email as username for new user
|
2014-05-09 05:37:27 -04:00
|
|
|
# For LDAP, username is already set to the user's
|
|
|
|
# uid/userid/sAMAccountName.
|
2014-06-11 11:06:28 -04:00
|
|
|
email_username = email.match(/^[^@]*/)[0]
|
|
|
|
# Strip apostrophes since they are disallowed as part of username
|
|
|
|
user.username = email_username.gsub("'", "")
|
2014-04-07 07:09:29 -04:00
|
|
|
end
|
|
|
|
|
2014-06-24 06:57:41 -04:00
|
|
|
begin
|
|
|
|
user.save!
|
|
|
|
rescue ActiveRecord::RecordInvalid => e
|
|
|
|
log.info "(OAuth) Email #{e.record.errors[:email]}. Username #{e.record.errors[:username]}"
|
|
|
|
return nil, e.record.errors
|
|
|
|
end
|
|
|
|
|
2013-09-03 17:04:27 -04:00
|
|
|
log.info "(OAuth) Creating user #{email} from login with extern_uid => #{uid}"
|
|
|
|
|
|
|
|
if Gitlab.config.omniauth['block_auto_created_users'] && !ldap?
|
|
|
|
user.block
|
|
|
|
end
|
|
|
|
|
|
|
|
user
|
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
def find_by_uid_and_provider
|
|
|
|
model.where(provider: provider, extern_uid: uid).last
|
|
|
|
end
|
|
|
|
|
|
|
|
def uid
|
2014-09-01 10:31:27 -04:00
|
|
|
auth.uid.to_s
|
2013-09-03 17:04:27 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def email
|
2014-09-01 07:48:17 -04:00
|
|
|
return unless auth.info.respond_to?(:email)
|
2013-09-03 17:04:27 -04:00
|
|
|
auth.info.email.downcase unless auth.info.email.nil?
|
|
|
|
end
|
|
|
|
|
|
|
|
def name
|
2014-05-08 09:23:17 -04:00
|
|
|
if auth.info.name.nil?
|
2014-05-07 16:41:35 -04:00
|
|
|
"#{auth.info.first_name} #{auth.info.last_name}".force_encoding('utf-8')
|
2014-05-08 09:23:17 -04:00
|
|
|
else
|
|
|
|
auth.info.name.to_s.force_encoding('utf-8')
|
2014-05-07 16:33:54 -04:00
|
|
|
end
|
2013-09-03 17:04:27 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def username
|
2014-09-01 08:26:10 -04:00
|
|
|
return unless auth.info.respond_to?(:nickname)
|
2014-04-07 07:09:29 -04:00
|
|
|
auth.info.nickname.to_s.force_encoding("utf-8")
|
2013-09-03 17:04:27 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def provider
|
|
|
|
auth.provider
|
|
|
|
end
|
|
|
|
|
|
|
|
def log
|
|
|
|
Gitlab::AppLogger
|
|
|
|
end
|
|
|
|
|
|
|
|
def model
|
|
|
|
::User
|
|
|
|
end
|
|
|
|
|
|
|
|
def raise_error(message)
|
|
|
|
raise OmniAuth::Error, "(OAuth) " + message
|
|
|
|
end
|
|
|
|
|
|
|
|
def ldap?
|
|
|
|
provider == 'ldap'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|