omniauth_callbacks_controller.rb 2.95 KB
Newer Older
vsizov's avatar
vsizov committed
1
class OmniauthCallbacksController < Devise::OmniauthCallbacksController
2 3 4

  protect_from_forgery except: [:kerberos, :saml]

5
  Gitlab.config.omniauth.providers.each do |provider|
Dmitriy Zaporozhets's avatar
Dmitriy Zaporozhets committed
6 7 8 9
    define_method provider['name'] do
      handle_omniauth
    end
  end
10 11 12 13

  # Extend the standard message generation to accept our custom exception
  def failure_message
    exception = env["omniauth.error"]
14 15 16 17
    error   = exception.error_reason if exception.respond_to?(:error_reason)
    error ||= exception.error        if exception.respond_to?(:error)
    error ||= exception.message      if exception.respond_to?(:message)
    error ||= env["omniauth.error.type"].to_s
18 19
    error.to_s.humanize if error
  end
Florian Unglaub's avatar
Florian Unglaub committed
20

21 22
  # We only find ourselves here
  # if the authentication to LDAP was successful.
vsizov's avatar
vsizov committed
23
  def ldap
24 25 26
    @user = Gitlab::LDAP::User.new(oauth)
    @user.save if @user.changed? # will also save new users
    gl_user = @user.gl_user
27
    gl_user.remember_me = params[:remember_me] if @user.persisted?
28

29
    # Do additional LDAP checks for the user filter and EE features
30
    if @user.allowed?
31
      log_audit_event(gl_user, with: :ldap)
32
      sign_in_and_redirect(gl_user)
33 34 35
    else
      flash[:alert] = "Access denied for your LDAP account."
      redirect_to new_user_session_path
36
    end
vsizov's avatar
vsizov committed
37 38
  end

39 40 41 42 43 44
  def omniauth_error
    @provider = params[:provider]
    @error = params[:error]
    render 'errors/omniauth_error', layout: "errors", status: 422
  end

Florian Unglaub's avatar
Florian Unglaub committed
45 46 47 48
  private

  def handle_omniauth
    if current_user
49 50
      # Add new authentication method
      current_user.identities.find_or_create_by(extern_uid: oauth['uid'], provider: oauth['provider'])
51
      log_audit_event(current_user, with: oauth['provider'])
52
      redirect_to profile_account_path, notice: 'Authentication method updated'
Florian Unglaub's avatar
Florian Unglaub committed
53
    else
54
      @user = Gitlab::OAuth::User.new(oauth)
55
      @user.save
Florian Unglaub's avatar
Florian Unglaub committed
56

57 58
      # Only allow properly saved users to login.
      if @user.persisted? && @user.valid?
59
        log_audit_event(@user.gl_user, with: oauth['provider'])
60
        sign_in_and_redirect(@user.gl_user)
61 62 63 64 65 66 67 68 69 70
      else
        error_message =
          if @user.gl_user.errors.any?
            @user.gl_user.errors.map do |attribute, message|
              "#{attribute} #{message}"
            end.join(", ")
          else
            ''
          end

71
        redirect_to omniauth_error_path(oauth['provider'], error: error_message) and return
Florian Unglaub's avatar
Florian Unglaub committed
72 73
      end
    end
74 75 76 77 78 79 80 81 82
  rescue Gitlab::OAuth::SignupDisabledError => e
    message = "Signing in using your #{oauth['provider']} account without a pre-existing GitLab account is not allowed."

    if current_application_settings.signup_enabled?
      message << " Create a GitLab account first, and then connect it to your #{oauth['provider']} account."
    end

    flash[:notice] = message
    
83
    redirect_to new_user_session_path
Florian Unglaub's avatar
Florian Unglaub committed
84
  end
Dmitriy Zaporozhets's avatar
Dmitriy Zaporozhets committed
85 86 87 88

  def oauth
    @oauth ||= request.env['omniauth.auth']
  end
89 90 91 92 93

  def log_audit_event(user, options = {})
    AuditEventService.new(user, user, options).
      for_authentication.security_event
  end
vsizov's avatar
vsizov committed
94
end