Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
746706d1
Commit
746706d1
authored
Apr 24, 2018
by
James Edwards-Jones
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Fix conflicts in Auth::User classes, user routes and LDAP callback controller
parent
d6a97dab
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
0 additions
and
19 deletions
+0
-19
app/controllers/ldap/omniauth_callbacks_controller.rb
app/controllers/ldap/omniauth_callbacks_controller.rb
+0
-3
config/routes/user.rb
config/routes/user.rb
+0
-3
lib/gitlab/auth/ldap/user.rb
lib/gitlab/auth/ldap/user.rb
+0
-3
lib/gitlab/auth/saml/user.rb
lib/gitlab/auth/saml/user.rb
+0
-10
No files found.
app/controllers/ldap/omniauth_callbacks_controller.rb
View file @
746706d1
class
Ldap::OmniauthCallbacksController
<
OmniauthCallbacksController
class
Ldap::OmniauthCallbacksController
<
OmniauthCallbacksController
extend
::
Gitlab
::
Utils
::
Override
extend
::
Gitlab
::
Utils
::
Override
<<<<<<<
HEAD
prepend
EE
::
OmniauthCallbacksController
prepend
EE
::
OmniauthCallbacksController
prepend
EE
::
Ldap
::
OmniauthCallbacksController
prepend
EE
::
Ldap
::
OmniauthCallbacksController
=======
>>>>>>>
upstream
/
master
def
self
.
define_providers!
def
self
.
define_providers!
return
unless
Gitlab
::
Auth
::
LDAP
::
Config
.
enabled?
return
unless
Gitlab
::
Auth
::
LDAP
::
Config
.
enabled?
...
...
config/routes/user.rb
View file @
746706d1
<<<<<<<
HEAD
## EE-specific
## EE-specific
get
'unsubscribes/:email'
,
to:
'unsubscribes#show'
,
as: :unsubscribe
get
'unsubscribes/:email'
,
to:
'unsubscribes#show'
,
as: :unsubscribe
post
'unsubscribes/:email'
,
to:
'unsubscribes#create'
post
'unsubscribes/:email'
,
to:
'unsubscribes#create'
## EE-specific
## EE-specific
=======
>>>>>>>
upstream
/
master
# Allows individual providers to be directed to a chosen controller
# Allows individual providers to be directed to a chosen controller
# Call from inside devise_scope
# Call from inside devise_scope
def
override_omniauth
(
provider
,
controller
,
path_prefix
=
'/users/auth'
)
def
override_omniauth
(
provider
,
controller
,
path_prefix
=
'/users/auth'
)
...
...
lib/gitlab/auth/ldap/user.rb
View file @
746706d1
...
@@ -9,10 +9,7 @@ module Gitlab
...
@@ -9,10 +9,7 @@ module Gitlab
module
LDAP
module
LDAP
class
User
<
Gitlab
::
Auth
::
OAuth
::
User
class
User
<
Gitlab
::
Auth
::
OAuth
::
User
extend
::
Gitlab
::
Utils
::
Override
extend
::
Gitlab
::
Utils
::
Override
<<<<<<<
HEAD
prepend
::
EE
::
Gitlab
::
Auth
::
LDAP
::
User
prepend
::
EE
::
Gitlab
::
Auth
::
LDAP
::
User
=======
>>>>>>>
upstream
/
master
class
<<
self
class
<<
self
def
find_by_uid_and_provider
(
uid
,
provider
)
def
find_by_uid_and_provider
(
uid
,
provider
)
...
...
lib/gitlab/auth/saml/user.rb
View file @
746706d1
...
@@ -20,7 +20,6 @@ module Gitlab
...
@@ -20,7 +20,6 @@ module Gitlab
user
||=
find_or_build_ldap_user
if
auto_link_ldap_user?
user
||=
find_or_build_ldap_user
if
auto_link_ldap_user?
user
||=
build_new_user
if
signup_enabled?
user
||=
build_new_user
if
signup_enabled?
<<<<<<<
HEAD
if
user_in_required_group?
if
user_in_required_group?
unblock_user
(
user
,
"in required group"
)
if
user
.
persisted?
&&
user
.
blocked?
unblock_user
(
user
,
"in required group"
)
if
user
.
persisted?
&&
user
.
blocked?
elsif
user
.
persisted?
elsif
user
.
persisted?
...
@@ -32,12 +31,6 @@ module Gitlab
...
@@ -32,12 +31,6 @@ module Gitlab
if
user
if
user
user
.
external
=
!
(
auth_hash
.
groups
&
saml_config
.
external_groups
).
empty?
if
external_users_enabled?
user
.
external
=
!
(
auth_hash
.
groups
&
saml_config
.
external_groups
).
empty?
if
external_users_enabled?
user
.
admin
=
!
(
auth_hash
.
groups
&
saml_config
.
admin_groups
).
empty?
if
admin_groups_enabled?
user
.
admin
=
!
(
auth_hash
.
groups
&
saml_config
.
admin_groups
).
empty?
if
admin_groups_enabled?
=======
if
external_users_enabled?
&&
user
# Check if there is overlap between the user's groups and the external groups
# setting then set user as external or internal.
user
.
external
=
!
(
auth_hash
.
groups
&
saml_config
.
external_groups
).
empty?
>>>>>>>
upstream
/
master
end
end
user
user
...
@@ -56,7 +49,6 @@ module Gitlab
...
@@ -56,7 +49,6 @@ module Gitlab
Gitlab
::
Auth
::
Saml
::
Config
Gitlab
::
Auth
::
Saml
::
Config
end
end
<<<<<<<
HEAD
def
block_user
(
user
,
reason
)
def
block_user
(
user
,
reason
)
user
.
ldap_block
user
.
ldap_block
log_user_changes
(
user
,
"
#{
reason
}
, blocking"
)
log_user_changes
(
user
,
"
#{
reason
}
, blocking"
)
...
@@ -79,8 +71,6 @@ module Gitlab
...
@@ -79,8 +71,6 @@ module Gitlab
required_groups
.
empty?
||
!
(
auth_hash
.
groups
&
required_groups
).
empty?
required_groups
.
empty?
||
!
(
auth_hash
.
groups
&
required_groups
).
empty?
end
end
=======
>>>>>>>
upstream
/
master
def
auto_link_saml_user?
def
auto_link_saml_user?
Gitlab
.
config
.
omniauth
.
auto_link_saml_user
Gitlab
.
config
.
omniauth
.
auto_link_saml_user
end
end
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment