Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Tatuya Kamada
gitlab-ce
Commits
fa5a53f5
Commit
fa5a53f5
authored
Jul 29, 2012
by
Jakub Jirutka
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Change identification of users with extern auth provider (LDAP)
parent
8b7e404b
Changes
4
Show whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
26 additions
and
9 deletions
+26
-9
app/controllers/omniauth_callbacks_controller.rb
app/controllers/omniauth_callbacks_controller.rb
+1
-2
app/models/user.rb
app/models/user.rb
+13
-6
db/migrate/20120729131232_add_extern_auth_provider_to_users.rb
...grate/20120729131232_add_extern_auth_provider_to_users.rb
+8
-0
db/schema.rb
db/schema.rb
+4
-1
No files found.
app/controllers/omniauth_callbacks_controller.rb
View file @
fa5a53f5
...
@@ -15,8 +15,7 @@ class OmniauthCallbacksController < Devise::OmniauthCallbacksController
...
@@ -15,8 +15,7 @@ class OmniauthCallbacksController < Devise::OmniauthCallbacksController
def
ldap
def
ldap
# We only find ourselves here if the authentication to LDAP was successful.
# We only find ourselves here if the authentication to LDAP was successful.
info
=
request
.
env
[
"omniauth.auth"
][
"info"
]
@user
=
User
.
find_for_ldap_auth
(
request
.
env
[
"omniauth.auth"
],
current_user
)
@user
=
User
.
find_for_ldap_auth
(
info
)
if
@user
.
persisted?
if
@user
.
persisted?
@user
.
remember_me
=
true
@user
.
remember_me
=
true
end
end
...
...
app/models/user.rb
View file @
fa5a53f5
...
@@ -7,7 +7,7 @@ class User < ActiveRecord::Base
...
@@ -7,7 +7,7 @@ class User < ActiveRecord::Base
attr_accessible
:email
,
:password
,
:password_confirmation
,
:remember_me
,
:bio
,
attr_accessible
:email
,
:password
,
:password_confirmation
,
:remember_me
,
:bio
,
:name
,
:projects_limit
,
:skype
,
:linkedin
,
:twitter
,
:dark_scheme
,
:name
,
:projects_limit
,
:skype
,
:linkedin
,
:twitter
,
:dark_scheme
,
:theme_id
,
:force_random_password
:theme_id
,
:force_random_password
,
:extern_uid
,
:provider
attr_accessor
:force_random_password
attr_accessor
:force_random_password
...
@@ -54,6 +54,8 @@ class User < ActiveRecord::Base
...
@@ -54,6 +54,8 @@ class User < ActiveRecord::Base
validates
:bio
,
:length
=>
{
:within
=>
0
..
255
}
validates
:bio
,
:length
=>
{
:within
=>
0
..
255
}
validates
:extern_uid
,
:allow_blank
=>
true
,
:uniqueness
=>
{
:scope
=>
:provider
}
before_save
:ensure_authentication_token
before_save
:ensure_authentication_token
alias_attribute
:private_token
,
:authentication_token
alias_attribute
:private_token
,
:authentication_token
...
@@ -84,16 +86,21 @@ class User < ActiveRecord::Base
...
@@ -84,16 +86,21 @@ class User < ActiveRecord::Base
where
(
'id NOT IN (SELECT DISTINCT(user_id) FROM users_projects)'
)
where
(
'id NOT IN (SELECT DISTINCT(user_id) FROM users_projects)'
)
end
end
def
self
.
find_for_ldap_auth
(
omniauth_info
)
def
self
.
find_for_ldap_auth
(
auth
,
signed_in_resource
=
nil
)
name
=
omniauth_info
.
name
.
force_encoding
(
"utf-8"
)
uid
=
auth
.
info
.
uid
email
=
omniauth_info
.
email
.
downcase
unless
omniauth_info
.
email
.
nil?
provider
=
auth
.
provider
raise
OmniAuth
::
Error
,
"LDAP accounts must provide an email address"
if
email
.
nil?
name
=
auth
.
info
.
name
.
force_encoding
(
"utf-8"
)
email
=
auth
.
info
.
email
.
downcase
unless
auth
.
info
.
email
.
nil?
raise
OmniAuth
::
Error
,
"LDAP accounts must provide an uid and email address"
if
uid
.
nil?
and
email
.
nil?
if
@user
=
User
.
find_by_e
mail
(
email
)
if
@user
=
User
.
find_by_e
xtern_uid_and_provider
(
uid
,
provider
)
@user
@user
else
else
logger
.
info
"Creating user from LDAP login; uid =
#{
uid
}
, name =
#{
name
}
, email =
#{
email
}
"
password
=
Devise
.
friendly_token
[
0
,
8
].
downcase
password
=
Devise
.
friendly_token
[
0
,
8
].
downcase
@user
=
User
.
create
(
@user
=
User
.
create
(
:extern_uid
=>
uid
,
:provider
=>
provider
,
:name
=>
name
,
:name
=>
name
,
:email
=>
email
,
:email
=>
email
,
:password
=>
password
,
:password
=>
password
,
...
...
db/migrate/20120729131232_add_extern_auth_provider_to_users.rb
0 → 100644
View file @
fa5a53f5
class
AddExternAuthProviderToUsers
<
ActiveRecord
::
Migration
def
change
add_column
:users
,
:extern_uid
,
:string
add_column
:users
,
:provider
,
:string
add_index
:users
,
[
:extern_uid
,
:provider
],
:unique
=>
true
end
end
db/schema.rb
View file @
fa5a53f5
...
@@ -11,7 +11,7 @@
...
@@ -11,7 +11,7 @@
#
#
# It's strongly recommended to check this file into your version control system.
# It's strongly recommended to check this file into your version control system.
ActiveRecord
::
Schema
.
define
(
:version
=>
201207
12080407
)
do
ActiveRecord
::
Schema
.
define
(
:version
=>
201207
29131232
)
do
create_table
"events"
,
:force
=>
true
do
|
t
|
create_table
"events"
,
:force
=>
true
do
|
t
|
t
.
string
"target_type"
t
.
string
"target_type"
...
@@ -171,9 +171,12 @@ ActiveRecord::Schema.define(:version => 20120712080407) do
...
@@ -171,9 +171,12 @@ ActiveRecord::Schema.define(:version => 20120712080407) do
t
.
boolean
"blocked"
,
:default
=>
false
,
:null
=>
false
t
.
boolean
"blocked"
,
:default
=>
false
,
:null
=>
false
t
.
integer
"failed_attempts"
,
:default
=>
0
t
.
integer
"failed_attempts"
,
:default
=>
0
t
.
datetime
"locked_at"
t
.
datetime
"locked_at"
t
.
string
"extern_uid"
t
.
string
"provider"
end
end
add_index
"users"
,
[
"email"
],
:name
=>
"index_users_on_email"
,
:unique
=>
true
add_index
"users"
,
[
"email"
],
:name
=>
"index_users_on_email"
,
:unique
=>
true
add_index
"users"
,
[
"extern_uid"
,
"provider"
],
:name
=>
"index_users_on_extern_uid_and_provider"
,
:unique
=>
true
add_index
"users"
,
[
"reset_password_token"
],
:name
=>
"index_users_on_reset_password_token"
,
:unique
=>
true
add_index
"users"
,
[
"reset_password_token"
],
:name
=>
"index_users_on_reset_password_token"
,
:unique
=>
true
create_table
"users_projects"
,
:force
=>
true
do
|
t
|
create_table
"users_projects"
,
:force
=>
true
do
|
t
|
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment