PageRenderTime 540ms CodeModel.GetById 19ms RepoModel.GetById 7ms app.codeStats 0ms

/app/helpers/auth_helper.rb

https://bitbucket.org/terrchen/gitlab-ce
Ruby | 76 lines | 57 code | 19 blank | 0 comment | 2 complexity | f57929f52056b3e8b0018712da789573 MD5 | raw file
Possible License(s): Apache-2.0, CC0-1.0
  1. module AuthHelper
  2. PROVIDERS_WITH_ICONS = %w(twitter github gitlab bitbucket google_oauth2 facebook azure_oauth2 authentiq).freeze
  3. LDAP_PROVIDER = /\Aldap/
  4. def ldap_enabled?
  5. Gitlab::Auth::LDAP::Config.enabled?
  6. end
  7. def omniauth_enabled?
  8. Gitlab.config.omniauth.enabled
  9. end
  10. def provider_has_icon?(name)
  11. PROVIDERS_WITH_ICONS.include?(name.to_s)
  12. end
  13. def auth_providers
  14. Gitlab::Auth::OAuth::Provider.providers
  15. end
  16. def label_for_provider(name)
  17. Gitlab::Auth::OAuth::Provider.label_for(name)
  18. end
  19. def form_based_provider?(name)
  20. [LDAP_PROVIDER, 'crowd'].any? { |pattern| pattern === name.to_s }
  21. end
  22. def form_based_providers
  23. auth_providers.select { |provider| form_based_provider?(provider) }
  24. end
  25. def crowd_enabled?
  26. auth_providers.include? :crowd
  27. end
  28. def button_based_providers
  29. auth_providers.reject { |provider| form_based_provider?(provider) }
  30. end
  31. def providers_for_base_controller
  32. auth_providers.reject { |provider| LDAP_PROVIDER === provider }
  33. end
  34. def enabled_button_based_providers
  35. disabled_providers = Gitlab::CurrentSettings.disabled_oauth_sign_in_sources || []
  36. button_based_providers.map(&:to_s) - disabled_providers
  37. end
  38. def button_based_providers_enabled?
  39. enabled_button_based_providers.any?
  40. end
  41. def provider_image_tag(provider, size = 64)
  42. label = label_for_provider(provider)
  43. if provider_has_icon?(provider)
  44. file_name = "#{provider.to_s.split('_').first}_#{size}.png"
  45. image_tag("auth_buttons/#{file_name}", alt: label, title: "Sign in with #{label}")
  46. else
  47. label
  48. end
  49. end
  50. def auth_active?(provider)
  51. current_user.identities.exists?(provider: provider.to_s)
  52. end
  53. def unlink_allowed?(provider)
  54. %w(saml cas3).exclude?(provider.to_s)
  55. end
  56. extend self
  57. end