/app/controllers/omniauth_callbacks_controller.rb
https://gitlab.com/webx32/gitlab · Ruby · 96 lines · 74 code · 15 blank · 7 comment · 13 complexity · 27b1ea27d0a9e19f5da9d30eecb56e17 MD5 · raw file
- #encoding: utf-8
- class OmniauthCallbacksController < Devise::OmniauthCallbacksController
- protect_from_forgery except: [:kerberos, :saml]
- Gitlab.config.omniauth.providers.each do |provider|
- define_method provider['name'] do
- handle_omniauth
- end
- end
- # Extend the standard message generation to accept our custom exception
- def failure_message
- exception = env["omniauth.error"]
- error = exception.error_reason if exception.respond_to?(:error_reason)
- error ||= exception.error if exception.respond_to?(:error)
- error ||= exception.message if exception.respond_to?(:message)
- error ||= env["omniauth.error.type"].to_s
- error.to_s.humanize if error
- end
- # We only find ourselves here
- # if the authentication to LDAP was successful.
- def ldap
- @user = Gitlab::LDAP::User.new(oauth)
- @user.save if @user.changed? # will also save new users
- gl_user = @user.gl_user
- gl_user.remember_me = params[:remember_me] if @user.persisted?
- # Do additional LDAP checks for the user filter and EE features
- if @user.allowed?
- log_audit_event(gl_user, with: :ldap)
- sign_in_and_redirect(gl_user)
- else
- flash[:alert] = "Access denied for your LDAP account."
- redirect_to new_user_session_path
- end
- end
- def omniauth_error
- @provider = params[:provider]
- @error = params[:error]
- render 'errors/omniauth_error', layout: "errors", status: 422
- end
- private
- def handle_omniauth
- if current_user
- # Add new authentication method
- current_user.identities.find_or_create_by(extern_uid: oauth['uid'], provider: oauth['provider'])
- log_audit_event(current_user, with: oauth['provider'])
- redirect_to profile_account_path, notice: '认证方法已更新'
- else
- @user = Gitlab::OAuth::User.new(oauth)
- @user.save
- # Only allow properly saved users to login.
- if @user.persisted? && @user.valid?
- log_audit_event(@user.gl_user, with: oauth['provider'])
- sign_in_and_redirect(@user.gl_user)
- else
- error_message =
- if @user.gl_user.errors.any?
- @user.gl_user.errors.map do |attribute, message|
- "#{attribute} #{message}"
- end.join(", ")
- else
- ''
- end
- redirect_to omniauth_error_path(oauth['provider'], error: error_message) and return
- end
- end
- rescue Gitlab::OAuth::SignupDisabledError
- label = Gitlab::OAuth::Provider.label_for(oauth['provider'])
- message = "没有绑定 GitLab 账号前是无法使用 #{label} 账号登陆系统。"
- if current_application_settings.signup_enabled?
- message << " 请先创建一个 GitLab 账号,然后再绑定 #{label} 账号。"
- end
- flash[:notice] = message
- redirect_to new_user_session_path
- end
- def oauth
- @oauth ||= request.env['omniauth.auth']
- end
- def log_audit_event(user, options = {})
- AuditEventService.new(user, user, options).
- for_authentication.security_event
- end
- end