PageRenderTime 26ms CodeModel.GetById 19ms RepoModel.GetById 1ms app.codeStats 0ms

/app/helpers/auth_helper.rb

https://gitlab.com/jamedjo/gitlab-ce
Ruby | 80 lines | 61 code | 19 blank | 0 comment | 2 complexity | 4817ebe33c8b9b19b09e532efc4d315e MD5 | raw file
  1. module AuthHelper
  2. PROVIDERS_WITH_ICONS = %w(twitter github gitlab bitbucket google_oauth2 facebook azure_oauth2 authentiq).freeze
  3. FORM_BASED_PROVIDERS = [/\Aldap/, 'crowd'].freeze
  4. def ldap_enabled?
  5. Gitlab::LDAP::Config.enabled?
  6. end
  7. def omniauth_enabled?
  8. Gitlab.config.omniauth.enabled
  9. end
  10. def provider_has_icon?(name)
  11. PROVIDERS_WITH_ICONS.include?(name.to_s)
  12. end
  13. def auth_providers
  14. Gitlab::OAuth::Provider.providers
  15. end
  16. def label_for_provider(name)
  17. Gitlab::OAuth::Provider.label_for(name)
  18. end
  19. def form_based_provider?(name)
  20. FORM_BASED_PROVIDERS.any? { |pattern| pattern === name.to_s }
  21. end
  22. def form_based_providers
  23. auth_providers.select { |provider| form_based_provider?(provider) }
  24. end
  25. def crowd_enabled?
  26. auth_providers.include? :crowd
  27. end
  28. def button_based_providers
  29. auth_providers.reject { |provider| form_based_provider?(provider) }
  30. end
  31. def enabled_button_based_providers
  32. disabled_providers = current_application_settings.disabled_oauth_sign_in_sources || []
  33. button_based_providers.map(&:to_s) - disabled_providers
  34. end
  35. def button_based_providers_enabled?
  36. enabled_button_based_providers.any?
  37. end
  38. def provider_image_tag(provider, size = 64)
  39. label = label_for_provider(provider)
  40. if provider_has_icon?(provider)
  41. file_name = "#{provider.to_s.split('_').first}_#{size}.png"
  42. image_tag("auth_buttons/#{file_name}", alt: label, title: "Sign in with #{label}")
  43. else
  44. label
  45. end
  46. end
  47. def auth_active?(provider)
  48. current_user.identities.exists?(provider: provider.to_s)
  49. end
  50. def two_factor_skippable?
  51. current_application_settings.require_two_factor_authentication &&
  52. !current_user.two_factor_enabled? &&
  53. current_application_settings.two_factor_grace_period &&
  54. !two_factor_grace_period_expired?
  55. end
  56. def two_factor_grace_period_expired?
  57. current_user.otp_grace_period_started_at &&
  58. (current_user.otp_grace_period_started_at + current_application_settings.two_factor_grace_period.hours) < Time.current
  59. end
  60. extend self
  61. end