debian-mirror-gitlab/lib/gitlab/o_auth/user.rb

190 lines
5.4 KiB
Ruby
Raw Normal View History

2015-04-26 12:48:37 +05:30
# OAuth extension for User model
#
# * Find GitLab user based on omniauth uid and provider
# * Create new user from omniauth data
#
module Gitlab
module OAuth
2015-09-11 14:41:01 +05:30
class SignupDisabledError < StandardError; end
2015-04-26 12:48:37 +05:30
class User
attr_accessor :auth_hash, :gl_user
def initialize(auth_hash)
self.auth_hash = auth_hash
end
def persisted?
gl_user.try(:persisted?)
end
def new?
!persisted?
end
def valid?
gl_user.try(:valid?)
end
2016-04-02 18:10:28 +05:30
def save(provider = 'OAuth')
2015-04-26 12:48:37 +05:30
unauthorized_to_create unless gl_user
if needs_blocking?
gl_user.save!
gl_user.block
else
gl_user.save!
end
2016-04-02 18:10:28 +05:30
log.info "(#{provider}) saving user #{auth_hash.email} from login with extern_uid => #{auth_hash.uid}"
2015-04-26 12:48:37 +05:30
gl_user
rescue ActiveRecord::RecordInvalid => e
2016-04-02 18:10:28 +05:30
log.info "(#{provider}) Error saving user: #{gl_user.errors.full_messages}"
2015-04-26 12:48:37 +05:30
return self, e.record.errors
end
def gl_user
@user ||= find_by_uid_and_provider
2015-09-11 14:41:01 +05:30
if auto_link_ldap_user?
@user ||= find_or_create_ldap_user
end
2015-04-26 12:48:37 +05:30
if signup_enabled?
@user ||= build_new_user
end
2016-06-02 11:05:42 +05:30
if external_provider? && @user
@user.external = true
end
2015-04-26 12:48:37 +05:30
@user
end
protected
2015-09-11 14:41:01 +05:30
def find_or_create_ldap_user
return unless ldap_person
# If a corresponding person exists with same uid in a LDAP server,
# check if the user already has a GitLab account.
user = Gitlab::LDAP::User.find_by_uid_and_provider(ldap_person.dn, ldap_person.provider)
if user
# Case when a LDAP user already exists in Gitlab. Add the OAuth identity to existing account.
log.info "LDAP account found for user #{user.username}. Building new #{auth_hash.provider} identity."
2016-08-24 12:49:21 +05:30
user.identities.find_or_initialize_by(extern_uid: auth_hash.uid, provider: auth_hash.provider)
2015-09-11 14:41:01 +05:30
else
log.info "No existing LDAP account was found in GitLab. Checking for #{auth_hash.provider} account."
user = find_by_uid_and_provider
if user.nil?
log.info "No user found using #{auth_hash.provider} provider. Creating a new one."
user = build_new_user
end
log.info "Correct account has been found. Adding LDAP identity to user: #{user.username}."
2015-09-11 14:41:01 +05:30
user.identities.new(provider: ldap_person.provider, extern_uid: ldap_person.dn)
end
user
end
def auto_link_ldap_user?
Gitlab.config.omniauth.auto_link_ldap_user
end
def creating_linked_ldap_user?
auto_link_ldap_user? && ldap_person
end
def ldap_person
return @ldap_person if defined?(@ldap_person)
# Look for a corresponding person with same uid in any of the configured LDAP providers
Gitlab::LDAP::Config.providers.each do |provider|
adapter = Gitlab::LDAP::Adapter.new(provider)
@ldap_person = Gitlab::LDAP::Person.find_by_uid(auth_hash.uid, adapter)
2016-11-24 13:41:30 +05:30
# The `uid` might actually be a DN. Try it next.
@ldap_person ||= Gitlab::LDAP::Person.find_by_dn(auth_hash.uid, adapter)
2015-09-11 14:41:01 +05:30
break if @ldap_person
end
@ldap_person
end
def ldap_config
Gitlab::LDAP::Config.new(ldap_person.provider) if ldap_person
end
2015-04-26 12:48:37 +05:30
def needs_blocking?
new? && block_after_signup?
end
def signup_enabled?
2016-04-02 18:10:28 +05:30
providers = Gitlab.config.omniauth.allow_single_sign_on
if providers.is_a?(Array)
providers.include?(auth_hash.provider)
else
providers
end
2015-04-26 12:48:37 +05:30
end
2016-06-02 11:05:42 +05:30
def external_provider?
Gitlab.config.omniauth.external_providers.include?(auth_hash.provider)
end
2015-04-26 12:48:37 +05:30
def block_after_signup?
2015-09-11 14:41:01 +05:30
if creating_linked_ldap_user?
ldap_config.block_auto_created_users
2016-01-29 22:53:50 +05:30
else
2015-09-11 14:41:01 +05:30
Gitlab.config.omniauth.block_auto_created_users
end
2015-04-26 12:48:37 +05:30
end
def auth_hash=(auth_hash)
@auth_hash = AuthHash.new(auth_hash)
end
def find_by_uid_and_provider
identity = Identity.find_by(provider: auth_hash.provider, extern_uid: auth_hash.uid)
identity && identity.user
end
def build_new_user
user = ::User.new(user_attributes)
user.skip_confirmation!
user.identities.new(extern_uid: auth_hash.uid, provider: auth_hash.provider)
user
end
def user_attributes
2015-09-11 14:41:01 +05:30
# Give preference to LDAP for sensitive information when creating a linked account
if creating_linked_ldap_user?
2016-01-29 22:53:50 +05:30
username = ldap_person.username.presence
email = ldap_person.email.first.presence
2015-09-11 14:41:01 +05:30
end
2016-01-29 22:53:50 +05:30
username ||= auth_hash.username
email ||= auth_hash.email
name = auth_hash.name
name = ::Namespace.clean_path(username) if name.strip.empty?
2016-01-29 22:53:50 +05:30
2015-04-26 12:48:37 +05:30
{
name: name,
2015-09-11 14:41:01 +05:30
username: ::Namespace.clean_path(username),
email: email,
2015-04-26 12:48:37 +05:30
password: auth_hash.password,
password_confirmation: auth_hash.password,
password_automatically_set: true
}
end
def log
Gitlab::AppLogger
end
def unauthorized_to_create
2015-09-11 14:41:01 +05:30
raise SignupDisabledError
2015-04-26 12:48:37 +05:30
end
end
end
end