blob: 23e4182e5ce859d9a87c693de8f0754a4cfd0779 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
|
class UserSessionsController < ApplicationController
before_filter :authenticate_user!, except: [:new, :callback, :auth]
def show
@user = current_user
end
def new
end
def auth
unless is_oauth_state_valid?(params[:state])
redirect_to new_user_sessions_path
return
end
redirect_to client.auth_code.authorize_url({
redirect_uri: callback_user_sessions_url,
state: params[:state]
})
end
def callback
unless is_oauth_state_valid?(params[:state])
redirect_to new_user_sessions_path
return
end
token = client.auth_code.get_token(params[:code], redirect_uri: callback_user_sessions_url).token
@user_session = UserSession.new
user = @user_session.authenticate(access_token: token)
if user && sign_in(user)
return_to = get_ouath_state_return_to(params[:state])
redirect_to(return_to || root_path)
else
@error = 'Invalid credentials'
render :new
end
end
def destroy
sign_out
redirect_to new_user_sessions_path
end
protected
def client
@client ||= ::OAuth2::Client.new(
GitlabCi.config.gitlab_server.app_id,
GitlabCi.config.gitlab_server.app_secret,
{
site: GitlabCi.config.gitlab_server.url,
authorize_url: 'oauth/authorize',
token_url: 'oauth/token'
}
)
end
end
|