summaryrefslogtreecommitdiff
path: root/app/controllers/user_sessions_controller.rb
blob: 23e4182e5ce859d9a87c693de8f0754a4cfd0779 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
class UserSessionsController < ApplicationController
  before_filter :authenticate_user!, except: [:new, :callback, :auth]

  def show
    @user = current_user
  end

  def new
  end

  def auth
    unless is_oauth_state_valid?(params[:state])
      redirect_to new_user_sessions_path
      return
    end

    redirect_to client.auth_code.authorize_url({
      redirect_uri: callback_user_sessions_url,
      state: params[:state]
    })
  end

  def callback
    unless is_oauth_state_valid?(params[:state])
      redirect_to new_user_sessions_path
      return
    end

    token = client.auth_code.get_token(params[:code], redirect_uri: callback_user_sessions_url).token
    
    @user_session = UserSession.new
    user = @user_session.authenticate(access_token: token)

    if user && sign_in(user)
      return_to = get_ouath_state_return_to(params[:state])
      redirect_to(return_to || root_path)
    else
      @error = 'Invalid credentials'
      render :new
    end
    
  end

  def destroy
    sign_out

    redirect_to new_user_sessions_path
  end

  protected

  def client
    @client ||= ::OAuth2::Client.new(
      GitlabCi.config.gitlab_server.app_id,
      GitlabCi.config.gitlab_server.app_secret,
      {
        site: GitlabCi.config.gitlab_server.url,
        authorize_url: 'oauth/authorize',
        token_url: 'oauth/token'
      }
    )
  end
end