summaryrefslogtreecommitdiff
path: root/app/controllers/ci/user_sessions_controller.rb
blob: 82134c1f7baa2618635b24cb6665bad45437afaa (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
module Ci
  class UserSessionsController < Ci::ApplicationController
    before_filter :authenticate_user!, except: [:new, :callback, :auth]

    def show
      @user = current_user
    end

    def new
    end

    def auth
      unless is_oauth_state_valid?(params[:state])
        redirect_to new_ci_user_sessions_path
        return
      end

      redirect_to client.auth_code.authorize_url({
        redirect_uri: callback_ci_user_sessions_url,
        state: params[:state]
      })
    end

    def callback
      unless is_oauth_state_valid?(params[:state])
        redirect_to new_ci_user_sessions_path
        return
      end

      token = client.auth_code.get_token(params[:code], redirect_uri: callback_ci_user_sessions_url).token
      
      @user_session = Ci::UserSession.new
      user = @user_session.authenticate(access_token: token)

      if user && sign_in(user)
        return_to = get_ouath_state_return_to(params[:state])
        redirect_to(return_to || ci_root_path)
      else
        @error = 'Invalid credentials'
        render :new
      end
      
    end

    def destroy
      sign_out

      redirect_to new_ci_user_sessions_path
    end

    protected

    def client
      @client ||= ::OAuth2::Client.new(
        GitlabCi.config.gitlab_server.app_id,
        GitlabCi.config.gitlab_server.app_secret,
        {
          site: GitlabCi.config.gitlab_server.url,
          authorize_url: 'oauth/authorize',
          token_url: 'oauth/token'
        }
      )
    end
  end
end