Files
gitlabhq/app/controllers/omniauth_callbacks_controller.rb
2025-07-08 18:11:40 +00:00

507 lines
15 KiB
Ruby

# frozen_string_literal: true
class OmniauthCallbacksController < Devise::OmniauthCallbacksController
include ActionView::Helpers::TextHelper
include AuthenticatesWithTwoFactorForAdminMode
include Devise::Controllers::Rememberable
include AuthHelper
include InitializesCurrentUserMode
include KnownSignIn
include AcceptsPendingInvitations
include Onboarding::Redirectable
include InternalRedirect
include SafeFormatHelper
include SynchronizeBroadcastMessageDismissals
ACTIVE_SINCE_KEY = 'active_since'
# Following https://www.rfc-editor.org/rfc/rfc3986.txt
# to check for the present of reserved characters
# in redirect_fragment
INVALID_FRAGMENT_EXP = %r{[;/?:@&=+$,]+}
InvalidFragmentError = Class.new(StandardError)
after_action :verify_known_sign_in
protect_from_forgery except: [:failure] + AuthHelper.saml_providers, with: :exception, prepend: true
feature_category :system_access
# To be used in ee version for raising error on user signup if user is from restricted country
SignUpFromRestrictedCountyError = Class.new(StandardError)
def handle_omniauth
if ::AuthHelper.saml_providers.include?(oauth['provider'].to_sym)
saml
elsif ::AuthHelper.oidc_providers.include?(oauth['provider'].to_sym)
openid_connect
else
omniauth_flow(Gitlab::Auth::OAuth)
end
end
AuthHelper.providers_for_base_controller.each do |provider|
alias_method provider, :handle_omniauth
end
# overridden in EE
def openid_connect
omniauth_flow(Gitlab::Auth::OAuth)
end
def jwt
omniauth_flow(
Gitlab::Auth::OAuth,
identity_linker: Gitlab::Auth::Jwt::IdentityLinker.new(current_user, oauth, session)
)
end
# Extend the standard implementation to also increment
# the number of failed sign in attempts
def failure
update_login_counter_metric(failed_strategy.name, 'failed')
log_saml_response if params['SAMLResponse']
username = params[:username].to_s
if username.present? && AuthHelper.form_based_provider?(failed_strategy.name)
user = User.find_by_login(username)
user&.increment_failed_attempts!
log_failed_login(username, failed_strategy.name)
end
super
end
# Extend the standard message generation to accept our custom exception
def failure_message
exception = request.env["omniauth.error"]
error = exception.error_reason if exception.respond_to?(:error_reason)
error ||= exception.error if exception.respond_to?(:error)
error ||= exception.message if exception.respond_to?(:message)
error ||= request.env["omniauth.error.type"].to_s
error.to_s.humanize if error
end
def saml
log_saml_response
omniauth_flow(Gitlab::Auth::Saml)
rescue Gitlab::Auth::Saml::IdentityLinker::UnverifiedRequest
redirect_unverified_saml_initiation
end
def auth0
if oauth['uid'].blank?
fail_auth0_login
else
handle_omniauth
end
end
def salesforce
if oauth.dig('extra', 'email_verified')
handle_omniauth
else
fail_salesforce_login
end
end
def atlassian_oauth2
omniauth_flow(Gitlab::Auth::Atlassian)
end
private
def verify_redirect_fragment(fragment)
if URI.decode_uri_component(fragment).match(INVALID_FRAGMENT_EXP)
raise InvalidFragmentError
else
fragment
end
end
def track_event(user, provider, status)
log_audit_event(user, with: provider)
update_login_counter_metric(provider, status)
end
def update_login_counter_metric(provider, status)
omniauth_login_counter.increment(omniauth_provider: provider, status: status)
end
def omniauth_login_counter
Gitlab::Auth::OAuth::BeforeRequestPhaseOauthLoginCounterIncrement.counter
end
def log_failed_login(user, provider)
# overridden in EE
end
def after_omniauth_failure_path_for(scope)
if Gitlab::CurrentSettings.admin_mode
return new_admin_session_path if current_user_mode.admin_mode_requested?
end
super
end
def store_redirect_to
# overridden in EE
end
def omniauth_flow(auth_module, identity_linker: nil)
if fragment = request.env.dig('omniauth.params', 'redirect_fragment').presence
store_redirect_fragment(fragment)
end
store_redirect_to
if current_user
return render_403 unless link_provider_allowed?(oauth['provider'])
set_session_active_since(oauth['provider']) if ::AuthHelper.saml_providers.include?(oauth['provider'].to_sym)
track_event(current_user, oauth['provider'], 'succeeded')
handle_step_up_auth
if Gitlab::CurrentSettings.admin_mode
return admin_mode_flow(auth_module::User) if current_user_mode.admin_mode_requested?
end
identity_linker ||= auth_module::IdentityLinker.new(current_user, oauth, session)
return redirect_authorize_identity_link(identity_linker) if identity_linker.authorization_required?
link_identity(identity_linker)
current_auth_user = build_auth_user(auth_module::User)
set_remember_me(current_user, current_auth_user)
# We are also calling this here in the case that devise re-logins and current_user is set
synchronize_broadcast_message_dismissals(current_user)
store_idp_two_factor_status(current_auth_user.bypass_two_factor?)
if identity_linker.changed?
redirect_identity_linked
elsif identity_linker.failed?
redirect_identity_link_failed(identity_linker.error_message)
else
redirect_identity_exists
end
else
sign_in_user_flow(auth_module::User)
end
rescue InvalidFragmentError
fail_login_with_message("Invalid state")
end
def link_identity(identity_linker)
identity_linker.link
end
def redirect_identity_exists
redirect_to after_sign_in_path_for(current_user)
end
def redirect_identity_link_failed(error_message)
redirect_to profile_account_path,
notice: safe_format(_("Authentication failed: %{error_message}"), error_message: error_message)
end
def redirect_identity_linked
redirect_to profile_account_path, notice: _('Authentication method updated')
end
def redirect_authorize_identity_link(identity_linker)
state = SecureRandom.uuid
session[:identity_link_state] = state
session[:identity_link_provider] = identity_linker.provider
session[:identity_link_extern_uid] = identity_linker.uid
redirect_to new_user_settings_identities_path(state: state)
end
def build_auth_user(auth_user_class)
strong_memoize_with(:build_auth_user, auth_user_class) do
auth_user_class.new(oauth, build_auth_user_params)
end
end
# Overridden in EE
def build_auth_user_params
{ organization_id: Current.organization.id }
end
# Overridden in EE
def set_session_active_since(id); end
def sign_in_user_flow(auth_user_class)
auth_user = build_auth_user(auth_user_class)
new_user = allowed_new_user?(auth_user)
@user = auth_user.find_and_update!
if auth_user.valid_sign_in?
# In this case the `#current_user` would not be set. So we can't fetch it
# from that in `#context_user`. Pushing it manually here makes the information
# available in the logs for this request.
Gitlab::ApplicationContext.push(user: @user)
track_event(@user, oauth['provider'], 'succeeded')
Gitlab::Tracking.event(self.class.name, "#{oauth['provider']}_sso", user: @user) if new_user
set_remember_me(@user, auth_user)
set_session_active_since(oauth['provider']) if ::AuthHelper.saml_providers.include?(oauth['provider'].to_sym)
if @user.two_factor_enabled? && !auth_user.bypass_two_factor?
prompt_for_two_factor(@user)
store_idp_two_factor_status(false)
else
if @user.deactivated?
@user.activate
flash[:notice] =
_('Welcome back! Your account had been deactivated due to inactivity but is now reactivated.')
end
# session variable for storing bypass two-factor request from IDP
store_idp_two_factor_status(auth_user.bypass_two_factor?)
accept_pending_invitations(user: @user) if new_user
synchronize_broadcast_message_dismissals(@user) unless new_user
persist_accepted_terms_if_required(@user) if new_user
perform_registration_tasks(@user, oauth['provider']) if new_user
enqueue_after_sign_in_workers(@user, auth_user)
sign_in_and_redirect_or_verify_identity(@user, auth_user, new_user)
end
else
fail_login(@user)
end
rescue Gitlab::Auth::OAuth::User::IdentityWithUntrustedExternUidError
handle_identity_with_untrusted_extern_uid
rescue Gitlab::Auth::OAuth::User::SigninDisabledForProviderError
handle_disabled_provider
rescue Gitlab::Auth::OAuth::User::SignupDisabledError
handle_signup_error
rescue SignUpFromRestrictedCountyError
handle_signup_from_restricted_country_error
end
def handle_signup_from_restricted_country_error
sign_up_message = "Sign up with Jihu"
jihu_url = ActionController::Base.helpers.link_to _(sign_up_message), "https://about.gitlab.com/pricing/faq-jihu/",
class: 'gl-link'
message = safe_format(_('It looks like you are visiting GitLab from Mainland China, Macau, or Hong Kong.' \
'We advise you to %{jihu_url} before continuing.'), jihu_url: jihu_url)
flash[:alert] = sanitize(message)
redirect_to new_user_session_path
end
def handle_signup_error
redirect_path = new_user_session_path
label = Gitlab::Auth::OAuth::Provider.label_for(oauth['provider'])
simple_url = Settings.gitlab.url.sub(%r{^https?://(www\.)?}i, '')
message = [
safe_format(_('Signing in using your %{label} account without a pre-existing ' \
'account in %{simple_url} is not allowed.'), label: label, simple_url: simple_url)
]
if Gitlab::CurrentSettings.allow_signup?
redirect_path = new_user_registration_path
doc_pair = tag_pair(view_context.link_to(
'',
help_page_path('user/profile/_index.md', anchor: 'sign-in-services')),
:doc_start,
:doc_end
)
message << safe_format(
_('Create an account in %{simple_url} first, and then %{doc_start}connect it to ' \
'your %{label} account%{doc_end}.'),
doc_pair,
label: label,
simple_url: simple_url
)
end
flash[:alert] = sanitize(message.join(' '))
redirect_to redirect_path
end
def oauth
@oauth ||= request.env['omniauth.auth']
end
def fail_login(user)
log_failed_login(user.username, oauth['provider'])
@provider = Gitlab::Auth::OAuth::Provider.label_for(params[:action])
@error = user.errors.full_messages.to_sentence
render 'errors/omniauth_error', layout: "oauth_error", status: :unprocessable_entity
end
def fail_auth0_login
fail_login_with_message(_('Wrong extern UID provided. Make sure Auth0 is configured correctly.'))
end
def fail_salesforce_login
fail_login_with_message(_('Email not verified. Please verify your email in Salesforce.'))
end
def fail_login_with_message(message)
flash[:alert] = message
redirect_to new_user_session_path
end
def redirect_unverified_saml_initiation
redirect_to profile_account_path, notice: _('Request to link SAML account must be authorized')
end
def handle_identity_with_untrusted_extern_uid
label = Gitlab::Auth::OAuth::Provider.label_for(oauth['provider'])
flash[:alert] = safe_format(
_('Signing in using your %{label} account has been disabled for security reasons. ' \
'Please sign in to your GitLab account using another authentication method and ' \
'reconnect to your %{label} account.'
),
label: label
)
redirect_to new_user_session_path
end
def handle_disabled_provider
label = Gitlab::Auth::OAuth::Provider.label_for(oauth['provider'])
flash[:alert] = safe_format(_("Signing in using %{label} has been disabled"), label: label)
redirect_to new_user_session_path
end
def log_audit_event(user, options = {}, name = 'authenticated_with_oauth')
return if options[:with].blank?
provider = options[:with]
audit_context = {
name: name,
author: user,
scope: user,
target: user,
message: "Signed in with #{provider.upcase} authentication",
authentication_event: true,
authentication_provider: provider,
additional_details: {
with: provider
}
}
::Gitlab::Audit::Auditor.audit(audit_context)
end
def set_remember_me(user, auth_user)
return unless remember_me?
if user.two_factor_enabled? && !auth_user.bypass_two_factor?
params[:remember_me] = '1'
else
remember_me(user)
end
end
def remember_me?
request_params = request.env['omniauth.params']
(request_params['remember_me'] == '1') if request_params.present?
end
def store_redirect_fragment(redirect_fragment)
key = stored_location_key_for(:user)
location = session[key]
if uri = parse_uri(location)
uri.fragment = verify_redirect_fragment(redirect_fragment)
store_location_for(:user, uri.to_s)
end
end
def handle_step_up_auth
return if Feature.disabled?(:omniauth_step_up_auth_for_admin_mode, current_user)
step_up_auth_flow =
::Gitlab::Auth::Oidc::StepUpAuthentication.build_flow(session: session, provider: oauth.provider)
return unless step_up_auth_flow.enabled_by_config?
return unless step_up_auth_flow.requested?
step_up_auth_flow.evaluate!(oauth.extra.raw_info)
end
def admin_mode_flow(auth_user_class)
auth_user = build_auth_user(auth_user_class)
return fail_admin_mode_invalid_credentials unless omniauth_identity_matches_current_user?
if current_user.two_factor_enabled? && !auth_user.bypass_two_factor?
admin_mode_prompt_for_two_factor(current_user)
else
# Can only reach here if the omniauth identity matches current user
# and current_user is an admin that requested admin mode
current_user_mode.enable_admin_mode!(skip_password_validation: true)
redirect_to stored_location_for(:redirect) || admin_root_path, notice: _('Admin mode enabled')
end
end
def omniauth_identity_matches_current_user?
current_user.matches_identity?(oauth['provider'], oauth['uid'])
end
def fail_admin_mode_invalid_credentials
redirect_to new_admin_session_path, alert: _('Invalid login or password')
end
def persist_accepted_terms_if_required(user)
return unless user.persisted?
return unless Gitlab::CurrentSettings.current_application_settings.enforce_terms?
terms = ApplicationSetting::Term.latest
Users::RespondToTermsService.new(user, terms).execute(accepted: true)
end
def perform_registration_tasks(_user, _provider)
store_location_for(:user, after_sign_up_path)
end
def onboarding_status_presenter
Onboarding::StatusPresenter
.new(request.env.fetch('omniauth.params', {}).deep_symbolize_keys, session['user_return_to'], @user)
end
strong_memoize_attr :onboarding_status_presenter
# overridden in EE
def sign_in_and_redirect_or_verify_identity(user, _, _)
sign_in_and_redirect(user, event: :authentication)
end
# overridden in specific EE class
def enqueue_after_sign_in_workers(_user, _auth_user)
true
end
# overridden in specific EE class
def allowed_new_user?(auth_user)
auth_user.new?
end
def store_idp_two_factor_status(bypass_2fa)
session[:provider_2FA] = true if bypass_2fa
end
def log_saml_response
ParameterFilters::SamlResponse.log(params['SAMLResponse'].dup)
end
end
OmniauthCallbacksController.prepend_mod_with('OmniauthCallbacksController')