Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
ce24035d
Commit
ce24035d
authored
Jun 06, 2017
by
Robin Bobbitt
Committed by
Bob Van Landuyt
Jun 08, 2017
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Sync email address from specified omniauth provider
parent
5ba3a3f2
Changes
12
Hide whitespace changes
Inline
Side-by-side
Showing
12 changed files
with
157 additions
and
22 deletions
+157
-22
app/controllers/profiles_controller.rb
app/controllers/profiles_controller.rb
+2
-2
app/helpers/profiles_helper.rb
app/helpers/profiles_helper.rb
+7
-0
app/views/profiles/show.html.haml
app/views/profiles/show.html.haml
+2
-2
changelogs/unreleased/sync-email-from-omniauth.yml
changelogs/unreleased/sync-email-from-omniauth.yml
+4
-0
config/gitlab.yml.example
config/gitlab.yml.example
+4
-0
config/initializers/1_settings.rb
config/initializers/1_settings.rb
+1
-0
lib/gitlab/ldap/user.rb
lib/gitlab/ldap/user.rb
+4
-9
lib/gitlab/o_auth/user.rb
lib/gitlab/o_auth/user.rb
+17
-0
spec/controllers/profiles_controller_spec.rb
spec/controllers/profiles_controller_spec.rb
+31
-0
spec/helpers/profiles_helper_spec.rb
spec/helpers/profiles_helper_spec.rb
+36
-0
spec/lib/gitlab/ldap/user_spec.rb
spec/lib/gitlab/ldap/user_spec.rb
+9
-5
spec/lib/gitlab/o_auth/user_spec.rb
spec/lib/gitlab/o_auth/user_spec.rb
+40
-4
No files found.
app/controllers/profiles_controller.rb
View file @
ce24035d
...
@@ -9,7 +9,7 @@ class ProfilesController < Profiles::ApplicationController
...
@@ -9,7 +9,7 @@ class ProfilesController < Profiles::ApplicationController
end
end
def
update
def
update
user_params
.
except!
(
:email
)
if
@user
.
ldap_user
?
user_params
.
except!
(
:email
)
if
@user
.
external_email
?
respond_to
do
|
format
|
respond_to
do
|
format
|
if
@user
.
update_attributes
(
user_params
)
if
@user
.
update_attributes
(
user_params
)
...
@@ -76,7 +76,7 @@ class ProfilesController < Profiles::ApplicationController
...
@@ -76,7 +76,7 @@ class ProfilesController < Profiles::ApplicationController
end
end
def
user_params
def
user_params
params
.
require
(
:user
).
permit
(
@user_params
||=
params
.
require
(
:user
).
permit
(
:avatar
,
:avatar
,
:bio
,
:bio
,
:email
,
:email
,
...
...
app/helpers/profiles_helper.rb
0 → 100644
View file @
ce24035d
module
ProfilesHelper
def
email_provider_label
return
unless
current_user
.
external_email?
current_user
.
email_provider
.
present?
?
Gitlab
::
OAuth
::
Provider
.
label_for
(
current_user
.
email_provider
)
:
"LDAP"
end
end
app/views/profiles/show.html.haml
View file @
ce24035d
...
@@ -49,10 +49,10 @@
...
@@ -49,10 +49,10 @@
.form-group
.form-group
=
f
.
label
:email
,
class:
"label-light"
=
f
.
label
:email
,
class:
"label-light"
-
if
@user
.
ldap_user?
&&
@user
.
ldap
_email?
-
if
@user
.
external
_email?
=
f
.
text_field
:email
,
class:
"form-control"
,
required:
true
,
readonly:
true
=
f
.
text_field
:email
,
class:
"form-control"
,
required:
true
,
readonly:
true
%span
.help-block.light
%span
.help-block.light
Your email address was automatically set based on
the LDAP server
.
Your email address was automatically set based on
your
#{
email_provider_label
}
account
.
-
else
-
else
-
if
@user
.
temp_oauth_email?
-
if
@user
.
temp_oauth_email?
=
f
.
text_field
:email
,
class:
"form-control"
,
required:
true
,
value:
nil
=
f
.
text_field
:email
,
class:
"form-control"
,
required:
true
,
value:
nil
...
...
changelogs/unreleased/sync-email-from-omniauth.yml
0 → 100644
View file @
ce24035d
---
title
:
Sync email address from specified omniauth provider
merge_request
:
11268
author
:
Robin Bobbitt
config/gitlab.yml.example
View file @
ce24035d
...
@@ -432,6 +432,10 @@ production: &base
...
@@ -432,6 +432,10 @@ production: &base
# showing GitLab's sign-in page (default: show the GitLab sign-in page)
# showing GitLab's sign-in page (default: show the GitLab sign-in page)
# auto_sign_in_with_provider: saml
# auto_sign_in_with_provider: saml
# Sync user's email address from the specified Omniauth provider every time the user logs
# in (default: nil). And consequently make this field read-only.
# sync_email_from_provider: cas3
# CAUTION!
# CAUTION!
# This allows users to login without having a user account first. Define the allowed providers
# This allows users to login without having a user account first. Define the allowed providers
# using an array, e.g. ["saml", "twitter"], or as true/false to allow all providers or none.
# using an array, e.g. ["saml", "twitter"], or as true/false to allow all providers or none.
...
...
config/initializers/1_settings.rb
View file @
ce24035d
...
@@ -190,6 +190,7 @@ Settings.omniauth['external_providers'] = [] if Settings.omniauth['external_prov
...
@@ -190,6 +190,7 @@ Settings.omniauth['external_providers'] = [] if Settings.omniauth['external_prov
Settings
.
omniauth
[
'block_auto_created_users'
]
=
true
if
Settings
.
omniauth
[
'block_auto_created_users'
].
nil?
Settings
.
omniauth
[
'block_auto_created_users'
]
=
true
if
Settings
.
omniauth
[
'block_auto_created_users'
].
nil?
Settings
.
omniauth
[
'auto_link_ldap_user'
]
=
false
if
Settings
.
omniauth
[
'auto_link_ldap_user'
].
nil?
Settings
.
omniauth
[
'auto_link_ldap_user'
]
=
false
if
Settings
.
omniauth
[
'auto_link_ldap_user'
].
nil?
Settings
.
omniauth
[
'auto_link_saml_user'
]
=
false
if
Settings
.
omniauth
[
'auto_link_saml_user'
].
nil?
Settings
.
omniauth
[
'auto_link_saml_user'
]
=
false
if
Settings
.
omniauth
[
'auto_link_saml_user'
].
nil?
Settings
.
omniauth
[
'sync_email_from_provider'
]
||=
nil
Settings
.
omniauth
[
'providers'
]
||=
[]
Settings
.
omniauth
[
'providers'
]
||=
[]
Settings
.
omniauth
[
'cas3'
]
||=
Settingslogic
.
new
({})
Settings
.
omniauth
[
'cas3'
]
||=
Settingslogic
.
new
({})
...
...
lib/gitlab/ldap/user.rb
View file @
ce24035d
...
@@ -41,11 +41,6 @@ module Gitlab
...
@@ -41,11 +41,6 @@ module Gitlab
def
update_user_attributes
def
update_user_attributes
if
persisted?
if
persisted?
if
auth_hash
.
has_email?
gl_user
.
skip_reconfirmation!
gl_user
.
email
=
auth_hash
.
email
end
# find_or_initialize_by doesn't update `gl_user.identities`, and isn't autosaved.
# find_or_initialize_by doesn't update `gl_user.identities`, and isn't autosaved.
identity
=
gl_user
.
identities
.
find
{
|
identity
|
identity
.
provider
==
auth_hash
.
provider
}
identity
=
gl_user
.
identities
.
find
{
|
identity
|
identity
.
provider
==
auth_hash
.
provider
}
identity
||=
gl_user
.
identities
.
build
(
provider:
auth_hash
.
provider
)
identity
||=
gl_user
.
identities
.
build
(
provider:
auth_hash
.
provider
)
...
@@ -55,10 +50,6 @@ module Gitlab
...
@@ -55,10 +50,6 @@ module Gitlab
# For an existing identity with no change in DN, this line changes nothing.
# For an existing identity with no change in DN, this line changes nothing.
identity
.
extern_uid
=
auth_hash
.
uid
identity
.
extern_uid
=
auth_hash
.
uid
end
end
gl_user
.
ldap_email
=
auth_hash
.
has_email?
gl_user
end
end
def
changed?
def
changed?
...
@@ -69,6 +60,10 @@ module Gitlab
...
@@ -69,6 +60,10 @@ module Gitlab
ldap_config
.
block_auto_created_users
ldap_config
.
block_auto_created_users
end
end
def
sync_email_from_provider?
true
end
def
allowed?
def
allowed?
Gitlab
::
LDAP
::
Access
.
allowed?
(
gl_user
)
Gitlab
::
LDAP
::
Access
.
allowed?
(
gl_user
)
end
end
...
...
lib/gitlab/o_auth/user.rb
View file @
ce24035d
...
@@ -12,6 +12,7 @@ module Gitlab
...
@@ -12,6 +12,7 @@ module Gitlab
def
initialize
(
auth_hash
)
def
initialize
(
auth_hash
)
self
.
auth_hash
=
auth_hash
self
.
auth_hash
=
auth_hash
update_email
end
end
def
persisted?
def
persisted?
...
@@ -174,6 +175,22 @@ module Gitlab
...
@@ -174,6 +175,22 @@ module Gitlab
}
}
end
end
def
sync_email_from_provider?
auth_hash
.
provider
.
to_s
==
Gitlab
.
config
.
omniauth
.
sync_email_from_provider
.
to_s
end
def
update_email
if
auth_hash
.
has_email?
&&
sync_email_from_provider?
if
persisted?
gl_user
.
skip_reconfirmation!
gl_user
.
email
=
auth_hash
.
email
end
gl_user
.
external_email
=
true
gl_user
.
email_provider
=
auth_hash
.
provider
end
end
def
log
def
log
Gitlab
::
AppLogger
Gitlab
::
AppLogger
end
end
...
...
spec/controllers/profiles_controller_spec.rb
0 → 100644
View file @
ce24035d
require
(
'spec_helper'
)
describe
ProfilesController
do
describe
"PUT update"
do
it
"allows an email update from a user without an external email address"
do
user
=
create
(
:user
)
sign_in
(
user
)
put
:update
,
user:
{
email:
"john@gmail.com"
,
name:
"John"
}
user
.
reload
expect
(
response
.
status
).
to
eq
(
302
)
expect
(
user
.
unconfirmed_email
).
to
eq
(
'john@gmail.com'
)
end
it
"ignores an email update from a user with an external email address"
do
ldap_user
=
create
(
:omniauth_user
,
external_email:
true
)
sign_in
(
ldap_user
)
put
:update
,
user:
{
email:
"john@gmail.com"
,
name:
"John"
}
ldap_user
.
reload
expect
(
response
.
status
).
to
eq
(
302
)
expect
(
ldap_user
.
unconfirmed_email
).
not_to
eq
(
'john@gmail.com'
)
end
end
end
spec/helpers/profiles_helper_spec.rb
0 → 100644
View file @
ce24035d
require
'rails_helper'
describe
ProfilesHelper
do
describe
'#email_provider_label'
do
it
"returns nil for users without external email"
do
user
=
create
(
:user
)
allow
(
helper
).
to
receive
(
:current_user
).
and_return
(
user
)
expect
(
helper
.
email_provider_label
).
to
be_nil
end
it
"returns omniauth provider label for users with external email"
do
stub_cas_omniauth_provider
cas_user
=
create
(
:omniauth_user
,
provider:
'cas3'
,
external_email:
true
,
email_provider:
'cas3'
)
allow
(
helper
).
to
receive
(
:current_user
).
and_return
(
cas_user
)
expect
(
helper
.
email_provider_label
).
to
eq
(
'CAS'
)
end
it
"returns 'LDAP' for users with external email but no email provider"
do
ldap_user
=
create
(
:omniauth_user
,
external_email:
true
)
allow
(
helper
).
to
receive
(
:current_user
).
and_return
(
ldap_user
)
expect
(
helper
.
email_provider_label
).
to
eq
(
'LDAP'
)
end
end
def
stub_cas_omniauth_provider
provider
=
OpenStruct
.
new
(
'name'
=>
'cas3'
,
'label'
=>
'CAS'
)
stub_omniauth_setting
(
providers:
[
provider
])
end
end
spec/lib/gitlab/ldap/user_spec.rb
View file @
ce24035d
...
@@ -37,7 +37,7 @@ describe Gitlab::LDAP::User, lib: true do
...
@@ -37,7 +37,7 @@ describe Gitlab::LDAP::User, lib: true do
end
end
it
"does not mark existing ldap user as changed"
do
it
"does not mark existing ldap user as changed"
do
create
(
:omniauth_user
,
email:
'john@example.com'
,
extern_uid:
'my-uid'
,
provider:
'ldapmain'
,
ldap_email:
true
)
create
(
:omniauth_user
,
email:
'john@example.com'
,
extern_uid:
'my-uid'
,
provider:
'ldapmain'
,
external_email:
true
,
email_provider:
'ldapmain'
)
expect
(
ldap_user
.
changed?
).
to
be_falsey
expect
(
ldap_user
.
changed?
).
to
be_falsey
end
end
end
end
...
@@ -141,8 +141,12 @@ describe Gitlab::LDAP::User, lib: true do
...
@@ -141,8 +141,12 @@ describe Gitlab::LDAP::User, lib: true do
expect
(
ldap_user
.
gl_user
.
email
).
to
eq
(
info
[
:email
])
expect
(
ldap_user
.
gl_user
.
email
).
to
eq
(
info
[
:email
])
end
end
it
"has ldap_email set to true"
do
it
"has external_email set to true"
do
expect
(
ldap_user
.
gl_user
.
ldap_email?
).
to
be
(
true
)
expect
(
ldap_user
.
gl_user
.
external_email?
).
to
be
(
true
)
end
it
"has email_provider set to provider"
do
expect
(
ldap_user
.
gl_user
.
email_provider
).
to
eql
'ldapmain'
end
end
end
end
...
@@ -155,8 +159,8 @@ describe Gitlab::LDAP::User, lib: true do
...
@@ -155,8 +159,8 @@ describe Gitlab::LDAP::User, lib: true do
expect
(
ldap_user
.
gl_user
.
temp_oauth_email?
).
to
be
(
true
)
expect
(
ldap_user
.
gl_user
.
temp_oauth_email?
).
to
be
(
true
)
end
end
it
"has
ldap
_email set to false"
do
it
"has
external
_email set to false"
do
expect
(
ldap_user
.
gl_user
.
ldap
_email?
).
to
be
(
false
)
expect
(
ldap_user
.
gl_user
.
external
_email?
).
to
be
(
false
)
end
end
end
end
end
end
...
...
spec/lib/gitlab/o_auth/user_spec.rb
View file @
ce24035d
...
@@ -28,11 +28,11 @@ describe Gitlab::OAuth::User, lib: true do
...
@@ -28,11 +28,11 @@ describe Gitlab::OAuth::User, lib: true do
end
end
end
end
describe
'#save'
do
def
stub_omniauth_config
(
messages
)
def
stub_omniauth_config
(
messages
)
allow
(
Gitlab
.
config
.
omniauth
).
to
receive_messages
(
messages
)
allow
(
Gitlab
.
config
.
omniauth
).
to
receive_messages
(
messages
)
end
end
describe
'#save'
do
def
stub_ldap_config
(
messages
)
def
stub_ldap_config
(
messages
)
allow
(
Gitlab
::
LDAP
::
Config
).
to
receive_messages
(
messages
)
allow
(
Gitlab
::
LDAP
::
Config
).
to
receive_messages
(
messages
)
end
end
...
@@ -377,4 +377,40 @@ describe Gitlab::OAuth::User, lib: true do
...
@@ -377,4 +377,40 @@ describe Gitlab::OAuth::User, lib: true do
end
end
end
end
end
end
describe
'updating email'
do
let!
(
:existing_user
)
{
create
(
:omniauth_user
,
extern_uid:
'my-uid'
,
provider:
'my-provider'
)
}
before
do
stub_omniauth_config
(
sync_email_from_provider:
'my-provider'
)
end
context
"when provider sets an email"
do
it
"updates the user email"
do
expect
(
gl_user
.
email
).
to
eq
(
info_hash
[
:email
])
end
it
"has external_email set to true"
do
expect
(
gl_user
.
external_email?
).
to
be
(
true
)
end
it
"has email_provider set to provider"
do
expect
(
gl_user
.
email_provider
).
to
eql
'my-provider'
end
end
context
"when provider doesn't set an email"
do
before
do
info_hash
.
delete
(
:email
)
end
it
"does not update the user email"
do
expect
(
gl_user
.
email
).
not_to
eq
(
info_hash
[
:email
])
end
it
"has external_email set to false"
do
expect
(
gl_user
.
external_email?
).
to
be
(
false
)
end
end
end
end
end
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment