2018-02-04 15:42:13 +11:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
class Auth::OmniauthCallbacksController < Devise::OmniauthCallbacksController
|
2023-10-24 02:46:21 +11:00
|
|
|
skip_before_action :check_self_destruct!
|
2018-02-04 15:42:13 +11:00
|
|
|
skip_before_action :verify_authenticity_token
|
|
|
|
|
|
|
|
def self.provides_callback_for(provider)
|
|
|
|
define_method provider do
|
2023-07-25 17:46:57 +10:00
|
|
|
@provider = provider
|
2024-02-15 01:16:07 +11:00
|
|
|
@user = User.find_for_omniauth(request.env['omniauth.auth'], current_user)
|
2018-02-04 15:42:13 +11:00
|
|
|
|
|
|
|
if @user.persisted?
|
2023-07-25 17:46:57 +10:00
|
|
|
record_login_activity
|
2018-02-04 15:42:13 +11:00
|
|
|
sign_in_and_redirect @user, event: :authentication
|
2023-07-25 17:46:57 +10:00
|
|
|
set_flash_message(:notice, :success, kind: label_for_provider) if is_navigational_format?
|
2018-02-04 15:42:13 +11:00
|
|
|
else
|
|
|
|
session["devise.#{provider}_data"] = request.env['omniauth.auth']
|
|
|
|
redirect_to new_user_registration_url
|
|
|
|
end
|
2024-02-15 08:49:45 +11:00
|
|
|
rescue ActiveRecord::RecordInvalid
|
|
|
|
flash[:alert] = I18n.t('devise.failure.omniauth_user_creation_failure') if is_navigational_format?
|
|
|
|
redirect_to new_user_session_url
|
2018-02-04 15:42:13 +11:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
Devise.omniauth_configs.each_key do |provider|
|
|
|
|
provides_callback_for provider
|
|
|
|
end
|
|
|
|
|
|
|
|
def after_sign_in_path_for(resource)
|
2022-03-09 22:07:35 +11:00
|
|
|
if resource.email_present?
|
2023-03-13 10:06:27 +11:00
|
|
|
stored_location_for(resource) || root_path
|
2018-02-04 15:42:13 +11:00
|
|
|
else
|
Change unconfirmed user login behaviour (#11375)
Allow access to account settings, 2FA, authorized applications, and
account deletions to unconfirmed and pending users, as well as
users who had their accounts disabled. Suspended users cannot update
their e-mail or password or delete their account.
Display account status on account settings page, for example, when
an account is frozen, limited, unconfirmed or pending review.
After sign up, login users straight away and show a simple page that
tells them the status of their account with links to account settings
and logout, to reduce onboarding friction and allow users to correct
wrongly typed e-mail addresses.
Move the final sign-up step of SSO integrations to be the same
as above to reduce code duplication.
2019-07-22 18:48:50 +10:00
|
|
|
auth_setup_path(missing_email: '1')
|
2018-02-04 15:42:13 +11:00
|
|
|
end
|
|
|
|
end
|
2023-07-25 17:46:57 +10:00
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
def record_login_activity
|
|
|
|
LoginActivity.create(
|
|
|
|
user: @user,
|
|
|
|
success: true,
|
|
|
|
authentication_method: :omniauth,
|
|
|
|
provider: @provider,
|
|
|
|
ip: request.remote_ip,
|
|
|
|
user_agent: request.user_agent
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
def label_for_provider
|
|
|
|
provider_display_name || configured_provider_name
|
|
|
|
end
|
|
|
|
|
|
|
|
def provider_display_name
|
|
|
|
Devise.omniauth_configs[@provider]&.strategy&.display_name.presence
|
|
|
|
end
|
|
|
|
|
|
|
|
def configured_provider_name
|
|
|
|
I18n.t("auth.providers.#{@provider}", default: @provider.to_s.chomp('_oauth2').capitalize)
|
|
|
|
end
|
2018-02-04 15:42:13 +11:00
|
|
|
end
|