mirror of
https://github.com/we-promise/sure.git
synced 2026-04-19 12:04:08 +00:00
Add OpenID Connect login support (#77)
* Add OpenID Connect login support * Add docs for OIDC config with Google Auth * Use Google styles for log in - Add support for linking existing account - Force users to sign-in with passoword first, when linking existing accounts - Add support to create new user when using OIDC - Add identities to user to prevent account take-ver - Make tests mocking instead of being integration tests - Manage session handling correctly - use OmniAuth.config.mock_auth instead of passing auth data via request env * Conditionally render Oauth button - Set a config item `configuration.x.auth.oidc_enabled` - Hide button if disabled --------- Signed-off-by: Juan José Mata <juanjo.mata@gmail.com> Signed-off-by: soky srm <sokysrm@gmail.com> Co-authored-by: sokie <sokysrm@gmail.com>
This commit is contained in:
125
app/controllers/oidc_accounts_controller.rb
Normal file
125
app/controllers/oidc_accounts_controller.rb
Normal file
@@ -0,0 +1,125 @@
|
||||
class OidcAccountsController < ApplicationController
|
||||
skip_authentication only: [ :link, :create_link, :new_user, :create_user ]
|
||||
layout "auth"
|
||||
|
||||
def link
|
||||
# Check if there's pending OIDC auth in session
|
||||
@pending_auth = session[:pending_oidc_auth]
|
||||
|
||||
if @pending_auth.nil?
|
||||
redirect_to new_session_path, alert: "No pending OIDC authentication found"
|
||||
return
|
||||
end
|
||||
|
||||
@email = @pending_auth["email"]
|
||||
@user_exists = User.exists?(email: @email) if @email.present?
|
||||
end
|
||||
|
||||
def create_link
|
||||
@pending_auth = session[:pending_oidc_auth]
|
||||
|
||||
if @pending_auth.nil?
|
||||
redirect_to new_session_path, alert: "No pending OIDC authentication found"
|
||||
return
|
||||
end
|
||||
|
||||
# Verify user's password to confirm identity
|
||||
user = User.authenticate_by(email: params[:email], password: params[:password])
|
||||
|
||||
if user
|
||||
# Create the OIDC identity link
|
||||
oidc_identity = user.oidc_identities.create!(
|
||||
provider: @pending_auth["provider"],
|
||||
uid: @pending_auth["uid"],
|
||||
info: {
|
||||
email: @pending_auth["email"],
|
||||
name: @pending_auth["name"],
|
||||
first_name: @pending_auth["first_name"],
|
||||
last_name: @pending_auth["last_name"]
|
||||
},
|
||||
last_authenticated_at: Time.current
|
||||
)
|
||||
|
||||
# Clear pending auth from session
|
||||
session.delete(:pending_oidc_auth)
|
||||
|
||||
# Check if user has MFA enabled
|
||||
if user.otp_required?
|
||||
session[:mfa_user_id] = user.id
|
||||
redirect_to verify_mfa_path
|
||||
else
|
||||
@session = create_session_for(user)
|
||||
redirect_to root_path, notice: "Account successfully linked to #{@pending_auth['provider']}"
|
||||
end
|
||||
else
|
||||
@email = params[:email]
|
||||
@user_exists = User.exists?(email: @email) if @email.present?
|
||||
flash.now[:alert] = "Invalid email or password"
|
||||
render :link, status: :unprocessable_entity
|
||||
end
|
||||
end
|
||||
|
||||
def new_user
|
||||
# Check if there's pending OIDC auth in session
|
||||
@pending_auth = session[:pending_oidc_auth]
|
||||
|
||||
if @pending_auth.nil?
|
||||
redirect_to new_session_path, alert: "No pending OIDC authentication found"
|
||||
return
|
||||
end
|
||||
|
||||
# Pre-fill user details from OIDC provider
|
||||
@user = User.new(
|
||||
email: @pending_auth["email"],
|
||||
first_name: @pending_auth["first_name"],
|
||||
last_name: @pending_auth["last_name"]
|
||||
)
|
||||
end
|
||||
|
||||
def create_user
|
||||
@pending_auth = session[:pending_oidc_auth]
|
||||
|
||||
if @pending_auth.nil?
|
||||
redirect_to new_session_path, alert: "No pending OIDC authentication found"
|
||||
return
|
||||
end
|
||||
|
||||
# Create user with a secure random password since they're using OIDC
|
||||
secure_password = SecureRandom.base58(32)
|
||||
@user = User.new(
|
||||
email: @pending_auth["email"],
|
||||
first_name: @pending_auth["first_name"],
|
||||
last_name: @pending_auth["last_name"],
|
||||
password: secure_password,
|
||||
password_confirmation: secure_password
|
||||
)
|
||||
|
||||
# Create new family for this user
|
||||
@user.family = Family.new
|
||||
@user.role = :admin
|
||||
|
||||
if @user.save
|
||||
# Create the OIDC identity
|
||||
@user.oidc_identities.create!(
|
||||
provider: @pending_auth["provider"],
|
||||
uid: @pending_auth["uid"],
|
||||
info: {
|
||||
email: @pending_auth["email"],
|
||||
name: @pending_auth["name"],
|
||||
first_name: @pending_auth["first_name"],
|
||||
last_name: @pending_auth["last_name"]
|
||||
},
|
||||
last_authenticated_at: Time.current
|
||||
)
|
||||
|
||||
# Clear pending auth from session
|
||||
session.delete(:pending_oidc_auth)
|
||||
|
||||
# Create session and log them in
|
||||
@session = create_session_for(@user)
|
||||
redirect_to root_path, notice: "Welcome! Your account has been created."
|
||||
else
|
||||
render :new_user, status: :unprocessable_entity
|
||||
end
|
||||
end
|
||||
end
|
||||
Reference in New Issue
Block a user