From 5b86dab03bbd19d9a3e6090d4672d8f1493e6fe5 Mon Sep 17 00:00:00 2001
From: Jan-Willem van der Meer <mail@jewilmeer.nl>
Date: Thu, 4 Sep 2014 12:55:10 +0200
Subject: [PATCH] Move auth hash to a seperate class

---
 lib/gitlab/ldap/user.rb           | 32 +++++------
 lib/gitlab/oauth/user.rb          | 93 +++++++++----------------------
 spec/lib/gitlab/ldap/user_spec.rb |  8 +--
 3 files changed, 46 insertions(+), 87 deletions(-)

diff --git a/lib/gitlab/ldap/user.rb b/lib/gitlab/ldap/user.rb
index 99f23080a84..6d1bec5f54a 100644
--- a/lib/gitlab/ldap/user.rb
+++ b/lib/gitlab/ldap/user.rb
@@ -10,23 +10,27 @@ module Gitlab
   module LDAP
     class User < Gitlab::OAuth::User
       class << self
-        def find_or_create(auth)
-          self.auth = auth
-          find(auth) || create(auth)
+        def find_or_create(auth_hash)
+          self.auth_hash = auth_hash
+          find(auth_hash) || find_and_connect_by_email(auth_hash) || create(auth_hash)
         end
 
-        # overloaded from Gitlab::Oauth::User
-        # TODO: it's messy, needs cleanup, less complexity
-        def create(auth)
-          ldap_user = new(auth)
-          # first try to find the user based on the returned email address
-          user = ldap_user.find_gitlab_user_by_email
+        def find_and_connect_by_email(auth_hash)
+          self.auth_hash = auth_hash
+          user = model.find_by(email: self.auth_hash.email)
 
           if user
-            user.update_attributes(extern_uid: ldap_user.uid, provider: ldap_user.provider)
-            Gitlab::AppLogger.info("(LDAP) Updating legacy LDAP user #{ldap_user.email} with extern_uid => #{ldap_user.uid}")
+            user.update_attributes(extern_uid: auth_hash.uid, provider: auth_hash.provider)
+            Gitlab::AppLogger.info("(LDAP) Updating legacy LDAP user #{self.auth_hash.email} with extern_uid => #{auth_hash.uid}")
             return user
           end
+        end
+
+        # overloaded from Gitlab::Oauth::User
+        # TODO: it's messy, needs cleanup, less complexity
+        def create(auth_hash)
+          ldap_user = new(auth_hash)
+          # first try to find the user based on the returned email address
 
           # if the user isn't found by an exact email match, use oauth methods
           ldap_user.save_and_trigger_callbacks
@@ -58,7 +62,7 @@ module Gitlab
         protected
 
         def find_by_uid_and_provider
-          find_by_uid(uid)
+          find_by_uid(auth_hash.uid)
         end
 
         def find_by_uid(uid)
@@ -79,10 +83,6 @@ module Gitlab
         end
       end
 
-      def find_gitlab_user_by_email
-        self.class.model.find_by(email: email)
-      end
-
       def needs_blocking?
         false
       end
diff --git a/lib/gitlab/oauth/user.rb b/lib/gitlab/oauth/user.rb
index 8ac040e3365..b768eda185f 100644
--- a/lib/gitlab/oauth/user.rb
+++ b/lib/gitlab/oauth/user.rb
@@ -7,15 +7,15 @@ module Gitlab
   module OAuth
     class User
       class << self
-        attr_accessor :auth
+        attr_reader :auth_hash
 
-        def find(auth)
-          self.auth = auth
+        def find(auth_hash)
+          self.auth_hash = auth_hash
           find_by_uid_and_provider
         end
 
-        def create(auth)
-          user = new(auth)
+        def create(auth_hash)
+          user = new(auth_hash)
           user.save_and_trigger_callbacks
         end
 
@@ -23,31 +23,32 @@ module Gitlab
           ::User
         end
 
-        protected
-        def find_by_uid_and_provider
-          model.where(provider: provider, extern_uid: uid).last
-        end
-
-        def provider
-          auth.provider
+        def auth_hash=(auth_hash)
+          @auth_hash = AuthHash.new(auth_hash)
         end
 
-        def uid
-          auth.uid.to_s
+        protected
+        def find_by_uid_and_provider
+          model.where(provider: auth_hash.provider, extern_uid: auth_hash.uid).last
         end
       end
 
-      attr_accessor :auth, :user
+      # Instance methods
+      attr_accessor :auth_hash, :user
 
-      def initialize(auth)
-        self.auth = auth
+      def initialize(auth_hash)
+        self.auth_hash = auth_hash
         self.user = self.class.model.new(user_attributes)
         user.skip_confirmation!
       end
 
+      def auth_hash=(auth_hash)
+        @auth_hash = AuthHash.new(auth_hash)
+      end
+
       def save_and_trigger_callbacks
         user.save!
-        log.info "(OAuth) Creating user #{email} from login with extern_uid => #{uid}"
+        log.info "(OAuth) Creating user #{auth_hash.email} from login with extern_uid => #{auth_hash.uid}"
         user.block if needs_blocking?
 
         user
@@ -58,48 +59,16 @@ module Gitlab
 
       def user_attributes
         {
-          extern_uid: uid,
-          provider: provider,
-          name: name,
-          username: username,
-          email: email,
-          password: password,
-          password_confirmation: password,
+          extern_uid: auth_hash.uid,
+          provider: auth_hash.provider,
+          name: auth_hash.name,
+          username: auth_hash.username,
+          email: auth_hash.email,
+          password: auth_hash.password,
+          password_confirmation: auth_hash.password,
         }
       end
 
-      def uid
-        auth.uid.to_s
-      end
-
-      def provider
-        auth.provider
-      end
-
-      def info
-        auth.info
-      end
-
-      def name
-        (info.name || full_name).to_s.force_encoding('utf-8')
-      end
-
-      def full_name
-        "#{info.first_name} #{info.last_name}"
-      end
-
-      def username
-        (info.try(:nickname) || generate_username).to_s.force_encoding('utf-8')
-      end
-
-      def email
-        (info.try(:email) || generate_temporarily_email).downcase
-      end
-
-      def password
-        @password ||= Devise.friendly_token[0, 8].downcase
-      end
-
       def log
         Gitlab::AppLogger
       end
@@ -108,16 +77,6 @@ module Gitlab
         raise OmniAuth::Error, "(OAuth) " + message
       end
 
-      # Get the first part of the email address (before @)
-      # In addtion in removes illegal characters
-      def generate_username
-        email.match(/^[^@]*/)[0].parameterize
-      end
-
-      def generate_temporarily_email
-        "temp-email-for-oauth-#{username}@gitlab.localhost"
-      end
-
       def needs_blocking?
         Gitlab.config.omniauth['block_auto_created_users']
       end
diff --git a/spec/lib/gitlab/ldap/user_spec.rb b/spec/lib/gitlab/ldap/user_spec.rb
index 725338965be..4ddf6b3039f 100644
--- a/spec/lib/gitlab/ldap/user_spec.rb
+++ b/spec/lib/gitlab/ldap/user_spec.rb
@@ -1,7 +1,7 @@
 require 'spec_helper'
 
 describe Gitlab::LDAP::User do
-  let(:gl_auth) { Gitlab::LDAP::User }
+  let(:gl_user) { Gitlab::LDAP::User }
   let(:info) do
     double(
       name: 'John',
@@ -19,12 +19,12 @@ describe Gitlab::LDAP::User do
     it "finds the user if already existing" do
       existing_user = create(:user, extern_uid: 'my-uid', provider: 'ldap')
 
-      expect{ gl_auth.find_or_create(auth) }.to_not change{ User.count }
+      expect{ gl_user.find_or_create(auth) }.to_not change{ User.count }
     end
 
     it "connects to existing non-ldap user if the email matches" do
       existing_user = create(:user, email: 'john@example.com')
-      expect{ gl_auth.find_or_create(auth) }.to_not change{ User.count }
+      expect{ gl_user.find_or_create(auth) }.to_not change{ User.count }
 
       existing_user.reload
       expect(existing_user.extern_uid).to eql 'my-uid'
@@ -32,7 +32,7 @@ describe Gitlab::LDAP::User do
     end
 
     it "creates a new user if not found" do
-      expect{ gl_auth.find_or_create(auth) }.to change{ User.count }.by(1)
+      expect{ gl_user.find_or_create(auth) }.to change{ User.count }.by(1)
     end
   end
 end
-- 
GitLab