• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

sleede / fab-manager / #93

pending completion
#93

push

coveralls-ruby

sylvainbx
Merge branch 'dev' for release 5.6.6

20 of 20 new or added lines in 7 files covered. (100.0%)

6813 of 11475 relevant lines covered (59.37%)

13.82 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

77.36
/app/controllers/api/auth_providers_controller.rb
1
# frozen_string_literal: true
2

3
# API Controller for resources of type AuthProvider
4
# AuthProvider are used to connect users through single-sign on systems
5
class API::AuthProvidersController < API::ApiController
1✔
6
  before_action :set_provider, only: %i[show update destroy]
1✔
7
  def index
1✔
8
    @providers = policy_scope(AuthProvider)
×
9
  end
10

11
  def create
1✔
12
    authorize AuthProvider
1✔
13
    @provider = AuthProvider.new(provider_params)
1✔
14
    AuthProviderService.auto_configure(@provider)
1✔
15
    if @provider.save
1✔
16
      render :show, status: :created, location: @provider
1✔
17
    else
18
      render json: @provider.errors, status: :unprocessable_entity
×
19
    end
20
  end
21

22
  def update
1✔
23
    authorize AuthProvider
1✔
24
    if @provider.update(provider_params)
1✔
25
      render :show, status: :ok, location: @provider
1✔
26
    else
27
      render json: @provider.errors, status: :unprocessable_entity
×
28
    end
29
  end
30

31
  def strategy_name
1✔
32
    authorize AuthProvider
2✔
33
    @provider = AuthProvider.new(providable_type: params[:providable_type], name: params[:name])
2✔
34
    render json: @provider.strategy_name
2✔
35
  end
36

37
  def show
1✔
38
    authorize AuthProvider
1✔
39
  end
40

41
  def destroy
1✔
42
    authorize AuthProvider
×
43
    if @provider.safe_destroy
×
44
      head :no_content
×
45
    else
46
      render json: @provider.errors, status: :unprocessable_entity
×
47
    end
48
  end
49

50
  def mapping_fields
1✔
51
    authorize AuthProvider
1✔
52
    render :mapping_fields, status: :ok
1✔
53
  end
54

55
  def active
1✔
56
    authorize AuthProvider
1✔
57
    @provider = AuthProvider.active
1✔
58
    @previous = AuthProvider.previous
1✔
59
  end
60

61
  def send_code
1✔
62
    authorize AuthProvider
1✔
63
    user = User.find_by('lower(email) = ?', params[:email]&.downcase)
1✔
64

65
    if user&.auth_token
1✔
66
      if AuthProvider.active.providable_type == DatabaseProvider.name
1✔
67
        render json: { status: 'error', error: I18n.t('members.current_authentication_method_no_code') }, status: :bad_request
×
68
      else
69
        NotificationCenter.call type: 'notify_user_auth_migration',
1✔
70
                                receiver: user,
71
                                attached_object: user
72
        render json: { status: 'processing' }, status: :ok
1✔
73
      end
74
    else
75
      render json: { status: 'error', error: I18n.t('members.requested_account_does_not_exists') }, status: :bad_request
×
76
    end
77
  end
78

79
  private
1✔
80

81
  def set_provider
1✔
82
    @provider = AuthProvider.find(params[:id])
2✔
83
  end
84

85
  def provider_params
1✔
86
    if params['auth_provider']['providable_type'] == DatabaseProvider.name
2✔
87
      params.require(:auth_provider).permit(:id, :name, :providable_type, providable_attributes: [:id])
×
88
    elsif params['auth_provider']['providable_type'] == OAuth2Provider.name
2✔
89
      params.require(:auth_provider)
2✔
90
            .permit(:id, :name, :providable_type,
91
                    providable_attributes: %i[id base_url token_endpoint authorization_endpoint
92
                                              profile_url client_id client_secret scopes],
93
                    auth_provider_mappings_attributes: [:id, :local_model, :local_field, :api_field, :api_endpoint, :api_data_type,
94
                                                        :_destroy, { transformation: [:type, :format, :true_value, :false_value,
95
                                                                                      { mapping: %i[from to] }] }])
96
    elsif params['auth_provider']['providable_type'] == OpenIdConnectProvider.name
×
97
      params.require(:auth_provider)
×
98
            .permit(:id, :name, :providable_type,
99
                    providable_attributes: [:id, :issuer, :discovery, :client_auth_method, :prompt, :send_scope_to_token_endpoint,
100
                                            :client__identifier, :client__secret, :client__authorization_endpoint, :client__token_endpoint,
101
                                            :client__userinfo_endpoint, :client__jwks_uri, :client__end_session_endpoint, :profile_url,
102
                                            { scope: [] }],
103
                    auth_provider_mappings_attributes: [:id, :local_model, :local_field, :api_field, :api_endpoint, :api_data_type,
104
                                                        :_destroy, { transformation: [:type, :format, :true_value, :false_value,
105
                                                                                      { mapping: %i[from to] }] }])
106
    end
107
  end
108
end
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc