/
omniauth.rb
70 lines (57 loc) · 2.39 KB
/
omniauth.rb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
Dir[ Rails.root.join('lib', 'omniauth', '*') ].each do |file|
if File.file?(file)
require file
end
end
Rails.application.config.middleware.use OmniAuth::Builder do
# twitter database connect
provider :twitter_database, 'not_change_will_be_set_by_database', 'not_change_will_be_set_by_database', {
client_options: {
authorize_path: '/oauth/authorize',
site: 'https://api.twitter.com',
}
}
# facebook database connect
provider :facebook_database, 'not_change_will_be_set_by_database', 'not_change_will_be_set_by_database'
# linkedin database connect
provider :linked_in_database, 'not_change_will_be_set_by_database', 'not_change_will_be_set_by_database'
# google database connect
provider :google_oauth2_database, 'not_change_will_be_set_by_database', 'not_change_will_be_set_by_database', {
authorize_options: {
access_type: 'online',
approval_prompt: '',
}
}
# github database connect
provider :github_database, 'not_change_will_be_set_by_database', 'not_change_will_be_set_by_database'
# gitlab database connect
provider :gitlab_database, 'not_change_will_be_set_by_database', 'not_change_will_be_set_by_database', {
client_options: {
site: 'https://not_change_will_be_set_by_database',
authorize_url: '/oauth/authorize',
token_url: '/oauth/token'
},
}
# microsoft_office365 database connect
provider :microsoft_office365_database, 'not_change_will_be_set_by_database', 'not_change_will_be_set_by_database'
# oauth2 database connect
provider :oauth2_database, 'not_change_will_be_set_by_database', 'not_change_will_be_set_by_database', {
client_options: {
site: 'https://not_change_will_be_set_by_database',
authorize_url: '/oauth/authorize',
token_url: '/oauth/token',
},
}
# weibo database connect
provider :weibo_database, 'not_change_will_be_set_by_database', 'not_change_will_be_set_by_database'
# SAML database connect
provider :saml_database
end
# This fixes issue #1642 and is required for setups in which Zammad is used
# with a reverse proxy (like e.g. NGINX) handling the HTTPS stuff.
# This leads to the generation of a wrong redirect_uri because Rack detects a
# HTTP request which breaks OAuth2.
OmniAuth.config.full_host = proc {
"#{Setting.get('http_type')}://#{Setting.get('fqdn')}"
}
OmniAuth.config.logger = Rails.logger