gitlab-org--gitlab-foss/app/controllers/projects/git_http_client_controller.rb

157 lines
4.3 KiB
Ruby
Raw Normal View History

2016-07-20 12:41:26 -04:00
# This file should be identical in GitLab Community Edition and Enterprise Edition
class Projects::GitHttpClientController < Projects::ApplicationController
include ActionController::HttpAuthentication::Basic
include KerberosSpnegoHelper
attr_reader :authentication_result
delegate :actor, :authentication_abilities, to: :authentication_result, allow_nil: true
alias_method :user, :actor
2016-07-20 12:41:26 -04:00
# Git clients will not know what authenticity token to send along
skip_before_action :verify_authenticity_token
skip_before_action :repository
before_action :authenticate_user
before_action :ensure_project_found!
private
def download_request?
raise NotImplementedError
end
def upload_request?
raise NotImplementedError
end
2016-07-20 12:41:26 -04:00
def authenticate_user
2016-09-16 10:07:21 -04:00
@authentication_result = Gitlab::Auth::Result.new
2016-07-20 12:41:26 -04:00
if allow_basic_auth? && basic_auth_provided?
login, password = user_name_and_password(request)
if handle_basic_authentication(login, password)
2016-07-20 12:41:26 -04:00
return # Allow access
end
elsif allow_kerberos_spnego_auth? && spnego_provided?
2016-09-20 09:41:41 -04:00
kerberos_user = find_kerberos_user
2016-09-20 09:41:41 -04:00
if kerberos_user
@authentication_result = Gitlab::Auth::Result.new(
2016-09-20 09:41:41 -04:00
kerberos_user, nil, :kerberos, Gitlab::Auth.full_authentication_abilities)
2016-07-20 12:41:26 -04:00
send_final_spnego_response
return # Allow access
end
elsif project && download_request? && Guest.can?(:download_code, project)
@authentication_result = Gitlab::Auth::Result.new(nil, project, :none, [:download_code])
return # Allow access
2016-07-20 12:41:26 -04:00
end
send_challenges
render plain: "HTTP Basic: Access denied\n", status: 401
rescue Gitlab::Auth::MissingPersonalTokenError
render_missing_personal_token
2016-07-20 12:41:26 -04:00
end
def basic_auth_provided?
has_basic_credentials?(request)
end
def send_challenges
challenges = []
challenges << 'Basic realm="GitLab"' if allow_basic_auth?
challenges << spnego_challenge if allow_kerberos_spnego_auth?
headers['Www-Authenticate'] = challenges.join("\n") if challenges.any?
end
def ensure_project_found!
render_not_found if project.blank?
end
def project
return @project if defined?(@project)
project_id, _ = project_id_with_suffix
if project_id.blank?
@project = nil
else
@project = Project.find_with_namespace("#{params[:namespace_id]}/#{project_id}")
end
end
# This method returns two values so that we can parse
# params[:project_id] (untrusted input!) in exactly one place.
def project_id_with_suffix
id = params[:project_id] || ''
%w[.wiki.git .git].each do |suffix|
if id.end_with?(suffix)
# Be careful to only remove the suffix from the end of 'id'.
# Accidentally removing it from the middle is how security
# vulnerabilities happen!
return [id.slice(0, id.length - suffix.length), suffix]
end
end
# Something is wrong with params[:project_id]; do not pass it on.
[nil, nil]
end
def render_missing_personal_token
render plain: "HTTP Basic: Access denied\n" \
"You have 2FA enabled, please use a personal access token for Git over HTTP.\n" \
"You can generate one at #{profile_personal_access_tokens_url}",
status: 401
end
2016-07-20 12:41:26 -04:00
def repository
_, suffix = project_id_with_suffix
if suffix == '.wiki.git'
project.wiki.repository
else
project.repository
end
end
def render_not_found
render plain: 'Not Found', status: :not_found
end
def handle_basic_authentication(login, password)
@authentication_result = Gitlab::Auth.find_for_git_client(
login, password, project: project, ip: request.ip)
return false unless @authentication_result.success?
if download_request?
authentication_has_download_access?
else
authentication_has_upload_access?
end
end
2016-09-16 10:07:21 -04:00
def ci?
authentication_result.ci?(project)
2016-09-16 10:07:21 -04:00
end
def authentication_has_download_access?
has_authentication_ability?(:download_code) || has_authentication_ability?(:build_download_code)
end
def authentication_has_upload_access?
has_authentication_ability?(:push_code)
end
2016-09-16 10:07:21 -04:00
def has_authentication_ability?(capability)
(authentication_abilities || []).include?(capability)
2016-07-20 12:41:26 -04:00
end
2016-09-16 10:07:21 -04:00
def authentication_project
authentication_result.project
end
2016-07-20 12:41:26 -04:00
end