gitlab-org--gitlab-foss/lib/gitlab/auth/request_authenticator.rb

67 lines
1.5 KiB
Ruby
Raw Normal View History

# frozen_string_literal: true
2017-10-13 20:05:18 -04:00
# Use for authentication only, in particular for Rack::Attack.
# Does not perform authorization of scopes, etc.
module Gitlab
module Auth
class RequestAuthenticator
include AuthFinders
2017-11-07 04:52:05 -05:00
attr_reader :request
2017-10-13 20:05:18 -04:00
def initialize(request)
2017-11-08 13:41:07 -05:00
@request = request
2017-10-13 20:05:18 -04:00
end
def user(request_formats)
request_formats.each do |format|
user = find_sessionless_user(format)
return user if user
end
find_user_from_warden
2017-10-13 20:05:18 -04:00
end
def runner
find_runner_from_token
rescue Gitlab::Auth::AuthenticationError
nil
end
def find_sessionless_user(request_format)
find_user_from_web_access_token(request_format) ||
find_user_from_feed_token(request_format) ||
find_user_from_static_object_token(request_format) ||
find_user_from_basic_auth_job ||
find_user_from_job_token
rescue Gitlab::Auth::AuthenticationError
2017-11-08 13:41:07 -05:00
nil
2017-10-13 20:05:18 -04:00
end
def valid_access_token?(scopes: [])
validate_access_token!(scopes: scopes)
true
rescue Gitlab::Auth::AuthenticationError
false
end
private
def access_token
strong_memoize(:access_token) do
super || find_personal_access_token_from_http_basic_auth
end
end
def route_authentication_setting
@route_authentication_setting ||= {
job_token_allowed: api_request?,
basic_auth_personal_access_token: api_request?
}
end
2017-10-13 20:05:18 -04:00
end
end
end