2020-09-01 08:11:01 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
class JiraConnect::ApplicationController < ApplicationController
|
|
|
|
include Gitlab::Utils::StrongMemoize
|
|
|
|
|
|
|
|
skip_before_action :authenticate_user!
|
|
|
|
skip_before_action :verify_authenticity_token
|
|
|
|
before_action :verify_atlassian_jwt!
|
|
|
|
|
2020-10-05 08:08:47 -04:00
|
|
|
feature_category :integrations
|
|
|
|
|
2020-09-01 08:11:01 -04:00
|
|
|
attr_reader :current_jira_installation
|
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
def verify_atlassian_jwt!
|
|
|
|
return render_403 unless atlassian_jwt_valid?
|
|
|
|
|
|
|
|
@current_jira_installation = installation_from_jwt
|
|
|
|
end
|
|
|
|
|
|
|
|
def verify_qsh_claim!
|
|
|
|
payload, _ = decode_auth_token!
|
|
|
|
|
2022-04-12 02:08:28 -04:00
|
|
|
return if request.format.json? && payload['qsh'] == 'context-qsh'
|
|
|
|
|
2020-09-01 08:11:01 -04:00
|
|
|
# Make sure `qsh` claim matches the current request
|
|
|
|
render_403 unless payload['qsh'] == Atlassian::Jwt.create_query_string_hash(request.url, request.method, jira_connect_base_url)
|
2021-04-26 08:09:44 -04:00
|
|
|
rescue StandardError
|
2020-09-01 08:11:01 -04:00
|
|
|
render_403
|
|
|
|
end
|
|
|
|
|
|
|
|
def atlassian_jwt_valid?
|
|
|
|
return false unless installation_from_jwt
|
|
|
|
|
|
|
|
# Verify JWT signature with our stored `shared_secret`
|
|
|
|
decode_auth_token!
|
|
|
|
rescue JWT::DecodeError
|
|
|
|
false
|
|
|
|
end
|
|
|
|
|
|
|
|
def installation_from_jwt
|
|
|
|
strong_memoize(:installation_from_jwt) do
|
2021-08-31 17:10:43 -04:00
|
|
|
next unless claims['iss']
|
|
|
|
|
|
|
|
JiraConnectInstallation.find_by_client_key(claims['iss'])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def claims
|
|
|
|
strong_memoize(:claims) do
|
|
|
|
next {} unless auth_token
|
|
|
|
|
2020-09-01 08:11:01 -04:00
|
|
|
# Decode without verification to get `client_key` in `iss`
|
|
|
|
payload, _ = Atlassian::Jwt.decode(auth_token, nil, false)
|
2021-08-31 17:10:43 -04:00
|
|
|
payload
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def jira_user
|
|
|
|
strong_memoize(:jira_user) do
|
|
|
|
next unless installation_from_jwt
|
|
|
|
next unless claims['sub']
|
|
|
|
|
|
|
|
# This only works for Jira Cloud installations.
|
|
|
|
installation_from_jwt.client.user_info(claims['sub'])
|
2020-09-01 08:11:01 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def decode_auth_token!
|
|
|
|
Atlassian::Jwt.decode(auth_token, installation_from_jwt.shared_secret)
|
|
|
|
end
|
|
|
|
|
|
|
|
def auth_token
|
|
|
|
strong_memoize(:auth_token) do
|
|
|
|
params[:jwt] || request.headers['Authorization']&.split(' ', 2)&.last
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|