gitlab-org--gitlab-foss/lib/gitlab/backend/grack_auth.rb

144 lines
3.8 KiB
Ruby
Raw Normal View History

2013-02-14 13:25:55 +00:00
require_relative 'shell_env'
require 'omniauth-ldap'
2013-02-14 13:25:55 +00:00
module Grack
class Auth < Rack::Auth::Basic
attr_accessor :user, :project
def call(env)
@env = env
@request = Rack::Request.new(env)
@auth = Request.new(env)
2013-01-10 18:17:57 +00:00
# Need this patch due to the rails mount
@env['PATH_INFO'] = @request.path
@env['SCRIPT_NAME'] = ""
return render_not_found unless project
return unauthorized unless project.public || @auth.provided?
return bad_request if @auth.provided? && !@auth.basic?
if valid?
if @auth.provided?
@env['REMOTE_USER'] = @auth.username
end
return @app.call(env)
else
unauthorized
end
end
def valid?
if @auth.provided?
# Authentication with username and password
login, password = @auth.credentials
self.user = User.find_by_email(login) || User.find_by_username(login)
# If the provided login was not a known email or username
# then user is nil
if user.nil?
# Second chance - try LDAP authentication
return false unless Gitlab.config.ldap.enabled
ldap_auth(login,password)
return false unless !user.nil?
else
return false unless user.valid_password?(password)
end
2013-02-14 13:17:43 +00:00
Gitlab::ShellEnv.set_env(user)
end
2012-06-29 07:43:15 +00:00
# Git upload and receive
if @request.get?
validate_get_request
elsif @request.post?
validate_post_request
else
false
2012-06-29 07:43:15 +00:00
end
end
def ldap_auth(login, password)
# Check user against LDAP backend if user is not authenticated
# Only check with valid login and password to prevent anonymous bind results
gl = Gitlab.config
if gl.ldap.enabled && !login.blank? && !password.blank?
ldap = OmniAuth::LDAP::Adaptor.new(gl.ldap)
ldap_user = ldap.bind_as(
filter: Net::LDAP::Filter.eq(ldap.uid, login),
size: 1,
password: password
)
if ldap_user
self.user = User.find_by_extern_uid_and_provider(ldap_user.dn, 'ldap')
end
end
end
def validate_get_request
2013-04-19 08:43:54 +00:00
validate_request(@request.params['service'])
end
def validate_post_request
2013-04-19 08:43:54 +00:00
validate_request(File.basename(@request.path))
end
def validate_request(service)
if service == 'git-upload-pack'
project.public || can?(user, :download_code, project)
2013-04-19 08:43:54 +00:00
elsif service == 'git-receive-pack'
action = if project.protected_branch?(current_ref)
:push_code_to_protected_branches
else
:push_code
end
can?(user, action, project)
else
false
end
end
2012-10-22 15:45:42 +00:00
def can?(object, action, subject)
abilities.allowed?(object, action, subject)
end
def current_ref
if @env["HTTP_CONTENT_ENCODING"] =~ /gzip/
input = Zlib::GzipReader.new(@request.body).read
else
input = @request.body.read
end
# Need to reset seek point
@request.body.rewind
2013-05-03 03:31:23 +00:00
/refs\/heads\/([\w\.-]+)/n.match(input.force_encoding('ascii-8bit')).to_a.last
end
2012-10-22 15:45:42 +00:00
def project
unless instance_variable_defined? :@project
# Find project by PATH_INFO from env
if m = /^\/([\w\.\/-]+)\.git/.match(@request.path_info).to_a
@project = Project.find_with_namespace(m.last)
end
end
return @project
end
PLAIN_TYPE = {"Content-Type" => "text/plain"}
def render_not_found
[404, PLAIN_TYPE, ["Not Found"]]
end
2012-10-22 15:45:42 +00:00
protected
def abilities
@abilities ||= begin
abilities = Six.new
abilities << Ability
abilities
end
end
2012-06-29 07:43:15 +00:00
end# Auth
end# Grack