gitlab-org--gitlab-foss/lib/gitlab/auth/user_auth_finders.rb

94 lines
2.8 KiB
Ruby
Raw Normal View History

2017-11-07 09:52:05 +00:00
module Gitlab
module Auth
module UserAuthFinders
2017-11-08 18:41:07 +00:00
PRIVATE_TOKEN_HEADER = 'HTTP_PRIVATE_TOKEN'.freeze
PRIVATE_TOKEN_PARAM = :private_token
2017-11-07 09:52:05 +00:00
# Check the Rails session for valid authentication details
2017-11-07 18:17:41 +00:00
def find_user_from_warden
2017-11-08 18:41:07 +00:00
env['warden']&.authenticate if verified_request?
2017-11-07 09:52:05 +00:00
end
2017-11-08 18:41:07 +00:00
def find_user_from_rss_token
2017-11-07 18:17:41 +00:00
return unless request.format.atom?
2017-11-07 09:52:05 +00:00
2017-11-08 18:41:07 +00:00
token = params[:rss_token].presence
return unless token
2017-11-07 09:52:05 +00:00
2017-11-07 18:17:41 +00:00
handle_return_value!(User.find_by_rss_token(token))
2017-11-07 09:52:05 +00:00
end
2017-11-07 18:17:41 +00:00
def find_user_from_access_token
return unless access_token
2017-11-07 09:52:05 +00:00
2017-11-07 18:17:41 +00:00
validate_access_token!
2017-11-07 09:52:05 +00:00
2017-11-07 18:17:41 +00:00
handle_return_value!(access_token&.user)
end
2017-11-07 09:52:05 +00:00
2017-11-07 18:17:41 +00:00
def validate_access_token!(scopes: [])
2017-11-08 18:41:07 +00:00
return unless access_token
case AccessTokenValidationService.new(access_token, request: request).validate(scopes: scopes)
when AccessTokenValidationService::INSUFFICIENT_SCOPE
raise API::APIGuard::InsufficientScopeError.new(scopes)
when AccessTokenValidationService::EXPIRED
raise API::APIGuard::ExpiredError
when AccessTokenValidationService::REVOKED
raise API::APIGuard::RevokedError
end
2017-11-07 09:52:05 +00:00
end
2017-11-07 18:17:41 +00:00
private
2017-11-07 09:52:05 +00:00
2017-11-07 18:17:41 +00:00
def handle_return_value!(value, &block)
2017-11-08 18:41:07 +00:00
raise API::APIGuard::UnauthorizedError unless value
2017-11-07 09:52:05 +00:00
2017-11-07 18:17:41 +00:00
block_given? ? yield(value) : value
2017-11-07 09:52:05 +00:00
end
2017-11-07 18:17:41 +00:00
def access_token
return @access_token if defined?(@access_token)
@access_token = find_oauth_access_token || find_personal_access_token
end
def private_token
2017-11-08 18:41:07 +00:00
params[PRIVATE_TOKEN_PARAM].presence ||
env[PRIVATE_TOKEN_HEADER].presence
end
2017-11-07 18:17:41 +00:00
def find_personal_access_token
2017-11-08 18:41:07 +00:00
token = private_token
return unless token
2017-11-07 18:17:41 +00:00
# Expiration, revocation and scopes are verified in `validate_access_token!`
handle_return_value!(PersonalAccessToken.find_by(token: token))
end
2017-11-07 09:52:05 +00:00
def find_oauth_access_token
current_request = ensure_action_dispatch_request(request)
token = Doorkeeper::OAuth::Token.from_request(current_request, *Doorkeeper.configuration.access_token_methods)
2017-11-07 18:17:41 +00:00
return unless token
2017-11-07 09:52:05 +00:00
2017-11-07 18:17:41 +00:00
# Expiration, revocation and scopes are verified in `validate_access_token!`
handle_return_value!(OauthAccessToken.by_token(token)) do |oauth_token|
oauth_token.revoke_previous_refresh_token!
oauth_token
end
2017-11-07 09:52:05 +00:00
end
# Check if the request is GET/HEAD, or if CSRF token is valid.
def verified_request?
Gitlab::RequestForgeryProtection.verified?(request.env)
end
def ensure_action_dispatch_request(request)
return request if request.is_a?(ActionDispatch::Request)
ActionDispatch::Request.new(request.env)
end
end
end
end