34b71e734b
- To prevent an attacker from enumerating the `/users` API to get a list of all the admins. - Display the `is_admin?` flag wherever we display the `private_token` - at the moment, there are two instances: - When an admin uses `sudo` to view the `/user` endpoint - When logging in using the `/session` endpoint
20 lines
788 B
Ruby
20 lines
788 B
Ruby
module API
|
|
class Session < Grape::API
|
|
desc 'Login to get token' do
|
|
success Entities::UserWithPrivateDetails
|
|
end
|
|
params do
|
|
optional :login, type: String, desc: 'The username'
|
|
optional :email, type: String, desc: 'The email of the user'
|
|
requires :password, type: String, desc: 'The password of the user'
|
|
at_least_one_of :login, :email
|
|
end
|
|
post "/session" do
|
|
user = Gitlab::Auth.find_with_user_password(params[:email] || params[:login], params[:password])
|
|
|
|
return unauthorized! unless user
|
|
return render_api_error!('401 Unauthorized. You have 2FA enabled. Please use a personal access token to access the API', 401) if user.two_factor_enabled?
|
|
present user, with: Entities::UserWithPrivateDetails
|
|
end
|
|
end
|
|
end
|