BigW Consortium Gitlab
Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
G
gitlab-ce
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Commits
Issue Boards
Open sidebar
Forest Godfrey
gitlab-ce
Commits
63cdf1ae
Commit
63cdf1ae
authored
May 14, 2016
by
Kamil Trzcinski
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Use Auth::ContainerRegistryAuthenticationService
parent
774a5107
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
52 additions
and
54 deletions
+52
-54
jwt_controller.rb
app/controllers/jwt_controller.rb
+1
-1
container_registry_authentication_service.rb
...ervices/auth/container_registry_authentication_service.rb
+50
-52
container_registry_authentication_service_spec.rb
...ces/jwt/container_registry_authentication_service_spec.rb
+1
-1
No files found.
app/controllers/jwt_controller.rb
View file @
63cdf1ae
...
@@ -4,7 +4,7 @@ class JwtController < ApplicationController
...
@@ -4,7 +4,7 @@ class JwtController < ApplicationController
before_action
:authenticate_project_or_user
before_action
:authenticate_project_or_user
SERVICES
=
{
SERVICES
=
{
'container_registry'
=>
::
Gitlab
::
JWT
::
ContainerRegistryAuthenticationService
,
'container_registry'
=>
Auth
::
ContainerRegistryAuthenticationService
,
}
}
def
auth
def
auth
...
...
app/services/
jwt
/container_registry_authentication_service.rb
→
app/services/
auth
/container_registry_authentication_service.rb
View file @
63cdf1ae
module
Gitlab
module
Auth
module
JWT
class
ContainerRegistryAuthenticationService
<
BaseService
class
ContainerRegistryAuthenticationService
<
BaseService
def
execute
def
execute
if
params
[
:offline_token
]
if
params
[
:offline_token
]
return
error
(
'forbidden'
,
403
)
unless
current_user
return
error
(
'forbidden'
,
403
)
unless
current_user
end
end
return
error
(
'forbidden'
,
401
)
if
scopes
.
blank?
return
error
(
'forbidden'
,
401
)
if
scopes
.
blank?
{
token:
authorized_token
(
scopes
).
encoded
}
{
token:
authorized_token
(
scopes
).
encoded
}
end
end
private
private
def
authorized_token
(
access
)
def
authorized_token
(
access
)
token
=
::
JWT
::
RSAToken
.
new
(
registry
.
key
)
token
=
::
JWT
::
RSAToken
.
new
(
registry
.
key
)
token
.
issuer
=
registry
.
issuer
token
.
issuer
=
registry
.
issuer
token
.
audience
=
params
[
:service
]
token
.
audience
=
params
[
:service
]
token
.
subject
=
current_user
.
try
(
:username
)
token
.
subject
=
current_user
.
try
(
:username
)
token
[
:access
]
=
access
token
[
:access
]
=
access
token
token
end
end
def
scopes
def
scopes
return
unless
params
[
:scope
]
return
unless
params
[
:scope
]
@scopes
||=
begin
@scopes
||=
begin
scope
=
process_scope
(
params
[
:scope
])
scope
=
process_scope
(
params
[
:scope
])
[
scope
].
compact
[
scope
].
compact
end
end
end
end
def
process_scope
(
scope
)
def
process_scope
(
scope
)
type
,
name
,
actions
=
scope
.
split
(
':'
,
3
)
type
,
name
,
actions
=
scope
.
split
(
':'
,
3
)
actions
=
actions
.
split
(
','
)
actions
=
actions
.
split
(
','
)
case
type
case
type
when
'repository'
when
'repository'
process_repository_access
(
type
,
name
,
actions
)
process_repository_access
(
type
,
name
,
actions
)
end
end
end
end
def
process_repository_access
(
type
,
name
,
actions
)
def
process_repository_access
(
type
,
name
,
actions
)
requested_project
=
Project
.
find_with_namespace
(
name
)
requested_project
=
Project
.
find_with_namespace
(
name
)
return
unless
requested_project
return
unless
requested_project
actions
=
actions
.
select
do
|
action
|
can_access?
(
requested_project
,
action
)
end
{
type:
type
,
name:
name
,
actions:
actions
}
if
actions
.
present?
actions
=
actions
.
select
do
|
action
|
can_access?
(
requested_project
,
action
)
end
end
def
can_access?
(
requested_project
,
requested_action
)
{
type:
type
,
name:
name
,
actions:
actions
}
if
actions
.
present?
case
requested_action
end
when
'pull'
requested_project
.
public?
||
requested_project
==
project
||
can?
(
current_user
,
:read_container_registry
,
requested_project
)
when
'push'
requested_project
==
project
||
can?
(
current_user
,
:create_container_registry
,
requested_project
)
else
false
end
end
def
registry
def
can_access?
(
requested_project
,
requested_action
)
Gitlab
.
config
.
registry
case
requested_action
when
'pull'
requested_project
.
public?
||
requested_project
==
project
||
can?
(
current_user
,
:read_container_registry
,
requested_project
)
when
'push'
requested_project
==
project
||
can?
(
current_user
,
:create_container_registry
,
requested_project
)
else
false
end
end
end
end
def
registry
Gitlab
.
config
.
registry
end
end
end
end
end
spec/services/jwt/container_registry_authentication_service_spec.rb
View file @
63cdf1ae
require
'spec_helper'
require
'spec_helper'
describe
Gitlab
::
JWT
::
ContainerRegistryAuthenticationService
,
services:
true
do
describe
JWT
::
ContainerRegistryAuthenticationService
,
services:
true
do
let
(
:current_project
)
{
nil
}
let
(
:current_project
)
{
nil
}
let
(
:current_user
)
{
nil
}
let
(
:current_user
)
{
nil
}
let
(
:current_params
)
{
{}
}
let
(
:current_params
)
{
{}
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment