BigW Consortium Gitlab

Commit 63cdf1ae by Kamil Trzcinski

Use Auth::ContainerRegistryAuthenticationService

parent 774a5107
...@@ -4,7 +4,7 @@ class JwtController < ApplicationController ...@@ -4,7 +4,7 @@ class JwtController < ApplicationController
before_action :authenticate_project_or_user before_action :authenticate_project_or_user
SERVICES = { SERVICES = {
'container_registry' => ::Gitlab::JWT::ContainerRegistryAuthenticationService, 'container_registry' => Auth::ContainerRegistryAuthenticationService,
} }
def auth def auth
......
module Gitlab module Auth
module JWT class ContainerRegistryAuthenticationService < BaseService
class ContainerRegistryAuthenticationService < BaseService def execute
def execute if params[:offline_token]
if params[:offline_token] return error('forbidden', 403) unless current_user
return error('forbidden', 403) unless current_user end
end
return error('forbidden', 401) if scopes.blank? return error('forbidden', 401) if scopes.blank?
{ token: authorized_token(scopes).encoded } { token: authorized_token(scopes).encoded }
end end
private private
def authorized_token(access) def authorized_token(access)
token = ::JWT::RSAToken.new(registry.key) token = ::JWT::RSAToken.new(registry.key)
token.issuer = registry.issuer token.issuer = registry.issuer
token.audience = params[:service] token.audience = params[:service]
token.subject = current_user.try(:username) token.subject = current_user.try(:username)
token[:access] = access token[:access] = access
token token
end end
def scopes def scopes
return unless params[:scope] return unless params[:scope]
@scopes ||= begin @scopes ||= begin
scope = process_scope(params[:scope]) scope = process_scope(params[:scope])
[scope].compact [scope].compact
end
end end
end
def process_scope(scope) def process_scope(scope)
type, name, actions = scope.split(':', 3) type, name, actions = scope.split(':', 3)
actions = actions.split(',') actions = actions.split(',')
case type case type
when 'repository' when 'repository'
process_repository_access(type, name, actions) process_repository_access(type, name, actions)
end
end end
end
def process_repository_access(type, name, actions) def process_repository_access(type, name, actions)
requested_project = Project.find_with_namespace(name) requested_project = Project.find_with_namespace(name)
return unless requested_project return unless requested_project
actions = actions.select do |action|
can_access?(requested_project, action)
end
{ type: type, name: name, actions: actions } if actions.present? actions = actions.select do |action|
can_access?(requested_project, action)
end end
def can_access?(requested_project, requested_action) { type: type, name: name, actions: actions } if actions.present?
case requested_action end
when 'pull'
requested_project.public? || requested_project == project || can?(current_user, :read_container_registry, requested_project)
when 'push'
requested_project == project || can?(current_user, :create_container_registry, requested_project)
else
false
end
end
def registry def can_access?(requested_project, requested_action)
Gitlab.config.registry case requested_action
when 'pull'
requested_project.public? || requested_project == project || can?(current_user, :read_container_registry, requested_project)
when 'push'
requested_project == project || can?(current_user, :create_container_registry, requested_project)
else
false
end end
end end
def registry
Gitlab.config.registry
end
end end
end end
require 'spec_helper' require 'spec_helper'
describe Gitlab::JWT::ContainerRegistryAuthenticationService, services: true do describe JWT::ContainerRegistryAuthenticationService, services: true do
let(:current_project) { nil } let(:current_project) { nil }
let(:current_user) { nil } let(:current_user) { nil }
let(:current_params) { {} } let(:current_params) { {} }
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment