BigW Consortium Gitlab
Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
G
gitlab-ce
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Commits
Issue Boards
Open sidebar
Forest Godfrey
gitlab-ce
Commits
aecc3eb0
Commit
aecc3eb0
authored
Nov 08, 2017
by
Francisco Lopez
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Applied some code review comments
parent
374179a9
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
29 additions
and
32 deletions
+29
-32
application_controller.rb
app/controllers/application_controller.rb
+1
-2
api_guard.rb
lib/api/api_guard.rb
+0
-5
request_authenticator.rb
lib/gitlab/auth/request_authenticator.rb
+6
-2
user_auth_finders.rb
lib/gitlab/auth/user_auth_finders.rb
+22
-23
No files found.
app/controllers/application_controller.rb
View file @
aecc3eb0
...
...
@@ -99,8 +99,7 @@ class ApplicationController < ActionController::Base
return
try
(
:authenticated_user
)
end
# This filter handles private tokens, personal access tokens, and atom
# requests with rss tokens
# This filter handles personal access tokens, and atom requests with rss tokens
def
authenticate_sessionless_user!
user
=
Gitlab
::
Auth
::
RequestAuthenticator
.
new
(
request
).
find_sessionless_user
...
...
lib/api/api_guard.rb
View file @
aecc3eb0
...
...
@@ -45,7 +45,6 @@ module API
include
Gitlab
::
Utils
::
StrongMemoize
def
find_current_user!
set_raise_unauthorized_error
user
=
find_user_from_access_token
||
find_user_from_warden
return
unless
user
...
...
@@ -75,10 +74,6 @@ module API
private
def
private_token
params
[
PRIVATE_TOKEN_PARAM
].
presence
||
env
[
PRIVATE_TOKEN_HEADER
].
presence
end
# An array of scopes that were registered (using `allow_access_with_scope`)
# for the current endpoint class. It also returns scopes registered on
# `API::API`, since these are meant to apply to all API routes.
...
...
lib/gitlab/auth/request_authenticator.rb
View file @
aecc3eb0
...
...
@@ -7,8 +7,10 @@ module Gitlab
attr_reader
:request
delegate
:params
,
:env
,
to: :request
def
initialize
(
request
)
@request
=
ensure_action_dispatch_request
(
request
)
@request
=
request
end
def
user
...
...
@@ -16,7 +18,9 @@ module Gitlab
end
def
find_sessionless_user
find_user_from_access_token
||
find_user_by_rss_token
find_user_from_access_token
||
find_user_from_rss_token
rescue
StandardError
nil
end
end
end
...
...
lib/gitlab/auth/user_auth_finders.rb
View file @
aecc3eb0
module
Gitlab
module
Auth
module
UserAuthFinders
PRIVATE_TOKEN_HEADER
=
'HTTP_PRIVATE_TOKEN'
.
freeze
PRIVATE_TOKEN_PARAM
=
:private_token
# Check the Rails session for valid authentication details
def
find_user_from_warden
request
.
env
[
'warden'
]
&
.
authenticate
if
verified_request?
env
[
'warden'
]
&
.
authenticate
if
verified_request?
end
def
find_user_
by
_rss_token
def
find_user_
from
_rss_token
return
unless
request
.
format
.
atom?
token
=
request
.
params
[
:rss_token
].
presence
return
unless
token
.
present?
token
=
params
[
:rss_token
].
presence
return
unless
token
handle_return_value!
(
User
.
find_by_rss_token
(
token
))
end
...
...
@@ -24,14 +27,22 @@ module Gitlab
end
def
validate_access_token!
(
scopes:
[])
return
unless
access_token
case
AccessTokenValidationService
.
new
(
access_token
,
request:
request
).
validate
(
scopes:
scopes
)
when
AccessTokenValidationService
::
INSUFFICIENT_SCOPE
raise
API
::
APIGuard
::
InsufficientScopeError
.
new
(
scopes
)
when
AccessTokenValidationService
::
EXPIRED
raise
API
::
APIGuard
::
ExpiredError
when
AccessTokenValidationService
::
REVOKED
raise
API
::
APIGuard
::
RevokedError
end
end
private
def
handle_return_value!
(
value
,
&
block
)
unless
value
raise_unauthorized_error?
?
raise_unauthorized_error!
:
return
end
raise
API
::
APIGuard
::
UnauthorizedError
unless
value
block_given?
?
yield
(
value
)
:
value
end
...
...
@@ -43,13 +54,13 @@ module Gitlab
end
def
private_token
request
.
params
[
:private_token
].
presence
||
request
.
headers
[
'PRIVATE-TOKEN'
].
presence
params
[
PRIVATE_TOKEN_PARAM
].
presence
||
env
[
PRIVATE_TOKEN_HEADER
].
presence
end
def
find_personal_access_token
token
=
private_token
.
to_s
return
unless
token
.
present?
token
=
private_token
return
unless
token
# Expiration, revocation and scopes are verified in `validate_access_token!`
handle_return_value!
(
PersonalAccessToken
.
find_by
(
token:
token
))
...
...
@@ -77,18 +88,6 @@ module Gitlab
ActionDispatch
::
Request
.
new
(
request
.
env
)
end
def
raise_unauthorized_error?
defined?
(
@raise_unauthorized_error
)
?
@raise_unauthorized_error
:
false
end
def
set_raise_unauthorized_error
@raise_unauthorized_error
=
true
end
def
raise_unauthorized_error!
raise
API
::
APIGuard
::
UnauthorizedError
end
end
end
end
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment