jwt_controller.rb 2.8 KB
Newer Older
K
Kamil Trzcinski 已提交
1 2 3 4
class JwtController < ApplicationController
  skip_before_action :authenticate_user!
  skip_before_action :verify_authenticity_token

5
  SERVICES = {
K
Kamil Trzcinski 已提交
6
    'container_registry' => ::Gitlab::JWT::ContainerRegistryAuthenticationService,
7 8
  }

K
Kamil Trzcinski 已提交
9 10
  def auth
    @authenticated = authenticate_with_http_basic do |login, password|
11 12 13
      # if it's possible we first try to authenticate project with login and password
      @project = authenticate_project(login, password)
      @user = authenticate_user(login, password) unless @project
K
Kamil Trzcinski 已提交
14 15 16
    end

    unless @authenticated
17
      head :forbidden if ActionController::HttpAuthentication::Basic.has_basic_credentials?(request)
K
Kamil Trzcinski 已提交
18 19
    end

20 21
    service = SERVICES[params[:service]]
    head :not_found unless service
K
Kamil Trzcinski 已提交
22

23
    result = service.new(@project, @user, auth_params).execute
24
    return head result[:http_status] if result[:http_status]
K
Kamil Trzcinski 已提交
25

26
    render json: result
K
Kamil Trzcinski 已提交
27 28
  end

29
  private
K
Kamil Trzcinski 已提交
30

31 32
  def auth_params
    params.permit(:service, :scope, :offline_token, :account, :client_id)
K
Kamil Trzcinski 已提交
33 34
  end

35
  def authenticate_project(login, password)
K
Kamil Trzcinski 已提交
36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86
    matched_login = /(?<s>^[a-zA-Z]*-ci)-token$/.match(login)

    if matched_login.present?
      underscored_service = matched_login['s'].underscore

      if underscored_service == 'gitlab_ci'
        Project.find_by(builds_enabled: true, runners_token: password)
      end
    end
  end

  def authenticate_user(login, password)
    user = Gitlab::Auth.new.find(login, password)

    # If the user authenticated successfully, we reset the auth failure count
    # from Rack::Attack for that IP. A client may attempt to authenticate
    # with a username and blank password first, and only after it receives
    # a 401 error does it present a password. Resetting the count prevents
    # false positives from occurring.
    #
    # Otherwise, we let Rack::Attack know there was a failed authentication
    # attempt from this IP. This information is stored in the Rails cache
    # (Redis) and will be used by the Rack::Attack middleware to decide
    # whether to block requests from this IP.
    config = Gitlab.config.rack_attack.git_basic_auth

    if config.enabled
      if user
        # A successful login will reset the auth failure count from this IP
        Rack::Attack::Allow2Ban.reset(request.ip, config)
      else
        banned = Rack::Attack::Allow2Ban.filter(request.ip, config) do
          # Unless the IP is whitelisted, return true so that Allow2Ban
          # increments the counter (stored in Rails.cache) for the IP
          if config.ip_whitelist.include?(request.ip)
            false
          else
            true
          end
        end

        if banned
          Rails.logger.info "IP #{request.ip} failed to login " \
              "as #{login} but has been temporarily banned from Git auth"
        end
      end
    end

    user
  end
end