jwt_controller.rb 2.6 KB
Newer Older
K
Kamil Trzcinski 已提交
1 2 3 4
class JwtController < ApplicationController
  skip_before_action :authenticate_user!
  skip_before_action :verify_authenticity_token

5 6 7 8
  SERVICES = {
    'docker' => Jwt::DockerAuthenticationService,
  }

K
Kamil Trzcinski 已提交
9 10 11 12 13 14 15
  def auth
    @authenticated = authenticate_with_http_basic do |login, password|
      @ci_project = ci_project(login, password)
      @user = authenticate_user(login, password) unless @ci_project
    end

    unless @authenticated
16
      head :forbidden if ActionController::HttpAuthentication::Basic.has_basic_credentials?(request)
K
Kamil Trzcinski 已提交
17 18
    end

19 20
    service = SERVICES[params[:service]]
    head :not_found unless service
K
Kamil Trzcinski 已提交
21

22 23
    result = service.new(@ci_project, @user, auth_params).execute
    return head result[:http_status] if result[:http_status]
K
Kamil Trzcinski 已提交
24

25
    render json: result
K
Kamil Trzcinski 已提交
26 27
  end

28
  private
K
Kamil Trzcinski 已提交
29

30 31
  def auth_params
    params.permit(:service, :scope, :offline_token, :account, :client_id)
K
Kamil Trzcinski 已提交
32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85
  end

  def ci_project(login, password)
    matched_login = /(?<s>^[a-zA-Z]*-ci)-token$/.match(login)

    if matched_login.present?
      underscored_service = matched_login['s'].underscore

      if underscored_service == 'gitlab_ci'
        Project.find_by(builds_enabled: true, runners_token: password)
      end
    end
  end

  def authenticate_user(login, password)
    user = Gitlab::Auth.new.find(login, password)

    # If the user authenticated successfully, we reset the auth failure count
    # from Rack::Attack for that IP. A client may attempt to authenticate
    # with a username and blank password first, and only after it receives
    # a 401 error does it present a password. Resetting the count prevents
    # false positives from occurring.
    #
    # Otherwise, we let Rack::Attack know there was a failed authentication
    # attempt from this IP. This information is stored in the Rails cache
    # (Redis) and will be used by the Rack::Attack middleware to decide
    # whether to block requests from this IP.
    config = Gitlab.config.rack_attack.git_basic_auth

    if config.enabled
      if user
        # A successful login will reset the auth failure count from this IP
        Rack::Attack::Allow2Ban.reset(request.ip, config)
      else
        banned = Rack::Attack::Allow2Ban.filter(request.ip, config) do
          # Unless the IP is whitelisted, return true so that Allow2Ban
          # increments the counter (stored in Rails.cache) for the IP
          if config.ip_whitelist.include?(request.ip)
            false
          else
            true
          end
        end

        if banned
          Rails.logger.info "IP #{request.ip} failed to login " \
              "as #{login} but has been temporarily banned from Git auth"
        end
      end
    end

    user
  end
end