debian-mirror-gitlab/app/services/auth/container_registry_authentication_service.rb

90 lines
2.4 KiB
Ruby
Raw Normal View History

2016-06-02 11:05:42 +05:30
module Auth
class ContainerRegistryAuthenticationService < BaseService
include Gitlab::CurrentSettings
2016-06-02 11:05:42 +05:30
AUDIENCE = 'container_registry'
def execute
return error('not found', 404) unless registry.enabled
unless current_user || project
2016-06-02 11:05:42 +05:30
return error('forbidden', 403) unless scope
end
{ token: authorized_token(scope).encoded }
end
def self.full_access_token(*names)
registry = Gitlab.config.registry
token = JSONWebToken::RSAToken.new(registry.key)
token.issuer = registry.issuer
token.audience = AUDIENCE
token.expire_time = token_expire_at
2016-08-24 12:49:21 +05:30
2016-06-02 11:05:42 +05:30
token[:access] = names.map do |name|
{ type: 'repository', name: name, actions: %w(*) }
end
2016-09-13 17:45:13 +05:30
2016-06-02 11:05:42 +05:30
token.encoded
end
2016-09-13 17:45:13 +05:30
def self.token_expire_at
Time.now + current_application_settings.container_registry_token_expire_delay.minutes
end
2016-06-02 11:05:42 +05:30
private
def authorized_token(*accesses)
token = JSONWebToken::RSAToken.new(registry.key)
token.issuer = registry.issuer
token.audience = params[:service]
token.subject = current_user.try(:username)
2016-09-13 17:45:13 +05:30
token.expire_time = self.class.token_expire_at
2016-06-02 11:05:42 +05:30
token[:access] = accesses.compact
token
end
def scope
return unless params[:scope]
@scope ||= process_scope(params[:scope])
end
def process_scope(scope)
type, name, actions = scope.split(':', 3)
actions = actions.split(',')
return unless type == 'repository'
process_repository_access(type, name, actions)
end
def process_repository_access(type, name, actions)
requested_project = Project.find_with_namespace(name)
return unless requested_project
actions = actions.select do |action|
can_access?(requested_project, action)
end
{ type: type, name: name, actions: actions } if actions.present?
end
def can_access?(requested_project, requested_action)
return false unless requested_project.container_registry_enabled?
case requested_action
when 'pull'
requested_project == project || can?(current_user, :read_container_image, requested_project)
when 'push'
requested_project == project || can?(current_user, :create_container_image, requested_project)
else
false
end
end
def registry
Gitlab.config.registry
end
end
end