debian-mirror-gitlab/app/controllers/concerns/sessionless_authentication.rb

38 lines
1.2 KiB
Ruby
Raw Normal View History

2018-11-29 20:51:05 +05:30
# frozen_string_literal: true
# == SessionlessAuthentication
#
2019-12-04 20:38:33 +05:30
# Controller concern to handle PAT, RSS, and static objects token authentication methods
2018-11-29 20:51:05 +05:30
#
module SessionlessAuthentication
2019-12-04 20:38:33 +05:30
# This filter handles personal access tokens, atom requests with rss tokens, and static object tokens
2018-11-29 20:51:05 +05:30
def authenticate_sessionless_user!(request_format)
2021-04-28 17:22:55 +05:30
user = request_authenticator.find_sessionless_user(request_format)
2018-11-29 20:51:05 +05:30
sessionless_sign_in(user) if user
end
2021-04-28 17:22:55 +05:30
def request_authenticator
@request_authenticator ||= Gitlab::Auth::RequestAuthenticator.new(request)
end
2018-11-29 20:51:05 +05:30
def sessionless_user?
2019-10-12 21:52:04 +05:30
current_user && !session.key?('warden.user.user.key')
2018-11-29 20:51:05 +05:30
end
def sessionless_sign_in(user)
2022-03-02 08:16:31 +05:30
if user.can_log_in_with_non_expired_password?
2018-11-29 20:51:05 +05:30
# Notice we are passing store false, so the user is not
# actually stored in the session and a token is needed
# for every request. If you want the token to work as a
# sign in token, you can simply remove store: false.
sign_in(user, store: false, message: :sessionless_sign_in)
end
end
2019-12-21 20:55:43 +05:30
2020-04-08 14:13:33 +05:30
def sessionless_bypass_admin_mode!(&block)
2021-04-29 21:17:54 +05:30
return yield unless Gitlab::CurrentSettings.admin_mode
2020-01-01 13:55:28 +05:30
2020-04-08 14:13:33 +05:30
Gitlab::Auth::CurrentUserMode.bypass_session!(current_user.id, &block)
2019-12-21 20:55:43 +05:30
end
2018-11-29 20:51:05 +05:30
end