debian-mirror-gitlab/config/initializers/warden.rb

69 lines
2.2 KiB
Ruby
Raw Normal View History

2021-03-11 19:13:27 +05:30
# frozen_string_literal: true
2017-08-17 22:00:37 +05:30
Rails.application.configure do |config|
2018-10-15 14:42:47 +05:30
Warden::Manager.after_set_user(scope: :user) do |user, auth, opts|
2017-08-17 22:00:37 +05:30
Gitlab::Auth::UniqueIpsLimiter.limit_user!(user)
2018-03-17 18:26:18 +05:30
2018-11-18 11:00:15 +05:30
activity = Gitlab::Auth::Activity.new(opts)
case opts[:event]
when :authentication
activity.user_authenticated!
when :set_user
activity.user_authenticated!
activity.user_session_override!
when :fetch # rubocop:disable Lint/EmptyWhen
# We ignore session fetch events
else
activity.user_session_override!
end
2018-03-17 18:26:18 +05:30
end
2018-10-15 14:42:47 +05:30
Warden::Manager.after_authentication(scope: :user) do |user, auth, opts|
ActiveSession.cleanup(user)
2023-06-20 00:43:36 +05:30
# sets marketing cookie for active user session
ActiveSession.set_active_user_cookie(auth) if ::Gitlab.com?
2020-11-24 15:15:51 +05:30
Gitlab::AnonymousSession.new(auth.request.remote_ip).cleanup_session_per_ip_count
2018-10-15 14:42:47 +05:30
end
Warden::Manager.after_set_user(scope: :user, only: :fetch) do |user, auth, opts|
ActiveSession.set(user, auth.request)
end
2018-11-18 11:00:15 +05:30
Warden::Manager.before_failure(scope: :user) do |env, opts|
Gitlab::Auth::Activity.new(opts).user_authentication_failed!
end
2018-10-15 14:42:47 +05:30
Warden::Manager.before_logout(scope: :user) do |user, auth, opts|
2018-11-18 11:00:15 +05:30
user ||= auth.user
2023-06-20 00:43:36 +05:30
# deletes marketing cookie when user session ends
ActiveSession.unset_active_user_cookie(auth) if ::Gitlab.com?
2018-12-05 23:21:45 +05:30
# Rails CSRF protection may attempt to log out a user before that
# user even logs in
next unless user
2018-11-18 11:00:15 +05:30
activity = Gitlab::Auth::Activity.new(opts)
tracker = Gitlab::Auth::BlockedUserTracker.new(user, auth)
2021-03-05 16:19:46 +05:30
ActiveSession.destroy_session(user, auth.request.session.id.private_id) if auth.request.session.id
2018-11-18 11:00:15 +05:30
activity.user_session_destroyed!
##
# It is possible that `before_logout` event is going to be triggered
# multiple times during the request lifecycle. We want to increment
# metrics and write logs only once in that case.
#
# 'warden.auth.*' is our custom hash key that follows usual convention
# of naming keys in the Rack env hash.
#
next if auth.env['warden.auth.user.blocked']
if user.blocked?
activity.user_blocked!
tracker.log_activity!
end
auth.env['warden.auth.user.blocked'] = true
2018-10-15 14:42:47 +05:30
end
2017-08-17 22:00:37 +05:30
end