debian-mirror-gitlab/app/controllers/concerns/impersonation.rb

61 lines
1.4 KiB
Ruby
Raw Normal View History

2020-05-24 23:13:21 +05:30
# frozen_string_literal: true
module Impersonation
include Gitlab::Utils::StrongMemoize
2023-03-04 22:38:38 +05:30
SESSION_KEYS_TO_DELETE = %w[
2021-09-30 23:02:18 +05:30
github_access_token gitea_access_token gitlab_access_token
bitbucket_token bitbucket_refresh_token bitbucket_server_personal_access_token
bulk_import_gitlab_access_token fogbugz_token
2023-03-04 22:38:38 +05:30
].freeze
2021-09-30 23:02:18 +05:30
2020-05-24 23:13:21 +05:30
def current_user
user = super
user.impersonator = impersonator if impersonator
user
end
protected
def check_impersonation_availability
2021-09-30 23:02:18 +05:30
return unless impersonation_in_progress?
2020-05-24 23:13:21 +05:30
unless Gitlab.config.gitlab.impersonation_enabled
stop_impersonation
access_denied! _('Impersonation has been disabled')
end
end
def stop_impersonation
log_impersonation_event
warden.set_user(impersonator, scope: :user)
session[:impersonator_id] = nil
2021-09-30 23:02:18 +05:30
clear_access_token_session_keys!
2020-05-24 23:13:21 +05:30
current_user
end
2021-09-30 23:02:18 +05:30
def impersonation_in_progress?
session[:impersonator_id].present?
end
2020-05-24 23:13:21 +05:30
def log_impersonation_event
Gitlab::AppLogger.info("User #{impersonator.username} has stopped impersonating #{current_user.username}")
end
2021-09-30 23:02:18 +05:30
def clear_access_token_session_keys!
access_tokens_keys = session.keys & SESSION_KEYS_TO_DELETE
access_tokens_keys.each { |key| session.delete(key) }
end
2020-05-24 23:13:21 +05:30
def impersonator
strong_memoize(:impersonator) do
User.find(session[:impersonator_id]) if session[:impersonator_id]
end
end
end