2018-12-13 13:39:08 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
module Gitlab
|
|
|
|
module Auth
|
|
|
|
AuthenticationError = Class.new(StandardError)
|
|
|
|
MissingTokenError = Class.new(AuthenticationError)
|
|
|
|
TokenNotFoundError = Class.new(AuthenticationError)
|
|
|
|
ExpiredError = Class.new(AuthenticationError)
|
|
|
|
RevokedError = Class.new(AuthenticationError)
|
2019-02-15 15:39:39 +05:30
|
|
|
ImpersonationDisabled = Class.new(AuthenticationError)
|
2018-03-17 18:26:18 +05:30
|
|
|
UnauthorizedError = Class.new(AuthenticationError)
|
|
|
|
|
|
|
|
class InsufficientScopeError < AuthenticationError
|
|
|
|
attr_reader :scopes
|
|
|
|
def initialize(scopes)
|
|
|
|
@scopes = scopes.map { |s| s.try(:name) || s }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
module AuthFinders
|
|
|
|
prepend_if_ee('::EE::Gitlab::Auth::AuthFinders') # rubocop: disable Cop/InjectEnterpriseEditionModule
|
2019-12-04 20:38:33 +05:30
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
include Gitlab::Utils::StrongMemoize
|
2020-01-01 13:55:28 +05:30
|
|
|
include ActionController::HttpAuthentication::Basic
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2019-12-04 20:38:33 +05:30
|
|
|
PRIVATE_TOKEN_HEADER = 'HTTP_PRIVATE_TOKEN'
|
2018-03-17 18:26:18 +05:30
|
|
|
PRIVATE_TOKEN_PARAM = :private_token
|
2020-03-13 15:44:24 +05:30
|
|
|
JOB_TOKEN_HEADER = 'HTTP_JOB_TOKEN'.freeze
|
2020-01-01 13:55:28 +05:30
|
|
|
JOB_TOKEN_PARAM = :job_token
|
|
|
|
RUNNER_TOKEN_PARAM = :token
|
2020-03-13 15:44:24 +05:30
|
|
|
RUNNER_JOB_TOKEN_PARAM = :token
|
2018-03-17 18:26:18 +05:30
|
|
|
|
|
|
|
# Check the Rails session for valid authentication details
|
|
|
|
def find_user_from_warden
|
|
|
|
current_request.env['warden']&.authenticate if verified_request?
|
|
|
|
end
|
|
|
|
|
2019-12-04 20:38:33 +05:30
|
|
|
def find_user_from_static_object_token(request_format)
|
|
|
|
return unless valid_static_objects_format?(request_format)
|
|
|
|
|
|
|
|
token = current_request.params[:token].presence || current_request.headers['X-Gitlab-Static-Object-Token'].presence
|
|
|
|
return unless token
|
|
|
|
|
|
|
|
User.find_by_static_object_token(token) || raise(UnauthorizedError)
|
|
|
|
end
|
|
|
|
|
2018-11-29 20:51:05 +05:30
|
|
|
def find_user_from_feed_token(request_format)
|
|
|
|
return unless valid_rss_format?(request_format)
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2018-11-08 19:23:39 +05:30
|
|
|
# NOTE: feed_token was renamed from rss_token but both needs to be supported because
|
|
|
|
# users might have already added the feed to their RSS reader before the rename
|
|
|
|
token = current_request.params[:feed_token].presence || current_request.params[:rss_token].presence
|
2018-03-17 18:26:18 +05:30
|
|
|
return unless token
|
|
|
|
|
2018-11-08 19:23:39 +05:30
|
|
|
User.find_by_feed_token(token) || raise(UnauthorizedError)
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
def find_user_from_job_token
|
|
|
|
return unless route_authentication_setting[:job_token_allowed]
|
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
token = current_request.params[JOB_TOKEN_PARAM].presence ||
|
|
|
|
current_request.params[RUNNER_JOB_TOKEN_PARAM].presence ||
|
|
|
|
current_request.env[JOB_TOKEN_HEADER].presence
|
|
|
|
return unless token
|
2020-01-01 13:55:28 +05:30
|
|
|
|
|
|
|
job = ::Ci::Build.find_by_token(token)
|
2020-03-13 15:44:24 +05:30
|
|
|
raise UnauthorizedError unless job
|
2020-01-01 13:55:28 +05:30
|
|
|
|
|
|
|
@current_authenticated_job = job # rubocop:disable Gitlab/ModuleWithInstanceVariables
|
|
|
|
|
|
|
|
job.user
|
|
|
|
end
|
|
|
|
|
|
|
|
def find_user_from_basic_auth_job
|
|
|
|
return unless has_basic_credentials?(current_request)
|
|
|
|
|
|
|
|
login, password = user_name_and_password(current_request)
|
|
|
|
return unless login.present? && password.present?
|
|
|
|
return unless ::Ci::Build::CI_REGISTRY_USER == login
|
|
|
|
|
|
|
|
job = ::Ci::Build.find_by_token(password)
|
|
|
|
raise UnauthorizedError unless job
|
|
|
|
|
|
|
|
job.user
|
|
|
|
end
|
|
|
|
|
2018-11-29 20:51:05 +05:30
|
|
|
# We only allow Private Access Tokens with `api` scope to be used by web
|
|
|
|
# requests on RSS feeds or ICS files for backwards compatibility.
|
|
|
|
# It is also used by GraphQL/API requests.
|
|
|
|
def find_user_from_web_access_token(request_format)
|
|
|
|
return unless access_token && valid_web_access_format?(request_format)
|
|
|
|
|
|
|
|
validate_access_token!(scopes: [:api])
|
|
|
|
|
|
|
|
access_token.user || raise(UnauthorizedError)
|
|
|
|
end
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
def find_user_from_access_token
|
|
|
|
return unless access_token
|
|
|
|
|
|
|
|
validate_access_token!
|
|
|
|
|
|
|
|
access_token.user || raise(UnauthorizedError)
|
|
|
|
end
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
def find_runner_from_token
|
|
|
|
return unless api_request?
|
|
|
|
|
|
|
|
token = current_request.params[RUNNER_TOKEN_PARAM].presence
|
|
|
|
return unless token
|
|
|
|
|
|
|
|
::Ci::Runner.find_by_token(token) || raise(UnauthorizedError)
|
|
|
|
end
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
def validate_access_token!(scopes: [])
|
|
|
|
return unless access_token
|
|
|
|
|
|
|
|
case AccessTokenValidationService.new(access_token, request: request).validate(scopes: scopes)
|
|
|
|
when AccessTokenValidationService::INSUFFICIENT_SCOPE
|
|
|
|
raise InsufficientScopeError.new(scopes)
|
|
|
|
when AccessTokenValidationService::EXPIRED
|
|
|
|
raise ExpiredError
|
|
|
|
when AccessTokenValidationService::REVOKED
|
|
|
|
raise RevokedError
|
2019-02-15 15:39:39 +05:30
|
|
|
when AccessTokenValidationService::IMPERSONATION_DISABLED
|
|
|
|
raise ImpersonationDisabled
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
2018-11-08 19:23:39 +05:30
|
|
|
def route_authentication_setting
|
|
|
|
return {} unless respond_to?(:route_setting)
|
|
|
|
|
|
|
|
route_setting(:authentication) || {}
|
|
|
|
end
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
def access_token
|
|
|
|
strong_memoize(:access_token) do
|
|
|
|
find_oauth_access_token || find_personal_access_token
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def find_personal_access_token
|
|
|
|
token =
|
|
|
|
current_request.params[PRIVATE_TOKEN_PARAM].presence ||
|
2019-10-12 21:52:04 +05:30
|
|
|
current_request.env[PRIVATE_TOKEN_HEADER].presence ||
|
|
|
|
parsed_oauth_token
|
2018-03-17 18:26:18 +05:30
|
|
|
return unless token
|
|
|
|
|
|
|
|
# Expiration, revocation and scopes are verified in `validate_access_token!`
|
2018-11-18 11:00:15 +05:30
|
|
|
PersonalAccessToken.find_by_token(token) || raise(UnauthorizedError)
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def find_oauth_access_token
|
2019-10-12 21:52:04 +05:30
|
|
|
token = parsed_oauth_token
|
2018-03-17 18:26:18 +05:30
|
|
|
return unless token
|
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
# PATs with OAuth headers are not handled by OauthAccessToken
|
|
|
|
return if matches_personal_access_token_length?(token)
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
# Expiration, revocation and scopes are verified in `validate_access_token!`
|
|
|
|
oauth_token = OauthAccessToken.by_token(token)
|
|
|
|
raise UnauthorizedError unless oauth_token
|
|
|
|
|
|
|
|
oauth_token.revoke_previous_refresh_token!
|
|
|
|
oauth_token
|
|
|
|
end
|
|
|
|
|
2020-04-22 19:07:51 +05:30
|
|
|
def find_personal_access_token_from_http_basic_auth
|
|
|
|
return unless route_authentication_setting[:basic_auth_personal_access_token]
|
|
|
|
return unless has_basic_credentials?(current_request)
|
|
|
|
|
|
|
|
_username, password = user_name_and_password(current_request)
|
|
|
|
PersonalAccessToken.find_by_token(password)
|
|
|
|
end
|
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
def parsed_oauth_token
|
|
|
|
Doorkeeper::OAuth::Token.from_request(current_request, *Doorkeeper.configuration.access_token_methods)
|
|
|
|
end
|
|
|
|
|
|
|
|
def matches_personal_access_token_length?(token)
|
|
|
|
token.length == PersonalAccessToken::TOKEN_LENGTH
|
|
|
|
end
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
# Check if the request is GET/HEAD, or if CSRF token is valid.
|
|
|
|
def verified_request?
|
|
|
|
Gitlab::RequestForgeryProtection.verified?(current_request.env)
|
|
|
|
end
|
|
|
|
|
|
|
|
def ensure_action_dispatch_request(request)
|
|
|
|
ActionDispatch::Request.new(request.env.dup)
|
|
|
|
end
|
|
|
|
|
|
|
|
def current_request
|
|
|
|
@current_request ||= ensure_action_dispatch_request(request)
|
|
|
|
end
|
2018-11-08 19:23:39 +05:30
|
|
|
|
2018-11-29 20:51:05 +05:30
|
|
|
def valid_web_access_format?(request_format)
|
|
|
|
case request_format
|
|
|
|
when :rss
|
|
|
|
rss_request?
|
|
|
|
when :ics
|
|
|
|
ics_request?
|
|
|
|
when :api
|
|
|
|
api_request?
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def valid_rss_format?(request_format)
|
|
|
|
case request_format
|
|
|
|
when :rss
|
|
|
|
rss_request?
|
|
|
|
when :ics
|
|
|
|
ics_request?
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-12-04 20:38:33 +05:30
|
|
|
def valid_static_objects_format?(request_format)
|
|
|
|
case request_format
|
|
|
|
when :archive
|
|
|
|
archive_request?
|
2020-01-01 13:55:28 +05:30
|
|
|
when :blob
|
|
|
|
blob_request?
|
2019-12-04 20:38:33 +05:30
|
|
|
else
|
|
|
|
false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-11-08 19:23:39 +05:30
|
|
|
def rss_request?
|
|
|
|
current_request.path.ends_with?('.atom') || current_request.format.atom?
|
|
|
|
end
|
|
|
|
|
|
|
|
def ics_request?
|
|
|
|
current_request.path.ends_with?('.ics') || current_request.format.ics?
|
|
|
|
end
|
2018-11-29 20:51:05 +05:30
|
|
|
|
|
|
|
def api_request?
|
2020-01-01 13:55:28 +05:30
|
|
|
current_request.path.starts_with?('/api/')
|
2018-11-29 20:51:05 +05:30
|
|
|
end
|
2019-12-04 20:38:33 +05:30
|
|
|
|
|
|
|
def archive_request?
|
|
|
|
current_request.path.include?('/-/archive/')
|
|
|
|
end
|
2020-01-01 13:55:28 +05:30
|
|
|
|
|
|
|
def blob_request?
|
|
|
|
current_request.path.include?('/raw/')
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|