class JwtController < ApplicationController skip_before_action :authenticate_user! skip_before_action :verify_authenticity_token before_action :authenticate_project_or_user SERVICES = { Auth::ContainerRegistryAuthenticationService::AUDIENCE => Auth::ContainerRegistryAuthenticationService, } def auth service = SERVICES[params[:service]] return head :not_found unless service result = service.new(@project, @user, auth_params).execute render json: result, status: result[:http_status] end private def authenticate_project_or_user authenticate_with_http_basic do |login, password| # if it's possible we first try to authenticate project with login and password @project = authenticate_project(login, password) return if @project @user = authenticate_user(login, password) return if @user render_403 end end def auth_params params.permit(:service, :scope, :offline_token, :account, :client_id) end def authenticate_project(login, password) if login == 'gitlab-ci-token' Project.find_by(builds_enabled: true, runners_token: password) end end def authenticate_user(login, password) # TODO: this is a copy and paste from grack_auth, # it should be refactored in the future user = Gitlab::Auth.new.find(login, password) # If the user authenticated successfully, we reset the auth failure count # from Rack::Attack for that IP. A client may attempt to authenticate # with a username and blank password first, and only after it receives # a 401 error does it present a password. Resetting the count prevents # false positives from occurring. # # Otherwise, we let Rack::Attack know there was a failed authentication # attempt from this IP. This information is stored in the Rails cache # (Redis) and will be used by the Rack::Attack middleware to decide # whether to block requests from this IP. config = Gitlab.config.rack_attack.git_basic_auth if config.enabled if user # A successful login will reset the auth failure count from this IP Rack::Attack::Allow2Ban.reset(request.ip, config) else banned = Rack::Attack::Allow2Ban.filter(request.ip, config) do # Unless the IP is whitelisted, return true so that Allow2Ban # increments the counter (stored in Rails.cache) for the IP if config.ip_whitelist.include?(request.ip) false else true end end if banned Rails.logger.info "IP #{request.ip} failed to login " \ "as #{login} but has been temporarily banned from Git auth" return end end end user end end