43 lines
1.3 KiB
Ruby
43 lines
1.3 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
module DependencyProxy
|
|
module Auth
|
|
extend ActiveSupport::Concern
|
|
|
|
included do
|
|
# We disable `authenticate_user!` since the `DependencyProxy::Auth` performs auth using JWT token
|
|
skip_before_action :authenticate_user!, raise: false
|
|
prepend_before_action :authenticate_user_from_jwt_token!
|
|
end
|
|
|
|
def authenticate_user_from_jwt_token!
|
|
return unless dependency_proxy_for_private_groups?
|
|
|
|
authenticate_with_http_token do |token, _|
|
|
user = user_from_token(token)
|
|
sign_in(user) if user
|
|
end
|
|
|
|
request_bearer_token! unless current_user
|
|
end
|
|
|
|
private
|
|
|
|
def dependency_proxy_for_private_groups?
|
|
Feature.enabled?(:dependency_proxy_for_private_groups, default_enabled: true)
|
|
end
|
|
|
|
def request_bearer_token!
|
|
# unfortunately, we cannot use https://api.rubyonrails.org/classes/ActionController/HttpAuthentication/Token.html#method-i-authentication_request
|
|
response.headers['WWW-Authenticate'] = ::DependencyProxy::Registry.authenticate_header
|
|
render plain: '', status: :unauthorized
|
|
end
|
|
|
|
def user_from_token(token)
|
|
token_payload = DependencyProxy::AuthTokenService.decoded_token_payload(token)
|
|
User.find(token_payload['user_id'])
|
|
rescue JWT::DecodeError, JWT::ExpiredSignature, JWT::ImmatureSignature
|
|
nil
|
|
end
|
|
end
|
|
end
|