Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Boxiang Sun
gitlab-ce
Commits
aecc3eb0
Commit
aecc3eb0
authored
Nov 08, 2017
by
Francisco Lopez
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Applied some code review comments
parent
374179a9
Changes
4
Show whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
29 additions
and
32 deletions
+29
-32
app/controllers/application_controller.rb
app/controllers/application_controller.rb
+1
-2
lib/api/api_guard.rb
lib/api/api_guard.rb
+0
-5
lib/gitlab/auth/request_authenticator.rb
lib/gitlab/auth/request_authenticator.rb
+6
-2
lib/gitlab/auth/user_auth_finders.rb
lib/gitlab/auth/user_auth_finders.rb
+22
-23
No files found.
app/controllers/application_controller.rb
View file @
aecc3eb0
...
...
@@ -99,8 +99,7 @@ class ApplicationController < ActionController::Base
return
try
(
:authenticated_user
)
end
# This filter handles private tokens, personal access tokens, and atom
# requests with rss tokens
# This filter handles personal access tokens, and atom requests with rss tokens
def
authenticate_sessionless_user!
user
=
Gitlab
::
Auth
::
RequestAuthenticator
.
new
(
request
).
find_sessionless_user
...
...
lib/api/api_guard.rb
View file @
aecc3eb0
...
...
@@ -45,7 +45,6 @@ module API
include
Gitlab
::
Utils
::
StrongMemoize
def
find_current_user!
set_raise_unauthorized_error
user
=
find_user_from_access_token
||
find_user_from_warden
return
unless
user
...
...
@@ -75,10 +74,6 @@ module API
private
def
private_token
params
[
PRIVATE_TOKEN_PARAM
].
presence
||
env
[
PRIVATE_TOKEN_HEADER
].
presence
end
# An array of scopes that were registered (using `allow_access_with_scope`)
# for the current endpoint class. It also returns scopes registered on
# `API::API`, since these are meant to apply to all API routes.
...
...
lib/gitlab/auth/request_authenticator.rb
View file @
aecc3eb0
...
...
@@ -7,8 +7,10 @@ module Gitlab
attr_reader
:request
delegate
:params
,
:env
,
to: :request
def
initialize
(
request
)
@request
=
ensure_action_dispatch_request
(
request
)
@request
=
request
end
def
user
...
...
@@ -16,7 +18,9 @@ module Gitlab
end
def
find_sessionless_user
find_user_from_access_token
||
find_user_by_rss_token
find_user_from_access_token
||
find_user_from_rss_token
rescue
StandardError
nil
end
end
end
...
...
lib/gitlab/auth/user_auth_finders.rb
View file @
aecc3eb0
module
Gitlab
module
Auth
module
UserAuthFinders
PRIVATE_TOKEN_HEADER
=
'HTTP_PRIVATE_TOKEN'
.
freeze
PRIVATE_TOKEN_PARAM
=
:private_token
# Check the Rails session for valid authentication details
def
find_user_from_warden
request
.
env
[
'warden'
]
&
.
authenticate
if
verified_request?
env
[
'warden'
]
&
.
authenticate
if
verified_request?
end
def
find_user_
by
_rss_token
def
find_user_
from
_rss_token
return
unless
request
.
format
.
atom?
token
=
request
.
params
[
:rss_token
].
presence
return
unless
token
.
present?
token
=
params
[
:rss_token
].
presence
return
unless
token
handle_return_value!
(
User
.
find_by_rss_token
(
token
))
end
...
...
@@ -24,14 +27,22 @@ module Gitlab
end
def
validate_access_token!
(
scopes:
[])
return
unless
access_token
case
AccessTokenValidationService
.
new
(
access_token
,
request:
request
).
validate
(
scopes:
scopes
)
when
AccessTokenValidationService
::
INSUFFICIENT_SCOPE
raise
API
::
APIGuard
::
InsufficientScopeError
.
new
(
scopes
)
when
AccessTokenValidationService
::
EXPIRED
raise
API
::
APIGuard
::
ExpiredError
when
AccessTokenValidationService
::
REVOKED
raise
API
::
APIGuard
::
RevokedError
end
end
private
def
handle_return_value!
(
value
,
&
block
)
unless
value
raise_unauthorized_error?
?
raise_unauthorized_error!
:
return
end
raise
API
::
APIGuard
::
UnauthorizedError
unless
value
block_given?
?
yield
(
value
)
:
value
end
...
...
@@ -43,13 +54,13 @@ module Gitlab
end
def
private_token
request
.
params
[
:private_token
].
presence
||
request
.
headers
[
'PRIVATE-TOKEN'
].
presence
params
[
PRIVATE_TOKEN_PARAM
].
presence
||
env
[
PRIVATE_TOKEN_HEADER
].
presence
end
def
find_personal_access_token
token
=
private_token
.
to_s
return
unless
token
.
present?
token
=
private_token
return
unless
token
# Expiration, revocation and scopes are verified in `validate_access_token!`
handle_return_value!
(
PersonalAccessToken
.
find_by
(
token:
token
))
...
...
@@ -77,18 +88,6 @@ module Gitlab
ActionDispatch
::
Request
.
new
(
request
.
env
)
end
def
raise_unauthorized_error?
defined?
(
@raise_unauthorized_error
)
?
@raise_unauthorized_error
:
false
end
def
set_raise_unauthorized_error
@raise_unauthorized_error
=
true
end
def
raise_unauthorized_error!
raise
API
::
APIGuard
::
UnauthorizedError
end
end
end
end
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment