105 lines
		
	
	
		
			3.2 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			105 lines
		
	
	
		
			3.2 KiB
		
	
	
	
		
			Ruby
		
	
	
	
# frozen_string_literal: true
 | 
						|
 | 
						|
class JwtController < ApplicationController
 | 
						|
  skip_around_action :set_session_storage
 | 
						|
  skip_before_action :authenticate_user!
 | 
						|
  skip_before_action :verify_authenticity_token
 | 
						|
 | 
						|
  # Add this before other actions, since we want to have the user or project
 | 
						|
  prepend_before_action :auth_user, :authenticate_project_or_user
 | 
						|
 | 
						|
  feature_category :authentication_and_authorization
 | 
						|
  # https://gitlab.com/gitlab-org/gitlab/-/issues/357037
 | 
						|
  urgency :low
 | 
						|
 | 
						|
  SERVICES = {
 | 
						|
    ::Auth::ContainerRegistryAuthenticationService::AUDIENCE => ::Auth::ContainerRegistryAuthenticationService,
 | 
						|
    ::Auth::DependencyProxyAuthenticationService::AUDIENCE => ::Auth::DependencyProxyAuthenticationService
 | 
						|
  }.freeze
 | 
						|
 | 
						|
  def auth
 | 
						|
    service = SERVICES[params[:service]]
 | 
						|
    return head :not_found unless service
 | 
						|
 | 
						|
    result = service.new(@authentication_result.project, auth_user, auth_params)
 | 
						|
      .execute(authentication_abilities: @authentication_result.authentication_abilities)
 | 
						|
 | 
						|
    render json: result, status: result[:http_status]
 | 
						|
  end
 | 
						|
 | 
						|
  private
 | 
						|
 | 
						|
  def authenticate_project_or_user
 | 
						|
    @authentication_result = Gitlab::Auth::Result.new(nil, nil, :none, Gitlab::Auth.read_only_authentication_abilities)
 | 
						|
 | 
						|
    authenticate_with_http_basic do |login, password|
 | 
						|
      @authentication_result = Gitlab::Auth.find_for_git_client(login, password, project: nil, ip: request.ip)
 | 
						|
 | 
						|
      if @authentication_result.failed?
 | 
						|
        log_authentication_failed(login, @authentication_result)
 | 
						|
        render_access_denied
 | 
						|
      end
 | 
						|
    end
 | 
						|
  rescue Gitlab::Auth::MissingPersonalAccessTokenError
 | 
						|
    render_access_denied
 | 
						|
  end
 | 
						|
 | 
						|
  def log_authentication_failed(login, result)
 | 
						|
    log_info = {
 | 
						|
      message: 'JWT authentication failed',
 | 
						|
      http_user: login,
 | 
						|
      remote_ip: request.ip,
 | 
						|
      auth_service: params[:service],
 | 
						|
      'auth_result.type': result.type,
 | 
						|
      'auth_result.actor_type': result.actor&.class
 | 
						|
    }.merge(::Gitlab::ApplicationContext.current)
 | 
						|
 | 
						|
    Gitlab::AuthLogger.warn(log_info)
 | 
						|
  end
 | 
						|
 | 
						|
  def render_access_denied
 | 
						|
    help_page = help_page_url(
 | 
						|
      'user/profile/account/two_factor_authentication',
 | 
						|
      anchor: 'troubleshooting'
 | 
						|
    )
 | 
						|
 | 
						|
    render(
 | 
						|
      json: { errors: [{
 | 
						|
        code: 'UNAUTHORIZED',
 | 
						|
        message: format(_("HTTP Basic: Access denied. The provided password or token is incorrect or your account has 2FA enabled and you must use a personal access token instead of a password. See %{help_page_url}"), help_page_url: help_page)
 | 
						|
      }] },
 | 
						|
      status: :unauthorized
 | 
						|
    )
 | 
						|
  end
 | 
						|
 | 
						|
  def auth_params
 | 
						|
    params.permit(:service, :account, :client_id)
 | 
						|
          .merge(additional_params)
 | 
						|
  end
 | 
						|
 | 
						|
  def additional_params
 | 
						|
    {
 | 
						|
      scopes: scopes_param,
 | 
						|
      deploy_token: @authentication_result.deploy_token,
 | 
						|
      auth_type: @authentication_result.type
 | 
						|
    }.compact
 | 
						|
  end
 | 
						|
 | 
						|
  # We have to parse scope here, because Docker Client does not send an array of scopes,
 | 
						|
  # but rather a flat list and we loose second scope when being processed by Rails:
 | 
						|
  # scope=scopeA&scope=scopeB
 | 
						|
  #
 | 
						|
  # This method makes to always return an array of scopes
 | 
						|
  def scopes_param
 | 
						|
    return unless params[:scope].present?
 | 
						|
 | 
						|
    Array(Rack::Utils.parse_query(request.query_string)['scope'])
 | 
						|
  end
 | 
						|
 | 
						|
  def auth_user
 | 
						|
    strong_memoize(:auth_user) do
 | 
						|
      @authentication_result.auth_user
 | 
						|
    end
 | 
						|
  end
 | 
						|
end
 |