summaryrefslogtreecommitdiff
path: root/lib/gitlab/auth/user_auth_finders.rb
blob: 93f3cae0a9552b89107e58574ac7490506e0fc87 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
module Gitlab
  module Auth
    module UserAuthFinders
      # Check the Rails session for valid authentication details
      def find_user_from_warden
        request.env['warden']&.authenticate if verified_request?
      end

      def find_user_by_rss_token
        return unless request.format.atom?

        token = request.params[:rss_token].presence
        return unless token.present?

        handle_return_value!(User.find_by_rss_token(token))
      end

      def find_user_from_access_token
        return unless access_token

        validate_access_token!

        handle_return_value!(access_token&.user)
      end

      def validate_access_token!(scopes: [])
      end

      private

      def handle_return_value!(value, &block)
        return unless value

        block_given? ? yield(value) : value
      end

      def access_token
        return @access_token if defined?(@access_token)

        @access_token = find_oauth_access_token || find_personal_access_token
      end

      def private_token
        request.params[:private_token].presence ||
          request.headers['PRIVATE-TOKEN'].presence
      end

      def find_personal_access_token
        token = private_token.to_s
        return unless token.present?

        # Expiration, revocation and scopes are verified in `validate_access_token!`
        handle_return_value!(PersonalAccessToken.find_by(token: token))
      end

      def find_oauth_access_token
        current_request = ensure_action_dispatch_request(request)
        token = Doorkeeper::OAuth::Token.from_request(current_request, *Doorkeeper.configuration.access_token_methods)
        return unless token

        # Expiration, revocation and scopes are verified in `validate_access_token!`
        handle_return_value!(OauthAccessToken.by_token(token)) do |oauth_token|
          oauth_token.revoke_previous_refresh_token!
          oauth_token
        end
      end

      # Check if the request is GET/HEAD, or if CSRF token is valid.
      def verified_request?
        Gitlab::RequestForgeryProtection.verified?(request.env)
      end

      def ensure_action_dispatch_request(request)
        return request if request.is_a?(ActionDispatch::Request)

        ActionDispatch::Request.new(request.env)
      end
    end
  end
end