Skip to content
GitLab
菜单
为什么选择 GitLab
定价
联系销售
探索
为什么选择 GitLab
定价
联系销售
探索
登录
获取免费试用
主导航
搜索或转到…
项目
GitLab
管理
动态
成员
标记
计划
议题
议题看板
里程碑
迭代
需求
代码
合并请求
仓库
分支
提交
标签
仓库图
比较修订版本
代码片段
锁定的文件
构建
流水线
作业
流水线计划
测试用例
产物
部署
发布
Package registry
Container registry
模型注册表
运维
环境
Terraform 模块
监控
事件
服务台
分析
价值流分析
贡献者分析
CI/CD 分析
仓库分析
代码评审分析
议题分析
洞察
模型实验
效能分析
帮助
帮助
支持
GitLab 文档
比较 GitLab 各版本
社区论坛
为极狐GitLab 提交贡献
提交反馈
隐私声明
快捷键
?
新增功能
4
代码片段
群组
项目
显示更多面包屑
gitlab-cn
GitLab
提交
b67a72df
提交
b67a72df
编辑于
3 years ago
作者:
Imre Farkas
浏览文件
操作
下载
差异文件
Merge branch 'group-token-http-authenticate' into 'master'
Group token HTTP authentication See merge request gitlab-org/gitlab!65788
上级
6de091d8
e59a8e9a
No related branches found
分支 包含提交
No related tags found
标签 包含提交
无相关合并请求
变更
2
隐藏空白变更内容
行内
左右并排
显示
2 个更改的文件
lib/gitlab/auth.rb
+17
-1
17 个添加, 1 个删除
lib/gitlab/auth.rb
spec/lib/gitlab/auth_spec.rb
+59
-18
59 个添加, 18 个删除
spec/lib/gitlab/auth_spec.rb
有
76 个添加
和
19 个删除
lib/gitlab/auth.rb
+
17
−
1
浏览文件 @
b67a72df
...
...
@@ -199,13 +199,29 @@ def personal_access_token_check(password, project)
return
unless
valid_scoped_token?
(
token
,
all_available_scopes
)
return
if
project
&&
token
.
user
.
project_bot?
&&
!
project
.
bots
.
include?
(
token
.
user
)
if
project
&&
token
.
user
.
project_bot?
return
unless
token_bot_in_project?
(
token
.
user
,
project
)
||
token_bot_in_group?
(
token
.
user
,
project
)
end
if
can_user_login_with_non_expired_password?
(
token
.
user
)
||
token
.
user
.
project_bot?
Gitlab
::
Auth
::
Result
.
new
(
token
.
user
,
nil
,
:personal_access_token
,
abilities_for_scopes
(
token
.
scopes
))
end
end
def
token_bot_in_project?
(
user
,
project
)
project
.
bots
.
include?
(
user
)
end
# rubocop: disable CodeReuse/ActiveRecord
# A workaround for adding group-level automation is to add the bot user of a project access token as a group member.
# In order to make project access tokens work this way during git authentication, we need to add an additional check for group membership.
# This is a temporary workaround until service accounts are implemented.
def
token_bot_in_group?
(
user
,
project
)
project
.
group
&&
project
.
group
.
members_with_parents
.
where
(
user_id:
user
.
id
).
exists?
end
# rubocop: enable CodeReuse/ActiveRecord
def
valid_oauth_token?
(
token
)
token
&&
token
.
accessible?
&&
valid_scoped_token?
(
token
,
[
:api
])
end
...
...
此差异已折叠。
点击以展开。
spec/lib/gitlab/auth_spec.rb
+
59
−
18
浏览文件 @
b67a72df
...
...
@@ -360,32 +360,23 @@ def operation
end
end
context
'when using a project access token'
do
let_it_be
(
:project_bot_user
)
{
create
(
:user
,
:project_bot
)
}
let_it_be
(
:project_access_token
)
{
create
(
:personal_access_token
,
user:
project_bot_user
)
}
context
'with valid project access token'
do
before
do
project
.
add_maintainer
(
project_bot_user
)
end
context
'when using a resource access token'
do
shared_examples
'with a valid access token'
do
it
'successfully authenticates the project bot'
do
expect
(
gl_auth
.
find_for_git_client
(
project_bot_user
.
username
,
project_
access_token
.
token
,
project:
project
,
ip:
'ip'
))
expect
(
gl_auth
.
find_for_git_client
(
project_bot_user
.
username
,
access_token
.
token
,
project:
project
,
ip:
'ip'
))
.
to
eq
(
Gitlab
::
Auth
::
Result
.
new
(
project_bot_user
,
nil
,
:personal_access_token
,
described_class
.
full_authentication_abilities
))
end
it
'successfully authenticates the project bot with a nil project'
do
expect
(
gl_auth
.
find_for_git_client
(
project_bot_user
.
username
,
project_
access_token
.
token
,
project:
nil
,
ip:
'ip'
))
expect
(
gl_auth
.
find_for_git_client
(
project_bot_user
.
username
,
access_token
.
token
,
project:
nil
,
ip:
'ip'
))
.
to
eq
(
Gitlab
::
Auth
::
Result
.
new
(
project_bot_user
,
nil
,
:personal_access_token
,
described_class
.
full_authentication_abilities
))
end
end
context
'with invalid project access token'
do
context
'when project bot is not a project member'
do
it
'fails for a non-project member'
do
expect
(
gl_auth
.
find_for_git_client
(
project_bot_user
.
username
,
project_access_token
.
token
,
project:
project
,
ip:
'ip'
))
.
to
eq
(
Gitlab
::
Auth
::
Result
.
new
(
nil
,
nil
,
nil
,
nil
))
end
shared_examples
'with an invalid access token'
do
it
'fails for a non-member'
do
expect
(
gl_auth
.
find_for_git_client
(
project_bot_user
.
username
,
access_token
.
token
,
project:
project
,
ip:
'ip'
))
.
to
eq
(
Gitlab
::
Auth
::
Result
.
new
(
nil
,
nil
,
nil
,
nil
))
end
context
'when project bot user is blocked'
do
...
...
@@ -394,11 +385,61 @@ def operation
end
it
'fails for a blocked project bot'
do
expect
(
gl_auth
.
find_for_git_client
(
project_bot_user
.
username
,
project_
access_token
.
token
,
project:
project
,
ip:
'ip'
))
expect
(
gl_auth
.
find_for_git_client
(
project_bot_user
.
username
,
access_token
.
token
,
project:
project
,
ip:
'ip'
))
.
to
eq
(
Gitlab
::
Auth
::
Result
.
new
(
nil
,
nil
,
nil
,
nil
))
end
end
end
context
'when using a personal namespace project access token'
do
let_it_be
(
:project_bot_user
)
{
create
(
:user
,
:project_bot
)
}
let_it_be
(
:access_token
)
{
create
(
:personal_access_token
,
user:
project_bot_user
)
}
context
'when the token belongs to the project'
do
before
do
project
.
add_maintainer
(
project_bot_user
)
end
it_behaves_like
'with a valid access token'
end
it_behaves_like
'with an invalid access token'
end
context
'when in a group namespace'
do
let_it_be
(
:group
)
{
create
(
:group
)
}
let_it_be
(
:project
)
{
create
(
:project
,
group:
group
)
}
context
'when using a project access token'
do
let_it_be
(
:project_bot_user
)
{
create
(
:user
,
:project_bot
)
}
let_it_be
(
:access_token
)
{
create
(
:personal_access_token
,
user:
project_bot_user
)
}
context
'when token user belongs to the project'
do
before
do
project
.
add_maintainer
(
project_bot_user
)
end
it_behaves_like
'with a valid access token'
end
it_behaves_like
'with an invalid access token'
end
context
'when using a group access token'
do
let_it_be
(
:project_bot_user
)
{
create
(
:user
,
name:
'Group token bot'
,
email:
"group_
#{
group
.
id
}
_bot@example.com"
,
username:
"group_
#{
group
.
id
}
_bot"
,
user_type: :project_bot
)
}
let_it_be
(
:access_token
)
{
create
(
:personal_access_token
,
user:
project_bot_user
)
}
context
'when the token belongs to the group'
do
before
do
group
.
add_maintainer
(
project_bot_user
)
end
it_behaves_like
'with a valid access token'
end
it_behaves_like
'with an invalid access token'
end
end
end
end
...
...
此差异已折叠。
点击以展开。
预览
0%
加载中
请重试
或
添加新附件
.
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
保存评论
取消
想要评论请
注册
或
登录