# frozen_string_literal: true # == SessionlessAuthentication # # Controller concern to handle PAT, RSS, and static objects token authentication methods # module SessionlessAuthentication # This filter handles personal access tokens, atom requests with rss tokens, and static object tokens def authenticate_sessionless_user!(request_format) user = request_authenticator.find_sessionless_user(request_format) sessionless_sign_in(user) if user end def request_authenticator @request_authenticator ||= Gitlab::Auth::RequestAuthenticator.new(request) end def sessionless_user? current_user && !session.key?('warden.user.user.key') end def sessionless_sign_in(user) signed_in_user = if user.can_log_in_with_non_expired_password? # Notice we are passing store false, so the user is not # actually stored in the session and a token is needed # for every request. If you want the token to work as a # sign in token, you can simply remove store: false. sign_in(user, store: false, message: :sessionless_sign_in) elsif request_authenticator.can_sign_in_bot?(user) # we suppress callbacks to avoid redirecting the bot sign_in(user, store: false, message: :sessionless_sign_in, run_callbacks: false) end reset_auth_user! if respond_to?(:reset_auth_user!, true) signed_in_user end def sessionless_bypass_admin_mode!(&block) return yield unless Gitlab::CurrentSettings.admin_mode Gitlab::Auth::CurrentUserMode.bypass_session!(current_user.id, &block) end end