debian-mirror-gitlab/lib/gitlab/rack_attack/request.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

235 lines
7.1 KiB
Ruby
Raw Permalink Normal View History

2021-02-22 17:27:13 +05:30
# frozen_string_literal: true
module Gitlab
module RackAttack
module Request
2022-04-04 11:22:00 +05:30
include ::Gitlab::Utils::StrongMemoize
2021-11-11 11:23:49 +05:30
FILES_PATH_REGEX = %r{^/api/v\d+/projects/[^/]+/repository/files/.+}.freeze
2021-11-18 22:05:49 +05:30
GROUP_PATH_REGEX = %r{^/api/v\d+/groups/[^/]+/?$}.freeze
2021-11-11 11:23:49 +05:30
2021-02-22 17:27:13 +05:30
def unauthenticated?
2022-05-03 16:02:30 +05:30
!(authenticated_identifier([:api, :rss, :ics]) || authenticated_runner_id)
2021-02-22 17:27:13 +05:30
end
2022-05-03 16:02:30 +05:30
def throttled_identifer(request_formats)
identifier = authenticated_identifier(request_formats)
return unless identifier
2021-02-22 17:27:13 +05:30
2022-05-03 16:02:30 +05:30
identifier_type = identifier[:identifier_type]
identifier_id = identifier[:identifier_id]
if identifier_type == :user && Gitlab::RackAttack.user_allowlist.include?(identifier_id)
2021-02-22 17:27:13 +05:30
Gitlab::Instrumentation::Throttle.safelist = 'throttle_user_allowlist'
return
end
2022-05-03 16:02:30 +05:30
"#{identifier_type}:#{identifier_id}"
2021-02-22 17:27:13 +05:30
end
def authenticated_runner_id
request_authenticator.runner&.id
end
def api_request?
2022-04-04 11:22:00 +05:30
logical_path.start_with?('/api')
end
def logical_path
@logical_path ||= path.delete_prefix(Gitlab.config.gitlab.relative_url_root)
end
def matches?(regex)
logical_path.match?(regex)
2021-02-22 17:27:13 +05:30
end
def api_internal_request?
2022-04-04 11:22:00 +05:30
matches?(%r{^/api/v\d+/internal/})
2021-02-22 17:27:13 +05:30
end
def health_check_request?
2022-04-04 11:22:00 +05:30
matches?(%r{^/-/(health|liveness|readiness|metrics)})
2021-02-22 17:27:13 +05:30
end
2021-04-29 21:17:54 +05:30
def container_registry_event?
2022-04-04 11:22:00 +05:30
matches?(%r{^/api/v\d+/container_registry_event/})
2021-04-29 21:17:54 +05:30
end
2021-02-22 17:27:13 +05:30
def product_analytics_collector_request?
2022-04-04 11:22:00 +05:30
logical_path.start_with?('/-/collector/i')
2021-02-22 17:27:13 +05:30
end
def should_be_skipped?
2021-04-29 21:17:54 +05:30
api_internal_request? || health_check_request? || container_registry_event?
2021-02-22 17:27:13 +05:30
end
def web_request?
!api_request? && !health_check_request?
end
def protected_path?
2022-04-04 11:22:00 +05:30
matches?(protected_paths_regex)
2021-02-22 17:27:13 +05:30
end
2021-11-11 11:23:49 +05:30
def throttle?(throttle, authenticated:)
fragment = Gitlab::Throttle.throttle_fragment!(throttle, authenticated: authenticated)
__send__("#{fragment}?") # rubocop:disable GitlabSecurity/PublicSend
end
def throttle_unauthenticated_api?
api_request? &&
2023-03-04 22:38:38 +05:30
!should_be_skipped? &&
!frontend_request? &&
!throttle_unauthenticated_packages_api? &&
!throttle_unauthenticated_files_api? &&
!throttle_unauthenticated_deprecated_api? &&
Gitlab::Throttle.settings.throttle_unauthenticated_api_enabled &&
unauthenticated?
2021-11-11 11:23:49 +05:30
end
def throttle_unauthenticated_web?
2022-04-04 11:22:00 +05:30
(web_request? || frontend_request?) &&
2023-03-04 22:38:38 +05:30
!should_be_skipped? &&
# TODO: Column will be renamed in https://gitlab.com/gitlab-org/gitlab/-/issues/340031
Gitlab::Throttle.settings.throttle_unauthenticated_enabled &&
unauthenticated?
2021-06-08 01:23:25 +05:30
end
def throttle_authenticated_api?
api_request? &&
2023-03-04 22:38:38 +05:30
!frontend_request? &&
!throttle_authenticated_packages_api? &&
!throttle_authenticated_files_api? &&
!throttle_authenticated_deprecated_api? &&
Gitlab::Throttle.settings.throttle_authenticated_api_enabled
2021-06-08 01:23:25 +05:30
end
def throttle_authenticated_web?
2022-04-04 11:22:00 +05:30
(web_request? || frontend_request?) &&
2023-03-04 22:38:38 +05:30
!throttle_authenticated_git_lfs? &&
Gitlab::Throttle.settings.throttle_authenticated_web_enabled
2021-06-08 01:23:25 +05:30
end
def throttle_unauthenticated_protected_paths?
post? &&
2023-03-04 22:38:38 +05:30
!should_be_skipped? &&
protected_path? &&
Gitlab::Throttle.protected_paths_enabled? &&
unauthenticated?
2021-06-08 01:23:25 +05:30
end
def throttle_authenticated_protected_paths_api?
post? &&
2023-03-04 22:38:38 +05:30
api_request? &&
protected_path? &&
Gitlab::Throttle.protected_paths_enabled?
2021-06-08 01:23:25 +05:30
end
def throttle_authenticated_protected_paths_web?
post? &&
2023-03-04 22:38:38 +05:30
web_request? &&
protected_path? &&
Gitlab::Throttle.protected_paths_enabled?
2021-06-08 01:23:25 +05:30
end
def throttle_unauthenticated_packages_api?
packages_api_path? &&
2023-03-04 22:38:38 +05:30
Gitlab::Throttle.settings.throttle_unauthenticated_packages_api_enabled &&
unauthenticated?
2021-06-08 01:23:25 +05:30
end
def throttle_authenticated_packages_api?
packages_api_path? &&
2023-03-04 22:38:38 +05:30
Gitlab::Throttle.settings.throttle_authenticated_packages_api_enabled
2021-06-08 01:23:25 +05:30
end
2021-11-11 11:23:49 +05:30
def throttle_authenticated_git_lfs?
git_lfs_path? &&
2023-03-04 22:38:38 +05:30
Gitlab::Throttle.settings.throttle_authenticated_git_lfs_enabled
2021-11-11 11:23:49 +05:30
end
def throttle_unauthenticated_files_api?
files_api_path? &&
2023-03-04 22:38:38 +05:30
Gitlab::Throttle.settings.throttle_unauthenticated_files_api_enabled &&
unauthenticated?
2021-11-11 11:23:49 +05:30
end
def throttle_authenticated_files_api?
files_api_path? &&
2023-03-04 22:38:38 +05:30
Gitlab::Throttle.settings.throttle_authenticated_files_api_enabled
2021-11-11 11:23:49 +05:30
end
2021-11-18 22:05:49 +05:30
def throttle_unauthenticated_deprecated_api?
deprecated_api_request? &&
2023-03-04 22:38:38 +05:30
Gitlab::Throttle.settings.throttle_unauthenticated_deprecated_api_enabled &&
unauthenticated?
2021-11-18 22:05:49 +05:30
end
def throttle_authenticated_deprecated_api?
deprecated_api_request? &&
2023-03-04 22:38:38 +05:30
Gitlab::Throttle.settings.throttle_authenticated_deprecated_api_enabled
2021-11-18 22:05:49 +05:30
end
2021-02-22 17:27:13 +05:30
private
2022-05-03 16:02:30 +05:30
def authenticated_identifier(request_formats)
requester = request_authenticator.find_authenticated_requester(request_formats)
return unless requester
identifier_type = if requester.is_a?(DeployToken)
:deploy_token
else
:user
end
{ identifier_type: identifier_type, identifier_id: requester.id }
2021-02-22 17:27:13 +05:30
end
def request_authenticator
@request_authenticator ||= Gitlab::Auth::RequestAuthenticator.new(self)
end
def protected_paths
Gitlab::CurrentSettings.current_application_settings.protected_paths
end
def protected_paths_regex
Regexp.union(protected_paths.map { |path| /\A#{Regexp.escape(path)}/ })
end
2021-06-08 01:23:25 +05:30
def packages_api_path?
2022-04-04 11:22:00 +05:30
matches?(::Gitlab::Regex::Packages::API_PATH_REGEX)
2021-06-08 01:23:25 +05:30
end
2021-11-11 11:23:49 +05:30
def git_lfs_path?
2022-04-04 11:22:00 +05:30
matches?(::Gitlab::PathRegex.repository_git_lfs_route_regex)
2021-11-11 11:23:49 +05:30
end
def files_api_path?
2022-04-04 11:22:00 +05:30
matches?(FILES_PATH_REGEX)
end
def frontend_request?
strong_memoize(:frontend_request) do
next false unless env.include?('HTTP_X_CSRF_TOKEN') && session.include?(:_csrf_token)
# CSRF tokens are not verified for GET/HEAD requests, so we pretend that we always have a POST request.
Gitlab::RequestForgeryProtection.verified?(env.merge('REQUEST_METHOD' => 'POST'))
end
2021-11-11 11:23:49 +05:30
end
2021-11-18 22:05:49 +05:30
def deprecated_api_request?
# The projects member of the groups endpoint is deprecated. If left
# unspecified, with_projects defaults to true
with_projects = params['with_projects']
with_projects = true if with_projects.blank?
2022-04-04 11:22:00 +05:30
matches?(GROUP_PATH_REGEX) && Gitlab::Utils.to_boolean(with_projects)
2021-11-18 22:05:49 +05:30
end
2021-02-22 17:27:13 +05:30
end
end
end
2021-06-08 01:23:25 +05:30
::Gitlab::RackAttack::Request.prepend_mod_with('Gitlab::RackAttack::Request')