debian-mirror-gitlab/config/initializers/rack_attack.rb.example

30 lines
1.3 KiB
Text
Raw Normal View History

2014-09-02 18:07:02 +05:30
# 1. Rename this file to rack_attack.rb
# 2. Review the paths_to_be_protected and add any other path you need protecting
#
2015-09-11 14:41:01 +05:30
# If you change this file in a Merge Request, please also create a Merge Request on https://gitlab.com/gitlab-org/omnibus-gitlab/merge_requests
2014-09-02 18:07:02 +05:30
paths_to_be_protected = [
2015-12-23 02:04:40 +05:30
"#{Rails.application.config.relative_url_root}/users/password",
"#{Rails.application.config.relative_url_root}/users/sign_in",
"#{Rails.application.config.relative_url_root}/api/#{API::API.version}/session.json",
"#{Rails.application.config.relative_url_root}/api/#{API::API.version}/session",
"#{Rails.application.config.relative_url_root}/users",
"#{Rails.application.config.relative_url_root}/users/confirmation",
2016-08-24 12:49:21 +05:30
"#{Rails.application.config.relative_url_root}/unsubscribes/",
"#{Rails.application.config.relative_url_root}/import/github/personal_access_token"
2014-09-02 18:07:02 +05:30
]
# Create one big regular expression that matches strings starting with any of
# the paths_to_be_protected.
paths_regex = Regexp.union(paths_to_be_protected.map { |path| /\A#{Regexp.escape(path)}/ })
2016-06-02 11:05:42 +05:30
rack_attack_enabled = Gitlab.config.rack_attack.git_basic_auth['enabled']
2014-09-02 18:07:02 +05:30
2016-06-02 11:05:42 +05:30
unless Rails.env.test? || !rack_attack_enabled
2014-09-02 18:07:02 +05:30
Rack::Attack.throttle('protected paths', limit: 10, period: 60.seconds) do |req|
if req.post? && req.path =~ paths_regex
req.ip
end
end
end