debian-mirror-gitlab/lib/gitlab/http.rb

89 lines
2.9 KiB
Ruby
Raw Normal View History

2018-12-13 13:39:08 +05:30
# frozen_string_literal: true
2018-03-26 14:24:53 +05:30
# This class is used as a proxy for all outbounding http connection
# coming from callbacks, services and hooks. The direct use of the HTTParty
# is discouraged because it can lead to several security problems, like SSRF
# calling internal IP or services.
module Gitlab
class HTTP
2018-05-09 12:01:36 +05:30
BlockedUrlError = Class.new(StandardError)
2018-12-13 13:39:08 +05:30
RedirectionTooDeep = Class.new(StandardError)
2021-07-02 01:05:55 +05:30
ReadTotalTimeout = Class.new(Net::ReadTimeout)
2018-05-09 12:01:36 +05:30
2020-10-24 23:57:45 +05:30
HTTP_TIMEOUT_ERRORS = [
2021-07-02 01:05:55 +05:30
Net::OpenTimeout, Net::ReadTimeout, Net::WriteTimeout, Gitlab::HTTP::ReadTotalTimeout
2020-10-24 23:57:45 +05:30
].freeze
HTTP_ERRORS = HTTP_TIMEOUT_ERRORS + [
2021-10-27 15:23:28 +05:30
EOFError, SocketError, OpenSSL::SSL::SSLError, OpenSSL::OpenSSLError,
2021-12-11 22:18:48 +05:30
Errno::ECONNRESET, Errno::ECONNREFUSED, Errno::EHOSTUNREACH, Errno::ENETUNREACH,
2020-10-24 23:57:45 +05:30
Gitlab::HTTP::BlockedUrlError, Gitlab::HTTP::RedirectionTooDeep
2019-09-04 21:01:54 +05:30
].freeze
2020-10-24 23:57:45 +05:30
DEFAULT_TIMEOUT_OPTIONS = {
open_timeout: 10,
read_timeout: 20,
write_timeout: 30
}.freeze
2021-07-02 01:05:55 +05:30
DEFAULT_READ_TOTAL_TIMEOUT = 20.seconds
2020-10-24 23:57:45 +05:30
2018-03-26 14:24:53 +05:30
include HTTParty # rubocop:disable Gitlab/HTTParty
2020-10-24 23:57:45 +05:30
class << self
alias_method :httparty_perform_request, :perform_request
end
2019-06-05 12:25:43 +05:30
connection_adapter HTTPConnectionAdapter
2018-12-13 13:39:08 +05:30
def self.perform_request(http_method, path, options, &block)
2020-10-24 23:57:45 +05:30
log_info = options.delete(:extra_log_info)
options_with_timeouts =
2020-11-24 15:15:51 +05:30
if !options.has_key?(:timeout)
2020-10-24 23:57:45 +05:30
options.with_defaults(DEFAULT_TIMEOUT_OPTIONS)
else
options
end
2021-10-27 15:23:28 +05:30
options[:skip_read_total_timeout] = true if options[:skip_read_total_timeout].nil? && options[:stream_body]
if options[:skip_read_total_timeout]
2021-07-02 01:05:55 +05:30
return httparty_perform_request(http_method, path, options_with_timeouts, &block)
end
2022-03-02 08:16:31 +05:30
start_time = nil
2021-07-02 01:05:55 +05:30
read_total_timeout = options.fetch(:timeout, DEFAULT_READ_TOTAL_TIMEOUT)
2021-10-27 15:23:28 +05:30
tracked_timeout_error = false
2021-07-02 01:05:55 +05:30
httparty_perform_request(http_method, path, options_with_timeouts) do |fragment|
2022-03-02 08:16:31 +05:30
start_time ||= Gitlab::Metrics::System.monotonic_time
2021-07-02 01:05:55 +05:30
elapsed = Gitlab::Metrics::System.monotonic_time - start_time
2021-10-27 15:23:28 +05:30
if elapsed > read_total_timeout
error = ReadTotalTimeout.new("Request timed out after #{elapsed} seconds")
raise error if options[:use_read_total_timeout]
unless tracked_timeout_error
Gitlab::ErrorTracking.track_exception(error)
tracked_timeout_error = true
end
end
2021-07-02 01:05:55 +05:30
block.call fragment if block
end
2018-12-13 13:39:08 +05:30
rescue HTTParty::RedirectionTooDeep
raise RedirectionTooDeep
2020-04-22 19:07:51 +05:30
rescue *HTTP_ERRORS => e
extra_info = log_info || {}
extra_info = log_info.call(e, path, options) if log_info.respond_to?(:call)
Gitlab::ErrorTracking.log_exception(e, extra_info)
2020-10-24 23:57:45 +05:30
raise e
end
def self.try_get(path, options = {}, &block)
self.get(path, options, &block)
rescue *HTTP_ERRORS
2020-04-22 19:07:51 +05:30
nil
end
2018-03-26 14:24:53 +05:30
end
end