2018-12-13 13:39:08 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
# Detected SSH host keys are transiently stored in Redis
|
|
|
|
class SshHostKey
|
|
|
|
class Fingerprint < Gitlab::SSHPublicKey
|
|
|
|
attr_reader :index
|
|
|
|
|
|
|
|
def initialize(key, index: nil)
|
|
|
|
super(key)
|
|
|
|
|
|
|
|
@index = index
|
|
|
|
end
|
|
|
|
|
|
|
|
def as_json(*)
|
|
|
|
{ bits: bits, fingerprint: fingerprint, type: type, index: index }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
include ReactiveCaching
|
|
|
|
|
|
|
|
self.reactive_cache_key = ->(key) { [key.class.to_s, key.id] }
|
|
|
|
|
|
|
|
# Do not refresh the data in the background - it is not expected to change.
|
|
|
|
# This is achieved by making the lifetime shorter than the refresh interval.
|
|
|
|
self.reactive_cache_refresh_interval = 15.minutes
|
|
|
|
self.reactive_cache_lifetime = 10.minutes
|
2020-05-24 23:13:21 +05:30
|
|
|
self.reactive_cache_work_type = :external_dependency
|
2018-12-13 13:39:08 +05:30
|
|
|
|
|
|
|
def self.find_by(opts = {})
|
2019-03-02 22:35:43 +05:30
|
|
|
opts = HashWithIndifferentAccess.new(opts)
|
2019-07-07 11:18:12 +05:30
|
|
|
return unless opts.key?(:id)
|
2018-12-13 13:39:08 +05:30
|
|
|
|
|
|
|
project_id, url = opts[:id].split(':', 2)
|
|
|
|
project = Project.find_by(id: project_id)
|
|
|
|
|
|
|
|
project.presence && new(project: project, url: url)
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.fingerprint_host_keys(data)
|
|
|
|
return [] unless data.is_a?(String)
|
|
|
|
|
|
|
|
data
|
|
|
|
.each_line
|
|
|
|
.each_with_index
|
|
|
|
.map { |line, index| Fingerprint.new(line, index: index) }
|
|
|
|
.select(&:valid?)
|
|
|
|
end
|
|
|
|
|
2022-04-01 21:47:47 +05:30
|
|
|
attr_reader :project, :url, :ip, :compare_host_keys
|
2018-12-13 13:39:08 +05:30
|
|
|
|
|
|
|
def initialize(project:, url:, compare_host_keys: nil)
|
|
|
|
@project = project
|
2022-04-01 21:47:47 +05:30
|
|
|
@url, @ip = normalize_url(url)
|
2018-12-13 13:39:08 +05:30
|
|
|
@compare_host_keys = compare_host_keys
|
|
|
|
end
|
|
|
|
|
2019-02-15 15:39:39 +05:30
|
|
|
# Needed for reactive caching
|
|
|
|
def self.primary_key
|
|
|
|
:id
|
|
|
|
end
|
|
|
|
|
2018-12-13 13:39:08 +05:30
|
|
|
def id
|
|
|
|
[project.id, url].join(':')
|
|
|
|
end
|
|
|
|
|
|
|
|
def as_json(*)
|
|
|
|
{
|
|
|
|
host_keys_changed: host_keys_changed?,
|
|
|
|
fingerprints: fingerprints,
|
|
|
|
known_hosts: known_hosts
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
def known_hosts
|
|
|
|
with_reactive_cache { |data| data[:known_hosts] }
|
|
|
|
end
|
|
|
|
|
|
|
|
def fingerprints
|
|
|
|
@fingerprints ||= self.class.fingerprint_host_keys(known_hosts)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Returns true if the known_hosts data differs from the version passed in at
|
|
|
|
# initialization as `compare_host_keys`. Comments, ordering, etc, is ignored
|
|
|
|
def host_keys_changed?
|
|
|
|
cleanup(known_hosts) != cleanup(compare_host_keys)
|
|
|
|
end
|
|
|
|
|
|
|
|
def error
|
|
|
|
with_reactive_cache { |data| data[:error] }
|
|
|
|
end
|
|
|
|
|
|
|
|
def calculate_reactive_cache
|
2022-04-01 21:47:47 +05:30
|
|
|
input = [ip, url.hostname].compact.join(' ')
|
|
|
|
|
2018-12-13 13:39:08 +05:30
|
|
|
known_hosts, errors, status =
|
|
|
|
Open3.popen3({}, *%W[ssh-keyscan -T 5 -p #{url.port} -f-]) do |stdin, stdout, stderr, wait_thr|
|
2022-04-01 21:47:47 +05:30
|
|
|
stdin.puts(input)
|
2018-12-13 13:39:08 +05:30
|
|
|
stdin.close
|
|
|
|
|
|
|
|
[
|
|
|
|
cleanup(stdout.read),
|
|
|
|
cleanup(stderr.read),
|
|
|
|
wait_thr.value
|
|
|
|
]
|
|
|
|
end
|
|
|
|
|
|
|
|
# ssh-keyscan returns an exit code 0 in several error conditions, such as an
|
|
|
|
# unknown hostname, so check both STDERR and the exit code
|
|
|
|
if status.success? && !errors.present?
|
|
|
|
{ known_hosts: known_hosts }
|
|
|
|
else
|
2020-06-23 00:09:42 +05:30
|
|
|
Gitlab::AppLogger.debug("Failed to detect SSH host keys for #{id}: #{errors}")
|
2018-12-13 13:39:08 +05:30
|
|
|
|
|
|
|
{ error: 'Failed to detect SSH host keys' }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
# Remove comments and duplicate entries
|
|
|
|
def cleanup(data)
|
|
|
|
data
|
|
|
|
.to_s
|
|
|
|
.each_line
|
|
|
|
.reject { |line| line.start_with?('#') || line.chomp.empty? }
|
|
|
|
.uniq
|
|
|
|
.sort
|
|
|
|
.join
|
|
|
|
end
|
|
|
|
|
|
|
|
def normalize_url(url)
|
2022-04-01 21:47:47 +05:30
|
|
|
url, real_hostname = Gitlab::UrlBlocker.validate!(
|
|
|
|
url,
|
|
|
|
schemes: %w[ssh],
|
|
|
|
allow_localhost: allow_local_requests?,
|
|
|
|
allow_local_network: allow_local_requests?,
|
|
|
|
dns_rebind_protection: Gitlab::CurrentSettings.dns_rebinding_protection_enabled?
|
|
|
|
)
|
|
|
|
|
|
|
|
# When DNS rebinding protection is required, the hostname is replaced by the
|
|
|
|
# resolved IP. However, `url` is used in `id`, so we can't change it. Track
|
|
|
|
# the resolved IP separately instead.
|
|
|
|
if real_hostname
|
|
|
|
ip = url.hostname
|
|
|
|
url.hostname = real_hostname
|
|
|
|
end
|
|
|
|
|
|
|
|
# Ensure ssh://foo and ssh://foo:22 share the same cache
|
|
|
|
url.port = url.inferred_port
|
2018-12-13 13:39:08 +05:30
|
|
|
|
2022-04-01 21:47:47 +05:30
|
|
|
[url, ip]
|
|
|
|
rescue Gitlab::UrlBlocker::BlockedUrlError
|
2021-06-08 01:23:25 +05:30
|
|
|
raise ArgumentError, "Invalid URL"
|
2018-12-13 13:39:08 +05:30
|
|
|
end
|
2022-04-01 21:47:47 +05:30
|
|
|
|
|
|
|
def allow_local_requests?
|
|
|
|
Gitlab::CurrentSettings.allow_local_requests_from_web_hooks_and_services?
|
|
|
|
end
|
2018-12-13 13:39:08 +05:30
|
|
|
end
|