debian-mirror-gitlab/lib/gitlab/auth/ip_rate_limiter.rb

60 lines
1.2 KiB
Ruby
Raw Normal View History

2018-12-13 13:39:08 +05:30
# frozen_string_literal: true
module Gitlab
module Auth
class IpRateLimiter
2019-09-30 21:07:59 +05:30
include ::Gitlab::Utils::StrongMemoize
attr_reader :ip
def initialize(ip)
@ip = ip
@banned = false
end
def enabled?
config.enabled
end
2018-03-17 18:26:18 +05:30
def reset!
Rack::Attack::Allow2Ban.reset(ip, config)
end
2018-03-17 18:26:18 +05:30
def register_fail!
# Allow2Ban.filter will return false if this IP has not failed too often yet
@banned = Rack::Attack::Allow2Ban.filter(ip, config) do
# If we return false here, the failure for this IP is ignored by Allow2Ban
ip_can_be_banned?
end
end
2018-03-17 18:26:18 +05:30
def banned?
@banned
end
2018-03-17 18:26:18 +05:30
private
2018-03-17 18:26:18 +05:30
def config
Gitlab.config.rack_attack.git_basic_auth
end
2018-03-17 18:26:18 +05:30
def ip_can_be_banned?
2019-09-30 21:07:59 +05:30
!trusted_ip?
end
def trusted_ip?
trusted_ips.any? { |netmask| netmask.include?(ip) }
end
def trusted_ips
strong_memoize(:trusted_ips) do
config.ip_whitelist.map do |proxy|
IPAddr.new(proxy)
rescue IPAddr::InvalidAddressError
end.compact
end
end
end
end
end