2018-12-13 13:39:08 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-03-26 14:24:53 +05:30
|
|
|
# This class is part of the Gitlab::HTTP wrapper. Depending on the value
|
|
|
|
# of the global setting allow_local_requests_from_hooks_and_services this adapter
|
|
|
|
# will allow/block connection to internal IPs and/or urls.
|
|
|
|
#
|
2018-12-13 13:39:08 +05:30
|
|
|
# This functionality can be overridden by providing the setting the option
|
2018-03-26 14:24:53 +05:30
|
|
|
# allow_local_requests = true in the request. For example:
|
|
|
|
# Gitlab::HTTP.get('http://www.gitlab.com', allow_local_requests: true)
|
|
|
|
#
|
|
|
|
# This option will take precedence over the global setting.
|
|
|
|
module Gitlab
|
2019-06-05 12:25:43 +05:30
|
|
|
class HTTPConnectionAdapter < HTTParty::ConnectionAdapter
|
2018-03-26 14:24:53 +05:30
|
|
|
def connection
|
2019-06-05 12:25:43 +05:30
|
|
|
begin
|
|
|
|
@uri, hostname = Gitlab::UrlBlocker.validate!(uri, allow_local_network: allow_local_requests?,
|
|
|
|
allow_localhost: allow_local_requests?,
|
|
|
|
dns_rebind_protection: dns_rebind_protection?)
|
|
|
|
rescue Gitlab::UrlBlocker::BlockedUrlError => e
|
|
|
|
raise Gitlab::HTTP::BlockedUrlError, "URL '#{uri}' is blocked: #{e.message}"
|
2018-03-26 14:24:53 +05:30
|
|
|
end
|
|
|
|
|
2019-06-05 12:25:43 +05:30
|
|
|
super.tap do |http|
|
|
|
|
http.hostname_override = hostname if hostname
|
|
|
|
end
|
2018-03-26 14:24:53 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
def allow_local_requests?
|
|
|
|
options.fetch(:allow_local_requests, allow_settings_local_requests?)
|
|
|
|
end
|
|
|
|
|
2019-06-05 12:25:43 +05:30
|
|
|
def dns_rebind_protection?
|
|
|
|
return false if Gitlab.http_proxy_env?
|
|
|
|
|
|
|
|
Gitlab::CurrentSettings.dns_rebinding_protection_enabled?
|
|
|
|
end
|
|
|
|
|
2018-03-26 14:24:53 +05:30
|
|
|
def allow_settings_local_requests?
|
|
|
|
Gitlab::CurrentSettings.allow_local_requests_from_hooks_and_services?
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|