debian-mirror-gitlab/app/models/ssh_host_key.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

160 lines
4 KiB
Ruby
Raw Normal View History

2018-12-13 13:39:08 +05:30
# frozen_string_literal: true
# Detected SSH host keys are transiently stored in Redis
class SshHostKey
class Fingerprint < Gitlab::SSHPublicKey
attr_reader :index
def initialize(key, index: nil)
super(key)
@index = index
end
def as_json(*)
{ bits: bits, fingerprint: fingerprint, type: type, index: index }
end
end
include ReactiveCaching
self.reactive_cache_key = ->(key) { [key.class.to_s, key.id] }
# Do not refresh the data in the background - it is not expected to change.
# This is achieved by making the lifetime shorter than the refresh interval.
self.reactive_cache_refresh_interval = 15.minutes
self.reactive_cache_lifetime = 10.minutes
2020-05-24 23:13:21 +05:30
self.reactive_cache_work_type = :external_dependency
2018-12-13 13:39:08 +05:30
def self.find_by(opts = {})
2019-03-02 22:35:43 +05:30
opts = HashWithIndifferentAccess.new(opts)
2019-07-07 11:18:12 +05:30
return unless opts.key?(:id)
2018-12-13 13:39:08 +05:30
project_id, url = opts[:id].split(':', 2)
project = Project.find_by(id: project_id)
project.presence && new(project: project, url: url)
end
def self.fingerprint_host_keys(data)
return [] unless data.is_a?(String)
data
.each_line
.each_with_index
.map { |line, index| Fingerprint.new(line, index: index) }
.select(&:valid?)
end
2022-04-01 21:47:47 +05:30
attr_reader :project, :url, :ip, :compare_host_keys
2018-12-13 13:39:08 +05:30
def initialize(project:, url:, compare_host_keys: nil)
@project = project
2022-04-01 21:47:47 +05:30
@url, @ip = normalize_url(url)
2018-12-13 13:39:08 +05:30
@compare_host_keys = compare_host_keys
end
2019-02-15 15:39:39 +05:30
# Needed for reactive caching
def self.primary_key
:id
end
2018-12-13 13:39:08 +05:30
def id
[project.id, url].join(':')
end
def as_json(*)
{
host_keys_changed: host_keys_changed?,
fingerprints: fingerprints,
known_hosts: known_hosts
}
end
def known_hosts
with_reactive_cache { |data| data[:known_hosts] }
end
def fingerprints
@fingerprints ||= self.class.fingerprint_host_keys(known_hosts)
end
# Returns true if the known_hosts data differs from the version passed in at
# initialization as `compare_host_keys`. Comments, ordering, etc, is ignored
def host_keys_changed?
cleanup(known_hosts) != cleanup(compare_host_keys)
end
def error
with_reactive_cache { |data| data[:error] }
end
def calculate_reactive_cache
2022-04-01 21:47:47 +05:30
input = [ip, url.hostname].compact.join(' ')
2018-12-13 13:39:08 +05:30
known_hosts, errors, status =
Open3.popen3({}, *%W[ssh-keyscan -T 5 -p #{url.port} -f-]) do |stdin, stdout, stderr, wait_thr|
2022-04-01 21:47:47 +05:30
stdin.puts(input)
2018-12-13 13:39:08 +05:30
stdin.close
[
cleanup(stdout.read),
cleanup(stderr.read),
wait_thr.value
]
end
# ssh-keyscan returns an exit code 0 in several error conditions, such as an
# unknown hostname, so check both STDERR and the exit code
if status.success? && !errors.present?
{ known_hosts: known_hosts }
else
2020-06-23 00:09:42 +05:30
Gitlab::AppLogger.debug("Failed to detect SSH host keys for #{id}: #{errors}")
2018-12-13 13:39:08 +05:30
{ error: 'Failed to detect SSH host keys' }
end
end
private
# Remove comments and duplicate entries
def cleanup(data)
data
.to_s
.each_line
.reject { |line| line.start_with?('#') || line.chomp.empty? }
.uniq
.sort
.join
end
def normalize_url(url)
2022-04-01 21:47:47 +05:30
url, real_hostname = Gitlab::UrlBlocker.validate!(
url,
schemes: %w[ssh],
allow_localhost: allow_local_requests?,
allow_local_network: allow_local_requests?,
dns_rebind_protection: Gitlab::CurrentSettings.dns_rebinding_protection_enabled?
)
# When DNS rebinding protection is required, the hostname is replaced by the
# resolved IP. However, `url` is used in `id`, so we can't change it. Track
# the resolved IP separately instead.
if real_hostname
ip = url.hostname
url.hostname = real_hostname
end
# Ensure ssh://foo and ssh://foo:22 share the same cache
url.port = url.inferred_port
2018-12-13 13:39:08 +05:30
2022-04-01 21:47:47 +05:30
[url, ip]
rescue Gitlab::UrlBlocker::BlockedUrlError
2021-06-08 01:23:25 +05:30
raise ArgumentError, "Invalid URL"
2018-12-13 13:39:08 +05:30
end
2022-04-01 21:47:47 +05:30
def allow_local_requests?
Gitlab::CurrentSettings.allow_local_requests_from_web_hooks_and_services?
end
2018-12-13 13:39:08 +05:30
end