debian-mirror-gitlab/lib/gitlab/url_blockers/url_whitelist.rb

47 lines
1.4 KiB
Ruby
Raw Normal View History

2019-12-04 20:38:33 +05:30
# frozen_string_literal: true
module Gitlab
module UrlBlockers
class UrlWhitelist
class << self
2020-04-08 14:13:33 +05:30
def ip_whitelisted?(ip_string, port: nil)
2019-12-04 20:38:33 +05:30
return false if ip_string.blank?
ip_whitelist, _ = outbound_local_requests_whitelist_arrays
ip_obj = Gitlab::Utils.string_to_ip_object(ip_string)
2020-04-08 14:13:33 +05:30
ip_whitelist.any? do |ip_whitelist_entry|
ip_whitelist_entry.match?(ip_obj, port)
end
2019-12-04 20:38:33 +05:30
end
2020-04-08 14:13:33 +05:30
def domain_whitelisted?(domain_string, port: nil)
2019-12-04 20:38:33 +05:30
return false if domain_string.blank?
_, domain_whitelist = outbound_local_requests_whitelist_arrays
2020-04-08 14:13:33 +05:30
domain_whitelist.any? do |domain_whitelist_entry|
domain_whitelist_entry.match?(domain_string, port)
end
2019-12-04 20:38:33 +05:30
end
private
attr_reader :ip_whitelist, :domain_whitelist
# We cannot use Gitlab::CurrentSettings as ApplicationSetting itself
# calls this class. This ends up in a cycle where
# Gitlab::CurrentSettings creates an ApplicationSetting which then
# calls this method.
#
# See https://gitlab.com/gitlab-org/gitlab/issues/9833
def outbound_local_requests_whitelist_arrays
return [[], []] unless ApplicationSetting.current
ApplicationSetting.current.outbound_local_requests_whitelist_arrays
end
end
end
end
end