2019-12-04 20:38:33 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
module API
|
|
|
|
# Internal access API
|
|
|
|
module Internal
|
|
|
|
class Base < Grape::API
|
|
|
|
before { authenticate_by_gitlab_shell_token! }
|
|
|
|
|
2020-03-09 13:42:32 +05:30
|
|
|
before do
|
|
|
|
Gitlab::ApplicationContext.push(
|
|
|
|
user: -> { actor&.user },
|
|
|
|
project: -> { project },
|
|
|
|
caller_id: route.origin
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2019-12-04 20:38:33 +05:30
|
|
|
helpers ::API::Helpers::InternalHelpers
|
|
|
|
|
|
|
|
UNKNOWN_CHECK_RESULT_ERROR = 'Unknown check result'.freeze
|
|
|
|
|
|
|
|
helpers do
|
|
|
|
def response_with_status(code: 200, success: true, message: nil, **extra_options)
|
|
|
|
status code
|
|
|
|
{ status: success, message: message }.merge(extra_options).compact
|
|
|
|
end
|
|
|
|
|
|
|
|
def lfs_authentication_url(project)
|
|
|
|
# This is a separate method so that EE can alter its behaviour more
|
|
|
|
# easily.
|
|
|
|
project.http_url_to_repo
|
|
|
|
end
|
|
|
|
|
|
|
|
def ee_post_receive_response_hook(response)
|
|
|
|
# Hook for EE to add messages
|
|
|
|
end
|
|
|
|
|
2019-12-21 20:55:43 +05:30
|
|
|
def check_allowed(params)
|
|
|
|
# This is a separate method so that EE can alter its behaviour more
|
|
|
|
# easily.
|
|
|
|
|
2019-12-04 20:38:33 +05:30
|
|
|
# Stores some Git-specific env thread-safely
|
|
|
|
env = parse_env
|
|
|
|
Gitlab::Git::HookEnv.set(gl_repository, env) if project
|
|
|
|
|
|
|
|
actor.update_last_used_at!
|
|
|
|
access_checker = access_checker_for(actor, params[:protocol])
|
|
|
|
|
|
|
|
check_result = begin
|
|
|
|
result = access_checker.check(params[:action], params[:changes])
|
|
|
|
@project ||= access_checker.project
|
|
|
|
result
|
|
|
|
rescue Gitlab::GitAccess::UnauthorizedError => e
|
2019-12-21 20:55:43 +05:30
|
|
|
return response_with_status(code: 401, success: false, message: e.message)
|
2019-12-04 20:38:33 +05:30
|
|
|
rescue Gitlab::GitAccess::TimeoutError => e
|
2019-12-21 20:55:43 +05:30
|
|
|
return response_with_status(code: 503, success: false, message: e.message)
|
2019-12-04 20:38:33 +05:30
|
|
|
rescue Gitlab::GitAccess::NotFoundError => e
|
2019-12-21 20:55:43 +05:30
|
|
|
return response_with_status(code: 404, success: false, message: e.message)
|
2019-12-04 20:38:33 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
log_user_activity(actor.user)
|
|
|
|
|
|
|
|
case check_result
|
|
|
|
when ::Gitlab::GitAccessResult::Success
|
|
|
|
payload = {
|
|
|
|
gl_repository: gl_repository,
|
|
|
|
gl_project_path: gl_project_path,
|
|
|
|
gl_id: Gitlab::GlId.gl_id(actor.user),
|
|
|
|
gl_username: actor.username,
|
|
|
|
git_config_options: [],
|
|
|
|
gitaly: gitaly_payload(params[:action]),
|
|
|
|
gl_console_messages: check_result.console_messages
|
|
|
|
}
|
|
|
|
|
|
|
|
# Custom option for git-receive-pack command
|
|
|
|
receive_max_input_size = Gitlab::CurrentSettings.receive_max_input_size.to_i
|
|
|
|
if receive_max_input_size > 0
|
|
|
|
payload[:git_config_options] << "receive.maxInputSize=#{receive_max_input_size.megabytes}"
|
2019-12-21 20:55:43 +05:30
|
|
|
|
|
|
|
if Feature.enabled?(:gitaly_upload_pack_filter, project)
|
|
|
|
payload[:git_config_options] << "uploadpack.allowFilter=true" << "uploadpack.allowAnySHA1InWant=true"
|
|
|
|
end
|
2019-12-04 20:38:33 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
response_with_status(**payload)
|
|
|
|
when ::Gitlab::GitAccessResult::CustomAction
|
2019-12-26 22:10:19 +05:30
|
|
|
response_with_status(code: 300, payload: check_result.payload, gl_console_messages: check_result.console_messages)
|
2019-12-04 20:38:33 +05:30
|
|
|
else
|
|
|
|
response_with_status(code: 500, success: false, message: UNKNOWN_CHECK_RESULT_ERROR)
|
|
|
|
end
|
|
|
|
end
|
2019-12-21 20:55:43 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
namespace 'internal' do
|
|
|
|
# Check if git command is allowed for project
|
|
|
|
#
|
|
|
|
# Params:
|
|
|
|
# key_id - ssh key id for Git over SSH
|
|
|
|
# user_id - user id for Git over HTTP or over SSH in keyless SSH CERT mode
|
|
|
|
# username - user name for Git over SSH in keyless SSH cert mode
|
|
|
|
# protocol - Git access protocol being used, e.g. HTTP or SSH
|
|
|
|
# project - project full_path (not path on disk)
|
|
|
|
# action - git action (git-upload-pack or git-receive-pack)
|
|
|
|
# changes - changes as "oldrev newrev ref", see Gitlab::ChangesList
|
|
|
|
# check_ip - optional, only in EE version, may limit access to
|
|
|
|
# group resources based on its IP restrictions
|
|
|
|
post "/allowed" do
|
|
|
|
# It was moved to a separate method so that EE can alter its behaviour more
|
|
|
|
# easily.
|
|
|
|
check_allowed(params)
|
|
|
|
end
|
2019-12-04 20:38:33 +05:30
|
|
|
|
|
|
|
post "/lfs_authenticate" do
|
|
|
|
status 200
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
unless actor.key_or_user
|
|
|
|
raise ActiveRecord::RecordNotFound.new('User not found!')
|
2019-12-04 20:38:33 +05:30
|
|
|
end
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
actor.update_last_used_at!
|
|
|
|
|
2019-12-04 20:38:33 +05:30
|
|
|
Gitlab::LfsToken
|
2020-01-01 13:55:28 +05:30
|
|
|
.new(actor.key_or_user)
|
2019-12-04 20:38:33 +05:30
|
|
|
.authentication_payload(lfs_authentication_url(project))
|
|
|
|
end
|
|
|
|
|
|
|
|
#
|
|
|
|
# Get a ssh key using the fingerprint
|
|
|
|
#
|
|
|
|
# rubocop: disable CodeReuse/ActiveRecord
|
2020-01-01 13:55:28 +05:30
|
|
|
get '/authorized_keys' do
|
2019-12-04 20:38:33 +05:30
|
|
|
fingerprint = params.fetch(:fingerprint) do
|
|
|
|
Gitlab::InsecureKeyFingerprint.new(params.fetch(:key)).fingerprint
|
|
|
|
end
|
|
|
|
key = Key.find_by(fingerprint: fingerprint)
|
2020-01-01 13:55:28 +05:30
|
|
|
not_found!('Key') if key.nil?
|
2019-12-04 20:38:33 +05:30
|
|
|
present key, with: Entities::SSHKey
|
|
|
|
end
|
|
|
|
# rubocop: enable CodeReuse/ActiveRecord
|
|
|
|
|
|
|
|
#
|
|
|
|
# Discover user by ssh key, user id or username
|
|
|
|
#
|
2019-12-21 20:55:43 +05:30
|
|
|
get '/discover' do
|
2020-01-01 13:55:28 +05:30
|
|
|
present actor.user, with: Entities::UserSafe
|
2019-12-04 20:38:33 +05:30
|
|
|
end
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
get '/check' do
|
2019-12-04 20:38:33 +05:30
|
|
|
{
|
|
|
|
api_version: API.version,
|
|
|
|
gitlab_version: Gitlab::VERSION,
|
|
|
|
gitlab_rev: Gitlab.revision,
|
|
|
|
redis: redis_ping
|
|
|
|
}
|
|
|
|
end
|
|
|
|
post '/two_factor_recovery_codes' do
|
|
|
|
status 200
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
actor.update_last_used_at!
|
|
|
|
user = actor.user
|
2019-12-04 20:38:33 +05:30
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
if params[:key_id]
|
|
|
|
unless actor.key
|
|
|
|
break { success: false, message: 'Could not find the given key' }
|
2019-12-04 20:38:33 +05:30
|
|
|
end
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
if actor.key.is_a?(DeployKey)
|
2019-12-04 20:38:33 +05:30
|
|
|
break { success: false, message: 'Deploy keys cannot be used to retrieve recovery codes' }
|
|
|
|
end
|
|
|
|
|
|
|
|
unless user
|
|
|
|
break { success: false, message: 'Could not find a user for the given key' }
|
|
|
|
end
|
2020-01-01 13:55:28 +05:30
|
|
|
elsif params[:user_id] && user.nil?
|
|
|
|
break { success: false, message: 'Could not find the given user' }
|
2019-12-04 20:38:33 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
unless user.two_factor_enabled?
|
|
|
|
break { success: false, message: 'Two-factor authentication is not enabled for this user' }
|
|
|
|
end
|
|
|
|
|
|
|
|
codes = nil
|
|
|
|
|
|
|
|
::Users::UpdateService.new(current_user, user: user).execute! do |user|
|
|
|
|
codes = user.generate_otp_backup_codes!
|
|
|
|
end
|
|
|
|
|
|
|
|
{ success: true, recovery_codes: codes }
|
|
|
|
end
|
|
|
|
|
|
|
|
post '/pre_receive' do
|
|
|
|
status 200
|
|
|
|
|
|
|
|
reference_counter_increased = Gitlab::ReferenceCounter.new(params[:gl_repository]).increase
|
|
|
|
|
|
|
|
{ reference_counter_increased: reference_counter_increased }
|
|
|
|
end
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
post '/notify_post_receive' do
|
2019-12-04 20:38:33 +05:30
|
|
|
status 200
|
|
|
|
|
|
|
|
# TODO: Re-enable when Gitaly is processing the post-receive notification
|
|
|
|
# return unless Gitlab::GitalyClient.enabled?
|
|
|
|
#
|
|
|
|
# begin
|
|
|
|
# repository = wiki? ? project.wiki.repository : project.repository
|
|
|
|
# Gitlab::GitalyClient::NotificationService.new(repository.raw_repository).post_receive
|
|
|
|
# rescue GRPC::Unavailable => e
|
|
|
|
# render_api_error!(e, 500)
|
|
|
|
# end
|
|
|
|
end
|
|
|
|
|
|
|
|
post '/post_receive' do
|
|
|
|
status 200
|
|
|
|
|
2020-03-09 13:42:32 +05:30
|
|
|
response = PostReceiveService.new(actor.user, project, params).execute
|
2019-12-04 20:38:33 +05:30
|
|
|
|
|
|
|
ee_post_receive_response_hook(response)
|
|
|
|
|
|
|
|
present response, with: Entities::InternalPostReceive::Response
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
API::Internal::Base.prepend_if_ee('EE::API::Internal::Base')
|