2018-12-13 13:39:08 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2016-06-16 23:09:34 +05:30
|
|
|
module Gitlab
|
|
|
|
module Auth
|
|
|
|
class IpRateLimiter
|
2019-09-30 21:07:59 +05:30
|
|
|
include ::Gitlab::Utils::StrongMemoize
|
|
|
|
|
2016-06-16 23:09:34 +05:30
|
|
|
attr_reader :ip
|
|
|
|
|
|
|
|
def initialize(ip)
|
|
|
|
@ip = ip
|
|
|
|
@banned = false
|
|
|
|
end
|
|
|
|
|
|
|
|
def enabled?
|
|
|
|
config.enabled
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2016-06-16 23:09:34 +05:30
|
|
|
def reset!
|
|
|
|
Rack::Attack::Allow2Ban.reset(ip, config)
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2016-06-16 23:09:34 +05:30
|
|
|
def register_fail!
|
|
|
|
# Allow2Ban.filter will return false if this IP has not failed too often yet
|
|
|
|
@banned = Rack::Attack::Allow2Ban.filter(ip, config) do
|
|
|
|
# If we return false here, the failure for this IP is ignored by Allow2Ban
|
2019-12-21 20:55:43 +05:30
|
|
|
# If we return true here, the count for the IP is incremented.
|
2016-06-16 23:09:34 +05:30
|
|
|
ip_can_be_banned?
|
|
|
|
end
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2016-06-16 23:09:34 +05:30
|
|
|
def banned?
|
|
|
|
@banned
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2016-06-16 23:09:34 +05:30
|
|
|
private
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2016-06-16 23:09:34 +05:30
|
|
|
def config
|
|
|
|
Gitlab.config.rack_attack.git_basic_auth
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2016-06-16 23:09:34 +05:30
|
|
|
def ip_can_be_banned?
|
2019-09-30 21:07:59 +05:30
|
|
|
!trusted_ip?
|
|
|
|
end
|
|
|
|
|
|
|
|
def trusted_ip?
|
|
|
|
trusted_ips.any? { |netmask| netmask.include?(ip) }
|
|
|
|
end
|
|
|
|
|
|
|
|
def trusted_ips
|
|
|
|
strong_memoize(:trusted_ips) do
|
|
|
|
config.ip_whitelist.map do |proxy|
|
|
|
|
IPAddr.new(proxy)
|
|
|
|
rescue IPAddr::InvalidAddressError
|
|
|
|
end.compact
|
|
|
|
end
|
2016-06-16 23:09:34 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|