# frozen_string_literal: true module Gitlab module Auth class IpRateLimiter include ::Gitlab::Utils::StrongMemoize attr_reader :ip def initialize(ip) @ip = ip @banned = false end def enabled? config.enabled end def reset! Rack::Attack::Allow2Ban.reset(ip, config) end def register_fail! # Allow2Ban.filter will return false if this IP has not failed too often yet @banned = Rack::Attack::Allow2Ban.filter(ip, config) do # If we return false here, the failure for this IP is ignored by Allow2Ban # If we return true here, the count for the IP is incremented. ip_can_be_banned? end end def banned? @banned end private def config Gitlab.config.rack_attack.git_basic_auth end def ip_can_be_banned? !trusted_ip? end def trusted_ip? trusted_ips.any? { |netmask| netmask.include?(ip) } end def trusted_ips strong_memoize(:trusted_ips) do config.ip_whitelist.map do |proxy| IPAddr.new(proxy) rescue IPAddr::InvalidAddressError end.compact end end end end end