# frozen_string_literal: true module Gitlab module Auth class IpRateLimiter include ::Gitlab::Utils::StrongMemoize attr_reader :ip def initialize(ip) @ip = ip @banned = false end def enabled? config.enabled end def reset! Rack::Attack::Allow2Ban.reset(ip, config) end def register_fail! return false if trusted_ip? # Allow2Ban.filter will return false if this IP has not failed too often yet @banned = Rack::Attack::Allow2Ban.filter(ip, config) do # We return true to increment the count for this IP true end end def banned? @banned end def trusted_ip? trusted_ips.any? { |netmask| netmask.include?(ip) } end private def config Gitlab.config.rack_attack.git_basic_auth end def trusted_ips strong_memoize(:trusted_ips) do config.ip_whitelist.map do |proxy| IPAddr.new(proxy) rescue IPAddr::InvalidAddressError end.compact end end end end end