Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
051ac7d5
Commit
051ac7d5
authored
Jun 13, 2018
by
Ash McKenzie
Committed by
Ash McKenzie
Jul 02, 2018
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Better route matching for read-only detection
parent
fc420ded
Changes
2
Show whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
43 additions
and
25 deletions
+43
-25
lib/gitlab/middleware/read_only/controller.rb
lib/gitlab/middleware/read_only/controller.rb
+24
-9
spec/lib/gitlab/middleware/read_only_spec.rb
spec/lib/gitlab/middleware/read_only_spec.rb
+19
-16
No files found.
lib/gitlab/middleware/read_only/controller.rb
View file @
051ac7d5
...
@@ -4,8 +4,18 @@ module Gitlab
...
@@ -4,8 +4,18 @@ module Gitlab
class
Controller
class
Controller
DISALLOWED_METHODS
=
%w(POST PATCH PUT DELETE)
.
freeze
DISALLOWED_METHODS
=
%w(POST PATCH PUT DELETE)
.
freeze
APPLICATION_JSON
=
'application/json'
.
freeze
APPLICATION_JSON
=
'application/json'
.
freeze
APPLICATION_JSON_TYPES
=
%W{
#{
APPLICATION_JSON
}
application/vnd.git-lfs+json}
.
freeze
ERROR_MESSAGE
=
'You cannot perform write operations on a read-only instance'
.
freeze
ERROR_MESSAGE
=
'You cannot perform write operations on a read-only instance'
.
freeze
WHITELISTED_GIT_ROUTES
=
{
'projects/git_http'
=>
%w{git_upload_pack git_receive_pack}
}.
freeze
WHITELISTED_GIT_LFS_ROUTES
=
{
'projects/lfs_api'
=>
%w{batch}
,
'projects/lfs_locks_api'
=>
%w{verify create unlock}
}.
freeze
def
initialize
(
app
,
env
)
def
initialize
(
app
,
env
)
@app
=
app
@app
=
app
@env
=
env
@env
=
env
...
@@ -36,7 +46,7 @@ module Gitlab
...
@@ -36,7 +46,7 @@ module Gitlab
end
end
def
json_request?
def
json_request?
request
.
media_type
==
APPLICATION_JSON
APPLICATION_JSON_TYPES
.
include?
(
request
.
media_type
)
end
end
def
rack_flash
def
rack_flash
...
@@ -63,22 +73,27 @@ module Gitlab
...
@@ -63,22 +73,27 @@ module Gitlab
grack_route
||
ReadOnly
.
internal_routes
.
any?
{
|
path
|
request
.
path
.
include?
(
path
)
}
||
lfs_route
||
sidekiq_route
grack_route
||
ReadOnly
.
internal_routes
.
any?
{
|
path
|
request
.
path
.
include?
(
path
)
}
||
lfs_route
||
sidekiq_route
end
end
def
sidekiq_route
request
.
path
.
start_with?
(
'/admin/sidekiq'
)
end
def
grack_route
def
grack_route
# Calling route_hash may be expensive. Only do it if we think there's a possible match
# Calling route_hash may be expensive. Only do it if we think there's a possible match
return
false
unless
request
.
path
.
end_with?
(
'.git/git-upload-pack'
)
return
false
unless
request
.
path
.
end_with?
(
'.git/git-upload-pack'
,
'.git/git-receive-pack'
)
route_hash
[
:controller
]
==
'projects/git_http'
&&
route_hash
[
:action
]
==
'git_upload_pack'
WHITELISTED_GIT_ROUTES
[
route_hash
[
:controller
]]
&
.
include?
(
route_hash
[
:action
])
end
end
def
lfs_route
def
lfs_route
# Calling route_hash may be expensive. Only do it if we think there's a possible match
# Calling route_hash may be expensive. Only do it if we think there's a possible match
return
false
unless
request
.
path
.
end_with?
(
'/info/lfs/objects/batch'
)
unless
request
.
path
.
end_with?
(
'/info/lfs/objects/batch'
,
'/info/lfs/locks'
,
'/info/lfs/locks/verify'
)
||
%r{/info/lfs/locks/
\d
+/unlock
\z
}
.
match?
(
request
.
path
)
return
false
end
WHITELISTED_GIT_LFS_ROUTES
[
route_hash
[
:controller
]]
&
.
include?
(
route_hash
[
:action
])
end
route_hash
[
:controller
]
==
'projects/lfs_api'
&&
route_hash
[
:action
]
==
'batch'
def
sidekiq_route
request
.
path
.
start_with?
(
'/admin/sidekiq'
)
end
end
end
end
end
end
...
...
spec/lib/gitlab/middleware/read_only_spec.rb
View file @
051ac7d5
...
@@ -2,6 +2,7 @@ require 'spec_helper'
...
@@ -2,6 +2,7 @@ require 'spec_helper'
describe
Gitlab
::
Middleware
::
ReadOnly
do
describe
Gitlab
::
Middleware
::
ReadOnly
do
include
Rack
::
Test
::
Methods
include
Rack
::
Test
::
Methods
using
RSpec
::
Parameterized
::
TableSyntax
RSpec
::
Matchers
.
define
:be_a_redirect
do
RSpec
::
Matchers
.
define
:be_a_redirect
do
match
do
|
response
|
match
do
|
response
|
...
@@ -117,42 +118,44 @@ describe Gitlab::Middleware::ReadOnly do
...
@@ -117,42 +118,44 @@ describe Gitlab::Middleware::ReadOnly do
context
'whitelisted requests'
do
context
'whitelisted requests'
do
it
'expects a POST internal request to be allowed'
do
it
'expects a POST internal request to be allowed'
do
expect
(
Rails
.
application
.
routes
).
not_to
receive
(
:recognize_path
)
expect
(
Rails
.
application
.
routes
).
not_to
receive
(
:recognize_path
)
response
=
request
.
post
(
"/api/
#{
API
::
API
.
version
}
/internal"
)
response
=
request
.
post
(
"/api/
#{
API
::
API
.
version
}
/internal"
)
expect
(
response
).
not_to
be_a_redirect
expect
(
response
).
not_to
be_a_redirect
expect
(
subject
).
not_to
disallow_request
expect
(
subject
).
not_to
disallow_request
end
end
it
'expects a POST LFS request to batch URL to be allowed'
do
it
'expects requests to sidekiq admin to be allowed'
do
expect
(
Rails
.
application
.
routes
).
to
receive
(
:recognize_path
).
and_call_original
response
=
request
.
post
(
'/admin/sidekiq'
)
response
=
request
.
post
(
'/root/rouge.git/info/lfs/objects/batch'
)
expect
(
response
).
not_to
be_a_redirect
expect
(
response
).
not_to
be_a_redirect
expect
(
subject
).
not_to
disallow_request
expect
(
subject
).
not_to
disallow_request
end
it
'expects a POST request to git-upload-pack URL to be allowed'
do
response
=
request
.
get
(
'/admin/sidekiq'
)
expect
(
Rails
.
application
.
routes
).
to
receive
(
:recognize_path
).
and_call_original
response
=
request
.
post
(
'/root/rouge.git/git-upload-pack'
)
expect
(
response
).
not_to
be_a_redirect
expect
(
response
).
not_to
be_a_redirect
expect
(
subject
).
not_to
disallow_request
expect
(
subject
).
not_to
disallow_request
end
end
it
'expects requests to sidekiq admin to be allowed'
do
where
(
:description
,
:path
)
do
response
=
request
.
post
(
'/admin/sidekiq'
)
'LFS request to batch'
|
'/root/rouge.git/info/lfs/objects/batch'
'LFS request to locks verify'
|
'/root/rouge.git/info/lfs/locks/verify'
expect
(
response
).
not_to
be_a_redirect
'LFS request to locks create'
|
'/root/rouge.git/info/lfs/locks'
expect
(
subject
).
not_to
disallow_request
'LFS request to locks unlock'
|
'/root/rouge.git/info/lfs/locks/1/unlock'
'request to git-upload-pack'
|
'/root/rouge.git/git-upload-pack'
'request to git-receive-pack'
|
'/root/rouge.git/git-receive-pack'
end
response
=
request
.
get
(
'/admin/sidekiq'
)
with_them
do
it
"expects a POST
#{
description
}
URL to be allowed"
do
expect
(
Rails
.
application
.
routes
).
to
receive
(
:recognize_path
).
and_call_original
response
=
request
.
post
(
path
)
expect
(
response
).
not_to
be_a_redirect
expect
(
response
).
not_to
be_a_redirect
expect
(
subject
).
not_to
disallow_request
expect
(
subject
).
not_to
disallow_request
end
end
end
end
end
end
end
context
'json requests to a read-only GitLab instance'
do
context
'json requests to a read-only GitLab instance'
do
let
(
:fake_app
)
{
lambda
{
|
env
|
[
200
,
{
'Content-Type'
=>
'application/json'
},
[
'OK'
]]
}
}
let
(
:fake_app
)
{
lambda
{
|
env
|
[
200
,
{
'Content-Type'
=>
'application/json'
},
[
'OK'
]]
}
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment