Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
ca3ac309
Commit
ca3ac309
authored
Nov 13, 2020
by
Aakriti Gupta
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Block LFS writes in read-only mode
parent
39070f5d
Changes
5
Show whitespace changes
Inline
Side-by-side
Showing
5 changed files
with
87 additions
and
20 deletions
+87
-20
ee/changelogs/unreleased/ag-block-lfs-writes-in-read-only-mode.yml
...logs/unreleased/ag-block-lfs-writes-in-read-only-mode.yml
+5
-0
ee/lib/ee/gitlab/middleware/read_only/controller.rb
ee/lib/ee/gitlab/middleware/read_only/controller.rb
+17
-1
ee/spec/support/shared_examples/lib/gitlab/middleware/read_only_gitlab_ee_instance_shared_examples.rb
...iddleware/read_only_gitlab_ee_instance_shared_examples.rb
+42
-5
lib/gitlab/middleware/read_only/controller.rb
lib/gitlab/middleware/read_only/controller.rb
+8
-11
spec/support/shared_examples/lib/gitlab/middleware/read_only_gitlab_instance_shared_examples.rb
...b/middleware/read_only_gitlab_instance_shared_examples.rb
+15
-3
No files found.
ee/changelogs/unreleased/ag-block-lfs-writes-in-read-only-mode.yml
0 → 100644
View file @
ca3ac309
---
title
:
Block LFS writes when database is read-only but allow on Geo secondaries
merge_request
:
47684
author
:
type
:
changed
ee/lib/ee/gitlab/middleware/read_only/controller.rb
View file @
ca3ac309
...
...
@@ -20,11 +20,15 @@ module EE
'repositories/git_http'
=>
%w{git_receive_pack}
}.
freeze
ALLOWLISTED_GIT_LFS_LOCKS_ROUTES
=
{
'repositories/lfs_locks_api'
=>
%w{verify create unlock}
}.
freeze
private
override
:allowlisted_routes
def
allowlisted_routes
super
||
geo_node_update_route?
||
geo_proxy_git_ssh_route?
||
geo_api_route?
||
geo_proxy_git_http_route?
super
||
geo_node_update_route?
||
geo_proxy_git_ssh_route?
||
geo_api_route?
||
geo_proxy_git_http_route?
||
lfs_locks_route?
end
def
geo_node_update_route?
...
...
@@ -58,6 +62,18 @@ module EE
request
.
path
.
include?
(
"/api/v
#{
version
}
/geo_replication"
)
end
end
def
lfs_locks_route?
# Calling route_hash may be expensive. Only do it if we think there's a possible match
return
unless
::
Gitlab
::
Geo
.
secondary?
unless
request
.
path
.
end_with?
(
'/info/lfs/locks'
,
'/info/lfs/locks/verify'
)
||
%r{/info/lfs/locks/
\d
+/unlock
\z
}
.
match?
(
request
.
path
)
return
false
end
ALLOWLISTED_GIT_LFS_LOCKS_ROUTES
[
route_hash
[
:controller
]]
&
.
include?
(
route_hash
[
:action
])
end
end
end
end
...
...
ee/spec/support/shared_examples/lib/gitlab/middleware/read_only_gitlab_ee_instance_shared_examples.rb
View file @
ca3ac309
...
...
@@ -35,14 +35,51 @@ RSpec.shared_examples 'write access for a read-only GitLab (EE) instance' do
it_behaves_like
'allowlisted request'
,
:post
,
'/admin/geo/replication/projects/1/force_redownload'
it_behaves_like
'allowlisted request'
,
:delete
,
'/admin/geo/replication/uploads/1'
context
'on Geo secondary'
do
before
do
allow
(
::
Gitlab
::
Geo
).
to
receive
(
:secondary?
).
and_return
(
true
)
end
where
(
:description
,
:path
)
do
'LFS request to batch'
|
'/root/rouge.git/info/lfs/objects/batch'
'LFS request to locks verify'
|
'/root/rouge.git/info/lfs/locks/verify'
'LFS request to locks create'
|
'/root/rouge.git/info/lfs/locks'
'LFS request to locks unlock'
|
'/root/rouge.git/info/lfs/locks/1/unlock'
'to geo replication node api'
|
"/api/
#{
API
::
API
.
version
}
/geo_replication/designs/resync"
end
it
'expects geo replication node api requests to be allowed'
do
response
=
request
.
post
(
"/api/
#{
API
::
API
.
version
}
/geo_replication/designs/resync"
)
with_them
do
it
"expects a POST
#{
description
}
URL to be allowed"
do
response
=
request
.
post
(
path
)
expect
(
response
).
not_to
be_redirect
expect
(
subject
).
not_to
disallow_request
end
end
end
context
'when not on Geo secondary'
do
before
do
allow
(
::
Gitlab
::
Geo
).
to
receive
(
:secondary?
).
and_return
(
false
)
end
where
(
:description
,
:path
)
do
'LFS request to locks verify'
|
'/root/rouge.git/info/lfs/locks/verify'
'LFS request to locks create'
|
'/root/rouge.git/info/lfs/locks'
'LFS request to locks unlock'
|
'/root/rouge.git/info/lfs/locks/1/unlock'
end
with_them
do
it
"expects a POST
#{
description
}
URL not to be allowed"
do
response
=
request
.
post
(
path
)
expect
(
response
).
to
be_redirect
expect
(
subject
).
to
disallow_request
end
end
end
end
it
'expects a POST request to git-receive-pack URL to be allowed'
do
response
=
request
.
post
(
'/root/rouge.git/git-receive-pack'
)
...
...
lib/gitlab/middleware/read_only/controller.rb
View file @
ca3ac309
...
...
@@ -13,9 +13,8 @@ module Gitlab
'repositories/git_http'
=>
%w{git_upload_pack}
}.
freeze
ALLOWLISTED_GIT_LFS_ROUTES
=
{
'repositories/lfs_api'
=>
%w{batch}
,
'repositories/lfs_locks_api'
=>
%w{verify create unlock}
ALLOWLISTED_GIT_LFS_BATCH_ROUTES
=
{
'repositories/lfs_api'
=>
%w{batch}
}.
freeze
ALLOWLISTED_GIT_REVISION_ROUTES
=
{
...
...
@@ -88,7 +87,7 @@ module Gitlab
# Overridden in EE module
def
allowlisted_routes
workhorse_passthrough_route?
||
internal_route?
||
lfs_route?
||
compare_git_revisions_route?
||
sidekiq_route?
||
session_route?
||
graphql_query?
workhorse_passthrough_route?
||
internal_route?
||
lfs_
batch_
route?
||
compare_git_revisions_route?
||
sidekiq_route?
||
session_route?
||
graphql_query?
end
# URL for requests passed through gitlab-workhorse to rails-web
...
...
@@ -112,15 +111,13 @@ module Gitlab
ALLOWLISTED_GIT_REVISION_ROUTES
[
route_hash
[
:controller
]]
&
.
include?
(
route_hash
[
:action
])
end
def
lfs_route?
# Batch upload requests are blocked in:
# https://gitlab.com/gitlab-org/gitlab/blob/master/app/controllers/repositories/lfs_api_controller.rb#L106
def
lfs_batch_route?
# Calling route_hash may be expensive. Only do it if we think there's a possible match
unless
request
.
path
.
end_with?
(
'/info/lfs/objects/batch'
,
'/info/lfs/locks'
,
'/info/lfs/locks/verify'
)
||
%r{/info/lfs/locks/
\d
+/unlock
\z
}
.
match?
(
request
.
path
)
return
false
end
return
unless
request
.
path
.
end_with?
(
'/info/lfs/objects/batch'
)
ALLOWLISTED_GIT_LFS_ROUTES
[
route_hash
[
:controller
]]
&
.
include?
(
route_hash
[
:action
])
ALLOWLISTED_GIT_LFS_
BATCH_
ROUTES
[
route_hash
[
:controller
]]
&
.
include?
(
route_hash
[
:action
])
end
def
session_route?
...
...
spec/support/shared_examples/lib/gitlab/middleware/read_only_gitlab_instance_shared_examples.rb
View file @
ca3ac309
...
...
@@ -124,9 +124,6 @@ RSpec.shared_examples 'write access for a read-only GitLab instance' do
where
(
:description
,
:path
)
do
'LFS request to batch'
|
'/root/rouge.git/info/lfs/objects/batch'
'LFS request to locks verify'
|
'/root/rouge.git/info/lfs/locks/verify'
'LFS request to locks create'
|
'/root/rouge.git/info/lfs/locks'
'LFS request to locks unlock'
|
'/root/rouge.git/info/lfs/locks/1/unlock'
'request to git-upload-pack'
|
'/root/rouge.git/git-upload-pack'
end
...
...
@@ -139,6 +136,21 @@ RSpec.shared_examples 'write access for a read-only GitLab instance' do
expect
(
subject
).
not_to
disallow_request
end
end
where
(
:description
,
:path
)
do
'LFS request to locks verify'
|
'/root/rouge.git/info/lfs/locks/verify'
'LFS request to locks create'
|
'/root/rouge.git/info/lfs/locks'
'LFS request to locks unlock'
|
'/root/rouge.git/info/lfs/locks/1/unlock'
end
with_them
do
it
"expects a POST
#{
description
}
URL not to be allowed"
do
response
=
request
.
post
(
path
)
expect
(
response
).
to
be_redirect
expect
(
subject
).
to
disallow_request
end
end
end
end
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment