gitlab-org--gitlab-foss/lib/gitlab/auth/ip_rate_limiter.rb

65 lines
1.3 KiB
Ruby
Raw Normal View History

# frozen_string_literal: true
2016-06-03 11:07:40 -04:00
module Gitlab
module Auth
class IpRateLimiter
include ::Gitlab::Utils::StrongMemoize
2016-06-03 11:07:40 -04:00
attr_reader :ip
def initialize(ip)
@ip = ip
end
2016-06-03 11:07:40 -04:00
def reset!
return if skip_rate_limit?
2016-06-03 11:07:40 -04:00
Rack::Attack::Allow2Ban.reset(ip, config)
end
2016-06-03 11:07:40 -04:00
def register_fail!
return false if skip_rate_limit?
2016-06-03 11:07:40 -04:00
# Allow2Ban.filter will return false if this IP has not failed too often yet
Rack::Attack::Allow2Ban.filter(ip, config) do
# We return true to increment the count for this IP
true
2016-06-03 11:07:40 -04:00
end
end
2016-06-03 11:07:40 -04:00
def banned?
return false if skip_rate_limit?
Rack::Attack::Allow2Ban.banned?(ip)
end
2016-06-03 11:07:40 -04:00
private
def skip_rate_limit?
!enabled? || trusted_ip?
end
def enabled?
config.enabled
end
2016-06-03 11:07:40 -04:00
def config
Gitlab.config.rack_attack.git_basic_auth
end
def trusted_ip?
trusted_ips.any? { |netmask| netmask.include?(ip) }
end
def trusted_ips
strong_memoize(:trusted_ips) do
config.ip_whitelist.map do |proxy|
IPAddr.new(proxy)
rescue IPAddr::InvalidAddressError
end.compact
end
2016-06-03 11:07:40 -04:00
end
end
end
end