2019-10-27 05:05:56 -04:00
|
|
|
# Tell the Rack::Attack Rack middleware to maintain an IP blacklist.
|
|
|
|
# We update the blacklist in Gitlab::Auth::IpRateLimiter.
|
|
|
|
Rack::Attack.blocklist('Git HTTP Basic Auth') do |req|
|
|
|
|
next false unless Gitlab.config.rack_attack.git_basic_auth.enabled
|
2016-04-25 20:08:10 -04:00
|
|
|
|
2019-10-27 05:05:56 -04:00
|
|
|
Rack::Attack::Allow2Ban.filter(req.ip, Gitlab.config.rack_attack.git_basic_auth) do
|
|
|
|
# This block only gets run if the IP was not already banned.
|
|
|
|
# Return false, meaning that we do not see anything wrong with the
|
|
|
|
# request at this time
|
|
|
|
false
|
2014-12-15 12:47:26 -05:00
|
|
|
end
|
|
|
|
end
|