2018-09-29 18:34:47 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2013-05-14 08:33:31 -04:00
|
|
|
module API
|
2013-02-05 05:47:50 -05:00
|
|
|
# Internal access API
|
2013-02-04 10:53:43 -05:00
|
|
|
class Internal < Grape::API
|
2015-02-03 00:22:57 -05:00
|
|
|
before { authenticate_by_gitlab_shell_token! }
|
2014-10-15 11:26:15 -04:00
|
|
|
|
2016-11-15 10:02:44 -05:00
|
|
|
helpers ::API::Helpers::InternalHelpers
|
2017-12-08 12:42:43 -05:00
|
|
|
helpers ::Gitlab::Identifier
|
2016-11-15 10:02:44 -05:00
|
|
|
|
2018-08-27 23:47:41 -04:00
|
|
|
UNKNOWN_CHECK_RESULT_ERROR = 'Unknown check result'.freeze
|
|
|
|
|
|
|
|
helpers do
|
|
|
|
def response_with_status(code: 200, success: true, message: nil, **extra_options)
|
|
|
|
status code
|
|
|
|
{ status: success, message: message }.merge(extra_options).compact
|
|
|
|
end
|
2019-02-25 10:58:28 -05:00
|
|
|
|
|
|
|
def lfs_authentication_url(project)
|
|
|
|
# This is a separate method so that EE can alter its behaviour more
|
|
|
|
# easily.
|
|
|
|
project.http_url_to_repo
|
|
|
|
end
|
2018-08-27 23:47:41 -04:00
|
|
|
end
|
|
|
|
|
2013-02-05 05:47:50 -05:00
|
|
|
namespace 'internal' do
|
2018-08-27 23:47:41 -04:00
|
|
|
# Check if git command is allowed for project
|
2013-02-05 05:47:50 -05:00
|
|
|
#
|
2013-02-26 15:53:59 -05:00
|
|
|
# Params:
|
2014-03-19 15:02:12 -04:00
|
|
|
# key_id - ssh key id for Git over SSH
|
2018-07-18 15:43:18 -04:00
|
|
|
# user_id - user id for Git over HTTP or over SSH in keyless SSH CERT mode
|
|
|
|
# username - user name for Git over SSH in keyless SSH cert mode
|
2017-04-05 03:29:30 -04:00
|
|
|
# protocol - Git access protocol being used, e.g. HTTP or SSH
|
2017-12-01 08:58:49 -05:00
|
|
|
# project - project full_path (not path on disk)
|
2013-02-26 15:53:59 -05:00
|
|
|
# action - git action (git-upload-pack or git-receive-pack)
|
2017-04-05 03:29:30 -04:00
|
|
|
# changes - changes as "oldrev newrev ref", see Gitlab::ChangesList
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: disable CodeReuse/ActiveRecord
|
2014-09-03 02:06:16 -04:00
|
|
|
post "/allowed" do
|
2017-04-05 03:29:30 -04:00
|
|
|
# Stores some Git-specific env thread-safely
|
2017-11-14 10:14:35 -05:00
|
|
|
env = parse_env
|
2018-03-30 05:19:46 -04:00
|
|
|
Gitlab::Git::HookEnv.set(gl_repository, env) if project
|
2017-04-05 03:29:30 -04:00
|
|
|
|
2016-04-18 11:42:48 -04:00
|
|
|
actor =
|
2015-03-24 09:10:55 -04:00
|
|
|
if params[:key_id]
|
|
|
|
Key.find_by(id: params[:key_id])
|
|
|
|
elsif params[:user_id]
|
|
|
|
User.find_by(id: params[:user_id])
|
2018-07-18 15:43:18 -04:00
|
|
|
elsif params[:username]
|
2018-10-18 05:06:44 -04:00
|
|
|
UserFinder.new(params[:username]).find_by_username
|
2015-03-24 09:10:55 -04:00
|
|
|
end
|
2015-02-23 17:14:57 -05:00
|
|
|
|
2016-06-20 21:40:56 -04:00
|
|
|
protocol = params[:protocol]
|
|
|
|
|
2016-12-21 09:59:54 -05:00
|
|
|
actor.update_last_used_at if actor.is_a?(Key)
|
2017-08-03 14:38:33 -04:00
|
|
|
user =
|
|
|
|
if actor.is_a?(Key)
|
|
|
|
actor.user
|
|
|
|
else
|
|
|
|
actor
|
|
|
|
end
|
2016-12-21 09:59:54 -05:00
|
|
|
|
2019-03-18 12:51:11 -04:00
|
|
|
access_checker_klass = repo_type.access_checker_class
|
2018-02-02 10:27:30 -05:00
|
|
|
access_checker = access_checker_klass.new(actor, project,
|
|
|
|
protocol, authentication_abilities: ssh_authentication_abilities,
|
|
|
|
namespace_path: namespace_path, project_path: project_path,
|
|
|
|
redirected_path: redirected_path)
|
2016-06-22 17:04:51 -04:00
|
|
|
|
2018-08-27 23:47:41 -04:00
|
|
|
check_result = begin
|
|
|
|
result = access_checker.check(params[:action], params[:changes])
|
|
|
|
@project ||= access_checker.project
|
|
|
|
result
|
|
|
|
rescue Gitlab::GitAccess::UnauthorizedError => e
|
|
|
|
break response_with_status(code: 401, success: false, message: e.message)
|
2018-10-22 10:49:20 -04:00
|
|
|
rescue Gitlab::GitAccess::TimeoutError => e
|
|
|
|
break response_with_status(code: 503, success: false, message: e.message)
|
2018-08-27 23:47:41 -04:00
|
|
|
rescue Gitlab::GitAccess::NotFoundError => e
|
|
|
|
break response_with_status(code: 404, success: false, message: e.message)
|
|
|
|
end
|
2016-06-22 17:04:51 -04:00
|
|
|
|
2017-05-19 15:58:45 -04:00
|
|
|
log_user_activity(actor)
|
2016-10-05 10:41:32 -04:00
|
|
|
|
2018-08-27 23:47:41 -04:00
|
|
|
case check_result
|
|
|
|
when ::Gitlab::GitAccessResult::Success
|
|
|
|
payload = {
|
|
|
|
gl_repository: gl_repository,
|
2019-02-16 09:54:32 -05:00
|
|
|
gl_project_path: gl_project_path,
|
2018-08-27 23:47:41 -04:00
|
|
|
gl_id: Gitlab::GlId.gl_id(user),
|
|
|
|
gl_username: user&.username,
|
2018-08-01 10:47:14 -04:00
|
|
|
git_config_options: [],
|
2019-03-27 21:33:45 -04:00
|
|
|
gitaly: gitaly_payload(params[:action]),
|
|
|
|
gl_console_messages: check_result.console_messages
|
2018-08-27 23:47:41 -04:00
|
|
|
}
|
2018-08-01 10:47:14 -04:00
|
|
|
|
|
|
|
# Custom option for git-receive-pack command
|
|
|
|
receive_max_input_size = Gitlab::CurrentSettings.receive_max_input_size.to_i
|
|
|
|
if receive_max_input_size > 0
|
|
|
|
payload[:git_config_options] << "receive.maxInputSize=#{receive_max_input_size.megabytes}"
|
|
|
|
end
|
|
|
|
|
2018-08-27 23:47:41 -04:00
|
|
|
response_with_status(**payload)
|
|
|
|
when ::Gitlab::GitAccessResult::CustomAction
|
|
|
|
response_with_status(code: 300, message: check_result.message, payload: check_result.payload)
|
|
|
|
else
|
|
|
|
response_with_status(code: 500, success: false, message: UNKNOWN_CHECK_RESULT_ERROR)
|
|
|
|
end
|
2013-02-05 05:47:50 -05:00
|
|
|
end
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: enable CodeReuse/ActiveRecord
|
2013-02-05 05:47:50 -05:00
|
|
|
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: disable CodeReuse/ActiveRecord
|
2016-09-19 10:34:32 -04:00
|
|
|
post "/lfs_authenticate" do
|
|
|
|
status 200
|
|
|
|
|
2018-07-18 15:43:18 -04:00
|
|
|
if params[:key_id]
|
|
|
|
actor = Key.find(params[:key_id])
|
|
|
|
actor.update_last_used_at
|
|
|
|
elsif params[:user_id]
|
|
|
|
actor = User.find_by(id: params[:user_id])
|
|
|
|
raise ActiveRecord::RecordNotFound.new("No such user id!") unless actor
|
|
|
|
else
|
|
|
|
raise ActiveRecord::RecordNotFound.new("No key_id or user_id passed!")
|
|
|
|
end
|
2016-12-21 09:59:54 -05:00
|
|
|
|
2019-02-25 10:58:28 -05:00
|
|
|
Gitlab::LfsToken
|
|
|
|
.new(actor)
|
|
|
|
.authentication_payload(lfs_authentication_url(project))
|
2016-09-19 10:34:32 -04:00
|
|
|
end
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: enable CodeReuse/ActiveRecord
|
2016-09-19 10:34:32 -04:00
|
|
|
|
2016-07-28 00:04:57 -04:00
|
|
|
get "/merge_request_urls" do
|
2017-08-29 22:10:41 -04:00
|
|
|
merge_request_urls
|
2016-07-28 00:04:57 -04:00
|
|
|
end
|
|
|
|
|
2016-03-01 12:53:01 -05:00
|
|
|
#
|
|
|
|
# Get a ssh key using the fingerprint
|
|
|
|
#
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: disable CodeReuse/ActiveRecord
|
2016-03-01 12:53:01 -05:00
|
|
|
get "/authorized_keys" do
|
|
|
|
fingerprint = params.fetch(:fingerprint) do
|
|
|
|
Gitlab::InsecureKeyFingerprint.new(params.fetch(:key)).fingerprint
|
|
|
|
end
|
|
|
|
key = Key.find_by(fingerprint: fingerprint)
|
|
|
|
not_found!("Key") if key.nil?
|
|
|
|
present key, with: Entities::SSHKey
|
|
|
|
end
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: enable CodeReuse/ActiveRecord
|
2016-03-01 12:53:01 -05:00
|
|
|
|
2013-02-05 05:47:50 -05:00
|
|
|
#
|
2018-07-18 15:43:18 -04:00
|
|
|
# Discover user by ssh key, user id or username
|
2013-02-05 05:47:50 -05:00
|
|
|
#
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: disable CodeReuse/ActiveRecord
|
2013-02-05 05:47:50 -05:00
|
|
|
get "/discover" do
|
2017-06-20 10:53:28 -04:00
|
|
|
if params[:key_id]
|
|
|
|
key = Key.find(params[:key_id])
|
|
|
|
user = key.user
|
|
|
|
elsif params[:user_id]
|
|
|
|
user = User.find_by(id: params[:user_id])
|
2018-07-18 15:43:18 -04:00
|
|
|
elsif params[:username]
|
2018-10-18 05:06:44 -04:00
|
|
|
user = UserFinder.new(params[:username]).find_by_username
|
2017-06-20 10:53:28 -04:00
|
|
|
end
|
2018-01-11 11:34:01 -05:00
|
|
|
|
2017-06-20 10:53:28 -04:00
|
|
|
present user, with: Entities::UserSafe
|
2013-02-05 05:47:50 -05:00
|
|
|
end
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: enable CodeReuse/ActiveRecord
|
2013-02-05 08:55:49 -05:00
|
|
|
|
|
|
|
get "/check" do
|
|
|
|
{
|
2013-05-14 08:33:31 -04:00
|
|
|
api_version: API.version,
|
2013-02-16 07:42:22 -05:00
|
|
|
gitlab_version: Gitlab::VERSION,
|
2018-05-24 03:57:54 -04:00
|
|
|
gitlab_rev: Gitlab.revision,
|
2017-08-31 17:00:40 -04:00
|
|
|
redis: redis_ping
|
2013-02-05 08:55:49 -05:00
|
|
|
}
|
|
|
|
end
|
2015-02-07 10:41:30 -05:00
|
|
|
|
2017-06-15 09:47:33 -04:00
|
|
|
get "/broadcast_messages" do
|
|
|
|
if messages = BroadcastMessage.current
|
|
|
|
present messages, with: Entities::BroadcastMessage
|
|
|
|
else
|
|
|
|
[]
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-02-07 10:41:30 -05:00
|
|
|
get "/broadcast_message" do
|
2017-07-14 00:38:26 -04:00
|
|
|
if message = BroadcastMessage.current&.last
|
2015-02-07 10:41:30 -05:00
|
|
|
present message, with: Entities::BroadcastMessage
|
2015-02-18 17:58:20 -05:00
|
|
|
else
|
|
|
|
{}
|
2015-02-07 10:41:30 -05:00
|
|
|
end
|
|
|
|
end
|
2016-07-26 17:48:51 -04:00
|
|
|
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: disable CodeReuse/ActiveRecord
|
2016-07-26 17:48:51 -04:00
|
|
|
post '/two_factor_recovery_codes' do
|
|
|
|
status 200
|
|
|
|
|
2018-07-18 15:43:18 -04:00
|
|
|
if params[:key_id]
|
|
|
|
key = Key.find_by(id: params[:key_id])
|
2016-08-24 20:58:05 -04:00
|
|
|
|
2018-07-18 15:43:18 -04:00
|
|
|
if key
|
|
|
|
key.update_last_used_at
|
|
|
|
else
|
|
|
|
break { 'success' => false, 'message' => 'Could not find the given key' }
|
|
|
|
end
|
2016-07-26 17:48:51 -04:00
|
|
|
|
2018-07-18 15:43:18 -04:00
|
|
|
if key.is_a?(DeployKey)
|
|
|
|
break { success: false, message: 'Deploy keys cannot be used to retrieve recovery codes' }
|
|
|
|
end
|
|
|
|
|
|
|
|
user = key.user
|
2016-07-26 17:48:51 -04:00
|
|
|
|
2018-07-18 15:43:18 -04:00
|
|
|
unless user
|
|
|
|
break { success: false, message: 'Could not find a user for the given key' }
|
|
|
|
end
|
|
|
|
elsif params[:user_id]
|
|
|
|
user = User.find_by(id: params[:user_id])
|
2016-08-24 20:58:05 -04:00
|
|
|
|
2018-07-18 15:43:18 -04:00
|
|
|
unless user
|
|
|
|
break { success: false, message: 'Could not find the given user' }
|
|
|
|
end
|
2016-07-26 17:48:51 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
unless user.two_factor_enabled?
|
2018-04-18 05:19:40 -04:00
|
|
|
break { success: false, message: 'Two-factor authentication is not enabled for this user' }
|
2016-07-26 17:48:51 -04:00
|
|
|
end
|
|
|
|
|
2017-06-23 11:11:31 -04:00
|
|
|
codes = nil
|
|
|
|
|
2017-09-27 05:48:33 -04:00
|
|
|
::Users::UpdateService.new(current_user, user: user).execute! do |user|
|
2017-06-23 11:11:31 -04:00
|
|
|
codes = user.generate_otp_backup_codes!
|
2017-06-22 05:27:37 -04:00
|
|
|
end
|
2016-07-26 17:48:51 -04:00
|
|
|
|
2017-06-23 11:11:31 -04:00
|
|
|
{ success: true, recovery_codes: codes }
|
2016-07-26 17:48:51 -04:00
|
|
|
end
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: enable CodeReuse/ActiveRecord
|
2017-02-05 13:04:23 -05:00
|
|
|
|
2017-08-31 17:01:07 -04:00
|
|
|
post '/pre_receive' do
|
|
|
|
status 200
|
|
|
|
|
|
|
|
reference_counter_increased = Gitlab::ReferenceCounter.new(params[:gl_repository]).increase
|
|
|
|
|
|
|
|
{ reference_counter_increased: reference_counter_increased }
|
|
|
|
end
|
|
|
|
|
2017-02-05 13:04:23 -05:00
|
|
|
post "/notify_post_receive" do
|
|
|
|
status 200
|
|
|
|
|
2017-05-18 15:33:43 -04:00
|
|
|
# TODO: Re-enable when Gitaly is processing the post-receive notification
|
|
|
|
# return unless Gitlab::GitalyClient.enabled?
|
|
|
|
#
|
|
|
|
# begin
|
|
|
|
# repository = wiki? ? project.wiki.repository : project.repository
|
2017-07-18 03:59:36 -04:00
|
|
|
# Gitlab::GitalyClient::NotificationService.new(repository.raw_repository).post_receive
|
2017-05-18 15:33:43 -04:00
|
|
|
# rescue GRPC::Unavailable => e
|
|
|
|
# render_api_error!(e, 500)
|
|
|
|
# end
|
2017-02-05 13:04:23 -05:00
|
|
|
end
|
2017-08-29 22:10:41 -04:00
|
|
|
|
|
|
|
post '/post_receive' do
|
|
|
|
status 200
|
2017-11-28 22:50:29 -05:00
|
|
|
|
2019-03-28 21:07:03 -04:00
|
|
|
output = {} # Messages to gitlab-shell
|
|
|
|
user = identify(params[:identifier])
|
|
|
|
project = Gitlab::GlRepository.parse(params[:gl_repository]).first
|
|
|
|
push_options = Gitlab::PushOptions.new(params[:push_options])
|
|
|
|
|
2017-08-29 22:10:41 -04:00
|
|
|
PostReceive.perform_async(params[:gl_repository], params[:identifier],
|
2019-04-05 00:19:30 -04:00
|
|
|
params[:changes], push_options.as_json)
|
2019-03-28 21:07:03 -04:00
|
|
|
|
2019-05-12 19:47:15 -04:00
|
|
|
mr_options = push_options.get(:merge_request)
|
|
|
|
output.merge!(process_mr_push_options(mr_options, project, user, params[:changes])) if mr_options.present?
|
2019-03-28 21:07:03 -04:00
|
|
|
|
2017-08-29 22:10:41 -04:00
|
|
|
broadcast_message = BroadcastMessage.current&.last&.message
|
|
|
|
reference_counter_decreased = Gitlab::ReferenceCounter.new(params[:gl_repository]).decrease
|
|
|
|
|
2019-03-28 21:07:03 -04:00
|
|
|
output.merge!(
|
2017-08-29 22:10:41 -04:00
|
|
|
broadcast_message: broadcast_message,
|
2019-03-28 21:07:03 -04:00
|
|
|
reference_counter_decreased: reference_counter_decreased,
|
|
|
|
merge_request_urls: merge_request_urls
|
|
|
|
)
|
2017-12-24 12:03:58 -05:00
|
|
|
|
|
|
|
# A user is not guaranteed to be returned; an orphaned write deploy
|
|
|
|
# key could be used
|
|
|
|
if user
|
2018-01-26 09:28:08 -05:00
|
|
|
redirect_message = Gitlab::Checks::ProjectMoved.fetch_message(user.id, project.id)
|
|
|
|
project_created_message = Gitlab::Checks::ProjectCreated.fetch_message(user.id, project.id)
|
2018-01-19 08:04:14 -05:00
|
|
|
|
2017-12-24 12:03:58 -05:00
|
|
|
output[:redirected_message] = redirect_message if redirect_message
|
2018-01-25 07:26:52 -05:00
|
|
|
output[:project_created_message] = project_created_message if project_created_message
|
2017-12-08 12:42:43 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
output
|
2017-08-29 22:10:41 -04:00
|
|
|
end
|
2013-02-04 10:53:43 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|