2019-09-03 18:07:49 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
module API
|
|
|
|
# Internal access API
|
|
|
|
module Internal
|
2020-10-14 20:08:42 -04:00
|
|
|
class Base < ::API::Base
|
2019-09-03 18:07:49 -04:00
|
|
|
before { authenticate_by_gitlab_shell_token! }
|
|
|
|
|
2020-01-03 10:08:33 -05:00
|
|
|
before do
|
2020-10-26 14:08:27 -04:00
|
|
|
api_endpoint = env['api.endpoint']
|
|
|
|
feature_category = api_endpoint.options[:for].try(:feature_category_for_app, api_endpoint).to_s
|
|
|
|
|
2020-01-03 10:08:33 -05:00
|
|
|
Gitlab::ApplicationContext.push(
|
|
|
|
user: -> { actor&.user },
|
2020-01-23 10:08:46 -05:00
|
|
|
project: -> { project },
|
2021-03-22 11:09:31 -04:00
|
|
|
caller_id: api_endpoint.endpoint_id,
|
2021-01-05 16:10:22 -05:00
|
|
|
remote_ip: request.ip,
|
2020-10-26 14:08:27 -04:00
|
|
|
feature_category: feature_category
|
2020-01-03 10:08:33 -05:00
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2019-09-03 18:07:49 -04:00
|
|
|
helpers ::API::Helpers::InternalHelpers
|
|
|
|
|
2021-03-23 08:09:33 -04:00
|
|
|
UNKNOWN_CHECK_RESULT_ERROR = 'Unknown check result'
|
2019-09-03 18:07:49 -04:00
|
|
|
|
2020-08-05 14:09:49 -04:00
|
|
|
VALID_PAT_SCOPES = Set.new(
|
|
|
|
Gitlab::Auth::API_SCOPES + Gitlab::Auth::REPOSITORY_SCOPES + Gitlab::Auth::REGISTRY_SCOPES
|
|
|
|
).freeze
|
|
|
|
|
2019-09-03 18:07:49 -04:00
|
|
|
helpers do
|
|
|
|
def response_with_status(code: 200, success: true, message: nil, **extra_options)
|
|
|
|
status code
|
|
|
|
{ status: success, message: message }.merge(extra_options).compact
|
|
|
|
end
|
|
|
|
|
2020-11-12 19:09:49 -05:00
|
|
|
def lfs_authentication_url(container)
|
2019-09-03 18:07:49 -04:00
|
|
|
# This is a separate method so that EE can alter its behaviour more
|
|
|
|
# easily.
|
2020-11-12 19:09:49 -05:00
|
|
|
container.lfs_http_url_to_repo
|
2019-09-03 18:07:49 -04:00
|
|
|
end
|
2019-09-13 17:06:15 -04:00
|
|
|
|
2022-08-16 08:12:38 -04:00
|
|
|
# rubocop: disable Metrics/AbcSize
|
2019-10-11 11:06:41 -04:00
|
|
|
def check_allowed(params)
|
|
|
|
# This is a separate method so that EE can alter its behaviour more
|
|
|
|
# easily.
|
|
|
|
|
2022-05-06 11:09:03 -04:00
|
|
|
if Feature.enabled?(:rate_limit_gitlab_shell)
|
2022-01-18 13:11:20 -05:00
|
|
|
check_rate_limit!(:gitlab_shell_operation, scope: [params[:action], params[:project], actor.key_or_user])
|
|
|
|
end
|
|
|
|
|
2022-08-16 08:12:38 -04:00
|
|
|
if Feature.enabled?(:rate_limit_gitlab_shell_by_ip, actor.user)
|
|
|
|
rate_limiter = Gitlab::Auth::IpRateLimiter.new(request.ip)
|
|
|
|
|
|
|
|
unless rate_limiter.trusted_ip?
|
|
|
|
check_rate_limit!(:gitlab_shell_operation, scope: [params[:action], params[:project], rate_limiter.ip])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-09-03 18:07:49 -04:00
|
|
|
# Stores some Git-specific env thread-safely
|
|
|
|
env = parse_env
|
2020-03-16 08:09:12 -04:00
|
|
|
Gitlab::Git::HookEnv.set(gl_repository, env) if container
|
2019-09-03 18:07:49 -04:00
|
|
|
|
2019-08-07 03:51:12 -04:00
|
|
|
actor.update_last_used_at!
|
2019-09-03 18:07:49 -04:00
|
|
|
|
|
|
|
check_result = begin
|
2021-03-17 20:08:58 -04:00
|
|
|
with_admin_mode_bypass!(actor.user&.id) do
|
2021-03-17 17:11:29 -04:00
|
|
|
access_check!(actor, params)
|
|
|
|
end
|
|
|
|
rescue Gitlab::GitAccess::ForbiddenError => e
|
|
|
|
# The return code needs to be 401. If we return 403
|
|
|
|
# the custom message we return won't be shown to the user
|
|
|
|
# and, instead, the default message 'GitLab: API is not accessible'
|
|
|
|
# will be displayed
|
|
|
|
return response_with_status(code: 401, success: false, message: e.message)
|
|
|
|
rescue Gitlab::GitAccess::TimeoutError => e
|
|
|
|
return response_with_status(code: 503, success: false, message: e.message)
|
|
|
|
rescue Gitlab::GitAccess::NotFoundError => e
|
|
|
|
return response_with_status(code: 404, success: false, message: e.message)
|
|
|
|
end
|
2019-09-03 18:07:49 -04:00
|
|
|
|
2019-08-07 03:51:12 -04:00
|
|
|
log_user_activity(actor.user)
|
2019-09-03 18:07:49 -04:00
|
|
|
|
|
|
|
case check_result
|
|
|
|
when ::Gitlab::GitAccessResult::Success
|
|
|
|
payload = {
|
|
|
|
gl_repository: gl_repository,
|
2020-03-04 19:07:49 -05:00
|
|
|
gl_project_path: gl_repository_path,
|
2019-08-07 03:51:12 -04:00
|
|
|
gl_id: Gitlab::GlId.gl_id(actor.user),
|
|
|
|
gl_username: actor.username,
|
2020-06-17 14:09:08 -04:00
|
|
|
git_config_options: ["uploadpack.allowFilter=true",
|
|
|
|
"uploadpack.allowAnySHA1InWant=true"],
|
2019-09-03 18:07:49 -04:00
|
|
|
gitaly: gitaly_payload(params[:action]),
|
|
|
|
gl_console_messages: check_result.console_messages
|
2020-07-21 17:09:12 -04:00
|
|
|
}.merge!(actor.key_details)
|
2019-09-03 18:07:49 -04:00
|
|
|
|
|
|
|
# Custom option for git-receive-pack command
|
2020-05-03 17:09:39 -04:00
|
|
|
|
2019-09-03 18:07:49 -04:00
|
|
|
receive_max_input_size = Gitlab::CurrentSettings.receive_max_input_size.to_i
|
2020-05-03 17:09:39 -04:00
|
|
|
|
2019-09-03 18:07:49 -04:00
|
|
|
if receive_max_input_size > 0
|
|
|
|
payload[:git_config_options] << "receive.maxInputSize=#{receive_max_input_size.megabytes}"
|
|
|
|
end
|
|
|
|
|
2022-03-08 22:09:18 -05:00
|
|
|
send_git_audit_streaming_event(protocol: params[:protocol], action: params[:action])
|
|
|
|
|
2019-09-03 18:07:49 -04:00
|
|
|
response_with_status(**payload)
|
|
|
|
when ::Gitlab::GitAccessResult::CustomAction
|
2019-10-23 14:06:07 -04:00
|
|
|
response_with_status(code: 300, payload: check_result.payload, gl_console_messages: check_result.console_messages)
|
2019-09-03 18:07:49 -04:00
|
|
|
else
|
|
|
|
response_with_status(code: 500, success: false, message: UNKNOWN_CHECK_RESULT_ERROR)
|
|
|
|
end
|
|
|
|
end
|
2022-08-16 08:12:38 -04:00
|
|
|
# rubocop: enable Metrics/AbcSize
|
2020-04-21 11:21:10 -04:00
|
|
|
|
2022-03-08 22:09:18 -05:00
|
|
|
def send_git_audit_streaming_event(msg)
|
|
|
|
# Defined in EE
|
|
|
|
end
|
|
|
|
|
2020-04-21 11:21:10 -04:00
|
|
|
def access_check!(actor, params)
|
|
|
|
access_checker = access_checker_for(actor, params[:protocol])
|
|
|
|
access_checker.check(params[:action], params[:changes]).tap do |result|
|
|
|
|
break result if @project || !repo_type.project?
|
|
|
|
|
|
|
|
# If we have created a project directly from a git push
|
|
|
|
# we have to assign its value to both @project and @container
|
2020-07-21 14:09:45 -04:00
|
|
|
@project = @container = access_checker.container
|
2020-04-21 11:21:10 -04:00
|
|
|
end
|
|
|
|
end
|
2020-10-16 20:08:46 -04:00
|
|
|
|
2021-03-31 11:10:27 -04:00
|
|
|
def validate_actor(actor)
|
2020-10-16 20:08:46 -04:00
|
|
|
return 'Could not find the given key' unless actor.key
|
|
|
|
|
|
|
|
'Could not find a user for the given key' unless actor.user
|
|
|
|
end
|
2021-02-09 10:09:39 -05:00
|
|
|
|
2022-05-12 05:08:08 -04:00
|
|
|
def two_factor_manual_otp_check
|
|
|
|
{ success: false, message: 'Feature is not available' }
|
|
|
|
end
|
|
|
|
|
|
|
|
def two_factor_push_otp_check
|
|
|
|
{ success: false, message: 'Feature is not available' }
|
|
|
|
end
|
|
|
|
|
2021-03-17 20:08:58 -04:00
|
|
|
def with_admin_mode_bypass!(actor_id)
|
|
|
|
return yield unless Gitlab::CurrentSettings.admin_mode
|
|
|
|
|
|
|
|
Gitlab::Auth::CurrentUserMode.bypass_session!(actor_id) do
|
|
|
|
yield
|
|
|
|
end
|
|
|
|
end
|
2019-10-11 11:06:41 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
namespace 'internal' do
|
|
|
|
# Check if git command is allowed for project
|
|
|
|
#
|
|
|
|
# Params:
|
|
|
|
# key_id - ssh key id for Git over SSH
|
|
|
|
# user_id - user id for Git over HTTP or over SSH in keyless SSH CERT mode
|
|
|
|
# username - user name for Git over SSH in keyless SSH cert mode
|
|
|
|
# protocol - Git access protocol being used, e.g. HTTP or SSH
|
|
|
|
# project - project full_path (not path on disk)
|
|
|
|
# action - git action (git-upload-pack or git-receive-pack)
|
|
|
|
# changes - changes as "oldrev newrev ref", see Gitlab::ChangesList
|
|
|
|
# check_ip - optional, only in EE version, may limit access to
|
|
|
|
# group resources based on its IP restrictions
|
2020-11-02 10:08:52 -05:00
|
|
|
post "/allowed", feature_category: :source_code_management do
|
2019-10-11 11:06:41 -04:00
|
|
|
# It was moved to a separate method so that EE can alter its behaviour more
|
|
|
|
# easily.
|
|
|
|
check_allowed(params)
|
|
|
|
end
|
2019-09-03 18:07:49 -04:00
|
|
|
|
2021-11-12 13:12:20 -05:00
|
|
|
post "/lfs_authenticate", feature_category: :source_code_management, urgency: :high do
|
2020-11-12 19:09:49 -05:00
|
|
|
not_found! unless container&.lfs_enabled?
|
|
|
|
|
2019-09-03 18:07:49 -04:00
|
|
|
status 200
|
|
|
|
|
2019-12-03 19:06:15 -05:00
|
|
|
unless actor.key_or_user
|
2021-05-04 11:10:36 -04:00
|
|
|
raise ActiveRecord::RecordNotFound, 'User not found!'
|
2019-09-03 18:07:49 -04:00
|
|
|
end
|
|
|
|
|
2019-12-03 19:06:15 -05:00
|
|
|
actor.update_last_used_at!
|
|
|
|
|
2019-09-03 18:07:49 -04:00
|
|
|
Gitlab::LfsToken
|
2019-12-03 19:06:15 -05:00
|
|
|
.new(actor.key_or_user)
|
2020-11-12 19:09:49 -05:00
|
|
|
.authentication_payload(lfs_authentication_url(container))
|
2019-09-03 18:07:49 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
#
|
2021-06-11 17:09:58 -04:00
|
|
|
# Check whether an SSH key is known to GitLab
|
2019-09-03 18:07:49 -04:00
|
|
|
#
|
2021-10-05 08:12:58 -04:00
|
|
|
get '/authorized_keys', feature_category: :source_code_management, urgency: :high do
|
2021-07-20 11:10:07 -04:00
|
|
|
fingerprint = Gitlab::InsecureKeyFingerprint.new(params.fetch(:key)).fingerprint_sha256
|
2021-06-11 17:09:58 -04:00
|
|
|
|
2021-07-20 11:10:07 -04:00
|
|
|
key = Key.find_by_fingerprint_sha256(fingerprint)
|
2019-12-03 19:06:15 -05:00
|
|
|
not_found!('Key') if key.nil?
|
2019-09-03 18:07:49 -04:00
|
|
|
present key, with: Entities::SSHKey
|
|
|
|
end
|
|
|
|
|
|
|
|
#
|
|
|
|
# Discover user by ssh key, user id or username
|
|
|
|
#
|
2020-11-02 10:08:52 -05:00
|
|
|
get '/discover', feature_category: :authentication_and_authorization do
|
2019-12-03 19:06:15 -05:00
|
|
|
present actor.user, with: Entities::UserSafe
|
2019-09-03 18:07:49 -04:00
|
|
|
end
|
|
|
|
|
2022-04-05 08:10:23 -04:00
|
|
|
get '/check', feature_category: :not_owned do # rubocop:todo Gitlab/AvoidFeatureCategoryNotOwned
|
2019-09-03 18:07:49 -04:00
|
|
|
{
|
|
|
|
api_version: API.version,
|
|
|
|
gitlab_version: Gitlab::VERSION,
|
|
|
|
gitlab_rev: Gitlab.revision,
|
|
|
|
redis: redis_ping
|
|
|
|
}
|
|
|
|
end
|
2020-10-16 20:08:46 -04:00
|
|
|
|
2020-11-02 10:08:52 -05:00
|
|
|
post '/two_factor_recovery_codes', feature_category: :authentication_and_authorization do
|
2019-09-03 18:07:49 -04:00
|
|
|
status 200
|
|
|
|
|
2019-12-03 19:06:15 -05:00
|
|
|
actor.update_last_used_at!
|
|
|
|
user = actor.user
|
2019-09-03 18:07:49 -04:00
|
|
|
|
2021-03-31 11:10:27 -04:00
|
|
|
error_message = validate_actor(actor)
|
2019-09-03 18:07:49 -04:00
|
|
|
|
2020-10-16 20:08:46 -04:00
|
|
|
if params[:user_id] && user.nil?
|
2019-12-03 19:06:15 -05:00
|
|
|
break { success: false, message: 'Could not find the given user' }
|
2020-10-16 20:08:46 -04:00
|
|
|
elsif error_message
|
|
|
|
break { success: false, message: error_message }
|
2019-09-03 18:07:49 -04:00
|
|
|
end
|
|
|
|
|
2020-10-16 20:08:46 -04:00
|
|
|
break { success: false, message: 'Deploy keys cannot be used to retrieve recovery codes' } if actor.key.is_a?(DeployKey)
|
|
|
|
|
2019-09-03 18:07:49 -04:00
|
|
|
unless user.two_factor_enabled?
|
|
|
|
break { success: false, message: 'Two-factor authentication is not enabled for this user' }
|
|
|
|
end
|
|
|
|
|
|
|
|
codes = nil
|
|
|
|
|
|
|
|
::Users::UpdateService.new(current_user, user: user).execute! do |user|
|
|
|
|
codes = user.generate_otp_backup_codes!
|
|
|
|
end
|
|
|
|
|
|
|
|
{ success: true, recovery_codes: codes }
|
|
|
|
end
|
|
|
|
|
2020-11-02 10:08:52 -05:00
|
|
|
post '/personal_access_token', feature_category: :authentication_and_authorization do
|
2020-08-05 14:09:49 -04:00
|
|
|
status 200
|
|
|
|
|
|
|
|
actor.update_last_used_at!
|
|
|
|
user = actor.user
|
|
|
|
|
2021-03-31 11:10:27 -04:00
|
|
|
error_message = validate_actor(actor)
|
2020-08-05 14:09:49 -04:00
|
|
|
|
2020-10-16 20:08:46 -04:00
|
|
|
break { success: false, message: 'Deploy keys cannot be used to create personal access tokens' } if actor.key.is_a?(DeployKey)
|
2020-08-05 14:09:49 -04:00
|
|
|
|
2020-10-16 20:08:46 -04:00
|
|
|
if params[:user_id] && user.nil?
|
2020-08-05 14:09:49 -04:00
|
|
|
break { success: false, message: 'Could not find the given user' }
|
2020-10-16 20:08:46 -04:00
|
|
|
elsif error_message
|
|
|
|
break { success: false, message: error_message }
|
2020-08-05 14:09:49 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
if params[:name].blank?
|
|
|
|
break { success: false, message: "No token name specified" }
|
|
|
|
end
|
|
|
|
|
|
|
|
if params[:scopes].blank?
|
|
|
|
break { success: false, message: "No token scopes specified" }
|
|
|
|
end
|
|
|
|
|
|
|
|
invalid_scope = params[:scopes].find { |scope| VALID_PAT_SCOPES.exclude?(scope.to_sym) }
|
|
|
|
|
|
|
|
if invalid_scope
|
|
|
|
valid_scopes = VALID_PAT_SCOPES.map(&:to_s).sort
|
|
|
|
break { success: false, message: "Invalid scope: '#{invalid_scope}'. Valid scopes are: #{valid_scopes}" }
|
|
|
|
end
|
|
|
|
|
|
|
|
begin
|
|
|
|
expires_at = params[:expires_at].presence && Date.parse(params[:expires_at])
|
|
|
|
rescue ArgumentError
|
|
|
|
break { success: false, message: "Invalid token expiry date: '#{params[:expires_at]}'" }
|
|
|
|
end
|
|
|
|
|
2020-08-27 08:10:20 -04:00
|
|
|
result = ::PersonalAccessTokens::CreateService.new(
|
2020-11-09 07:09:24 -05:00
|
|
|
current_user: user, target_user: user, params: { name: params[:name], scopes: params[:scopes], expires_at: expires_at }
|
2020-08-27 08:10:20 -04:00
|
|
|
).execute
|
2020-08-05 14:09:49 -04:00
|
|
|
|
2020-08-27 08:10:20 -04:00
|
|
|
unless result.status == :success
|
|
|
|
break { success: false, message: "Failed to create token: #{result.message}" }
|
2020-08-05 14:09:49 -04:00
|
|
|
end
|
|
|
|
|
2020-08-27 08:10:20 -04:00
|
|
|
access_token = result.payload[:personal_access_token]
|
|
|
|
|
2020-08-05 14:09:49 -04:00
|
|
|
{ success: true, token: access_token.token, scopes: access_token.scopes, expires_at: access_token.expires_at }
|
|
|
|
end
|
|
|
|
|
2020-11-02 10:08:52 -05:00
|
|
|
post '/pre_receive', feature_category: :source_code_management do
|
2019-09-03 18:07:49 -04:00
|
|
|
status 200
|
|
|
|
|
|
|
|
reference_counter_increased = Gitlab::ReferenceCounter.new(params[:gl_repository]).increase
|
|
|
|
|
|
|
|
{ reference_counter_increased: reference_counter_increased }
|
|
|
|
end
|
|
|
|
|
2020-11-02 10:08:52 -05:00
|
|
|
post '/post_receive', feature_category: :source_code_management do
|
2019-09-03 18:07:49 -04:00
|
|
|
status 200
|
|
|
|
|
2020-03-04 19:07:49 -05:00
|
|
|
response = PostReceiveService.new(actor.user, repository, project, params).execute
|
2019-09-03 18:07:49 -04:00
|
|
|
|
|
|
|
present response, with: Entities::InternalPostReceive::Response
|
|
|
|
end
|
2020-10-16 20:08:46 -04:00
|
|
|
|
2021-02-09 10:09:39 -05:00
|
|
|
# This endpoint was added in https://gitlab.com/gitlab-org/gitlab/-/issues/212308
|
|
|
|
# It was added with the plan to be used by GitLab PAM module but we
|
|
|
|
# decided to pursue a different approach, so it's currently not used.
|
|
|
|
# We might revive the PAM module though as it provides better user
|
|
|
|
# flow.
|
2020-11-02 10:08:52 -05:00
|
|
|
post '/two_factor_config', feature_category: :authentication_and_authorization do
|
2020-10-16 20:08:46 -04:00
|
|
|
status 200
|
|
|
|
|
|
|
|
break { success: false } unless Feature.enabled?(:two_factor_for_cli)
|
|
|
|
|
|
|
|
actor.update_last_used_at!
|
|
|
|
user = actor.user
|
|
|
|
|
2021-03-31 11:10:27 -04:00
|
|
|
error_message = validate_actor(actor)
|
2020-10-16 20:08:46 -04:00
|
|
|
|
|
|
|
if error_message
|
|
|
|
{ success: false, message: error_message }
|
|
|
|
elsif actor.key.is_a?(DeployKey)
|
|
|
|
{ success: true, two_factor_required: false }
|
|
|
|
else
|
|
|
|
{
|
|
|
|
success: true,
|
|
|
|
two_factor_required: user.two_factor_enabled?
|
|
|
|
}
|
|
|
|
end
|
|
|
|
end
|
2020-10-17 20:09:17 -04:00
|
|
|
|
2022-05-12 05:08:08 -04:00
|
|
|
post '/two_factor_push_otp_check', feature_category: :authentication_and_authorization do
|
|
|
|
status 200
|
|
|
|
|
|
|
|
two_factor_push_otp_check
|
|
|
|
end
|
|
|
|
|
|
|
|
post '/two_factor_manual_otp_check', feature_category: :authentication_and_authorization do
|
|
|
|
status 200
|
|
|
|
|
|
|
|
two_factor_manual_otp_check
|
2020-10-17 20:09:17 -04:00
|
|
|
end
|
2019-09-03 18:07:49 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2019-09-13 09:26:31 -04:00
|
|
|
|
2021-05-11 17:10:21 -04:00
|
|
|
API::Internal::Base.prepend_mod_with('API::Internal::Base')
|