gitlab-org--gitlab-foss/app/controllers/projects/git_http_controller.rb

108 lines
2.3 KiB
Ruby
Raw Normal View History

# This file should be identical in GitLab Community Edition and Enterprise Edition
2016-07-20 12:41:26 -04:00
class Projects::GitHttpController < Projects::GitHttpClientController
before_action :verify_workhorse_api!
# GET /foo/bar.git/info/refs?service=git-upload-pack (git pull)
# GET /foo/bar.git/info/refs?service=git-receive-pack (git push)
def info_refs
2016-03-23 13:34:16 -04:00
if upload_pack? && upload_pack_allowed?
2016-03-24 13:58:29 -04:00
render_ok
elsif receive_pack? && receive_pack_allowed?
render_ok
elsif http_blocked?
render_http_not_allowed
2016-03-24 13:58:29 -04:00
else
render_denied
2016-03-23 13:34:16 -04:00
end
end
2016-04-15 06:40:43 -04:00
# POST /foo/bar.git/git-upload-pack (git pull)
def git_upload_pack
if upload_pack? && upload_pack_allowed?
render_ok
else
render_denied
end
end
# POST /foo/bar.git/git-receive-pack" (git push)
def git_receive_pack
if receive_pack? && receive_pack_allowed?
render_ok
else
render_denied
end
2016-03-23 13:34:16 -04:00
end
private
2016-07-20 12:41:26 -04:00
def download_request?
upload_pack?
2016-03-23 13:34:16 -04:00
end
def upload_pack?
git_command == 'git-upload-pack'
2016-03-24 13:58:29 -04:00
end
def receive_pack?
git_command == 'git-receive-pack'
2016-03-24 13:58:29 -04:00
end
def git_command
2016-03-23 13:34:16 -04:00
if action_name == 'info_refs'
2016-03-24 13:58:29 -04:00
params[:service]
2016-03-23 13:34:16 -04:00
else
2016-06-03 08:57:34 -04:00
action_name.dasherize
2016-03-23 13:34:16 -04:00
end
end
2016-04-15 06:40:43 -04:00
2016-03-23 13:34:16 -04:00
def render_ok
set_workhorse_internal_api_content_type
2016-04-06 11:52:12 -04:00
render json: Gitlab::Workhorse.git_http_ok(repository, user)
2016-03-23 13:34:16 -04:00
end
2016-04-15 06:40:43 -04:00
def render_http_not_allowed
render plain: access_check.message, status: :forbidden
end
def render_denied
if user && user.can?(:read_project, project)
render plain: 'Access denied', status: :forbidden
else
# Do not leak information about project existence
render_not_found
end
end
2016-03-23 13:34:16 -04:00
def upload_pack_allowed?
return false unless Gitlab.config.gitlab_shell.upload_pack
if user
access_check.allowed?
2016-03-23 13:34:16 -04:00
else
ci? || project.public?
2016-03-23 13:34:16 -04:00
end
end
2016-03-24 13:58:29 -04:00
def access
@access ||= Gitlab::GitAccess.new(user, project, 'http', authentication_abilities: authentication_abilities)
end
def access_check
# Use the magic string '_any' to indicate we do not know what the
# changes are. This is also what gitlab-shell does.
@access_check ||= access.check(git_command, '_any')
2016-06-22 14:08:02 -04:00
end
def http_blocked?
!access.protocol_allowed?
end
2016-03-24 13:58:29 -04:00
def receive_pack_allowed?
return false unless Gitlab.config.gitlab_shell.receive_pack
access_check.allowed?
2016-03-24 13:58:29 -04:00
end
2016-03-23 13:34:16 -04:00
end