2018-10-22 03:00:50 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2017-03-15 16:09:08 -04:00
|
|
|
require 'resolv'
|
|
|
|
|
|
|
|
module Gitlab
|
|
|
|
class UrlBlocker
|
2018-03-28 13:27:16 -04:00
|
|
|
BlockedUrlError = Class.new(StandardError)
|
2017-03-18 13:56:05 -04:00
|
|
|
|
2018-03-28 13:27:16 -04:00
|
|
|
class << self
|
2018-06-11 09:29:37 -04:00
|
|
|
def validate!(url, allow_localhost: false, allow_local_network: true, enforce_user: false, ports: [], protocols: [])
|
2018-03-28 13:27:16 -04:00
|
|
|
return true if url.nil?
|
2017-03-15 16:09:08 -04:00
|
|
|
|
|
|
|
begin
|
|
|
|
uri = Addressable::URI.parse(url)
|
2018-04-02 11:13:23 -04:00
|
|
|
rescue Addressable::URI::InvalidURIError
|
|
|
|
raise BlockedUrlError, "URI is invalid"
|
|
|
|
end
|
2017-03-15 16:09:08 -04:00
|
|
|
|
2018-04-02 11:13:23 -04:00
|
|
|
# Allow imports from the GitLab instance itself but only from the configured ports
|
|
|
|
return true if internal?(uri)
|
2018-03-13 18:38:25 -04:00
|
|
|
|
2018-04-02 11:13:23 -04:00
|
|
|
port = uri.port || uri.default_port
|
2018-06-01 07:43:53 -04:00
|
|
|
validate_protocol!(uri.scheme, protocols)
|
|
|
|
validate_port!(port, ports) if ports.any?
|
2018-06-11 09:29:37 -04:00
|
|
|
validate_user!(uri.user) if enforce_user
|
2018-04-02 11:13:23 -04:00
|
|
|
validate_hostname!(uri.hostname)
|
2018-03-28 13:27:16 -04:00
|
|
|
|
2018-04-02 11:13:23 -04:00
|
|
|
begin
|
|
|
|
addrs_info = Addrinfo.getaddrinfo(uri.hostname, port, nil, :STREAM)
|
2017-11-07 03:30:38 -05:00
|
|
|
rescue SocketError
|
2018-04-02 11:13:23 -04:00
|
|
|
return true
|
2017-03-15 16:09:08 -04:00
|
|
|
end
|
|
|
|
|
2018-04-02 11:13:23 -04:00
|
|
|
validate_localhost!(addrs_info) unless allow_localhost
|
2018-04-02 11:13:47 -04:00
|
|
|
validate_local_network!(addrs_info) unless allow_local_network
|
2018-08-11 06:38:21 -04:00
|
|
|
validate_link_local!(addrs_info) unless allow_local_network
|
2018-04-02 11:13:23 -04:00
|
|
|
|
2018-03-28 13:27:16 -04:00
|
|
|
true
|
|
|
|
end
|
|
|
|
|
|
|
|
def blocked_url?(*args)
|
|
|
|
validate!(*args)
|
|
|
|
|
2017-03-15 16:09:08 -04:00
|
|
|
false
|
2018-03-28 13:27:16 -04:00
|
|
|
rescue BlockedUrlError
|
|
|
|
true
|
2017-03-15 16:09:08 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
2018-06-01 07:43:53 -04:00
|
|
|
def validate_port!(port, ports)
|
2018-04-02 11:13:23 -04:00
|
|
|
return if port.blank?
|
|
|
|
# Only ports under 1024 are restricted
|
|
|
|
return if port >= 1024
|
2018-06-01 07:43:53 -04:00
|
|
|
return if ports.include?(port)
|
2018-04-02 11:13:23 -04:00
|
|
|
|
2018-06-01 07:43:53 -04:00
|
|
|
raise BlockedUrlError, "Only allowed ports are #{ports.join(', ')}, and any over 1024"
|
|
|
|
end
|
|
|
|
|
|
|
|
def validate_protocol!(protocol, protocols)
|
|
|
|
if protocol.blank? || (protocols.any? && !protocols.include?(protocol))
|
|
|
|
raise BlockedUrlError, "Only allowed protocols are #{protocols.join(', ')}"
|
|
|
|
end
|
2018-04-02 11:13:23 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def validate_user!(value)
|
|
|
|
return if value.blank?
|
|
|
|
return if value =~ /\A\p{Alnum}/
|
2017-03-15 16:09:08 -04:00
|
|
|
|
2018-04-02 11:13:23 -04:00
|
|
|
raise BlockedUrlError, "Username needs to start with an alphanumeric character"
|
2017-03-15 16:09:08 -04:00
|
|
|
end
|
|
|
|
|
2018-04-02 11:13:23 -04:00
|
|
|
def validate_hostname!(value)
|
|
|
|
return if value.blank?
|
|
|
|
return if value =~ /\A\p{Alnum}/
|
2017-08-08 13:36:24 -04:00
|
|
|
|
2018-04-02 11:13:23 -04:00
|
|
|
raise BlockedUrlError, "Hostname needs to start with an alphanumeric character"
|
|
|
|
end
|
|
|
|
|
|
|
|
def validate_localhost!(addrs_info)
|
|
|
|
local_ips = ["127.0.0.1", "::1", "0.0.0.0"]
|
|
|
|
local_ips.concat(Socket.ip_address_list.map(&:ip_address))
|
|
|
|
|
|
|
|
return if (local_ips & addrs_info.map(&:ip_address)).empty?
|
|
|
|
|
|
|
|
raise BlockedUrlError, "Requests to localhost are not allowed"
|
|
|
|
end
|
|
|
|
|
|
|
|
def validate_local_network!(addrs_info)
|
|
|
|
return unless addrs_info.any? { |addr| addr.ipv4_private? || addr.ipv6_sitelocal? }
|
|
|
|
|
|
|
|
raise BlockedUrlError, "Requests to the local network are not allowed"
|
2017-08-08 13:36:24 -04:00
|
|
|
end
|
|
|
|
|
2018-08-11 06:38:21 -04:00
|
|
|
def validate_link_local!(addrs_info)
|
|
|
|
netmask = IPAddr.new('169.254.0.0/16')
|
|
|
|
return unless addrs_info.any? { |addr| addr.ipv6_linklocal? || netmask.include?(addr.ip_address) }
|
|
|
|
|
|
|
|
raise BlockedUrlError, "Requests to the link local network are not allowed"
|
|
|
|
end
|
|
|
|
|
2017-03-15 16:09:08 -04:00
|
|
|
def internal?(uri)
|
|
|
|
internal_web?(uri) || internal_shell?(uri)
|
|
|
|
end
|
|
|
|
|
|
|
|
def internal_web?(uri)
|
|
|
|
uri.hostname == config.gitlab.host &&
|
|
|
|
(uri.port.blank? || uri.port == config.gitlab.port)
|
|
|
|
end
|
|
|
|
|
|
|
|
def internal_shell?(uri)
|
|
|
|
uri.hostname == config.gitlab_shell.ssh_host &&
|
|
|
|
(uri.port.blank? || uri.port == config.gitlab_shell.ssh_port)
|
|
|
|
end
|
|
|
|
|
|
|
|
def config
|
|
|
|
Gitlab.config
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|