gitlab-org--gitlab-foss/lib/gitlab/kas.rb

68 lines
1.7 KiB
Ruby

# frozen_string_literal: true
module Gitlab
module Kas
INTERNAL_API_REQUEST_HEADER = 'Gitlab-Kas-Api-Request'
VERSION_FILE = 'GITLAB_KAS_VERSION'
JWT_ISSUER = 'gitlab-kas'
K8S_PROXY_PATH = 'k8s-proxy'
include JwtAuthenticatable
class << self
def verify_api_request(request_headers)
decode_jwt(request_headers[INTERNAL_API_REQUEST_HEADER], issuer: JWT_ISSUER)
rescue JWT::DecodeError
nil
end
def secret_path
Gitlab.config.gitlab_kas.secret_file
end
def ensure_secret!
return if File.exist?(secret_path)
write_secret
end
# Return GitLab KAS version
#
# @return [String] version
def version
@_version ||= Rails.root.join(VERSION_FILE).read.chomp
end
# Return GitLab KAS external_url
#
# @return [String] external_url
def external_url
Gitlab.config.gitlab_kas.external_url
end
def tunnel_url
configured = Gitlab.config.gitlab_kas['external_k8s_proxy_url']
return configured if configured.present?
# Legacy code path. Will be removed when all distributions provide a sane default here
uri = URI.join(external_url, K8S_PROXY_PATH)
uri.scheme = uri.scheme.in?(%w(grpcs wss)) ? 'https' : 'http'
uri.to_s
end
# Return GitLab KAS internal_url
#
# @return [String] internal_url
def internal_url
Gitlab.config.gitlab_kas.internal_url
end
# Return whether GitLab KAS is enabled
#
# @return [Boolean] external_url
def enabled?
!!Gitlab.config['gitlab_kas']&.fetch('enabled', false)
end
end
end
end