rack_attack.rb.in 1.52 KB
Newer Older
1 2 3 4
{{ autogenerated }}
# see:
# https://gitlab.com/gitlab-org/gitlab-ce/blob/master/config/initializers/rack_attack.rb.example
# https://gitlab.com/gitlab-org/omnibus-gitlab/blob/master/files/gitlab-cookbooks/gitlab/templates/default/rack_attack.rb.erb
5
# (last updated for omnibus-gitlab 8.8.9+ce.0-g25376053)
6

7 8
{% from 'macrolib.cfg.in' import cfg  with context %}

9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
# 1. Rename this file to rack_attack.rb
# 2. Review the paths_to_be_protected and add any other path you need protecting
#

paths_to_be_protected = [
  "#{Rails.application.config.relative_url_root}/users/password",
  "#{Rails.application.config.relative_url_root}/users/sign_in",
  "#{Rails.application.config.relative_url_root}/api/#{API::API.version}/session.json",
  "#{Rails.application.config.relative_url_root}/api/#{API::API.version}/session",
  "#{Rails.application.config.relative_url_root}/users",
  "#{Rails.application.config.relative_url_root}/users/confirmation",
  "#{Rails.application.config.relative_url_root}/unsubscribes/"

]

# Create one big regular expression that matches strings starting with any of
# the paths_to_be_protected.
paths_regex = Regexp.union(paths_to_be_protected.map { |path| /\A#{Regexp.escape(path)}/ })
27
rack_attack_enabled = Gitlab.config.rack_attack.git_basic_auth['enabled']
28

29
unless Rails.env.test? || !rack_attack_enabled
30
  Rack::Attack.throttle('protected paths', limit: {{ cfg('rate_limit_requests_per_period') }}, period: {{ cfg('rate_limit_period') }}.seconds) do |req|
31 32 33 34 35
    if req.post? && req.path =~ paths_regex
      req.ip
    end
  end
end