BigW Consortium Gitlab

rack_attack.rb.example 1.33 KB
Newer Older
1 2
# 1. Rename this file to rack_attack.rb
# 2. Review the paths_to_be_protected and add any other path you need protecting
3
#
4
# If you change this file in a Merge Request, please also create a Merge Request on https://gitlab.com/gitlab-org/omnibus-gitlab/merge_requests
5 6

paths_to_be_protected = [
Valery Sizov committed
7 8 9 10 11 12
  "#{Rails.application.config.relative_url_root}/users/password",
  "#{Rails.application.config.relative_url_root}/users/sign_in",
  "#{Rails.application.config.relative_url_root}/api/#{API::API.version}/session.json",
  "#{Rails.application.config.relative_url_root}/api/#{API::API.version}/session",
  "#{Rails.application.config.relative_url_root}/users",
  "#{Rails.application.config.relative_url_root}/users/confirmation",
13 14
  "#{Rails.application.config.relative_url_root}/unsubscribes/",
  "#{Rails.application.config.relative_url_root}/import/github/personal_access_token"
15

16
]
17

18 19 20
# Create one big regular expression that matches strings starting with any of
# the paths_to_be_protected.
paths_regex = Regexp.union(paths_to_be_protected.map { |path| /\A#{Regexp.escape(path)}/ })
21
rack_attack_enabled = Gitlab.config.rack_attack.git_basic_auth['enabled']
22

23
unless Rails.env.test? || !rack_attack_enabled
24
  Rack::Attack.throttle('protected paths', limit: 10, period: 60.seconds) do |req|
25 26
    if req.post? && req.path =~ paths_regex
      req.ip
27
    end
28
  end
29
end