summaryrefslogtreecommitdiff
path: root/app
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2020-03-16 03:09:14 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2020-03-16 03:09:14 +0000
commit78fe72d153260c355fdfd533b125026cce310da7 (patch)
tree0d90106443bea87cc24e2834273ae6c8dcac0260 /app
parent88797b994a7dfd9bfab2a5d5431f088f17078b9f (diff)
downloadgitlab-ce-78fe72d153260c355fdfd533b125026cce310da7.tar.gz
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'app')
-rw-r--r--app/models/application_setting_implementation.rb21
-rw-r--r--app/uploaders/upload_type_check.rb98
2 files changed, 18 insertions, 101 deletions
diff --git a/app/models/application_setting_implementation.rb b/app/models/application_setting_implementation.rb
index d1a919fc01a..5ad382d8670 100644
--- a/app/models/application_setting_implementation.rb
+++ b/app/models/application_setting_implementation.rb
@@ -361,18 +361,33 @@ module ApplicationSettingImplementation
def separate_whitelists(string_array)
string_array.reduce([[], []]) do |(ip_whitelist, domain_whitelist), string|
- ip_obj = Gitlab::Utils.string_to_ip_object(string)
+ address, port = parse_addr_and_port(string)
+
+ ip_obj = Gitlab::Utils.string_to_ip_object(address)
if ip_obj
- ip_whitelist << ip_obj
+ ip_whitelist << Gitlab::UrlBlockers::IpWhitelistEntry.new(ip_obj, port: port)
else
- domain_whitelist << string
+ domain_whitelist << Gitlab::UrlBlockers::DomainWhitelistEntry.new(address, port: port)
end
[ip_whitelist, domain_whitelist]
end
end
+ def parse_addr_and_port(str)
+ case str
+ when /\A\[(?<address> .* )\]:(?<port> \d+ )\z/x # string like "[::1]:80"
+ address, port = $~[:address], $~[:port]
+ when /\A(?<address> [^:]+ ):(?<port> \d+ )\z/x # string like "127.0.0.1:80"
+ address, port = $~[:address], $~[:port]
+ else # string with no port number
+ address, port = str, nil
+ end
+
+ [address, port&.to_i]
+ end
+
def array_to_string(arr)
arr&.join("\n")
end
diff --git a/app/uploaders/upload_type_check.rb b/app/uploaders/upload_type_check.rb
deleted file mode 100644
index 2837b001660..00000000000
--- a/app/uploaders/upload_type_check.rb
+++ /dev/null
@@ -1,98 +0,0 @@
-# frozen_string_literal: true
-
-# Ensure that uploaded files are what they say they are for security and
-# handling purposes. The checks are not 100% reliable so we err on the side of
-# caution and allow by default, and deny when we're confident of a fail state.
-#
-# Include this concern, then call `check_upload_type` to check all
-# uploads. Attach a `mime_type` or `extensions` parameter to only check
-# specific upload types. Both parameters will be normalized to a MIME type and
-# checked against the inferred MIME type of the upload content and filename
-# extension.
-#
-# class YourUploader
-# include UploadTypeCheck::Concern
-# check_upload_type mime_types: ['image/png', /image\/jpe?g/]
-#
-# # or...
-#
-# check_upload_type extensions: ['png', 'jpg', 'jpeg']
-# end
-#
-# The mime_types parameter can accept `NilClass`, `String`, `Regexp`,
-# `Array[String, Regexp]`. This matches the CarrierWave `extension_whitelist`
-# and `content_type_whitelist` family of behavior.
-#
-# The extensions parameter can accept `NilClass`, `String`, `Array[String]`.
-module UploadTypeCheck
- module Concern
- extend ActiveSupport::Concern
-
- class_methods do
- def check_upload_type(mime_types: nil, extensions: nil)
- define_method :check_upload_type_callback do |file|
- magic_file = MagicFile.new(file.to_file)
-
- # Map file extensions back to mime types.
- if extensions
- mime_types = Array(mime_types) +
- Array(extensions).map { |e| MimeMagic::EXTENSIONS[e] }
- end
-
- if mime_types.nil? || magic_file.matches_mime_types?(mime_types)
- check_content_matches_extension!(magic_file)
- end
- end
- before :cache, :check_upload_type_callback
- end
- end
-
- def check_content_matches_extension!(magic_file)
- return if magic_file.ambiguous_type?
-
- if magic_file.magic_type != magic_file.ext_type
- raise CarrierWave::IntegrityError, 'Content type does not match file extension'
- end
- end
- end
-
- # Convenience class to wrap MagicMime objects.
- class MagicFile
- attr_reader :file
-
- def initialize(file)
- @file = file
- end
-
- def magic_type
- @magic_type ||= MimeMagic.by_magic(file)
- end
-
- def ext_type
- @ext_type ||= MimeMagic.by_path(file.path)
- end
-
- def magic_type_type
- magic_type&.type
- end
-
- def ext_type_type
- ext_type&.type
- end
-
- def matches_mime_types?(mime_types)
- Array(mime_types).any? do |mt|
- magic_type_type =~ /\A#{mt}\z/ || ext_type_type =~ /\A#{mt}\z/
- end
- end
-
- # - Both types unknown or text/plain.
- # - Ambiguous magic type with text extension. Plain text file.
- # - Text magic type with ambiguous extension. TeX file missing extension.
- def ambiguous_type?
- (ext_type.to_s.blank? && magic_type.to_s.blank?) ||
- (magic_type.to_s.blank? && ext_type_type == 'text/plain') ||
- (ext_type.to_s.blank? && magic_type_type == 'text/plain')
- end
- end
-end