Files
gitlab-ce/lib/api/internal/shellhorse.rb
2025-07-21 18:18:14 +00:00

83 lines
3.2 KiB
Ruby

# frozen_string_literal: true
module API
module Internal
class Shellhorse < ::API::Base
before { authenticate_by_gitlab_shell_or_workhorse_token! }
helpers ::API::Helpers::InternalHelpers
COMMANDS_TO_AUDIT = %w[git-upload-pack git-receive-pack].freeze
helpers do
def check_clone_or_pull_or_push_verb(params)
return 'push' if params[:action] == 'git-receive-pack'
# we must set the default value for wants/haves because
# gitlab shell/workhorse will trim the whole posted params
# json key if its value is 0
wants = haves = 0
if params.key?(:packfile_stats)
wants = Integer(params[:packfile_stats][:wants]) if params[:packfile_stats][:wants].present?
haves = Integer(params[:packfile_stats][:haves]) if params[:packfile_stats][:haves].present?
end
wants > 0 && haves == 0 ? 'clone' : 'pull'
end
end
namespace 'internal' do
namespace 'shellhorse' do
params do
requires :action, type: String
requires :protocol, type: String
requires :gl_repository, type: String # repository identifier, such as project-7
requires :changes, type: String
optional :check_ip, type: String
optional :packfile_stats, type: Hash do
# wants is the number of objects the client announced it wants.
optional :wants, type: Integer
# haves is the number of objects the client announced it has.
optional :haves, type: Integer
end
end
post '/git_audit_event', feature_category: :source_code_management do
unless COMMANDS_TO_AUDIT.include?(params[:action])
break response_with_status(code: 400, success: false, message: "No valid action specified")
end
check_result = access_check_result
break check_result if unsuccessful_response?(check_result)
unless need_git_audit_event?
break response_with_status(code: 200, success: false, message: "No git audit event needed")
end
unless check_result.is_a?(::Gitlab::GitAccessResult::Success)
break response_with_status(code: 500, success: false,
message: ::API::Helpers::InternalHelpers::UNKNOWN_CHECK_RESULT_ERROR)
end
audit_message = {
protocol: params[:protocol],
action: params[:action],
verb: check_clone_or_pull_or_push_verb(params)
}
# If the protocol is SSH, we need to send the original IP from the PROXY
# protocol to the audit streaming event. The original IP from gitlab-shell
# is set through the `check_ip` parameter.
audit_message[:ip_address] = params[:check_ip] if include_ip_address_in_audit_event?(params[:check_ip])
send_git_audit_streaming_event(audit_message)
response_with_status(message: audit_message.except(:ip_address))
end
end
end
end
end
end
API::Internal::Shellhorse.prepend_mod_with('API::Internal::Shellhorse')