Merge remote-tracking branch 'tootsuite/master' into merge-upstream
This commit is contained in:
@@ -14,40 +14,45 @@ Paperclip::Attachment.default_options.merge!(
|
||||
)
|
||||
|
||||
if ENV['S3_ENABLED'] == 'true'
|
||||
require 'fog/aws'
|
||||
require 'aws-sdk'
|
||||
Aws.eager_autoload!(services: %w(S3))
|
||||
|
||||
s3_protocol = ENV.fetch('S3_PROTOCOL') { 'https' }
|
||||
s3_hostname = ENV.fetch('S3_HOSTNAME') { "s3-#{ENV['S3_REGION']}.amazonaws.com" }
|
||||
aws_signature_version = ENV['S3_SIGNATURE_VERSION'] == 's3' ? 2 : ENV['S3_SIGNATURE_VERSION'].to_i
|
||||
aws_signature_version = 4 if aws_signature_version.zero?
|
||||
s3_region = ENV.fetch('S3_REGION') { 'us-east-1' }
|
||||
s3_protocol = ENV.fetch('S3_PROTOCOL') { 'https' }
|
||||
s3_hostname = ENV.fetch('S3_HOSTNAME') { "s3-#{s3_region}.amazonaws.com" }
|
||||
|
||||
Paperclip::Attachment.default_options.merge!(
|
||||
fog_credentials: {
|
||||
provider: 'AWS',
|
||||
aws_access_key_id: ENV['AWS_ACCESS_KEY_ID'],
|
||||
aws_secret_access_key: ENV['AWS_SECRET_ACCESS_KEY'],
|
||||
aws_signature_version: aws_signature_version,
|
||||
region: ENV.fetch('S3_REGION') { 'us-east-1' },
|
||||
scheme: s3_protocol,
|
||||
host: s3_hostname
|
||||
storage: :s3,
|
||||
s3_protocol: s3_protocol,
|
||||
s3_host_name: s3_hostname,
|
||||
s3_headers: {
|
||||
'Cache-Control' => 'max-age=315576000',
|
||||
},
|
||||
fog_directory: ENV['S3_BUCKET'],
|
||||
fog_options: {
|
||||
acl: ENV.fetch('S3_PERMISSION') { 'public-read' },
|
||||
cache_control: 'max-age=315576000',
|
||||
s3_permissions: ENV.fetch('S3_PERMISSION') { 'public-read' },
|
||||
s3_region: s3_region,
|
||||
s3_credentials: {
|
||||
bucket: ENV['S3_BUCKET'],
|
||||
access_key_id: ENV['AWS_ACCESS_KEY_ID'],
|
||||
secret_access_key: ENV['AWS_SECRET_ACCESS_KEY'],
|
||||
},
|
||||
s3_options: {
|
||||
signature_version: ENV.fetch('S3_SIGNATURE_VERSION') { 'v4' },
|
||||
}
|
||||
)
|
||||
|
||||
if ENV.has_key?('S3_ENDPOINT')
|
||||
Paperclip::Attachment.default_options[:fog_credentials].merge!(
|
||||
Paperclip::Attachment.default_options[:s3_options].merge!(
|
||||
endpoint: ENV['S3_ENDPOINT'],
|
||||
path_style: true
|
||||
force_path_style: true
|
||||
)
|
||||
Paperclip::Attachment.default_options[:fog_host] = "#{s3_protocol}://#{s3_hostname}/#{ENV['S3_BUCKET']}"
|
||||
Paperclip::Attachment.default_options[:url] = ':s3_path_url'
|
||||
end
|
||||
|
||||
if ENV.has_key?('S3_CLOUDFRONT_HOST')
|
||||
Paperclip::Attachment.default_options[:fog_host] = "#{s3_protocol}://#{ENV['S3_CLOUDFRONT_HOST']}"
|
||||
Paperclip::Attachment.default_options.merge!(
|
||||
url: ':s3_alias_url',
|
||||
s3_host_alias: ENV['S3_CLOUDFRONT_HOST']
|
||||
)
|
||||
end
|
||||
elsif ENV['SWIFT_ENABLED'] == 'true'
|
||||
require 'fog/openstack'
|
||||
|
||||
@@ -1,6 +1,43 @@
|
||||
# frozen_string_literal: true
|
||||
|
||||
require 'doorkeeper/grape/authorization_decorator'
|
||||
|
||||
class Rack::Attack
|
||||
class Request
|
||||
def authenticated_token
|
||||
return @token if defined?(@token)
|
||||
|
||||
@token = Doorkeeper::OAuth::Token.authenticate(
|
||||
Doorkeeper::Grape::AuthorizationDecorator.new(self),
|
||||
*Doorkeeper.configuration.access_token_methods
|
||||
)
|
||||
end
|
||||
|
||||
def authenticated_user_id
|
||||
authenticated_token&.resource_owner_id
|
||||
end
|
||||
|
||||
def unauthenticated?
|
||||
!authenticated_user_id
|
||||
end
|
||||
|
||||
def api_request?
|
||||
path.start_with?('/api')
|
||||
end
|
||||
|
||||
def web_request?
|
||||
!api_request?
|
||||
end
|
||||
end
|
||||
|
||||
PROTECTED_PATHS = %w(
|
||||
/auth/sign_in
|
||||
/auth
|
||||
/auth/password
|
||||
).freeze
|
||||
|
||||
PROTECTED_PATHS_REGEX = Regexp.union(PROTECTED_PATHS.map { |path| /\A#{Regexp.escape(path)}/ })
|
||||
|
||||
# Always allow requests from localhost
|
||||
# (blocklist & throttles are skipped)
|
||||
Rack::Attack.safelist('allow from localhost') do |req|
|
||||
@@ -8,24 +45,16 @@ class Rack::Attack
|
||||
'127.0.0.1' == req.ip || '::1' == req.ip
|
||||
end
|
||||
|
||||
# Rate limits for the API
|
||||
throttle('api', limit: 300, period: 5.minutes) do |req|
|
||||
req.ip if req.path =~ /\A\/api\/v/
|
||||
throttle('throttle_authenticated_api', limit: 300, period: 5.minutes) do |req|
|
||||
req.api_request? && req.authenticated_user_id
|
||||
end
|
||||
|
||||
# Rate limit logins
|
||||
throttle('login', limit: 5, period: 5.minutes) do |req|
|
||||
req.ip if req.path == '/auth/sign_in' && req.post?
|
||||
throttle('throttle_unauthenticated_api', limit: 7_500, period: 5.minutes) do |req|
|
||||
req.ip if req.api_request?
|
||||
end
|
||||
|
||||
# Rate limit sign-ups
|
||||
throttle('register', limit: 5, period: 5.minutes) do |req|
|
||||
req.ip if req.path == '/auth' && req.post?
|
||||
end
|
||||
|
||||
# Rate limit forgotten passwords
|
||||
throttle('reminder', limit: 5, period: 5.minutes) do |req|
|
||||
req.ip if req.path == '/auth/password' && req.post?
|
||||
throttle('protected_paths', limit: 5, period: 5.minutes) do |req|
|
||||
req.ip if req.post? && req.path =~ PROTECTED_PATHS_REGEX
|
||||
end
|
||||
|
||||
self.throttled_response = lambda do |env|
|
||||
|
||||
Reference in New Issue
Block a user