Skip to content
Snippets Groups Projects
  1. Feb 24, 2020
  2. Feb 19, 2020
  3. Feb 11, 2020
  4. Jan 30, 2020
  5. Jan 10, 2020
  6. Dec 19, 2019
  7. Dec 10, 2019
  8. Nov 25, 2019
  9. Oct 11, 2019
  10. Oct 02, 2019
  11. Sep 25, 2019
  12. Sep 01, 2019
  13. Aug 28, 2019
  14. Aug 23, 2019
  15. Aug 09, 2019
  16. Apr 24, 2019
  17. Apr 11, 2019
  18. Apr 10, 2019
  19. Apr 04, 2019
  20. Apr 02, 2019
  21. Feb 13, 2019
  22. Feb 06, 2019
  23. Feb 04, 2019
  24. Jan 31, 2019
    • Nick Thomas's avatar
      Verify that LFS upload requests are genuine · 5b075413
      Nick Thomas authored
      LFS uploads are handled in concert by workhorse and rails. In normal
      use, workhorse:
      
      * Authorizes the request with rails (upload_authorize)
      * Handles the upload of the file to a tempfile - disk or object storage
      * Validates the file size and contents
      * Hands off to rails to complete the upload (upload_finalize)
      
      In `upload_finalize`, the LFS object is linked to the project. As LFS
      objects are deduplicated across all projects, it may already exist. If
      not, the temporary file is copied to the correct place, and will be
      used by all future LFS objects with the same OID.
      
      Workhorse uses the Content-Type of the request to decide to follow this
      routine, as the URLs are ambiguous. If the Content-Type is anything but
      "application/octet-stream", the request is proxied directly to rails,
      on the assumption that this is a normal file edit request. If it's an
      actual LFS request with a different content-type, however, it is routed
      to the Rails `upload_finalize` action, which treats it as an LFS upload
      just as it would a workhorse-modified request.
      
      The outcome is that users can upload LFS objects that don't match the
      declared size or OID. They can also create links to LFS objects they
      don't really own, allowing them to read the contents of files if they
      know just the size or OID.
      
      We can close this hole by requiring requests to `upload_finalize` to be
      sourced from Workhorse. The mechanism to do this already exists.
      Verified
      5b075413
  25. Jan 22, 2019
    • Nick Thomas's avatar
      Verify that LFS upload requests are genuine · 87c5abfc
      Nick Thomas authored
      LFS uploads are handled in concert by workhorse and rails. In normal
      use, workhorse:
      
      * Authorizes the request with rails (upload_authorize)
      * Handles the upload of the file to a tempfile - disk or object storage
      * Validates the file size and contents
      * Hands off to rails to complete the upload (upload_finalize)
      
      In `upload_finalize`, the LFS object is linked to the project. As LFS
      objects are deduplicated across all projects, it may already exist. If
      not, the temporary file is copied to the correct place, and will be
      used by all future LFS objects with the same OID.
      
      Workhorse uses the Content-Type of the request to decide to follow this
      routine, as the URLs are ambiguous. If the Content-Type is anything but
      "application/octet-stream", the request is proxied directly to rails,
      on the assumption that this is a normal file edit request. If it's an
      actual LFS request with a different content-type, however, it is routed
      to the Rails `upload_finalize` action, which treats it as an LFS upload
      just as it would a workhorse-modified request.
      
      The outcome is that users can upload LFS objects that don't match the
      declared size or OID. They can also create links to LFS objects they
      don't really own, allowing them to read the contents of files if they
      know just the size or OID.
      
      We can close this hole by requiring requests to `upload_finalize` to be
      sourced from Workhorse. The mechanism to do this already exists.
      Verified
      87c5abfc
    • Andrew Newdigate's avatar
      Upgrade gitlab-workhorse to 8.1.0 · 51322670
      Andrew Newdigate authored and Nick Thomas's avatar Nick Thomas committed
      51322670
  26. Dec 11, 2018
  27. Dec 10, 2018
  28. Dec 06, 2018
  29. Dec 04, 2018
  30. Nov 30, 2018
  31. Nov 28, 2018
  32. Nov 23, 2018
  33. Nov 14, 2018
  34. Nov 07, 2018
  35. Oct 01, 2018
  36. Sep 27, 2018
  37. Sep 06, 2018
Loading