556 lines
19 KiB
Ruby
556 lines
19 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'spec_helper'
|
|
|
|
RSpec.describe WebHookService, :request_store, :clean_gitlab_redis_shared_state do
|
|
include StubRequests
|
|
|
|
let_it_be(:project) { create(:project) }
|
|
let_it_be_with_reload(:project_hook) { create(:project_hook, project: project) }
|
|
|
|
let(:data) do
|
|
{ before: 'oldrev', after: 'newrev', ref: 'ref' }
|
|
end
|
|
|
|
let(:service_instance) { described_class.new(project_hook, data, :push_hooks) }
|
|
|
|
describe '#initialize' do
|
|
before do
|
|
stub_application_setting(setting_name => setting)
|
|
end
|
|
|
|
shared_examples_for 'respects outbound network setting' do
|
|
context 'when local requests are allowed' do
|
|
let(:setting) { true }
|
|
|
|
it { expect(hook.request_options[:allow_local_requests]).to be_truthy }
|
|
end
|
|
|
|
context 'when local requests are not allowed' do
|
|
let(:setting) { false }
|
|
|
|
it { expect(hook.request_options[:allow_local_requests]).to be_falsey }
|
|
end
|
|
end
|
|
|
|
context 'when SystemHook' do
|
|
let(:setting_name) { :allow_local_requests_from_system_hooks }
|
|
let(:hook) { described_class.new(build(:system_hook), data, :system_hook) }
|
|
|
|
include_examples 'respects outbound network setting'
|
|
end
|
|
|
|
context 'when ProjectHook' do
|
|
let(:setting_name) { :allow_local_requests_from_web_hooks_and_services }
|
|
let(:hook) { described_class.new(build(:project_hook), data, :project_hook) }
|
|
|
|
include_examples 'respects outbound network setting'
|
|
end
|
|
end
|
|
|
|
describe '#disabled?' do
|
|
using RSpec::Parameterized::TableSyntax
|
|
|
|
subject { described_class.new(hook, data, :push_hooks, force: forced) }
|
|
|
|
let(:hook) { double(executable?: executable, allow_local_requests?: false) }
|
|
|
|
where(:forced, :executable, :disabled) do
|
|
false | true | false
|
|
false | false | true
|
|
true | true | false
|
|
true | false | false
|
|
end
|
|
|
|
with_them do
|
|
it { is_expected.to have_attributes(disabled?: disabled) }
|
|
end
|
|
end
|
|
|
|
describe '#execute' do
|
|
let!(:uuid) { SecureRandom.uuid }
|
|
let(:headers) do
|
|
{
|
|
'Content-Type' => 'application/json',
|
|
'User-Agent' => "GitLab/#{Gitlab::VERSION}",
|
|
'X-Gitlab-Event' => 'Push Hook',
|
|
'X-Gitlab-Event-UUID' => uuid
|
|
}
|
|
end
|
|
|
|
before do
|
|
# Set a stable value for the `X-Gitlab-Event-UUID` header.
|
|
Gitlab::WebHooks::RecursionDetection.set_request_uuid(uuid)
|
|
end
|
|
|
|
context 'when token is defined' do
|
|
let_it_be(:project_hook) { create(:project_hook, :token) }
|
|
|
|
it 'POSTs to the webhook URL' do
|
|
stub_full_request(project_hook.url, method: :post)
|
|
|
|
service_instance.execute
|
|
|
|
expect(WebMock).to have_requested(:post, stubbed_hostname(project_hook.url)).with(
|
|
headers: headers.merge({ 'X-Gitlab-Token' => project_hook.token })
|
|
).once
|
|
end
|
|
end
|
|
|
|
it 'POSTs the data as JSON' do
|
|
stub_full_request(project_hook.url, method: :post)
|
|
|
|
service_instance.execute
|
|
|
|
expect(WebMock).to have_requested(:post, stubbed_hostname(project_hook.url)).with(
|
|
headers: headers
|
|
).once
|
|
end
|
|
|
|
context 'when the data is a Gitlab::DataBuilder::Pipeline' do
|
|
let(:pipeline) { create(:ci_pipeline, project: project) }
|
|
let(:data) { ::Gitlab::DataBuilder::Pipeline.new(pipeline) }
|
|
|
|
it 'can log the request payload' do
|
|
stub_full_request(project_hook.url, method: :post)
|
|
|
|
# we call this with force to ensure that the logs are written inline,
|
|
# which tests that we can serialize the data to the DB correctly.
|
|
service = described_class.new(project_hook, data, :push_hooks, force: true)
|
|
|
|
expect { service.execute }.to change(::WebHookLog, :count).by(1)
|
|
end
|
|
end
|
|
|
|
context 'when auth credentials are present' do
|
|
let_it_be(:url) {'https://example.org'}
|
|
let_it_be(:project_hook) { create(:project_hook, url: 'https://demo:demo@example.org/') }
|
|
|
|
it 'uses the credentials' do
|
|
stub_full_request(url, method: :post)
|
|
|
|
service_instance.execute
|
|
|
|
expect(WebMock).to have_requested(:post, stubbed_hostname(url)).with(
|
|
headers: headers.merge('Authorization' => 'Basic ZGVtbzpkZW1v')
|
|
).once
|
|
end
|
|
end
|
|
|
|
context 'when auth credentials are partial present' do
|
|
let_it_be(:url) {'https://example.org'}
|
|
let_it_be(:project_hook) { create(:project_hook, url: 'https://demo@example.org/') }
|
|
|
|
it 'uses the credentials anyways' do
|
|
stub_full_request(url, method: :post)
|
|
|
|
service_instance.execute
|
|
|
|
expect(WebMock).to have_requested(:post, stubbed_hostname(url)).with(
|
|
headers: headers.merge('Authorization' => 'Basic ZGVtbzo=')
|
|
).once
|
|
end
|
|
end
|
|
|
|
it 'catches exceptions' do
|
|
stub_full_request(project_hook.url, method: :post).to_raise(StandardError.new('Some error'))
|
|
|
|
expect { service_instance.execute }.to raise_error(StandardError)
|
|
end
|
|
|
|
it 'does not execute disabled hooks' do
|
|
allow(service_instance).to receive(:disabled?).and_return(true)
|
|
|
|
expect(service_instance.execute).to eq({ status: :error, message: 'Hook disabled' })
|
|
end
|
|
|
|
it 'executes and registers the hook with the recursion detection', :aggregate_failures do
|
|
stub_full_request(project_hook.url, method: :post)
|
|
cache_key = Gitlab::WebHooks::RecursionDetection.send(:cache_key_for_hook, project_hook)
|
|
|
|
::Gitlab::Redis::SharedState.with do |redis|
|
|
expect { service_instance.execute }.to change {
|
|
redis.sismember(cache_key, project_hook.id)
|
|
}.to(true)
|
|
end
|
|
|
|
expect(WebMock).to have_requested(:post, stubbed_hostname(project_hook.url))
|
|
.with(headers: headers)
|
|
.once
|
|
end
|
|
|
|
it 'blocks and logs if a recursive web hook is detected', :aggregate_failures do
|
|
stub_full_request(project_hook.url, method: :post)
|
|
Gitlab::WebHooks::RecursionDetection.register!(project_hook)
|
|
|
|
expect(Gitlab::AuthLogger).to receive(:error).with(
|
|
include(
|
|
message: 'Recursive webhook blocked from executing',
|
|
hook_id: project_hook.id,
|
|
hook_type: 'ProjectHook',
|
|
hook_name: 'push_hooks',
|
|
recursion_detection: Gitlab::WebHooks::RecursionDetection.to_log(project_hook),
|
|
'correlation_id' => kind_of(String)
|
|
)
|
|
)
|
|
|
|
service_instance.execute
|
|
|
|
expect(WebMock).not_to have_requested(:post, stubbed_hostname(project_hook.url))
|
|
end
|
|
|
|
it 'blocks and logs if the recursion count limit would be exceeded', :aggregate_failures do
|
|
stub_full_request(project_hook.url, method: :post)
|
|
stub_const("#{Gitlab::WebHooks::RecursionDetection.name}::COUNT_LIMIT", 3)
|
|
previous_hooks = create_list(:project_hook, 3)
|
|
previous_hooks.each { Gitlab::WebHooks::RecursionDetection.register!(_1) }
|
|
|
|
expect(Gitlab::AuthLogger).to receive(:error).with(
|
|
include(
|
|
message: 'Recursive webhook blocked from executing',
|
|
hook_id: project_hook.id,
|
|
hook_type: 'ProjectHook',
|
|
hook_name: 'push_hooks',
|
|
recursion_detection: Gitlab::WebHooks::RecursionDetection.to_log(project_hook),
|
|
'correlation_id' => kind_of(String)
|
|
)
|
|
)
|
|
|
|
service_instance.execute
|
|
|
|
expect(WebMock).not_to have_requested(:post, stubbed_hostname(project_hook.url))
|
|
end
|
|
|
|
it 'handles exceptions' do
|
|
exceptions = Gitlab::HTTP::HTTP_ERRORS + [
|
|
Gitlab::Json::LimitedEncoder::LimitExceeded, URI::InvalidURIError
|
|
]
|
|
|
|
allow(Gitlab::WebHooks::RecursionDetection).to receive(:block?).and_return(false)
|
|
|
|
exceptions.each do |exception_class|
|
|
exception = exception_class.new('Exception message')
|
|
project_hook.enable!
|
|
|
|
stub_full_request(project_hook.url, method: :post).to_raise(exception)
|
|
expect(service_instance.execute).to eq({ status: :error, message: exception.to_s })
|
|
expect { service_instance.execute }.not_to raise_error
|
|
end
|
|
end
|
|
|
|
context 'when url is not encoded' do
|
|
let_it_be(:project_hook) { create(:project_hook, url: 'http://server.com/my path/') }
|
|
|
|
it 'handles exceptions' do
|
|
expect(service_instance.execute).to eq(status: :error, message: 'bad URI(is not URI?): "http://server.com/my path/"')
|
|
expect { service_instance.execute }.not_to raise_error
|
|
end
|
|
end
|
|
|
|
context 'when request body size is too big' do
|
|
it 'does not perform the request' do
|
|
stub_const("#{described_class}::REQUEST_BODY_SIZE_LIMIT", 10.bytes)
|
|
|
|
expect(service_instance.execute).to eq({ status: :error, message: "Gitlab::Json::LimitedEncoder::LimitExceeded" })
|
|
end
|
|
end
|
|
|
|
it 'handles 200 status code' do
|
|
stub_full_request(project_hook.url, method: :post).to_return(status: 200, body: 'Success')
|
|
|
|
expect(service_instance.execute).to include({ status: :success, http_status: 200, message: 'Success' })
|
|
end
|
|
|
|
it 'handles 2xx status codes' do
|
|
stub_full_request(project_hook.url, method: :post).to_return(status: 201, body: 'Success')
|
|
|
|
expect(service_instance.execute).to include({ status: :success, http_status: 201, message: 'Success' })
|
|
end
|
|
|
|
context 'execution logging' do
|
|
context 'with success' do
|
|
before do
|
|
stub_full_request(project_hook.url, method: :post).to_return(status: 200, body: 'Success')
|
|
end
|
|
|
|
context 'when forced' do
|
|
let(:service_instance) { described_class.new(project_hook, data, :push_hooks, force: true) }
|
|
|
|
it 'logs execution inline' do
|
|
expect(::WebHooks::LogExecutionWorker).not_to receive(:perform_async)
|
|
expect(::WebHooks::LogExecutionService)
|
|
.to receive(:new)
|
|
.with(hook: project_hook, log_data: Hash, response_category: :ok)
|
|
.and_return(double(execute: nil))
|
|
|
|
service_instance.execute
|
|
end
|
|
end
|
|
|
|
it 'queues LogExecutionWorker correctly' do
|
|
expect(WebHooks::LogExecutionWorker).to receive(:perform_async)
|
|
.with(
|
|
project_hook.id,
|
|
hash_including(
|
|
trigger: 'push_hooks',
|
|
url: project_hook.url,
|
|
request_headers: headers,
|
|
request_data: data,
|
|
response_body: 'Success',
|
|
response_headers: {},
|
|
response_status: 200,
|
|
execution_duration: be > 0,
|
|
internal_error_message: nil
|
|
),
|
|
:ok,
|
|
nil
|
|
)
|
|
|
|
service_instance.execute
|
|
end
|
|
|
|
it 'queues LogExecutionWorker correctly, resulting in a log record (integration-style test)', :sidekiq_inline do
|
|
expect { service_instance.execute }.to change(::WebHookLog, :count).by(1)
|
|
end
|
|
|
|
it 'does not log in the service itself' do
|
|
expect { service_instance.execute }.not_to change(::WebHookLog, :count)
|
|
end
|
|
end
|
|
|
|
context 'with bad request' do
|
|
before do
|
|
stub_full_request(project_hook.url, method: :post).to_return(status: 400, body: 'Bad request')
|
|
end
|
|
|
|
it 'queues LogExecutionWorker correctly' do
|
|
expect(WebHooks::LogExecutionWorker).to receive(:perform_async)
|
|
.with(
|
|
project_hook.id,
|
|
hash_including(
|
|
trigger: 'push_hooks',
|
|
url: project_hook.url,
|
|
request_headers: headers,
|
|
request_data: data,
|
|
response_body: 'Bad request',
|
|
response_headers: {},
|
|
response_status: 400,
|
|
execution_duration: be > 0,
|
|
internal_error_message: nil
|
|
),
|
|
:failed,
|
|
nil
|
|
)
|
|
|
|
service_instance.execute
|
|
end
|
|
end
|
|
|
|
context 'with exception' do
|
|
before do
|
|
stub_full_request(project_hook.url, method: :post).to_raise(SocketError.new('Some HTTP Post error'))
|
|
end
|
|
|
|
it 'queues LogExecutionWorker correctly' do
|
|
expect(WebHooks::LogExecutionWorker).to receive(:perform_async)
|
|
.with(
|
|
project_hook.id,
|
|
hash_including(
|
|
trigger: 'push_hooks',
|
|
url: project_hook.url,
|
|
request_headers: headers,
|
|
request_data: data,
|
|
response_body: '',
|
|
response_headers: {},
|
|
response_status: 'internal error',
|
|
execution_duration: be > 0,
|
|
internal_error_message: 'Some HTTP Post error'
|
|
),
|
|
:error,
|
|
nil
|
|
)
|
|
|
|
service_instance.execute
|
|
end
|
|
end
|
|
|
|
context 'with unsafe response body' do
|
|
before do
|
|
stub_full_request(project_hook.url, method: :post).to_return(status: 200, body: "\xBB")
|
|
end
|
|
|
|
it 'queues LogExecutionWorker with sanitized response_body' do
|
|
expect(WebHooks::LogExecutionWorker).to receive(:perform_async)
|
|
.with(
|
|
project_hook.id,
|
|
hash_including(
|
|
trigger: 'push_hooks',
|
|
url: project_hook.url,
|
|
request_headers: headers,
|
|
request_data: data,
|
|
response_body: '',
|
|
response_headers: {},
|
|
response_status: 200,
|
|
execution_duration: be > 0,
|
|
internal_error_message: nil
|
|
),
|
|
:ok,
|
|
nil
|
|
)
|
|
|
|
service_instance.execute
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe '#async_execute' do
|
|
def expect_to_perform_worker(hook)
|
|
expect(WebHookWorker).to receive(:perform_async).with(hook.id, data, 'push_hooks', an_instance_of(Hash))
|
|
end
|
|
|
|
def expect_to_rate_limit(hook, threshold:, throttled: false)
|
|
expect(Gitlab::ApplicationRateLimiter).to receive(:throttled?)
|
|
.with(:web_hook_calls, scope: [hook], threshold: threshold)
|
|
.and_return(throttled)
|
|
end
|
|
|
|
context 'when rate limiting is not configured' do
|
|
it 'queues a worker without tracking the call' do
|
|
expect(Gitlab::ApplicationRateLimiter).not_to receive(:throttled?)
|
|
expect_to_perform_worker(project_hook)
|
|
|
|
service_instance.async_execute
|
|
end
|
|
end
|
|
|
|
context 'when rate limiting is configured' do
|
|
let_it_be(:threshold) { 3 }
|
|
let_it_be(:plan_limits) { create(:plan_limits, :default_plan, web_hook_calls: threshold) }
|
|
|
|
it 'queues a worker and tracks the call' do
|
|
expect_to_rate_limit(project_hook, threshold: threshold)
|
|
expect_to_perform_worker(project_hook)
|
|
|
|
service_instance.async_execute
|
|
end
|
|
|
|
context 'when the hook is throttled (via mock)' do
|
|
before do
|
|
expect_to_rate_limit(project_hook, threshold: threshold, throttled: true)
|
|
end
|
|
|
|
it 'does not queue a worker and logs an error' do
|
|
expect(WebHookWorker).not_to receive(:perform_async)
|
|
|
|
expect(Gitlab::AuthLogger).to receive(:error).with(
|
|
include(
|
|
message: 'Webhook rate limit exceeded',
|
|
hook_id: project_hook.id,
|
|
hook_type: 'ProjectHook',
|
|
hook_name: 'push_hooks',
|
|
"correlation_id" => kind_of(String),
|
|
"meta.project" => project.full_path,
|
|
"meta.related_class" => 'ProjectHook',
|
|
"meta.root_namespace" => project.root_namespace.full_path
|
|
)
|
|
)
|
|
|
|
service_instance.async_execute
|
|
end
|
|
end
|
|
|
|
context 'when the hook is throttled (via Redis)', :clean_gitlab_redis_rate_limiting do
|
|
before do
|
|
# Set a high interval to avoid intermittent failures in CI
|
|
allow(Gitlab::ApplicationRateLimiter).to receive(:rate_limits).and_return(
|
|
web_hook_calls: { interval: 1.day }
|
|
)
|
|
|
|
expect_to_perform_worker(project_hook).exactly(threshold).times
|
|
|
|
threshold.times { service_instance.async_execute }
|
|
end
|
|
|
|
it 'stops queueing workers and logs errors' do
|
|
expect(Gitlab::AuthLogger).to receive(:error).twice
|
|
|
|
2.times { service_instance.async_execute }
|
|
end
|
|
|
|
it 'still queues workers for other hooks' do
|
|
other_hook = create(:project_hook)
|
|
|
|
expect_to_perform_worker(other_hook)
|
|
|
|
described_class.new(other_hook, data, :push_hooks).async_execute
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'recursion detection' do
|
|
before do
|
|
# Set a request UUID so `RecursionDetection.block?` will query redis.
|
|
Gitlab::WebHooks::RecursionDetection.set_request_uuid(SecureRandom.uuid)
|
|
end
|
|
|
|
it 'does not queue a worker and logs an error if the call chain limit would be exceeded' do
|
|
stub_const("#{Gitlab::WebHooks::RecursionDetection.name}::COUNT_LIMIT", 3)
|
|
previous_hooks = create_list(:project_hook, 3)
|
|
previous_hooks.each { Gitlab::WebHooks::RecursionDetection.register!(_1) }
|
|
|
|
expect(WebHookWorker).not_to receive(:perform_async)
|
|
expect(Gitlab::AuthLogger).to receive(:error).with(
|
|
include(
|
|
message: 'Recursive webhook blocked from executing',
|
|
hook_id: project_hook.id,
|
|
hook_type: 'ProjectHook',
|
|
hook_name: 'push_hooks',
|
|
recursion_detection: Gitlab::WebHooks::RecursionDetection.to_log(project_hook),
|
|
'correlation_id' => kind_of(String),
|
|
'meta.project' => project.full_path,
|
|
'meta.related_class' => 'ProjectHook',
|
|
'meta.root_namespace' => project.root_namespace.full_path
|
|
)
|
|
)
|
|
|
|
service_instance.async_execute
|
|
end
|
|
|
|
it 'does not queue a worker and logs an error if a recursive call chain is detected' do
|
|
Gitlab::WebHooks::RecursionDetection.register!(project_hook)
|
|
|
|
expect(WebHookWorker).not_to receive(:perform_async)
|
|
expect(Gitlab::AuthLogger).to receive(:error).with(
|
|
include(
|
|
message: 'Recursive webhook blocked from executing',
|
|
hook_id: project_hook.id,
|
|
hook_type: 'ProjectHook',
|
|
hook_name: 'push_hooks',
|
|
recursion_detection: Gitlab::WebHooks::RecursionDetection.to_log(project_hook),
|
|
'correlation_id' => kind_of(String),
|
|
'meta.project' => project.full_path,
|
|
'meta.related_class' => 'ProjectHook',
|
|
'meta.root_namespace' => project.root_namespace.full_path
|
|
)
|
|
)
|
|
|
|
service_instance.async_execute
|
|
end
|
|
end
|
|
|
|
context 'when hook has custom context attributes' do
|
|
it 'includes the attributes in the worker context' do
|
|
expect(WebHookWorker).to receive(:perform_async) do
|
|
expect(Gitlab::ApplicationContext.current).to include(
|
|
'meta.project' => project_hook.project.full_path,
|
|
'meta.root_namespace' => project.root_ancestor.path,
|
|
'meta.related_class' => 'ProjectHook'
|
|
)
|
|
end
|
|
|
|
service_instance.async_execute
|
|
end
|
|
end
|
|
end
|
|
end
|