2022-01-11 01:10:58 -05:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
RSpec.describe 'Recursive webhook detection', :sidekiq_inline, :clean_gitlab_redis_shared_state, :request_store do
|
|
|
|
include StubRequests
|
|
|
|
|
|
|
|
let_it_be(:user) { create(:user) }
|
|
|
|
let_it_be(:project) { create(:project, :repository, namespace: user.namespace, creator: user) }
|
|
|
|
let_it_be(:merge_request) { create(:merge_request, source_project: project) }
|
|
|
|
let_it_be(:project_hook) { create(:project_hook, project: project, merge_requests_events: true) }
|
|
|
|
let_it_be(:system_hook) { create(:system_hook, merge_requests_events: true) }
|
|
|
|
|
2022-01-26 07:18:17 -05:00
|
|
|
let(:stubbed_project_hook_hostname) { stubbed_hostname(project_hook.url, hostname: stubbed_project_hook_ip_address) }
|
|
|
|
let(:stubbed_system_hook_hostname) { stubbed_hostname(system_hook.url, hostname: stubbed_system_hook_ip_address) }
|
|
|
|
let(:stubbed_project_hook_ip_address) { '8.8.8.8' }
|
|
|
|
let(:stubbed_system_hook_ip_address) { '8.8.8.9' }
|
|
|
|
|
2022-01-11 01:10:58 -05:00
|
|
|
# Trigger a change to the merge request to fire the webhooks.
|
|
|
|
def trigger_web_hooks
|
|
|
|
params = { merge_request: { description: FFaker::Lorem.sentence } }
|
|
|
|
put project_merge_request_path(project, merge_request), params: params, headers: headers
|
|
|
|
end
|
|
|
|
|
|
|
|
def stub_requests
|
2022-01-26 07:18:17 -05:00
|
|
|
stub_full_request(project_hook.url, method: :post, ip_address: stubbed_project_hook_ip_address)
|
|
|
|
stub_full_request(system_hook.url, method: :post, ip_address: stubbed_system_hook_ip_address)
|
2022-01-11 01:10:58 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
login_as(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the request headers include the recursive webhook detection header' do
|
|
|
|
let(:uuid) { SecureRandom.uuid }
|
|
|
|
let(:headers) { { Gitlab::WebHooks::RecursionDetection::UUID::HEADER => uuid } }
|
|
|
|
|
|
|
|
it 'executes all webhooks, logs no errors, and the webhook requests contain the same UUID header', :aggregate_failures do
|
|
|
|
stub_requests
|
|
|
|
|
|
|
|
expect(Gitlab::AuthLogger).not_to receive(:error)
|
|
|
|
|
|
|
|
trigger_web_hooks
|
|
|
|
|
2022-01-26 07:18:17 -05:00
|
|
|
expect(WebMock).to have_requested(:post, stubbed_project_hook_hostname)
|
2022-01-11 01:10:58 -05:00
|
|
|
.with { |req| req.headers['X-Gitlab-Event-Uuid'] == uuid }
|
|
|
|
.once
|
2022-01-26 07:18:17 -05:00
|
|
|
expect(WebMock).to have_requested(:post, stubbed_system_hook_hostname)
|
2022-01-11 01:10:58 -05:00
|
|
|
.with { |req| req.headers['X-Gitlab-Event-Uuid'] == uuid }
|
|
|
|
.once
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when one of the webhooks is recursive' do
|
|
|
|
before do
|
|
|
|
# Recreate the necessary state for the previous request to be
|
|
|
|
# considered made from the webhook.
|
|
|
|
Gitlab::WebHooks::RecursionDetection.set_request_uuid(uuid)
|
|
|
|
Gitlab::WebHooks::RecursionDetection.register!(project_hook)
|
|
|
|
Gitlab::WebHooks::RecursionDetection.set_request_uuid(nil)
|
|
|
|
end
|
|
|
|
|
2022-01-26 07:18:17 -05:00
|
|
|
it 'blocks and logs an error for the recursive webhook, but execute the non-recursive webhook', :aggregate_failures do
|
2022-01-11 01:10:58 -05:00
|
|
|
stub_requests
|
|
|
|
|
|
|
|
expect(Gitlab::AuthLogger).to receive(:error).with(
|
|
|
|
include(
|
2022-01-26 07:18:17 -05:00
|
|
|
message: 'Recursive webhook blocked from executing',
|
2022-01-11 01:10:58 -05:00
|
|
|
hook_id: project_hook.id,
|
|
|
|
recursion_detection: {
|
|
|
|
uuid: uuid,
|
|
|
|
ids: [project_hook.id]
|
|
|
|
}
|
|
|
|
)
|
2022-01-26 07:18:17 -05:00
|
|
|
).once
|
2022-01-11 01:10:58 -05:00
|
|
|
|
|
|
|
trigger_web_hooks
|
|
|
|
|
2022-01-26 07:18:17 -05:00
|
|
|
expect(WebMock).not_to have_requested(:post, stubbed_project_hook_hostname)
|
|
|
|
expect(WebMock).to have_requested(:post, stubbed_system_hook_hostname).once
|
2022-01-11 01:10:58 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the count limit has been reached' do
|
|
|
|
let_it_be(:previous_hooks) { create_list(:project_hook, 3) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_const('Gitlab::WebHooks::RecursionDetection::COUNT_LIMIT', 2)
|
|
|
|
# Recreate the necessary state for a number of previous webhooks to
|
|
|
|
# have been triggered previously.
|
|
|
|
Gitlab::WebHooks::RecursionDetection.set_request_uuid(uuid)
|
|
|
|
previous_hooks.each { Gitlab::WebHooks::RecursionDetection.register!(_1) }
|
|
|
|
Gitlab::WebHooks::RecursionDetection.set_request_uuid(nil)
|
|
|
|
end
|
|
|
|
|
2022-01-26 07:18:17 -05:00
|
|
|
it 'blocks and logs errors for all hooks', :aggregate_failures do
|
2022-01-11 01:10:58 -05:00
|
|
|
stub_requests
|
|
|
|
previous_hook_ids = previous_hooks.map(&:id)
|
|
|
|
|
|
|
|
expect(Gitlab::AuthLogger).to receive(:error).with(
|
|
|
|
include(
|
2022-01-26 07:18:17 -05:00
|
|
|
message: 'Recursive webhook blocked from executing',
|
2022-01-11 01:10:58 -05:00
|
|
|
hook_id: project_hook.id,
|
|
|
|
recursion_detection: {
|
|
|
|
uuid: uuid,
|
|
|
|
ids: include(*previous_hook_ids)
|
|
|
|
}
|
|
|
|
)
|
2022-01-26 07:18:17 -05:00
|
|
|
).once
|
2022-01-11 01:10:58 -05:00
|
|
|
expect(Gitlab::AuthLogger).to receive(:error).with(
|
|
|
|
include(
|
2022-01-26 07:18:17 -05:00
|
|
|
message: 'Recursive webhook blocked from executing',
|
2022-01-11 01:10:58 -05:00
|
|
|
hook_id: system_hook.id,
|
|
|
|
recursion_detection: {
|
|
|
|
uuid: uuid,
|
|
|
|
ids: include(*previous_hook_ids)
|
|
|
|
}
|
|
|
|
)
|
2022-01-26 07:18:17 -05:00
|
|
|
).once
|
2022-01-11 01:10:58 -05:00
|
|
|
|
|
|
|
trigger_web_hooks
|
|
|
|
|
2022-01-26 07:18:17 -05:00
|
|
|
expect(WebMock).not_to have_requested(:post, stubbed_project_hook_hostname)
|
|
|
|
expect(WebMock).not_to have_requested(:post, stubbed_system_hook_hostname)
|
2022-01-11 01:10:58 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the recursive webhook detection header is absent' do
|
|
|
|
let(:headers) { {} }
|
|
|
|
|
|
|
|
let(:uuid_header_spy) do
|
|
|
|
Class.new do
|
|
|
|
attr_reader :values
|
|
|
|
|
|
|
|
def initialize
|
|
|
|
@values = []
|
|
|
|
end
|
|
|
|
|
|
|
|
def to_proc
|
|
|
|
proc do |method, *args|
|
|
|
|
method.call(*args).tap do |headers|
|
|
|
|
@values << headers[Gitlab::WebHooks::RecursionDetection::UUID::HEADER]
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end.new
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow(Gitlab::WebHooks::RecursionDetection).to receive(:header).at_least(:once).and_wrap_original(&uuid_header_spy)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'executes all webhooks, logs no errors, and the webhook requests contain different UUID headers', :aggregate_failures do
|
|
|
|
stub_requests
|
|
|
|
|
|
|
|
expect(Gitlab::AuthLogger).not_to receive(:error)
|
|
|
|
|
|
|
|
trigger_web_hooks
|
|
|
|
|
|
|
|
uuid_headers = uuid_header_spy.values
|
|
|
|
|
|
|
|
expect(uuid_headers).to all(be_present)
|
|
|
|
expect(uuid_headers.uniq.length).to eq(2)
|
2022-01-26 07:18:17 -05:00
|
|
|
expect(WebMock).to have_requested(:post, stubbed_project_hook_hostname)
|
2022-01-11 01:10:58 -05:00
|
|
|
.with { |req| uuid_headers.include?(req.headers['X-Gitlab-Event-Uuid']) }
|
|
|
|
.once
|
2022-01-26 07:18:17 -05:00
|
|
|
expect(WebMock).to have_requested(:post, stubbed_system_hook_hostname)
|
2022-01-11 01:10:58 -05:00
|
|
|
.with { |req| uuid_headers.include?(req.headers['X-Gitlab-Event-Uuid']) }
|
|
|
|
.once
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'uses new UUID values between requests' do
|
|
|
|
stub_requests
|
|
|
|
|
|
|
|
trigger_web_hooks
|
|
|
|
trigger_web_hooks
|
|
|
|
|
|
|
|
uuid_headers = uuid_header_spy.values
|
|
|
|
|
|
|
|
expect(uuid_headers).to all(be_present)
|
|
|
|
expect(uuid_headers.length).to eq(4)
|
|
|
|
expect(uuid_headers.uniq.length).to eq(4)
|
2022-01-26 07:18:17 -05:00
|
|
|
expect(WebMock).to have_requested(:post, stubbed_project_hook_hostname).twice
|
|
|
|
expect(WebMock).to have_requested(:post, stubbed_system_hook_hostname).twice
|
2022-01-11 01:10:58 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|