449 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			449 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Ruby
		
	
	
	
| # frozen_string_literal: true
 | |
| 
 | |
| require 'spec_helper'
 | |
| 
 | |
| RSpec.describe Gitlab::LegacyHTTP, feature_category: :shared do
 | |
|   include StubRequests
 | |
| 
 | |
|   let(:default_options) { Gitlab::HTTP::DEFAULT_TIMEOUT_OPTIONS }
 | |
| 
 | |
|   context 'when allow_local_requests' do
 | |
|     it 'sends the request to the correct URI' do
 | |
|       stub_full_request('https://example.org:8080', ip_address: '8.8.8.8').to_return(status: 200)
 | |
| 
 | |
|       described_class.get('https://example.org:8080', allow_local_requests: false)
 | |
| 
 | |
|       expect(WebMock).to have_requested(:get, 'https://8.8.8.8:8080').once
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   context 'when not allow_local_requests' do
 | |
|     it 'sends the request to the correct URI' do
 | |
|       stub_full_request('https://example.org:8080')
 | |
| 
 | |
|       described_class.get('https://example.org:8080', allow_local_requests: true)
 | |
| 
 | |
|       expect(WebMock).to have_requested(:get, 'https://8.8.8.9:8080').once
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   context 'when reading the response is too slow' do
 | |
|     before_all do
 | |
|       # Override Net::HTTP to add a delay between sending each response chunk
 | |
|       mocked_http = Class.new(Net::HTTP) do
 | |
|         def request(*)
 | |
|           super do |response|
 | |
|             response.instance_eval do
 | |
|               def read_body(*)
 | |
|                 mock_stream = @body.split(' ')
 | |
|                 mock_stream.each do |fragment|
 | |
|                   sleep 0.002.seconds
 | |
| 
 | |
|                   yield fragment if block_given?
 | |
|                 end
 | |
| 
 | |
|                 @body
 | |
|               end
 | |
|             end
 | |
| 
 | |
|             yield response if block_given?
 | |
| 
 | |
|             response
 | |
|           end
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       @original_net_http = Net.send(:remove_const, :HTTP)
 | |
|       @webmock_net_http = WebMock::HttpLibAdapters::NetHttpAdapter.instance_variable_get(:@webMockNetHTTP)
 | |
| 
 | |
|       Net.send(:const_set, :HTTP, mocked_http)
 | |
|       WebMock::HttpLibAdapters::NetHttpAdapter.instance_variable_set(:@webMockNetHTTP, mocked_http)
 | |
| 
 | |
|       # Reload Gitlab::NetHttpAdapter
 | |
|       Gitlab.send(:remove_const, :NetHttpAdapter)
 | |
|       load "#{Rails.root}/lib/gitlab/net_http_adapter.rb"
 | |
|     end
 | |
| 
 | |
|     before do
 | |
|       stub_const("Gitlab::HTTP::DEFAULT_READ_TOTAL_TIMEOUT", 0.001.seconds)
 | |
| 
 | |
|       WebMock.stub_request(:post, /.*/).to_return do
 | |
|         { body: "chunk-1 chunk-2", status: 200 }
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     after(:all) do
 | |
|       Net.send(:remove_const, :HTTP)
 | |
|       Net.send(:const_set, :HTTP, @original_net_http)
 | |
|       WebMock::HttpLibAdapters::NetHttpAdapter.instance_variable_set(:@webMockNetHTTP, @webmock_net_http)
 | |
| 
 | |
|       # Reload Gitlab::NetHttpAdapter
 | |
|       Gitlab.send(:remove_const, :NetHttpAdapter)
 | |
|       load "#{Rails.root}/lib/gitlab/net_http_adapter.rb"
 | |
|     end
 | |
| 
 | |
|     let(:options) { {} }
 | |
| 
 | |
|     subject(:request_slow_responder) { described_class.post('http://example.org', **options) }
 | |
| 
 | |
|     it 'raises an error' do
 | |
|       expect { request_slow_responder }.to raise_error(
 | |
|         Gitlab::HTTP::ReadTotalTimeout, /Request timed out after ?([0-9]*[.])?[0-9]+ seconds/)
 | |
|     end
 | |
| 
 | |
|     context 'and timeout option is greater than DEFAULT_READ_TOTAL_TIMEOUT' do
 | |
|       let(:options) { { timeout: 10.seconds } }
 | |
| 
 | |
|       it 'does not raise an error' do
 | |
|         expect { request_slow_responder }.not_to raise_error
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'and stream_body option is truthy' do
 | |
|       let(:options) { { stream_body: true } }
 | |
| 
 | |
|       it 'does not raise an error' do
 | |
|         expect { request_slow_responder }.not_to raise_error
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   it 'calls a block' do
 | |
|     WebMock.stub_request(:post, /.*/)
 | |
| 
 | |
|     expect { |b| described_class.post('http://example.org', &b) }.to yield_with_args
 | |
|   end
 | |
| 
 | |
|   describe 'allow_local_requests_from_web_hooks_and_services is' do
 | |
|     before do
 | |
|       WebMock.stub_request(:get, /.*/).to_return(status: 200, body: 'Success')
 | |
|     end
 | |
| 
 | |
|     context 'disabled' do
 | |
|       before do
 | |
|         allow(Gitlab::CurrentSettings).to receive(:allow_local_requests_from_web_hooks_and_services?).and_return(false)
 | |
|       end
 | |
| 
 | |
|       it 'deny requests to localhost' do
 | |
|         expect { described_class.get('http://localhost:3003') }.to raise_error(Gitlab::HTTP::BlockedUrlError)
 | |
|       end
 | |
| 
 | |
|       it 'deny requests to private network' do
 | |
|         expect { described_class.get('http://192.168.1.2:3003') }.to raise_error(Gitlab::HTTP::BlockedUrlError)
 | |
|       end
 | |
| 
 | |
|       context 'if allow_local_requests set to true' do
 | |
|         it 'override the global value and allow requests to localhost or private network' do
 | |
|           stub_full_request('http://localhost:3003')
 | |
| 
 | |
|           expect { described_class.get('http://localhost:3003', allow_local_requests: true) }.not_to raise_error
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'enabled' do
 | |
|       before do
 | |
|         allow(Gitlab::CurrentSettings).to receive(:allow_local_requests_from_web_hooks_and_services?).and_return(true)
 | |
|       end
 | |
| 
 | |
|       it 'allow requests to localhost' do
 | |
|         stub_full_request('http://localhost:3003')
 | |
| 
 | |
|         expect { described_class.get('http://localhost:3003') }.not_to raise_error
 | |
|       end
 | |
| 
 | |
|       it 'allow requests to private network' do
 | |
|         expect { described_class.get('http://192.168.1.2:3003') }.not_to raise_error
 | |
|       end
 | |
| 
 | |
|       context 'if allow_local_requests set to false' do
 | |
|         it 'override the global value and ban requests to localhost or private network' do
 | |
|           expect { described_class.get('http://localhost:3003', allow_local_requests: false) }.to raise_error(
 | |
|             Gitlab::HTTP::BlockedUrlError)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'handle redirect loops' do
 | |
|     before do
 | |
|       stub_full_request("http://example.org", method: :any).to_raise(
 | |
|         HTTParty::RedirectionTooDeep.new("Redirection Too Deep"))
 | |
|     end
 | |
| 
 | |
|     it 'handles GET requests' do
 | |
|       expect { described_class.get('http://example.org') }.to raise_error(Gitlab::HTTP::RedirectionTooDeep)
 | |
|     end
 | |
| 
 | |
|     it 'handles POST requests' do
 | |
|       expect { described_class.post('http://example.org') }.to raise_error(Gitlab::HTTP::RedirectionTooDeep)
 | |
|     end
 | |
| 
 | |
|     it 'handles PUT requests' do
 | |
|       expect { described_class.put('http://example.org') }.to raise_error(Gitlab::HTTP::RedirectionTooDeep)
 | |
|     end
 | |
| 
 | |
|     it 'handles DELETE requests' do
 | |
|       expect { described_class.delete('http://example.org') }.to raise_error(Gitlab::HTTP::RedirectionTooDeep)
 | |
|     end
 | |
| 
 | |
|     it 'handles HEAD requests' do
 | |
|       expect { described_class.head('http://example.org') }.to raise_error(Gitlab::HTTP::RedirectionTooDeep)
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'setting default timeouts' do
 | |
|     before do
 | |
|       stub_full_request('http://example.org', method: :any)
 | |
|     end
 | |
| 
 | |
|     context 'when no timeouts are set' do
 | |
|       it 'sets default open and read and write timeouts' do
 | |
|         expect(described_class).to receive(:httparty_perform_request).with(
 | |
|           Net::HTTP::Get, 'http://example.org', default_options
 | |
|         ).and_call_original
 | |
| 
 | |
|         described_class.get('http://example.org')
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when :timeout is set' do
 | |
|       it 'does not set any default timeouts' do
 | |
|         expect(described_class).to receive(:httparty_perform_request).with(
 | |
|           Net::HTTP::Get, 'http://example.org', { timeout: 1 }
 | |
|         ).and_call_original
 | |
| 
 | |
|         described_class.get('http://example.org', { timeout: 1 })
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when :open_timeout is set' do
 | |
|       it 'only sets default read and write timeout' do
 | |
|         expect(described_class).to receive(:httparty_perform_request).with(
 | |
|           Net::HTTP::Get, 'http://example.org', default_options.merge(open_timeout: 1)
 | |
|         ).and_call_original
 | |
| 
 | |
|         described_class.get('http://example.org', open_timeout: 1)
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when :read_timeout is set' do
 | |
|       it 'only sets default open and write timeout' do
 | |
|         expect(described_class).to receive(:httparty_perform_request).with(
 | |
|           Net::HTTP::Get, 'http://example.org', default_options.merge(read_timeout: 1)
 | |
|         ).and_call_original
 | |
| 
 | |
|         described_class.get('http://example.org', read_timeout: 1)
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when :write_timeout is set' do
 | |
|       it 'only sets default open and read timeout' do
 | |
|         expect(described_class).to receive(:httparty_perform_request).with(
 | |
|           Net::HTTP::Put, 'http://example.org', default_options.merge(write_timeout: 1)
 | |
|         ).and_call_original
 | |
| 
 | |
|         described_class.put('http://example.org', write_timeout: 1)
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe '.try_get' do
 | |
|     let(:path) { 'http://example.org' }
 | |
| 
 | |
|     let(:extra_log_info_proc) do
 | |
|       proc do |error, url, options|
 | |
|         { klass: error.class, url: url, options: options }
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     let(:request_options) do
 | |
|       default_options.merge({
 | |
|         verify: false,
 | |
|         basic_auth: { username: 'user', password: 'pass' }
 | |
|       })
 | |
|     end
 | |
| 
 | |
|     Gitlab::HTTP::HTTP_ERRORS.each do |exception_class|
 | |
|       context "with #{exception_class}" do
 | |
|         let(:klass) { exception_class }
 | |
| 
 | |
|         context 'with path' do
 | |
|           before do
 | |
|             expect(described_class).to receive(:httparty_perform_request)
 | |
|               .with(Net::HTTP::Get, path, default_options)
 | |
|               .and_raise(klass)
 | |
|           end
 | |
| 
 | |
|           it 'handles requests without extra_log_info' do
 | |
|             expect(Gitlab::ErrorTracking)
 | |
|               .to receive(:log_exception)
 | |
|               .with(instance_of(klass), {})
 | |
| 
 | |
|             expect(described_class.try_get(path)).to be_nil
 | |
|           end
 | |
| 
 | |
|           it 'handles requests with extra_log_info as hash' do
 | |
|             expect(Gitlab::ErrorTracking)
 | |
|               .to receive(:log_exception)
 | |
|               .with(instance_of(klass), { a: :b })
 | |
| 
 | |
|             expect(described_class.try_get(path, extra_log_info: { a: :b })).to be_nil
 | |
|           end
 | |
| 
 | |
|           it 'handles requests with extra_log_info as proc' do
 | |
|             expect(Gitlab::ErrorTracking)
 | |
|               .to receive(:log_exception)
 | |
|               .with(instance_of(klass), { url: path, klass: klass, options: {} })
 | |
| 
 | |
|             expect(described_class.try_get(path, extra_log_info: extra_log_info_proc)).to be_nil
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'with path and options' do
 | |
|           before do
 | |
|             expect(described_class).to receive(:httparty_perform_request)
 | |
|               .with(Net::HTTP::Get, path, request_options)
 | |
|               .and_raise(klass)
 | |
|           end
 | |
| 
 | |
|           it 'handles requests without extra_log_info' do
 | |
|             expect(Gitlab::ErrorTracking)
 | |
|               .to receive(:log_exception)
 | |
|               .with(instance_of(klass), {})
 | |
| 
 | |
|             expect(described_class.try_get(path, request_options)).to be_nil
 | |
|           end
 | |
| 
 | |
|           it 'handles requests with extra_log_info as hash' do
 | |
|             expect(Gitlab::ErrorTracking)
 | |
|               .to receive(:log_exception)
 | |
|               .with(instance_of(klass), { a: :b })
 | |
| 
 | |
|             expect(described_class.try_get(path, **request_options, extra_log_info: { a: :b })).to be_nil
 | |
|           end
 | |
| 
 | |
|           it 'handles requests with extra_log_info as proc' do
 | |
|             expect(Gitlab::ErrorTracking)
 | |
|               .to receive(:log_exception)
 | |
|               .with(instance_of(klass), { klass: klass, url: path, options: request_options })
 | |
| 
 | |
|             expect(described_class.try_get(path, **request_options, extra_log_info: extra_log_info_proc)).to be_nil
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'with path, options, and block' do
 | |
|           let(:block) do
 | |
|             proc {}
 | |
|           end
 | |
| 
 | |
|           before do
 | |
|             expect(described_class).to receive(:httparty_perform_request)
 | |
|               .with(Net::HTTP::Get, path, request_options, &block)
 | |
|               .and_raise(klass)
 | |
|           end
 | |
| 
 | |
|           it 'handles requests without extra_log_info' do
 | |
|             expect(Gitlab::ErrorTracking)
 | |
|               .to receive(:log_exception)
 | |
|               .with(instance_of(klass), {})
 | |
| 
 | |
|             expect(described_class.try_get(path, request_options, &block)).to be_nil
 | |
|           end
 | |
| 
 | |
|           it 'handles requests with extra_log_info as hash' do
 | |
|             expect(Gitlab::ErrorTracking)
 | |
|               .to receive(:log_exception)
 | |
|               .with(instance_of(klass), { a: :b })
 | |
| 
 | |
|             expect(described_class.try_get(path, **request_options, extra_log_info: { a: :b }, &block)).to be_nil
 | |
|           end
 | |
| 
 | |
|           it 'handles requests with extra_log_info as proc' do
 | |
|             expect(Gitlab::ErrorTracking)
 | |
|               .to receive(:log_exception)
 | |
|               .with(instance_of(klass), { klass: klass, url: path, options: request_options })
 | |
| 
 | |
|             expect(
 | |
|               described_class.try_get(path, **request_options, extra_log_info: extra_log_info_proc, &block)
 | |
|             ).to be_nil
 | |
|           end
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'silent mode', feature_category: :geo_replication do
 | |
|     before do
 | |
|       stub_full_request("http://example.org", method: :any)
 | |
|       stub_application_setting(silent_mode_enabled: silent_mode)
 | |
|     end
 | |
| 
 | |
|     context 'when silent mode is enabled' do
 | |
|       let(:silent_mode) { true }
 | |
| 
 | |
|       it 'allows GET requests' do
 | |
|         expect { described_class.get('http://example.org') }.not_to raise_error
 | |
|       end
 | |
| 
 | |
|       it 'allows HEAD requests' do
 | |
|         expect { described_class.head('http://example.org') }.not_to raise_error
 | |
|       end
 | |
| 
 | |
|       it 'allows OPTIONS requests' do
 | |
|         expect { described_class.options('http://example.org') }.not_to raise_error
 | |
|       end
 | |
| 
 | |
|       it 'blocks POST requests' do
 | |
|         expect { described_class.post('http://example.org') }.to raise_error(Gitlab::HTTP::SilentModeBlockedError)
 | |
|       end
 | |
| 
 | |
|       it 'blocks PUT requests' do
 | |
|         expect { described_class.put('http://example.org') }.to raise_error(Gitlab::HTTP::SilentModeBlockedError)
 | |
|       end
 | |
| 
 | |
|       it 'blocks DELETE requests' do
 | |
|         expect { described_class.delete('http://example.org') }.to raise_error(Gitlab::HTTP::SilentModeBlockedError)
 | |
|       end
 | |
| 
 | |
|       it 'logs blocked requests' do
 | |
|         expect(::Gitlab::AppJsonLogger).to receive(:info).with(
 | |
|           message: "Outbound HTTP request blocked",
 | |
|           outbound_http_request_method: 'Net::HTTP::Post',
 | |
|           silent_mode_enabled: true
 | |
|         )
 | |
| 
 | |
|         expect { described_class.post('http://example.org') }.to raise_error(Gitlab::HTTP::SilentModeBlockedError)
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when silent mode is disabled' do
 | |
|       let(:silent_mode) { false }
 | |
| 
 | |
|       it 'allows GET requests' do
 | |
|         expect { described_class.get('http://example.org') }.not_to raise_error
 | |
|       end
 | |
| 
 | |
|       it 'allows HEAD requests' do
 | |
|         expect { described_class.head('http://example.org') }.not_to raise_error
 | |
|       end
 | |
| 
 | |
|       it 'allows OPTIONS requests' do
 | |
|         expect { described_class.options('http://example.org') }.not_to raise_error
 | |
|       end
 | |
| 
 | |
|       it 'blocks POST requests' do
 | |
|         expect { described_class.post('http://example.org') }.not_to raise_error
 | |
|       end
 | |
| 
 | |
|       it 'blocks PUT requests' do
 | |
|         expect { described_class.put('http://example.org') }.not_to raise_error
 | |
|       end
 | |
| 
 | |
|       it 'blocks DELETE requests' do
 | |
|         expect { described_class.delete('http://example.org') }.not_to raise_error
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| end
 |