Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(bitbucket): check bitbucket webhook signature if webhook_secret is defined #82541

Closed
wants to merge 3 commits into from

Conversation

oioki
Copy link
Member

@oioki oioki commented Dec 23, 2024

Preparing Bitbucket webhook secret validation. This is actual signature header validation, but no integrations/repos have the associated secret yet.

Follow-up PRs:

@oioki oioki requested a review from a team December 23, 2024 19:31
@oioki oioki requested review from a team as code owners December 23, 2024 19:31
@github-actions github-actions bot added the Scope: Backend Automatically applied to PRs that change backend components label Dec 23, 2024
try:
event_handler(request, organization, event)
except WebhookSignatureException as e:
return HttpResponse(str(e), status=400)

Check warning

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Copilot Autofix

AI 2 months ago

To fix the problem, we should avoid returning the exception message directly to the user. Instead, we should log the exception message on the server and return a generic error message to the user. This way, developers can still access the detailed error information in the logs, but external users will not see any sensitive information.

  • Modify the code to log the exception message using the logger and return a generic error message in the HTTP response.
  • Ensure that the logging captures the necessary details for debugging without exposing them to the user.
Suggested changeset 1
src/sentry/integrations/bitbucket/webhook.py

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/src/sentry/integrations/bitbucket/webhook.py b/src/sentry/integrations/bitbucket/webhook.py
--- a/src/sentry/integrations/bitbucket/webhook.py
+++ b/src/sentry/integrations/bitbucket/webhook.py
@@ -251,3 +251,8 @@
             except WebhookSignatureException as e:
-                return HttpResponse(str(e), status=400)
+                logger.exception(
+                    "%s.webhook.signature-exception",
+                    PROVIDER_NAME,
+                    extra={"organization_id": organization.id, "error": str(e)},
+                )
+                return HttpResponse("An error occurred while processing the webhook.", status=400)
 
EOF
@@ -251,3 +251,8 @@
except WebhookSignatureException as e:
return HttpResponse(str(e), status=400)
logger.exception(
"%s.webhook.signature-exception",
PROVIDER_NAME,
extra={"organization_id": organization.id, "error": str(e)},
)
return HttpResponse("An error occurred while processing the webhook.", status=400)

Copilot is powered by AI and may make mistakes. Always verify output.
@@ -87,6 +112,19 @@ def __call__(self, organization: Organization, event: Mapping[str, Any]):
except Repository.DoesNotExist:
raise Http404()

if "webhook_secret" in repo.config:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why are we storing the webhook secret in each repository? should the webhook secret be for each integration instance, like we have for gitlab?

if not constant_time_compare(secret, integration.metadata["webhook_secret"]):
# Summary and potential workaround mentioned here:
# https://github.com/getsentry/sentry/issues/34903#issuecomment-1262754478
extra["reason"] = GITHUB_WEBHOOK_SECRET_INVALID_ERROR
logger.info("gitlab.webhook.invalid-token-secret", extra=extra)
return HttpResponse(status=409, reason=GITHUB_WEBHOOK_SECRET_INVALID_ERROR)

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oh I see, we create a webhook via corresponding API once the integration is complete, I will look in that direction for Bitbucket.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

From what I can see, all of GitLab, GitHub, and Bitbucket support setting separate webhook secrets on repository level.

It seems like for GitLab, we're creating webhooks on project (=repository) level as well:

def create_project_webhook(self, project_id):
"""Create a webhook on a project
See https://docs.gitlab.com/ee/api/projects.html#add-project-hook
"""
path = GitLabApiClientPath.project_hooks.format(project=project_id)
hook_uri = reverse("sentry-extensions-gitlab-webhook")
model = self.installation.model
data = {
"url": absolute_uri(hook_uri),
"token": "{}:{}".format(model.external_id, model.metadata["webhook_secret"]),

While this change seems misaligned with existing GitLab/GitHub integrations, but it is more secure to have separate secrets for each repo.

Copy link
Member

@cathteng cathteng Jan 30, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we had a DM conversation but the summary is that other SCM integrations currently have integration-level webhook validation so i think it would be a good idea to get bitbucket up to parity with that first. if we want to do repo-level webhooks we should consider adding it across all SCM integrations at once

Copy link

codecov bot commented Jan 20, 2025

Codecov Report

Attention: Patch coverage is 98.30508% with 1 line in your changes missing coverage. Please review.

✅ All tests successful. No failed tests found.

Files with missing lines Patch % Lines
src/sentry/integrations/bitbucket/webhook.py 96.42% 1 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##           master   #82541      +/-   ##
==========================================
- Coverage   87.63%   87.57%   -0.06%     
==========================================
  Files        9490     9462      -28     
  Lines      541228   538831    -2397     
  Branches    21231    21046     -185     
==========================================
- Hits       474294   471897    -2397     
+ Misses      66586    66532      -54     
- Partials      348      402      +54     

Copy link
Member

@sentaur-athena sentaur-athena left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks good to me unless @cathteng has any other concerns about the design.

@oioki
Copy link
Member Author

oioki commented Jan 30, 2025

We will do #84309 instead

@oioki oioki closed this Jan 30, 2025
oioki added a commit that referenced this pull request Feb 13, 2025
…is defined (#84309)

Preparing [Bitbucket webhook secret
validation](https://support.atlassian.com/bitbucket-cloud/docs/manage-webhooks/#Validating-webhook-deliveries).
This is actual signature header validation, but no integrations/repos
have the associated secret yet.

Follow-up PRs:
- backend endpoint to modify `webhook_secret`:
#84311

Previous attempt (#82541) had
repository-level secrets but we decided to go with integration-level
secret to align with other integrations (GitLab, GitHub).
@github-actions github-actions bot locked and limited conversation to collaborators Feb 15, 2025
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Scope: Backend Automatically applied to PRs that change backend components
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants