-
-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(bitbucket): check bitbucket webhook signature if webhook_secret is defined #82541
Conversation
try: | ||
event_handler(request, organization, event) | ||
except WebhookSignatureException as e: | ||
return HttpResponse(str(e), status=400) |
Check warning
Code scanning / CodeQL
Information exposure through an exception Medium
Stack trace information
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix
AI 2 months ago
To fix the problem, we should avoid returning the exception message directly to the user. Instead, we should log the exception message on the server and return a generic error message to the user. This way, developers can still access the detailed error information in the logs, but external users will not see any sensitive information.
- Modify the code to log the exception message using the
logger
and return a generic error message in the HTTP response. - Ensure that the logging captures the necessary details for debugging without exposing them to the user.
-
Copy modified lines R252-R257
@@ -251,3 +251,8 @@ | ||
except WebhookSignatureException as e: | ||
return HttpResponse(str(e), status=400) | ||
logger.exception( | ||
"%s.webhook.signature-exception", | ||
PROVIDER_NAME, | ||
extra={"organization_id": organization.id, "error": str(e)}, | ||
) | ||
return HttpResponse("An error occurred while processing the webhook.", status=400) | ||
|
@@ -87,6 +112,19 @@ def __call__(self, organization: Organization, event: Mapping[str, Any]): | |||
except Repository.DoesNotExist: | |||
raise Http404() | |||
|
|||
if "webhook_secret" in repo.config: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why are we storing the webhook secret in each repository? should the webhook secret be for each integration instance, like we have for gitlab?
sentry/src/sentry/integrations/gitlab/webhooks.py
Lines 317 to 322 in 50658af
if not constant_time_compare(secret, integration.metadata["webhook_secret"]): | |
# Summary and potential workaround mentioned here: | |
# https://github.com/getsentry/sentry/issues/34903#issuecomment-1262754478 | |
extra["reason"] = GITHUB_WEBHOOK_SECRET_INVALID_ERROR | |
logger.info("gitlab.webhook.invalid-token-secret", extra=extra) | |
return HttpResponse(status=409, reason=GITHUB_WEBHOOK_SECRET_INVALID_ERROR) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oh I see, we create a webhook via corresponding API once the integration is complete, I will look in that direction for Bitbucket.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
From what I can see, all of GitLab, GitHub, and Bitbucket support setting separate webhook secrets on repository level.
It seems like for GitLab, we're creating webhooks on project (=repository) level as well:
sentry/src/sentry/integrations/gitlab/client.py
Lines 259 to 269 in e6d22ef
def create_project_webhook(self, project_id): | |
"""Create a webhook on a project | |
See https://docs.gitlab.com/ee/api/projects.html#add-project-hook | |
""" | |
path = GitLabApiClientPath.project_hooks.format(project=project_id) | |
hook_uri = reverse("sentry-extensions-gitlab-webhook") | |
model = self.installation.model | |
data = { | |
"url": absolute_uri(hook_uri), | |
"token": "{}:{}".format(model.external_id, model.metadata["webhook_secret"]), |
While this change seems misaligned with existing GitLab/GitHub integrations, but it is more secure to have separate secrets for each repo.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we had a DM conversation but the summary is that other SCM integrations currently have integration-level webhook validation so i think it would be a good idea to get bitbucket up to parity with that first. if we want to do repo-level webhooks we should consider adding it across all SCM integrations at once
Codecov ReportAttention: Patch coverage is ✅ All tests successful. No failed tests found.
Additional details and impacted files@@ Coverage Diff @@
## master #82541 +/- ##
==========================================
- Coverage 87.63% 87.57% -0.06%
==========================================
Files 9490 9462 -28
Lines 541228 538831 -2397
Branches 21231 21046 -185
==========================================
- Hits 474294 471897 -2397
+ Misses 66586 66532 -54
- Partials 348 402 +54 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks good to me unless @cathteng has any other concerns about the design.
We will do #84309 instead |
…is defined (#84309) Preparing [Bitbucket webhook secret validation](https://support.atlassian.com/bitbucket-cloud/docs/manage-webhooks/#Validating-webhook-deliveries). This is actual signature header validation, but no integrations/repos have the associated secret yet. Follow-up PRs: - backend endpoint to modify `webhook_secret`: #84311 Previous attempt (#82541) had repository-level secrets but we decided to go with integration-level secret to align with other integrations (GitLab, GitHub).
Preparing Bitbucket webhook secret validation. This is actual signature header validation, but no integrations/repos have the associated secret yet.
Follow-up PRs:
webhook_secret
: feat(bitbucket): add webhook secret on each repository creation #83732