@@ -1,5 +1,7 @@ |
||
1 | 1 |
module Agents |
2 | 2 |
class WebhookAgent < Agent |
3 |
+ include WebRequestConcern |
|
4 |
+ |
|
3 | 5 |
cannot_be_scheduled! |
4 | 6 |
cannot_receive_events! |
5 | 7 |
|
@@ -24,6 +26,8 @@ module Agents |
||
24 | 26 |
For example, "post,get" will enable POST and GET requests. Defaults |
25 | 27 |
to "post". |
26 | 28 |
* `response` - The response message to the request. Defaults to 'Event Created'. |
29 |
+ * `recaptcha_secret` - Setting this to a reCAPTCHA "secret" key makes your agent verify incoming requests with reCAPTCHA. Don't forget to embed a reCAPTCHA snippet including your "site" key in the originating form(s). |
|
30 |
+ * `recaptcha_send_remote_addr` - Set this to true if your server is properly configured to set REMOTE_ADDR to the IP address of each visitor (instead of that of a proxy server). |
|
27 | 31 |
MD |
28 | 32 |
end |
29 | 33 |
|
@@ -46,10 +50,36 @@ module Agents |
||
46 | 50 |
secret = params.delete('secret') |
47 | 51 |
return ["Not Authorized", 401] unless secret == interpolated['secret'] |
48 | 52 |
|
49 |
- #check the verbs |
|
53 |
+ # check the verbs |
|
50 | 54 |
verbs = (interpolated['verbs'] || 'post').split(/,/).map { |x| x.strip.downcase }.select { |x| x.present? } |
51 | 55 |
return ["Please use #{verbs.join('/').upcase} requests only", 401] unless verbs.include?(method) |
52 | 56 |
|
57 |
+ # check the reCAPTCHA response if required |
|
58 |
+ if recaptcha_secret = interpolated['recaptcha_secret'].presence |
|
59 |
+ recaptcha_response = params.delete('g-recaptcha-response') or |
|
60 |
+ return ["Not Authorized", 401] |
|
61 |
+ |
|
62 |
+ parameters = { |
|
63 |
+ secret: recaptcha_secret, |
|
64 |
+ response: recaptcha_response, |
|
65 |
+ } |
|
66 |
+ |
|
67 |
+ if boolify(interpolated['recaptcha_send_remote_addr']) |
|
68 |
+ parameters[:remoteip] = request.env['REMOTE_ADDR'] |
|
69 |
+ end |
|
70 |
+ |
|
71 |
+ begin |
|
72 |
+ response = faraday.post('https://www.google.com/recaptcha/api/siteverify', |
|
73 |
+ parameters) |
|
74 |
+ rescue => e |
|
75 |
+ error "Verification failed: #{e.message}" |
|
76 |
+ return ["Not Authorized", 401] |
|
77 |
+ end |
|
78 |
+ |
|
79 |
+ JSON.parse(response.body)['success'] or |
|
80 |
+ return ["Not Authorized", 401] |
|
81 |
+ end |
|
82 |
+ |
|
53 | 83 |
[payload_for(params)].flatten.each do |payload| |
54 | 84 |
create_event(payload: payload) |
55 | 85 |
end |
@@ -223,6 +223,80 @@ describe Agents::WebhookAgent do |
||
223 | 223 |
|
224 | 224 |
end |
225 | 225 |
|
226 |
+ context "with reCAPTCHA" do |
|
227 |
+ it "should not check a reCAPTCHA response unless recaptcha_secret is set" do |
|
228 |
+ checked = false |
|
229 |
+ out = nil |
|
230 |
+ |
|
231 |
+ stub_request(:any, /verify/).to_return { |request| |
|
232 |
+ checked = true |
|
233 |
+ { status: 200, body: '{"success":false}' } |
|
234 |
+ } |
|
235 |
+ |
|
236 |
+ expect { |
|
237 |
+ out= agent.receive_web_request({ 'secret' => 'foobar', 'some_key' => payload }, "post", "text/html") |
|
238 |
+ }.not_to change { checked } |
|
239 |
+ |
|
240 |
+ expect(out).to eq(["Event Created", 201]) |
|
241 |
+ end |
|
242 |
+ |
|
243 |
+ it "should reject a request if recaptcha_secret is set but g-recaptcha-response is not given" do |
|
244 |
+ agent.options['recaptcha_secret'] = 'supersupersecret' |
|
245 |
+ |
|
246 |
+ checked = false |
|
247 |
+ out = nil |
|
248 |
+ |
|
249 |
+ stub_request(:any, /verify/).to_return { |request| |
|
250 |
+ checked = true |
|
251 |
+ { status: 200, body: '{"success":false}' } |
|
252 |
+ } |
|
253 |
+ |
|
254 |
+ expect { |
|
255 |
+ out = agent.receive_web_request({ 'secret' => 'foobar', 'some_key' => payload }, "post", "text/html") |
|
256 |
+ }.not_to change { checked } |
|
257 |
+ |
|
258 |
+ expect(out).to eq(["Not Authorized", 401]) |
|
259 |
+ end |
|
260 |
+ |
|
261 |
+ it "should reject a request if recaptcha_secret is set and g-recaptcha-response given is not verified" do |
|
262 |
+ agent.options['recaptcha_secret'] = 'supersupersecret' |
|
263 |
+ |
|
264 |
+ checked = false |
|
265 |
+ out = nil |
|
266 |
+ |
|
267 |
+ stub_request(:any, /verify/).to_return { |request| |
|
268 |
+ checked = true |
|
269 |
+ { status: 200, body: '{"success":false}' } |
|
270 |
+ } |
|
271 |
+ |
|
272 |
+ expect { |
|
273 |
+ out = agent.receive_web_request({ 'secret' => 'foobar', 'some_key' => payload, 'g-recaptcha-response' => 'somevalue' }, "post", "text/html") |
|
274 |
+ }.to change { checked } |
|
275 |
+ |
|
276 |
+ expect(out).to eq(["Not Authorized", 401]) |
|
277 |
+ end |
|
278 |
+ |
|
279 |
+ it "should accept a request if recaptcha_secret is set and g-recaptcha-response given is verified" do |
|
280 |
+ agent.options['payload_path'] = '.' |
|
281 |
+ agent.options['recaptcha_secret'] = 'supersupersecret' |
|
282 |
+ |
|
283 |
+ checked = false |
|
284 |
+ out = nil |
|
285 |
+ |
|
286 |
+ stub_request(:any, /verify/).to_return { |request| |
|
287 |
+ checked = true |
|
288 |
+ { status: 200, body: '{"success":true}' } |
|
289 |
+ } |
|
290 |
+ |
|
291 |
+ expect { |
|
292 |
+ out = agent.receive_web_request(payload.merge({ 'secret' => 'foobar', 'g-recaptcha-response' => 'somevalue' }), "post", "text/html") |
|
293 |
+ }.to change { checked } |
|
294 |
+ |
|
295 |
+ expect(out).to eq(["Event Created", 201]) |
|
296 |
+ expect(Event.last.payload).to eq(payload) |
|
297 |
+ end |
|
298 |
+ end |
|
299 |
+ |
|
226 | 300 |
end |
227 | 301 |
|
228 | 302 |
end |