Commit 9939a5f9 authored by David Kim's avatar David Kim

Merge branch '296230-fix-ip-address-protected-branch-audit-event' into 'master'

Fix incorrect IP address when creating audit event

See merge request gitlab-org/gitlab!54292
parents 57f9e223 575e90ad
......@@ -7,16 +7,15 @@ module EE
push_access_levels = protected_branch.push_access_levels.map(&:humanize)
merge_access_levels = protected_branch.merge_access_levels.map(&:humanize)
super(author, protected_branch.project, {
super(author, protected_branch.project,
action => 'protected_branch',
author_name: author.name,
target_id: protected_branch.id,
target_type: protected_branch.class.name,
target_details: protected_branch.name,
push_access_levels: push_access_levels,
merge_access_levels: merge_access_levels,
ip_address: author.current_sign_in_ip
})
merge_access_levels: merge_access_levels
)
end
end
end
......
---
title: Fix incorrect IP address when creating ProtectedBranch audit event
merge_request: 54292
author:
type: fixed
......@@ -2,13 +2,14 @@
require 'spec_helper'
RSpec.describe EE::AuditEvents::ProtectedBranchAuditEventService do
RSpec.describe EE::AuditEvents::ProtectedBranchAuditEventService, :request_store do
let(:merge_level) { 'Maintainers' }
let(:push_level) { 'No one' }
let(:author) { create(:user, :with_sign_ins) }
let(:entity) { create(:project, creator: author) }
let(:protected_branch) { create(:protected_branch, :no_one_can_push, project: entity) }
let(:logger) { instance_double(Gitlab::AuditJsonLogger) }
let_it_be(:author) { create(:user, :with_sign_ins) }
let_it_be(:entity) { create(:project, creator: author) }
let_it_be(:protected_branch) { create(:protected_branch, :no_one_can_push, project: entity) }
let(:logger) { instance_spy(Gitlab::AuditJsonLogger) }
let(:ip_address) { '192.168.15.18' }
describe '#security_event' do
shared_examples 'loggable' do |action|
......@@ -17,29 +18,16 @@ RSpec.describe EE::AuditEvents::ProtectedBranchAuditEventService do
before do
stub_licensed_features(admin_audit_log: true)
allow(Gitlab::RequestContext.instance).to receive(:client_ip).and_return(ip_address)
end
it 'creates an event and logs to a file with the provided details' do
expect(service).to receive(:file_logger).and_return(logger)
expect(logger).to receive(:info).with(author_id: author.id,
author_name: author.name,
entity_id: entity.id,
entity_type: 'Project',
entity_path: entity.full_path,
merge_access_levels: [merge_level],
push_access_levels: [push_level],
target_details: protected_branch.name,
target_id: protected_branch.id,
target_type: 'ProtectedBranch',
action => 'protected_branch',
ip_address: '127.0.0.1')
it 'creates an event', :aggregate_failures do
expect { service.security_event }.to change(AuditEvent, :count).by(1)
security_event = AuditEvent.last
expect(security_event.details).to eq(action => 'protected_branch',
expect(security_event.details).to eq(
action => 'protected_branch',
author_name: author.name,
target_id: protected_branch.id,
entity_path: entity.full_path,
......@@ -47,12 +35,34 @@ RSpec.describe EE::AuditEvents::ProtectedBranchAuditEventService do
target_details: protected_branch.name,
push_access_levels: [push_level],
merge_access_levels: [merge_level],
ip_address: '127.0.0.1')
ip_address: ip_address
)
expect(security_event.author_id).to eq(author.id)
expect(security_event.entity_id).to eq(entity.id)
expect(security_event.entity_type).to eq('Project')
expect(security_event.ip_address).to eq('127.0.0.1')
expect(security_event.ip_address).to eq(ip_address)
end
it 'logs to a file with the provided details' do
allow(service).to receive(:file_logger).and_return(logger)
service.security_event
expect(logger).to have_received(:info).with(
author_id: author.id,
author_name: author.name,
entity_id: entity.id,
entity_type: 'Project',
entity_path: entity.full_path,
merge_access_levels: [merge_level],
push_access_levels: [push_level],
target_details: protected_branch.name,
target_id: protected_branch.id,
target_type: 'ProtectedBranch',
action => 'protected_branch',
ip_address: ip_address
)
end
end
end
......@@ -70,7 +80,7 @@ RSpec.describe EE::AuditEvents::ProtectedBranchAuditEventService do
admin_audit_log: false)
end
it "doesn't create an event or log to a file" do
it "doesn't create an event or log to a file", :aggregate_failures do
expect(service).not_to receive(:file_logger)
expect { service.security_event }.not_to change(AuditEvent, :count)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment