Compare commits
2 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| c26dda1ff8 | |||
| 993ec330d3 |
+3
-3
@@ -1,7 +1,7 @@
|
||||
language: go
|
||||
go:
|
||||
- 1.7.5
|
||||
- 1.8.1
|
||||
- 1.7.6
|
||||
- 1.8.3
|
||||
- tip
|
||||
matrix:
|
||||
allow_failures:
|
||||
@@ -34,6 +34,6 @@ script:
|
||||
- go test -race
|
||||
|
||||
after_success: |
|
||||
[ $TRAVIS_GO_VERSION = 1.8.1 ] &&
|
||||
[ $TRAVIS_GO_VERSION = 1.8.3 ] &&
|
||||
overalls -project="github.com/go-playground/webhooks" -covermode=count -ignore=.git,examples -debug &&
|
||||
goveralls -coverprofile=overalls.coverprofile -service travis-ci -repotoken $COVERALLS_TOKEN
|
||||
@@ -1,6 +1,6 @@
|
||||
Library webhooks
|
||||
================
|
||||
<img align="right" src="https://raw.githubusercontent.com/go-playground/webhooks/v3/logo.png">
|
||||
<img align="right" src="https://raw.githubusercontent.com/go-playground/webhooks/v3/logo.png">
|
||||
[](https://travis-ci.org/go-playground/webhooks)
|
||||
[](https://coveralls.io/github/go-playground/webhooks?branch=v3)
|
||||
[](https://goreportcard.com/report/go-playground/webhooks)
|
||||
|
||||
+12
-3
@@ -2,6 +2,7 @@ package bitbucket
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"io/ioutil"
|
||||
"net/http"
|
||||
|
||||
@@ -69,38 +70,46 @@ func (hook Webhook) RegisterEvents(fn webhooks.ProcessPayloadFunc, events ...Eve
|
||||
|
||||
// ParsePayload parses and verifies the payload and fires off the mapped function, if it exists.
|
||||
func (hook Webhook) ParsePayload(w http.ResponseWriter, r *http.Request) {
|
||||
webhooks.DefaultLog.Info("Parsing Payload...")
|
||||
|
||||
uuid := r.Header.Get("X-Hook-UUID")
|
||||
if uuid == "" {
|
||||
webhooks.DefaultLog.Error("Missing X-Hook-UUID Header")
|
||||
http.Error(w, "400 Bad Request - Missing X-Hook-UUID Header", http.StatusBadRequest)
|
||||
return
|
||||
}
|
||||
webhooks.DefaultLog.Debug(fmt.Sprintf("X-Hook-UUID:%s", uuid))
|
||||
|
||||
if uuid != hook.uuid {
|
||||
http.Error(w, "403 Forbidden - Missing X-Hook-UUID does not match", http.StatusForbidden)
|
||||
webhooks.DefaultLog.Error(fmt.Sprintf("X-Hook-UUID does not match configured uuid of %s", hook.uuid))
|
||||
http.Error(w, "403 Forbidden - X-Hook-UUID does not match", http.StatusForbidden)
|
||||
return
|
||||
}
|
||||
|
||||
event := r.Header.Get("X-Event-Key")
|
||||
if event == "" {
|
||||
webhooks.DefaultLog.Error("Missing X-Event-Key Header")
|
||||
http.Error(w, "400 Bad Request - Missing X-Event-Key Header", http.StatusBadRequest)
|
||||
return
|
||||
}
|
||||
webhooks.DefaultLog.Debug(fmt.Sprintf("X-Event-Key:%s", event))
|
||||
|
||||
bitbucketEvent := Event(event)
|
||||
|
||||
fn, ok := hook.eventFuncs[bitbucketEvent]
|
||||
// if no event registered
|
||||
if !ok {
|
||||
webhooks.DefaultLog.Info(fmt.Sprintf("Webhook Event %s not registered, it is recommended to setup only events in bitbucket that will be registered in the webhook to avoid unnecessary traffic and reduce potential attack vectors.", event))
|
||||
return
|
||||
}
|
||||
|
||||
payload, err := ioutil.ReadAll(r.Body)
|
||||
if err != nil || len(payload) == 0 {
|
||||
http.Error(w, "Error reading Body", http.StatusInternalServerError)
|
||||
webhooks.DefaultLog.Error("Issue reading Payload")
|
||||
http.Error(w, "Issue reading Payload", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
webhooks.DefaultLog.Debug(fmt.Sprintf("Payload:%s", string(payload)))
|
||||
hd := webhooks.Header(r.Header)
|
||||
|
||||
switch bitbucketEvent {
|
||||
|
||||
@@ -0,0 +1,67 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"log"
|
||||
"strconv"
|
||||
|
||||
"gopkg.in/go-playground/webhooks.v3"
|
||||
"gopkg.in/go-playground/webhooks.v3/github"
|
||||
)
|
||||
|
||||
const (
|
||||
path = "/webhooks"
|
||||
port = 3016
|
||||
)
|
||||
|
||||
type myLogger struct {
|
||||
PrintDebugs bool
|
||||
}
|
||||
|
||||
func (l *myLogger) Info(msg string) {
|
||||
log.Println(msg)
|
||||
}
|
||||
|
||||
func (l *myLogger) Error(msg string) {
|
||||
log.Println(msg)
|
||||
}
|
||||
|
||||
func (l *myLogger) Debug(msg string) {
|
||||
if !l.PrintDebugs {
|
||||
return
|
||||
}
|
||||
log.Println(msg)
|
||||
}
|
||||
|
||||
func main() {
|
||||
// webhooks.DefaultLog=webhooks.NewLogger(true)
|
||||
//
|
||||
// or override with your own
|
||||
webhooks.DefaultLog = &myLogger{PrintDebugs: true}
|
||||
|
||||
hook := github.New(&github.Config{Secret: "MyGitHubSuperSecretSecrect...?"})
|
||||
hook.RegisterEvents(HandleMultiple, github.ReleaseEvent, github.PullRequestEvent) // Add as many as you want
|
||||
|
||||
err := webhooks.Run(hook, ":"+strconv.Itoa(port), path)
|
||||
if err != nil {
|
||||
fmt.Println(err)
|
||||
}
|
||||
}
|
||||
|
||||
// HandleMultiple handles multiple GitHub events
|
||||
func HandleMultiple(payload interface{}, header webhooks.Header) {
|
||||
fmt.Println("Handling Payload..")
|
||||
|
||||
switch payload.(type) {
|
||||
|
||||
case github.ReleasePayload:
|
||||
release := payload.(github.ReleasePayload)
|
||||
// Do whatever you want from here...
|
||||
fmt.Printf("%+v", release)
|
||||
|
||||
case github.PullRequestPayload:
|
||||
pullRequest := payload.(github.PullRequestPayload)
|
||||
// Do whatever you want from here...
|
||||
fmt.Printf("%+v", pullRequest)
|
||||
}
|
||||
}
|
||||
@@ -14,7 +14,6 @@ const (
|
||||
)
|
||||
|
||||
func main() {
|
||||
|
||||
hook := github.New(&github.Config{Secret: "MyGitHubSuperSecretSecrect...?"})
|
||||
hook.RegisterEvents(HandleRelease, github.ReleaseEvent)
|
||||
hook.RegisterEvents(HandlePullRequest, github.PullRequestEvent)
|
||||
@@ -27,7 +26,6 @@ func main() {
|
||||
|
||||
// HandleRelease handles GitHub release events
|
||||
func HandleRelease(payload interface{}, header webhooks.Header) {
|
||||
|
||||
fmt.Println("Handling Release")
|
||||
|
||||
pl := payload.(github.ReleasePayload)
|
||||
|
||||
@@ -14,7 +14,6 @@ const (
|
||||
)
|
||||
|
||||
func main() {
|
||||
|
||||
hook := github.New(&github.Config{Secret: "MyGitHubSuperSecretSecrect...?"})
|
||||
hook.RegisterEvents(HandleMultiple, github.ReleaseEvent, github.PullRequestEvent) // Add as many as you want
|
||||
|
||||
@@ -26,7 +25,6 @@ func main() {
|
||||
|
||||
// HandleMultiple handles multiple GitHub events
|
||||
func HandleMultiple(payload interface{}, header webhooks.Header) {
|
||||
|
||||
fmt.Println("Handling Payload..")
|
||||
|
||||
switch payload.(type) {
|
||||
|
||||
+12
-3
@@ -5,6 +5,7 @@ import (
|
||||
"crypto/sha1"
|
||||
"encoding/hex"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"io/ioutil"
|
||||
"net/http"
|
||||
|
||||
@@ -96,36 +97,43 @@ func (hook Webhook) RegisterEvents(fn webhooks.ProcessPayloadFunc, events ...Eve
|
||||
|
||||
// ParsePayload parses and verifies the payload and fires off the mapped function, if it exists.
|
||||
func (hook Webhook) ParsePayload(w http.ResponseWriter, r *http.Request) {
|
||||
webhooks.DefaultLog.Info("Parsing Payload...")
|
||||
|
||||
event := r.Header.Get("X-GitHub-Event")
|
||||
if len(event) == 0 {
|
||||
webhooks.DefaultLog.Error("Missing X-GitHub-Event Header")
|
||||
http.Error(w, "400 Bad Request - Missing X-GitHub-Event Header", http.StatusBadRequest)
|
||||
return
|
||||
}
|
||||
webhooks.DefaultLog.Debug(fmt.Sprintf("X-GitHub-Event:%s", event))
|
||||
|
||||
gitHubEvent := Event(event)
|
||||
|
||||
fn, ok := hook.eventFuncs[gitHubEvent]
|
||||
// if no event registered
|
||||
if !ok {
|
||||
webhooks.DefaultLog.Info(fmt.Sprintf("Webhook Event %s not registered, it is recommended to setup only events in github that will be registered in the webhook to avoid unnecessary traffic and reduce potential attack vectors.", event))
|
||||
return
|
||||
}
|
||||
|
||||
payload, err := ioutil.ReadAll(r.Body)
|
||||
if err != nil || len(payload) == 0 {
|
||||
http.Error(w, "Error reading Body", http.StatusInternalServerError)
|
||||
webhooks.DefaultLog.Error("Issue reading Payload")
|
||||
http.Error(w, "Issue reading Payload", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
webhooks.DefaultLog.Debug(fmt.Sprintf("Payload:%s", string(payload)))
|
||||
|
||||
// If we have a Secret set, we should check the MAC
|
||||
if len(hook.secret) > 0 {
|
||||
|
||||
webhooks.DefaultLog.Info("Checking secret")
|
||||
signature := r.Header.Get("X-Hub-Signature")
|
||||
|
||||
if len(signature) == 0 {
|
||||
webhooks.DefaultLog.Error("Missing X-Hub-Signature required for HMAC verification")
|
||||
http.Error(w, "403 Forbidden - Missing X-Hub-Signature required for HMAC verification", http.StatusForbidden)
|
||||
return
|
||||
}
|
||||
webhooks.DefaultLog.Debug(fmt.Sprintf("X-Hub-Signature:%s", signature))
|
||||
|
||||
mac := hmac.New(sha1.New, []byte(hook.secret))
|
||||
mac.Write(payload)
|
||||
@@ -133,6 +141,7 @@ func (hook Webhook) ParsePayload(w http.ResponseWriter, r *http.Request) {
|
||||
expectedMAC := hex.EncodeToString(mac.Sum(nil))
|
||||
|
||||
if !hmac.Equal([]byte(signature[5:]), []byte(expectedMAC)) {
|
||||
webhooks.DefaultLog.Error("HMAC verification failed")
|
||||
http.Error(w, "403 Forbidden - HMAC verification failed", http.StatusForbidden)
|
||||
return
|
||||
}
|
||||
|
||||
+10
-3
@@ -2,6 +2,7 @@ package gitlab
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"io/ioutil"
|
||||
"net/http"
|
||||
|
||||
@@ -59,33 +60,39 @@ func (hook Webhook) RegisterEvents(fn webhooks.ProcessPayloadFunc, events ...Eve
|
||||
|
||||
// ParsePayload parses and verifies the payload and fires off the mapped function, if it exists.
|
||||
func (hook Webhook) ParsePayload(w http.ResponseWriter, r *http.Request) {
|
||||
webhooks.DefaultLog.Info("Parsing Payload...")
|
||||
|
||||
event := r.Header.Get("X-Gitlab-Event")
|
||||
if len(event) == 0 {
|
||||
webhooks.DefaultLog.Error("Missing X-Gitlab-Event Header")
|
||||
http.Error(w, "400 Bad Request - Missing X-Gitlab-Event Header", http.StatusBadRequest)
|
||||
return
|
||||
}
|
||||
webhooks.DefaultLog.Debug(fmt.Sprintf("X-Gitlab-Event:%s", event))
|
||||
|
||||
gitLabEvent := Event(event)
|
||||
|
||||
fn, ok := hook.eventFuncs[gitLabEvent]
|
||||
// if no event registered
|
||||
if !ok {
|
||||
webhooks.DefaultLog.Info(fmt.Sprintf("Webhook Event %s not registered, it is recommended to setup only events in gitlab that will be registered in the webhook to avoid unnecessary traffic and reduce potential attack vectors.", event))
|
||||
return
|
||||
}
|
||||
|
||||
payload, err := ioutil.ReadAll(r.Body)
|
||||
if err != nil || len(payload) == 0 {
|
||||
http.Error(w, "Error reading Body", http.StatusInternalServerError)
|
||||
webhooks.DefaultLog.Error("Issue reading Payload")
|
||||
http.Error(w, "Error reading Payload", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
webhooks.DefaultLog.Debug(fmt.Sprintf("Payload:%s", string(payload)))
|
||||
|
||||
// If we have a Secret set, we should check the MAC
|
||||
if len(hook.secret) > 0 {
|
||||
|
||||
webhooks.DefaultLog.Info("Checking secret")
|
||||
signature := r.Header.Get("X-Gitlab-Token")
|
||||
|
||||
if signature != hook.secret {
|
||||
webhooks.DefaultLog.Error(fmt.Sprintf("Invalid X-Gitlab-Token of '%s'", signature))
|
||||
http.Error(w, "403 Forbidden - Token missmatch", http.StatusForbidden)
|
||||
return
|
||||
}
|
||||
|
||||
@@ -0,0 +1,44 @@
|
||||
package webhooks
|
||||
|
||||
import "log"
|
||||
|
||||
// DefaultLog contains the default logger for webhooks, and prints only info and error messages by default
|
||||
// for debugs override DefaultLog or see NewLogger for creating one without debugs.
|
||||
var DefaultLog Logger = new(logger)
|
||||
|
||||
// Logger allows for customizable logging
|
||||
type Logger interface {
|
||||
// Info prints basic information.
|
||||
Info(string)
|
||||
// Error prints error information.
|
||||
Error(string)
|
||||
// Debug prints information usefull for debugging.
|
||||
Debug(string)
|
||||
}
|
||||
|
||||
// NewLogger returns a new logger for use.
|
||||
func NewLogger(debug bool) Logger {
|
||||
return &logger{PrintDebugs: debug}
|
||||
}
|
||||
|
||||
type logger struct {
|
||||
PrintDebugs bool
|
||||
}
|
||||
|
||||
// Info prints basic information.
|
||||
func (l *logger) Info(msg string) {
|
||||
log.Println("INFO:", msg)
|
||||
}
|
||||
|
||||
// v prints error information.
|
||||
func (l *logger) Error(msg string) {
|
||||
log.Println("ERROR:", msg)
|
||||
}
|
||||
|
||||
// Debug prints information usefull for debugging.
|
||||
func (l *logger) Debug(msg string) {
|
||||
if !l.PrintDebugs {
|
||||
return
|
||||
}
|
||||
log.Println("DEBUG:", msg)
|
||||
}
|
||||
+11
-4
@@ -1,6 +1,9 @@
|
||||
package webhooks
|
||||
|
||||
import "net/http"
|
||||
import (
|
||||
"fmt"
|
||||
"net/http"
|
||||
)
|
||||
|
||||
// Header provides http.Header to minimize imports
|
||||
type Header http.Header
|
||||
@@ -57,9 +60,9 @@ func Run(hook Webhook, addr string, path string) error {
|
||||
path: path,
|
||||
includePathCheck: true,
|
||||
}
|
||||
|
||||
s := &http.Server{Addr: addr, Handler: srv}
|
||||
|
||||
DefaultLog.Info(fmt.Sprintf("Listening on addr: %s path: %s", addr, path))
|
||||
return s.ListenAndServe()
|
||||
}
|
||||
|
||||
@@ -73,7 +76,7 @@ func RunServer(s *http.Server, hook Webhook, path string) error {
|
||||
}
|
||||
|
||||
s.Handler = srv
|
||||
|
||||
DefaultLog.Info(fmt.Sprintf("Listening on addr: %s path: %s", s.Addr, path))
|
||||
return s.ListenAndServe()
|
||||
}
|
||||
|
||||
@@ -90,21 +93,25 @@ func RunTLSServer(s *http.Server, hook Webhook, path string) error {
|
||||
}
|
||||
|
||||
s.Handler = srv
|
||||
|
||||
DefaultLog.Info(fmt.Sprintf("Listening on addr: %s path: %s", s.Addr, path))
|
||||
return s.ListenAndServeTLS("", "")
|
||||
}
|
||||
|
||||
// ServeHTTP is the Handler for every posted WebHook Event
|
||||
func (s *server) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||
defer r.Body.Close()
|
||||
DefaultLog.Info("Webhook received")
|
||||
|
||||
if r.Method != "POST" {
|
||||
DefaultLog.Error(fmt.Sprintf("405 Method not allowed, attempt made using Method: %s", r.Method))
|
||||
http.Error(w, "405 Method not allowed", http.StatusMethodNotAllowed)
|
||||
return
|
||||
}
|
||||
|
||||
DefaultLog.Debug(fmt.Sprintf("Include path check: %t", s.includePathCheck))
|
||||
if s.includePathCheck {
|
||||
if r.URL.Path != s.path {
|
||||
DefaultLog.Error(fmt.Sprintf("404 Not found, POST made using path: %s, but expected %s", r.URL.Path, s.path))
|
||||
http.Error(w, "404 Not found", http.StatusNotFound)
|
||||
return
|
||||
}
|
||||
|
||||
+1
-1
@@ -136,7 +136,7 @@ func TestRun(t *testing.T) {
|
||||
}
|
||||
|
||||
func TestRunServer(t *testing.T) {
|
||||
|
||||
DefaultLog = NewLogger(true)
|
||||
server := &http.Server{Addr: "127.0.0.1:3007", Handler: nil}
|
||||
go RunServer(server, fakeHook, "/webhooks")
|
||||
time.Sleep(5000)
|
||||
|
||||
Reference in New Issue
Block a user