File: hook_validate.go

package info (click to toggle)
golang-code-gitea-sdk 0.17.0-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 760 kB
  • sloc: makefile: 107
file content (59 lines) | stat: -rw-r--r-- 1,628 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
// Copyright 2022 The Gitea Authors. All rights reserved.
// Use of this source code is governed by a MIT-style
// license that can be found in the LICENSE file.

package gitea

import (
	"bytes"
	"crypto/hmac"
	"crypto/sha256"
	"encoding/hex"
	"io"
	"net/http"
)

// VerifyWebhookSignature verifies that a payload matches the X-Gitea-Signature based on a secret
func VerifyWebhookSignature(secret, expected string, payload []byte) (bool, error) {
	hash := hmac.New(sha256.New, []byte(secret))
	if _, err := hash.Write(payload); err != nil {
		return false, err
	}
	expectedSum, err := hex.DecodeString(expected)
	if err != nil {
		return false, err
	}
	return hmac.Equal(hash.Sum(nil), expectedSum), nil
}

// VerifyWebhookSignatureMiddleware is a http.Handler for verifying X-Gitea-Signature on incoming webhooks
func VerifyWebhookSignatureMiddleware(secret string) func(http.Handler) http.Handler {
	return func(next http.Handler) http.Handler {
		return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
			var b bytes.Buffer
			if _, err := io.Copy(&b, r.Body); err != nil {
				http.Error(w, err.Error(), http.StatusBadRequest)
				return
			}

			expected := r.Header.Get("X-Gitea-Signature")
			if expected == "" {
				http.Error(w, "no signature found", http.StatusBadRequest)
				return
			}

			ok, err := VerifyWebhookSignature(secret, expected, b.Bytes())
			if err != nil {
				http.Error(w, err.Error(), http.StatusUnauthorized)
				return
			}
			if !ok {
				http.Error(w, "invalid payload", http.StatusUnauthorized)
				return
			}

			r.Body = io.NopCloser(&b)
			next.ServeHTTP(w, r)
		})
	}
}