150 lines
3.9 KiB
Go
150 lines
3.9 KiB
Go
package github
|
|
|
|
import (
|
|
"crypto/hmac"
|
|
"crypto/sha1" //nolint:gosec // G505: Blocklisted import crypto/sha1: weak cryptographic primitive - sha1 hash is what is desired in this case
|
|
"encoding/hex"
|
|
"encoding/json"
|
|
"io"
|
|
"net/http"
|
|
|
|
"github.com/gorilla/mux"
|
|
|
|
"github.com/influxdata/telegraf"
|
|
"github.com/influxdata/telegraf/plugins/common/auth"
|
|
)
|
|
|
|
type Webhook struct {
|
|
Path string
|
|
secret string
|
|
acc telegraf.Accumulator
|
|
log telegraf.Logger
|
|
auth.BasicAuth
|
|
}
|
|
|
|
// Register registers the webhook with the provided router
|
|
func (gh *Webhook) Register(router *mux.Router, acc telegraf.Accumulator, log telegraf.Logger) {
|
|
router.HandleFunc(gh.Path, gh.eventHandler).Methods("POST")
|
|
|
|
gh.log = log
|
|
gh.log.Infof("Started the webhooks_github on %s", gh.Path)
|
|
gh.acc = acc
|
|
}
|
|
|
|
func (gh *Webhook) eventHandler(w http.ResponseWriter, r *http.Request) {
|
|
defer r.Body.Close()
|
|
|
|
if !gh.Verify(r) {
|
|
w.WriteHeader(http.StatusUnauthorized)
|
|
return
|
|
}
|
|
|
|
eventType := r.Header.Get("X-Github-Event")
|
|
data, err := io.ReadAll(r.Body)
|
|
if err != nil {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
if gh.secret != "" && !checkSignature(gh.secret, data, r.Header.Get("X-Hub-Signature")) {
|
|
gh.log.Error("Fail to check the github webhook signature")
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
|
|
e, err := gh.newEvent(data, eventType)
|
|
if err != nil {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
return
|
|
}
|
|
if e != nil {
|
|
p := e.newMetric()
|
|
gh.acc.AddFields("github_webhooks", p.Fields(), p.Tags(), p.Time())
|
|
}
|
|
|
|
w.WriteHeader(http.StatusOK)
|
|
}
|
|
|
|
func generateEvent(data []byte, event event) (event, error) {
|
|
err := json.Unmarshal(data, event)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return event, nil
|
|
}
|
|
|
|
type newEventError struct {
|
|
s string
|
|
}
|
|
|
|
func (e *newEventError) Error() string {
|
|
return e.s
|
|
}
|
|
|
|
func (gh *Webhook) newEvent(data []byte, name string) (event, error) {
|
|
gh.log.Debugf("New %v event received", name)
|
|
switch name {
|
|
case "commit_comment":
|
|
return generateEvent(data, &commitCommentEvent{})
|
|
case "create":
|
|
return generateEvent(data, &createEvent{})
|
|
case "delete":
|
|
return generateEvent(data, &deleteEvent{})
|
|
case "deployment":
|
|
return generateEvent(data, &deploymentEvent{})
|
|
case "deployment_status":
|
|
return generateEvent(data, &deploymentStatusEvent{})
|
|
case "fork":
|
|
return generateEvent(data, &forkEvent{})
|
|
case "gollum":
|
|
return generateEvent(data, &gollumEvent{})
|
|
case "issue_comment":
|
|
return generateEvent(data, &issueCommentEvent{})
|
|
case "issues":
|
|
return generateEvent(data, &issuesEvent{})
|
|
case "member":
|
|
return generateEvent(data, &memberEvent{})
|
|
case "membership":
|
|
return generateEvent(data, &membershipEvent{})
|
|
case "page_build":
|
|
return generateEvent(data, &pageBuildEvent{})
|
|
case "ping":
|
|
return nil, nil
|
|
case "public":
|
|
return generateEvent(data, &publicEvent{})
|
|
case "pull_request":
|
|
return generateEvent(data, &pullRequestEvent{})
|
|
case "pull_request_review_comment":
|
|
return generateEvent(data, &pullRequestReviewCommentEvent{})
|
|
case "push":
|
|
return generateEvent(data, &pushEvent{})
|
|
case "release":
|
|
return generateEvent(data, &releaseEvent{})
|
|
case "repository":
|
|
return generateEvent(data, &repositoryEvent{})
|
|
case "status":
|
|
return generateEvent(data, &statusEvent{})
|
|
case "team_add":
|
|
return generateEvent(data, &teamAddEvent{})
|
|
case "watch":
|
|
return generateEvent(data, &watchEvent{})
|
|
case "workflow_job":
|
|
return generateEvent(data, &workflowJobEvent{})
|
|
case "workflow_run":
|
|
return generateEvent(data, &workflowRunEvent{})
|
|
}
|
|
return nil, &newEventError{"Not a recognized event type"}
|
|
}
|
|
|
|
func checkSignature(secret string, data []byte, signature string) bool {
|
|
return hmac.Equal([]byte(signature), []byte(generateSignature(secret, data)))
|
|
}
|
|
|
|
func generateSignature(secret string, data []byte) string {
|
|
mac := hmac.New(sha1.New, []byte(secret))
|
|
if _, err := mac.Write(data); err != nil {
|
|
return err.Error()
|
|
}
|
|
result := mac.Sum(nil)
|
|
return "sha1=" + hex.EncodeToString(result)
|
|
}
|