2021-02-02 11:05:50 +01:00
|
|
|
#![feature(proc_macro_hygiene, decl_macro)]
|
|
|
|
|
2021-03-03 15:24:46 +01:00
|
|
|
use anyhow::{anyhow, bail, Result};
|
2021-03-28 03:50:52 +02:00
|
|
|
use hmac::{Hmac, Mac, NewMac};
|
2021-04-02 00:25:39 +02:00
|
|
|
use ipnet::IpNet;
|
2021-03-28 03:50:52 +02:00
|
|
|
use log::{debug, error, info, trace, warn};
|
2021-03-21 15:51:58 +01:00
|
|
|
use nom::{
|
|
|
|
branch::alt,
|
|
|
|
bytes::complete::{tag, take_until},
|
|
|
|
combinator::map_res,
|
|
|
|
multi::many0,
|
|
|
|
sequence::delimited,
|
|
|
|
Finish, IResult,
|
|
|
|
};
|
2021-03-03 15:24:46 +01:00
|
|
|
use regex::Regex;
|
2021-03-28 03:50:52 +02:00
|
|
|
use rocket::{
|
|
|
|
data::{self, FromDataSimple},
|
|
|
|
fairing::AdHoc,
|
|
|
|
get,
|
|
|
|
http::{HeaderMap, Status},
|
|
|
|
post, routes, Data,
|
|
|
|
Outcome::{Failure, Success},
|
|
|
|
Request, Response, State,
|
|
|
|
};
|
2021-04-16 17:42:40 +02:00
|
|
|
use run_script::ScriptOptions;
|
2021-02-02 11:05:50 +01:00
|
|
|
use serde::{Deserialize, Serialize};
|
2021-03-28 03:50:52 +02:00
|
|
|
use sha2::Sha256;
|
2021-04-03 01:10:50 +02:00
|
|
|
use thiserror::Error;
|
2021-02-02 11:05:50 +01:00
|
|
|
|
2021-03-22 11:12:45 +01:00
|
|
|
use std::{
|
2021-03-28 03:50:52 +02:00
|
|
|
collections::HashMap,
|
|
|
|
fs::File,
|
|
|
|
io::{BufReader, Read},
|
2021-04-02 00:25:39 +02:00
|
|
|
net::{IpAddr, Ipv4Addr, SocketAddr},
|
2021-03-22 11:12:45 +01:00
|
|
|
};
|
2021-03-03 15:24:46 +01:00
|
|
|
|
|
|
|
#[derive(Debug, Deserialize, Serialize)]
|
2021-04-02 00:25:39 +02:00
|
|
|
#[serde(deny_unknown_fields, untagged)]
|
|
|
|
enum AddrType {
|
|
|
|
IpAddr(IpAddr),
|
|
|
|
IpNet(IpNet),
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug, Deserialize, Serialize)]
|
|
|
|
#[serde(deny_unknown_fields, rename_all = "lowercase")]
|
|
|
|
enum IpFilter {
|
|
|
|
Allow(Vec<AddrType>),
|
|
|
|
Deny(Vec<AddrType>),
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug, Deserialize, Serialize)]
|
|
|
|
#[serde(deny_unknown_fields)]
|
2021-03-03 15:24:46 +01:00
|
|
|
struct Config {
|
|
|
|
hooks: HashMap<String, Hook>,
|
|
|
|
}
|
|
|
|
|
2021-02-02 11:05:50 +01:00
|
|
|
#[derive(Debug, Deserialize, Serialize)]
|
2021-04-02 00:25:39 +02:00
|
|
|
#[serde(deny_unknown_fields)]
|
2021-03-03 15:24:46 +01:00
|
|
|
struct Hook {
|
2021-03-28 03:50:52 +02:00
|
|
|
command: String,
|
2021-03-29 04:21:31 +02:00
|
|
|
signature: String,
|
2021-04-02 00:25:39 +02:00
|
|
|
ip_filter: Option<IpFilter>,
|
2021-03-19 10:16:46 +01:00
|
|
|
secrets: Vec<String>,
|
2021-03-03 15:24:46 +01:00
|
|
|
filters: HashMap<String, Filter>,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug, Deserialize, Serialize)]
|
2021-04-02 00:25:39 +02:00
|
|
|
#[serde(deny_unknown_fields)]
|
2021-03-03 15:24:46 +01:00
|
|
|
struct Filter {
|
|
|
|
pointer: String,
|
|
|
|
regex: String,
|
|
|
|
}
|
|
|
|
|
2021-04-03 01:10:50 +02:00
|
|
|
#[derive(Debug, Error)]
|
|
|
|
enum WebhookeyError {
|
|
|
|
#[error("Could not extract signature from header")]
|
|
|
|
InvalidHeader,
|
|
|
|
#[error("Unauthorized request from `{0}`")]
|
|
|
|
Unauthorized(IpAddr),
|
|
|
|
#[error("Unmatched hook from `{0}`")]
|
|
|
|
UnmatchedHook(IpAddr),
|
|
|
|
#[error("IO Error")]
|
|
|
|
Io(std::io::Error),
|
|
|
|
#[error("Serde Error")]
|
|
|
|
Serde(serde_json::Error),
|
|
|
|
}
|
|
|
|
|
2021-03-28 03:50:52 +02:00
|
|
|
#[derive(Debug)]
|
2021-03-29 04:21:31 +02:00
|
|
|
struct Hooks(HashMap<String, String>);
|
2021-02-02 11:05:50 +01:00
|
|
|
|
2021-04-03 01:10:50 +02:00
|
|
|
fn accept_ip(hook_name: &str, client_ip: &IpAddr, ip_filter: &Option<IpFilter>) -> bool {
|
2021-04-02 00:25:39 +02:00
|
|
|
match ip_filter {
|
|
|
|
Some(IpFilter::Allow(list)) => {
|
|
|
|
for i in list {
|
|
|
|
match i {
|
|
|
|
AddrType::IpAddr(addr) => {
|
|
|
|
if addr == client_ip {
|
|
|
|
info!("Allow hook `{}` from {}", &hook_name, &addr);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
AddrType::IpNet(net) => {
|
|
|
|
if net.contains(client_ip) {
|
|
|
|
info!("Allow hook `{}` from {}", &hook_name, &net);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
warn!("Deny hook `{}` from {}", &hook_name, &client_ip);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
Some(IpFilter::Deny(list)) => {
|
|
|
|
for i in list {
|
|
|
|
match i {
|
|
|
|
AddrType::IpAddr(addr) => {
|
|
|
|
if addr == client_ip {
|
|
|
|
warn!("Deny hook `{}` from {}", &hook_name, &addr);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
AddrType::IpNet(net) => {
|
|
|
|
if net.contains(client_ip) {
|
|
|
|
warn!("Deny hook `{}` from {}", &hook_name, &net);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
info!("Allow hook `{}` from {}", &hook_name, &client_ip)
|
|
|
|
}
|
|
|
|
None => info!(
|
|
|
|
"Allow hook `{}` from {} as no IP filter was configured",
|
|
|
|
&hook_name, &client_ip
|
|
|
|
),
|
|
|
|
}
|
|
|
|
|
|
|
|
true
|
|
|
|
}
|
|
|
|
|
2021-03-29 02:19:30 +02:00
|
|
|
fn validate_request(secret: &str, signature: &str, data: &[u8]) -> Result<()> {
|
|
|
|
let mut mac = Hmac::<Sha256>::new_varkey(&secret.as_bytes())
|
|
|
|
.map_err(|e| anyhow!("Could not create hasher with secret: {}", e))?;
|
|
|
|
mac.update(&data);
|
|
|
|
let raw_signature = hex::decode(signature.as_bytes())?;
|
|
|
|
mac.verify(&raw_signature).map_err(|e| anyhow!("{}", e))
|
|
|
|
}
|
|
|
|
|
2021-04-16 09:58:15 +02:00
|
|
|
fn get_parameter(input: &str) -> Result<Vec<&str>> {
|
|
|
|
let parse: IResult<&str, Vec<&str>> = many0(alt((
|
|
|
|
delimited(tag("{{"), take_until("}}"), tag("}}")),
|
|
|
|
take_until("{{"),
|
|
|
|
)))(&input);
|
|
|
|
|
|
|
|
let (_last, result) = parse
|
|
|
|
.finish()
|
|
|
|
.map_err(|e| anyhow!("Could not get parameters from command: {}", e))?;
|
|
|
|
|
|
|
|
Ok(result)
|
|
|
|
}
|
|
|
|
|
2021-03-28 03:50:52 +02:00
|
|
|
fn replace_parameter(input: &str, headers: &HeaderMap, data: &serde_json::Value) -> Result<String> {
|
2021-03-21 15:51:58 +01:00
|
|
|
let parse: IResult<&str, Vec<&str>> = many0(alt((
|
|
|
|
map_res(
|
|
|
|
delimited(tag("{{"), take_until("}}"), tag("}}")),
|
2021-03-30 01:16:15 +02:00
|
|
|
|param: &str| {
|
|
|
|
let expr = param.trim().split(' ').collect::<Vec<&str>>();
|
|
|
|
|
|
|
|
match expr.get(0) {
|
|
|
|
Some(&"header") => {
|
|
|
|
if let Some(field) = expr.get(1) {
|
|
|
|
match headers.get_one(field) {
|
|
|
|
Some(value) => Ok(value),
|
|
|
|
_ => bail!("Could not extract event parameter from header"),
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
bail!("Missing parameter for `header` expression");
|
|
|
|
}
|
2021-03-21 15:51:58 +01:00
|
|
|
}
|
2021-03-30 01:16:15 +02:00
|
|
|
Some(pointer) => match data.pointer(pointer) {
|
|
|
|
Some(value) => match value.as_str() {
|
|
|
|
Some(value) => Ok(value),
|
|
|
|
_ => bail!("Could not convert value `{}` to string", value),
|
|
|
|
},
|
|
|
|
_ => bail!("Could not convert field `{}` to string", param.trim()),
|
2021-03-28 03:50:52 +02:00
|
|
|
},
|
2021-03-30 01:16:15 +02:00
|
|
|
None => bail!("Missing expression in `{}`", input),
|
|
|
|
}
|
2021-03-21 15:51:58 +01:00
|
|
|
},
|
|
|
|
),
|
|
|
|
take_until("{{"),
|
|
|
|
)))(input);
|
|
|
|
|
|
|
|
let (last, mut result) = parse
|
|
|
|
.finish()
|
|
|
|
.map_err(|e| anyhow!("Could not parse command: {}", e))?;
|
|
|
|
result.push(last);
|
|
|
|
|
|
|
|
Ok(result.join(""))
|
|
|
|
}
|
|
|
|
|
2021-04-16 09:58:15 +02:00
|
|
|
fn get_string(value: &serde_json::Value) -> Result<String> {
|
|
|
|
match &value {
|
|
|
|
serde_json::Value::Null => unimplemented!(),
|
|
|
|
serde_json::Value::Bool(_bool) => unimplemented!(),
|
|
|
|
serde_json::Value::Number(number) => Ok(number.to_string()),
|
|
|
|
serde_json::Value::String(string) => Ok(string.as_str().to_string()),
|
|
|
|
serde_json::Value::Array(_array) => unimplemented!(),
|
|
|
|
serde_json::Value::Object(_object) => unimplemented!(),
|
2021-04-13 16:55:13 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-29 02:19:30 +02:00
|
|
|
fn filter_match(
|
|
|
|
hook_name: &str,
|
|
|
|
hook: &Hook,
|
|
|
|
filter_name: &str,
|
|
|
|
filter: &Filter,
|
|
|
|
request: &Request,
|
2021-04-16 09:58:15 +02:00
|
|
|
data: &mut serde_json::Value,
|
2021-03-29 02:19:30 +02:00
|
|
|
) -> Result<Option<String>> {
|
|
|
|
trace!("Matching filter `{}` of hook `{}`", filter_name, hook_name);
|
|
|
|
|
|
|
|
let regex = Regex::new(&filter.regex)?;
|
|
|
|
|
2021-04-16 17:42:40 +02:00
|
|
|
for parameter in get_parameter(&hook.command)? {
|
2021-04-16 09:58:15 +02:00
|
|
|
let parameter = parameter.trim();
|
2021-04-16 17:42:40 +02:00
|
|
|
|
2021-04-16 09:58:15 +02:00
|
|
|
if let Some(json_value) = data.pointer(parameter) {
|
|
|
|
*data.pointer_mut(parameter).unwrap() = match json_value {
|
2021-04-16 17:42:40 +02:00
|
|
|
serde_json::Value::String(string) => serde_json::Value::String(string.to_string()),
|
|
|
|
serde_json::Value::Number(number) => serde_json::Value::String(number.to_string()),
|
2021-04-16 09:58:15 +02:00
|
|
|
x => {
|
|
|
|
error!("Could not get string from: {:?}", x);
|
|
|
|
unimplemented!()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-29 02:19:30 +02:00
|
|
|
if let Some(value) = data.pointer(&filter.pointer) {
|
2021-04-16 09:58:15 +02:00
|
|
|
let value = get_string(value)?;
|
2021-04-13 16:55:13 +02:00
|
|
|
|
|
|
|
if regex.is_match(&value) {
|
|
|
|
debug!("Filter `{}` of hook `{}` matched", filter_name, hook_name);
|
|
|
|
|
|
|
|
return Ok(Some(replace_parameter(
|
2021-04-16 09:58:15 +02:00
|
|
|
&hook.command,
|
2021-04-13 16:55:13 +02:00
|
|
|
&request.headers(),
|
|
|
|
data,
|
|
|
|
)?));
|
2021-03-29 02:19:30 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-13 16:55:13 +02:00
|
|
|
debug!(
|
2021-03-29 02:19:30 +02:00
|
|
|
"Filter `{}` of hook `{}` did not match",
|
2021-04-16 09:58:15 +02:00
|
|
|
filter_name, hook_name
|
2021-03-29 02:19:30 +02:00
|
|
|
);
|
|
|
|
|
|
|
|
Ok(None)
|
|
|
|
}
|
|
|
|
|
2021-04-03 01:10:50 +02:00
|
|
|
fn execute_hooks(request: &Request, data: Data) -> Result<Hooks, WebhookeyError> {
|
|
|
|
let mut buffer = Vec::new();
|
|
|
|
let size = data
|
|
|
|
.open()
|
|
|
|
.read_to_end(&mut buffer)
|
|
|
|
.map_err(WebhookeyError::Io)?;
|
|
|
|
info!("Data of size {} received", size);
|
|
|
|
|
|
|
|
let config = request.guard::<State<Config>>().unwrap(); // should never fail
|
|
|
|
let mut valid = false;
|
|
|
|
let mut hooks = HashMap::new();
|
|
|
|
let client_ip = &request
|
|
|
|
.client_ip()
|
|
|
|
.unwrap_or(IpAddr::V4(Ipv4Addr::UNSPECIFIED));
|
|
|
|
|
|
|
|
for (hook_name, hook) in &config.hooks {
|
|
|
|
if accept_ip(&hook_name, &client_ip, &hook.ip_filter) {
|
|
|
|
if let Some(signature) = request.headers().get_one(&hook.signature) {
|
|
|
|
for secret in &hook.secrets {
|
|
|
|
match validate_request(&secret, &signature, &buffer) {
|
|
|
|
Ok(()) => {
|
|
|
|
trace!("Valid signature found for hook `{}`", hook_name,);
|
|
|
|
|
|
|
|
valid = true;
|
|
|
|
|
2021-04-16 09:58:15 +02:00
|
|
|
let mut data: serde_json::Value =
|
2021-04-03 01:10:50 +02:00
|
|
|
serde_json::from_slice(&buffer).map_err(WebhookeyError::Serde)?;
|
|
|
|
|
|
|
|
for (filter_name, filter) in &hook.filters {
|
|
|
|
match filter_match(
|
|
|
|
&hook_name,
|
|
|
|
&hook,
|
|
|
|
&filter_name,
|
|
|
|
&filter,
|
|
|
|
&request,
|
2021-04-16 09:58:15 +02:00
|
|
|
&mut data,
|
2021-04-03 01:10:50 +02:00
|
|
|
) {
|
|
|
|
Ok(Some(command)) => {
|
|
|
|
hooks.insert(hook_name.to_string(), command);
|
|
|
|
break;
|
2021-03-29 04:21:31 +02:00
|
|
|
}
|
2021-04-03 01:10:50 +02:00
|
|
|
Ok(None) => {}
|
|
|
|
Err(e) => error!("{}", e),
|
2021-03-28 03:50:52 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-04-03 01:10:50 +02:00
|
|
|
Err(e) => trace!("Hook `{}` could not validate request: {}", &hook_name, e),
|
2021-03-28 03:50:52 +02:00
|
|
|
}
|
|
|
|
}
|
2021-04-03 01:10:50 +02:00
|
|
|
} else {
|
|
|
|
return Err(WebhookeyError::InvalidHeader);
|
2021-03-28 03:50:52 +02:00
|
|
|
}
|
2021-03-29 04:21:31 +02:00
|
|
|
}
|
2021-04-03 01:10:50 +02:00
|
|
|
}
|
2021-03-17 13:40:08 +01:00
|
|
|
|
2021-04-03 01:10:50 +02:00
|
|
|
if !valid {
|
|
|
|
return Err(WebhookeyError::Unauthorized(*client_ip));
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(Hooks(hooks))
|
|
|
|
}
|
|
|
|
|
|
|
|
impl FromDataSimple for Hooks {
|
|
|
|
type Error = WebhookeyError;
|
|
|
|
|
|
|
|
fn from_data(request: &Request, data: Data) -> data::Outcome<Self, Self::Error> {
|
|
|
|
match execute_hooks(&request, data) {
|
|
|
|
Ok(hooks) => {
|
|
|
|
if hooks.0.is_empty() {
|
|
|
|
let client_ip = &request
|
|
|
|
.client_ip()
|
|
|
|
.unwrap_or(IpAddr::V4(Ipv4Addr::UNSPECIFIED));
|
|
|
|
|
|
|
|
warn!("Unmatched hook from {}", &client_ip);
|
|
|
|
return Failure((Status::NotFound, WebhookeyError::UnmatchedHook(*client_ip)));
|
|
|
|
}
|
|
|
|
|
|
|
|
Success(hooks)
|
|
|
|
}
|
|
|
|
Err(WebhookeyError::Unauthorized(e)) => {
|
|
|
|
error!("{}", WebhookeyError::Unauthorized(e));
|
|
|
|
Failure((Status::Unauthorized, WebhookeyError::Unauthorized(e)))
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
error!("{}", e);
|
|
|
|
Failure((Status::BadRequest, e))
|
2021-03-28 03:50:52 +02:00
|
|
|
}
|
|
|
|
}
|
2021-03-03 15:24:46 +01:00
|
|
|
}
|
2021-03-28 03:50:52 +02:00
|
|
|
}
|
2021-03-03 15:24:46 +01:00
|
|
|
|
2021-03-28 03:50:52 +02:00
|
|
|
#[get("/")]
|
|
|
|
fn index() -> &'static str {
|
|
|
|
"Hello, webhookey!"
|
2021-03-03 15:24:46 +01:00
|
|
|
}
|
|
|
|
|
2021-03-28 03:50:52 +02:00
|
|
|
#[post("/", format = "json", data = "<hooks>")]
|
|
|
|
fn receive_hook<'a>(address: SocketAddr, hooks: Hooks) -> Result<Response<'a>> {
|
2021-03-20 00:12:01 +01:00
|
|
|
info!("Post request received from: {}", address);
|
2021-03-03 16:14:54 +01:00
|
|
|
|
2021-03-28 03:50:52 +02:00
|
|
|
for hook in hooks.0 {
|
2021-03-29 04:21:31 +02:00
|
|
|
info!("Execute `{}` from hook `{}`", &hook.1, &hook.0);
|
|
|
|
|
2021-04-16 17:42:40 +02:00
|
|
|
match run_script::run(&hook.1, &vec![], &ScriptOptions::new()) {
|
|
|
|
Ok((status, stdout, stderr)) => {
|
|
|
|
info!("Command `{}` exited with return code: {}", &hook.1, status);
|
|
|
|
trace!("Output of command `{}` on stdout: {:?}", &hook.1, &stdout);
|
|
|
|
debug!("Output of command `{}` on stderr: {:?}", &hook.1, &stderr);
|
2021-03-29 04:21:31 +02:00
|
|
|
}
|
|
|
|
Err(e) => {
|
2021-04-16 17:42:40 +02:00
|
|
|
error!("Execution of `{}` failed: {}", &hook.1, e);
|
2021-03-19 10:16:46 +01:00
|
|
|
}
|
|
|
|
}
|
2021-03-03 15:24:46 +01:00
|
|
|
}
|
|
|
|
|
2021-03-28 03:50:52 +02:00
|
|
|
Ok(Response::new())
|
2021-02-02 11:05:50 +01:00
|
|
|
}
|
|
|
|
|
2021-03-03 15:24:46 +01:00
|
|
|
fn get_config() -> Result<File> {
|
|
|
|
if let Ok(config) = File::open("/etc/webhookey/config.yml") {
|
2021-03-03 16:14:54 +01:00
|
|
|
info!("Loading configuration from `/etc/webhookey/config.yml`");
|
|
|
|
|
2021-03-03 15:24:46 +01:00
|
|
|
return Ok(config);
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(mut path) = dirs::config_dir() {
|
|
|
|
path.push("webhookey/config.yml");
|
|
|
|
|
2021-03-03 16:14:54 +01:00
|
|
|
if let Ok(config) = File::open(&path) {
|
|
|
|
info!(
|
|
|
|
"Loading configuration from `{}`",
|
2021-03-21 15:51:58 +01:00
|
|
|
path.to_str().unwrap_or("<path unprintable>"),
|
2021-03-03 16:14:54 +01:00
|
|
|
);
|
|
|
|
|
2021-03-03 15:24:46 +01:00
|
|
|
return Ok(config);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Ok(config) = File::open("config.yml") {
|
2021-03-03 16:14:54 +01:00
|
|
|
info!("Loading configuration from `./config.yml`");
|
|
|
|
|
2021-03-03 15:24:46 +01:00
|
|
|
return Ok(config);
|
|
|
|
}
|
|
|
|
|
2021-03-30 01:16:15 +02:00
|
|
|
bail!("No configuration file found.");
|
2021-03-03 15:24:46 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
fn main() -> Result<()> {
|
2021-03-03 16:14:54 +01:00
|
|
|
env_logger::init();
|
|
|
|
|
2021-03-20 00:12:01 +01:00
|
|
|
let config: Config = serde_yaml::from_reader(BufReader::new(get_config()?))?;
|
2021-03-03 15:24:46 +01:00
|
|
|
|
2021-03-03 16:14:54 +01:00
|
|
|
trace!("Parsed configuration:\n{}", serde_yaml::to_string(&config)?);
|
2021-03-03 15:24:46 +01:00
|
|
|
|
2021-02-02 11:05:50 +01:00
|
|
|
rocket::ignite()
|
|
|
|
.mount("/", routes![index, receive_hook])
|
2021-03-03 15:24:46 +01:00
|
|
|
.attach(AdHoc::on_attach("webhookey config", move |rocket| {
|
|
|
|
Ok(rocket.manage(config))
|
|
|
|
}))
|
2021-02-02 11:05:50 +01:00
|
|
|
.launch();
|
2021-03-03 15:24:46 +01:00
|
|
|
|
|
|
|
Ok(())
|
2021-02-02 11:05:50 +01:00
|
|
|
}
|
2021-03-20 00:12:01 +01:00
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
2021-03-28 03:50:52 +02:00
|
|
|
use rocket::{
|
|
|
|
http::{ContentType, Header},
|
|
|
|
local::Client,
|
|
|
|
};
|
2021-03-21 15:51:58 +01:00
|
|
|
use serde_json::json;
|
2021-03-20 00:12:01 +01:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn index() {
|
|
|
|
let rocket = rocket::ignite().mount("/", routes![index]);
|
|
|
|
|
|
|
|
let client = Client::new(rocket).unwrap();
|
|
|
|
let mut response = client.get("/").dispatch();
|
|
|
|
|
|
|
|
assert_eq!(response.status(), Status::Ok);
|
|
|
|
assert_eq!(response.body_string(), Some("Hello, webhookey!".into()));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn secret() {
|
|
|
|
let mut hooks = HashMap::new();
|
|
|
|
hooks.insert(
|
|
|
|
"test_hook".to_string(),
|
|
|
|
Hook {
|
2021-03-28 03:50:52 +02:00
|
|
|
command: "".to_string(),
|
2021-03-29 04:21:31 +02:00
|
|
|
signature: "X-Gitea-Signature".to_string(),
|
2021-04-02 00:25:39 +02:00
|
|
|
ip_filter: None,
|
2021-03-20 00:12:01 +01:00
|
|
|
secrets: vec!["valid".to_string()],
|
|
|
|
filters: HashMap::new(),
|
|
|
|
},
|
|
|
|
);
|
|
|
|
let config = Config { hooks: hooks };
|
|
|
|
|
|
|
|
let rocket = rocket::ignite()
|
|
|
|
.mount("/", routes![receive_hook])
|
|
|
|
.attach(AdHoc::on_attach("webhookey config", move |rocket| {
|
|
|
|
Ok(rocket.manage(config))
|
|
|
|
}));
|
|
|
|
|
|
|
|
let client = Client::new(rocket).unwrap();
|
|
|
|
let response = client
|
|
|
|
.post("/")
|
2021-03-28 03:50:52 +02:00
|
|
|
.header(Header::new(
|
|
|
|
"X-Gitea-Signature",
|
|
|
|
"28175a0035f637f3cbb85afee9f9d319631580e7621cf790cd16ca063a2f820e",
|
|
|
|
))
|
2021-03-20 00:12:01 +01:00
|
|
|
.header(ContentType::JSON)
|
|
|
|
.remote("127.0.0.1:8000".parse().unwrap())
|
2021-03-28 03:50:52 +02:00
|
|
|
.body(&serde_json::to_string(&json!({ "foo": "bar" })).unwrap())
|
2021-03-20 00:12:01 +01:00
|
|
|
.dispatch();
|
|
|
|
|
2021-03-28 03:50:52 +02:00
|
|
|
assert_eq!(response.status(), Status::NotFound);
|
2021-03-20 00:12:01 +01:00
|
|
|
|
|
|
|
let response = client
|
|
|
|
.post("/")
|
2021-03-28 03:50:52 +02:00
|
|
|
.header(Header::new("X-Gitea-Signature", "beef"))
|
2021-03-20 00:12:01 +01:00
|
|
|
.header(ContentType::JSON)
|
|
|
|
.remote("127.0.0.1:8000".parse().unwrap())
|
2021-03-28 03:50:52 +02:00
|
|
|
.body(&serde_json::to_string(&json!({ "foo": "bar" })).unwrap())
|
2021-03-20 00:12:01 +01:00
|
|
|
.dispatch();
|
|
|
|
|
|
|
|
assert_eq!(response.status(), Status::Unauthorized);
|
|
|
|
|
|
|
|
let response = client
|
|
|
|
.post("/")
|
2021-03-28 03:50:52 +02:00
|
|
|
.header(Header::new(
|
|
|
|
"X-Gitea-Signature",
|
|
|
|
"c5c315d76318362ec129ca629b50b626bba09ad3d7ba4cc0f4c0afe4a90537a0",
|
|
|
|
))
|
2021-03-20 00:12:01 +01:00
|
|
|
.header(ContentType::JSON)
|
|
|
|
.remote("127.0.0.1:8000".parse().unwrap())
|
|
|
|
.body(r#"{ "not_secret": "invalid" "#)
|
|
|
|
.dispatch();
|
|
|
|
|
|
|
|
assert_eq!(response.status(), Status::BadRequest);
|
2021-03-29 02:19:30 +02:00
|
|
|
|
|
|
|
let response = client
|
|
|
|
.post("/")
|
|
|
|
.header(Header::new("X-Gitea-Signature", "foobar"))
|
|
|
|
.header(ContentType::JSON)
|
|
|
|
.remote("127.0.0.1:8000".parse().unwrap())
|
|
|
|
.dispatch();
|
|
|
|
|
|
|
|
assert_eq!(response.status(), Status::Unauthorized);
|
2021-03-20 00:12:01 +01:00
|
|
|
}
|
2021-03-21 15:51:58 +01:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn parse_command() {
|
2021-03-28 03:50:52 +02:00
|
|
|
let mut map = HeaderMap::new();
|
|
|
|
map.add_raw("X-Gitea-Event", "something");
|
|
|
|
|
2021-03-21 15:51:58 +01:00
|
|
|
assert_eq!(
|
2021-03-28 03:50:52 +02:00
|
|
|
replace_parameter("command", &map, &serde_json::Value::Null).unwrap(),
|
2021-03-21 15:51:58 +01:00
|
|
|
"command"
|
|
|
|
);
|
|
|
|
|
|
|
|
assert_eq!(
|
2021-03-28 03:50:52 +02:00
|
|
|
replace_parameter(" command", &map, &serde_json::Value::Null).unwrap(),
|
2021-03-21 15:51:58 +01:00
|
|
|
" command"
|
|
|
|
);
|
|
|
|
|
|
|
|
assert_eq!(
|
2021-03-28 03:50:52 +02:00
|
|
|
replace_parameter("command ", &map, &serde_json::Value::Null).unwrap(),
|
2021-03-21 15:51:58 +01:00
|
|
|
"command "
|
|
|
|
);
|
|
|
|
|
|
|
|
assert_eq!(
|
2021-03-28 03:50:52 +02:00
|
|
|
replace_parameter(" command ", &map, &serde_json::Value::Null).unwrap(),
|
2021-03-21 15:51:58 +01:00
|
|
|
" command "
|
|
|
|
);
|
|
|
|
|
|
|
|
assert_eq!(
|
2021-03-28 03:50:52 +02:00
|
|
|
replace_parameter("command command ", &map, &serde_json::Value::Null).unwrap(),
|
2021-03-21 15:51:58 +01:00
|
|
|
"command command "
|
|
|
|
);
|
|
|
|
|
|
|
|
assert_eq!(
|
2021-03-28 03:50:52 +02:00
|
|
|
replace_parameter("{{ /foo }} command", &map, &json!({ "foo": "bar" })).unwrap(),
|
2021-03-21 15:51:58 +01:00
|
|
|
"bar command"
|
|
|
|
);
|
|
|
|
|
|
|
|
assert_eq!(
|
2021-03-28 03:50:52 +02:00
|
|
|
replace_parameter(" command {{ /foo }} ", &map, &json!({ "foo": "bar" })).unwrap(),
|
2021-03-21 15:51:58 +01:00
|
|
|
" command bar "
|
|
|
|
);
|
|
|
|
|
|
|
|
assert_eq!(
|
|
|
|
replace_parameter(
|
|
|
|
"{{ /foo }} command{{/field1/foo}}",
|
2021-03-28 03:50:52 +02:00
|
|
|
&map,
|
2021-03-21 15:51:58 +01:00
|
|
|
&json!({ "foo": "bar", "field1": { "foo": "baz" } })
|
|
|
|
)
|
|
|
|
.unwrap(),
|
|
|
|
"bar commandbaz"
|
|
|
|
);
|
|
|
|
|
|
|
|
assert_eq!(
|
2021-03-28 03:50:52 +02:00
|
|
|
replace_parameter(" command {{ /foo }} ", &map, &json!({ "foo": "bar" })).unwrap(),
|
2021-03-21 15:51:58 +01:00
|
|
|
" command bar "
|
|
|
|
);
|
|
|
|
|
|
|
|
assert_eq!(
|
|
|
|
replace_parameter(
|
|
|
|
" {{ /field1/foo }} command",
|
2021-03-28 03:50:52 +02:00
|
|
|
&map,
|
2021-03-21 15:51:58 +01:00
|
|
|
&json!({ "field1": { "foo": "bar" } })
|
|
|
|
)
|
|
|
|
.unwrap(),
|
|
|
|
" bar command"
|
|
|
|
);
|
2021-03-28 03:50:52 +02:00
|
|
|
|
2021-03-29 04:21:31 +02:00
|
|
|
assert_eq!(
|
|
|
|
replace_parameter(
|
2021-03-30 01:16:15 +02:00
|
|
|
" {{ header X-Gitea-Event }} command",
|
2021-03-29 04:21:31 +02:00
|
|
|
&map,
|
|
|
|
&json!({ "field1": { "foo": "bar" } })
|
|
|
|
)
|
|
|
|
.unwrap(),
|
|
|
|
" something command"
|
|
|
|
);
|
2021-03-21 15:51:58 +01:00
|
|
|
}
|
2021-03-20 00:12:01 +01:00
|
|
|
}
|