Sign webhook requests (#4156)

Co-authored-by: Tom Moor <tom.moor@gmail.com>
This commit is contained in:
Apoorv Mishra
2022-09-25 02:49:26 +05:30
committed by GitHub
parent 75fb0826c5
commit 7a590550c9
9 changed files with 139 additions and 6 deletions

View File

@@ -0,0 +1,14 @@
"use strict";
module.exports = {
async up (queryInterface, Sequelize) {
return queryInterface.addColumn("webhook_subscriptions", "secret", {
type: Sequelize.BLOB,
allowNull: true,
});
},
async down (queryInterface, Sequelize) {
return queryInterface.removeColumn("webhook_subscriptions", "secret");
}
};

View File

@@ -1,4 +1,6 @@
import crypto from "crypto";
import { bool } from "aws-sdk/clients/signer";
import { isEmpty } from "lodash";
import {
Column,
Table,
@@ -9,6 +11,7 @@ import {
IsUrl,
BeforeCreate,
DefaultScope,
AllowNull,
} from "sequelize-typescript";
import { SaveOptions } from "sequelize/types";
import { WebhookSubscriptionValidation } from "@shared/validations";
@@ -17,6 +20,10 @@ import { Event } from "@server/types";
import Team from "./Team";
import User from "./User";
import ParanoidModel from "./base/ParanoidModel";
import Encrypted, {
setEncryptedColumn,
getEncryptedColumn,
} from "./decorators/Encrypted";
import Fix from "./decorators/Fix";
import Length from "./validators/Length";
@@ -51,6 +58,21 @@ class WebhookSubscription extends ParanoidModel {
@Column(DataType.ARRAY(DataType.STRING))
events: string[];
@AllowNull
@Encrypted
@Column(DataType.BLOB)
get secret() {
const val = getEncryptedColumn(this, "secret");
// Turns out that `val` evals to `{}` instead
// of `null` even if secret's value in db is `null`.
// https://github.com/defunctzombie/sequelize-encrypted/blob/c3854e76ae4b80318c8f10f94e6c898c67659ca6/index.js#L30-L33 explains it possibly.
return isEmpty(val) ? "" : val;
}
set secret(value: string) {
setEncryptedColumn(this, "secret", value);
}
// associations
@BelongsTo(() => User, "createdById")
@@ -87,12 +109,19 @@ class WebhookSubscription extends ParanoidModel {
* Disables the webhook subscription
*
* @param options Save options
* @returns Promise<void>
* @returns Promise<WebhookSubscription>
*/
public async disable(options?: SaveOptions<WebhookSubscription>) {
return this.update({ enabled: false }, options);
}
/**
* Determines if an event should be processed for this webhook subscription
* based on the event configuration.
*
* @param event Event to ceck
* @returns true if event is valid
*/
public validForEvent = (event: Event): bool => {
if (this.events.length === 1 && this.events[0] === "*") {
return true;
@@ -106,6 +135,28 @@ class WebhookSubscription extends ParanoidModel {
return false;
};
/**
* Calculates the signature for a webhook payload if the webhook subscription
* has an associated secret stored.
*
* @param payload The text payload of a webhook delivery
* @returns the signature as a string
*/
public signature = (payload: string) => {
if (isEmpty(this.secret)) {
return;
}
const signTimestamp = Date.now();
const signature = crypto
.createHmac("sha256", this.secret)
.update(`${signTimestamp}.${payload}`)
.digest("hex");
return `t=${signTimestamp},s=${signature}`;
};
}
export default WebhookSubscription;

View File

@@ -5,6 +5,7 @@ export default function present(webhook: WebhookSubscription) {
id: webhook.id,
name: webhook.name,
url: webhook.url,
secret: webhook.secret,
events: webhook.events,
enabled: webhook.enabled,
createdAt: webhook.createdAt,

View File

@@ -70,6 +70,33 @@ describe("DeliverWebhookTask", () => {
expect(delivery.responseBody).toEqual("SUCCESS");
});
test("should hit the subscription url with signature header", async () => {
const subscription = await buildWebhookSubscription({
url: "http://example.com",
events: ["*"],
secret: "secret",
});
const signedInUser = await buildUser({ teamId: subscription.teamId });
const processor = new DeliverWebhookTask();
const event: UserEvent = {
name: "users.signin",
userId: signedInUser.id,
teamId: subscription.teamId,
actorId: signedInUser.id,
ip,
};
await processor.perform({
subscriptionId: subscription.id,
event,
});
const headers = fetchMock.mock.calls[0]![1]!.headers!;
expect(fetchMock).toHaveBeenCalledTimes(1);
expect(headers["Outline-Signature"]).toMatch(/^t=[0-9]+,s=[a-z0-9]+$/);
});
test("should hit the subscription url when the eventing model doesn't exist", async () => {
const subscription = await buildWebhookSubscription({
url: "http://example.com",

View File

@@ -209,12 +209,20 @@ export default class DeliverWebhookTask extends BaseTask<Props> {
paranoid: false,
});
let data = null;
if (model) {
data = {
...presentWebhookSubscription(model),
secret: undefined,
};
}
await this.sendWebhook({
event,
subscription,
payload: {
id: event.modelId,
model: model && presentWebhookSubscription(model),
model: data,
},
});
}
@@ -540,6 +548,12 @@ export default class DeliverWebhookTask extends BaseTask<Props> {
env.VERSION ? `/${env.VERSION.slice(0, 7)}` : ""
}`,
};
const signature = subscription.signature(JSON.stringify(requestBody));
if (signature) {
requestHeaders["Outline-Signature"] = signature;
}
response = await fetch(subscription.url, {
method: "POST",
headers: requestHeaders,

View File

@@ -1,5 +1,5 @@
import Router from "koa-router";
import { compact } from "lodash";
import { compact, isEmpty } from "lodash";
import { ValidationError } from "@server/errors";
import auth from "@server/middlewares/authentication";
import { WebhookSubscription, Event } from "@server/models";
@@ -41,7 +41,7 @@ router.post(
const { user } = ctx.state;
authorize(user, "createWebhookSubscription", user.team);
const { name, url } = ctx.request.body;
const { name, url, secret } = ctx.request.body;
const events: string[] = compact(ctx.request.body.events);
assertPresent(name, "name is required");
assertPresent(url, "url is required");
@@ -57,6 +57,7 @@ router.post(
teamId: user.teamId,
url,
enabled: true,
secret: isEmpty(secret) ? undefined : secret,
});
const event: WebhookSubscriptionEvent = {
@@ -116,7 +117,7 @@ router.post(
assertUuid(id, "id is required");
const { user } = ctx.state;
const { name, url } = ctx.request.body;
const { name, url, secret } = ctx.request.body;
const events: string[] = compact(ctx.request.body.events);
assertPresent(name, "name is required");
assertPresent(url, "url is required");
@@ -129,7 +130,13 @@ router.post(
authorize(user, "update", webhookSubscription);
await webhookSubscription.update({ name, url, events, enabled: true });
await webhookSubscription.update({
name,
url,
events,
enabled: true,
secret: isEmpty(secret) ? undefined : secret,
});
const event: WebhookSubscriptionEvent = {
name: "webhook_subscriptions.update",