Skip to content

Commit 3df5eb4

Browse files
ChuckCrawfordtheckman
authored andcommitted
Add v3 webhook signature verification
This change is an extension of the PR raised by @ChezCrawford (#326), where the requested changes have been applied to the branch and all commits have been squashed. This adds a new function to the package, VerifySignatureWebhookV3, which accepts an *http.Request and a secret, and validates that the request is properly signed using that secret. This function does return some sentinel error values so that you can choose which HTTP status to send back to the caller. Supersedes #326
1 parent b7286a4 commit 3df5eb4

File tree

4 files changed

+238
-0
lines changed

4 files changed

+238
-0
lines changed

README.md

+8
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,14 @@ if ok { // resp is an *http.Response we can inspect
173173
}
174174
```
175175

176+
#### Included Packages
177+
178+
##### webhookv3
179+
180+
Support for V3 of PagerDuty Webhooks is provided via the `webhookv3` package.
181+
The intent is for this package to provide signature verification and decoding
182+
helpers.
183+
176184
## Contributing
177185

178186
1. Fork it ( https://github.com/PagerDuty/go-pagerduty/fork )

examples/webhooks/webhook_server.go

+39
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
package main
2+
3+
import (
4+
"fmt"
5+
"log"
6+
"net/http"
7+
8+
"github.com/PagerDuty/go-pagerduty/webhookv3"
9+
)
10+
11+
const (
12+
secret = "lDQHScfUeXUKaQRNF+8XIiDKZ7XX3itBAYzwU0TARw8lJqRnkKl2iB1anSb0Z+IK"
13+
)
14+
15+
func main() {
16+
http.HandleFunc("/webhook", handler)
17+
log.Fatal(http.ListenAndServe(":8080", nil))
18+
}
19+
20+
func handler(w http.ResponseWriter, r *http.Request) {
21+
err := webhookv3.VerifySignature(r, secret)
22+
if err != nil {
23+
switch err {
24+
case webhookv3.ErrNoValidSignatures:
25+
w.WriteHeader(http.StatusUnauthorized)
26+
27+
case webhookv3.ErrMalformedBody, webhookv3.ErrMalformedHeader:
28+
w.WriteHeader(http.StatusBadRequest)
29+
30+
default:
31+
w.WriteHeader(http.StatusInternalServerError)
32+
}
33+
34+
fmt.Fprintf(w, "%v", err)
35+
return
36+
}
37+
38+
fmt.Fprintf(w, "received signed webhook")
39+
}

webhookv3/webhookv3.go

+107
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
// Package webhookv3 provides functionality for working with V3 PagerDuty
2+
// Webhooks, including signature verification and decoding.
3+
package webhookv3
4+
5+
import (
6+
"bytes"
7+
"crypto/hmac"
8+
"crypto/sha256"
9+
"encoding/hex"
10+
"errors"
11+
"fmt"
12+
"io"
13+
"io/ioutil"
14+
"net/http"
15+
"strings"
16+
)
17+
18+
// ErrNoValidSignatures is returned when a webhook is not properly signed
19+
// with the expected signature. When receiving this error, it is reccommended
20+
// that the server return HTTP 403 to prevent redelivery.
21+
var ErrNoValidSignatures = errors.New("invalid webhook signature")
22+
23+
// ErrMalformedHeader is returned when the *http.Request is missing the
24+
// X-PagerDuty-Signature header. When receiving this error, it is recommended
25+
// that the server return HTTP 400 to prevent redelivery.
26+
var ErrMalformedHeader = errors.New("X-PagerDuty-Signature header is either missing or malformed")
27+
28+
// ErrMalformedBody is returned when the *http.Request body is either
29+
// missing or malformed. When receiving this error, it's recommended that the
30+
// server return HTTP 400 to prevent redelivery.
31+
var ErrMalformedBody = errors.New("HTTP request body is either empty or malformed")
32+
33+
const (
34+
webhookSignaturePrefix = "v1="
35+
webhookSignatureHeader = "X-PagerDuty-Signature"
36+
webhookBodyReaderLimit = 2 * 1024 * 1024 // 2MB
37+
)
38+
39+
// VerifySignature compares the provided signature of a PagerDuty v3 Webhook
40+
// against the expected value and returns an ErrNoValidSignature error if the
41+
// values do not match. This function may also return ErrMalformedHeader or
42+
// ErrMalformedBody if the request appears to be malformed.
43+
//
44+
// See https://developer.pagerduty.com/docs/ZG9jOjExMDI5NTkz-verifying-signatures for more details.
45+
//
46+
// This function will fail to read any HTTP request body that's 2MB or larger.
47+
func VerifySignature(r *http.Request, secret string) error {
48+
h := r.Header.Get(webhookSignatureHeader)
49+
if len(h) == 0 {
50+
return ErrMalformedHeader
51+
}
52+
53+
orb := r.Body
54+
55+
b, err := ioutil.ReadAll(io.LimitReader(r.Body, webhookBodyReaderLimit))
56+
if err != nil {
57+
return fmt.Errorf("failed to read response body: %w", err)
58+
}
59+
60+
defer func() { _ = orb.Close() }()
61+
r.Body = ioutil.NopCloser(bytes.NewReader(b))
62+
63+
if len(b) == 0 {
64+
return ErrMalformedBody
65+
}
66+
67+
sigs := extractPayloadSignatures(h)
68+
if len(sigs) == 0 {
69+
return ErrMalformedHeader
70+
}
71+
72+
s := calculateSignature(b, secret)
73+
74+
for _, sig := range sigs {
75+
if hmac.Equal(s, sig) {
76+
return nil
77+
}
78+
}
79+
80+
return ErrNoValidSignatures
81+
}
82+
83+
func extractPayloadSignatures(s string) [][]byte {
84+
var sigs [][]byte
85+
86+
for _, sv := range strings.Split(s, ",") {
87+
// Ignore any signatures that are not the initial v1 version.
88+
if !strings.HasPrefix(sv, webhookSignaturePrefix) {
89+
continue
90+
}
91+
92+
sig, err := hex.DecodeString(strings.TrimPrefix(sv, webhookSignaturePrefix))
93+
if err != nil {
94+
continue
95+
}
96+
97+
sigs = append(sigs, sig)
98+
}
99+
100+
return sigs
101+
}
102+
103+
func calculateSignature(payload []byte, secret string) []byte {
104+
mac := hmac.New(sha256.New, []byte(secret))
105+
mac.Write(payload)
106+
return mac.Sum(nil)
107+
}

webhookv3/webhookv3_test.go

+84
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
package webhookv3
2+
3+
import (
4+
"errors"
5+
"net/http"
6+
"strings"
7+
"testing"
8+
)
9+
10+
const (
11+
secret = "lDQHScfUeXUKaQRNF+8XIiDKZ7XX3itBAYzwU0TARw8lJqRnkKl2iB1anSb0Z+IK" /* #nosec */
12+
defaultBody = `{"event":{"id":"01BWDWL3NYY7LUFPZCC28QUCMK","event_type":"incident.priority_updated","resource_type":"incident","occurred_at":"2021-04-26T17:36:27.458Z","agent":{"html_url":"https://acme.pagerduty.com/users/PLH1HKV","id":"PLH1HKV","self":"https://api.pagerduty.com/users/PLH1HKV","summary":"Tenex Engineer","type":"user_reference"},"client":null,"data":{"id":"PGR0VU2","type":"incident","self":"https://api.pagerduty.com/incidents/PGR0VU2","html_url":"https://acme.pagerduty.com/incidents/PGR0VU2","number":2,"status":"triggered","title":"A little bump in the road","service":{"html_url":"https://acme.pagerduty.com/services/PF9KMXH","id":"PF9KMXH","self":"https://api.pagerduty.com/services/PF9KMXH","summary":"API Service","type":"service_reference"},"assignees":[{"html_url":"https://acme.pagerduty.com/users/PTUXL6G","id":"PTUXL6G","self":"https://api.pagerduty.com/users/PTUXL6G","summary":"User 123","type":"user_reference"}],"escalation_policy":{"html_url":"https://acme.pagerduty.com/escalation_policies/PUS0KTE","id":"PUS0KTE","self":"https://api.pagerduty.com/escalation_policies/PUS0KTE","summary":"Default","type":"escalation_policy_reference"},"teams":[{"html_url":"https://acme.pagerduty.com/teams/PFCVPS0","id":"PFCVPS0","self":"https://api.pagerduty.com/teams/PFCVPS0","summary":"Engineering","type":"team_reference"}],"priority":{"html_url":"https://acme.pagerduty.com/account/incident_priorities","id":"PSO75BM","self":"https://api.pagerduty.com/priorities/PSO75BM","summary":"P1","type":"priority_reference"},"urgency":"high","conference_bridge":{"conference_number":1000,"conference_url":"https://example.com"},"resolve_reason":null}}}`
13+
)
14+
15+
func TestVerifySignature(t *testing.T) {
16+
tests := []struct {
17+
name string
18+
sig string
19+
body string
20+
err error
21+
}{
22+
{
23+
name: "valid",
24+
sig: "v1=0c0b9495b893a39e70d1fea2fe11fbe0a825f88b9f67846f6cc07dd2bc5476cd",
25+
body: defaultBody,
26+
},
27+
{
28+
name: "mismatch",
29+
sig: "v1=7020c8a7ec668a9b7012bc3dd82e483394b038f4230acc6785efbf2a7d8bcaf5",
30+
body: defaultBody,
31+
err: ErrNoValidSignatures,
32+
},
33+
{
34+
name: "malformed_header",
35+
body: defaultBody,
36+
err: ErrMalformedHeader,
37+
},
38+
{
39+
name: "malformed_body",
40+
sig: "v1=0c0b9495b893a39e70d1fea2fe11fbe0a825f88b9f67846f6cc07dd2bc5476cd",
41+
err: ErrMalformedBody,
42+
},
43+
}
44+
45+
for _, tt := range tests {
46+
t.Run(tt.name, func(t *testing.T) {
47+
req, err := http.NewRequest(http.MethodGet, "http://127.0.0.1:80/test", strings.NewReader(tt.body))
48+
if err != nil {
49+
t.Fatalf("failed to generate new request: %s", err.Error())
50+
}
51+
52+
req.Header.Set("X-PagerDuty-Signature", tt.sig)
53+
54+
testErrIs(t, "VerifySignature", tt.err, VerifySignature(req, secret))
55+
})
56+
}
57+
}
58+
59+
// testErrIs looks to see if wantErr is gotErr. If not, this calls t.Fatal(). It
60+
// also calls t.Fatal() if there gotErr is not nil, but wantErr is. Returns true
61+
// if you should continue running the test, or false if you should stop the
62+
// test.
63+
func testErrIs(t *testing.T, name string, wantErr, gotErr error) bool {
64+
t.Helper()
65+
66+
if wantErr != nil {
67+
if gotErr == nil {
68+
t.Fatalf("%s error = <nil>, should be %v", name, wantErr)
69+
return false
70+
}
71+
72+
if !errors.Is(gotErr, wantErr) {
73+
t.Fatalf("error %v is not %v", gotErr, wantErr)
74+
return false
75+
}
76+
}
77+
78+
if wantErr == nil && gotErr != nil {
79+
t.Fatalf("%s unexpected error: %v", name, gotErr)
80+
return false
81+
}
82+
83+
return true
84+
}

0 commit comments

Comments
 (0)