50 lines
1.8 KiB
Python
50 lines
1.8 KiB
Python
import os
|
|
import hmac
|
|
from fastapi import Request
|
|
from fastapi.exceptions import HTTPException
|
|
from fastapi.param_functions import Header
|
|
from dotenv import load_dotenv
|
|
|
|
load_dotenv()
|
|
|
|
async def check_ref(request: Request):
|
|
json = await request.json()
|
|
if json["ref"] and json["ref"] == f"refs/heads/{os.environ.get('BRANCH')}":
|
|
return
|
|
raise HTTPException(status_code=403, detail="Invalid branch")
|
|
|
|
async def auth_hook(request: Request):
|
|
try:
|
|
json = await request.json()
|
|
text = await request.body()
|
|
except:
|
|
raise HTTPException(status_code=204, detail="Missing or bad content")
|
|
header_signature = request.headers.get('X-Hub-Signature')
|
|
|
|
if not header_signature:
|
|
raise HTTPException(status_code=400, detail="Missing signature")
|
|
|
|
# separate the signature from the sha1 indication
|
|
sha_name, signature = header_signature.split('=')
|
|
if sha_name != 'sha1':
|
|
raise HTTPException(status_code=400, detail="Invalid signature")
|
|
|
|
secret_key = os.environ.get('WEBHOOK_SECRET')
|
|
if secret_key is None:
|
|
raise HTTPException(status_code=503, detail="Missing WEBHOOK_SECRET")
|
|
|
|
# create a new hmac with the secret key and the request data
|
|
mac = hmac.new(secret_key.encode(), msg=text, digestmod='sha1')
|
|
|
|
# verify the digest matches the signature
|
|
if not hmac.compare_digest(mac.hexdigest(), signature):
|
|
raise HTTPException(status_code=403, detail="Unauthorized")
|
|
|
|
async def auth_web(request: Request):
|
|
token = request._query_params.get("token")
|
|
if token is None:
|
|
raise HTTPException(status_code=400, detail="Missing token")
|
|
print(token, os.environ.get("TOKEN"))
|
|
if token == os.environ.get("TOKEN"):
|
|
return
|
|
raise HTTPException(status_code=403, detail="Invalid token") |