mirror of
https://github.com/bestbytes/datatrans.git
synced 2025-10-16 12:05:36 +00:00
add webhook
This commit is contained in:
parent
18db292e0a
commit
bc81e833f0
91
webhook.go
Normal file
91
webhook.go
Normal file
@ -0,0 +1,91 @@
|
||||
package datatrans
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"crypto/hmac"
|
||||
"crypto/sha256"
|
||||
"encoding/hex"
|
||||
"errors"
|
||||
"fmt"
|
||||
"io"
|
||||
"io/ioutil"
|
||||
"net/http"
|
||||
"strings"
|
||||
)
|
||||
|
||||
var (
|
||||
ErrWebhookMissingSignature = errors.New("malformed header Datatrans-Signature")
|
||||
ErrWebhookMismatchSignature = errors.New("mismatch of Datatrans-Signature")
|
||||
)
|
||||
|
||||
// https://api-reference.datatrans.ch/#section/Webhook/Webhook-signing
|
||||
type WebhookOption struct {
|
||||
Sign2HMACKey string
|
||||
ErrorHandler func(error) http.Handler
|
||||
}
|
||||
|
||||
// ValidateWebhook an HTTP middleware which checks that the signature in the header is valid.
|
||||
func ValidateWebhook(wo WebhookOption) (func(next http.Handler) http.Handler, error) {
|
||||
if wo.ErrorHandler == nil {
|
||||
wo.ErrorHandler = func(err error) http.Handler {
|
||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
http.Error(w, err.Error(), http.StatusInternalServerError)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
key, err := hex.DecodeString(wo.Sign2HMACKey)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to hex decode Sign2HMACKey")
|
||||
}
|
||||
|
||||
return func(next http.Handler) http.Handler {
|
||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
// Datatrans-Signature: t=1559303131511,s0=33819a1220fd8e38fc5bad3f57ef31095fac0deb38c001ba347e694f48ffe2fc
|
||||
|
||||
tm, s0 := extractTimeAndHash(r.Header.Get("Datatrans-Signature"))
|
||||
if tm == "" || len(s0) == 0 {
|
||||
wo.ErrorHandler(ErrWebhookMissingSignature).ServeHTTP(w, r)
|
||||
return
|
||||
}
|
||||
|
||||
hmv := hmac.New(sha256.New, key)
|
||||
hmv.Write([]byte(tm))
|
||||
|
||||
var buf bytes.Buffer
|
||||
if _, err := io.Copy(io.MultiWriter(&buf, hmv), r.Body); err != nil {
|
||||
_ = r.Body.Close()
|
||||
wo.ErrorHandler(errors.New("ValidateWebhook: copy failed")).ServeHTTP(w, r)
|
||||
return
|
||||
}
|
||||
_ = r.Body.Close()
|
||||
r.Body = ioutil.NopCloser(&buf)
|
||||
|
||||
if !hmac.Equal(hmv.Sum(nil), []byte(s0)) {
|
||||
wo.ErrorHandler(ErrWebhookMismatchSignature).ServeHTTP(w, r)
|
||||
return
|
||||
}
|
||||
|
||||
next.ServeHTTP(w, r)
|
||||
})
|
||||
}, nil
|
||||
}
|
||||
|
||||
func extractTimeAndHash(headerValue string) (time string, s0hashB []byte) {
|
||||
lhv := len(headerValue)
|
||||
if lhv == 0 {
|
||||
return "", nil
|
||||
}
|
||||
commaIDX := strings.IndexRune(headerValue, ',')
|
||||
if commaIDX < 1 {
|
||||
return "", nil
|
||||
}
|
||||
|
||||
time = headerValue[2:commaIDX]
|
||||
if lhv < commaIDX+4 {
|
||||
return "", nil
|
||||
}
|
||||
s0hash := headerValue[commaIDX+4:]
|
||||
s0hashB, _ = hex.DecodeString(s0hash)
|
||||
return time, s0hashB
|
||||
}
|
||||
95
webhook_test.go
Normal file
95
webhook_test.go
Normal file
@ -0,0 +1,95 @@
|
||||
package datatrans
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"crypto/hmac"
|
||||
"crypto/sha256"
|
||||
"fmt"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"strings"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func must(t *testing.T, err error) {
|
||||
t.Helper()
|
||||
if err != nil {
|
||||
t.Fatalf("%s\n%#v", err, err)
|
||||
}
|
||||
}
|
||||
|
||||
func Test_extractTimeAndHash(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
headerValue string
|
||||
wantTime string
|
||||
wantS0hash []byte
|
||||
}{
|
||||
{
|
||||
name: "ok",
|
||||
headerValue: "t=1559303131511,s0=33819a1220fd8e38fc5bad3f57ef31095fac0deb38c001ba347e694f48ffe2fc",
|
||||
wantTime: "1559303131511",
|
||||
wantS0hash: []byte{0x33, 0x81, 0x9a, 0x12, 0x20, 0xfd, 0x8e, 0x38, 0xfc, 0x5b, 0xad, 0x3f, 0x57, 0xef, 0x31, 0x9, 0x5f, 0xac, 0xd, 0xeb, 0x38, 0xc0, 0x1, 0xba, 0x34, 0x7e, 0x69, 0x4f, 0x48, 0xff, 0xe2, 0xfc},
|
||||
},
|
||||
{
|
||||
name: "empty vals",
|
||||
headerValue: "t=,s0=",
|
||||
},
|
||||
{
|
||||
name: "empty",
|
||||
},
|
||||
{
|
||||
name: "missing comma",
|
||||
headerValue: "t=1559303131511s0=33",
|
||||
},
|
||||
{
|
||||
name: "comma begin",
|
||||
headerValue: ",t=1559303131511s0=33",
|
||||
},
|
||||
{
|
||||
name: "comma end",
|
||||
headerValue: "t=1559303131511s0=33,",
|
||||
},
|
||||
{
|
||||
name: "comma only",
|
||||
headerValue: ",",
|
||||
},
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
gotTime, gotS0hash := extractTimeAndHash(tt.headerValue)
|
||||
if gotTime != tt.wantTime {
|
||||
t.Errorf("extractTimeAndHash() gotTime = %v, want %v", gotTime, tt.wantTime)
|
||||
}
|
||||
if !bytes.Equal(gotS0hash, tt.wantS0hash) {
|
||||
t.Errorf("extractTimeAndHash() gotS0hash = %x, want %x", gotS0hash, tt.wantS0hash)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestValidateWebhook(t *testing.T) {
|
||||
sign2Key := []byte(`asdfasd^%@^&%fa`)
|
||||
const timeStr = `1559303131511`
|
||||
|
||||
mw, err := ValidateWebhook(WebhookOption{
|
||||
Sign2HMACKey: "617364666173645e25405e26256661",
|
||||
})
|
||||
must(t, err)
|
||||
|
||||
const datatransBody = `{"transactionId": "210215103042148501"}`
|
||||
r := httptest.NewRequest("POST", "/", strings.NewReader(datatransBody))
|
||||
|
||||
ht := hmac.New(sha256.New, sign2Key)
|
||||
fmt.Fprintf(ht, "%s%s", timeStr, datatransBody)
|
||||
r.Header.Set("Datatrans-Signature", fmt.Sprintf("t=%s,s0=%x", timeStr, ht.Sum(nil)))
|
||||
|
||||
w := httptest.NewRecorder()
|
||||
mw(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
fmt.Fprintf(w, "success")
|
||||
})).ServeHTTP(w, r)
|
||||
|
||||
if w.Body.String() != "success" {
|
||||
t.Error("something is wrong")
|
||||
}
|
||||
}
|
||||
Loading…
Reference in New Issue
Block a user