forked from lug/matterbridge
		
	
		
			
				
	
	
		
			109 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			109 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package slack
 | |
| 
 | |
| import (
 | |
| 	"crypto/hmac"
 | |
| 	"crypto/sha256"
 | |
| 	"encoding/hex"
 | |
| 	"fmt"
 | |
| 	"hash"
 | |
| 	"net/http"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| )
 | |
| 
 | |
| // Signature headers
 | |
| const (
 | |
| 	hSignature = "X-Slack-Signature"
 | |
| 	hTimestamp = "X-Slack-Request-Timestamp"
 | |
| )
 | |
| 
 | |
| // SecretsVerifier contains the information needed to verify that the request comes from Slack
 | |
| type SecretsVerifier struct {
 | |
| 	d         Debug
 | |
| 	signature []byte
 | |
| 	hmac      hash.Hash
 | |
| }
 | |
| 
 | |
| func unsafeSignatureVerifier(header http.Header, secret string) (_ SecretsVerifier, err error) {
 | |
| 	var (
 | |
| 		bsignature []byte
 | |
| 	)
 | |
| 
 | |
| 	signature := header.Get(hSignature)
 | |
| 	stimestamp := header.Get(hTimestamp)
 | |
| 
 | |
| 	if signature == "" || stimestamp == "" {
 | |
| 		return SecretsVerifier{}, ErrMissingHeaders
 | |
| 	}
 | |
| 
 | |
| 	if bsignature, err = hex.DecodeString(strings.TrimPrefix(signature, "v0=")); err != nil {
 | |
| 		return SecretsVerifier{}, err
 | |
| 	}
 | |
| 
 | |
| 	hash := hmac.New(sha256.New, []byte(secret))
 | |
| 	if _, err = hash.Write([]byte(fmt.Sprintf("v0:%s:", stimestamp))); err != nil {
 | |
| 		return SecretsVerifier{}, err
 | |
| 	}
 | |
| 
 | |
| 	return SecretsVerifier{
 | |
| 		signature: bsignature,
 | |
| 		hmac:      hash,
 | |
| 	}, nil
 | |
| }
 | |
| 
 | |
| // NewSecretsVerifier returns a SecretsVerifier object in exchange for an http.Header object and signing secret
 | |
| func NewSecretsVerifier(header http.Header, secret string) (sv SecretsVerifier, err error) {
 | |
| 	var (
 | |
| 		timestamp int64
 | |
| 	)
 | |
| 
 | |
| 	stimestamp := header.Get(hTimestamp)
 | |
| 
 | |
| 	if sv, err = unsafeSignatureVerifier(header, secret); err != nil {
 | |
| 		return SecretsVerifier{}, err
 | |
| 	}
 | |
| 
 | |
| 	if timestamp, err = strconv.ParseInt(stimestamp, 10, 64); err != nil {
 | |
| 		return SecretsVerifier{}, err
 | |
| 	}
 | |
| 
 | |
| 	diff := absDuration(time.Since(time.Unix(timestamp, 0)))
 | |
| 	if diff > 5*time.Minute {
 | |
| 		return SecretsVerifier{}, ErrExpiredTimestamp
 | |
| 	}
 | |
| 
 | |
| 	return sv, err
 | |
| }
 | |
| 
 | |
| func (v *SecretsVerifier) WithDebug(d Debug) *SecretsVerifier {
 | |
| 	v.d = d
 | |
| 	return v
 | |
| }
 | |
| 
 | |
| func (v *SecretsVerifier) Write(body []byte) (n int, err error) {
 | |
| 	return v.hmac.Write(body)
 | |
| }
 | |
| 
 | |
| // Ensure compares the signature sent from Slack with the actual computed hash to judge validity
 | |
| func (v SecretsVerifier) Ensure() error {
 | |
| 	computed := v.hmac.Sum(nil)
 | |
| 	// use hmac.Equal prevent leaking timing information.
 | |
| 	if hmac.Equal(computed, v.signature) {
 | |
| 		return nil
 | |
| 	}
 | |
| 	if v.d != nil && v.d.Debug() {
 | |
| 		v.d.Debugln(fmt.Sprintf("Expected signing signature: %s, but computed: %s", hex.EncodeToString(v.signature), hex.EncodeToString(computed)))
 | |
| 	}
 | |
| 	return fmt.Errorf("Computed unexpected signature of: %s", hex.EncodeToString(computed))
 | |
| }
 | |
| 
 | |
| func abs64(n int64) int64 {
 | |
| 	y := n >> 63
 | |
| 	return (n ^ y) - y
 | |
| }
 | |
| 
 | |
| func absDuration(n time.Duration) time.Duration {
 | |
| 	return time.Duration(abs64(int64(n)))
 | |
| }
 | 
