5
0
Fork 0
mirror of https://0xacab.org/sutty/sutty synced 2024-11-17 04:36:23 +00:00

fix: add documentation and fix typos #13903
Some checks failed
ci/woodpecker/push/woodpecker Pipeline failed

This commit is contained in:
jazzari 2023-08-15 16:59:16 -03:00
parent a098e1baa7
commit c5406acb26
2 changed files with 56 additions and 47 deletions

View file

@ -4,56 +4,65 @@ module Api
module V1 module V1
# Recibe webhooks y lanza un PullJob # Recibe webhooks y lanza un PullJob
class WebhooksController < BaseController class WebhooksController < BaseController
# responde con forbidden si falla la validación del token
rescue_from ActiveRecord::RecordNotFound, with: :platforms_answer rescue_from ActiveRecord::RecordNotFound, with: :platforms_answer
# Trae los cambios a partir de un post de Webhooks: # Trae los cambios a partir de un post de Webhooks:
# (Gitlab, Github, Guitea, etc) # (Gitlab, Github, Gitea, etc)
def pull def pull
message = I18n.with_locale(site.default_locale) do message = I18n.with_locale(site.default_locale) do
I18n.t('webhooks.pull.message') I18n.t('webhooks.pull.message')
end end
GitPullJob.perform_later(site, usuarie, message) GitPullJob.perform_later(site, usuarie, message)
platforms_answer head :ok
end end
private private
# encuentra el sitio a partir de la url
def site def site
@site ||= Site.find_by_name!(params[:site_id]) @site ||= Site.find_by_name!(params[:site_id])
end end
# valida el token que envía la plataforma del webhook # valida el token que envía la plataforma del webhook
#
# @return [String]
def token def token
@token ||= @token ||=
begin begin
# Gitlab # Gitlab
if request.headers['X-Gitlab-Token'] if request.headers['X-Gitlab-Token']
request.headers["X-Gitlab-Token"] request.headers['X-Gitlab-Token']
# Github # Github
elsif request.headers['X-HUB-SIGNATURE-256'] elsif request.headers['X-HUB-SIGNATURE-256']
signature(request.env['HTTP_X_HUB_SIGNATURE_256']) request.env['HTTP_X_HUB_SIGNATURE_256']
# Guitea # Gitea
else else
signature(request.env['HTTP_X_GITEA_SIGNATURE']) request.env['HTTP_X_GITEA_SIGNATURE']
end end
end end
end end
# valida token a partir de firma de webhook
#
# @return [String]
def token_from_signature(signature) def token_from_signature(signature)
payload = request.body.read payload = request.body.read
site.roles.where(temporal: false, rol: 'usuarie').pluck(:token).find do |token| site.roles.where(temporal: false, rol: 'usuarie').pluck(:token).find do |token|
new_signature = hash_mac(OpenSSL::Digest.new('sha256'), token, payload) new_signature = 'sha256=' + OpenSSL::HMAC.hexdigest(OpenSSL::Digest.new('sha256'), token, payload)
@token ||= Rack::Utils.secure_compare(new_signature, signature) ActiveSupport::SecurityUtils.secure_compare(new_signature, signature)
end end
end end
# encuentra le usuarie
def usuarie def usuarie
@usuarie = site.roles.find_by!(temporal: false, rol: 'usuarie', token: token).usuarie @usuarie ||= site.roles.find_by!(temporal: false, rol: 'usuarie', token: token).usuarie
end end
# respuesta de error a plataformas
def platforms_answer def platforms_answer
head :ok head :forbidden
end end
end end
end end

View file

@ -476,7 +476,7 @@ es:
message: 'Actualización del esqueleto' message: 'Actualización del esqueleto'
webhooks_controller: webhooks_controller:
pull: pull:
message: 'Pull de webhooks' message: 'Traer los cambios a partir de un evento remoto'
footer: footer:
powered_by: 'es desarrollada por' powered_by: 'es desarrollada por'
i18n: i18n: