Updating githook, for realz

This commit is contained in:
Ubergeek 2019-07-14 00:40:52 +00:00
parent f9382071ca
commit fb4f2c1ea5
1 changed files with 101 additions and 22 deletions

View File

@ -1,70 +1,149 @@
<?php
/* gitea deploy webhook */
/* gitea deploy webhook for thunix*/
/*
* So, this webhook current accepts hooks for www, ansible, and soon
* gopher. It's pretty extensible, and is currently written for gitea,
* but things like gitlab, github, etc should be feasible, if not
* downright easy.
*
* While this 'should' work fine with numberic keys, and has been
* tested, php's loose casting makes it a crap shoot. We should
* probably not start tokens with a 0, or a number for that matter?
* All project hooks need to use the same key.
*
* Also, tildegit's IP address is hard-wired here, so we only accept
* hooks from tildegit. This will need that change, if it moves.
/* security */
$access_token = '1234567890';
$access_token = "secret";
$ansible_lastrun = '/dev/shm/ansible-hook-last-run';
$ansible_dropfile = '/dev/shm/run-ansible';
$www_lastrun = '/dev/shm/www-hook-last-run';
$www_dropfile = '/dev/shm/run-www';
$gopher_lastrun = '/dev/shm/gopher-hook-last-run';
$gopher_dropfile = '/dev/shm/run-gopher';
$wiki_lastrun = '/dev/shm/wiki-hook-last-run';
$wiki_dropfile = '/dev/shm/run-wiki';
$allowedip = '51.79.32.48';
$remoteip = $_SERVER['REMOTE_ADDR'];
$allowedip = '195.201.242.48';
$ratelimit = 300;
/* get json data */
$json = file_get_contents('php://input');
$data = json_decode($json, true);
/* check our token */
$client_token = $data["secret"];
if ($client_token !== $access_token)
if ( strcmp($client_token, $access_token) !== 0 )
{
http_response_code(403);
echo "HTTP 403 - Forbidden.";
exit(0);
http_response_code(403);
echo "HTTP 403 - Forbidden, P1.\n";
exit(0);
}
if ($remoteip !== $allowedip)
/* check our source ip for the hook */
if ( strcmp($remoteip, $allowedip) !== 0 )
{
http_repsonse_code(403);
echo "HTTP 403 - Forbidden.";
exit(0);
http_response_code(403);
echo "HTTP 403 - Forbidden, P2.\n";
exit(0);
}
//* if you need get full json input */
//fwrite($fs, 'DATA: '.print_r($data, true).PHP_EOL);
// Hook for ansible here
if ($data["repository"]["full_name"] == 'thunix/ansible') {
syslog(LOG_INFO, 'Ansible Webhook recieved.');
// We limit runs to once per 5 minutes, so they don't try
// overlapping. Systemd shouldn't allow it, but we'll check
// anyways
if ( time () - filemtime ( $ansible_lastrun ) > $ratelimit ) {
touch ( $ansible_dropfile );
touch ( $ansible_lastrun );
echo "HTTP 200 - Ansible webhook recieved.";
echo "HTTP 200 - Ansible webhook recieved.\n";
}
else {
http_response_code(429);
echo "HTTP 429 - Rate Limited.";
echo "HTTP 429 - Rate Limited.\n";
exit(0);
}
}
// Hook for www repo here. Same rules apply, as above, for www. We
// could probably make it able to run more frequently. Backend job is
// just a git pull, and is quick.
elseif ($data["repository"]["full_name"] == 'thunix/www') {
syslog(LOG_INFO, 'WWW Webhook recieved.');
if ( time () - filemtime ( $lastrun ) > $ratelimit ) {
if ( time () - filemtime ( $www_lastrun ) > $ratelimit/30 ) {
touch ( $www_dropfile );
touch ( $www_lastrun );
http_response_code(200);
echo "HTTP 200 - WWW webhook recieved.";
echo "HTTP 200 - WWW webhook recieved.\n";
}
else {
http_response_code(429);
echo "HTTP 429 - Rate Limited.";
echo "HTTP 429 - Rate Limited.\n";
exit(0);
}
}
}
// Hook for gopher. Not implemented on the backend yet.
elseif ($data["repository"]["full_name"] == 'thunix/thunix_gopher') {
syslog(LOG_INFO, 'Gopher Webhook recieved.');
if ( time () - filemtime ( $gopher_lastrun ) > $ratelimit ) {
touch ( $gopher_dropfile );
touch ( $gopher_lastrun );
http_response_code(200);
echo "HTTP 200 - Gopher webhook recieved.\n";
}
else {
http_response_code(429);
echo "HTTP 429 - Rate Limited.\n";
exit(0);
}
}
//Wiki webhook
elseif ($data["repository"]["full_name"] == 'thunix/wiki') {
syslog(LOG_INFO, 'Wiki Webhook recieved.');
if ( time () - filemtime ( $wiki_lastrun ) > $ratelimit/30 ) {
touch ( $wiki_dropfile );
touch ( $wiki_lastrun );
http_response_code(200);
echo "HTTP 200 - Wiki webhook recieved.\n";
}
else {
http_response_code(429);
echo "HTTP 429 - Rate Limited.\n";
exit(0);
}
}
// Easter egg for anyone probing the hook. Enjoy. We're a coffee maker
// and not a teapot :)
else {
http_response_code(418);
echo "HTTP 418 - I'm a teapot.";
echo "HTTP 418 - I'm a teapot.\n";
syslog(LOG_INFO, "Tea Pot Webhook recieved.\n");
exit(0);
}
/*$fp = pfsockopen( "tcp://127.0.0.1", 1234, $errno, $errstr );
if (!$fp)
{
echo "ERROR: $errno - $errstr<br />\n";
}
socket_set_timeout ($fp, 10);
$msg = "Commit '".$data['commits'][0]["message"]."' was pushed to ".$data["repository"]["full_name"].' by '.$data["pusher"]["login"];
$msg = trim(preg_replace('/\s+/', ' ', $msg));
$write = fwrite ($fp, $msg);
fclose($fp);
if (!$write) {
echo "error writing to port.<br/>";
next;
}
*/
?>