You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
drone-go/plugin/internal/client/client.go

187 lines
4.4 KiB
Go

// Copyright 2018 Drone.IO Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package client
import (
"bytes"
"context"
"crypto/sha256"
"crypto/tls"
"encoding/base64"
"encoding/json"
"io"
"io/ioutil"
"net/http"
"time"
"git.awesome-for.me/liuzhiguo/drone-go/drone"
"git.awesome-for.me/liuzhiguo/drone-go/plugin/internal/aesgcm"
httpsignatures "github.com/99designs/httpsignatures-go"
)
// DefaultClient is the default http.Client.
var DefaultClient = &http.Client{
CheckRedirect: func(*http.Request, []*http.Request) error {
return http.ErrUseLastResponse
},
}
// required http headers
// note that (request-target) is disabled because reverse proxies,
// including aws lambda with api gateway, fail verification.
var headers = []string{
"accept",
"accept-encoding",
"content-type",
"date",
"digest",
}
var signer = httpsignatures.NewSigner(
httpsignatures.AlgorithmHmacSha256,
headers...,
)
// New returns a new http.Client with signature verification.
func New(endpoint, secret string, skipverify bool) *Client {
client := &Client{
Accept: "application/json",
Encoding: "identity",
Endpoint: endpoint,
Secret: secret,
}
if skipverify {
client.Client = &http.Client{
CheckRedirect: func(*http.Request, []*http.Request) error {
return http.ErrUseLastResponse
},
Transport: &http.Transport{
Proxy: http.ProxyFromEnvironment,
TLSClientConfig: &tls.Config{
InsecureSkipVerify: true, // user needs to explicitly enable this with skipverify=true
},
},
}
}
return client
}
// Client wraps an http.Client and applies retry logic and
// http signature verification.
type Client struct {
Client *http.Client
Accept string
Encoding string
Endpoint string
Secret string
SkipVerify bool
}
// Do makes an http.Request to the target endpoint using the context provided.
func (s *Client) Do(ctx context.Context, in, out interface{}) error {
data, err := json.Marshal(in)
if err != nil {
return err
}
buf := bytes.NewBuffer(data)
req, err := http.NewRequest("POST", s.Endpoint, buf)
if err != nil {
return err
}
req = req.WithContext(ctx)
req.Header.Add("Accept", s.Accept)
req.Header.Add("Accept-Encoding", s.Encoding)
req.Header.Add("Content-Type", "application/json")
req.Header.Add("Digest", "SHA-256="+digest(data))
req.Header.Add("Date", time.Now().UTC().Format(http.TimeFormat))
err = signer.SignRequest("hmac-key", s.Secret, req)
if err != nil {
return err
}
res, err := s.client().Do(req)
if res != nil && res.Body != nil {
defer func() {
// drain the response body so we can reuse this connection.
_, _ = io.Copy(ioutil.Discard, io.LimitReader(res.Body, 4096))
_ = res.Body.Close()
}()
}
if err != nil {
return err
}
body, err := ioutil.ReadAll(res.Body)
if err != nil {
return err
}
if res.StatusCode > 299 {
err := new(drone.Error)
err.Code = res.StatusCode
err.Message = string(body)
// if the response body is empty we should return
// the default status code text.
if len(body) == 0 {
err.Message = http.StatusText(res.StatusCode)
}
return err
}
// if the response body return no content we exit
// immediately. We do not read or unmarshal the response
// and we do not return an error.
if res.StatusCode == http.StatusNoContent {
return nil
}
// the response body may be optionally encrypted
// using the aesgcm algorithm. If encrypted,
// decrypt using the shared secret.
if res.Header.Get("Content-Encoding") == "aesgcm" {
secret, err := aesgcm.Key(s.Secret)
if err != nil {
return err
}
plaintext, err := aesgcm.Decrypt(body, secret)
if err != nil {
return err
}
body = plaintext
}
if out == nil {
return nil
}
return json.Unmarshal(body, out)
}
func (s *Client) client() *http.Client {
if s.Client == nil {
return DefaultClient
}
return s.Client
}
func digest(data []byte) string {
h := sha256.New()
h.Write(data)
return base64.StdEncoding.EncodeToString(h.Sum(nil))
}