Added HMAC signature to webhook payloads #44
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This implemented the feature requested in #9 .
Changes
X-RedmineWebhook-HMAC-Alg
: The algorithm used for the HMAC signature. Currently hard-coded assha1
.X-RedmineWebhook-HMAC-Signature
: The HMAC signature.Testing
The changes were tested against the latest docker redmine container (5.0.3 at the time of this PR). A small Python Flask server was written to perform the HMAC validation that clients are expected to do (can be found in this gist).
I've tested with three configurations: (1) an incorrect key, (2) a correct key, and (3) no key.
The Flask web server output for this is:
Potential issues / improvements
Additional notes