2025-03-10 19:25:11 +01:00

74 lines
1.7 KiB
Go

package main
import (
"crypto/hmac"
"crypto/sha256"
"encoding/hex"
"encoding/json"
"fmt"
"log"
"net/http"
"strconv"
"time"
"github.com/gin-gonic/gin"
)
const (
SERVER_PORT = "5080"
API_KEY = "meet-api-key"
MAX_ELAPSED_TIME = 5 * time.Minute
)
func main() {
router := gin.Default()
router.POST("/webhook", handleWebhook)
router.Run(":" + SERVER_PORT)
}
func handleWebhook(c *gin.Context) {
var body map[string]interface{}
if err := c.ShouldBindJSON(&body); err != nil {
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid JSON"})
return
}
signature := c.GetHeader("x-signature")
timestampStr := c.GetHeader("x-timestamp")
timestamp, err := strconv.ParseInt(timestampStr, 10, 64)
if err != nil {
c.JSON(http.StatusUnauthorized, gin.H{"error": "Invalid timestamp"})
return
}
if !isWebhookEventValid(body, signature, timestamp) {
log.Println("Invalid webhook signature")
c.JSON(http.StatusUnauthorized, gin.H{"error": "Invalid webhook signature"})
return
}
event, _ := json.Marshal(body)
log.Println("Webhook received:", string(event))
c.Status(http.StatusOK)
}
func isWebhookEventValid(body map[string]interface{}, signature string, timestamp int64) bool {
current := time.Now().UnixMilli()
diffTime := current - timestamp
if diffTime > MAX_ELAPSED_TIME.Milliseconds() {
return false
}
bodyBytes, err := json.Marshal(body)
if err != nil {
return false
}
signedPayload := fmt.Sprintf("%d.%s", timestamp, string(bodyBytes))
h := hmac.New(sha256.New, []byte(API_KEY))
h.Write([]byte(signedPayload))
expectedSignature := hex.EncodeToString(h.Sum(nil))
return hmac.Equal([]byte(expectedSignature), []byte(signature))
}