Files
woodpecker/server/services/utils/http.go
LUKIEYF 40f847b944 Add Header User-Agent for request client (#5664)
add Header User-Agent for request client for more precise in recognized the http request from.

close #3778
2025-11-05 11:41:48 +01:00

138 lines
3.6 KiB
Go

// Copyright 2023 Woodpecker Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package utils
import (
"bytes"
"context"
"crypto"
"crypto/ed25519"
"crypto/tls"
"encoding/json"
"fmt"
"io"
"net/http"
"net/url"
"time"
"github.com/yaronf/httpsign"
host_matcher "go.woodpecker-ci.org/woodpecker/v3/server/services/utils/hostmatcher"
"go.woodpecker-ci.org/woodpecker/v3/shared/httputil"
)
type Client struct {
*httpsign.Client
}
func getHTTPClient(privateKey crypto.PrivateKey, allowedHostListValue string) (*httpsign.Client, error) {
timeout := 10 * time.Second //nolint:mnd
if allowedHostListValue == "" {
allowedHostListValue = host_matcher.MatchBuiltinExternal
}
allowedHostMatcher := host_matcher.ParseHostMatchList("WOODPECKER_EXTENSIONS_ALLOWED_HOSTS", allowedHostListValue)
pubKeyID := "woodpecker-ci-extensions"
ed25519Key, ok := privateKey.(ed25519.PrivateKey)
if !ok {
return nil, fmt.Errorf("invalid private key type")
}
signer, err := httpsign.NewEd25519Signer(ed25519Key,
httpsign.NewSignConfig(),
httpsign.Headers("@request-target", "content-digest")) // The Content-Digest header will be auto-generated
if err != nil {
return nil, err
}
// Create base transport with custom User-Agent
baseTransport := httputil.NewUserAgentRoundTripper(
&http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: false},
DialContext: host_matcher.NewDialContext("extensions", allowedHostMatcher),
},
"server-extensions",
)
client := http.Client{
Timeout: timeout,
Transport: baseTransport,
}
config := httpsign.NewClientConfig().SetSignatureName(pubKeyID).SetSigner(signer)
return httpsign.NewClient(client, config), nil
}
func NewHTTPClient(privateKey crypto.PrivateKey, allowedHostList string) (*Client, error) {
client, err := getHTTPClient(privateKey, allowedHostList)
if err != nil {
return nil, err
}
return &Client{
Client: client,
}, nil
}
// Send makes an http request to the given endpoint, writing the input
// to the request body and un-marshaling the output from the response body.
func (e *Client) Send(ctx context.Context, method, path string, in, out any) (int, error) {
uri, err := url.Parse(path)
if err != nil {
return 0, err
}
// if we are posting or putting data, we need to write it to the body of the request.
var buf io.ReadWriter
if in != nil {
buf = new(bytes.Buffer)
jsonErr := json.NewEncoder(buf).Encode(in)
if jsonErr != nil {
return 0, jsonErr
}
}
// creates a new http request to the endpoint.
req, err := http.NewRequestWithContext(ctx, method, uri.String(), buf)
if err != nil {
return 0, err
}
if in != nil {
req.Header.Set("Content-Type", "application/json")
}
resp, err := e.Do(req)
if err != nil {
return 0, err
}
defer resp.Body.Close()
if resp.StatusCode < http.StatusOK || resp.StatusCode >= http.StatusMultipleChoices {
body, err := io.ReadAll(resp.Body)
if err != nil {
return resp.StatusCode, err
}
return resp.StatusCode, fmt.Errorf("response: %s", string(body))
}
// if no other errors parse and return the json response.
err = json.NewDecoder(resp.Body).Decode(out)
return resp.StatusCode, err
}