Skip to content

Instantly share code, notes, and snippets.

@JC5
Created January 15, 2021 19:56
Show Gist options
  • Save JC5/b8bedee09a7cb81f55e27149058e8c72 to your computer and use it in GitHub Desktop.
Save JC5/b8bedee09a7cb81f55e27149058e8c72 to your computer and use it in GitHub Desktop.
A basic script to receive and validate Firefly III webhook messages
<?php
declare(strict_types=1);
/*
* webhook-receiver.php
* Copyright (c) 2021 [email protected]
*
* This file is part of Firefly III (https://github.com/firefly-iii).
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation, either version 3 of the
* License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*/
/**
* A simple script to receive webhooks from Firefly III and verify the signature validity.
*/
/**
* Define the webhook secret here, otherwise the signature validation will fail.
*/
define('WEBHOOK_SECRET', 'ZbkSHhhTHv8aTEeGkCa8WWRk');
/**
* Start of script. Here be dragons. Should be no reason to edit beyond this line.
*/
$entry = '';
$signatureHash = null;
$timestamp = null;
$expectedSignatureVersion = '1';
/**
* Get values from request (body + signature)
*/
$entityBody = file_get_contents('php://input');
$signature = $_SERVER['HTTP_SIGNATURE'] ?? false;
if (false === $signature) {
header('Status: 400 Bad Request');
echo 'No valid signature in header :(';
exit;
}
/**
* Explode the signature header to get the necessary data.
*
* I know this is terrible code but I'm lazy like that. I'm fairly sure there exists a PHP function like explode_key_value_pairs().
*/
$parts = explode(',', $signature);
foreach ($parts as $row) {
if ('t=' === substr($row, 0, 2)) {
$timestamp = substr($row, 2);
}
if (sprintf('v%s=', $expectedSignatureVersion) === substr($row, 0, 3)) {
$signatureHash = trim(substr($row, 3));
}
}
if (null === $timestamp || null === $signatureHash) {
header('Status: 400 Bad Request');
echo 'Could not extract valid signature from header :(';
exit;
}
/**
* Try to recalculate the signature based on the data. Steal this code.
*/
$payload = sprintf('%s.%s', $timestamp, $entityBody);
$calculated = hash_hmac('sha3-256', $payload, WEBHOOK_SECRET, false);
$valid = $calculated === $signatureHash;
/**
* Put some debug data in a long string.
*/
$return = '';
$return .= "---\n" . 'Received a message on ' . date('Y-m-d @ H:i:s') . "\n";
$return .= "\n";
foreach(getallheaders() as $header => $value) {
$return .= $header . ' = ' . $value . "\n";
}
/**
* Put more debug data in a long string.
*/
$return .= "\n";
$return .= 'Webhook secret : ' . WEBHOOK_SECRET . "\n";
$return .= 'Full signature string : ' . $signature . "\n";
$return .= 'Signature hash : ' . $signatureHash . "\n";
$return .= 'Signature valid? : ' . var_export($valid, true) . "\n";
$return .= 'Raw body : ' . $entityBody . "\n";
if ($valid) {
$return .= 'Parsed body (on new line) : ' . "\n";
$return .= print_r(json_decode($entityBody, true, JSON_THROW_ON_ERROR), true) . "\n";
}
$return .= "\n";
/**
* Echo the result. This will end up in Firefly III logs if you set it to "debug".
*/
echo "<pre>\n";
echo $return;
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment