lohr: validate webhook signature
Previously lohr was unusable in a production setting, anyone could forge a malicious webhook and either: - mirror a private repo of yours to another remote they own - wipe a repo of yours by forcing mirroring from an empty mirror This is no longer the case!
This commit is contained in:
parent
7134b7700f
commit
7e3c8b8f28
5 changed files with 156 additions and 5 deletions
|
|
@ -12,8 +12,12 @@ repository = "https://github.com/alarsyo/lohr"
|
|||
|
||||
[dependencies]
|
||||
anyhow = "1.0.40"
|
||||
hex = "0.4.3"
|
||||
hmac = "0.10.1"
|
||||
log = "0.4.14"
|
||||
rocket = "0.4.7"
|
||||
rocket_contrib = { version = "0.4.7", features = [ "json" ] }
|
||||
serde = { version = "1.0.125", features = [ "derive" ] }
|
||||
serde_json = "1.0.64"
|
||||
serde_yaml = "0.8.17"
|
||||
sha2 = "0.9.3"
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue