-
Notifications
You must be signed in to change notification settings - Fork 13
/
webhooks.go
139 lines (110 loc) · 3.23 KB
/
webhooks.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
package webhooks
import (
"context"
"errors"
"fmt"
"log"
"net"
"net/http"
"reflect"
"time"
"github.com/circonus-labs/circonus-unified-agent/cua"
"github.com/circonus-labs/circonus-unified-agent/plugins/inputs"
"github.com/circonus-labs/circonus-unified-agent/plugins/inputs/webhooks/filestack"
"github.com/circonus-labs/circonus-unified-agent/plugins/inputs/webhooks/github"
"github.com/circonus-labs/circonus-unified-agent/plugins/inputs/webhooks/mandrill"
"github.com/circonus-labs/circonus-unified-agent/plugins/inputs/webhooks/papertrail"
"github.com/circonus-labs/circonus-unified-agent/plugins/inputs/webhooks/particle"
"github.com/circonus-labs/circonus-unified-agent/plugins/inputs/webhooks/rollbar"
"github.com/gorilla/mux"
)
type Webhook interface {
Register(router *mux.Router, acc cua.Accumulator)
}
func init() {
inputs.Add("webhooks", func() cua.Input { return NewWebhooks() })
}
type Webhooks struct {
Github *github.Webhook
Filestack *filestack.Webhook
Mandrill *mandrill.Webhook
Rollbar *rollbar.Webhook
Papertrail *papertrail.Webhook
Particle *particle.Webhook
srv *http.Server
ServiceAddress string
}
func NewWebhooks() *Webhooks {
return &Webhooks{}
}
func (*Webhooks) SampleConfig() string {
return `
instance_id = "" # unique instance identifier (REQUIRED)
## Address and port to host Webhook listener on
service_address = ":1619"
[inputs.webhooks.filestack]
path = "/filestack"
[inputs.webhooks.github]
path = "/github"
# secret = ""
[inputs.webhooks.mandrill]
path = "/mandrill"
[inputs.webhooks.rollbar]
path = "/rollbar"
[inputs.webhooks.papertrail]
path = "/papertrail"
[inputs.webhooks.particle]
path = "/particle"
`
}
func (*Webhooks) Description() string {
return "A Webhooks Event collector"
}
func (*Webhooks) Gather(_ context.Context, _ cua.Accumulator) error {
return nil
}
// Looks for fields which implement Webhook interface
func (wh *Webhooks) AvailableWebhooks() []Webhook {
webhooks := make([]Webhook, 0)
s := reflect.ValueOf(wh).Elem()
for i := 0; i < s.NumField(); i++ {
f := s.Field(i)
if !f.CanInterface() {
continue
}
if wbPlugin, ok := f.Interface().(Webhook); ok {
if !reflect.ValueOf(wbPlugin).IsNil() {
webhooks = append(webhooks, wbPlugin)
}
}
}
return webhooks
}
func (wh *Webhooks) Start(ctx context.Context, acc cua.Accumulator) error {
r := mux.NewRouter()
for _, webhook := range wh.AvailableWebhooks() {
webhook.Register(r, acc)
}
wh.srv = &http.Server{
Handler: r,
ReadHeaderTimeout: 5 * time.Second, // G112: Potential Slowloris Attack because ReadHeaderTimeout is not configured in the http.Server
}
ln, err := net.Listen("tcp", wh.ServiceAddress)
if err != nil {
log.Fatalf("E! Error starting server: %v", err)
return fmt.Errorf("listen (%s): %w", wh.ServiceAddress, err)
}
go func() {
if err := wh.srv.Serve(ln); err != nil {
if !errors.Is(err, http.ErrServerClosed) {
acc.AddError(fmt.Errorf("E! Error listening: %w", err))
}
}
}()
log.Printf("I! Started the webhooks service on %s\n", wh.ServiceAddress)
return nil
}
func (wh *Webhooks) Stop() {
wh.srv.Close()
log.Println("I! Stopping the Webhooks service")
}