// Copyright 2015 clair authors // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // Package notifiers implements several kinds of notifier.Notifier package notifiers import ( "bytes" "crypto/tls" "crypto/x509" "encoding/json" "errors" "fmt" "io/ioutil" "net/http" "net/url" "time" "gopkg.in/yaml.v2" "github.com/coreos/clair/config" "github.com/coreos/clair/database" "github.com/coreos/clair/notifier" ) const timeout = 5 * time.Second // A WebhookNotifier dispatches notifications to a webhook endpoint. type WebhookNotifier struct { endpoint string client *http.Client } // A WebhookNotifierConfiguration represents the configuration of a WebhookNotifier. type WebhookNotifierConfiguration struct { Endpoint string ServerName string CertFile string KeyFile string CAFile string Proxy string } func init() { notifier.RegisterNotifier("webhook", &WebhookNotifier{}) } func (h *WebhookNotifier) Configure(config *config.NotifierConfig) (bool, error) { // Get configuration var httpConfig WebhookNotifierConfiguration if config == nil { return false, nil } if _, ok := config.Params["http"]; !ok { return false, nil } yamlConfig, err := yaml.Marshal(config.Params["http"]) if err != nil { return false, errors.New("invalid configuration") } err = yaml.Unmarshal(yamlConfig, &httpConfig) if err != nil { return false, errors.New("invalid configuration") } // Validate endpoint URL. if httpConfig.Endpoint == "" { return false, nil } if _, err := url.ParseRequestURI(httpConfig.Endpoint); err != nil { return false, fmt.Errorf("could not parse endpoint URL: %s\n", err) } h.endpoint = httpConfig.Endpoint // Setup HTTP client. transport := &http.Transport{} h.client = &http.Client{ Transport: transport, Timeout: timeout, } // Initialize TLS. transport.TLSClientConfig, err = loadTLSClientConfig(&httpConfig) if err != nil { return false, fmt.Errorf("could not initialize client cert auth: %s\n", err) } // Set proxy. if httpConfig.Proxy != "" { proxyURL, err := url.ParseRequestURI(httpConfig.Proxy) if err != nil { return false, fmt.Errorf("could not parse proxy URL: %s\n", err) } transport.Proxy = http.ProxyURL(proxyURL) } return true, nil } type notificationEnvelope struct { Notification struct { Name string } } func (h *WebhookNotifier) Send(notification database.VulnerabilityNotification) error { // Marshal notification. jsonNotification, err := json.Marshal(notificationEnvelope{struct{ Name string }{notification.Name}}) if err != nil { return fmt.Errorf("could not marshal: %s", err) } // Send notification via HTTP POST. resp, err := h.client.Post(h.endpoint, "application/json", bytes.NewBuffer(jsonNotification)) if err != nil || resp == nil || (resp.StatusCode != 200 && resp.StatusCode != 201) { if resp != nil { return fmt.Errorf("got status %d, expected 200/201", resp.StatusCode) } return err } defer resp.Body.Close() return nil } // loadTLSClientConfig initializes a *tls.Config using the given WebhookNotifierConfiguration. // // If no certificates are given, (nil, nil) is returned. // The CA certificate is optional and falls back to the system default. func loadTLSClientConfig(cfg *WebhookNotifierConfiguration) (*tls.Config, error) { if cfg.CertFile == "" || cfg.KeyFile == "" { return nil, nil } cert, err := tls.LoadX509KeyPair(cfg.CertFile, cfg.KeyFile) if err != nil { return nil, err } var caCertPool *x509.CertPool if cfg.CAFile != "" { caCert, err := ioutil.ReadFile(cfg.CAFile) if err != nil { return nil, err } caCertPool = x509.NewCertPool() caCertPool.AppendCertsFromPEM(caCert) } tlsConfig := &tls.Config{ ServerName: cfg.ServerName, Certificates: []tls.Certificate{cert}, RootCAs: caCertPool, } return tlsConfig, nil }