kaiyan/twitch/webhook.go
2025-04-15 19:21:02 -04:00

71 lines
2.0 KiB
Go

package twitch
import (
"bytes"
"crypto/hmac"
"crypto/rand"
"crypto/sha256"
"encoding/hex"
"errors"
"fmt"
"io"
"net/http"
"strconv"
"sync"
"github.com/go-json-experiment/json"
)
// ErrVerificationFailed is the error returned when a webhook request does not
// verify correctly.
var ErrVerificationFailed = errors.New("Twitch webhook verification failed") //lint:ignore ST1005 Twitch is a proper noun
// Receive verifies a Twitch webhook request against the given secret
// and appends the request body to b.
// The maximum allowed request length is 1 MB.
func Receive(b, secret []byte, req *http.Request) ([]byte, error) {
r := io.LimitReader(req.Body, 1<<20)
w := bytes.NewBuffer(b)
if _, err := io.Copy(w, r); err != nil {
return nil, err
}
b = w.Bytes()
h := hmac.New(sha256.New, secret)
io.WriteString(h, req.Header.Get("Twitch-Eventsub-Message-Id"))
io.WriteString(h, req.Header.Get("Twitch-Eventsub-Message-Timestamp"))
h.Write(b)
want := make([]byte, 0, len("sha256=")+sha256.Size*2)
want = append(want, "sha256="...)
sum := h.Sum(make([]byte, 0, sha256.Size))
want = hex.AppendEncode(want, sum)
got := req.Header.Get("Twitch-Eventsub-Message-Signature")
if !hmac.Equal(want, []byte(got)) {
return nil, fmt.Errorf("%w: computed %q, header has %q", ErrVerificationFailed, want, got)
}
return b, nil
}
// HandleChallenge responds to an EventSub verification challenge.
func HandleChallenge(w http.ResponseWriter, body []byte) error {
var ev EventSub[struct{}]
if err := json.Unmarshal(body, &ev); err != nil {
return err
}
if ev.Challenge == "" {
return errors.New("no challenge in body")
}
w.Header().Set("Content-Type", "text/plain")
w.Header().Set("Content-Length", strconv.Itoa(len(ev.Challenge)))
_, err := io.WriteString(w, ev.Challenge)
return err
}
// Secret returns a process-wide secret for webhook subscriptions.
var Secret = sync.OnceValue(func() []byte {
b := make([]byte, 32)
rand.Read(b)
return hex.AppendEncode(make([]byte, 0, 64), b)
})