/whproxy

WIP - Proxy incoming webhooks to established websockets

Primary LanguageGoMIT LicenseMIT

whproxy - Web Hooks Proxy

Proxy incoming web hooks to established web sockets.

This proxy can be used when an application needs to receive json web hooks from some platform and a firewall blocks incoming connections. When client applications establish a web socket connection to this proxy, a listener is created for incoming web hooks. When a web hook arrives on a given listener, the event is signaled to the corresponding client application via the web socket.

Usage

whproxy --host my.publichost.com --port 8080

At the moment the same port is used for webhooks and websockets.

Then establish a websocket connection to my.publichost.com:8080 and you will receive a json payload with the URL of your private webhook endpoint. Incoming webhooks events are passed on to the websocket, encapsulated inside the 'data' field of the json object.

Encryption

Encryption is enabled by providing a certificate and key file

whproxy --host my.publichost.com --port 8443 --cert cert.pem --key key.unencrypted.pem

If you use self-signed certificates, be sure to enable cert pinning on the client.

openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days 360
openssl rsa -in key.pem -out key.unencrypted.pem

Validation

You can enforce the presence of a valid HMAC in the header of incoming webhooks but giving the '-validate' option

Docker

docker run -it -p 12345:12345 quay.io/sgrimee/whproxy:v0.2.0 -host my.docker.host

Available versions can be found at: https://quay.io/repository/sgrimee/whproxy?tab=tags

If you use certificates, mount them with

    docker run -it -p 8080:12345 \
      -v $(pwd)/cert.pem:/cert.pem \
      -v $(pwd)/key.unencrypted.pem:/key.pem \
      quay.io/sgrimee/whproxy:v0.2.0 \
        -host my.docker.host \
        -cert /cert.pem -key /key.pem