-
-
Notifications
You must be signed in to change notification settings - Fork 835
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add time based MatchRule #267
Comments
@foosinn, This probably is a useful feature for many, but we need to flesh this out into a proposal. If we can agree on the proposal, we can label this issue as Proposed Feature
Sample Configuration[
{
"id": "webhook",
"execute-command": "/home/adnan/redeploy-go-webhook.sh",
"command-working-directory": "/home/adnan/go",
"rate-limit": "90s",
"trigger-rule":
{
"match":
{
"type": "ip-whitelist",
"ip-range": "104.192.143.0/24"
}
}
}
] |
Indeed, I wanted to implement a rate-limiting hook which seems to match the description, but never got an answer and eventually stopped using |
No this is not about rate limiting. I if did understand the docs correctly a person that manages to capture the webhook call can resend it anytime. Its possible to secure webhooks by using Or did i miss something? |
Sorry, I wasn't sure exactly what you meant. "Time based" sounds like rate limiting so assumed that's what you meant. Can you please flesh out your request? Can you offer an initial proposal of exactly how this feature would be used and how it would work? How is it different from the general rate-limiting case? |
This is not intended to do rate-limiting, its more like an additional access protection. Since we are using the payload hash the password itself is not submitted in the request. |
Using a time based match rule would allow
payload-hash-*
secured hooks that are only valid for a configurable amount of time.Using those would prevent a captured hook call once more, even if it has been payload-hash verified.
The text was updated successfully, but these errors were encountered: