-
Notifications
You must be signed in to change notification settings - Fork 870
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WebHook signature check fails when using PSR-7 message header lines #1001
Comments
@davidlung thank you for filing this issue, we have the fix in progress. One thing we just wanted to clarify is the use case which is causing the failure. We just want to be sure we can thoroughly reproduce this on our end. We are wondering why PSR-7 cannot preserve formatting and how difficult it would be to bypass the tool and use the original formatting from the header. We hesitate to merge this change because when our client libraries check the webhook signature they expect to be passed the exact raw header that they got from Stripe, and we don't want to relax this restriction without a truly compelling reason. |
This is not the point of PSR-7 directly, the most PSR-7 libraries (e.g. Guzzle, one of the most popular or psr-7 by Nyholm from Symfony core team) are considering the RFC for http messages which defines the following part (OWS, Optional whitespaces):
However, a lot of people using these libraries that implode multiple field values with whitespace, therefore this is not a individual issue which can be handled by the developer who uses this library. RFC: |
@davidlung thank you for taking the time to file this issue and provide context around PSR-7. The team decided to merge in the suggested change which should hopefully unblock you. |
$event = \Stripe\Webhook::constructEvent( This solved my problem, I hope it solves the problem of other people living in it. |
php version 7.4.7
stripe-php version: 7.49.0
Use case:
I'm using the stripe CLI to listen and forward webhooks to my dev application.
Before execute the webhook at my application, i have to verify the confidentiality of the requrest by passing the stripe-signature header and the webhook secret to
Webhook::constructEvent
.Approach
I use a PSR-7 message object to get the http header line for stripe-signature and pass it to construct the event.
Problem
The stripe-signature header consists of multiple and comma separated values. The PSR-7 message explodes multiple header values and saves internal as array. When get the header line from PSR message, the message implodes these values back into a normalized comma separated single value, where as each comma (can) has a trailing whitespace.
e.g. from
t=xxxxxx,v1=xxxxxxxx,v0=xxxxxxx
tot=xxxxxx, v1=xxxxxxxx, v0=xxxxxxx
Stripe uses
Stripe\WebhookSignature::getSignatures(header, scheme)
to extract the header values by exploding by comma and '='. For getting the signatures, it checks for the given scheme e.g. "v1" to collect the value.The sticking point is an prepended whitespace at the exploded value schemes. The check
" v1" === "v1"
fails and no signatures are collected which results in a verification error.Solution
Use trim whitespace before compare scheme.
The text was updated successfully, but these errors were encountered: