-
-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: give webhooks the option for accepting invalid HTTPS certs #71
Comments
OK, I have tried to use https (through my reverse proxy config, currently using swag) but still does not seems to trigger the webhook in my setup. I think it might be a problem of my config, a couple of questions:
|
This shouldn't matter. It will try and use the vars in the services
The |
OK, I think I found a possible explanation. When I execute "Resend webhook" from the GUI Argus seems to crash, then it reboots and that is why all my deployed_version webhooks where called. I don't know why is crashing in my setup though. I am running argus using docker-compose from
|
Should I move to :master docker image? I thought that was too bleeding edge :) |
That crash looks like it's from you not setting the |
Finally, it works!!! It was indeed the type:github missing from my part. Now it works with http / https. Thanks @JosephKav |
- default to `github` + error if defined as something other than `github` - switched around the invalid param texts so the found var is before the "<invalid>" #71 (comment)
I setup webhooks on my reverse proxy and tested again. The TLS error is gone and the webhook is successfully sent, but I am getting It is not the first match as I am using SECRET as secret and copying and pasting, so it must be in the second match? Perhaps something to do with the fact I am running on the latest commit of argus master that is causing the second match to fail???
|
@samcro1967 have you tried removing the matches completely from the webhook config? It should work as parameters are only triggered if a match rule is defined. |
@jrhbcn I had tied removing the second match since I believe it was the one failing and it did not work. I just removed both and it did work. I am using http with So I would say there is an issue with a newer commit that is impacting the triggers, but not a requirement for me. The only missing piece would be the ability send a parameter with the webhook to send to the script as an argument. |
I am solving that now using the parameter directly in the webhook url. Such as:
|
I'm not sure about that as you haven't ever got it to work with those match rules, but it still works fine for me with the rules you posted. Not sure what could be different in our setups
This I'll do in #61 |
@jrhbcn I do not see anything in your hooks.yml for that. So does that just become $1 for the script or am I missing something? |
@JosephKav I added the below and it is working now. Thanks!
|
@JosephKav So I setup Wireshark and enabled debugging on webhook. Was all set to capture what Argus sent and what webhook received and now it is working. Will open a new issue if I see it again with more detail hopefully this time. |
As I was reviewing logs for dpkg this morning, I realized that yesterday I did remove the community packaged version of webhook and built from source. The community packaged version is not maintained and was at 2.6.x if I remember correctly. The current version is 2.8.x. My guess is that was the solution if you also built from source. |
XD I did think you might not be on Glad we've gotten to the bottom of it! |
webhooks currently fail to send if the cert is invalid (e.g. self-signed). This'll add an
allow_invalid_certs
key to each webhook (with support for it in defaults/globally like notify)Triggered by:
Originally posted by @samcro1967 in #61 (comment)
So for fun (I mean who doesn't love certs), I changed webhook to use https. I get a different error in the webhook log when I execute the webhook from Argus, but I am guessing it is related to how I generated the self signed cert. Thought I would share in case it sheds any new light on the topic.
webhook log
cert generation command
The text was updated successfully, but these errors were encountered: