sync with, to create a fresh SSH key and configure it as deployment key for the
repository, and to configure git-mirror accordingly. For additional security,
one should also configure a shared HMAC secret, such that the webhook can verify
-that the data indeed comes from GitHub.
+that the data indeed comes from GitHub. On the git-mirror side, the HMAC secret
+is configured with the `hmac-secret` repository option.
To make your job easier, there is a script `github-add-hooks.py` that can do
all this for you. It assumes that the repository exists on the GitHub side, but
self.name = name
self.local = conf['local']
self.owner = conf['owner'] # email address to notify in case of problems
- self.hmac_secret = conf['hmac-secret'].encode('utf-8')
+ self.hmac_secret = conf['hmac-secret'].encode('utf-8') if 'hmac-secret' in conf else None
self.deploy_key = conf['deploy-key'] # the SSH ky used for authenticating against remote hosts
self.mirrors = {} # maps mirrors to their URLs
mirror_prefix = 'mirror-'
send_mail("git-mirror {}".format(self.name), msg, recipients = [self.owner], sender = mail_sender)
def compute_hmac(self, data):
+ assert self.hmac_secret is not None
h = hmac.new(self.hmac_secret, digestmod = hashlib.sha1)
h.update(data)
return h.hexdigest()