2019-11-01 23:51:22 +01:00
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package webhook
|
|
|
|
|
|
|
|
import (
|
2022-05-20 16:08:52 +02:00
|
|
|
"context"
|
2019-11-01 23:51:22 +01:00
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
|
2021-12-10 02:27:50 +01:00
|
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
2022-10-21 18:21:56 +02:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2021-11-10 06:13:16 +01:00
|
|
|
webhook_model "code.gitea.io/gitea/models/webhook"
|
2019-11-01 23:51:22 +01:00
|
|
|
"code.gitea.io/gitea/modules/git"
|
2022-04-25 20:03:01 +02:00
|
|
|
"code.gitea.io/gitea/modules/graceful"
|
2019-11-01 23:51:22 +01:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
2022-04-25 20:03:01 +02:00
|
|
|
"code.gitea.io/gitea/modules/queue"
|
2019-11-01 23:51:22 +01:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
|
|
|
api "code.gitea.io/gitea/modules/structs"
|
2021-08-12 14:43:08 +02:00
|
|
|
"code.gitea.io/gitea/modules/util"
|
|
|
|
|
2019-11-01 23:51:22 +01:00
|
|
|
"github.com/gobwas/glob"
|
|
|
|
)
|
|
|
|
|
2020-12-08 11:41:14 +01:00
|
|
|
type webhook struct {
|
2021-11-10 06:13:16 +01:00
|
|
|
name webhook_model.HookType
|
|
|
|
payloadCreator func(p api.Payloader, event webhook_model.HookEventType, meta string) (api.Payloader, error)
|
2020-12-08 11:41:14 +01:00
|
|
|
}
|
|
|
|
|
2022-01-20 18:46:10 +01:00
|
|
|
var webhooks = map[webhook_model.HookType]*webhook{
|
|
|
|
webhook_model.SLACK: {
|
|
|
|
name: webhook_model.SLACK,
|
|
|
|
payloadCreator: GetSlackPayload,
|
|
|
|
},
|
|
|
|
webhook_model.DISCORD: {
|
|
|
|
name: webhook_model.DISCORD,
|
|
|
|
payloadCreator: GetDiscordPayload,
|
|
|
|
},
|
|
|
|
webhook_model.DINGTALK: {
|
|
|
|
name: webhook_model.DINGTALK,
|
|
|
|
payloadCreator: GetDingtalkPayload,
|
|
|
|
},
|
|
|
|
webhook_model.TELEGRAM: {
|
|
|
|
name: webhook_model.TELEGRAM,
|
|
|
|
payloadCreator: GetTelegramPayload,
|
|
|
|
},
|
|
|
|
webhook_model.MSTEAMS: {
|
|
|
|
name: webhook_model.MSTEAMS,
|
|
|
|
payloadCreator: GetMSTeamsPayload,
|
|
|
|
},
|
|
|
|
webhook_model.FEISHU: {
|
|
|
|
name: webhook_model.FEISHU,
|
|
|
|
payloadCreator: GetFeishuPayload,
|
|
|
|
},
|
|
|
|
webhook_model.MATRIX: {
|
|
|
|
name: webhook_model.MATRIX,
|
|
|
|
payloadCreator: GetMatrixPayload,
|
|
|
|
},
|
|
|
|
webhook_model.WECHATWORK: {
|
|
|
|
name: webhook_model.WECHATWORK,
|
|
|
|
payloadCreator: GetWechatworkPayload,
|
|
|
|
},
|
2022-01-23 14:46:30 +01:00
|
|
|
webhook_model.PACKAGIST: {
|
|
|
|
name: webhook_model.PACKAGIST,
|
|
|
|
payloadCreator: GetPackagistPayload,
|
|
|
|
},
|
2022-01-20 18:46:10 +01:00
|
|
|
}
|
2020-12-08 11:41:14 +01:00
|
|
|
|
|
|
|
// RegisterWebhook registers a webhook
|
|
|
|
func RegisterWebhook(name string, webhook *webhook) {
|
2022-06-20 12:02:49 +02:00
|
|
|
webhooks[name] = webhook
|
2020-12-08 11:41:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// IsValidHookTaskType returns true if a webhook registered
|
|
|
|
func IsValidHookTaskType(name string) bool {
|
2021-11-10 06:13:16 +01:00
|
|
|
if name == webhook_model.GITEA || name == webhook_model.GOGS {
|
2020-12-12 16:33:19 +01:00
|
|
|
return true
|
|
|
|
}
|
2022-06-20 12:02:49 +02:00
|
|
|
_, ok := webhooks[name]
|
2020-12-08 11:41:14 +01:00
|
|
|
return ok
|
|
|
|
}
|
|
|
|
|
2019-11-02 03:35:12 +01:00
|
|
|
// hookQueue is a global queue of web hooks
|
2022-04-25 20:03:01 +02:00
|
|
|
var hookQueue queue.UniqueQueue
|
2019-11-01 23:51:22 +01:00
|
|
|
|
|
|
|
// getPayloadBranch returns branch for hook event, if applicable.
|
|
|
|
func getPayloadBranch(p api.Payloader) string {
|
|
|
|
switch pp := p.(type) {
|
|
|
|
case *api.CreatePayload:
|
|
|
|
if pp.RefType == "branch" {
|
|
|
|
return pp.Ref
|
|
|
|
}
|
|
|
|
case *api.DeletePayload:
|
|
|
|
if pp.RefType == "branch" {
|
|
|
|
return pp.Ref
|
|
|
|
}
|
|
|
|
case *api.PushPayload:
|
|
|
|
if strings.HasPrefix(pp.Ref, git.BranchPrefix) {
|
|
|
|
return pp.Ref[len(git.BranchPrefix):]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2022-10-21 18:21:56 +02:00
|
|
|
// EventSource represents the source of a webhook action. Repository and/or Owner must be set.
|
|
|
|
type EventSource struct {
|
|
|
|
Repository *repo_model.Repository
|
|
|
|
Owner *user_model.User
|
|
|
|
}
|
2022-04-25 20:03:01 +02:00
|
|
|
|
2022-10-21 18:21:56 +02:00
|
|
|
// handle delivers hook tasks
|
|
|
|
func handle(data ...queue.Data) []queue.Data {
|
|
|
|
ctx := graceful.GetManager().HammerContext()
|
2022-04-25 20:03:01 +02:00
|
|
|
|
2022-10-21 18:21:56 +02:00
|
|
|
for _, taskID := range data {
|
|
|
|
task, err := webhook_model.GetHookTaskByID(ctx, taskID.(int64))
|
2022-04-25 20:03:01 +02:00
|
|
|
if err != nil {
|
2022-10-21 18:21:56 +02:00
|
|
|
log.Error("GetHookTaskByID failed: %v", err)
|
|
|
|
} else {
|
|
|
|
if err := Deliver(ctx, task); err != nil {
|
|
|
|
log.Error("webhook.Deliver failed: %v", err)
|
2022-04-25 20:03:01 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-10-21 18:21:56 +02:00
|
|
|
|
2022-04-25 20:03:01 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-10-21 18:21:56 +02:00
|
|
|
func enqueueHookTask(task *webhook_model.HookTask) error {
|
|
|
|
err := hookQueue.PushFunc(task.ID, nil)
|
2022-04-25 20:03:01 +02:00
|
|
|
if err != nil && err != queue.ErrAlreadyInQueue {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-11-10 06:13:16 +01:00
|
|
|
func checkBranch(w *webhook_model.Webhook, branch string) bool {
|
2019-11-01 23:51:22 +01:00
|
|
|
if w.BranchFilter == "" || w.BranchFilter == "*" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
g, err := glob.Compile(w.BranchFilter)
|
|
|
|
if err != nil {
|
|
|
|
// should not really happen as BranchFilter is validated
|
|
|
|
log.Error("CheckBranch failed: %s", err)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return g.Match(branch)
|
|
|
|
}
|
|
|
|
|
2022-10-21 18:21:56 +02:00
|
|
|
// PrepareWebhook creates a hook task and enqueues it for processing
|
|
|
|
func PrepareWebhook(ctx context.Context, w *webhook_model.Webhook, event webhook_model.HookEventType, p api.Payloader) error {
|
2021-02-11 18:34:34 +01:00
|
|
|
// Skip sending if webhooks are disabled.
|
|
|
|
if setting.DisableWebhooks {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-11-01 23:51:22 +01:00
|
|
|
for _, e := range w.EventCheckers() {
|
|
|
|
if event == e.Type {
|
|
|
|
if !e.Has() {
|
|
|
|
return nil
|
|
|
|
}
|
2021-02-22 19:54:01 +01:00
|
|
|
|
|
|
|
break
|
2019-11-01 23:51:22 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-03 04:46:02 +02:00
|
|
|
// Avoid sending "0 new commits" to non-integration relevant webhooks (e.g. slack, discord, etc.).
|
|
|
|
// Integration webhooks (e.g. drone) still receive the required data.
|
|
|
|
if pushEvent, ok := p.(*api.PushPayload); ok &&
|
2021-11-10 06:13:16 +01:00
|
|
|
w.Type != webhook_model.GITEA && w.Type != webhook_model.GOGS &&
|
2020-09-03 04:46:02 +02:00
|
|
|
len(pushEvent.Commits) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-11-01 23:51:22 +01:00
|
|
|
// If payload has no associated branch (e.g. it's a new tag, issue, etc.),
|
|
|
|
// branch filter has no effect.
|
|
|
|
if branch := getPayloadBranch(p); branch != "" {
|
|
|
|
if !checkBranch(w, branch) {
|
|
|
|
log.Info("Branch %q doesn't match branch filter %q, skipping", branch, w.BranchFilter)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var payloader api.Payloader
|
|
|
|
var err error
|
2021-01-06 16:11:23 +01:00
|
|
|
webhook, ok := webhooks[w.Type]
|
2020-12-08 11:41:14 +01:00
|
|
|
if ok {
|
|
|
|
payloader, err = webhook.payloadCreator(p, event, w.Meta)
|
2020-03-28 14:09:55 +01:00
|
|
|
if err != nil {
|
2022-10-24 21:29:17 +02:00
|
|
|
return fmt.Errorf("create payload for %s[%s]: %w", w.Type, event, err)
|
2020-03-28 14:09:55 +01:00
|
|
|
}
|
2020-12-08 11:41:14 +01:00
|
|
|
} else {
|
2019-11-01 23:51:22 +01:00
|
|
|
payloader = p
|
|
|
|
}
|
|
|
|
|
2022-10-21 18:21:56 +02:00
|
|
|
task, err := webhook_model.CreateHookTask(ctx, &webhook_model.HookTask{
|
2021-06-27 21:21:09 +02:00
|
|
|
HookID: w.ID,
|
|
|
|
Payloader: payloader,
|
|
|
|
EventType: event,
|
2022-10-21 18:21:56 +02:00
|
|
|
})
|
|
|
|
if err != nil {
|
2022-10-24 21:29:17 +02:00
|
|
|
return fmt.Errorf("CreateHookTask: %w", err)
|
2019-11-01 23:51:22 +01:00
|
|
|
}
|
2022-10-21 18:21:56 +02:00
|
|
|
|
|
|
|
return enqueueHookTask(task)
|
2019-11-01 23:51:22 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// PrepareWebhooks adds new webhooks to task queue for given payload.
|
2022-10-21 18:21:56 +02:00
|
|
|
func PrepareWebhooks(ctx context.Context, source EventSource, event webhook_model.HookEventType, p api.Payloader) error {
|
|
|
|
owner := source.Owner
|
2019-11-02 03:35:12 +01:00
|
|
|
|
2022-10-21 18:21:56 +02:00
|
|
|
var ws []*webhook_model.Webhook
|
2019-11-01 23:51:22 +01:00
|
|
|
|
2022-10-21 18:21:56 +02:00
|
|
|
if source.Repository != nil {
|
|
|
|
repoHooks, err := webhook_model.ListWebhooksByOpts(ctx, &webhook_model.ListWebhookOptions{
|
|
|
|
RepoID: source.Repository.ID,
|
|
|
|
IsActive: util.OptionalBoolTrue,
|
|
|
|
})
|
|
|
|
if err != nil {
|
2022-10-24 21:29:17 +02:00
|
|
|
return fmt.Errorf("ListWebhooksByOpts: %w", err)
|
2022-10-21 18:21:56 +02:00
|
|
|
}
|
|
|
|
ws = append(ws, repoHooks...)
|
|
|
|
|
2022-11-19 09:12:33 +01:00
|
|
|
owner = source.Repository.MustOwner(ctx)
|
2019-11-01 23:51:22 +01:00
|
|
|
}
|
|
|
|
|
2022-10-21 18:21:56 +02:00
|
|
|
// check if owner is an org and append additional webhooks
|
|
|
|
if owner != nil && owner.IsOrganization() {
|
2022-05-20 16:08:52 +02:00
|
|
|
orgHooks, err := webhook_model.ListWebhooksByOpts(ctx, &webhook_model.ListWebhookOptions{
|
2022-10-21 18:21:56 +02:00
|
|
|
OrgID: owner.ID,
|
2021-08-12 14:43:08 +02:00
|
|
|
IsActive: util.OptionalBoolTrue,
|
|
|
|
})
|
2019-11-01 23:51:22 +01:00
|
|
|
if err != nil {
|
2022-10-24 21:29:17 +02:00
|
|
|
return fmt.Errorf("ListWebhooksByOpts: %w", err)
|
2019-11-01 23:51:22 +01:00
|
|
|
}
|
|
|
|
ws = append(ws, orgHooks...)
|
|
|
|
}
|
|
|
|
|
2020-03-08 23:08:05 +01:00
|
|
|
// Add any admin-defined system webhooks
|
2022-05-20 16:08:52 +02:00
|
|
|
systemHooks, err := webhook_model.GetSystemWebhooks(ctx, util.OptionalBoolTrue)
|
2020-03-08 23:08:05 +01:00
|
|
|
if err != nil {
|
2022-10-24 21:29:17 +02:00
|
|
|
return fmt.Errorf("GetSystemWebhooks: %w", err)
|
2020-03-08 23:08:05 +01:00
|
|
|
}
|
|
|
|
ws = append(ws, systemHooks...)
|
|
|
|
|
2019-11-01 23:51:22 +01:00
|
|
|
if len(ws) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, w := range ws {
|
2022-10-21 18:21:56 +02:00
|
|
|
if err := PrepareWebhook(ctx, w, event, p); err != nil {
|
2019-11-01 23:51:22 +01:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2022-01-05 22:00:20 +01:00
|
|
|
|
|
|
|
// ReplayHookTask replays a webhook task
|
2022-10-21 18:21:56 +02:00
|
|
|
func ReplayHookTask(ctx context.Context, w *webhook_model.Webhook, uuid string) error {
|
|
|
|
task, err := webhook_model.ReplayHookTask(ctx, w.ID, uuid)
|
2022-01-05 22:00:20 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-10-21 18:21:56 +02:00
|
|
|
return enqueueHookTask(task)
|
2022-01-05 22:00:20 +01:00
|
|
|
}
|