debian-mirror-gitlab/app/models/project_services/buildkite_service.rb

144 lines
3.1 KiB
Ruby
Raw Normal View History

2018-11-20 20:47:30 +05:30
# frozen_string_literal: true
2015-04-26 12:48:37 +05:30
require "addressable/uri"
class BuildkiteService < CiService
2017-08-17 22:00:37 +05:30
include ReactiveService
2015-04-26 12:48:37 +05:30
2019-12-04 20:38:33 +05:30
ENDPOINT = "https://buildkite.com"
2017-08-17 22:00:37 +05:30
prop_accessor :project_url, :token
2015-04-26 12:48:37 +05:30
2018-11-08 19:23:39 +05:30
validates :project_url, presence: true, public_url: true, if: :activated?
2015-04-26 12:48:37 +05:30
validates :token, presence: true, if: :activated?
after_save :compose_service_hook, if: :activated?
2020-10-24 23:57:45 +05:30
def self.supported_events
%w(push merge_request tag_push)
end
# This is a stub method to work with deprecated API response
# TODO: remove enable_ssl_verification after 14.0
# https://gitlab.com/gitlab-org/gitlab/-/issues/222808
def enable_ssl_verification
true
end
# Since SSL verification will always be enabled for Buildkite,
# we no longer needs to store the boolean.
# This is a stub method to work with deprecated API param.
# TODO: remove enable_ssl_verification after 14.0
# https://gitlab.com/gitlab-org/gitlab/-/issues/222808
def enable_ssl_verification=(_value)
self.properties.delete('enable_ssl_verification') # Remove unused key
end
2015-04-26 12:48:37 +05:30
def webhook_url
"#{buildkite_endpoint('webhook')}/deliver/#{webhook_token}"
end
def compose_service_hook
hook = service_hook || build_service_hook
hook.url = webhook_url
2020-10-24 23:57:45 +05:30
hook.enable_ssl_verification = true
2015-04-26 12:48:37 +05:30
hook.save
end
def execute(data)
return unless supported_events.include?(data[:object_kind])
service_hook.execute(data)
end
def commit_status(sha, ref)
2017-08-17 22:00:37 +05:30
with_reactive_cache(sha, ref) {|cached| cached[:commit_status] }
2015-04-26 12:48:37 +05:30
end
def commit_status_path(sha)
"#{buildkite_endpoint('gitlab')}/status/#{status_token}.json?commit=#{sha}"
end
def build_page(sha, ref)
"#{project_url}/builds?commit=#{sha}"
end
def title
'Buildkite'
end
def description
2021-06-08 01:23:25 +05:30
'Run CI/CD pipelines with Buildkite.'
2015-04-26 12:48:37 +05:30
end
2017-08-17 22:00:37 +05:30
def self.to_param
2015-04-26 12:48:37 +05:30
'buildkite'
end
def fields
[
{ type: 'text',
name: 'token',
2020-10-24 23:57:45 +05:30
title: 'Integration Token',
help: 'This token will be provided when you create a Buildkite pipeline with a GitLab repository',
required: true },
2015-04-26 12:48:37 +05:30
{ type: 'text',
name: 'project_url',
2020-10-24 23:57:45 +05:30
title: 'Pipeline URL',
placeholder: "#{ENDPOINT}/acme-inc/test-pipeline",
required: true }
2015-04-26 12:48:37 +05:30
]
end
2017-08-17 22:00:37 +05:30
def calculate_reactive_cache(sha, ref)
2020-04-22 19:07:51 +05:30
response = Gitlab::HTTP.try_get(commit_status_path(sha), request_options)
2017-08-17 22:00:37 +05:30
status =
2020-04-22 19:07:51 +05:30
if response&.code == 200 && response['status']
2017-08-17 22:00:37 +05:30
response['status']
else
:error
end
{ commit_status: status }
end
2015-04-26 12:48:37 +05:30
private
def webhook_token
token_parts.first
end
def status_token
token_parts.second
end
def token_parts
if token.present?
token.split(':')
else
[]
end
end
def buildkite_endpoint(subdomain = nil)
if subdomain.present?
uri = Addressable::URI.parse(ENDPOINT)
new_endpoint = "#{uri.scheme || 'http'}://#{subdomain}.#{uri.host}"
if uri.port.present?
"#{new_endpoint}:#{uri.port}"
else
new_endpoint
end
else
ENDPOINT
end
end
2020-04-22 19:07:51 +05:30
def request_options
{ verify: false, extra_log_info: { project_id: project_id } }
end
2015-04-26 12:48:37 +05:30
end