2019-11-02 04:21:22 +05:30
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package webhook
|
|
|
|
|
|
|
|
import (
|
2019-12-15 15:21:28 +05:30
|
|
|
"context"
|
2019-11-02 04:21:22 +05:30
|
|
|
"crypto/tls"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"net/url"
|
|
|
|
"strings"
|
2019-11-09 02:55:53 +05:30
|
|
|
"sync"
|
2019-11-02 04:21:22 +05:30
|
|
|
"time"
|
|
|
|
|
|
|
|
"code.gitea.io/gitea/models"
|
2019-12-15 15:21:28 +05:30
|
|
|
"code.gitea.io/gitea/modules/graceful"
|
2019-11-02 04:21:22 +05:30
|
|
|
"code.gitea.io/gitea/modules/log"
|
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2019-11-09 02:55:53 +05:30
|
|
|
"github.com/gobwas/glob"
|
2019-11-02 04:21:22 +05:30
|
|
|
"github.com/unknwon/com"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Deliver deliver hook task
|
|
|
|
func Deliver(t *models.HookTask) error {
|
|
|
|
t.IsDelivered = true
|
|
|
|
|
|
|
|
var req *http.Request
|
|
|
|
var err error
|
|
|
|
|
|
|
|
switch t.HTTPMethod {
|
|
|
|
case "":
|
|
|
|
log.Info("HTTP Method for webhook %d empty, setting to POST as default", t.ID)
|
|
|
|
fallthrough
|
|
|
|
case http.MethodPost:
|
|
|
|
switch t.ContentType {
|
|
|
|
case models.ContentTypeJSON:
|
|
|
|
req, err = http.NewRequest("POST", t.URL, strings.NewReader(t.PayloadContent))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
req.Header.Set("Content-Type", "application/json")
|
|
|
|
case models.ContentTypeForm:
|
|
|
|
var forms = url.Values{
|
|
|
|
"payload": []string{t.PayloadContent},
|
|
|
|
}
|
|
|
|
|
|
|
|
req, err = http.NewRequest("POST", t.URL, strings.NewReader(forms.Encode()))
|
|
|
|
if err != nil {
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
|
|
|
|
}
|
|
|
|
case http.MethodGet:
|
|
|
|
u, err := url.Parse(t.URL)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
vals := u.Query()
|
|
|
|
vals["payload"] = []string{t.PayloadContent}
|
|
|
|
u.RawQuery = vals.Encode()
|
|
|
|
req, err = http.NewRequest("GET", u.String(), nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("Invalid http method for webhook: [%d] %v", t.ID, t.HTTPMethod)
|
|
|
|
}
|
|
|
|
|
2020-03-28 18:39:55 +05:30
|
|
|
if t.Type == models.MATRIX {
|
|
|
|
req, err = getMatrixHookRequest(t)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-02 04:21:22 +05:30
|
|
|
req.Header.Add("X-Gitea-Delivery", t.UUID)
|
2020-03-06 10:40:48 +05:30
|
|
|
req.Header.Add("X-Gitea-Event", t.EventType.Event())
|
2019-11-02 04:21:22 +05:30
|
|
|
req.Header.Add("X-Gitea-Signature", t.Signature)
|
|
|
|
req.Header.Add("X-Gogs-Delivery", t.UUID)
|
2020-03-06 10:40:48 +05:30
|
|
|
req.Header.Add("X-Gogs-Event", t.EventType.Event())
|
2019-11-02 04:21:22 +05:30
|
|
|
req.Header.Add("X-Gogs-Signature", t.Signature)
|
|
|
|
req.Header["X-GitHub-Delivery"] = []string{t.UUID}
|
2020-03-06 10:40:48 +05:30
|
|
|
req.Header["X-GitHub-Event"] = []string{t.EventType.Event()}
|
2019-11-02 04:21:22 +05:30
|
|
|
|
|
|
|
// Record delivery information.
|
|
|
|
t.RequestInfo = &models.HookRequest{
|
|
|
|
Headers: map[string]string{},
|
|
|
|
}
|
|
|
|
for k, vals := range req.Header {
|
|
|
|
t.RequestInfo.Headers[k] = strings.Join(vals, ",")
|
|
|
|
}
|
|
|
|
|
|
|
|
t.ResponseInfo = &models.HookResponse{
|
|
|
|
Headers: map[string]string{},
|
|
|
|
}
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
t.Delivered = time.Now().UnixNano()
|
|
|
|
if t.IsSucceed {
|
|
|
|
log.Trace("Hook delivered: %s", t.UUID)
|
|
|
|
} else {
|
|
|
|
log.Trace("Hook delivery failed: %s", t.UUID)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := models.UpdateHookTask(t); err != nil {
|
|
|
|
log.Error("UpdateHookTask [%d]: %v", t.ID, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update webhook last delivery status.
|
|
|
|
w, err := models.GetWebhookByID(t.HookID)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("GetWebhookByID: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if t.IsSucceed {
|
|
|
|
w.LastStatus = models.HookStatusSucceed
|
|
|
|
} else {
|
|
|
|
w.LastStatus = models.HookStatusFail
|
|
|
|
}
|
|
|
|
if err = models.UpdateWebhookLastStatus(w); err != nil {
|
|
|
|
log.Error("UpdateWebhookLastStatus: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
resp, err := webhookHTTPClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
t.ResponseInfo.Body = fmt.Sprintf("Delivery: %v", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
// Status code is 20x can be seen as succeed.
|
|
|
|
t.IsSucceed = resp.StatusCode/100 == 2
|
|
|
|
t.ResponseInfo.Status = resp.StatusCode
|
|
|
|
for k, vals := range resp.Header {
|
|
|
|
t.ResponseInfo.Headers[k] = strings.Join(vals, ",")
|
|
|
|
}
|
|
|
|
|
|
|
|
p, err := ioutil.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
t.ResponseInfo.Body = fmt.Sprintf("read body: %s", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
t.ResponseInfo.Body = string(p)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeliverHooks checks and delivers undelivered hooks.
|
2019-12-15 15:21:28 +05:30
|
|
|
// FIXME: graceful: This would likely benefit from either a worker pool with dummy queue
|
|
|
|
// or a full queue. Then more hooks could be sent at same time.
|
|
|
|
func DeliverHooks(ctx context.Context) {
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
}
|
2019-11-02 04:21:22 +05:30
|
|
|
tasks, err := models.FindUndeliveredHookTasks()
|
|
|
|
if err != nil {
|
|
|
|
log.Error("DeliverHooks: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update hook task status.
|
|
|
|
for _, t := range tasks {
|
2019-12-15 15:21:28 +05:30
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
}
|
2019-11-02 04:21:22 +05:30
|
|
|
if err = Deliver(t); err != nil {
|
|
|
|
log.Error("deliver: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start listening on new hook requests.
|
2019-12-15 15:21:28 +05:30
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
hookQueue.Close()
|
|
|
|
return
|
|
|
|
case repoIDStr := <-hookQueue.Queue():
|
|
|
|
log.Trace("DeliverHooks [repo_id: %v]", repoIDStr)
|
|
|
|
hookQueue.Remove(repoIDStr)
|
2019-11-02 04:21:22 +05:30
|
|
|
|
2019-12-15 15:21:28 +05:30
|
|
|
repoID, err := com.StrTo(repoIDStr).Int64()
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Invalid repo ID: %s", repoIDStr)
|
|
|
|
continue
|
|
|
|
}
|
2019-11-02 04:21:22 +05:30
|
|
|
|
2019-12-15 15:21:28 +05:30
|
|
|
tasks, err := models.FindRepoUndeliveredHookTasks(repoID)
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Get repository [%d] hook tasks: %v", repoID, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
for _, t := range tasks {
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
if err = Deliver(t); err != nil {
|
|
|
|
log.Error("deliver: %v", err)
|
|
|
|
}
|
2019-11-02 04:21:22 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-12-15 15:21:28 +05:30
|
|
|
|
2019-11-02 04:21:22 +05:30
|
|
|
}
|
|
|
|
|
2019-11-09 02:55:53 +05:30
|
|
|
var (
|
|
|
|
webhookHTTPClient *http.Client
|
|
|
|
once sync.Once
|
|
|
|
hostMatchers []glob.Glob
|
|
|
|
)
|
|
|
|
|
|
|
|
func webhookProxy() func(req *http.Request) (*url.URL, error) {
|
|
|
|
if setting.Webhook.ProxyURL == "" {
|
|
|
|
return http.ProxyFromEnvironment
|
|
|
|
}
|
|
|
|
|
|
|
|
once.Do(func() {
|
|
|
|
for _, h := range setting.Webhook.ProxyHosts {
|
|
|
|
if g, err := glob.Compile(h); err == nil {
|
|
|
|
hostMatchers = append(hostMatchers, g)
|
|
|
|
} else {
|
|
|
|
log.Error("glob.Compile %s failed: %v", h, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
return func(req *http.Request) (*url.URL, error) {
|
|
|
|
for _, v := range hostMatchers {
|
|
|
|
if v.Match(req.URL.Host) {
|
|
|
|
return http.ProxyURL(setting.Webhook.ProxyURLFixed)(req)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return http.ProxyFromEnvironment(req)
|
|
|
|
}
|
|
|
|
}
|
2019-11-02 04:21:22 +05:30
|
|
|
|
|
|
|
// InitDeliverHooks starts the hooks delivery thread
|
|
|
|
func InitDeliverHooks() {
|
|
|
|
timeout := time.Duration(setting.Webhook.DeliverTimeout) * time.Second
|
|
|
|
|
|
|
|
webhookHTTPClient = &http.Client{
|
|
|
|
Transport: &http.Transport{
|
|
|
|
TLSClientConfig: &tls.Config{InsecureSkipVerify: setting.Webhook.SkipTLSVerify},
|
2019-11-09 02:55:53 +05:30
|
|
|
Proxy: webhookProxy(),
|
2019-11-02 04:21:22 +05:30
|
|
|
Dial: func(netw, addr string) (net.Conn, error) {
|
|
|
|
conn, err := net.DialTimeout(netw, addr, timeout)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return conn, conn.SetDeadline(time.Now().Add(timeout))
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2019-12-15 15:21:28 +05:30
|
|
|
go graceful.GetManager().RunWithShutdownContext(DeliverHooks)
|
2019-11-02 04:21:22 +05:30
|
|
|
}
|