##// END OF EJS Templates
webhook: execute via celery for async.
marcink -
r2410:af8ad232 default
parent child Browse files
Show More
@@ -1,351 +1,388 b''
1 1 # -*- coding: utf-8 -*-
2 2
3 3 # Copyright (C) 2012-2017 RhodeCode GmbH
4 4 #
5 5 # This program is free software: you can redistribute it and/or modify
6 6 # it under the terms of the GNU Affero General Public License, version 3
7 7 # (only), as published by the Free Software Foundation.
8 8 #
9 9 # This program is distributed in the hope that it will be useful,
10 10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 12 # GNU General Public License for more details.
13 13 #
14 14 # You should have received a copy of the GNU Affero General Public License
15 15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
16 16 #
17 17 # This program is dual-licensed. If you wish to learn more about the
18 18 # RhodeCode Enterprise Edition, including its added features, Support services,
19 19 # and proprietary license terms, please see https://rhodecode.com/licenses/
20 20
21 21 from __future__ import unicode_literals
22 22 import string
23 23 from collections import OrderedDict
24 24
25 25 import deform
26 26 import deform.widget
27 27 import logging
28 28 import requests
29 29 import requests.adapters
30 30 import colander
31 31 from requests.packages.urllib3.util.retry import Retry
32 32
33 33 import rhodecode
34 34 from rhodecode import events
35 35 from rhodecode.translation import _
36 36 from rhodecode.integrations.types.base import IntegrationTypeBase
37 from rhodecode.lib.celerylib import async_task, RequestContextTask
37 from rhodecode.lib.celerylib import run_task, async_task, RequestContextTask
38 38
39 39 log = logging.getLogger(__name__)
40 40
41 41
42 42 # updating this required to update the `common_vars` passed in url calling func
43 43 WEBHOOK_URL_VARS = [
44 44 'repo_name',
45 45 'repo_type',
46 46 'repo_id',
47 47 'repo_url',
48 48 # extra repo fields
49 49 'extra:<extra_key_name>',
50 50
51 51 # special attrs below that we handle, using multi-call
52 52 'branch',
53 53 'commit_id',
54 54
55 55 # pr events vars
56 56 'pull_request_id',
57 57 'pull_request_url',
58 58
59 59 # user who triggers the call
60 60 'username',
61 61 'user_id',
62 62
63 63 ]
64 64 URL_VARS = ', '.join('${' + x + '}' for x in WEBHOOK_URL_VARS)
65 65
66 66
67 67 def get_auth(settings):
68 68 from requests.auth import HTTPBasicAuth
69 69 username = settings.get('username')
70 70 password = settings.get('password')
71 71 if username and password:
72 72 return HTTPBasicAuth(username, password)
73 73 return None
74 74
75 75
76 76 class WebhookHandler(object):
77 77 def __init__(self, template_url, secret_token, headers):
78 78 self.template_url = template_url
79 79 self.secret_token = secret_token
80 80 self.headers = headers
81 81
82 82 def get_base_parsed_template(self, data):
83 83 """
84 84 initially parses the passed in template with some common variables
85 85 available on ALL calls
86 86 """
87 87 # note: make sure to update the `WEBHOOK_URL_VARS` if this changes
88 88 common_vars = {
89 89 'repo_name': data['repo']['repo_name'],
90 90 'repo_type': data['repo']['repo_type'],
91 91 'repo_id': data['repo']['repo_id'],
92 92 'repo_url': data['repo']['url'],
93 93 'username': data['actor']['username'],
94 94 'user_id': data['actor']['user_id']
95 95 }
96 96 extra_vars = {}
97 97 for extra_key, extra_val in data['repo']['extra_fields'].items():
98 98 extra_vars['extra:{}'.format(extra_key)] = extra_val
99 99 common_vars.update(extra_vars)
100 100
101 101 return string.Template(
102 102 self.template_url).safe_substitute(**common_vars)
103 103
104 104 def repo_push_event_handler(self, event, data):
105 105 url = self.get_base_parsed_template(data)
106 106 url_cals = []
107 107 branch_data = OrderedDict()
108 108 for obj in data['push']['branches']:
109 109 branch_data[obj['name']] = obj
110 110
111 111 branches_commits = OrderedDict()
112 112 for commit in data['push']['commits']:
113 113 if commit['branch'] not in branches_commits:
114 114 branch_commits = {'branch': branch_data[commit['branch']],
115 115 'commits': []}
116 116 branches_commits[commit['branch']] = branch_commits
117 117
118 118 branch_commits = branches_commits[commit['branch']]
119 119 branch_commits['commits'].append(commit)
120 120
121 121 if '${branch}' in url:
122 122 # call it multiple times, for each branch if used in variables
123 123 for branch, commit_ids in branches_commits.items():
124 124 branch_url = string.Template(url).safe_substitute(branch=branch)
125 125 # call further down for each commit if used
126 126 if '${commit_id}' in branch_url:
127 127 for commit_data in commit_ids['commits']:
128 128 commit_id = commit_data['raw_id']
129 129 commit_url = string.Template(branch_url).safe_substitute(
130 130 commit_id=commit_id)
131 131 # register per-commit call
132 132 log.debug(
133 133 'register webhook call(%s) to url %s', event, commit_url)
134 134 url_cals.append((commit_url, self.secret_token, self.headers, data))
135 135
136 136 else:
137 137 # register per-branch call
138 138 log.debug(
139 139 'register webhook call(%s) to url %s', event, branch_url)
140 140 url_cals.append((branch_url, self.secret_token, self.headers, data))
141 141
142 142 else:
143 143 log.debug(
144 144 'register webhook call(%s) to url %s', event, url)
145 145 url_cals.append((url, self.secret_token, self.headers, data))
146 146
147 147 return url_cals
148 148
149 149 def repo_create_event_handler(self, event, data):
150 150 url = self.get_base_parsed_template(data)
151 151 log.debug(
152 152 'register webhook call(%s) to url %s', event, url)
153 153 return [(url, self.secret_token, self.headers, data)]
154 154
155 155 def pull_request_event_handler(self, event, data):
156 156 url = self.get_base_parsed_template(data)
157 157 log.debug(
158 158 'register webhook call(%s) to url %s', event, url)
159 159 url = string.Template(url).safe_substitute(
160 160 pull_request_id=data['pullrequest']['pull_request_id'],
161 161 pull_request_url=data['pullrequest']['url'])
162 162 return [(url, self.secret_token, self.headers, data)]
163 163
164 164 def __call__(self, event, data):
165 165 if isinstance(event, events.RepoPushEvent):
166 166 return self.repo_push_event_handler(event, data)
167 167 elif isinstance(event, events.RepoCreateEvent):
168 168 return self.repo_create_event_handler(event, data)
169 169 elif isinstance(event, events.PullRequestEvent):
170 170 return self.pull_request_event_handler(event, data)
171 171 else:
172 172 raise ValueError('event type not supported: %s' % events)
173 173
174 174
175 175 class WebhookSettingsSchema(colander.Schema):
176 176 url = colander.SchemaNode(
177 177 colander.String(),
178 178 title=_('Webhook URL'),
179 179 description=
180 180 _('URL to which Webhook should submit data. Following variables '
181 181 'are allowed to be used: {vars}. Some of the variables would '
182 182 'trigger multiple calls, like ${{branch}} or ${{commit_id}}. '
183 183 'Webhook will be called as many times as unique objects in '
184 184 'data in such cases.').format(vars=URL_VARS),
185 185 missing=colander.required,
186 186 required=True,
187 187 validator=colander.url,
188 188 widget=deform.widget.TextInputWidget(
189 189 placeholder='https://www.example.com/webhook'
190 190 ),
191 191 )
192 192 secret_token = colander.SchemaNode(
193 193 colander.String(),
194 194 title=_('Secret Token'),
195 195 description=_('Optional string used to validate received payloads. '
196 196 'It will be sent together with event data in JSON'),
197 197 default='',
198 198 missing='',
199 199 widget=deform.widget.TextInputWidget(
200 200 placeholder='e.g. secret_token'
201 201 ),
202 202 )
203 203 username = colander.SchemaNode(
204 204 colander.String(),
205 205 title=_('Username'),
206 206 description=_('Optional username to authenticate the call.'),
207 207 default='',
208 208 missing='',
209 209 widget=deform.widget.TextInputWidget(
210 210 placeholder='e.g. admin'
211 211 ),
212 212 )
213 213 password = colander.SchemaNode(
214 214 colander.String(),
215 215 title=_('Password'),
216 216 description=_('Optional password to authenticate the call.'),
217 217 default='',
218 218 missing='',
219 219 widget=deform.widget.PasswordWidget(
220 220 placeholder='e.g. secret.',
221 221 redisplay=True,
222 222 ),
223 223 )
224 224 custom_header_key = colander.SchemaNode(
225 225 colander.String(),
226 226 title=_('Custom Header Key'),
227 227 description=_('Custom Header name to be set when calling endpoint.'),
228 228 default='',
229 229 missing='',
230 230 widget=deform.widget.TextInputWidget(
231 231 placeholder='e.g.Authorization'
232 232 ),
233 233 )
234 234 custom_header_val = colander.SchemaNode(
235 235 colander.String(),
236 236 title=_('Custom Header Value'),
237 237 description=_('Custom Header value to be set when calling endpoint.'),
238 238 default='',
239 239 missing='',
240 240 widget=deform.widget.TextInputWidget(
241 241 placeholder='e.g. RcLogin auth=xxxx'
242 242 ),
243 243 )
244 244 method_type = colander.SchemaNode(
245 245 colander.String(),
246 246 title=_('Call Method'),
247 247 description=_('Select if the Webhook call should be made '
248 248 'with POST or GET.'),
249 249 default='post',
250 250 missing='',
251 251 widget=deform.widget.RadioChoiceWidget(
252 252 values=[('get', 'GET'), ('post', 'POST')],
253 253 inline=True
254 254 ),
255 255 )
256 256
257 257
258 258 class WebhookIntegrationType(IntegrationTypeBase):
259 259 key = 'webhook'
260 260 display_name = _('Webhook')
261 261 description = _('Post json events to a Webhook endpoint')
262 262 icon = '''<?xml version="1.0" encoding="UTF-8" standalone="no"?><svg viewBox="0 0 256 239" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" preserveAspectRatio="xMidYMid"><g><path d="M119.540432,100.502743 C108.930124,118.338815 98.7646301,135.611455 88.3876025,152.753617 C85.7226696,157.154315 84.4040417,160.738531 86.5332204,166.333309 C92.4107024,181.787152 84.1193605,196.825836 68.5350381,200.908244 C53.8383677,204.759349 39.5192953,195.099955 36.6032893,179.365384 C34.0194114,165.437749 44.8274148,151.78491 60.1824106,149.608284 C61.4694072,149.424428 62.7821041,149.402681 64.944891,149.240571 C72.469175,136.623655 80.1773157,123.700312 88.3025935,110.073173 C73.611854,95.4654658 64.8677898,78.3885437 66.803227,57.2292132 C68.1712787,42.2715849 74.0527146,29.3462646 84.8033863,18.7517722 C105.393354,-1.53572199 136.805164,-4.82141828 161.048542,10.7510424 C184.333097,25.7086706 194.996783,54.8450075 185.906752,79.7822957 C179.052655,77.9239597 172.151111,76.049808 164.563565,73.9917997 C167.418285,60.1274266 165.306899,47.6765751 155.95591,37.0109123 C149.777932,29.9690049 141.850349,26.2780332 132.835442,24.9178894 C114.764113,22.1877169 97.0209573,33.7983633 91.7563309,51.5355878 C85.7800012,71.6669027 94.8245623,88.1111998 119.540432,100.502743 L119.540432,100.502743 Z" fill="#C73A63"></path><path d="M149.841194,79.4106285 C157.316054,92.5969067 164.905578,105.982857 172.427885,119.246236 C210.44865,107.483365 239.114472,128.530009 249.398582,151.063322 C261.81978,178.282014 253.328765,210.520191 228.933162,227.312431 C203.893073,244.551464 172.226236,241.605803 150.040866,219.46195 C155.694953,214.729124 161.376716,209.974552 167.44794,204.895759 C189.360489,219.088306 208.525074,218.420096 222.753207,201.614016 C234.885769,187.277151 234.622834,165.900356 222.138374,151.863988 C207.730339,135.66681 188.431321,135.172572 165.103273,150.721309 C155.426087,133.553447 145.58086,116.521995 136.210101,99.2295848 C133.05093,93.4015266 129.561608,90.0209366 122.440622,88.7873178 C110.547271,86.7253555 102.868785,76.5124151 102.408155,65.0698097 C101.955433,53.7537294 108.621719,43.5249733 119.04224,39.5394355 C129.363912,35.5914599 141.476705,38.7783085 148.419765,47.554004 C154.093621,54.7244134 155.896602,62.7943365 152.911402,71.6372484 C152.081082,74.1025091 151.00562,76.4886916 149.841194,79.4106285 L149.841194,79.4106285 Z" fill="#4B4B4B"></path><path d="M167.706921,187.209935 L121.936499,187.209935 C117.54964,205.253587 108.074103,219.821756 91.7464461,229.085759 C79.0544063,236.285822 65.3738898,238.72736 50.8136292,236.376762 C24.0061432,232.053165 2.08568567,207.920497 0.156179306,180.745298 C-2.02835403,149.962159 19.1309765,122.599149 47.3341915,116.452801 C49.2814904,123.524363 51.2485589,130.663141 53.1958579,137.716911 C27.3195169,150.919004 18.3639187,167.553089 25.6054984,188.352614 C31.9811726,206.657224 50.0900643,216.690262 69.7528413,212.809503 C89.8327554,208.847688 99.9567329,192.160226 98.7211371,165.37844 C117.75722,165.37844 136.809118,165.180745 155.847178,165.475311 C163.280522,165.591951 169.019617,164.820939 174.620326,158.267339 C183.840836,147.48306 200.811003,148.455721 210.741239,158.640984 C220.88894,169.049642 220.402609,185.79839 209.663799,195.768166 C199.302587,205.38802 182.933414,204.874012 173.240413,194.508846 C171.247644,192.37176 169.677943,189.835329 167.706921,187.209935 L167.706921,187.209935 Z" fill="#4A4A4A"></path></g></svg>'''
263 263
264 264 valid_events = [
265 265 events.PullRequestCloseEvent,
266 266 events.PullRequestMergeEvent,
267 267 events.PullRequestUpdateEvent,
268 268 events.PullRequestCommentEvent,
269 269 events.PullRequestReviewEvent,
270 270 events.PullRequestCreateEvent,
271 271 events.RepoPushEvent,
272 272 events.RepoCreateEvent,
273 273 ]
274 274
275 275 def settings_schema(self):
276 276 schema = WebhookSettingsSchema()
277 277 schema.add(colander.SchemaNode(
278 278 colander.Set(),
279 279 widget=deform.widget.CheckboxChoiceWidget(
280 280 values=sorted(
281 281 [(e.name, e.display_name) for e in self.valid_events]
282 282 )
283 283 ),
284 284 description="Events activated for this integration",
285 285 name='events'
286 286 ))
287 287 return schema
288 288
289 289 def send_event(self, event):
290 290 log.debug('handling event %s with Webhook integration %s',
291 291 event.name, self)
292 292
293 293 if event.__class__ not in self.valid_events:
294 294 log.debug('event not valid: %r' % event)
295 295 return
296 296
297 297 if event.name not in self.settings['events']:
298 298 log.debug('event ignored: %r' % event)
299 299 return
300 300
301 301 data = event.as_dict()
302 302 template_url = self.settings['url']
303 303
304 304 headers = {}
305 305 head_key = self.settings.get('custom_header_key')
306 306 head_val = self.settings.get('custom_header_val')
307 307 if head_key and head_val:
308 308 headers = {head_key: head_val}
309 309
310 310 handler = WebhookHandler(
311 311 template_url, self.settings['secret_token'], headers)
312 312
313 313 url_calls = handler(event, data)
314 314 log.debug('webhook: calling following urls: %s',
315 315 [x[0] for x in url_calls])
316 post_to_webhook(url_calls, self.settings)
316
317 run_task(post_to_webhook, url_calls, self.settings)
317 318
318 319
319 320 @async_task(ignore_result=True, base=RequestContextTask)
320 321 def post_to_webhook(url_calls, settings):
322 """
323 Example data::
324
325 {'actor': {'user_id': 2, 'username': u'admin'},
326 'actor_ip': u'192.168.157.1',
327 'name': 'repo-push',
328 'push': {'branches': [{'name': u'default',
329 'url': 'http://rc.local:8080/hg-repo/changelog?branch=default'}],
330 'commits': [{'author': u'Marcin Kuzminski <marcin@rhodecode.com>',
331 'branch': u'default',
332 'date': datetime.datetime(2017, 11, 30, 12, 59, 48),
333 'issues': [],
334 'mentions': [],
335 'message': u'commit Thu 30 Nov 2017 13:59:48 CET',
336 'message_html': u'commit Thu 30 Nov 2017 13:59:48 CET',
337 'message_html_title': u'commit Thu 30 Nov 2017 13:59:48 CET',
338 'parents': [{'raw_id': '431b772a5353dad9974b810dd3707d79e3a7f6e0'}],
339 'permalink_url': u'http://rc.local:8080/_7/changeset/a815cc738b9651eb5ffbcfb1ce6ccd7c701a5ddf',
340 'raw_id': 'a815cc738b9651eb5ffbcfb1ce6ccd7c701a5ddf',
341 'refs': {'bookmarks': [], 'branches': [u'default'], 'tags': [u'tip']},
342 'reviewers': [],
343 'revision': 9L,
344 'short_id': 'a815cc738b96',
345 'url': u'http://rc.local:8080/hg-repo/changeset/a815cc738b9651eb5ffbcfb1ce6ccd7c701a5ddf'}],
346 'issues': {}},
347 'repo': {'extra_fields': '',
348 'permalink_url': u'http://rc.local:8080/_7',
349 'repo_id': 7,
350 'repo_name': u'hg-repo',
351 'repo_type': u'hg',
352 'url': u'http://rc.local:8080/hg-repo'},
353 'server_url': u'http://rc.local:8080',
354 'utc_timestamp': datetime.datetime(2017, 11, 30, 13, 0, 1, 569276)
355
356 """
321 357 max_retries = 3
322 358 retries = Retry(
323 359 total=max_retries,
324 360 backoff_factor=0.15,
325 361 status_forcelist=[500, 502, 503, 504])
326 362 call_headers = {
327 363 'User-Agent': 'RhodeCode-webhook-caller/{}'.format(
328 364 rhodecode.__version__)
329 365 } # updated below with custom ones, allows override
330 366
331 367 for url, token, headers, data in url_calls:
332 368 req_session = requests.Session()
333 369 req_session.mount( # retry max N times
334 370 'http://', requests.adapters.HTTPAdapter(max_retries=retries))
335 371
336 372 method = settings.get('method_type') or 'post'
337 373 call_method = getattr(req_session, method)
338 374
339 375 headers = headers or {}
340 376 call_headers.update(headers)
341 377 auth = get_auth(settings)
342 378
343 379 log.debug('calling Webhook with method: %s, and auth:%s',
344 380 call_method, auth)
381
345 382 resp = call_method(url, json={
346 383 'token': token,
347 384 'event': data
348 385 }, headers=call_headers, auth=auth)
349 386 log.debug('Got Webhook response: %s', resp)
350 387
351 388 resp.raise_for_status() # raise exception on a failed request
General Comments 0
You need to be logged in to leave comments. Login now