1
0
mirror of https://github.com/woodpecker-ci/woodpecker.git synced 2024-11-30 08:06:52 +02:00
woodpecker/server/hook.go

250 lines
6.8 KiB
Go
Raw Normal View History

2016-05-02 21:21:25 +02:00
package server
2015-04-09 00:43:59 +02:00
import (
2015-09-30 03:21:17 +02:00
"fmt"
"regexp"
"strconv"
"github.com/gin-gonic/gin"
2016-04-22 02:10:19 +02:00
"github.com/square/go-jose"
2015-04-09 00:43:59 +02:00
2015-09-30 03:21:17 +02:00
log "github.com/Sirupsen/logrus"
"github.com/drone/drone/model"
"github.com/drone/drone/remote"
2015-09-30 03:21:17 +02:00
"github.com/drone/drone/shared/httputil"
"github.com/drone/drone/shared/token"
"github.com/drone/drone/store"
2016-04-19 22:02:28 +02:00
"github.com/drone/drone/yaml"
"github.com/drone/mq/stomp"
2015-04-09 00:43:59 +02:00
)
var skipRe = regexp.MustCompile(`\[(?i:ci *skip|skip *ci)\]`)
2015-04-09 00:43:59 +02:00
func PostHook(c *gin.Context) {
remote_ := remote.FromContext(c)
2015-04-09 00:43:59 +02:00
tmprepo, build, err := remote_.Hook(c.Request)
2015-04-09 00:43:59 +02:00
if err != nil {
log.Errorf("failure to parse hook. %s", err)
2015-09-30 03:21:17 +02:00
c.AbortWithError(400, err)
2015-04-09 00:43:59 +02:00
return
}
2015-09-30 03:21:17 +02:00
if build == nil {
2015-04-09 00:43:59 +02:00
c.Writer.WriteHeader(200)
return
}
2015-09-30 03:21:17 +02:00
if tmprepo == nil {
log.Errorf("failure to ascertain repo from hook.")
2015-04-09 00:43:59 +02:00
c.Writer.WriteHeader(400)
return
}
// skip the build if any case-insensitive combination of the words "skip" and "ci"
// wrapped in square brackets appear in the commit message
skipMatch := skipRe.FindString(build.Message)
if len(skipMatch) > 0 {
log.Infof("ignoring hook. %s found in %s", skipMatch, build.Commit)
2015-04-09 00:43:59 +02:00
c.Writer.WriteHeader(204)
return
}
repo, err := store.GetRepoOwnerName(c, tmprepo.Owner, tmprepo.Name)
2015-04-09 00:43:59 +02:00
if err != nil {
2015-09-30 03:21:17 +02:00
log.Errorf("failure to find repo %s/%s from hook. %s", tmprepo.Owner, tmprepo.Name, err)
c.AbortWithError(404, err)
2015-04-09 00:43:59 +02:00
return
}
// get the token and verify the hook is authorized
parsed, err := token.ParseRequest(c.Request, func(t *token.Token) (string, error) {
return repo.Hash, nil
})
if err != nil {
log.Errorf("failure to parse token from hook for %s. %s", repo.FullName, err)
2015-09-30 03:21:17 +02:00
c.AbortWithError(400, err)
return
}
if parsed.Text != repo.FullName {
log.Errorf("failure to verify token from hook. Expected %s, got %s", repo.FullName, parsed.Text)
c.AbortWithStatus(403)
return
}
2015-09-30 03:21:17 +02:00
if repo.UserID == 0 {
log.Warnf("ignoring hook. repo %s has no owner.", repo.FullName)
c.Writer.WriteHeader(204)
return
2015-09-30 03:21:17 +02:00
}
var skipped = true
if (build.Event == model.EventPush && repo.AllowPush) ||
(build.Event == model.EventPull && repo.AllowPull) ||
(build.Event == model.EventDeploy && repo.AllowDeploy) ||
(build.Event == model.EventTag && repo.AllowTag) {
skipped = false
}
if skipped {
log.Infof("ignoring hook. repo %s is disabled for %s events.", repo.FullName, build.Event)
2015-04-09 00:43:59 +02:00
c.Writer.WriteHeader(204)
return
}
user, err := store.GetUser(c, repo.UserID)
2015-04-09 00:43:59 +02:00
if err != nil {
log.Errorf("failure to find repo owner %s. %s", repo.FullName, err)
2015-09-30 03:21:17 +02:00
c.AbortWithError(500, err)
2015-04-09 00:43:59 +02:00
return
}
// if there is no email address associated with the pull request,
// we lookup the email address based on the authors github login.
//
// my initial hesitation with this code is that it has the ability
// to expose your email address. At the same time, your email address
// is already exposed in the public .git log. So while some people will
// a small number of people will probably be upset by this, I'm not sure
// it is actually that big of a deal.
if len(build.Email) == 0 {
author, err := store.GetUserLogin(c, build.Author)
if err == nil {
build.Email = author.Email
}
}
// if the remote has a refresh token, the current access token
// may be stale. Therefore, we should refresh prior to dispatching
// the job.
if refresher, ok := remote_.(remote.Refresher); ok {
ok, _ := refresher.Refresh(user)
if ok {
store.UpdateUser(c, user)
}
}
// fetch the build file from the database
2016-05-02 21:21:25 +02:00
config := ToConfig(c)
raw, err := remote_.File(user, repo, build, config.Yaml)
2015-04-09 00:43:59 +02:00
if err != nil {
log.Errorf("failure to get build config for %s. %s", repo.FullName, err)
2015-09-30 03:21:17 +02:00
c.AbortWithError(404, err)
2015-04-09 00:43:59 +02:00
return
}
2016-05-02 21:21:25 +02:00
sec, err := remote_.File(user, repo, build, config.Shasum)
if err != nil {
log.Debugf("cannot find build secrets for %s. %s", repo.FullName, err)
// NOTE we don't exit on failure. The sec file is optional
}
2015-09-07 21:13:27 +02:00
2016-04-19 22:02:28 +02:00
axes, err := yaml.ParseMatrix(raw)
if err != nil {
c.String(500, "Failed to parse yaml file or calculate matrix. %s", err)
return
}
if len(axes) == 0 {
2016-04-19 22:02:28 +02:00
axes = append(axes, yaml.Axis{})
}
2015-04-09 00:43:59 +02:00
netrc, err := remote_.Netrc(user, repo)
2015-04-29 00:08:21 +02:00
if err != nil {
c.String(500, "Failed to generate netrc file. %s", err)
2015-04-29 00:08:21 +02:00
return
}
2015-04-09 00:43:59 +02:00
// verify the branches can be built vs skipped
2016-04-19 22:02:28 +02:00
branches := yaml.ParseBranch(raw)
2016-05-10 07:57:57 +02:00
if !branches.Match(build.Branch) && build.Event != model.EventTag && build.Event != model.EventDeploy {
c.String(200, "Branch does not match restrictions defined in yaml")
2015-04-30 19:39:16 +02:00
return
}
2015-04-09 00:43:59 +02:00
signature, err := jose.ParseSigned(string(sec))
if err != nil {
log.Debugf("cannot parse .drone.yml.sig file. %s", err)
} else if len(sec) == 0 {
log.Debugf("cannot parse .drone.yml.sig file. empty file")
} else {
build.Signed = true
output, err := signature.Verify([]byte(repo.Hash))
if err != nil {
log.Debugf("cannot verify .drone.yml.sig file. %s", err)
} else if string(output) != string(raw) {
log.Debugf("cannot verify .drone.yml.sig file. no match")
} else {
build.Verified = true
}
}
2015-09-30 03:21:17 +02:00
// update some build fields
build.Status = model.StatusPending
build.RepoID = repo.ID
// and use a transaction
2015-09-30 03:21:17 +02:00
var jobs []*model.Job
for num, axis := range axes {
jobs = append(jobs, &model.Job{
BuildID: build.ID,
Number: num + 1,
Status: model.StatusPending,
Environment: axis,
})
}
err = store.CreateBuild(c, build, jobs...)
2015-04-24 23:25:03 +02:00
if err != nil {
log.Errorf("failure to save commit for %s. %s", repo.FullName, err)
2015-09-30 03:21:17 +02:00
c.AbortWithError(500, err)
2015-04-24 23:25:03 +02:00
return
}
c.JSON(200, build)
2015-09-30 03:21:17 +02:00
url := fmt.Sprintf("%s/%s/%d", httputil.GetURL(c.Request), repo.FullName, build.Number)
err = remote_.Status(user, repo, build, url)
if err != nil {
log.Errorf("error setting commit status for %s/%d", repo.FullName, build.Number)
}
// get the previous build so that we can send
// on status change notifications
last, _ := store.GetBuildLastBefore(c, repo, build.Branch, build.ID)
secs, err := store.GetMergedSecretList(c, repo)
2016-04-23 13:27:28 +02:00
if err != nil {
log.Debugf("Error getting secrets for %s#%d. %s", repo.FullName, build.Number, err)
2016-04-23 13:27:28 +02:00
}
client := stomp.MustFromContext(c)
2016-09-28 03:30:28 +02:00
client.SendJSON("/topic/events", model.Event{
Type: model.Enqueued,
Repo: *repo,
Build: *build,
},
stomp.WithHeader("repo", repo.FullName),
stomp.WithHeader("private", strconv.FormatBool(repo.IsPrivate)),
)
for _, job := range jobs {
broker, _ := stomp.FromContext(c)
2016-09-28 03:30:28 +02:00
broker.SendJSON("/queue/pending", &model.Work{
Signed: build.Signed,
Verified: build.Verified,
User: user,
Repo: repo,
Build: build,
BuildLast: last,
Job: job,
Netrc: netrc,
Yaml: string(raw),
Secrets: secs,
System: &model.System{Link: httputil.GetURL(c.Request)},
},
stomp.WithHeader(
"platform",
yaml.ParsePlatformDefault(raw, "linux/amd64"),
),
stomp.WithHeaders(
yaml.ParseLabel(raw),
),
)
}
2015-04-09 00:43:59 +02:00
}