mirror of
https://github.com/go-gitea/gitea.git
synced 2026-05-06 04:01:05 +09:00
This PR introduces a new `ActionRunAttempt` model and makes Actions
execution attempt-scoped.
**Main Changes**
- Each workflow run trigger generates a new `ActionRunAttempt`. The
triggered jobs are then associated with this new `ActionRunAttempt`
record.
- Each rerun now creates:
- a new `ActionRunAttempt` record for the workflow run
- a full new set of `ActionRunJob` records for the new
`ActionRunAttempt`
- For jobs that need to be rerun, the new job records are created as
runnable jobs in the new attempt.
- For jobs that do not need to be rerun, new job records are still
created in the new attempt, but they reuse the result of the previous
attempt instead of executing again.
- Introduce `rerunPlan` to manage each rerun and refactored rerun flow
into a two-phase plan-based model:
- `buildRerunPlan`
- `execRerunPlan`
- `RerunFailedWorkflowRun` and `RerunFailed` no longer directly derives
all jobs that need to be rerun; this step is now handled by
`buildRerunPlan`.
- Converted artifacts from run-scoped to attempt-scoped:
- uploads are now associated with `RunAttemptID`
- listing, download, and deletion resolve against the current attempt
- Added attempt-aware web Actions views:
- the default run page shows the latest attempt
(`/actions/runs/{run_id}`)
- previous attempt pages show jobs and artifacts for that attempt
(`/actions/runs/{run_id}/attempts/{attempt_num}`)
- New APIs:
- `/repos/{owner}/{repo}/actions/runs/{run}/attempts/{attempt}`
- `/repos/{owner}/{repo}/actions/runs/{run}/attempts/{attempt}/jobs`
- New configuration `MAX_RERUN_ATTEMPTS`
- https://gitea.com/gitea/docs/pulls/383
**Compatibility**
- Existing legacy runs use `LatestAttemptID = 0` and legacy jobs use
`RunAttemptID = 0`. Therefore, these fields can be used to identify
legacy runs and jobs and provide backward compatibility.
- If a legacy run is rerun, an `ActionRunAttempt` with `attempt=1` will
be created to represent the original execution. Then a new
`ActionRunAttempt` with `attempt=2` will be created for the real rerun.
- Existing artifact records are not backfilled; legacy artifacts
continue to use `RunAttemptID = 0`.
**Improvements**
- It is now easier to inspect and download logs from previous attempts.
-
[`run_attempt`](https://docs.github.com/en/actions/reference/workflows-and-actions/contexts#github-context)
semantics are now aligned with GitHub.
- > A unique number for each attempt of a particular workflow run in a
repository. This number begins at 1 for the workflow run's first
attempt, and increments with each re-run.
- Rerun behavior is now clearer and more explicit.
- Instead of mutating the status of previous jobs in place, each rerun
creates a new attempt with a full new set of job records.
- Artifacts produced by different reruns can now be listed separately.
Signed-off-by: Zettat123 <zettat123@gmail.com>
Co-authored-by: silverwind <me@silverwind.io>
Co-authored-by: Claude Opus 4.7 <noreply@anthropic.com>
Co-authored-by: wxiaoguang <wxiaoguang@gmail.com>
Co-authored-by: Giteabot <teabot@gitea.io>
1063 lines
39 KiB
Go
1063 lines
39 KiB
Go
// Copyright 2019 The Gitea Authors. All rights reserved.
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
package webhook
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
|
|
actions_model "code.gitea.io/gitea/models/actions"
|
|
git_model "code.gitea.io/gitea/models/git"
|
|
issues_model "code.gitea.io/gitea/models/issues"
|
|
"code.gitea.io/gitea/models/organization"
|
|
packages_model "code.gitea.io/gitea/models/packages"
|
|
"code.gitea.io/gitea/models/perm"
|
|
access_model "code.gitea.io/gitea/models/perm/access"
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
|
user_model "code.gitea.io/gitea/models/user"
|
|
"code.gitea.io/gitea/modules/git"
|
|
"code.gitea.io/gitea/modules/gitrepo"
|
|
"code.gitea.io/gitea/modules/httplib"
|
|
"code.gitea.io/gitea/modules/log"
|
|
"code.gitea.io/gitea/modules/repository"
|
|
"code.gitea.io/gitea/modules/setting"
|
|
api "code.gitea.io/gitea/modules/structs"
|
|
"code.gitea.io/gitea/modules/util"
|
|
webhook_module "code.gitea.io/gitea/modules/webhook"
|
|
"code.gitea.io/gitea/services/convert"
|
|
notify_service "code.gitea.io/gitea/services/notify"
|
|
)
|
|
|
|
func init() {
|
|
notify_service.RegisterNotifier(NewNotifier())
|
|
}
|
|
|
|
type webhookNotifier struct {
|
|
notify_service.NullNotifier
|
|
}
|
|
|
|
var _ notify_service.Notifier = &webhookNotifier{}
|
|
|
|
// NewNotifier create a new webhookNotifier notifier
|
|
func NewNotifier() notify_service.Notifier {
|
|
return &webhookNotifier{}
|
|
}
|
|
|
|
func (m *webhookNotifier) IssueClearLabels(ctx context.Context, doer *user_model.User, issue *issues_model.Issue) {
|
|
if err := issue.LoadPoster(ctx); err != nil {
|
|
log.Error("LoadPoster: %v", err)
|
|
return
|
|
}
|
|
|
|
if err := issue.LoadRepo(ctx); err != nil {
|
|
log.Error("LoadRepo: %v", err)
|
|
return
|
|
}
|
|
|
|
permission, _ := access_model.GetIndividualUserRepoPermission(ctx, issue.Repo, issue.Poster)
|
|
var err error
|
|
if issue.IsPull {
|
|
if err = issue.LoadPullRequest(ctx); err != nil {
|
|
log.Error("LoadPullRequest: %v", err)
|
|
return
|
|
}
|
|
|
|
err = PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventPullRequestLabel, &api.PullRequestPayload{
|
|
Action: api.HookIssueLabelCleared,
|
|
Index: issue.Index,
|
|
PullRequest: convert.ToAPIPullRequest(ctx, issue.PullRequest, doer),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
})
|
|
} else {
|
|
err = PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventIssueLabel, &api.IssuePayload{
|
|
Action: api.HookIssueLabelCleared,
|
|
Index: issue.Index,
|
|
Issue: convert.ToAPIIssue(ctx, doer, issue),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
})
|
|
}
|
|
if err != nil {
|
|
log.Error("PrepareWebhooks [is_pull: %v]: %v", issue.IsPull, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) ForkRepository(ctx context.Context, doer *user_model.User, oldRepo, repo *repo_model.Repository) {
|
|
oldPermission, _ := access_model.GetDoerRepoPermission(ctx, oldRepo, doer)
|
|
permission, _ := access_model.GetDoerRepoPermission(ctx, repo, doer)
|
|
|
|
// forked webhook
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: oldRepo}, webhook_module.HookEventFork, &api.ForkPayload{
|
|
Forkee: convert.ToRepo(ctx, oldRepo, oldPermission),
|
|
Repo: convert.ToRepo(ctx, repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks [repo_id: %d]: %v", oldRepo.ID, err)
|
|
}
|
|
|
|
u := repo.MustOwner(ctx)
|
|
|
|
// Add to hook queue for created repo after session commit.
|
|
if u.IsOrganization() {
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: repo}, webhook_module.HookEventRepository, &api.RepositoryPayload{
|
|
Action: api.HookRepoCreated,
|
|
Repository: convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Organization: convert.ToUser(ctx, u, nil),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks [repo_id: %d]: %v", repo.ID, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) CreateRepository(ctx context.Context, doer, u *user_model.User, repo *repo_model.Repository) {
|
|
// Add to hook queue for created repo after session commit.
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: repo}, webhook_module.HookEventRepository, &api.RepositoryPayload{
|
|
Action: api.HookRepoCreated,
|
|
Repository: convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Organization: convert.ToUser(ctx, u, nil),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks [repo_id: %d]: %v", repo.ID, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) DeleteRepository(ctx context.Context, doer *user_model.User, repo *repo_model.Repository) {
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: repo}, webhook_module.HookEventRepository, &api.RepositoryPayload{
|
|
Action: api.HookRepoDeleted,
|
|
Repository: convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Organization: convert.ToUser(ctx, repo.MustOwner(ctx), nil),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks [repo_id: %d]: %v", repo.ID, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) MigrateRepository(ctx context.Context, doer, u *user_model.User, repo *repo_model.Repository) {
|
|
// Add to hook queue for created repo after session commit.
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: repo}, webhook_module.HookEventRepository, &api.RepositoryPayload{
|
|
Action: api.HookRepoCreated,
|
|
Repository: convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Organization: convert.ToUser(ctx, u, nil),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks [repo_id: %d]: %v", repo.ID, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) IssueChangeAssignee(ctx context.Context, doer *user_model.User, issue *issues_model.Issue, assignee *user_model.User, removed bool, comment *issues_model.Comment) {
|
|
if issue.IsPull {
|
|
permission, _ := access_model.GetDoerRepoPermission(ctx, issue.Repo, doer)
|
|
|
|
if err := issue.LoadPullRequest(ctx); err != nil {
|
|
log.Error("LoadPullRequest failed: %v", err)
|
|
return
|
|
}
|
|
apiPullRequest := &api.PullRequestPayload{
|
|
Index: issue.Index,
|
|
PullRequest: convert.ToAPIPullRequest(ctx, issue.PullRequest, doer),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
}
|
|
if removed {
|
|
apiPullRequest.Action = api.HookIssueUnassigned
|
|
} else {
|
|
apiPullRequest.Action = api.HookIssueAssigned
|
|
}
|
|
// Assignee comment triggers a webhook
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventPullRequestAssign, apiPullRequest); err != nil {
|
|
log.Error("PrepareWebhooks [is_pull: %v, remove_assignee: %v]: %v", issue.IsPull, removed, err)
|
|
return
|
|
}
|
|
} else {
|
|
permission, _ := access_model.GetDoerRepoPermission(ctx, issue.Repo, doer)
|
|
apiIssue := &api.IssuePayload{
|
|
Index: issue.Index,
|
|
Issue: convert.ToAPIIssue(ctx, doer, issue),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
}
|
|
if removed {
|
|
apiIssue.Action = api.HookIssueUnassigned
|
|
} else {
|
|
apiIssue.Action = api.HookIssueAssigned
|
|
}
|
|
// Assignee comment triggers a webhook
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventIssueAssign, apiIssue); err != nil {
|
|
log.Error("PrepareWebhooks [is_pull: %v, remove_assignee: %v]: %v", issue.IsPull, removed, err)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) IssueChangeTitle(ctx context.Context, doer *user_model.User, issue *issues_model.Issue, oldTitle string) {
|
|
permission, _ := access_model.GetIndividualUserRepoPermission(ctx, issue.Repo, issue.Poster)
|
|
var err error
|
|
if issue.IsPull {
|
|
if err = issue.LoadPullRequest(ctx); err != nil {
|
|
log.Error("LoadPullRequest failed: %v", err)
|
|
return
|
|
}
|
|
err = PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventPullRequest, &api.PullRequestPayload{
|
|
Action: api.HookIssueEdited,
|
|
Index: issue.Index,
|
|
Changes: &api.ChangesPayload{
|
|
Title: &api.ChangesFromPayload{
|
|
From: oldTitle,
|
|
},
|
|
},
|
|
PullRequest: convert.ToAPIPullRequest(ctx, issue.PullRequest, doer),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
})
|
|
} else {
|
|
err = PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventIssues, &api.IssuePayload{
|
|
Action: api.HookIssueEdited,
|
|
Index: issue.Index,
|
|
Changes: &api.ChangesPayload{
|
|
Title: &api.ChangesFromPayload{
|
|
From: oldTitle,
|
|
},
|
|
},
|
|
Issue: convert.ToAPIIssue(ctx, doer, issue),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
})
|
|
}
|
|
|
|
if err != nil {
|
|
log.Error("PrepareWebhooks [is_pull: %v]: %v", issue.IsPull, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) IssueChangeStatus(ctx context.Context, doer *user_model.User, commitID string, issue *issues_model.Issue, actionComment *issues_model.Comment, isClosed bool) {
|
|
permission, _ := access_model.GetIndividualUserRepoPermission(ctx, issue.Repo, issue.Poster)
|
|
var err error
|
|
if issue.IsPull {
|
|
if err = issue.LoadPullRequest(ctx); err != nil {
|
|
log.Error("LoadPullRequest: %v", err)
|
|
return
|
|
}
|
|
// Merge pull request calls issue.changeStatus so we need to handle separately.
|
|
apiPullRequest := &api.PullRequestPayload{
|
|
Index: issue.Index,
|
|
PullRequest: convert.ToAPIPullRequest(ctx, issue.PullRequest, doer),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
CommitID: commitID,
|
|
}
|
|
if isClosed {
|
|
apiPullRequest.Action = api.HookIssueClosed
|
|
} else {
|
|
apiPullRequest.Action = api.HookIssueReOpened
|
|
}
|
|
err = PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventPullRequest, apiPullRequest)
|
|
} else {
|
|
apiIssue := &api.IssuePayload{
|
|
Index: issue.Index,
|
|
Issue: convert.ToAPIIssue(ctx, doer, issue),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
CommitID: commitID,
|
|
}
|
|
if isClosed {
|
|
apiIssue.Action = api.HookIssueClosed
|
|
} else {
|
|
apiIssue.Action = api.HookIssueReOpened
|
|
}
|
|
err = PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventIssues, apiIssue)
|
|
}
|
|
if err != nil {
|
|
log.Error("PrepareWebhooks [is_pull: %v, is_closed: %v]: %v", issue.IsPull, isClosed, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) NewIssue(ctx context.Context, issue *issues_model.Issue, mentions []*user_model.User) {
|
|
if err := issue.LoadRepo(ctx); err != nil {
|
|
log.Error("issue.LoadRepo: %v", err)
|
|
return
|
|
}
|
|
if err := issue.LoadPoster(ctx); err != nil {
|
|
log.Error("issue.LoadPoster: %v", err)
|
|
return
|
|
}
|
|
|
|
permission, _ := access_model.GetIndividualUserRepoPermission(ctx, issue.Repo, issue.Poster)
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventIssues, &api.IssuePayload{
|
|
Action: api.HookIssueOpened,
|
|
Index: issue.Index,
|
|
Issue: convert.ToAPIIssue(ctx, issue.Poster, issue),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, issue.Poster, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) DeleteIssue(ctx context.Context, doer *user_model.User, issue *issues_model.Issue) {
|
|
permission, _ := access_model.GetDoerRepoPermission(ctx, issue.Repo, doer)
|
|
if issue.IsPull {
|
|
if err := issue.LoadPullRequest(ctx); err != nil {
|
|
log.Error("LoadPullRequest: %v", err)
|
|
return
|
|
}
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventPullRequest, &api.PullRequestPayload{
|
|
Action: api.HookIssueDeleted,
|
|
Index: issue.Index,
|
|
PullRequest: convert.ToAPIPullRequest(ctx, issue.PullRequest, doer),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
} else {
|
|
if err := issue.LoadRepo(ctx); err != nil {
|
|
log.Error("issue.LoadRepo: %v", err)
|
|
return
|
|
}
|
|
if err := issue.LoadPoster(ctx); err != nil {
|
|
log.Error("issue.LoadPoster: %v", err)
|
|
return
|
|
}
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventIssues, &api.IssuePayload{
|
|
Action: api.HookIssueDeleted,
|
|
Index: issue.Index,
|
|
Issue: convert.ToAPIIssue(ctx, issue.Poster, issue),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) NewPullRequest(ctx context.Context, pull *issues_model.PullRequest, mentions []*user_model.User) {
|
|
if err := pull.LoadIssue(ctx); err != nil {
|
|
log.Error("pull.LoadIssue: %v", err)
|
|
return
|
|
}
|
|
if err := pull.Issue.LoadRepo(ctx); err != nil {
|
|
log.Error("pull.Issue.LoadRepo: %v", err)
|
|
return
|
|
}
|
|
if err := pull.Issue.LoadPoster(ctx); err != nil {
|
|
log.Error("pull.Issue.LoadPoster: %v", err)
|
|
return
|
|
}
|
|
|
|
permission, _ := access_model.GetIndividualUserRepoPermission(ctx, pull.Issue.Repo, pull.Issue.Poster)
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: pull.Issue.Repo}, webhook_module.HookEventPullRequest, &api.PullRequestPayload{
|
|
Action: api.HookIssueOpened,
|
|
Index: pull.Issue.Index,
|
|
PullRequest: convert.ToAPIPullRequest(ctx, pull, pull.Issue.Poster),
|
|
Repository: convert.ToRepo(ctx, pull.Issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, pull.Issue.Poster, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) IssueChangeContent(ctx context.Context, doer *user_model.User, issue *issues_model.Issue, oldContent string) {
|
|
if err := issue.LoadRepo(ctx); err != nil {
|
|
log.Error("LoadRepo: %v", err)
|
|
return
|
|
}
|
|
|
|
permission, _ := access_model.GetIndividualUserRepoPermission(ctx, issue.Repo, issue.Poster)
|
|
var err error
|
|
if issue.IsPull {
|
|
if err := issue.LoadPullRequest(ctx); err != nil {
|
|
log.Error("LoadPullRequest: %v", err)
|
|
return
|
|
}
|
|
err = PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventPullRequest, &api.PullRequestPayload{
|
|
Action: api.HookIssueEdited,
|
|
Index: issue.Index,
|
|
Changes: &api.ChangesPayload{
|
|
Body: &api.ChangesFromPayload{
|
|
From: oldContent,
|
|
},
|
|
},
|
|
PullRequest: convert.ToAPIPullRequest(ctx, issue.PullRequest, doer),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
})
|
|
} else {
|
|
err = PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventIssues, &api.IssuePayload{
|
|
Action: api.HookIssueEdited,
|
|
Index: issue.Index,
|
|
Changes: &api.ChangesPayload{
|
|
Body: &api.ChangesFromPayload{
|
|
From: oldContent,
|
|
},
|
|
},
|
|
Issue: convert.ToAPIIssue(ctx, doer, issue),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
})
|
|
}
|
|
if err != nil {
|
|
log.Error("PrepareWebhooks [is_pull: %v]: %v", issue.IsPull, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) UpdateComment(ctx context.Context, doer *user_model.User, c *issues_model.Comment, oldContent string) {
|
|
if err := c.LoadPoster(ctx); err != nil {
|
|
log.Error("LoadPoster: %v", err)
|
|
return
|
|
}
|
|
if err := c.LoadIssue(ctx); err != nil {
|
|
log.Error("LoadIssue: %v", err)
|
|
return
|
|
}
|
|
|
|
if err := c.Issue.LoadAttributes(ctx); err != nil {
|
|
log.Error("LoadAttributes: %v", err)
|
|
return
|
|
}
|
|
|
|
var eventType webhook_module.HookEventType
|
|
var pullRequest *api.PullRequest
|
|
if c.Issue.IsPull {
|
|
eventType = webhook_module.HookEventPullRequestComment
|
|
pullRequest = convert.ToAPIPullRequest(ctx, c.Issue.PullRequest, doer)
|
|
} else {
|
|
eventType = webhook_module.HookEventIssueComment
|
|
}
|
|
|
|
permission, _ := access_model.GetDoerRepoPermission(ctx, c.Issue.Repo, doer)
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: c.Issue.Repo}, eventType, &api.IssueCommentPayload{
|
|
Action: api.HookIssueCommentEdited,
|
|
Issue: convert.ToAPIIssue(ctx, doer, c.Issue),
|
|
PullRequest: pullRequest,
|
|
Comment: convert.ToAPIComment(ctx, c.Issue.Repo, c),
|
|
Changes: &api.ChangesPayload{
|
|
Body: &api.ChangesFromPayload{
|
|
From: oldContent,
|
|
},
|
|
},
|
|
Repository: convert.ToRepo(ctx, c.Issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
IsPull: c.Issue.IsPull,
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks [comment_id: %d]: %v", c.ID, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) CreateIssueComment(ctx context.Context, doer *user_model.User, repo *repo_model.Repository,
|
|
issue *issues_model.Issue, comment *issues_model.Comment, mentions []*user_model.User,
|
|
) {
|
|
var eventType webhook_module.HookEventType
|
|
var pullRequest *api.PullRequest
|
|
if issue.IsPull {
|
|
eventType = webhook_module.HookEventPullRequestComment
|
|
if err := issue.LoadPullRequest(ctx); err != nil {
|
|
log.Error("LoadPullRequest: %v", err)
|
|
return
|
|
}
|
|
pullRequest = convert.ToAPIPullRequest(ctx, issue.PullRequest, doer)
|
|
} else {
|
|
eventType = webhook_module.HookEventIssueComment
|
|
}
|
|
|
|
permission, _ := access_model.GetDoerRepoPermission(ctx, repo, doer)
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, eventType, &api.IssueCommentPayload{
|
|
Action: api.HookIssueCommentCreated,
|
|
Issue: convert.ToAPIIssue(ctx, doer, issue),
|
|
PullRequest: pullRequest,
|
|
Comment: convert.ToAPIComment(ctx, repo, comment),
|
|
Repository: convert.ToRepo(ctx, repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
IsPull: issue.IsPull,
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks [comment_id: %d]: %v", comment.ID, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) DeleteComment(ctx context.Context, doer *user_model.User, comment *issues_model.Comment) {
|
|
var err error
|
|
|
|
if err = comment.LoadPoster(ctx); err != nil {
|
|
log.Error("LoadPoster: %v", err)
|
|
return
|
|
}
|
|
comment.Issue = nil // reload issue to ensure it has the latest data, especially the number of comments
|
|
if err = comment.LoadIssue(ctx); err != nil {
|
|
log.Error("LoadIssue: %v", err)
|
|
return
|
|
}
|
|
|
|
if err = comment.Issue.LoadAttributes(ctx); err != nil {
|
|
log.Error("LoadAttributes: %v", err)
|
|
return
|
|
}
|
|
|
|
var eventType webhook_module.HookEventType
|
|
var pullRequest *api.PullRequest
|
|
if comment.Issue.IsPull {
|
|
eventType = webhook_module.HookEventPullRequestComment
|
|
pullRequest = convert.ToAPIPullRequest(ctx, comment.Issue.PullRequest, doer)
|
|
} else {
|
|
eventType = webhook_module.HookEventIssueComment
|
|
}
|
|
|
|
permission, _ := access_model.GetDoerRepoPermission(ctx, comment.Issue.Repo, doer)
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: comment.Issue.Repo}, eventType, &api.IssueCommentPayload{
|
|
Action: api.HookIssueCommentDeleted,
|
|
Issue: convert.ToAPIIssue(ctx, doer, comment.Issue),
|
|
PullRequest: pullRequest,
|
|
Comment: convert.ToAPIComment(ctx, comment.Issue.Repo, comment),
|
|
Repository: convert.ToRepo(ctx, comment.Issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
IsPull: comment.Issue.IsPull,
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks [comment_id: %d]: %v", comment.ID, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) NewWikiPage(ctx context.Context, doer *user_model.User, repo *repo_model.Repository, page, comment string) {
|
|
// Add to hook queue for created wiki page.
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: repo}, webhook_module.HookEventWiki, &api.WikiPayload{
|
|
Action: api.HookWikiCreated,
|
|
Repository: convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
Page: page,
|
|
Comment: comment,
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks [repo_id: %d]: %v", repo.ID, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) EditWikiPage(ctx context.Context, doer *user_model.User, repo *repo_model.Repository, page, comment string) {
|
|
// Add to hook queue for edit wiki page.
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: repo}, webhook_module.HookEventWiki, &api.WikiPayload{
|
|
Action: api.HookWikiEdited,
|
|
Repository: convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
Page: page,
|
|
Comment: comment,
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks [repo_id: %d]: %v", repo.ID, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) DeleteWikiPage(ctx context.Context, doer *user_model.User, repo *repo_model.Repository, page string) {
|
|
// Add to hook queue for edit wiki page.
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: repo}, webhook_module.HookEventWiki, &api.WikiPayload{
|
|
Action: api.HookWikiDeleted,
|
|
Repository: convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
Page: page,
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks [repo_id: %d]: %v", repo.ID, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) IssueChangeLabels(ctx context.Context, doer *user_model.User, issue *issues_model.Issue,
|
|
addedLabels, removedLabels []*issues_model.Label,
|
|
) {
|
|
var err error
|
|
|
|
if err = issue.LoadRepo(ctx); err != nil {
|
|
log.Error("LoadRepo: %v", err)
|
|
return
|
|
}
|
|
|
|
if err = issue.LoadPoster(ctx); err != nil {
|
|
log.Error("LoadPoster: %v", err)
|
|
return
|
|
}
|
|
|
|
permission, _ := access_model.GetIndividualUserRepoPermission(ctx, issue.Repo, issue.Poster)
|
|
if issue.IsPull {
|
|
if err = issue.LoadPullRequest(ctx); err != nil {
|
|
log.Error("loadPullRequest: %v", err)
|
|
return
|
|
}
|
|
if err = issue.PullRequest.LoadIssue(ctx); err != nil {
|
|
log.Error("LoadIssue: %v", err)
|
|
return
|
|
}
|
|
err = PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventPullRequestLabel, &api.PullRequestPayload{
|
|
Action: api.HookIssueLabelUpdated,
|
|
Index: issue.Index,
|
|
PullRequest: convert.ToAPIPullRequest(ctx, issue.PullRequest, doer),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
})
|
|
} else {
|
|
err = PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventIssueLabel, &api.IssuePayload{
|
|
Action: api.HookIssueLabelUpdated,
|
|
Index: issue.Index,
|
|
Issue: convert.ToAPIIssue(ctx, doer, issue),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
})
|
|
}
|
|
if err != nil {
|
|
log.Error("PrepareWebhooks [is_pull: %v]: %v", issue.IsPull, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) IssueChangeMilestone(ctx context.Context, doer *user_model.User, issue *issues_model.Issue, oldMilestoneID int64) {
|
|
var hookAction api.HookIssueAction
|
|
var err error
|
|
if issue.MilestoneID > 0 {
|
|
hookAction = api.HookIssueMilestoned
|
|
} else {
|
|
hookAction = api.HookIssueDemilestoned
|
|
}
|
|
|
|
if err = issue.LoadAttributes(ctx); err != nil {
|
|
log.Error("issue.LoadAttributes failed: %v", err)
|
|
return
|
|
}
|
|
|
|
permission, _ := access_model.GetDoerRepoPermission(ctx, issue.Repo, doer)
|
|
if issue.IsPull {
|
|
err = issue.PullRequest.LoadIssue(ctx)
|
|
if err != nil {
|
|
log.Error("LoadIssue: %v", err)
|
|
return
|
|
}
|
|
err = PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventPullRequestMilestone, &api.PullRequestPayload{
|
|
Action: hookAction,
|
|
Index: issue.Index,
|
|
PullRequest: convert.ToAPIPullRequest(ctx, issue.PullRequest, doer),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
})
|
|
} else {
|
|
err = PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventIssueMilestone, &api.IssuePayload{
|
|
Action: hookAction,
|
|
Index: issue.Index,
|
|
Issue: convert.ToAPIIssue(ctx, doer, issue),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
})
|
|
}
|
|
if err != nil {
|
|
log.Error("PrepareWebhooks [is_pull: %v]: %v", issue.IsPull, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) PushCommits(ctx context.Context, pusher *user_model.User, repo *repo_model.Repository, opts *repository.PushUpdateOptions, commits *repository.PushCommits) {
|
|
apiPusher := convert.ToUser(ctx, pusher, nil)
|
|
apiCommits, apiHeadCommit, err := commits.ToAPIPayloadCommits(ctx, repo)
|
|
if err != nil {
|
|
log.Error("commits.ToAPIPayloadCommits failed: %v", err)
|
|
return
|
|
}
|
|
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: repo}, webhook_module.HookEventPush, &api.PushPayload{
|
|
Ref: opts.RefFullName.String(),
|
|
Before: opts.OldCommitID,
|
|
After: opts.NewCommitID,
|
|
CompareURL: setting.AppURL + commits.CompareURL,
|
|
Commits: apiCommits,
|
|
TotalCommits: commits.Len,
|
|
HeadCommit: apiHeadCommit,
|
|
Repo: convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Pusher: apiPusher,
|
|
Sender: apiPusher,
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) AutoMergePullRequest(ctx context.Context, doer *user_model.User, pr *issues_model.PullRequest) {
|
|
// just redirect to the MergePullRequest
|
|
m.MergePullRequest(ctx, doer, pr)
|
|
}
|
|
|
|
func (*webhookNotifier) MergePullRequest(ctx context.Context, doer *user_model.User, pr *issues_model.PullRequest) {
|
|
// Reload pull request information.
|
|
if err := pr.LoadAttributes(ctx); err != nil {
|
|
log.Error("LoadAttributes: %v", err)
|
|
return
|
|
}
|
|
|
|
if err := pr.LoadIssue(ctx); err != nil {
|
|
log.Error("LoadIssue: %v", err)
|
|
return
|
|
}
|
|
|
|
if err := pr.Issue.LoadRepo(ctx); err != nil {
|
|
log.Error("pr.Issue.LoadRepo: %v", err)
|
|
return
|
|
}
|
|
|
|
permission, err := access_model.GetDoerRepoPermission(ctx, pr.Issue.Repo, doer)
|
|
if err != nil {
|
|
log.Error("models.GetDoerRepoPermission: %v", err)
|
|
return
|
|
}
|
|
|
|
// Merge pull request calls issue.changeStatus so we need to handle separately.
|
|
apiPullRequest := &api.PullRequestPayload{
|
|
Index: pr.Issue.Index,
|
|
PullRequest: convert.ToAPIPullRequest(ctx, pr, doer),
|
|
Repository: convert.ToRepo(ctx, pr.Issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
Action: api.HookIssueClosed,
|
|
}
|
|
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: pr.Issue.Repo}, webhook_module.HookEventPullRequest, apiPullRequest); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) PullRequestChangeTargetBranch(ctx context.Context, doer *user_model.User, pr *issues_model.PullRequest, oldBranch string) {
|
|
if err := pr.LoadIssue(ctx); err != nil {
|
|
log.Error("LoadIssue: %v", err)
|
|
return
|
|
}
|
|
|
|
issue := pr.Issue
|
|
|
|
mode, _ := access_model.GetIndividualUserRepoPermission(ctx, issue.Repo, issue.Poster)
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventPullRequest, &api.PullRequestPayload{
|
|
Action: api.HookIssueEdited,
|
|
Index: issue.Index,
|
|
Changes: &api.ChangesPayload{
|
|
Ref: &api.ChangesFromPayload{
|
|
From: oldBranch,
|
|
},
|
|
},
|
|
PullRequest: convert.ToAPIPullRequest(ctx, pr, doer),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, mode),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks [pr: %d]: %v", pr.ID, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) PullRequestReview(ctx context.Context, pr *issues_model.PullRequest, review *issues_model.Review, comment *issues_model.Comment, mentions []*user_model.User) {
|
|
var reviewHookType webhook_module.HookEventType
|
|
|
|
switch review.Type {
|
|
case issues_model.ReviewTypeApprove:
|
|
reviewHookType = webhook_module.HookEventPullRequestReviewApproved
|
|
case issues_model.ReviewTypeComment:
|
|
reviewHookType = webhook_module.HookEventPullRequestReviewComment
|
|
case issues_model.ReviewTypeReject:
|
|
reviewHookType = webhook_module.HookEventPullRequestReviewRejected
|
|
default:
|
|
// unsupported review webhook type here
|
|
log.Error("Unsupported review webhook type")
|
|
return
|
|
}
|
|
|
|
if err := pr.LoadIssue(ctx); err != nil {
|
|
log.Error("LoadIssue: %v", err)
|
|
return
|
|
}
|
|
|
|
permission, err := access_model.GetIndividualUserRepoPermission(ctx, review.Issue.Repo, review.Issue.Poster)
|
|
if err != nil {
|
|
log.Error("models.GetIndividualUserRepoPermission: %v", err)
|
|
return
|
|
}
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: review.Issue.Repo}, reviewHookType, &api.PullRequestPayload{
|
|
Action: api.HookIssueReviewed,
|
|
Index: review.Issue.Index,
|
|
PullRequest: convert.ToAPIPullRequest(ctx, pr, review.Reviewer),
|
|
RequestedReviewer: convert.ToUser(ctx, review.Reviewer, nil),
|
|
Repository: convert.ToRepo(ctx, review.Issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, review.Reviewer, nil),
|
|
Review: &api.ReviewPayload{
|
|
Type: string(reviewHookType),
|
|
Content: review.Content,
|
|
},
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) PullRequestReviewRequest(ctx context.Context, doer *user_model.User, issue *issues_model.Issue, reviewer *user_model.User, isRequest bool, comment *issues_model.Comment) {
|
|
if !issue.IsPull {
|
|
log.Warn("PullRequestReviewRequest: issue is not a pull request: %v", issue.ID)
|
|
return
|
|
}
|
|
permission, _ := access_model.GetDoerRepoPermission(ctx, issue.Repo, doer)
|
|
if err := issue.LoadPullRequest(ctx); err != nil {
|
|
log.Error("LoadPullRequest failed: %v", err)
|
|
return
|
|
}
|
|
apiPullRequest := &api.PullRequestPayload{
|
|
Index: issue.Index,
|
|
PullRequest: convert.ToAPIPullRequest(ctx, issue.PullRequest, doer),
|
|
RequestedReviewer: convert.ToUser(ctx, reviewer, nil),
|
|
Repository: convert.ToRepo(ctx, issue.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
}
|
|
if isRequest {
|
|
apiPullRequest.Action = api.HookIssueReviewRequested
|
|
} else {
|
|
apiPullRequest.Action = api.HookIssueReviewRequestRemoved
|
|
}
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: issue.Repo}, webhook_module.HookEventPullRequestReviewRequest, apiPullRequest); err != nil {
|
|
log.Error("PrepareWebhooks [review_requested: %v]: %v", isRequest, err)
|
|
return
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) CreateRef(ctx context.Context, pusher *user_model.User, repo *repo_model.Repository, refFullName git.RefName, refID string) {
|
|
apiPusher := convert.ToUser(ctx, pusher, nil)
|
|
apiRepo := convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeNone})
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: repo}, webhook_module.HookEventCreate, &api.CreatePayload{
|
|
Ref: refFullName.ShortName(), // FIXME: should it be a full ref name? But it will break the existing webhooks?
|
|
Sha: refID,
|
|
RefType: string(refFullName.RefType()),
|
|
Repo: apiRepo,
|
|
Sender: apiPusher,
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) PullRequestSynchronized(ctx context.Context, doer *user_model.User, pr *issues_model.PullRequest) {
|
|
if err := pr.LoadIssue(ctx); err != nil {
|
|
log.Error("LoadIssue: %v", err)
|
|
return
|
|
}
|
|
if err := pr.Issue.LoadAttributes(ctx); err != nil {
|
|
log.Error("LoadAttributes: %v", err)
|
|
return
|
|
}
|
|
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: pr.Issue.Repo}, webhook_module.HookEventPullRequestSync, &api.PullRequestPayload{
|
|
Action: api.HookIssueSynchronized,
|
|
Index: pr.Issue.Index,
|
|
PullRequest: convert.ToAPIPullRequest(ctx, pr, doer),
|
|
Repository: convert.ToRepo(ctx, pr.Issue.Repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks [pull_id: %v]: %v", pr.ID, err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) DeleteRef(ctx context.Context, pusher *user_model.User, repo *repo_model.Repository, refFullName git.RefName) {
|
|
apiPusher := convert.ToUser(ctx, pusher, nil)
|
|
apiRepo := convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeOwner})
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: repo}, webhook_module.HookEventDelete, &api.DeletePayload{
|
|
Ref: refFullName.ShortName(), // FIXME: should it be a full ref name? But it will break the existing webhooks?
|
|
RefType: string(refFullName.RefType()),
|
|
PusherType: api.PusherTypeUser,
|
|
Repo: apiRepo,
|
|
Sender: apiPusher,
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks.(delete %s): %v", refFullName.RefType(), err)
|
|
}
|
|
}
|
|
|
|
func sendReleaseHook(ctx context.Context, doer *user_model.User, rel *repo_model.Release, action api.HookReleaseAction) {
|
|
if err := rel.LoadAttributes(ctx); err != nil {
|
|
log.Error("LoadAttributes: %v", err)
|
|
return
|
|
}
|
|
|
|
permission, _ := access_model.GetDoerRepoPermission(ctx, rel.Repo, doer)
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: rel.Repo}, webhook_module.HookEventRelease, &api.ReleasePayload{
|
|
Action: action,
|
|
Release: convert.ToAPIRelease(ctx, rel.Repo, rel),
|
|
Repository: convert.ToRepo(ctx, rel.Repo, permission),
|
|
Sender: convert.ToUser(ctx, doer, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) NewRelease(ctx context.Context, rel *repo_model.Release) {
|
|
sendReleaseHook(ctx, rel.Publisher, rel, api.HookReleasePublished)
|
|
}
|
|
|
|
func (m *webhookNotifier) UpdateRelease(ctx context.Context, doer *user_model.User, rel *repo_model.Release) {
|
|
sendReleaseHook(ctx, doer, rel, api.HookReleaseUpdated)
|
|
}
|
|
|
|
func (m *webhookNotifier) DeleteRelease(ctx context.Context, doer *user_model.User, rel *repo_model.Release) {
|
|
sendReleaseHook(ctx, doer, rel, api.HookReleaseDeleted)
|
|
}
|
|
|
|
func (m *webhookNotifier) SyncPushCommits(ctx context.Context, pusher *user_model.User, repo *repo_model.Repository, opts *repository.PushUpdateOptions, commits *repository.PushCommits) {
|
|
apiPusher := convert.ToUser(ctx, pusher, nil)
|
|
apiCommits, apiHeadCommit, err := commits.ToAPIPayloadCommits(ctx, repo)
|
|
if err != nil {
|
|
log.Error("commits.ToAPIPayloadCommits failed: %v", err)
|
|
return
|
|
}
|
|
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: repo}, webhook_module.HookEventPush, &api.PushPayload{
|
|
Ref: opts.RefFullName.String(),
|
|
Before: opts.OldCommitID,
|
|
After: opts.NewCommitID,
|
|
CompareURL: setting.AppURL + commits.CompareURL,
|
|
Commits: apiCommits,
|
|
TotalCommits: commits.Len,
|
|
HeadCommit: apiHeadCommit,
|
|
Repo: convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Pusher: apiPusher,
|
|
Sender: apiPusher,
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) CreateCommitStatus(ctx context.Context, repo *repo_model.Repository, commit *repository.PushCommit, sender *user_model.User, status *git_model.CommitStatus) {
|
|
apiSender := convert.ToUser(ctx, sender, nil)
|
|
apiCommit, err := repository.ToAPIPayloadCommit(ctx, map[string]*user_model.User{}, repo, commit)
|
|
if err != nil {
|
|
log.Error("commits.ToAPIPayloadCommits failed: %v", err)
|
|
return
|
|
}
|
|
|
|
// as a webhook url, target should be an absolute url. But for internal actions target url
|
|
// the target url is a url path with no host and port to make it easy to be visited
|
|
// from multiple hosts. So we need to convert it to an absolute url here.
|
|
target := httplib.MakeAbsoluteURL(ctx, status.TargetURL)
|
|
|
|
payload := api.CommitStatusPayload{
|
|
Context: status.Context,
|
|
CreatedAt: status.CreatedUnix.AsTime().UTC(),
|
|
Description: status.Description,
|
|
ID: status.ID,
|
|
SHA: commit.Sha1,
|
|
State: status.State.String(),
|
|
TargetURL: target,
|
|
|
|
Commit: apiCommit,
|
|
Repo: convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Sender: apiSender,
|
|
}
|
|
if !status.UpdatedUnix.IsZero() {
|
|
t := status.UpdatedUnix.AsTime().UTC()
|
|
payload.UpdatedAt = &t
|
|
}
|
|
if err := PrepareWebhooks(ctx, EventSource{Repository: repo}, webhook_module.HookEventStatus, &payload); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
}
|
|
|
|
func (m *webhookNotifier) SyncCreateRef(ctx context.Context, pusher *user_model.User, repo *repo_model.Repository, refFullName git.RefName, refID string) {
|
|
m.CreateRef(ctx, pusher, repo, refFullName, refID)
|
|
}
|
|
|
|
func (m *webhookNotifier) SyncDeleteRef(ctx context.Context, pusher *user_model.User, repo *repo_model.Repository, refFullName git.RefName) {
|
|
m.DeleteRef(ctx, pusher, repo, refFullName)
|
|
}
|
|
|
|
func (m *webhookNotifier) PackageCreate(ctx context.Context, doer *user_model.User, pd *packages_model.PackageDescriptor) {
|
|
notifyPackage(ctx, doer, pd, api.HookPackageCreated)
|
|
}
|
|
|
|
func (m *webhookNotifier) PackageDelete(ctx context.Context, doer *user_model.User, pd *packages_model.PackageDescriptor) {
|
|
notifyPackage(ctx, doer, pd, api.HookPackageDeleted)
|
|
}
|
|
|
|
func notifyPackage(ctx context.Context, sender *user_model.User, pd *packages_model.PackageDescriptor, action api.HookPackageAction) {
|
|
source := EventSource{
|
|
Repository: pd.Repository,
|
|
Owner: pd.Owner,
|
|
}
|
|
|
|
apiPackage, err := convert.ToPackage(ctx, pd, sender)
|
|
if err != nil {
|
|
log.Error("Error converting package: %v", err)
|
|
return
|
|
}
|
|
|
|
var org *api.Organization
|
|
if pd.Owner.IsOrganization() {
|
|
org = convert.ToOrganization(ctx, organization.OrgFromUser(pd.Owner))
|
|
}
|
|
|
|
if err := PrepareWebhooks(ctx, source, webhook_module.HookEventPackage, &api.PackagePayload{
|
|
Action: action,
|
|
Package: apiPackage,
|
|
Organization: org,
|
|
Sender: convert.ToUser(ctx, sender, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
}
|
|
|
|
func (*webhookNotifier) WorkflowJobStatusUpdate(ctx context.Context, repo *repo_model.Repository, sender *user_model.User, job *actions_model.ActionRunJob, task *actions_model.ActionTask) {
|
|
source := EventSource{
|
|
Repository: repo,
|
|
Owner: repo.Owner,
|
|
}
|
|
|
|
var org *api.Organization
|
|
if repo.Owner.IsOrganization() {
|
|
org = convert.ToOrganization(ctx, organization.OrgFromUser(repo.Owner))
|
|
}
|
|
|
|
status, _ := convert.ToActionsStatus(job.Status)
|
|
|
|
convertedJob, err := convert.ToActionWorkflowJob(ctx, repo, task, job)
|
|
if err != nil {
|
|
log.Error("ToActionWorkflowJob: %v", err)
|
|
return
|
|
}
|
|
|
|
if err := PrepareWebhooks(ctx, source, webhook_module.HookEventWorkflowJob, &api.WorkflowJobPayload{
|
|
Action: status,
|
|
WorkflowJob: convertedJob,
|
|
Organization: org,
|
|
Repo: convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Sender: convert.ToUser(ctx, sender, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
}
|
|
|
|
func (*webhookNotifier) WorkflowRunStatusUpdate(ctx context.Context, repo *repo_model.Repository, sender *user_model.User, run *actions_model.ActionRun) {
|
|
source := EventSource{
|
|
Repository: repo,
|
|
Owner: repo.Owner,
|
|
}
|
|
|
|
var org *api.Organization
|
|
if repo.Owner.IsOrganization() {
|
|
org = convert.ToOrganization(ctx, organization.OrgFromUser(repo.Owner))
|
|
}
|
|
|
|
status := convert.ToWorkflowRunAction(run.Status)
|
|
|
|
gitRepo, err := gitrepo.OpenRepository(ctx, repo)
|
|
if err != nil {
|
|
log.Error("OpenRepository: %v", err)
|
|
return
|
|
}
|
|
defer gitRepo.Close()
|
|
|
|
convertedWorkflow, err := convert.GetActionWorkflowByRef(ctx, gitRepo, repo, run.WorkflowID, git.RefName(run.Ref))
|
|
if err != nil && errors.Is(err, util.ErrNotExist) {
|
|
convertedWorkflow, err = convert.GetActionWorkflow(ctx, gitRepo, repo, run.WorkflowID)
|
|
}
|
|
if err != nil {
|
|
log.Error("GetActionWorkflow: %v", err)
|
|
return
|
|
}
|
|
|
|
convertedRun, err := convert.ToActionWorkflowRun(ctx, repo, run, nil)
|
|
if err != nil {
|
|
log.Error("ToActionWorkflowRun: %v", err)
|
|
return
|
|
}
|
|
|
|
if err := PrepareWebhooks(ctx, source, webhook_module.HookEventWorkflowRun, &api.WorkflowRunPayload{
|
|
Action: status,
|
|
Workflow: convertedWorkflow,
|
|
WorkflowRun: convertedRun,
|
|
Organization: org,
|
|
Repo: convert.ToRepo(ctx, repo, access_model.Permission{AccessMode: perm.AccessModeOwner}),
|
|
Sender: convert.ToUser(ctx, sender, nil),
|
|
}); err != nil {
|
|
log.Error("PrepareWebhooks: %v", err)
|
|
}
|
|
}
|