You can not select more than 25 topics Topics must start with a chinese character,a letter or number, can include dashes ('-') and can be up to 35 characters long.

deliver.go 7.8 kB

3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327
  1. // Copyright 2019 The Gitea Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package webhook
  5. import (
  6. "context"
  7. "crypto/tls"
  8. "fmt"
  9. "io/ioutil"
  10. "net"
  11. "net/http"
  12. "net/url"
  13. "strings"
  14. "sync"
  15. "time"
  16. "golang.org/x/net/proxy"
  17. "code.gitea.io/gitea/models"
  18. "code.gitea.io/gitea/modules/graceful"
  19. "code.gitea.io/gitea/modules/log"
  20. "code.gitea.io/gitea/modules/setting"
  21. "github.com/gobwas/glob"
  22. "github.com/unknwon/com"
  23. )
  24. // Deliver deliver hook task
  25. func Deliver(t *models.HookTask) error {
  26. defer func() {
  27. err := recover()
  28. if err == nil {
  29. return
  30. }
  31. // There was a panic whilst delivering a hook...
  32. log.Error("PANIC whilst trying to deliver webhook[%d] for repo[%d] to %s Panic: %v\nStacktrace: %s", t.ID, t.RepoID, t.URL, err, log.Stack(2))
  33. }()
  34. t.IsDelivered = true
  35. var req *http.Request
  36. var err error
  37. switch t.HTTPMethod {
  38. case "":
  39. log.Info("HTTP Method for webhook %d empty, setting to POST as default", t.ID)
  40. fallthrough
  41. case http.MethodPost:
  42. switch t.ContentType {
  43. case models.ContentTypeJSON:
  44. req, err = http.NewRequest("POST", t.URL, strings.NewReader(t.PayloadContent))
  45. if err != nil {
  46. return err
  47. }
  48. req.Header.Set("Content-Type", "application/json")
  49. case models.ContentTypeForm:
  50. var forms = url.Values{
  51. "payload": []string{t.PayloadContent},
  52. }
  53. req, err = http.NewRequest("POST", t.URL, strings.NewReader(forms.Encode()))
  54. if err != nil {
  55. return err
  56. }
  57. req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
  58. }
  59. case http.MethodGet:
  60. u, err := url.Parse(t.URL)
  61. if err != nil {
  62. return err
  63. }
  64. vals := u.Query()
  65. vals["payload"] = []string{t.PayloadContent}
  66. u.RawQuery = vals.Encode()
  67. req, err = http.NewRequest("GET", u.String(), nil)
  68. if err != nil {
  69. return err
  70. }
  71. default:
  72. return fmt.Errorf("Invalid http method for webhook: [%d] %v", t.ID, t.HTTPMethod)
  73. }
  74. if t.Type == models.MATRIX {
  75. req, err = getMatrixHookRequest(t)
  76. if err != nil {
  77. return err
  78. }
  79. }
  80. req.Header.Add("X-Gitea-Delivery", t.UUID)
  81. req.Header.Add("X-Gitea-Event", t.EventType.Event())
  82. req.Header.Add("X-Gitea-Signature", t.Signature)
  83. req.Header.Add("X-Gogs-Delivery", t.UUID)
  84. req.Header.Add("X-Gogs-Event", t.EventType.Event())
  85. req.Header.Add("X-Gogs-Signature", t.Signature)
  86. req.Header["X-GitHub-Delivery"] = []string{t.UUID}
  87. req.Header["X-GitHub-Event"] = []string{t.EventType.Event()}
  88. // Record delivery information.
  89. t.RequestInfo = &models.HookRequest{
  90. Headers: map[string]string{},
  91. }
  92. for k, vals := range req.Header {
  93. t.RequestInfo.Headers[k] = strings.Join(vals, ",")
  94. }
  95. t.ResponseInfo = &models.HookResponse{
  96. Headers: map[string]string{},
  97. }
  98. defer func() {
  99. t.Delivered = time.Now().UnixNano()
  100. if t.IsSucceed {
  101. log.Trace("Hook delivered: %s", t.UUID)
  102. } else {
  103. log.Trace("Hook delivery failed: %s", t.UUID)
  104. }
  105. if err := models.UpdateHookTask(t); err != nil {
  106. log.Error("UpdateHookTask [%d]: %v", t.ID, err)
  107. }
  108. // Update webhook last delivery status.
  109. w, err := models.GetWebhookByID(t.HookID)
  110. if err != nil {
  111. log.Error("GetWebhookByID: %v", err)
  112. return
  113. }
  114. if t.IsSucceed {
  115. w.LastStatus = models.HookStatusSucceed
  116. } else {
  117. w.LastStatus = models.HookStatusFail
  118. }
  119. if err = models.UpdateWebhookLastStatus(w); err != nil {
  120. log.Error("UpdateWebhookLastStatus: %v", err)
  121. return
  122. }
  123. }()
  124. match := isSocks5ProxyUrlMatch(req)
  125. resp, err := makeReq(req, match)
  126. if err != nil {
  127. t.ResponseInfo.Body = fmt.Sprintf("Delivery: %v", err)
  128. return err
  129. }
  130. defer resp.Body.Close()
  131. // Status code is 20x can be seen as succeed.
  132. t.IsSucceed = resp.StatusCode/100 == 2
  133. t.ResponseInfo.Status = resp.StatusCode
  134. for k, vals := range resp.Header {
  135. t.ResponseInfo.Headers[k] = strings.Join(vals, ",")
  136. }
  137. p, err := ioutil.ReadAll(resp.Body)
  138. if err != nil {
  139. t.ResponseInfo.Body = fmt.Sprintf("read body: %s", err)
  140. return err
  141. }
  142. t.ResponseInfo.Body = string(p)
  143. return nil
  144. }
  145. func makeReq(req *http.Request, proxyMatch bool) (*http.Response, error) {
  146. if proxyMatch {
  147. return webhookSocks5PoxyHTTPClient.Do(req)
  148. }
  149. return webhookHTTPClient.Do(req)
  150. }
  151. func isSocks5ProxyUrlMatch(req *http.Request) bool {
  152. for _, v := range socks5HostMatchers {
  153. if v.Match(req.URL.Host) {
  154. return true
  155. }
  156. }
  157. return false
  158. }
  159. // DeliverHooks checks and delivers undelivered hooks.
  160. // FIXME: graceful: This would likely benefit from either a worker pool with dummy queue
  161. // or a full queue. Then more hooks could be sent at same time.
  162. func DeliverHooks(ctx context.Context) {
  163. select {
  164. case <-ctx.Done():
  165. return
  166. default:
  167. }
  168. tasks, err := models.FindUndeliveredHookTasks()
  169. if err != nil {
  170. log.Error("DeliverHooks: %v", err)
  171. return
  172. }
  173. // Update hook task status.
  174. for _, t := range tasks {
  175. select {
  176. case <-ctx.Done():
  177. return
  178. default:
  179. }
  180. if err = Deliver(t); err != nil {
  181. log.Error("deliver: %v", err)
  182. }
  183. }
  184. // Start listening on new hook requests.
  185. for {
  186. select {
  187. case <-ctx.Done():
  188. hookQueue.Close()
  189. return
  190. case repoIDStr := <-hookQueue.Queue():
  191. log.Trace("DeliverHooks [repo_id: %v]", repoIDStr)
  192. hookQueue.Remove(repoIDStr)
  193. repoID, err := com.StrTo(repoIDStr).Int64()
  194. if err != nil {
  195. log.Error("Invalid repo ID: %s", repoIDStr)
  196. continue
  197. }
  198. tasks, err := models.FindRepoUndeliveredHookTasks(repoID)
  199. if err != nil {
  200. log.Error("Get repository [%d] hook tasks: %v", repoID, err)
  201. continue
  202. }
  203. for _, t := range tasks {
  204. select {
  205. case <-ctx.Done():
  206. return
  207. default:
  208. }
  209. if err = Deliver(t); err != nil {
  210. log.Error("deliver: %v", err)
  211. }
  212. }
  213. }
  214. }
  215. }
  216. var (
  217. webhookHTTPClient *http.Client
  218. once sync.Once
  219. hostMatchers []glob.Glob
  220. webhookSocks5PoxyHTTPClient *http.Client
  221. socks5HostMatchers []glob.Glob
  222. )
  223. func webhookProxy() func(req *http.Request) (*url.URL, error) {
  224. if setting.Webhook.ProxyURL == "" {
  225. return http.ProxyFromEnvironment
  226. }
  227. once.Do(func() {
  228. for _, h := range setting.Webhook.ProxyHosts {
  229. if g, err := glob.Compile(h); err == nil {
  230. hostMatchers = append(hostMatchers, g)
  231. } else {
  232. log.Error("glob.Compile %s failed: %v", h, err)
  233. }
  234. }
  235. })
  236. return func(req *http.Request) (*url.URL, error) {
  237. for _, v := range hostMatchers {
  238. if v.Match(req.URL.Host) {
  239. return http.ProxyURL(setting.Webhook.ProxyURLFixed)(req)
  240. }
  241. }
  242. return http.ProxyFromEnvironment(req)
  243. }
  244. }
  245. // InitDeliverHooks starts the hooks delivery thread
  246. func InitDeliverHooks() {
  247. timeout := time.Duration(setting.Webhook.DeliverTimeout) * time.Second
  248. webhookHTTPClient = &http.Client{
  249. Transport: &http.Transport{
  250. TLSClientConfig: &tls.Config{InsecureSkipVerify: setting.Webhook.SkipTLSVerify},
  251. Proxy: webhookProxy(),
  252. Dial: func(netw, addr string) (net.Conn, error) {
  253. conn, err := net.DialTimeout(netw, addr, timeout)
  254. if err != nil {
  255. return nil, err
  256. }
  257. return conn, conn.SetDeadline(time.Now().Add(timeout))
  258. },
  259. },
  260. }
  261. if setting.Webhook.Socks5Proxy != "" {
  262. auth := proxy.Auth{
  263. User: setting.Webhook.Socks5UserName,
  264. Password: setting.Webhook.Socks5Password,
  265. }
  266. dialSocksProxy, err := proxy.SOCKS5("tcp", setting.Webhook.Socks5Proxy, &auth, proxy.Direct)
  267. if err != nil {
  268. fmt.Println("Error connecting to proxy:", err)
  269. }
  270. tr := &http.Transport{Dial: dialSocksProxy.Dial}
  271. webhookSocks5PoxyHTTPClient = &http.Client{
  272. Transport: tr,
  273. }
  274. for _, h := range setting.Webhook.Socks5ProxyHosts {
  275. if g, err := glob.Compile(h); err == nil {
  276. socks5HostMatchers = append(socks5HostMatchers, g)
  277. } else {
  278. log.Error("glob.Compile %s failed: %v", h, err)
  279. }
  280. }
  281. }
  282. go graceful.GetManager().RunWithShutdownContext(DeliverHooks)
  283. }