2016-12-07 04:36:28 +00:00
|
|
|
// Copyright 2016 The Gitea Authors. All rights reserved.
|
2022-11-27 18:20:29 +00:00
|
|
|
// SPDX-License-Identifier: MIT
|
2016-12-07 04:36:28 +00:00
|
|
|
|
|
|
|
package utils
|
|
|
|
|
|
|
|
import (
|
2020-12-12 15:33:19 +00:00
|
|
|
"fmt"
|
2018-05-16 14:01:55 +00:00
|
|
|
"net/http"
|
2018-09-10 14:31:08 +00:00
|
|
|
"strings"
|
2018-05-16 14:01:55 +00:00
|
|
|
|
2023-03-10 14:28:32 +00:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2021-11-10 05:13:16 +00:00
|
|
|
"code.gitea.io/gitea/models/webhook"
|
2016-12-07 04:36:28 +00:00
|
|
|
"code.gitea.io/gitea/modules/context"
|
2021-07-24 16:03:58 +00:00
|
|
|
"code.gitea.io/gitea/modules/json"
|
2023-01-28 18:12:10 +00:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2019-05-11 10:21:34 +00:00
|
|
|
api "code.gitea.io/gitea/modules/structs"
|
2020-12-25 09:59:32 +00:00
|
|
|
"code.gitea.io/gitea/modules/util"
|
2023-01-01 15:23:15 +00:00
|
|
|
webhook_module "code.gitea.io/gitea/modules/webhook"
|
2021-11-10 05:13:16 +00:00
|
|
|
webhook_service "code.gitea.io/gitea/services/webhook"
|
2016-12-07 04:36:28 +00:00
|
|
|
)
|
|
|
|
|
2023-03-10 14:28:32 +00:00
|
|
|
// ListOwnerHooks lists the webhooks of the provided owner
|
|
|
|
func ListOwnerHooks(ctx *context.APIContext, owner *user_model.User) {
|
|
|
|
opts := &webhook.ListWebhookOptions{
|
|
|
|
ListOptions: GetListOptions(ctx),
|
|
|
|
OwnerID: owner.ID,
|
|
|
|
}
|
|
|
|
|
|
|
|
count, err := webhook.CountWebhooksByOpts(opts)
|
|
|
|
if err != nil {
|
|
|
|
ctx.InternalServerError(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
hooks, err := webhook.ListWebhooksByOpts(ctx, opts)
|
|
|
|
if err != nil {
|
|
|
|
ctx.InternalServerError(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
apiHooks := make([]*api.Hook, len(hooks))
|
|
|
|
for i, hook := range hooks {
|
|
|
|
apiHooks[i], err = webhook_service.ToHook(owner.HomeLink(), hook)
|
|
|
|
if err != nil {
|
|
|
|
ctx.InternalServerError(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx.SetTotalCountHeader(count)
|
|
|
|
ctx.JSON(http.StatusOK, apiHooks)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetOwnerHook gets an user or organization webhook. Errors are written to ctx.
|
|
|
|
func GetOwnerHook(ctx *context.APIContext, ownerID, hookID int64) (*webhook.Webhook, error) {
|
2023-11-25 23:43:23 +00:00
|
|
|
w, err := webhook.GetWebhookByOwnerID(ctx, ownerID, hookID)
|
2016-12-07 04:36:28 +00:00
|
|
|
if err != nil {
|
2021-11-10 05:13:16 +00:00
|
|
|
if webhook.IsErrWebhookNotExist(err) {
|
2019-03-19 02:29:43 +00:00
|
|
|
ctx.NotFound()
|
2016-12-07 04:36:28 +00:00
|
|
|
} else {
|
2023-03-10 14:28:32 +00:00
|
|
|
ctx.Error(http.StatusInternalServerError, "GetWebhookByOwnerID", err)
|
2016-12-07 04:36:28 +00:00
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return w, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetRepoHook get a repo's webhook. If there is an error, write to `ctx`
|
|
|
|
// accordingly and return the error
|
2021-11-10 05:13:16 +00:00
|
|
|
func GetRepoHook(ctx *context.APIContext, repoID, hookID int64) (*webhook.Webhook, error) {
|
2023-11-25 23:43:23 +00:00
|
|
|
w, err := webhook.GetWebhookByRepoID(ctx, repoID, hookID)
|
2016-12-07 04:36:28 +00:00
|
|
|
if err != nil {
|
2021-11-10 05:13:16 +00:00
|
|
|
if webhook.IsErrWebhookNotExist(err) {
|
2019-03-19 02:29:43 +00:00
|
|
|
ctx.NotFound()
|
2016-12-07 04:36:28 +00:00
|
|
|
} else {
|
2019-12-20 17:07:12 +00:00
|
|
|
ctx.Error(http.StatusInternalServerError, "GetWebhookByID", err)
|
2016-12-07 04:36:28 +00:00
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return w, nil
|
|
|
|
}
|
|
|
|
|
2023-03-10 14:28:32 +00:00
|
|
|
// checkCreateHookOption check if a CreateHookOption form is valid. If invalid,
|
2016-12-07 04:36:28 +00:00
|
|
|
// write the appropriate error to `ctx`. Return whether the form is valid
|
2023-03-10 14:28:32 +00:00
|
|
|
func checkCreateHookOption(ctx *context.APIContext, form *api.CreateHookOption) bool {
|
2021-11-10 05:13:16 +00:00
|
|
|
if !webhook_service.IsValidHookTaskType(form.Type) {
|
2020-12-12 15:33:19 +00:00
|
|
|
ctx.Error(http.StatusUnprocessableEntity, "", fmt.Sprintf("Invalid hook type: %s", form.Type))
|
2016-12-07 04:36:28 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
for _, name := range []string{"url", "content_type"} {
|
|
|
|
if _, ok := form.Config[name]; !ok {
|
2019-12-20 17:07:12 +00:00
|
|
|
ctx.Error(http.StatusUnprocessableEntity, "", "Missing config option: "+name)
|
2016-12-07 04:36:28 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
2021-11-10 05:13:16 +00:00
|
|
|
if !webhook.IsValidHookContentType(form.Config["content_type"]) {
|
2019-12-20 17:07:12 +00:00
|
|
|
ctx.Error(http.StatusUnprocessableEntity, "", "Invalid content type")
|
2016-12-07 04:36:28 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2023-01-28 18:12:10 +00:00
|
|
|
// AddSystemHook add a system hook
|
|
|
|
func AddSystemHook(ctx *context.APIContext, form *api.CreateHookOption) {
|
|
|
|
hook, ok := addHook(ctx, form, 0, 0)
|
|
|
|
if ok {
|
|
|
|
h, err := webhook_service.ToHook(setting.AppSubURL+"/admin", hook)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "convert.ToHook", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.JSON(http.StatusCreated, h)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-03-10 14:28:32 +00:00
|
|
|
// AddOwnerHook adds a hook to an user or organization
|
|
|
|
func AddOwnerHook(ctx *context.APIContext, owner *user_model.User, form *api.CreateHookOption) {
|
|
|
|
hook, ok := addHook(ctx, form, owner.ID, 0)
|
2022-11-03 18:23:20 +00:00
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
2023-03-10 14:28:32 +00:00
|
|
|
apiHook, ok := toAPIHook(ctx, owner.HomeLink(), hook)
|
2022-11-03 18:23:20 +00:00
|
|
|
if !ok {
|
|
|
|
return
|
2016-12-07 04:36:28 +00:00
|
|
|
}
|
2022-11-03 18:23:20 +00:00
|
|
|
ctx.JSON(http.StatusCreated, apiHook)
|
2016-12-07 04:36:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// AddRepoHook add a hook to a repo. Writes to `ctx` accordingly
|
|
|
|
func AddRepoHook(ctx *context.APIContext, form *api.CreateHookOption) {
|
|
|
|
repo := ctx.Repo
|
|
|
|
hook, ok := addHook(ctx, form, 0, repo.Repository.ID)
|
2022-11-03 18:23:20 +00:00
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
apiHook, ok := toAPIHook(ctx, repo.RepoLink, hook)
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.JSON(http.StatusCreated, apiHook)
|
|
|
|
}
|
|
|
|
|
|
|
|
// toAPIHook converts the hook to its API representation.
|
|
|
|
// If there is an error, write to `ctx` accordingly. Return (hook, ok)
|
|
|
|
func toAPIHook(ctx *context.APIContext, repoLink string, hook *webhook.Webhook) (*api.Hook, bool) {
|
2023-01-01 15:23:15 +00:00
|
|
|
apiHook, err := webhook_service.ToHook(repoLink, hook)
|
2022-11-03 18:23:20 +00:00
|
|
|
if err != nil {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "ToHook", err)
|
|
|
|
return nil, false
|
2016-12-07 04:36:28 +00:00
|
|
|
}
|
2022-11-03 18:23:20 +00:00
|
|
|
return apiHook, true
|
2016-12-07 04:36:28 +00:00
|
|
|
}
|
|
|
|
|
2020-03-06 05:10:48 +00:00
|
|
|
func issuesHook(events []string, event string) bool {
|
Improve utils of slices (#22379)
- Move the file `compare.go` and `slice.go` to `slice.go`.
- Fix `ExistsInSlice`, it's buggy
- It uses `sort.Search`, so it assumes that the input slice is sorted.
- It passes `func(i int) bool { return slice[i] == target })` to
`sort.Search`, that's incorrect, check the doc of `sort.Search`.
- Conbine `IsInt64InSlice(int64, []int64)` and `ExistsInSlice(string,
[]string)` to `SliceContains[T]([]T, T)`.
- Conbine `IsSliceInt64Eq([]int64, []int64)` and `IsEqualSlice([]string,
[]string)` to `SliceSortedEqual[T]([]T, T)`.
- Add `SliceEqual[T]([]T, T)` as a distinction from
`SliceSortedEqual[T]([]T, T)`.
- Redesign `RemoveIDFromList([]int64, int64) ([]int64, bool)` to
`SliceRemoveAll[T]([]T, T) []T`.
- Add `SliceContainsFunc[T]([]T, func(T) bool)` and
`SliceRemoveAllFunc[T]([]T, func(T) bool)` for general use.
- Add comments to explain why not `golang.org/x/exp/slices`.
- Add unit tests.
2023-01-11 05:31:16 +00:00
|
|
|
return util.SliceContainsString(events, event, true) || util.SliceContainsString(events, string(webhook_module.HookEventIssues), true)
|
2020-03-06 05:10:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func pullHook(events []string, event string) bool {
|
Improve utils of slices (#22379)
- Move the file `compare.go` and `slice.go` to `slice.go`.
- Fix `ExistsInSlice`, it's buggy
- It uses `sort.Search`, so it assumes that the input slice is sorted.
- It passes `func(i int) bool { return slice[i] == target })` to
`sort.Search`, that's incorrect, check the doc of `sort.Search`.
- Conbine `IsInt64InSlice(int64, []int64)` and `ExistsInSlice(string,
[]string)` to `SliceContains[T]([]T, T)`.
- Conbine `IsSliceInt64Eq([]int64, []int64)` and `IsEqualSlice([]string,
[]string)` to `SliceSortedEqual[T]([]T, T)`.
- Add `SliceEqual[T]([]T, T)` as a distinction from
`SliceSortedEqual[T]([]T, T)`.
- Redesign `RemoveIDFromList([]int64, int64) ([]int64, bool)` to
`SliceRemoveAll[T]([]T, T) []T`.
- Add `SliceContainsFunc[T]([]T, func(T) bool)` and
`SliceRemoveAllFunc[T]([]T, func(T) bool)` for general use.
- Add comments to explain why not `golang.org/x/exp/slices`.
- Add unit tests.
2023-01-11 05:31:16 +00:00
|
|
|
return util.SliceContainsString(events, event, true) || util.SliceContainsString(events, string(webhook_module.HookEventPullRequest), true)
|
2020-03-06 05:10:48 +00:00
|
|
|
}
|
|
|
|
|
2023-03-10 14:28:32 +00:00
|
|
|
// addHook add the hook specified by `form`, `ownerID` and `repoID`. If there is
|
2016-12-07 04:36:28 +00:00
|
|
|
// an error, write to `ctx` accordingly. Return (webhook, ok)
|
2023-03-10 14:28:32 +00:00
|
|
|
func addHook(ctx *context.APIContext, form *api.CreateHookOption, ownerID, repoID int64) (*webhook.Webhook, bool) {
|
|
|
|
if !checkCreateHookOption(ctx, form) {
|
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
|
2016-12-07 04:36:28 +00:00
|
|
|
if len(form.Events) == 0 {
|
|
|
|
form.Events = []string{"push"}
|
|
|
|
}
|
2021-11-10 05:13:16 +00:00
|
|
|
w := &webhook.Webhook{
|
2023-03-10 14:28:32 +00:00
|
|
|
OwnerID: ownerID,
|
2016-12-07 04:36:28 +00:00
|
|
|
RepoID: repoID,
|
|
|
|
URL: form.Config["url"],
|
2021-11-10 05:13:16 +00:00
|
|
|
ContentType: webhook.ToHookContentType(form.Config["content_type"]),
|
2016-12-07 04:36:28 +00:00
|
|
|
Secret: form.Config["secret"],
|
2019-05-15 12:01:53 +00:00
|
|
|
HTTPMethod: "POST",
|
2023-01-01 15:23:15 +00:00
|
|
|
HookEvent: &webhook_module.HookEvent{
|
2016-12-07 04:36:28 +00:00
|
|
|
ChooseEvents: true,
|
2023-01-01 15:23:15 +00:00
|
|
|
HookEvents: webhook_module.HookEvents{
|
2023-05-25 02:06:27 +00:00
|
|
|
Create: util.SliceContainsString(form.Events, string(webhook_module.HookEventCreate), true),
|
|
|
|
Delete: util.SliceContainsString(form.Events, string(webhook_module.HookEventDelete), true),
|
|
|
|
Fork: util.SliceContainsString(form.Events, string(webhook_module.HookEventFork), true),
|
|
|
|
Issues: issuesHook(form.Events, "issues_only"),
|
|
|
|
IssueAssign: issuesHook(form.Events, string(webhook_module.HookEventIssueAssign)),
|
|
|
|
IssueLabel: issuesHook(form.Events, string(webhook_module.HookEventIssueLabel)),
|
|
|
|
IssueMilestone: issuesHook(form.Events, string(webhook_module.HookEventIssueMilestone)),
|
|
|
|
IssueComment: issuesHook(form.Events, string(webhook_module.HookEventIssueComment)),
|
|
|
|
Push: util.SliceContainsString(form.Events, string(webhook_module.HookEventPush), true),
|
|
|
|
PullRequest: pullHook(form.Events, "pull_request_only"),
|
|
|
|
PullRequestAssign: pullHook(form.Events, string(webhook_module.HookEventPullRequestAssign)),
|
|
|
|
PullRequestLabel: pullHook(form.Events, string(webhook_module.HookEventPullRequestLabel)),
|
|
|
|
PullRequestMilestone: pullHook(form.Events, string(webhook_module.HookEventPullRequestMilestone)),
|
|
|
|
PullRequestComment: pullHook(form.Events, string(webhook_module.HookEventPullRequestComment)),
|
|
|
|
PullRequestReview: pullHook(form.Events, "pull_request_review"),
|
|
|
|
PullRequestReviewRequest: pullHook(form.Events, string(webhook_module.HookEventPullRequestReviewRequest)),
|
|
|
|
PullRequestSync: pullHook(form.Events, string(webhook_module.HookEventPullRequestSync)),
|
|
|
|
Wiki: util.SliceContainsString(form.Events, string(webhook_module.HookEventWiki), true),
|
|
|
|
Repository: util.SliceContainsString(form.Events, string(webhook_module.HookEventRepository), true),
|
|
|
|
Release: util.SliceContainsString(form.Events, string(webhook_module.HookEventRelease), true),
|
2016-12-07 04:36:28 +00:00
|
|
|
},
|
2019-09-09 05:48:21 +00:00
|
|
|
BranchFilter: form.BranchFilter,
|
2016-12-07 04:36:28 +00:00
|
|
|
},
|
2020-12-09 17:20:13 +00:00
|
|
|
IsActive: form.Active,
|
2022-06-20 10:02:49 +00:00
|
|
|
Type: form.Type,
|
2016-12-07 04:36:28 +00:00
|
|
|
}
|
2022-11-03 18:23:20 +00:00
|
|
|
err := w.SetHeaderAuthorization(form.AuthorizationHeader)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "SetHeaderAuthorization", err)
|
|
|
|
return nil, false
|
|
|
|
}
|
2023-01-01 15:23:15 +00:00
|
|
|
if w.Type == webhook_module.SLACK {
|
2016-12-07 04:36:28 +00:00
|
|
|
channel, ok := form.Config["channel"]
|
|
|
|
if !ok {
|
2019-12-20 17:07:12 +00:00
|
|
|
ctx.Error(http.StatusUnprocessableEntity, "", "Missing config option: channel")
|
2016-12-07 04:36:28 +00:00
|
|
|
return nil, false
|
|
|
|
}
|
2022-08-11 15:48:23 +00:00
|
|
|
channel = strings.TrimSpace(channel)
|
2018-09-10 14:31:08 +00:00
|
|
|
|
2022-08-11 15:48:23 +00:00
|
|
|
if !webhook_service.IsValidSlackChannel(channel) {
|
2019-12-20 17:07:12 +00:00
|
|
|
ctx.Error(http.StatusBadRequest, "", "Invalid slack channel name")
|
2018-09-10 14:31:08 +00:00
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
|
2021-11-10 05:13:16 +00:00
|
|
|
meta, err := json.Marshal(&webhook_service.SlackMeta{
|
2022-08-11 15:48:23 +00:00
|
|
|
Channel: channel,
|
2016-12-07 04:36:28 +00:00
|
|
|
Username: form.Config["username"],
|
|
|
|
IconURL: form.Config["icon_url"],
|
|
|
|
Color: form.Config["color"],
|
|
|
|
})
|
|
|
|
if err != nil {
|
2019-12-20 17:07:12 +00:00
|
|
|
ctx.Error(http.StatusInternalServerError, "slack: JSON marshal failed", err)
|
2016-12-07 04:36:28 +00:00
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
w.Meta = string(meta)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := w.UpdateEvent(); err != nil {
|
2019-12-20 17:07:12 +00:00
|
|
|
ctx.Error(http.StatusInternalServerError, "UpdateEvent", err)
|
2016-12-07 04:36:28 +00:00
|
|
|
return nil, false
|
2022-03-22 15:22:54 +00:00
|
|
|
} else if err := webhook.CreateWebhook(ctx, w); err != nil {
|
2019-12-20 17:07:12 +00:00
|
|
|
ctx.Error(http.StatusInternalServerError, "CreateWebhook", err)
|
2016-12-07 04:36:28 +00:00
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
return w, true
|
|
|
|
}
|
|
|
|
|
2023-01-28 18:12:10 +00:00
|
|
|
// EditSystemHook edit system webhook `w` according to `form`. Writes to `ctx` accordingly
|
|
|
|
func EditSystemHook(ctx *context.APIContext, form *api.EditHookOption, hookID int64) {
|
|
|
|
hook, err := webhook.GetSystemOrDefaultWebhook(ctx, hookID)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "GetSystemOrDefaultWebhook", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if !editHook(ctx, form, hook) {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "editHook", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
updated, err := webhook.GetSystemOrDefaultWebhook(ctx, hookID)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "GetSystemOrDefaultWebhook", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
h, err := webhook_service.ToHook(setting.AppURL+"/admin", updated)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "convert.ToHook", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.JSON(http.StatusOK, h)
|
|
|
|
}
|
|
|
|
|
2023-03-10 14:28:32 +00:00
|
|
|
// EditOwnerHook updates a webhook of an user or organization
|
|
|
|
func EditOwnerHook(ctx *context.APIContext, owner *user_model.User, form *api.EditHookOption, hookID int64) {
|
|
|
|
hook, err := GetOwnerHook(ctx, owner.ID, hookID)
|
2016-12-07 04:36:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if !editHook(ctx, form, hook) {
|
|
|
|
return
|
|
|
|
}
|
2023-03-10 14:28:32 +00:00
|
|
|
updated, err := GetOwnerHook(ctx, owner.ID, hookID)
|
2016-12-07 04:36:28 +00:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
2023-03-10 14:28:32 +00:00
|
|
|
apiHook, ok := toAPIHook(ctx, owner.HomeLink(), updated)
|
2022-11-03 18:23:20 +00:00
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.JSON(http.StatusOK, apiHook)
|
2016-12-07 04:36:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// EditRepoHook edit webhook `w` according to `form`. Writes to `ctx` accordingly
|
|
|
|
func EditRepoHook(ctx *context.APIContext, form *api.EditHookOption, hookID int64) {
|
|
|
|
repo := ctx.Repo
|
|
|
|
hook, err := GetRepoHook(ctx, repo.Repository.ID, hookID)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if !editHook(ctx, form, hook) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
updated, err := GetRepoHook(ctx, repo.Repository.ID, hookID)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
2022-11-03 18:23:20 +00:00
|
|
|
apiHook, ok := toAPIHook(ctx, repo.RepoLink, updated)
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.JSON(http.StatusOK, apiHook)
|
2016-12-07 04:36:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// editHook edit the webhook `w` according to `form`. If an error occurs, write
|
|
|
|
// to `ctx` accordingly and return the error. Return whether successful
|
2021-11-10 05:13:16 +00:00
|
|
|
func editHook(ctx *context.APIContext, form *api.EditHookOption, w *webhook.Webhook) bool {
|
2016-12-07 04:36:28 +00:00
|
|
|
if form.Config != nil {
|
|
|
|
if url, ok := form.Config["url"]; ok {
|
|
|
|
w.URL = url
|
|
|
|
}
|
|
|
|
if ct, ok := form.Config["content_type"]; ok {
|
2021-11-10 05:13:16 +00:00
|
|
|
if !webhook.IsValidHookContentType(ct) {
|
2019-12-20 17:07:12 +00:00
|
|
|
ctx.Error(http.StatusUnprocessableEntity, "", "Invalid content type")
|
2016-12-07 04:36:28 +00:00
|
|
|
return false
|
|
|
|
}
|
2021-11-10 05:13:16 +00:00
|
|
|
w.ContentType = webhook.ToHookContentType(ct)
|
2016-12-07 04:36:28 +00:00
|
|
|
}
|
|
|
|
|
2023-01-01 15:23:15 +00:00
|
|
|
if w.Type == webhook_module.SLACK {
|
2016-12-07 04:36:28 +00:00
|
|
|
if channel, ok := form.Config["channel"]; ok {
|
2021-11-10 05:13:16 +00:00
|
|
|
meta, err := json.Marshal(&webhook_service.SlackMeta{
|
2016-12-07 04:36:28 +00:00
|
|
|
Channel: channel,
|
|
|
|
Username: form.Config["username"],
|
|
|
|
IconURL: form.Config["icon_url"],
|
|
|
|
Color: form.Config["color"],
|
|
|
|
})
|
|
|
|
if err != nil {
|
2019-12-20 17:07:12 +00:00
|
|
|
ctx.Error(http.StatusInternalServerError, "slack: JSON marshal failed", err)
|
2016-12-07 04:36:28 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
w.Meta = string(meta)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update events
|
|
|
|
if len(form.Events) == 0 {
|
|
|
|
form.Events = []string{"push"}
|
|
|
|
}
|
|
|
|
w.PushOnly = false
|
|
|
|
w.SendEverything = false
|
|
|
|
w.ChooseEvents = true
|
Improve utils of slices (#22379)
- Move the file `compare.go` and `slice.go` to `slice.go`.
- Fix `ExistsInSlice`, it's buggy
- It uses `sort.Search`, so it assumes that the input slice is sorted.
- It passes `func(i int) bool { return slice[i] == target })` to
`sort.Search`, that's incorrect, check the doc of `sort.Search`.
- Conbine `IsInt64InSlice(int64, []int64)` and `ExistsInSlice(string,
[]string)` to `SliceContains[T]([]T, T)`.
- Conbine `IsSliceInt64Eq([]int64, []int64)` and `IsEqualSlice([]string,
[]string)` to `SliceSortedEqual[T]([]T, T)`.
- Add `SliceEqual[T]([]T, T)` as a distinction from
`SliceSortedEqual[T]([]T, T)`.
- Redesign `RemoveIDFromList([]int64, int64) ([]int64, bool)` to
`SliceRemoveAll[T]([]T, T) []T`.
- Add `SliceContainsFunc[T]([]T, func(T) bool)` and
`SliceRemoveAllFunc[T]([]T, func(T) bool)` for general use.
- Add comments to explain why not `golang.org/x/exp/slices`.
- Add unit tests.
2023-01-11 05:31:16 +00:00
|
|
|
w.Create = util.SliceContainsString(form.Events, string(webhook_module.HookEventCreate), true)
|
|
|
|
w.Push = util.SliceContainsString(form.Events, string(webhook_module.HookEventPush), true)
|
|
|
|
w.Create = util.SliceContainsString(form.Events, string(webhook_module.HookEventCreate), true)
|
|
|
|
w.Delete = util.SliceContainsString(form.Events, string(webhook_module.HookEventDelete), true)
|
|
|
|
w.Fork = util.SliceContainsString(form.Events, string(webhook_module.HookEventFork), true)
|
|
|
|
w.Repository = util.SliceContainsString(form.Events, string(webhook_module.HookEventRepository), true)
|
|
|
|
w.Wiki = util.SliceContainsString(form.Events, string(webhook_module.HookEventWiki), true)
|
|
|
|
w.Release = util.SliceContainsString(form.Events, string(webhook_module.HookEventRelease), true)
|
2019-09-09 05:48:21 +00:00
|
|
|
w.BranchFilter = form.BranchFilter
|
2018-05-16 14:01:55 +00:00
|
|
|
|
2022-11-03 18:23:20 +00:00
|
|
|
err := w.SetHeaderAuthorization(form.AuthorizationHeader)
|
|
|
|
if err != nil {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "SetHeaderAuthorization", err)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2022-03-29 11:55:00 +00:00
|
|
|
// Issues
|
|
|
|
w.Issues = issuesHook(form.Events, "issues_only")
|
2023-01-06 11:49:14 +00:00
|
|
|
w.IssueAssign = issuesHook(form.Events, string(webhook_module.HookEventIssueAssign))
|
|
|
|
w.IssueLabel = issuesHook(form.Events, string(webhook_module.HookEventIssueLabel))
|
|
|
|
w.IssueMilestone = issuesHook(form.Events, string(webhook_module.HookEventIssueMilestone))
|
|
|
|
w.IssueComment = issuesHook(form.Events, string(webhook_module.HookEventIssueComment))
|
2022-03-29 11:55:00 +00:00
|
|
|
|
|
|
|
// Pull requests
|
|
|
|
w.PullRequest = pullHook(form.Events, "pull_request_only")
|
2023-01-06 11:49:14 +00:00
|
|
|
w.PullRequestAssign = pullHook(form.Events, string(webhook_module.HookEventPullRequestAssign))
|
|
|
|
w.PullRequestLabel = pullHook(form.Events, string(webhook_module.HookEventPullRequestLabel))
|
|
|
|
w.PullRequestMilestone = pullHook(form.Events, string(webhook_module.HookEventPullRequestMilestone))
|
|
|
|
w.PullRequestComment = pullHook(form.Events, string(webhook_module.HookEventPullRequestComment))
|
2022-03-29 11:55:00 +00:00
|
|
|
w.PullRequestReview = pullHook(form.Events, "pull_request_review")
|
2023-05-25 02:06:27 +00:00
|
|
|
w.PullRequestReviewRequest = pullHook(form.Events, string(webhook_module.HookEventPullRequestReviewRequest))
|
2023-01-06 11:49:14 +00:00
|
|
|
w.PullRequestSync = pullHook(form.Events, string(webhook_module.HookEventPullRequestSync))
|
2022-03-29 11:55:00 +00:00
|
|
|
|
2016-12-07 04:36:28 +00:00
|
|
|
if err := w.UpdateEvent(); err != nil {
|
2019-12-20 17:07:12 +00:00
|
|
|
ctx.Error(http.StatusInternalServerError, "UpdateEvent", err)
|
2016-12-07 04:36:28 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
if form.Active != nil {
|
|
|
|
w.IsActive = *form.Active
|
|
|
|
}
|
|
|
|
|
2021-11-10 05:13:16 +00:00
|
|
|
if err := webhook.UpdateWebhook(w); err != nil {
|
2019-12-20 17:07:12 +00:00
|
|
|
ctx.Error(http.StatusInternalServerError, "UpdateWebhook", err)
|
2016-12-07 04:36:28 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
2023-03-10 14:28:32 +00:00
|
|
|
|
|
|
|
// DeleteOwnerHook deletes the hook owned by the owner.
|
|
|
|
func DeleteOwnerHook(ctx *context.APIContext, owner *user_model.User, hookID int64) {
|
2023-11-25 23:43:23 +00:00
|
|
|
if err := webhook.DeleteWebhookByOwnerID(ctx, owner.ID, hookID); err != nil {
|
2023-03-10 14:28:32 +00:00
|
|
|
if webhook.IsErrWebhookNotExist(err) {
|
|
|
|
ctx.NotFound()
|
|
|
|
} else {
|
|
|
|
ctx.Error(http.StatusInternalServerError, "DeleteWebhookByOwnerID", err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx.Status(http.StatusNoContent)
|
|
|
|
}
|