Add gitlab system hook parsing

If you use gitlab system hooks you can now send push/tag_push/merge_request events
This commit is contained in:
Martin Treml
2018-12-20 17:09:12 +01:00
parent 80aa7fa2fe
commit 1b9fe11c1f
3 changed files with 113 additions and 17 deletions
+44 -10
View File
@@ -17,6 +17,7 @@ var (
ErrGitLabTokenVerificationFailed = errors.New("X-Gitlab-Token validation failed")
ErrEventNotFound = errors.New("event not defined to be parsed")
ErrParsingPayload = errors.New("error parsing payload")
ErrParsingSystemPayload = errors.New("error parsing system payload")
// ErrHMACVerificationFailed = errors.New("HMAC verification failed")
)
@@ -31,6 +32,11 @@ const (
WikiPageEvents Event = "Wiki Page Hook"
PipelineEvents Event = "Pipeline Hook"
BuildEvents Event = "Build Hook"
SystemHooks Event = "System Hook"
objectPush string = "push"
objectTag string = "tag_push"
objectMergeRequest string = "merge_request"
)
// Option is a configuration option for the webhook
@@ -55,7 +61,7 @@ type Webhook struct {
secret string
}
// Event defines a GitHub hook event type
// Event defines a GitLab hook event type by the X-Gitlab-Event Header
type Event string
// New creates and returns a WebHook instance denoted by the Provider type
@@ -89,6 +95,31 @@ func (hook Webhook) Parse(r *http.Request, events ...Event) (interface{}, error)
}
gitLabEvent := Event(event)
payload := []byte{}
if gitLabEvent == SystemHooks {
sysPayload, err := ioutil.ReadAll(r.Body)
if err != nil || len(sysPayload) == 0 {
return nil, ErrParsingSystemPayload
}
payload = sysPayload
var sysPl SystemHookPayload
err = json.Unmarshal([]byte(payload), &sysPl)
if err != nil {
return nil, err
}
switch sysPl.ObjectKind {
case objectPush:
gitLabEvent = PushEvents
case objectTag:
gitLabEvent = TagEvents
case objectMergeRequest:
gitLabEvent = MergeRequestEvents
}
}
var found bool
for _, evt := range events {
@@ -102,10 +133,13 @@ func (hook Webhook) Parse(r *http.Request, events ...Event) (interface{}, error)
return nil, ErrEventNotFound
}
// check if payload is empty - that means it was no system hook call
if len(payload) == 0 {
payload, err := ioutil.ReadAll(r.Body)
if err != nil || len(payload) == 0 {
return nil, ErrParsingPayload
}
}
// If we have a Secret set, we should check the MAC
if len(hook.secret) > 0 {
@@ -118,47 +152,47 @@ func (hook Webhook) Parse(r *http.Request, events ...Event) (interface{}, error)
switch gitLabEvent {
case PushEvents:
var pl PushEventPayload
err = json.Unmarshal([]byte(payload), &pl)
err := json.Unmarshal([]byte(payload), &pl)
return pl, err
case TagEvents:
var pl TagEventPayload
err = json.Unmarshal([]byte(payload), &pl)
err := json.Unmarshal([]byte(payload), &pl)
return pl, err
case ConfidentialIssuesEvents:
var pl ConfidentialIssueEventPayload
err = json.Unmarshal([]byte(payload), &pl)
err := json.Unmarshal([]byte(payload), &pl)
return pl, err
case IssuesEvents:
var pl IssueEventPayload
err = json.Unmarshal([]byte(payload), &pl)
err := json.Unmarshal([]byte(payload), &pl)
return pl, err
case CommentEvents:
var pl CommentEventPayload
err = json.Unmarshal([]byte(payload), &pl)
err := json.Unmarshal([]byte(payload), &pl)
return pl, err
case MergeRequestEvents:
var pl MergeRequestEventPayload
err = json.Unmarshal([]byte(payload), &pl)
err := json.Unmarshal([]byte(payload), &pl)
return pl, err
case WikiPageEvents:
var pl WikiPageEventPayload
err = json.Unmarshal([]byte(payload), &pl)
err := json.Unmarshal([]byte(payload), &pl)
return pl, err
case PipelineEvents:
var pl PipelineEventPayload
err = json.Unmarshal([]byte(payload), &pl)
err := json.Unmarshal([]byte(payload), &pl)
return pl, err
case BuildEvents:
var pl BuildEventPayload
err = json.Unmarshal([]byte(payload), &pl)
err := json.Unmarshal([]byte(payload), &pl)
return pl, err
default:
return nil, fmt.Errorf("unknown event %s", gitLabEvent)
+61 -4
View File
@@ -2,15 +2,13 @@ package gitlab
import (
"bytes"
"io"
"log"
"net/http"
"net/http/httptest"
"os"
"testing"
"io"
"reflect"
"testing"
"github.com/stretchr/testify/require"
)
@@ -266,3 +264,62 @@ func TestWebhooks(t *testing.T) {
})
}
}
func TestSystemHooks(t *testing.T) {
assert := require.New(t)
tests := []struct {
name string
event Event
typ interface{}
filename string
}{
{
name: "PushEvent",
event: PushEvents,
typ: PushEventPayload{},
filename: "../testdata/gitlab/push-event.json",
},
{
name: "TagEvent",
event: TagEvents,
typ: TagEventPayload{},
filename: "../testdata/gitlab/tag-event.json",
},
{
name: "MergeRequestEvent",
event: MergeRequestEvents,
typ: MergeRequestEventPayload{},
filename: "../testdata/gitlab/merge-request-event.json",
},
}
for _, tt := range tests {
tc := tt
client := &http.Client{}
t.Run(tt.name, func(t *testing.T) {
t.Parallel()
payload, err := os.Open(tc.filename)
assert.NoError(err)
defer func() {
_ = payload.Close()
}()
var parseError error
var results interface{}
server := newServer(func(w http.ResponseWriter, r *http.Request) {
results, parseError = hook.Parse(r, tc.event)
})
defer server.Close()
req, err := http.NewRequest(http.MethodPost, server.URL+path, payload)
assert.NoError(err)
req.Header.Set("Content-Type", "application/json")
req.Header.Set("X-Gitlab-Token", "sampleToken!")
req.Header.Set("X-Gitlab-Event", "System Hook")
resp, err := client.Do(req)
assert.NoError(err)
assert.Equal(http.StatusOK, resp.StatusCode)
assert.NoError(parseError)
assert.Equal(reflect.TypeOf(tc.typ), reflect.TypeOf(results))
})
}
}
+5
View File
@@ -148,6 +148,11 @@ type BuildEventPayload struct {
Repository Repository `json:"repository"`
}
// SystemHookPayload contains the ObjectKind to match with real hook events
type SystemHookPayload struct {
ObjectKind string `json:"object_kind"`
}
// Issue contains all of the GitLab issue information
type Issue struct {
ID int64 `json:"id"`