Compare commits
No commits in common. "transifex-webhook" and "master" have entirely different histories.
transifex-
...
master
|
@ -1,13 +1,8 @@
|
||||||
"""Transifex webhook handler """
|
|
||||||
import base64
|
import base64
|
||||||
import hashlib
|
|
||||||
import hmac
|
|
||||||
import json
|
import json
|
||||||
import os
|
|
||||||
import requests
|
|
||||||
import re
|
import re
|
||||||
import time
|
import hmac
|
||||||
|
import hashlib
|
||||||
from buildbot.process.properties import Properties
|
from buildbot.process.properties import Properties
|
||||||
from buildbot.util import bytes2unicode, unicode2bytes
|
from buildbot.util import bytes2unicode, unicode2bytes
|
||||||
from buildbot.www.hooks.base import BaseHookHandler
|
from buildbot.www.hooks.base import BaseHookHandler
|
||||||
|
@ -15,95 +10,134 @@ from buildbot.www.hooks.base import BaseHookHandler
|
||||||
from twisted.internet import defer
|
from twisted.internet import defer
|
||||||
from twisted.python import log
|
from twisted.python import log
|
||||||
|
|
||||||
|
from dateutil.parser import parse as dateparse
|
||||||
|
|
||||||
_HEADER_USER_AGENT = 'User-Agent'
|
_HEADER_USER_AGENT = 'User-Agent'
|
||||||
_HEADER_SIGNATURE = 'X-TX-Signature'
|
_HEADER_SIGNATURE = 'X-TX-Signature'
|
||||||
_HEADER_URL_PATH = 'X-TX-Url'
|
|
||||||
_HTTP_DATE = 'date'
|
|
||||||
_EVENT_KEY = 'event'
|
_EVENT_KEY = 'event'
|
||||||
author = 'buildbot-transifex'
|
|
||||||
|
|
||||||
|
|
||||||
class TransifexHandler(BaseHookHandler):
|
class TransifexHandler(BaseHookHandler):
|
||||||
|
|
||||||
def __init__(self, master, secret, transifex_to_github_map, options=None):
|
def process_translation_completed(self, payload, event_type, codebase):
|
||||||
if not options:
|
refname = payload["ref"]
|
||||||
options = {}
|
|
||||||
self.secret = secret
|
|
||||||
self.master = master
|
|
||||||
self.options = options
|
|
||||||
self.transifex_to_github_map = transifex_to_github_map
|
|
||||||
|
|
||||||
|
|
||||||
def returnMessage(self, status = False, message = "Unimplemented"):
|
|
||||||
output = json.dumps({"status": "OK" if status else "FAIL", "message": message})
|
|
||||||
return [output, [('Content-type', 'application/json')]]
|
|
||||||
|
|
||||||
def _verifyTransifexSignature(
|
|
||||||
self, request, content, signature, header_signature
|
|
||||||
):
|
|
||||||
http_verb = 'POST'
|
|
||||||
http_url_path = request.getHeader(_HEADER_URL_PATH)
|
|
||||||
http_gmt_date = request.getHeader(_HTTP_DATE)
|
|
||||||
content_md5 = hashlib.md5(content).hexdigest()
|
|
||||||
msg = b'\n'.join([
|
|
||||||
http_verb, http_url_path, http_gmt_date, content_md5
|
|
||||||
])
|
|
||||||
tx_signature = base64.b64encode(
|
|
||||||
hmac.new(
|
|
||||||
key=self.rendered_secret,
|
|
||||||
msg=msg,
|
|
||||||
digestmod=hashlib.sha256
|
|
||||||
).digest()
|
|
||||||
)
|
|
||||||
if tx_signature != header_signature:
|
|
||||||
raise ValueError("Tx Signature mismatch")
|
|
||||||
|
|
||||||
if signature != request.getHeader(_HEADER_SIGNATURE):
|
|
||||||
raise ValueError("Signature mismatch")
|
|
||||||
return True
|
|
||||||
|
|
||||||
def process_translation_completed(self, payload, codebase):
|
|
||||||
changes = []
|
changes = []
|
||||||
translated_request = self._transform_variables(payload['project'], payload['resource'])
|
|
||||||
ts = int(time.time())
|
# We only care about regular heads or tags
|
||||||
|
match = re.match(r"^refs/(heads|tags)/(.+)$", refname)
|
||||||
|
if not match:
|
||||||
|
log.msg("Ignoring refname '{}': Not a branch or tag".format(refname))
|
||||||
|
return changes
|
||||||
|
|
||||||
|
branch = match.group(2)
|
||||||
|
|
||||||
|
repository = payload['repository']
|
||||||
|
repo_url = repository['ssh_url']
|
||||||
|
project = repository['full_name']
|
||||||
|
|
||||||
|
commits = payload['commits']
|
||||||
|
if isinstance(self.options, dict) and self.options.get('onlyIncludePushCommit', False):
|
||||||
|
commits = commits[:1]
|
||||||
|
|
||||||
|
for commit in commits:
|
||||||
|
files = []
|
||||||
|
for kind in ('added', 'modified', 'removed'):
|
||||||
|
files.extend(commit.get(kind, []) or [])
|
||||||
|
timestamp = dateparse(commit['timestamp'])
|
||||||
change = {
|
change = {
|
||||||
'author': author,
|
'author': '{} <{}>'.format(commit['author']['name'],
|
||||||
'branch': translated_request["branch"],
|
commit['author']['email']),
|
||||||
'branch': translated_request["repository"],
|
'files': files,
|
||||||
'project': translated_request["project"],
|
'comments': commit['message'],
|
||||||
|
'revision': commit['id'],
|
||||||
|
'when_timestamp': timestamp,
|
||||||
|
'branch': branch,
|
||||||
|
'revlink': commit['url'],
|
||||||
|
'repository': repo_url,
|
||||||
|
'project': project,
|
||||||
|
'category': event_type,
|
||||||
'properties': {
|
'properties': {
|
||||||
"transifex_language": payload.get("language", "None"),
|
'event': event_type,
|
||||||
"transifex_event": payload.get("event", "None"),
|
'repository_name': repository['name'],
|
||||||
"transifex_project": payload.get("project", "None"),
|
'owner': repository["owner"]["username"]
|
||||||
"transifex_resource": payload.get("resource", "None"),
|
},
|
||||||
"transifex_branch": "translate_" + payload['language'] + "_" + str(ts)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
if codebase is not None:
|
if codebase is not None:
|
||||||
change['codebase'] = codebase
|
change['codebase'] = codebase
|
||||||
changes.insert(0, change)
|
changes.insert(0, change)
|
||||||
return changes
|
return changes
|
||||||
|
|
||||||
def _transform_variables(self, transifex_project):
|
def process_review_compoleted(self, payload, event_type, codebase):
|
||||||
if transifex_project is None:
|
action = payload['action']
|
||||||
raise ValueError("Unknown project %s from transifex".format(transifex_project))
|
|
||||||
key = transifex_project
|
# Only handle potential new stuff, ignore close/.
|
||||||
_map = self.map[key]
|
# Merge itself is handled by the regular branch push message
|
||||||
repository = _map["repository"]
|
if action not in ['opened', 'synchronized', 'edited', 'reopened']:
|
||||||
project = re.sub(r'^.*/(.*?)(\.git)?$', r'\1', repository)
|
log.msg("Gitea Pull Request event '{}' ignored".format(action))
|
||||||
return{
|
return []
|
||||||
'project': project,
|
pull_request = payload['pull_request']
|
||||||
'repository': repository,
|
if not pull_request['mergeable']:
|
||||||
'branch': _map["branch"],
|
log.msg("Gitea Pull Request ignored because it is not mergeable.")
|
||||||
|
return []
|
||||||
|
if pull_request['merged']:
|
||||||
|
log.msg("Gitea Pull Request ignored because it is already merged.")
|
||||||
|
return []
|
||||||
|
timestamp = dateparse(pull_request['updated_at'])
|
||||||
|
base = pull_request['base']
|
||||||
|
head = pull_request['head']
|
||||||
|
repository = payload['repository']
|
||||||
|
change = {
|
||||||
|
'author': '{} <{}>'.format(pull_request['user']['full_name'],
|
||||||
|
pull_request['user']['email']),
|
||||||
|
'comments': 'PR#{}: {}\n\n{}'.format(
|
||||||
|
pull_request['number'],
|
||||||
|
pull_request['title'],
|
||||||
|
pull_request['body']),
|
||||||
|
'revision': base['sha'],
|
||||||
|
'when_timestamp': timestamp,
|
||||||
|
'branch': base['ref'],
|
||||||
|
'revlink': pull_request['html_url'],
|
||||||
|
'repository': base['repo']['ssh_url'],
|
||||||
|
'project': repository['full_name'],
|
||||||
|
'category': event_type,
|
||||||
|
'properties': {
|
||||||
|
'event': event_type,
|
||||||
|
'base_branch': base['ref'],
|
||||||
|
'base_sha': base['sha'],
|
||||||
|
'base_repo_id': base['repo_id'],
|
||||||
|
'base_repository': base['repo']['clone_url'],
|
||||||
|
'base_git_ssh_url': base['repo']['ssh_url'],
|
||||||
|
'head_branch': head['ref'],
|
||||||
|
'head_sha': head['sha'],
|
||||||
|
'head_repo_id': head['repo_id'],
|
||||||
|
'head_repository': head['repo']['clone_url'],
|
||||||
|
'head_git_ssh_url': head['repo']['ssh_url'],
|
||||||
|
'head_owner': head['repo']['owner']['username'],
|
||||||
|
'head_reponame': head['repo']['name'],
|
||||||
|
'pr_id': pull_request['id'],
|
||||||
|
'pr_number': pull_request['number'],
|
||||||
|
'repository_name': repository['name'],
|
||||||
|
'owner': repository["owner"]["username"],
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
if codebase is not None:
|
||||||
|
change['codebase'] = codebase
|
||||||
|
return [change]
|
||||||
|
|
||||||
|
def _transform_variables(payload):
|
||||||
|
retval = {
|
||||||
|
project: payload.get('project'),
|
||||||
|
repository = [payload.get('resource')],
|
||||||
|
branch = payload.get('language')
|
||||||
|
}
|
||||||
|
return retval
|
||||||
|
|
||||||
@defer.inlineCallbacks
|
@defer.inlineCallbacks
|
||||||
def getChanges(self, request):
|
def getChanges(self, request):
|
||||||
change = {}
|
secret = None
|
||||||
self.secret = None
|
|
||||||
if isinstance(self.options, dict):
|
if isinstance(self.options, dict):
|
||||||
self.secret = self.options.get('secret')
|
secret = self.options.get('secret')
|
||||||
try:
|
try:
|
||||||
content = request.content.read()
|
content = request.content.read()
|
||||||
content_text = bytes2unicode(content)
|
content_text = bytes2unicode(content)
|
||||||
|
@ -111,19 +145,36 @@ class TransifexHandler(BaseHookHandler):
|
||||||
except Exception as exception:
|
except Exception as exception:
|
||||||
raise ValueError('Error loading JSON: ' + str(exception))
|
raise ValueError('Error loading JSON: ' + str(exception))
|
||||||
|
|
||||||
if self.secret is not None:
|
|
||||||
|
if secret is not None:
|
||||||
p = Properties()
|
p = Properties()
|
||||||
p.master = self.master
|
p.master = self.master
|
||||||
option = self.options
|
rendered_secret = yield p.render(secret)
|
||||||
rendered_secret = yield p.render(self.secret)
|
|
||||||
signature = hmac.new(
|
signature = hmac.new(
|
||||||
unicode2bytes(rendered_secret),
|
unicode2bytes(rendered_secret),
|
||||||
unicode2bytes(content_text.strip()),
|
unicode2bytes(content_text.strip()),
|
||||||
digestmod=hashlib.sha256)
|
digestmod=hashlib.sha256)
|
||||||
header_signature = bytes2unicode(
|
header_signature = bytes2unicode(
|
||||||
request.getHeader(_HEADER_SIGNATURE))
|
request.getHeader(_HEADER_SIGNATURE))
|
||||||
self._verifyTransifexSignature(request, content, rendered_secret, signature, header_signature)
|
|
||||||
event_type = payload.get("event", "None")
|
http_verb = 'POST'
|
||||||
|
http_url_path = request.headers('X-TX-Url')
|
||||||
|
http_gmt_date = request.headers('Date')
|
||||||
|
content_md5 = hashlib.md5(content).hexdigest()
|
||||||
|
msg = b'\n'.join([
|
||||||
|
http_verb, http_url_path, http_gmt_date, content_md5
|
||||||
|
])
|
||||||
|
tx_signature = base64.b64encode(
|
||||||
|
hmac.new(
|
||||||
|
key=rendered_secret,
|
||||||
|
msg=msg,
|
||||||
|
digestmod=hashlib.sha256
|
||||||
|
).digest()
|
||||||
|
)
|
||||||
|
if tx_signature() != header_signature:
|
||||||
|
raise ValueError('Invalid secret')
|
||||||
|
|
||||||
|
event_type = bytes2unicode(payload.get(_EVENT_KEY), "None")
|
||||||
log.msg("Received event '{}' from transifex".format(event_type))
|
log.msg("Received event '{}' from transifex".format(event_type))
|
||||||
|
|
||||||
codebase = ""
|
codebase = ""
|
||||||
|
@ -137,4 +188,6 @@ class TransifexHandler(BaseHookHandler):
|
||||||
|
|
||||||
return (changes, 'transifex')
|
return (changes, 'transifex')
|
||||||
|
|
||||||
|
|
||||||
|
# Plugin name
|
||||||
transifex = TransifexHandler
|
transifex = TransifexHandler
|
||||||
|
|
27
setup.py
27
setup.py
|
@ -6,23 +6,32 @@ from setuptools import setup
|
||||||
with open("README.md", "r") as fh:
|
with open("README.md", "r") as fh:
|
||||||
long_description = fh.read()
|
long_description = fh.read()
|
||||||
|
|
||||||
VERSION = "0.1"
|
VERSION = "1.7.2"
|
||||||
|
|
||||||
setup(name='buildbot-transifex',
|
setup(name='buildbot-gitea',
|
||||||
version=VERSION,
|
version=VERSION,
|
||||||
description='buildbot plugin for integration with transifex.',
|
description='buildbot plugin for integration with Gitea.',
|
||||||
author='',
|
author='Marvin Pohl',
|
||||||
author_email='',
|
author_email='hello@lab132.com',
|
||||||
url='',
|
url='https://github.com/lab132/buildbot-gitea',
|
||||||
long_description='Transifex webhook',
|
long_description=long_description,
|
||||||
long_description_content_type="text/markdown",
|
long_description_content_type="text/markdown",
|
||||||
packages=['buildbot_transifex'],
|
packages=['buildbot_gitea'],
|
||||||
install_requires=[
|
install_requires=[
|
||||||
"buildbot>=3.0.0"
|
"buildbot>=3.0.0"
|
||||||
],
|
],
|
||||||
entry_points={
|
entry_points={
|
||||||
"buildbot.webhooks": [
|
"buildbot.webhooks": [
|
||||||
"transifex = buildbot_transifex.webhook:transifex"
|
"gitea = buildbot_gitea.webhook:gitea"
|
||||||
|
],
|
||||||
|
"buildbot.steps": [
|
||||||
|
"Gitea = buildbot_gitea.step_source:Gitea"
|
||||||
|
],
|
||||||
|
"buildbot.reporters": [
|
||||||
|
"GiteaStatusPush = buildbot_gitea.reporter:GiteaStatusPush"
|
||||||
|
],
|
||||||
|
"buildbot.util": [
|
||||||
|
"GiteaAuth = buildbot_gitea.auth:GiteaAuth"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
classifiers=[
|
classifiers=[
|
||||||
|
|
Loading…
Reference in New Issue
Block a user