discourse/app/jobs/regular/emit_web_hook_event.rb

135 lines
3.9 KiB
Ruby
Raw Normal View History

2016-06-16 01:49:57 +08:00
require 'excon'
module Jobs
class EmitWebHookEvent < Jobs::Base
PING_EVENT = 'ping'.freeze
MAX_RETRY_COUNT = 4.freeze
RETRY_BACKOFF = 5
2016-06-16 01:49:57 +08:00
def execute(args)
%i{
web_hook_id
event_type
}.each do |key|
raise Discourse::InvalidParameters.new(key) unless args[key].present?
end
@orig_args = args.dup
web_hook = WebHook.find_by(id: args[:web_hook_id])
2017-10-02 12:50:22 +08:00
raise Discourse::InvalidParameters.new(:web_hook_id) if web_hook.blank?
unless ping_event?(args[:event_type])
return unless web_hook.active?
return if web_hook.group_ids.present? && (args[:group_id].present? ||
!web_hook.group_ids.include?(args[:group_id]))
return if web_hook.category_ids.present? && (!args[:category_id].present? ||
!web_hook.category_ids.include?(args[:category_id]))
raise Discourse::InvalidParameters.new(:payload) unless args[:payload].present?
args[:payload] = JSON.parse(args[:payload])
end
web_hook_request(args, web_hook)
2016-06-16 01:49:57 +08:00
end
private
def guardian
Guardian.new(Discourse.system_user)
end
def ping_event?(event_type)
PING_EVENT == event_type.to_s
end
def build_web_hook_body(args, web_hook)
body = {}
event_type = args[:event_type].to_s
if ping_event?(event_type)
body[:ping] = 'OK'
else
body[event_type] = args[:payload]
end
new_body = Plugin::Filter.apply(:after_build_web_hook_body, self, body)
MultiJson.dump(new_body)
end
def web_hook_request(args, web_hook)
2017-12-11 16:15:50 +08:00
uri = URI(web_hook.payload_url.strip)
conn = Excon.new(
uri.to_s,
ssl_verify_peer: web_hook.verify_certificate,
retry_limit: 0
)
2016-06-16 01:49:57 +08:00
body = build_web_hook_body(args, web_hook)
web_hook_event = WebHookEvent.create!(web_hook_id: web_hook.id)
response = nil
2016-06-16 01:49:57 +08:00
begin
2017-07-28 09:20:09 +08:00
content_type =
case web_hook.content_type
when WebHook.content_types['application/x-www-form-urlencoded']
'application/x-www-form-urlencoded'
else
'application/json'
end
2016-06-16 01:49:57 +08:00
headers = {
'Accept' => '*/*',
'Connection' => 'close',
'Content-Length' => body.bytesize,
2016-06-16 01:49:57 +08:00
'Content-Type' => content_type,
'Host' => uri.host,
'User-Agent' => "Discourse/#{Discourse::VERSION::STRING}",
'X-Discourse-Instance' => Discourse.base_url,
2016-06-16 01:49:57 +08:00
'X-Discourse-Event-Id' => web_hook_event.id,
'X-Discourse-Event-Type' => args[:event_type]
2016-06-16 01:49:57 +08:00
}
headers['X-Discourse-Event'] = args[:event_name].to_s if args[:event_name].present?
2016-06-16 01:49:57 +08:00
if web_hook.secret.present?
headers['X-Discourse-Event-Signature'] = "sha256=#{OpenSSL::HMAC.hexdigest("sha256", web_hook.secret, body)}"
2016-06-16 01:49:57 +08:00
end
now = Time.zone.now
response = conn.post(headers: headers, body: body)
web_hook_event.update!(
headers: MultiJson.dump(headers),
payload: body,
status: response.status,
response_headers: MultiJson.dump(response.headers),
response_body: response.body,
duration: ((Time.zone.now - now) * 1000).to_i
)
MessageBus.publish("/web_hook_events/#{web_hook.id}", {
web_hook_event_id: web_hook_event.id,
event_type: args[:event_type]
}, user_ids: User.human_users.staff.pluck(:id))
2016-06-16 01:49:57 +08:00
rescue
web_hook_event.destroy!
end
retry_web_hook if response&.status != 200
end
def retry_web_hook
if SiteSetting.retry_web_hook_events?
@orig_args[:retry_count] = (@orig_args[:retry_count] || 0) + 1
return if @orig_args[:retry_count] > MAX_RETRY_COUNT
delay = RETRY_BACKOFF**(@orig_args[:retry_count] - 1)
Jobs.enqueue_in(delay.minutes, :emit_web_hook_event, @orig_args)
end
2016-06-16 01:49:57 +08:00
end
end
end