Caution
Buildbot is deprecating Python 2.7. This is one of the latest release supporting it. More info.
2.5.14. Change Hooks¶
The /change_hook
url is a magic URL which will accept HTTP requests and translate them into changes for buildbot.
Implementations (such as a trivial json-based endpoint and a GitHub implementation) can be found in master/buildbot/www/hooks.
The format of the url is /change_hook/DIALECT
where DIALECT is a package within the hooks directory.
Change_hook is disabled by default and each DIALECT has to be enabled separately, for security reasons
An example www configuration line which enables change_hook and two DIALECTS:
c['www'] = dict(
change_hook_dialects={
'base': True,
'somehook': {'option1':True,
'option2':False},
},
)
Within the www
config dictionary arguments, the change_hook
key enables/disables the module and change_hook_dialects
whitelists DIALECTs where the keys are the module names and the values are optional arguments which will be passed to the hooks.
The master/contrib/post_build_request.py script allows for the submission of an arbitrary change request.
Run post_build_request.py --help for more information.
The base
dialect must be enabled for this to work.
2.5.14.1. Change Hooks Auth¶
By default change hook URL is not protected. Some hooks implement their own authentication method. Other requires the generic method to be secured.
To protect URL against unauthorized access you you may use change_hook_auth
option.
Note
This method uses HTTP BasicAuth
, it implies the use of SSL via Reverse Proxy Configuration in order to be fully secured.
from twisted.cred import strcred
c['www'] = dict(...,
change_hook_auth=[strcred.makeChecker("file:changehook.passwd")],
)
create a file changehook.passwd
with content:
user:password
change_hook_auth
should be a list of ICredentialsChecker
.
See the details of available options in Twisted documentation.
2.5.14.2. Mercurial hook¶
The Mercurial hook uses the base dialect:
c['www'] = dict(
...,
change_hook_dialects={'base': True},
)
Once this is configured on your buildmaster add the following hook on your server-side Mercurial repository’s hgrc
:
[hooks]
changegroup.buildbot = python:/path/to/hgbuildbot.py:hook
You’ll find master/contrib/hgbuildbot.py, and its inline documentation, in the buildbot-contrib repository.
2.5.14.3. GitHub hook¶
Note
There is a standalone HTTP server available for receiving GitHub notifications as well: master/contrib/github_buildbot.py. This script may be useful in cases where you cannot expose the WebStatus for public consumption. Alternatively, you can setup a reverse proxy Reverse Proxy Configuration
The GitHub hook has the following parameters:
secret
(default None)- Secret token to use to validate payloads.
strict
(default False)- If the hook must be strict regarding valid payloads. If the value is False (default), the signature will only be checked if a secret is specified and a signature was supplied with the payload. If the value is True, a secret must be provided, and payloads without signature will be ignored.
codebase
(default None)- The codebase value to include with created changes. If the value is a function (or any other callable), it will be called with the GitHub event payload as argument and the function must return the codebase value to use for the event.
class
(default None)A class to be used for processing incoming payloads. If the value is None (default), the default class –
buildbot.www.hooks.github.GitHubEventHandler
– will be used. The default class handles ping, push and pull_request events only. If you’d like to handle other events (see Event Types & Payloads for more information), you’d need to subclassGitHubEventHandler
and add handler methods for the corresponding events. For example, if you’d like to handle blah events, your code should look something like this:from buildbot.www.hooks.github import GitHubEventHandler class MyBlahHandler(GitHubEventHandler): def handle_blah(self, payload): # Do some magic here return [], 'git'
skips
(default[r'\[ *skip *ci *\]', r'\[ *ci *skip *\]']
)A list of regex pattern makes buildbot ignore the push event. For instance, if user push 3 commits and the commit message of branch head contains a key string
[ci skip]
, buildbot will ignore this push event.If you want to disable the skip checking, please set it to
[]
.github_api_endpoint
(defaulthttps://api.github.com
)- If you have a self-host GitHub Enterprise installation, please set this url properly.
token
- If your GitHub or GitHub Enterprise instance does not allow anonymous communication, you need to provide an access token. Instructions can be found here <https://help.github.com/articles/creating-a-personal-access-token-for-the-command-line/>
pullrequest_ref
(defaultmerge
)- Remote ref to test if a pull request is sent to the endpoint. See the GitHub developer manual
for possible values for pull requests. (e.g.
head
)
The simplest way to use GitHub hook is as follows:
c['www'] = dict(
change_hook_dialects={'github': {}},
)
Having added this line, you should add a webhook for your GitHub project (see Creating Webhooks page at GitHub). The parameters are:
- Payload URL
- This URL should point to
/change_hook/github
relative to the root of the web status. For example, if the base URL ishttp://builds.example.com/buildbot
, then point GitHub tohttp://builds.example.com/buildbot/change_hook/github
. To specify a project associated to the repository, append?project=name
to the URL. - Content Type
- Specify
application/x-www-form-urlencoded
orapplication/json
. - Secret
Any value. If you provide a non-empty value (recommended), make sure that your hook is configured to use it:
c['www'] = dict( ..., change_hook_dialects={ 'github': { 'secret': 'MY-SECRET', }, }, )
- Which events would you like to trigger this webhook?
- Click –
Let me select individual events
, then selectPush
andPull request
– other kind of events are not currently supported.
And then press the Add Webhook
button.
Github hook creates 3 kinds of changes, distinguishable by their category
field:
None
: This change is a push to a branch.Use
util.ChangeFilter(category=None, repository="http://github.com/<org>/<project>")
'tag'
: This change is a push to a tag.Use
util.ChangeFilter(category='tag', repository="http://github.com/<org>/<project>")
'pull'
: This change is from a pull-request creation or update.Use
util.ChangeFilter(category='pull', repository="http://github.com/<org>/<project>")
In this case, theGitHub
step must be used instead of the standardGit
in order to be able to pull GitHub’s magic refs. With this method, theGitHub
step will always checkout the branch merged with latest master. This allows to test the result of the merge instead of just the source branch. Note that you can use theGitHub
for all categories of event.
Warning
The incoming HTTP requests for this hook are not authenticated by default. Anyone who can access the web server can “fake” a request from GitHub, potentially causing the buildmaster to run arbitrary code.
To protect URL against unauthorized access you should use Change Hooks Auth option.
Then change the the Payload URL
of your GitHub webhook to https://user:password@builds.example.com/bbot/change_hook/github
.
2.5.14.4. BitBucket hook¶
The BitBucket hook is as simple as GitHub one and it takes no options.
c['www'] = dict(...,
change_hook_dialects={'bitbucket': True},
)
When this is setup you should add a POST service pointing to /change_hook/bitbucket
relative to the root of the web status.
For example, it the grid URL is http://builds.example.com/bbot/grid
, then point BitBucket to http://builds.example.com/change_hook/bitbucket
.
To specify a project associated to the repository, append ?project=name
to the URL.
Note that there is a standalone HTTP server available for receiving BitBucket notifications, as well: master/contrib/bitbucket_buildbot.py. This script may be useful in cases where you cannot expose the WebStatus for public consumption.
Warning
As in the previous case, the incoming HTTP requests for this hook are not authenticated by default. Anyone who can access the web status can “fake” a request from BitBucket, potentially causing the buildmaster to run arbitrary code.
To protect URL against unauthorized access you should use Change Hooks Auth option.
Then, create a BitBucket service hook (see https://confluence.atlassian.com/display/BITBUCKET/POST+Service+Management) with a WebHook URL like https://user:password@builds.example.com/bbot/change_hook/bitbucket
.
Note that as before, not using change_hook_auth
can expose you to security risks.
2.5.14.5. Bitbucket Cloud hook¶
c['www'] = dict(
...,
change_hook_dialects={'bitbucketcloud': {}},
)
When this is setup you should add a webhook pointing to /change_hook/bitbucketcloud
relative to the root of the web status.
According to the type of the event, the change category is set to push
, pull-created
, pull-rejected
, pull-updated
, pull-fulfilled
or ref-deleted
.
The Bitbucket Cloud hook may have the following optional parameters:
codebase
(default None)- The codebase value to include with changes or a callable object that will be passed the payload in order to get it.
Warning
The incoming HTTP requests for this hook are not authenticated by default. Anyone who can access the web server can “fake” a request from Bitbucket Cloud, potentially causing the buildmaster to run arbitrary code
2.5.14.6. Bitbucket Server hook¶
c['www'] = dict(
...,
change_hook_dialects={'bitbucketserver': {}},
)
When this is setup you should add a webhook pointing to /change_hook/bitbucketserver
relative to the root of the web status.
According to the type of the event, the change category is set to push
, pull-created
, pull-rejected
, pull-updated
, pull-fulfilled
or ref-deleted
.
The Bitbucket Server hook may have the following optional parameters:
codebase
(default None)- The codebase value to include with changes or a callable object that will be passed the payload in order to get it.
Warning
The incoming HTTP requests for this hook are not authenticated by default. Anyone who can access the web server can “fake” a request from Bitbucket Server, potentially causing the buildmaster to run arbitrary code
Note
This hook requires the bitbucket-webhooks plugin (see https://marketplace.atlassian.com/plugins/nl.topicus.bitbucket.bitbucket-webhooks/server/overview).
2.5.14.7. Poller hook¶
The poller hook allows you to use GET or POST requests to trigger polling. One advantage of this is your buildbot instance can poll at launch (using the pollAtLaunch flag) to get changes that happened while it was down, but then you can still use a commit hook to get fast notification of new changes.
Suppose you have a poller configured like this:
c['change_source'] = SVNPoller(
repourl="https://amanda.svn.sourceforge.net/svnroot/amanda/amanda",
split_file=split_file_branches,
pollInterval=24*60*60,
pollAtLaunch=True,
)
And you configure your WebStatus to enable this hook:
c['www'] = dict(...,
change_hook_dialects={'poller': True},
)
Then you will be able to trigger a poll of the SVN repository by poking the /change_hook/poller
URL from a commit hook like this:
curl -s -F poller=https://amanda.svn.sourceforge.net/svnroot/amanda/amanda \
http://yourbuildbot/change_hook/poller
If no poller
argument is provided then the hook will trigger polling of all polling change sources.
You can restrict which pollers the webhook has access to using the allowed
option:
c['www'] = dict(...,
change_hook_dialects={'poller': {'allowed': ['https://amanda.svn.sourceforge.net/svnroot/amanda/amanda']}}
)
2.5.14.8. GitLab hook¶
c['www'] = dict(...,
change_hook_dialects={
'gitlab' : {
'secret': '...',
},
},
)
The GitLab hook has the following parameters:
secret
(default None)- Secret token to use to validate payloads.
When this is setup you should add a POST service pointing to /change_hook/gitlab
relative to the root of the web status.
For example, it the grid URL is http://builds.example.com/bbot/grid
, then point GitLab to http://builds.example.com/change_hook/gitlab
.
The project and/or codebase can also be passed in the URL by appending ?project=name
or ?codebase=foo
to the URL.
These parameters will be passed along to the scheduler.
Note
To handle merge requests from forks properly, it’s easiest to use a GitLab source step rather than a Git source step.
Note
Your Git or GitLab step must be configured with a git@ repourl, not a https: one, else the change from the webhook will not trigger a build.
Warning
As in the previous case, the incoming HTTP requests for this hook are not authenticated by default. Anyone who can access the web status can “fake” a request from your GitLab server, potentially causing the buildmaster to run arbitrary code.
Warning
When applicable, you need to permit access to internal/local networks.
See https://docs.gitlab.com/ee/security/webhooks.html
for details.
To protect URL against unauthorized access you should either
- set secret token in the configuration above, then set it in the GitLab service hook declaration, or
- use the Change Hooks Auth option. Then, create a GitLab service hook (see
https://your.gitlab.server/help/web_hooks
) with a WebHook URL likehttps://user:password@builds.example.com/bbot/change_hook/gitlab
.
Note that as before, not using change_hook_auth
can expose you to security risks.
2.5.14.9. Gitorious Hook¶
The Gitorious hook is as simple as GitHub one and it also takes no options.
c['www'] = dict(...,
change_hook_dialects={'gitorious': True},
)
When this is setup you should add a POST service pointing to /change_hook/gitorious
relative to the root of the web status.
For example, it the grid URL is http://builds.example.com/bbot/grid
, then point Gitorious to http://builds.example.com/change_hook/gitorious
.
Warning
As in the previous case, the incoming HTTP requests for this hook are not authenticated by default. Anyone who can access the web status can “fake” a request from your Gitorious server, potentially causing the buildmaster to run arbitrary code.
To protect URL against unauthorized access you should use Change Hooks Auth option.
Then, create a Gitorious web hook with a WebHook URL like https://user:password@builds.example.com/bbot/change_hook/gitorious
.
Note that as before, not using change_hook_auth
can expose you to security risks.
Note
Web hooks are only available for local Gitorious installations, since this feature is not offered as part of Gitorious.org yet.
2.5.14.10. Custom Hooks¶
Custom hooks are supported via the Plugin Infrastructure in Buildbot mechanism.
You can subclass any of the available hook handler class available in buildbot.www.hooks
and register it in the plugin system, via a custom python module.
For convenience, you ca also use the generic option custom_class
e.g:
from buildbot.plugins import webhooks
class CustomBase(webhooks.base):
def getChanges(self, request):
args = request.args
chdict = dict(
revision=args.get(b'revision'),
repository=args.get(b'repository'),
project=args.get(b'project'),
codebase=args.get(b'codebase'))
return ([chdict], None)
c['www'] = dict(...,
change_hook_dialects={
'base' : {
'custom_class': CustomBase,
},
},
)