public async Task PublishEventAsync(string hookEventType, object eventContent) { using (_tracer.Step("WebHooksManager.PublishEventAsync: " + hookEventType)) { string jsonString = JsonConvert.SerializeObject(eventContent, JsonSerializerSettings); await _hooksLock.LockOperationAsync(async() => { await PublishToHooksAsync(jsonString, hookEventType); }, "Publishing WebHook event", LockTimeout); } }
public static async Task LockHttpOperationAsync(this IOperationLock lockObj, Func <Task> action, string operationName) { try { await lockObj.LockOperationAsync(action, operationName, TimeSpan.Zero); } catch (LockOperationException ex) { var response = new HttpResponseMessage(HttpStatusCode.Conflict); response.Content = new StringContent(ex.Message); throw new HttpResponseException(response); } }
public async Task <FetchDeploymentRequestResult> FetchDeploy( DeploymentInfoBase deployInfo, bool asyncRequested, Uri requestUri, string targetBranch) { // If Scm is not enabled, we will reject all but one payload for GenericHandler // This is to block the unintended CI with Scm providers like GitHub // Since Generic payload can only be done by user action, we loosely allow // that and assume users know what they are doing. Same applies to git // push/clone endpoint and zip deployment. if (!(_settings.IsScmEnabled() || deployInfo.AllowDeploymentWhileScmDisabled)) { return(FetchDeploymentRequestResult.ForbiddenScmDisabled); } // Else if this app is configured with a url in WEBSITE_USE_ZIP, then fail the deployment // since this is a RunFromZip site and the deployment has no chance of succeeding. else if (_settings.RunFromRemoteZip()) { return(FetchDeploymentRequestResult.ConflictRunFromRemoteZipConfigured); } // for CI payload, we will return Accepted and do the task in the BG // if isAsync is defined, we will return Accepted and do the task in the BG // since autoSwap relies on the response header, deployment has to be synchronously. bool isBackground = asyncRequested || deployInfo.IsContinuous; if (isBackground) { using (_tracer.Step("Start deployment in the background")) { var waitForTempDeploymentCreation = asyncRequested; var successfullyRequested = await PerformBackgroundDeployment( deployInfo, _environment, _settings, _tracer.TraceLevel, requestUri, waitForTempDeploymentCreation); return(successfullyRequested ? FetchDeploymentRequestResult.RunningAynschronously : FetchDeploymentRequestResult.ConflictDeploymentInProgress); } } _tracer.Trace("Attempting to fetch target branch {0}", targetBranch); try { return(await _deploymentLock.LockOperationAsync(async() => { if (PostDeploymentHelper.IsAutoSwapOngoing()) { return FetchDeploymentRequestResult.ConflictAutoSwapOngoing; } await PerformDeployment(deployInfo); return FetchDeploymentRequestResult.RanSynchronously; }, "Performing continuous deployment", TimeSpan.Zero)); } catch (LockOperationException) { if (deployInfo.AllowDeferredDeployment) { // Create a marker file that indicates if there's another deployment to pull // because there was a deployment in progress. using (_tracer.Step("Update pending deployment marker file")) { // REVIEW: This makes the assumption that the repository url is the same. // If it isn't the result would be buggy either way. FileSystemHelpers.SetLastWriteTimeUtc(_markerFilePath, DateTime.UtcNow); } return(FetchDeploymentRequestResult.Pending); } else { return(FetchDeploymentRequestResult.ConflictDeploymentInProgress); } } }
public override async Task ProcessRequestAsync(HttpContext context) { using (_tracer.Step("FetchHandler")) { // Redirect GET /deploy requests to the Kudu root for convenience when using URL from Azure portal if (String.Equals(context.Request.HttpMethod, "GET", StringComparison.OrdinalIgnoreCase)) { context.Response.Redirect("~/"); context.ApplicationInstance.CompleteRequest(); return; } if (!String.Equals(context.Request.HttpMethod, "POST", StringComparison.OrdinalIgnoreCase)) { context.Response.StatusCode = (int)HttpStatusCode.NotFound; context.ApplicationInstance.CompleteRequest(); return; } context.Response.TrySkipIisCustomErrors = true; DeploymentInfo deployInfo = null; // We are going to assume that the branch details are already set by the time it gets here. This is particularly important in the mercurial case, // since Settings hardcodes the default value for Branch to be "master". Consequently, Kudu will NoOp requests for Mercurial commits. string targetBranch = _settings.GetBranch(); try { var request = new HttpRequestWrapper(context.Request); JObject payload = GetPayload(request); DeployAction action = GetRepositoryInfo(request, payload, targetBranch, out deployInfo); if (action == DeployAction.NoOp) { _tracer.Trace("No-op for deployment."); return; } // If Scm is not enabled, we will reject all but one payload for GenericHandler // This is to block the unintended CI with Scm providers like GitHub // Since Generic payload can only be done by user action, we loosely allow // that and assume users know what they are doing. Same applies to git // push/clone endpoint. if (!_settings.IsScmEnabled() && !(deployInfo.Handler is GenericHandler || deployInfo.Handler is DropboxHandler)) { context.Response.StatusCode = (int)HttpStatusCode.Forbidden; context.ApplicationInstance.CompleteRequest(); _tracer.Trace("Scm is not enabled, reject all requests."); return; } } catch (FormatException ex) { _tracer.TraceError(ex); context.Response.StatusCode = 400; context.Response.Write(ex.Message); context.ApplicationInstance.CompleteRequest(); return; } // for CI payload, we will return Accepted and do the task in the BG // if isAsync is defined, we will return Accepted and do the task in the BG // since autoSwap relies on the response header, deployment has to be synchronously. bool isAsync = String.Equals(context.Request.QueryString["isAsync"], "true", StringComparison.OrdinalIgnoreCase); bool isBackground = isAsync || deployInfo.IsContinuous; if (isBackground) { using (_tracer.Step("Start deployment in the background")) { var waitForTempDeploymentCreation = isAsync; await PerformBackgroundDeployment( deployInfo, _environment, _settings, _tracer.TraceLevel, UriHelper.GetRequestUri(context.Request), waitForTempDeploymentCreation); } // to avoid regression, only set location header if isAsync if (isAsync) { // latest deployment keyword reserved to poll till deployment done context.Response.Headers["Location"] = new Uri(UriHelper.GetRequestUri(context.Request), String.Format("/api/deployments/{0}?deployer={1}&time={2}", Constants.LatestDeployment, deployInfo.Deployer, DateTime.UtcNow.ToString("yyy-MM-dd_HH-mm-ssZ"))).ToString(); } context.Response.StatusCode = (int)HttpStatusCode.Accepted; context.ApplicationInstance.CompleteRequest(); return; } _tracer.Trace("Attempting to fetch target branch {0}", targetBranch); try { await _deploymentLock.LockOperationAsync(async() => { if (PostDeploymentHelper.IsAutoSwapOngoing()) { context.Response.StatusCode = (int)HttpStatusCode.Conflict; context.Response.Write(Resources.Error_AutoSwapDeploymentOngoing); context.ApplicationInstance.CompleteRequest(); return; } await PerformDeployment(deployInfo); }, "Performing continuous deployment", TimeSpan.Zero); } catch (LockOperationException) { // Create a marker file that indicates if there's another deployment to pull // because there was a deployment in progress. using (_tracer.Step("Update pending deployment marker file")) { // REVIEW: This makes the assumption that the repository url is the same. // If it isn't the result would be buggy either way. FileSystemHelpers.SetLastWriteTimeUtc(_markerFilePath, DateTime.UtcNow); } // Return a http 202: the request has been accepted for processing, but the processing has not been completed. context.Response.StatusCode = (int)HttpStatusCode.Accepted; context.ApplicationInstance.CompleteRequest(); } } }