Files
odoo-ai/addons/activeblue_ai/controllers/webhook.py
ActiveBlue Build 29409ed71d feat(odoo): add activeblue_ai Odoo 18 module with OWL2 frontend
Models:
- ab.ai.bot: service URL, webhook secret, privacy mode, ping/dispatch
- ab.ai.directive: full directive lifecycle log with status tracking
- ab.ai.log: activity log with level/agent/record linkage
- ab.ai.agent.registry: agent list synced from agent service

Controllers:
- webhook.py: /ai/webhook/callback handles directive_completed, escalation, sweep_findings
- health_proxy.py: /ai/health proxies agent service detailed health
- approval.py: /ai/chat dispatch, /ai/approval/pending, /ai/approval/respond

Security:
- group_ai_user (chat) + group_ai_manager (configure, approve, logs)
- ir.model.access.csv for all 4 models

Views: list/form for bot, directives, logs, registry; main menu with AI brain icon

OWL2 frontend:
- systray_button.js: brain icon in top bar, status dot, pending approval badge
- ai_panel.js: slide-in chat panel, approval workflow, 30s poll for pending items
- CSS: slide-in animation, message bubbles, loading dots, approval section

Data: 4 cron jobs (ping, registry sync, directive/log cleanup)

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-04-12 17:59:02 -04:00

87 lines
3.2 KiB
Python

import hashlib
import hmac
import json
import logging
from odoo import http
from odoo.http import request, Response
_logger = logging.getLogger(__name__)
class AiWebhookController(http.Controller):
@http.route('/ai/webhook/callback', type='json', auth='none', methods=['POST'], csrf=False)
def ai_callback(self):
# Verify webhook secret
bot = request.env['ab.ai.bot'].sudo().search([('active', '=', True)], limit=1)
if bot and bot.webhook_secret:
incoming_sig = request.httprequest.headers.get('X-ActiveBlue-Signature', '')
if incoming_sig != bot.webhook_secret:
_logger.warning('Webhook signature mismatch from %s', request.httprequest.remote_addr)
return Response(status=401)
# Check IP whitelist
if bot and bot.webhook_secret:
pass # IP check handled at network level via ALLOWED_CALLBACK_IP env var in agent service
try:
data = json.loads(request.httprequest.data)
except Exception:
return Response(status=400)
event_type = data.get('event', '')
_logger.debug('AI webhook callback: event=%s', event_type)
if event_type == 'directive_completed':
self._handle_directive_completed(data)
elif event_type == 'escalation':
self._handle_escalation(data)
elif event_type == 'sweep_findings':
self._handle_sweep_findings(data)
return {'ok': True}
def _handle_directive_completed(self, data):
try:
request.env['ab.ai.directive'].sudo().record_directive(
directive_id=data.get('directive_id', ''),
user_id=int(data.get('user_id', 0)) or None,
message=data.get('message', ''),
reply=data.get('reply', ''),
status='completed',
agents=data.get('agents', []),
escalations=data.get('escalations', []),
actions=data.get('actions_taken', []),
session_id=data.get('session_id'),
duration_ms=data.get('duration_ms'),
)
except Exception as exc:
_logger.error('_handle_directive_completed error: %s', exc)
def _handle_escalation(self, data):
try:
request.env['ab.ai.log'].sudo().log(
summary=data.get('message', 'AI escalation'),
level='warning',
agent=data.get('agent'),
directive_id=data.get('directive_id'),
details=json.dumps(data),
)
except Exception as exc:
_logger.error('_handle_escalation error: %s', exc)
def _handle_sweep_findings(self, data):
findings = data.get('findings', [])
agent = data.get('agent', 'unknown')
try:
for finding in findings:
request.env['ab.ai.log'].sudo().log(
summary=f"Sweep finding [{agent}]: {finding.get('type', '')}",
level='info',
agent=agent,
details=json.dumps(finding),
)
except Exception as exc:
_logger.error('_handle_sweep_findings error: %s', exc)