diff options
author | GitLab Bot <gitlab-bot@gitlab.com> | 2020-07-20 15:26:25 +0300 |
---|---|---|
committer | GitLab Bot <gitlab-bot@gitlab.com> | 2020-07-20 15:26:25 +0300 |
commit | a09983ae35713f5a2bbb100981116d31ce99826e (patch) | |
tree | 2ee2af7bd104d57086db360a7e6d8c9d5d43667a /app/services/incident_management/pager_duty | |
parent | 18c5ab32b738c0b6ecb4d0df3994000482f34bd8 (diff) |
Add latest changes from gitlab-org/gitlab@13-2-stable-ee
Diffstat (limited to 'app/services/incident_management/pager_duty')
-rw-r--r-- | app/services/incident_management/pager_duty/create_incident_issue_service.rb | 72 | ||||
-rw-r--r-- | app/services/incident_management/pager_duty/process_webhook_service.rb | 71 |
2 files changed, 143 insertions, 0 deletions
diff --git a/app/services/incident_management/pager_duty/create_incident_issue_service.rb b/app/services/incident_management/pager_duty/create_incident_issue_service.rb new file mode 100644 index 00000000000..ee0feb49e0d --- /dev/null +++ b/app/services/incident_management/pager_duty/create_incident_issue_service.rb @@ -0,0 +1,72 @@ +# frozen_string_literal: true + +module IncidentManagement + module PagerDuty + class CreateIncidentIssueService < BaseService + include IncidentManagement::Settings + + def initialize(project, incident_payload) + super(project, User.alert_bot, incident_payload) + end + + def execute + return forbidden unless webhook_available? + + issue = create_issue + return error(issue.errors.full_messages.to_sentence, issue) unless issue.valid? + + success(issue) + end + + private + + alias_method :incident_payload, :params + + def create_issue + label_result = find_or_create_incident_label + + # Create an unlabelled issue if we couldn't create the label + # due to a race condition. + # See https://gitlab.com/gitlab-org/gitlab-foss/issues/65042 + extra_params = label_result.success? ? { label_ids: [label_result.payload[:label].id] } : {} + + Issues::CreateService.new( + project, + current_user, + title: issue_title, + description: issue_description, + **extra_params + ).execute + end + + def webhook_available? + Feature.enabled?(:pagerduty_webhook, project) && + incident_management_setting.pagerduty_active? + end + + def forbidden + ServiceResponse.error(message: 'Forbidden', http_status: :forbidden) + end + + def find_or_create_incident_label + ::IncidentManagement::CreateIncidentLabelService.new(project, current_user).execute + end + + def issue_title + incident_payload['title'] + end + + def issue_description + Gitlab::IncidentManagement::PagerDuty::IncidentIssueDescription.new(incident_payload).to_s + end + + def success(issue) + ServiceResponse.success(payload: { issue: issue }) + end + + def error(message, issue = nil) + ServiceResponse.error(payload: { issue: issue }, message: message) + end + end + end +end diff --git a/app/services/incident_management/pager_duty/process_webhook_service.rb b/app/services/incident_management/pager_duty/process_webhook_service.rb new file mode 100644 index 00000000000..5dd3186694a --- /dev/null +++ b/app/services/incident_management/pager_duty/process_webhook_service.rb @@ -0,0 +1,71 @@ +# frozen_string_literal: true + +module IncidentManagement + module PagerDuty + class ProcessWebhookService < BaseService + include Gitlab::Utils::StrongMemoize + include IncidentManagement::Settings + + # https://developer.pagerduty.com/docs/webhooks/webhook-behavior/#size-limit + PAGER_DUTY_PAYLOAD_SIZE_LIMIT = 55.kilobytes + + # https://developer.pagerduty.com/docs/webhooks/v2-overview/#webhook-types + PAGER_DUTY_PROCESSABLE_EVENT_TYPES = %w(incident.trigger).freeze + + def execute(token) + return forbidden unless webhook_setting_active? + return unauthorized unless valid_token?(token) + return bad_request unless valid_payload_size? + + process_incidents + + accepted + end + + private + + def process_incidents + pager_duty_processable_events.each do |event| + ::IncidentManagement::PagerDuty::ProcessIncidentWorker.perform_async(project.id, event['incident']) + end + end + + def pager_duty_processable_events + strong_memoize(:pager_duty_processable_events) do + ::PagerDuty::WebhookPayloadParser + .call(params.to_h) + .filter { |msg| msg['event'].in?(PAGER_DUTY_PROCESSABLE_EVENT_TYPES) } + end + end + + def webhook_setting_active? + Feature.enabled?(:pagerduty_webhook, project) && + incident_management_setting.pagerduty_active? + end + + def valid_token?(token) + token && incident_management_setting.pagerduty_token == token + end + + def valid_payload_size? + Gitlab::Utils::DeepSize.new(params, max_size: PAGER_DUTY_PAYLOAD_SIZE_LIMIT).valid? + end + + def accepted + ServiceResponse.success(http_status: :accepted) + end + + def forbidden + ServiceResponse.error(message: 'Forbidden', http_status: :forbidden) + end + + def unauthorized + ServiceResponse.error(message: 'Unauthorized', http_status: :unauthorized) + end + + def bad_request + ServiceResponse.error(message: 'Bad Request', http_status: :bad_request) + end + end + end +end |