Skip to content

Commit 89162bc

Browse files
Christinarlongandrewshie-sentry
authored andcommitted
ref(sentry apps): Use new error design for sentry app errors (#83355)
1 parent fdac79a commit 89162bc

File tree

7 files changed

+105
-77
lines changed

7 files changed

+105
-77
lines changed

src/sentry/sentry_apps/api/bases/sentryapps.py

+30-31
Original file line numberDiff line numberDiff line change
@@ -6,18 +6,16 @@
66
from typing import Any
77

88
import sentry_sdk
9-
from rest_framework.exceptions import PermissionDenied
109
from rest_framework.permissions import BasePermission
1110
from rest_framework.request import Request
1211
from rest_framework.response import Response
1312

1413
from sentry.api.authentication import ClientIdSecretAuthentication
1514
from sentry.api.base import Endpoint
16-
from sentry.api.exceptions import ResourceDoesNotExist
1715
from sentry.api.permissions import SentryPermission, StaffPermissionMixin
1816
from sentry.auth.staff import is_active_staff
1917
from sentry.auth.superuser import is_active_superuser, superuser_has_permission
20-
from sentry.coreapi import APIError, APIUnauthorized
18+
from sentry.coreapi import APIError
2119
from sentry.integrations.api.bases.integration import PARANOID_GET
2220
from sentry.middleware.stats import add_request_metric_tags
2321
from sentry.models.organization import OrganizationStatus
@@ -103,10 +101,9 @@ def has_object_permission(self, request: Request, view, context: RpcUserOrganiza
103101

104102
# User must be a part of the Org they're trying to create the app in.
105103
if context.organization.status != OrganizationStatus.ACTIVE or not context.member:
106-
raise SentryAppIntegratorError(
107-
APIUnauthorized(
108-
"User must be a part of the Org they're trying to create the app in"
109-
)
104+
raise SentryAppError(
105+
message="User must be a part of the Org they're trying to create the app in",
106+
status_code=401,
110107
)
111108

112109
assert request.method, "method must be present in request to get permissions"
@@ -131,7 +128,12 @@ def handle_exception_with_details(self, request, exc, handler_context=None, scop
131128

132129
def _handle_sentry_app_exception(self, exception: Exception):
133130
if isinstance(exception, SentryAppIntegratorError) or isinstance(exception, SentryAppError):
134-
response = Response({"detail": str(exception)}, status=exception.status_code)
131+
response_body: dict[str, Any] = {"detail": exception.message}
132+
133+
if public_context := exception.public_context:
134+
response_body.update({"context": public_context})
135+
136+
response = Response(response_body, status=exception.status_code)
135137
response.exception = True
136138
return response
137139

@@ -154,7 +156,7 @@ def _get_organization_slug(self, request: Request):
154156
organization_slug = request.data.get("organization")
155157
if not organization_slug or not isinstance(organization_slug, str):
156158
error_message = "Please provide a valid value for the 'organization' field."
157-
raise SentryAppError(ResourceDoesNotExist(error_message))
159+
raise SentryAppError(message=error_message, status_code=404)
158160
return organization_slug
159161

160162
def _get_organization_for_superuser_or_staff(
@@ -166,7 +168,7 @@ def _get_organization_for_superuser_or_staff(
166168

167169
if context is None:
168170
error_message = f"Organization '{organization_slug}' does not exist."
169-
raise SentryAppError(ResourceDoesNotExist(error_message))
171+
raise SentryAppError(message=error_message, status_code=404)
170172

171173
return context
172174

@@ -178,7 +180,7 @@ def _get_organization_for_user(
178180
)
179181
if context is None or context.member is None:
180182
error_message = f"User does not belong to the '{organization_slug}' organization."
181-
raise SentryAppIntegratorError(PermissionDenied(to_single_line_str(error_message)))
183+
raise SentryAppError(message=to_single_line_str(error_message), status_code=403)
182184
return context
183185

184186
def _get_org_context(self, request: Request) -> RpcUserOrganizationContext:
@@ -260,10 +262,13 @@ def has_object_permission(self, request: Request, view, sentry_app: RpcSentryApp
260262
# if app is unpublished, user must be in the Org who owns the app.
261263
if not sentry_app.is_published:
262264
if not any(sentry_app.owner_id == org.id for org in organizations):
263-
raise SentryAppIntegratorError(
264-
APIUnauthorized(
265-
"User must be in the app owner's organization for unpublished apps"
266-
)
265+
raise SentryAppError(
266+
message="User must be in the app owner's organization for unpublished apps",
267+
status_code=403,
268+
public_context={
269+
"integration": sentry_app.slug,
270+
"user_organizations": [org.slug for org in organizations],
271+
},
267272
)
268273

269274
# TODO(meredith): make a better way to allow for public
@@ -299,9 +304,7 @@ def convert_args(
299304
try:
300305
sentry_app = SentryApp.objects.get(slug__id_or_slug=sentry_app_id_or_slug)
301306
except SentryApp.DoesNotExist:
302-
raise SentryAppIntegratorError(
303-
ResourceDoesNotExist("Could not find the requested sentry app"), status_code=404
304-
)
307+
raise SentryAppError(message="Could not find the requested sentry app", status_code=404)
305308

306309
self.check_object_permissions(request, sentry_app)
307310

@@ -320,9 +323,7 @@ def convert_args(
320323
else:
321324
sentry_app = app_service.get_sentry_app_by_slug(slug=sentry_app_id_or_slug)
322325
if sentry_app is None:
323-
raise SentryAppIntegratorError(
324-
ResourceDoesNotExist("Could not find the requested sentry app"), status_code=404
325-
)
326+
raise SentryAppError(message="Could not find the requested sentry app", status_code=404)
326327

327328
self.check_object_permissions(request, sentry_app)
328329

@@ -353,8 +354,10 @@ def has_object_permission(self, request: Request, view, organization):
353354
else ()
354355
)
355356
if not any(organization.id == org.id for org in organizations):
356-
raise SentryAppIntegratorError(
357-
APIUnauthorized("User must belong to the given organization"), status_code=403
357+
raise SentryAppError(
358+
message="User must belong to the given organization",
359+
status_code=403,
360+
public_context={"user_organizations": [org.slug for org in organizations]},
358361
)
359362
assert request.method, "method must be present in request to get permissions"
360363
return ensure_scoped_permission(request, self.scope_map.get(request.method))
@@ -379,9 +382,7 @@ def convert_args(self, request: Request, organization_id_or_slug, *args, **kwarg
379382
)
380383

381384
if organization is None:
382-
raise SentryAppIntegratorError(
383-
ResourceDoesNotExist("Could not find requested organization"), status_code=404
384-
)
385+
raise SentryAppError(message="Could not find requested organization", status_code=404)
385386
self.check_object_permissions(request, organization)
386387

387388
kwargs["organization"] = organization
@@ -437,9 +438,7 @@ def has_object_permission(self, request: Request, view, installation):
437438
or not org_context.member
438439
or org_context.organization.status != OrganizationStatus.ACTIVE
439440
):
440-
raise SentryAppIntegratorError(
441-
ResourceDoesNotExist("Given organization is not valid"), status_code=404
442-
)
441+
raise SentryAppError(message="Given organization is not valid", status_code=404)
443442

444443
assert request.method, "method must be present in request to get permissions"
445444
return ensure_scoped_permission(request, self.scope_map.get(request.method))
@@ -452,8 +451,8 @@ def convert_args(self, request: Request, uuid, *args, **kwargs):
452451
installations = app_service.get_many(filter=dict(uuids=[uuid]))
453452
installation = installations[0] if installations else None
454453
if installation is None:
455-
raise SentryAppIntegratorError(
456-
ResourceDoesNotExist("Could not find given sentry app installation"),
454+
raise SentryAppError(
455+
message="Could not find given sentry app installation",
457456
status_code=404,
458457
)
459458

src/sentry/sentry_apps/external_issues/external_issue_creator.py

+4-1
Original file line numberDiff line numberDiff line change
@@ -46,4 +46,7 @@ def run(self) -> PlatformExternalIssue:
4646
"sentry_app_slug": self.install.sentry_app.slug,
4747
},
4848
)
49-
raise SentryAppSentryError(e) from e
49+
raise SentryAppSentryError(
50+
message="Failed to create external issue obj",
51+
webhook_context={"error": str(e)},
52+
) from e

src/sentry/sentry_apps/external_issues/issue_link_creator.py

+1-2
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@
33

44
from django.db import router, transaction
55

6-
from sentry.coreapi import APIUnauthorized
76
from sentry.models.group import Group
87
from sentry.sentry_apps.external_issues.external_issue_creator import ExternalIssueCreator
98
from sentry.sentry_apps.external_requests.issue_link_requester import IssueLinkRequester
@@ -33,7 +32,7 @@ def run(self) -> PlatformExternalIssue:
3332

3433
def _verify_action(self) -> None:
3534
if self.action not in VALID_ACTIONS:
36-
raise SentryAppSentryError(APIUnauthorized(f"Invalid action '{self.action}'"))
35+
raise SentryAppSentryError(message=f"Invalid action: {self.action}", status_code=401)
3736

3837
def _make_external_request(self) -> dict[str, Any]:
3938
response = IssueLinkRequester(
+21-25
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
from enum import Enum
2+
from typing import Any
23

34

45
class SentryAppErrorType(Enum):
@@ -7,43 +8,38 @@ class SentryAppErrorType(Enum):
78
SENTRY = "sentry"
89

910

10-
# Represents a user/client error that occured during a Sentry App process
11-
class SentryAppError(Exception):
12-
error_type = SentryAppErrorType.CLIENT
13-
status_code = 400
11+
class SentryAppBaseError(Exception):
12+
error_type: SentryAppErrorType
13+
status_code: int
1414

1515
def __init__(
1616
self,
17-
error: Exception | None = None,
17+
message: str,
1818
status_code: int | None = None,
19+
public_context: dict[str, Any] | None = None,
20+
webhook_context: dict[str, Any] | None = None,
1921
) -> None:
20-
if status_code:
21-
self.status_code = status_code
22+
self.status_code = status_code or self.status_code
23+
# Info that gets sent only to the integrator via webhook
24+
self.public_context = public_context or {}
25+
# Info that gets sent to the end user via endpoint Response AND sent to integrator
26+
self.webhook_context = webhook_context or {}
27+
self.message = message
28+
29+
30+
# Represents a user/client error that occured during a Sentry App process
31+
class SentryAppError(SentryAppBaseError):
32+
error_type = SentryAppErrorType.CLIENT
33+
status_code = 400
2234

2335

2436
# Represents an error caused by a 3p integrator during a Sentry App process
25-
class SentryAppIntegratorError(Exception):
37+
class SentryAppIntegratorError(SentryAppBaseError):
2638
error_type = SentryAppErrorType.INTEGRATOR
2739
status_code = 400
2840

29-
def __init__(
30-
self,
31-
error: Exception | None = None,
32-
status_code: int | None = None,
33-
) -> None:
34-
if status_code:
35-
self.status_code = status_code
36-
3741

3842
# Represents an error that's our (sentry's) fault
39-
class SentryAppSentryError(Exception):
43+
class SentryAppSentryError(SentryAppBaseError):
4044
error_type = SentryAppErrorType.SENTRY
4145
status_code = 500
42-
43-
def __init__(
44-
self,
45-
error: Exception | None = None,
46-
status_code: int | None = None,
47-
) -> None:
48-
if status_code:
49-
self.status_code = status_code

tests/sentry/sentry_apps/api/bases/test_sentryapps.py

+7-7
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
SentryAppPermission,
1515
add_integration_platform_metric_tag,
1616
)
17-
from sentry.sentry_apps.utils.errors import SentryAppIntegratorError
17+
from sentry.sentry_apps.utils.errors import SentryAppError
1818
from sentry.testutils.cases import TestCase
1919
from sentry.testutils.helpers.options import override_options
2020
from sentry.testutils.silo import control_silo_test
@@ -43,7 +43,7 @@ def test_request_user_is_not_app_owner_fails(self):
4343
request=self.make_request(user=non_owner, method="GET"), endpoint=self.endpoint
4444
)
4545

46-
with pytest.raises(SentryAppIntegratorError):
46+
with pytest.raises(SentryAppError):
4747
self.permission.has_object_permission(self.request, None, self.sentry_app)
4848

4949
def test_has_permission(self):
@@ -83,7 +83,7 @@ def test_superuser_has_permission_read_only(self):
8383

8484
request._request.method = "POST"
8585

86-
with pytest.raises(SentryAppIntegratorError):
86+
with pytest.raises(SentryAppError):
8787
self.permission.has_object_permission(request, None, self.sentry_app)
8888

8989
@override_options({"superuser.read-write.ga-rollout": True})
@@ -143,7 +143,7 @@ def test_retrieves_sentry_app(self):
143143
assert kwargs["sentry_app"].id == self.sentry_app.id
144144

145145
def test_raises_when_sentry_app_not_found(self):
146-
with pytest.raises(SentryAppIntegratorError):
146+
with pytest.raises(SentryAppError):
147147
self.endpoint.convert_args(self.request, "notanapp")
148148

149149

@@ -181,7 +181,7 @@ def test_request_user_not_in_organization(self):
181181
self.make_request(user=user, method="GET"), endpoint=self.endpoint
182182
)
183183

184-
with pytest.raises(SentryAppIntegratorError):
184+
with pytest.raises(SentryAppError):
185185
self.permission.has_object_permission(request, None, self.installation)
186186

187187
def test_superuser_has_permission(self):
@@ -206,7 +206,7 @@ def test_superuser_has_permission_read_only(self):
206206
assert self.permission.has_object_permission(request, None, self.installation)
207207

208208
request._request.method = "POST"
209-
with pytest.raises(SentryAppIntegratorError):
209+
with pytest.raises(SentryAppError):
210210
self.permission.has_object_permission(request, None, self.installation)
211211

212212
@override_options({"superuser.read-write.ga-rollout": True})
@@ -242,7 +242,7 @@ def test_retrieves_installation(self):
242242
assert kwargs["installation"].id == self.installation.id
243243

244244
def test_raises_when_sentry_app_not_found(self):
245-
with pytest.raises(SentryAppIntegratorError):
245+
with pytest.raises(SentryAppError):
246246
self.endpoint.convert_args(self.request, "1234")
247247

248248

tests/sentry/sentry_apps/api/endpoints/test_sentry_app_details.py

+34-5
Original file line numberDiff line numberDiff line change
@@ -85,10 +85,26 @@ def test_retrieving_internal_integrations_as_org_member(self):
8585
def test_internal_integrations_are_not_public(self):
8686
# User not in Org who owns the Integration
8787
self.login_as(self.create_user())
88-
self.get_error_response(self.internal_integration.slug, status_code=400)
88+
response = self.get_error_response(self.internal_integration.slug, status_code=403)
89+
assert (
90+
response.data["detail"]
91+
== "User must be in the app owner's organization for unpublished apps"
92+
)
93+
assert response.data["context"] == {
94+
"integration": self.internal_integration.slug,
95+
"user_organizations": [],
96+
}
8997

9098
def test_users_do_not_see_unowned_unpublished_apps(self):
91-
self.get_error_response(self.unowned_unpublished_app.slug, status_code=400)
99+
response = self.get_error_response(self.unowned_unpublished_app.slug, status_code=403)
100+
assert (
101+
response.data["detail"]
102+
== "User must be in the app owner's organization for unpublished apps"
103+
)
104+
assert response.data["context"] == {
105+
"integration": self.unowned_unpublished_app.slug,
106+
"user_organizations": [self.organization.slug],
107+
}
92108

93109

94110
@control_silo_test
@@ -440,13 +456,22 @@ def test_cannot_update_features_published_app_permissions(self):
440456

441457
def test_cannot_update_non_owned_apps(self):
442458
app = self.create_sentry_app(name="SampleApp", organization=self.create_organization())
443-
self.get_error_response(
459+
response = self.get_error_response(
444460
app.slug,
445461
name="NewName",
446462
webhookUrl="https://newurl.com",
447-
status_code=400,
463+
status_code=403,
448464
)
449465

466+
assert (
467+
response.data["detail"]
468+
== "User must be in the app owner's organization for unpublished apps"
469+
)
470+
assert response.data["context"] == {
471+
"integration": app.slug,
472+
"user_organizations": [self.organization.slug],
473+
}
474+
450475
def test_superuser_can_update_popularity(self):
451476
self.login_as(user=self.superuser, superuser=True)
452477
app = self.create_sentry_app(name="SampleApp", organization=self.organization)
@@ -741,12 +766,16 @@ def test_staff_cannot_delete_unpublished_app(self):
741766
self.login_as(staff_user, staff=False)
742767
response = self.get_error_response(
743768
self.unpublished_app.slug,
744-
status_code=400,
769+
status_code=403,
745770
)
746771
assert (
747772
response.data["detail"]
748773
== "User must be in the app owner's organization for unpublished apps"
749774
)
775+
assert response.data["context"] == {
776+
"integration": self.unpublished_app.slug,
777+
"user_organizations": [],
778+
}
750779

751780
assert not AuditLogEntry.objects.filter(
752781
event=audit_log.get_event_id("SENTRY_APP_REMOVE")

0 commit comments

Comments
 (0)