6
6
from typing import Any
7
7
8
8
import sentry_sdk
9
- from rest_framework .exceptions import PermissionDenied
10
9
from rest_framework .permissions import BasePermission
11
10
from rest_framework .request import Request
12
11
from rest_framework .response import Response
13
12
14
13
from sentry .api .authentication import ClientIdSecretAuthentication
15
14
from sentry .api .base import Endpoint
16
- from sentry .api .exceptions import ResourceDoesNotExist
17
15
from sentry .api .permissions import SentryPermission , StaffPermissionMixin
18
16
from sentry .auth .staff import is_active_staff
19
17
from sentry .auth .superuser import is_active_superuser , superuser_has_permission
20
- from sentry .coreapi import APIError , APIUnauthorized
18
+ from sentry .coreapi import APIError
21
19
from sentry .integrations .api .bases .integration import PARANOID_GET
22
20
from sentry .middleware .stats import add_request_metric_tags
23
21
from sentry .models .organization import OrganizationStatus
@@ -103,10 +101,9 @@ def has_object_permission(self, request: Request, view, context: RpcUserOrganiza
103
101
104
102
# User must be a part of the Org they're trying to create the app in.
105
103
if context .organization .status != OrganizationStatus .ACTIVE or not context .member :
106
- raise SentryAppIntegratorError (
107
- APIUnauthorized (
108
- "User must be a part of the Org they're trying to create the app in"
109
- )
104
+ raise SentryAppError (
105
+ message = "User must be a part of the Org they're trying to create the app in" ,
106
+ status_code = 401 ,
110
107
)
111
108
112
109
assert request .method , "method must be present in request to get permissions"
@@ -131,7 +128,12 @@ def handle_exception_with_details(self, request, exc, handler_context=None, scop
131
128
132
129
def _handle_sentry_app_exception (self , exception : Exception ):
133
130
if isinstance (exception , SentryAppIntegratorError ) or isinstance (exception , SentryAppError ):
134
- response = Response ({"detail" : str (exception )}, status = exception .status_code )
131
+ response_body : dict [str , Any ] = {"detail" : exception .message }
132
+
133
+ if public_context := exception .public_context :
134
+ response_body .update ({"context" : public_context })
135
+
136
+ response = Response (response_body , status = exception .status_code )
135
137
response .exception = True
136
138
return response
137
139
@@ -154,7 +156,7 @@ def _get_organization_slug(self, request: Request):
154
156
organization_slug = request .data .get ("organization" )
155
157
if not organization_slug or not isinstance (organization_slug , str ):
156
158
error_message = "Please provide a valid value for the 'organization' field."
157
- raise SentryAppError (ResourceDoesNotExist ( error_message ) )
159
+ raise SentryAppError (message = error_message , status_code = 404 )
158
160
return organization_slug
159
161
160
162
def _get_organization_for_superuser_or_staff (
@@ -166,7 +168,7 @@ def _get_organization_for_superuser_or_staff(
166
168
167
169
if context is None :
168
170
error_message = f"Organization '{ organization_slug } ' does not exist."
169
- raise SentryAppError (ResourceDoesNotExist ( error_message ) )
171
+ raise SentryAppError (message = error_message , status_code = 404 )
170
172
171
173
return context
172
174
@@ -178,7 +180,7 @@ def _get_organization_for_user(
178
180
)
179
181
if context is None or context .member is None :
180
182
error_message = f"User does not belong to the '{ organization_slug } ' organization."
181
- raise SentryAppIntegratorError ( PermissionDenied ( to_single_line_str (error_message )) )
183
+ raise SentryAppError ( message = to_single_line_str (error_message ), status_code = 403 )
182
184
return context
183
185
184
186
def _get_org_context (self , request : Request ) -> RpcUserOrganizationContext :
@@ -260,10 +262,13 @@ def has_object_permission(self, request: Request, view, sentry_app: RpcSentryApp
260
262
# if app is unpublished, user must be in the Org who owns the app.
261
263
if not sentry_app .is_published :
262
264
if not any (sentry_app .owner_id == org .id for org in organizations ):
263
- raise SentryAppIntegratorError (
264
- APIUnauthorized (
265
- "User must be in the app owner's organization for unpublished apps"
266
- )
265
+ raise SentryAppError (
266
+ message = "User must be in the app owner's organization for unpublished apps" ,
267
+ status_code = 403 ,
268
+ public_context = {
269
+ "integration" : sentry_app .slug ,
270
+ "user_organizations" : [org .slug for org in organizations ],
271
+ },
267
272
)
268
273
269
274
# TODO(meredith): make a better way to allow for public
@@ -299,9 +304,7 @@ def convert_args(
299
304
try :
300
305
sentry_app = SentryApp .objects .get (slug__id_or_slug = sentry_app_id_or_slug )
301
306
except SentryApp .DoesNotExist :
302
- raise SentryAppIntegratorError (
303
- ResourceDoesNotExist ("Could not find the requested sentry app" ), status_code = 404
304
- )
307
+ raise SentryAppError (message = "Could not find the requested sentry app" , status_code = 404 )
305
308
306
309
self .check_object_permissions (request , sentry_app )
307
310
@@ -320,9 +323,7 @@ def convert_args(
320
323
else :
321
324
sentry_app = app_service .get_sentry_app_by_slug (slug = sentry_app_id_or_slug )
322
325
if sentry_app is None :
323
- raise SentryAppIntegratorError (
324
- ResourceDoesNotExist ("Could not find the requested sentry app" ), status_code = 404
325
- )
326
+ raise SentryAppError (message = "Could not find the requested sentry app" , status_code = 404 )
326
327
327
328
self .check_object_permissions (request , sentry_app )
328
329
@@ -353,8 +354,10 @@ def has_object_permission(self, request: Request, view, organization):
353
354
else ()
354
355
)
355
356
if not any (organization .id == org .id for org in organizations ):
356
- raise SentryAppIntegratorError (
357
- APIUnauthorized ("User must belong to the given organization" ), status_code = 403
357
+ raise SentryAppError (
358
+ message = "User must belong to the given organization" ,
359
+ status_code = 403 ,
360
+ public_context = {"user_organizations" : [org .slug for org in organizations ]},
358
361
)
359
362
assert request .method , "method must be present in request to get permissions"
360
363
return ensure_scoped_permission (request , self .scope_map .get (request .method ))
@@ -379,9 +382,7 @@ def convert_args(self, request: Request, organization_id_or_slug, *args, **kwarg
379
382
)
380
383
381
384
if organization is None :
382
- raise SentryAppIntegratorError (
383
- ResourceDoesNotExist ("Could not find requested organization" ), status_code = 404
384
- )
385
+ raise SentryAppError (message = "Could not find requested organization" , status_code = 404 )
385
386
self .check_object_permissions (request , organization )
386
387
387
388
kwargs ["organization" ] = organization
@@ -437,9 +438,7 @@ def has_object_permission(self, request: Request, view, installation):
437
438
or not org_context .member
438
439
or org_context .organization .status != OrganizationStatus .ACTIVE
439
440
):
440
- raise SentryAppIntegratorError (
441
- ResourceDoesNotExist ("Given organization is not valid" ), status_code = 404
442
- )
441
+ raise SentryAppError (message = "Given organization is not valid" , status_code = 404 )
443
442
444
443
assert request .method , "method must be present in request to get permissions"
445
444
return ensure_scoped_permission (request , self .scope_map .get (request .method ))
@@ -452,8 +451,8 @@ def convert_args(self, request: Request, uuid, *args, **kwargs):
452
451
installations = app_service .get_many (filter = dict (uuids = [uuid ]))
453
452
installation = installations [0 ] if installations else None
454
453
if installation is None :
455
- raise SentryAppIntegratorError (
456
- ResourceDoesNotExist ( "Could not find given sentry app installation" ) ,
454
+ raise SentryAppError (
455
+ message = "Could not find given sentry app installation" ,
457
456
status_code = 404 ,
458
457
)
459
458
0 commit comments