123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460 |
- from typing import Dict, List, Tuple, Union
- from urllib.parse import urlparse
- from django.db import transaction
- from django.db.utils import IntegrityError
- from ipware import get_client_ip
- from anonymizeip import anonymize_ip
- from rest_framework import serializers
- from rest_framework.exceptions import PermissionDenied
- from sentry.eventtypes.error import ErrorEvent
- from sentry.eventtypes.base import DefaultEvent
- from issues.models import EventType, Issue
- from issues.serializers import BaseBreadcrumbsSerializer
- from issues.tasks import update_search_index_issue
- from environments.models import Environment
- from releases.models import Release
- from glitchtip.serializers import FlexibleDateTimeField
- from .models import Event, LogLevel
- from .fields import (
- GenericField,
- ForgivingHStoreField,
- ForgivingDisallowRegexField,
- QueryStringField,
- )
- from .event_tag_processors import TAG_PROCESSORS
- from .event_context_processors import EVENT_CONTEXT_PROCESSORS
- def replace(data: Union[str, dict, list], match: str, repl: str):
- """ A recursive replace function """
- if isinstance(data, dict):
- return {k: replace(v, match, repl) for k, v in data.items()}
- elif isinstance(data, list):
- return [replace(i, match, repl) for i in data]
- elif isinstance(data, str):
- return data.replace(match, repl)
- return data
- def sanitize_bad_postgres_chars(data: Union[str, dict, list]):
- """
- Remove values which are not supported by the postgres string data types
- """
- known_bads = ["\x00"]
- for known_bad in known_bads:
- data = data.replace(known_bad, " ")
- return data
- def sanitize_bad_postgres_json(data: Union[str, dict, list]):
- """
- Remove values which are not supported by the postgres JSONB data type
- """
- known_bads = ["\u0000"]
- for known_bad in known_bads:
- data = replace(data, known_bad, " ")
- return data
- class RequestSerializer(serializers.Serializer):
- env = serializers.DictField(
- child=serializers.CharField(allow_blank=True, allow_null=True), required=False
- )
- # Dict values can be both str and List[str]
- headers = serializers.DictField(required=False)
- url = serializers.CharField(required=False, allow_blank=True)
- method = serializers.CharField(required=False, allow_blank=True)
- query_string = QueryStringField(required=False, allow_null=True)
- class BreadcrumbsSerializer(BaseBreadcrumbsSerializer):
- timestamp = GenericField(required=False)
- def validate_level(self, value):
- if value == "log":
- return "info"
- return value
- class BaseSerializer(serializers.Serializer):
- def process_user(self, project, data):
- """ Fetch user data from SDK event and request """
- user = data.get("user", {})
- if self.context and self.context.get("request"):
- client_ip, is_routable = get_client_ip(self.context["request"])
- if user or is_routable:
- if is_routable:
- if project.should_scrub_ip_addresses:
- client_ip = anonymize_ip(client_ip)
- user["ip_address"] = client_ip
- return user
- class SentrySDKEventSerializer(BaseSerializer):
- """ Represents events coming from a OSS sentry SDK client """
- breadcrumbs = serializers.JSONField(required=False)
- tags = ForgivingHStoreField(required=False)
- event_id = serializers.UUIDField()
- extra = serializers.JSONField(required=False)
- request = RequestSerializer(required=False)
- server_name = serializers.CharField(required=False)
- sdk = serializers.JSONField(required=False)
- platform = serializers.CharField(required=False)
- release = serializers.CharField(required=False, allow_null=True)
- environment = ForgivingDisallowRegexField(
- required=False, allow_null=True, disallow_regex=r"^[^\n\r\f\/]*$"
- )
- _meta = serializers.JSONField(required=False)
- class FormattedMessageSerializer(serializers.Serializer):
- formatted = serializers.CharField(
- required=False
- ) # Documented as required, but some Sentry SDKs don't send it
- messages = serializers.CharField(required=False)
- params = serializers.ListField(child=serializers.CharField(), required=False)
- def to_internal_value(self, data):
- value = super().to_internal_value(data)
- return value.get("formatted", "")
- class MessageField(serializers.CharField):
- def to_internal_value(self, data):
- if isinstance(data, dict):
- serializer = FormattedMessageSerializer(data=data)
- serializer.is_valid(raise_exception=True)
- return serializer.validated_data
- return super().to_internal_value(data)
- class StoreDefaultSerializer(SentrySDKEventSerializer):
- """
- Default serializer. Used as both a base class and for default error types
- """
- type = EventType.DEFAULT
- contexts = serializers.JSONField(required=False)
- level = serializers.CharField(required=False)
- logentry = serializers.JSONField(required=False)
- message = MessageField(required=False, allow_blank=True, allow_null=True)
- timestamp = FlexibleDateTimeField(required=False)
- transaction = serializers.CharField(
- required=False, allow_null=True, allow_blank=True
- )
- user = serializers.JSONField(required=False)
- modules = serializers.JSONField(required=False)
- def validate_breadcrumbs(self, value):
- """
- Normalize breadcrumbs, which may come in as dict or list
- """
- if isinstance(value, list):
- value = {"values": value}
- if value.get("values") == []:
- return None
- serializer = BreadcrumbsSerializer(data=value.get("values"), many=True)
- if serializer.is_valid():
- return {"values": serializer.validated_data}
- return value
- def get_eventtype(self):
- """ Get event type class from self.type """
- if self.type is EventType.DEFAULT:
- return DefaultEvent()
- if self.type is EventType.ERROR:
- return ErrorEvent()
- def modify_exception(self, exception):
- """ OSS Sentry does this, I have no idea why """
- if exception:
- for value in exception.get("values", []):
- value.pop("module", None)
- if value.get("stacktrace") and value["stacktrace"].get("frames"):
- frames = value["stacktrace"]["frames"]
- # If in_app is always true, make it false ¯\_(ツ)_/¯
- if all(x.get("in_app") for x in frames):
- for frame in frames:
- frame["in_app"] = False
- return exception
- def generate_tags(self, data: Dict, tags: List[Tuple[str, str]] = []):
- """
- Determine tag relational data
- Optionally pass tags array for existing known tags to generate
- """
- for Processor in TAG_PROCESSORS:
- processor = Processor()
- value = processor.get_tag_values(data)
- if value:
- tags.append((processor.tag, value))
- if data.get("tags"):
- tags += [(k, v) for k, v in data["tags"].items()]
- return tags
- def annotate_contexts(self, event):
- """
- SDK events may contain contexts. This function adds additional contexts data
- """
- contexts = event.get("contexts")
- for Processor in EVENT_CONTEXT_PROCESSORS:
- processor = Processor()
- if contexts is None or not contexts.get(processor.name):
- processor_contexts = processor.get_context(event)
- if processor_contexts:
- if contexts is None:
- contexts = {}
- contexts[processor.name] = processor_contexts
- return contexts
- def get_message(self, data):
- """ Prefer message over logentry """
- if "message" in data:
- return data["message"]
- return data.get("logentry", {}).get("message", "")
- def get_environment(self, name: str, project):
- environment, _ = Environment.objects.get_or_create(
- name=name[: Environment._meta.get_field("name").max_length],
- organization=project.organization,
- )
- environment.projects.add(project)
- return environment
- def get_release(self, version: str, project):
- release, _ = Release.objects.get_or_create(
- version=version, organization=project.organization
- )
- release.projects.add(project)
- return release
- def create(self, data):
- project = self.context.get("project")
- eventtype = self.get_eventtype()
- metadata = eventtype.get_metadata(data)
- title = eventtype.get_title(metadata)
- culprit = eventtype.get_location(data)
- request = data.get("request")
- breadcrumbs = data.get("breadcrumbs")
- exception = data.get("exception")
- level = None
- if data.get("level"):
- level = LogLevel.from_string(data["level"])
- if (
- data.get("stacktrace")
- and exception
- and len(exception.get("values", 0)) > 0
- and not exception["values"][0].get("stacktrace")
- ):
- # stacktrace is deprecated, but supported at this time
- # Assume it's for the first exception value
- exception["values"][0]["stacktrace"] = data.get("stacktrace")
- exception = self.modify_exception(exception)
- if request:
- headers = request.get("headers")
- if headers:
- request["inferred_content_type"] = headers.get("Content-Type")
- sorted_headers = sorted([pair for pair in headers.items()])
- for idx, header in enumerate(sorted_headers):
- if isinstance(header[1], list):
- sorted_headers[idx] = (header[0], header[1][0])
- request["headers"] = sorted_headers
- contexts = self.annotate_contexts(data)
- data["contexts"] = contexts
- with transaction.atomic():
- if not project.first_event:
- project.first_event = data.get("timestamp")
- project.save(update_fields=["first_event"])
- defaults = {
- "metadata": sanitize_bad_postgres_json(metadata),
- }
- if level:
- defaults["level"] = level
- environment = None
- if data.get("environment"):
- environment = self.get_environment(data["environment"], project)
- release = None
- if data.get("release"):
- release = self.get_release(data["release"], project)
- tags = []
- if environment:
- tags.append(("environment", environment.name))
- if release:
- tags.append(("release", release.version))
- tags = self.generate_tags(data, tags)
- defaults["tags"] = {tag[0]: [tag[1]] for tag in tags}
- issue, issue_created = Issue.objects.get_or_create(
- title=sanitize_bad_postgres_chars(title),
- culprit=sanitize_bad_postgres_chars(culprit),
- project_id=project.id,
- type=self.type,
- defaults=defaults,
- )
- json_data = {
- "breadcrumbs": breadcrumbs,
- "contexts": contexts,
- "culprit": culprit,
- "exception": exception,
- "metadata": metadata,
- "message": self.get_message(data),
- "modules": data.get("modules"),
- "platform": data.get("platform", "other"),
- "request": request,
- "sdk": data.get("sdk"),
- "title": title,
- "type": self.type.label,
- }
- if environment:
- json_data["environment"] = environment.name
- extra = data.get("extra")
- if extra:
- json_data["extra"] = extra
- user = self.process_user(project, data)
- if user:
- json_data["user"] = user
- errors = None
- handled_errors = self.context.get("handled_errors")
- if handled_errors:
- errors = []
- for field_name, field_errors in handled_errors.items():
- for error in field_errors:
- errors.append(
- {
- "reason": str(error),
- "type": error.code,
- "name": field_name,
- "value": error.value,
- }
- )
- params = {
- "event_id": data["event_id"],
- "issue": issue,
- "tags": {tag[0]: tag[1] for tag in tags},
- "errors": errors,
- "timestamp": data.get("timestamp"),
- "data": sanitize_bad_postgres_json(json_data),
- "release": release,
- }
- if level:
- params["level"] = level
- try:
- event = Event.objects.create(**params)
- except IntegrityError as e:
- # This except is more efficient than a query for exists().
- if e.args and "event_id" in e.args[0]:
- raise PermissionDenied(
- "An event with the same ID already exists (%s)"
- % params["event_id"]
- ) from e
- raise e
- issue.check_for_status_update()
- update_search_index_issue(args=[issue.pk, issue_created], countdown=10)
- return event
- class StoreErrorSerializer(StoreDefaultSerializer):
- """ Primary difference is the presense of exception attribute """
- type = EventType.ERROR
- exception = serializers.JSONField(required=False)
- stacktrace = serializers.JSONField(
- required=False, help_text="Deprecated but supported at this time"
- )
- class StoreCSPReportSerializer(BaseSerializer):
- """
- CSP Report Serializer
- Very different format from others Store serializers.
- Does not extend base class due to differences.
- """
- type = EventType.CSP
- def __init__(self, *args, **kwargs):
- super().__init__(*args, **kwargs)
- # This is done to support the hyphen
- self.fields.update({"csp-report": serializers.JSONField()})
- def create(self, data):
- project = self.context.get("project")
- csp = data["csp-report"]
- title = self.get_title(csp)
- culprit = self.get_culprit(csp)
- uri = self.get_uri(csp)
- directive = self.get_effective_directive(csp)
- metadata = {
- "message": title,
- "uri": uri,
- "directive": directive,
- }
- issue, _ = Issue.objects.get_or_create(
- title=title,
- culprit=culprit,
- project_id=project.id,
- type=EventType.CSP,
- defaults={"metadata": metadata},
- )
- # Convert - to _
- normalized_csp = dict((k.replace("-", "_"), v) for k, v in csp.items())
- if "effective_directive" not in normalized_csp:
- normalized_csp["effective_directive"] = directive
- json_data = {
- "culprit": culprit,
- "csp": normalized_csp,
- "title": title,
- "metadata": metadata,
- "message": title,
- "type": EventType.CSP.label,
- }
- user = self.process_user(project, data)
- if user:
- json_data["user"] = user
- params = {
- "issue": issue,
- "data": json_data,
- }
- return Event.objects.create(**params)
- def get_effective_directive(self, data):
- """
- Some browers return effective-directive and others don't.
- Infer missing ones from violated directive
- """
- if "effective-directive" in data:
- return data["effective-directive"]
- first_violation = data["violated-directive"].split()[0]
- return first_violation
- def get_uri(self, data):
- url = data["blocked-uri"]
- return urlparse(url).netloc
- def get_title(self, data):
- effective_directive = self.get_effective_directive(data)
- humanized_directive = effective_directive.replace("-src", "")
- uri = self.get_uri(data)
- return f"Blocked '{humanized_directive}' from '{uri}'"
- def get_culprit(self, data):
- # "style-src cdn.example.com"
- return data.get("violated-directive")
- class EnvelopeHeaderSerializer(serializers.Serializer):
- event_id = serializers.UUIDField(required=False)
- sent_at = FlexibleDateTimeField(required=False)
|