# frozen_string_literal: true module IncidentManagement module PagerDuty class ProcessWebhookService include Gitlab::Utils::StrongMemoize include IncidentManagement::Settings # https://developer.pagerduty.com/docs/webhooks/webhook-behavior/#size-limit PAGER_DUTY_PAYLOAD_SIZE_LIMIT = 55.kilobytes # https://developer.pagerduty.com/docs/webhooks/v2-overview/#webhook-types PAGER_DUTY_PROCESSABLE_EVENT_TYPES = %w(incident.trigger).freeze def initialize(project, payload) @project = project @payload = payload end def execute(token) return forbidden unless webhook_setting_active? return unauthorized unless valid_token?(token) return bad_request unless valid_payload_size? process_incidents accepted end private attr_reader :project, :payload def process_incidents pager_duty_processable_events.each do |event| ::IncidentManagement::PagerDuty::ProcessIncidentWorker.perform_async(project.id, event['incident']) end end def pager_duty_processable_events strong_memoize(:pager_duty_processable_events) do ::PagerDuty::WebhookPayloadParser .call(payload.to_h) .filter { |msg| msg['event'].to_s.in?(PAGER_DUTY_PROCESSABLE_EVENT_TYPES) } end end def webhook_setting_active? incident_management_setting.pagerduty_active? end def valid_token?(token) token && incident_management_setting.pagerduty_token == token end def valid_payload_size? Gitlab::Utils::DeepSize.new(payload, max_size: PAGER_DUTY_PAYLOAD_SIZE_LIMIT).valid? end def accepted ServiceResponse.success(http_status: :accepted) end def forbidden ServiceResponse.error(message: 'Forbidden', http_status: :forbidden) end def unauthorized ServiceResponse.error(message: 'Unauthorized', http_status: :unauthorized) end def bad_request ServiceResponse.error(message: 'Bad Request', http_status: :bad_request) end end end end