diff --git a/x-pack/plugins/actions/README.md b/x-pack/plugins/actions/README.md
index decd170ca5dd6..4c8cc3aa503e6 100644
--- a/x-pack/plugins/actions/README.md
+++ b/x-pack/plugins/actions/README.md
@@ -28,7 +28,7 @@ Table of Contents
- [RESTful API](#restful-api)
- [`POST /api/action`: Create action](#post-apiaction-create-action)
- [`DELETE /api/action/{id}`: Delete action](#delete-apiactionid-delete-action)
- - [`GET /api/action/_getAll`: Get all actions](#get-apiaction-get-all-actions)
+ - [`GET /api/action/_getAll`: Get all actions](#get-apiactiongetall-get-all-actions)
- [`GET /api/action/{id}`: Get action](#get-apiactionid-get-action)
- [`GET /api/action/types`: List action types](#get-apiactiontypes-list-action-types)
- [`PUT /api/action/{id}`: Update action](#put-apiactionid-update-action)
@@ -64,6 +64,12 @@ Table of Contents
- [`config`](#config-6)
- [`secrets`](#secrets-6)
- [`params`](#params-6)
+ - [`subActionParams (pushToService)`](#subactionparams-pushtoservice)
+ - [Jira](#jira)
+ - [`config`](#config-7)
+ - [`secrets`](#secrets-7)
+ - [`params`](#params-7)
+ - [`subActionParams (pushToService)`](#subactionparams-pushtoservice-1)
- [Command Line Utility](#command-line-utility)
## Terminology
@@ -143,8 +149,8 @@ This is the primary function for an action type. Whenever the action needs to ex
| actionId | The action saved object id that the action type is executing for. |
| config | The decrypted configuration given to an action. This comes from the action saved object that is partially or fully encrypted within the data store. If you would like to validate the config before being passed to the executor, define `validate.config` within the action type. |
| params | Parameters for the execution. These will be given at execution time by either an alert or manually provided when calling the plugin provided execute function. |
-| services.callCluster(path, opts) | Use this to do Elasticsearch queries on the cluster Kibana connects to. This function is the same as any other `callCluster` in Kibana but runs in the context of the user who is calling the action when security is enabled.|
-| services.getScopedCallCluster | This function scopes an instance of CallCluster by returning a `callCluster(path, opts)` function that runs in the context of the user who is calling the action when security is enabled. This must only be called with instances of CallCluster provided by core.|
+| services.callCluster(path, opts) | Use this to do Elasticsearch queries on the cluster Kibana connects to. This function is the same as any other `callCluster` in Kibana but runs in the context of the user who is calling the action when security is enabled. |
+| services.getScopedCallCluster | This function scopes an instance of CallCluster by returning a `callCluster(path, opts)` function that runs in the context of the user who is calling the action when security is enabled. This must only be called with instances of CallCluster provided by core. |
| services.savedObjectsClient | This is an instance of the saved objects client. This provides the ability to do CRUD on any saved objects within the same space the alert lives in. The scope of the saved objects client is tied to the user in context calling the execute API or the API key provided to the execute plugin function (only when security isenabled). |
| services.log(tags, [data], [timestamp]) | Use this to create server logs. (This is the same function as server.log) |
@@ -483,13 +489,59 @@ The ServiceNow action uses the [V2 Table API](https://developer.servicenow.com/a
### `params`
+| Property | Description | Type |
+| --------------- | ------------------------------------------------------------------------------------ | ------ |
+| subAction | The sub action to perform. It can be `pushToService`, `handshake`, and `getIncident` | string |
+| subActionParams | The parameters of the sub action | object |
+
+#### `subActionParams (pushToService)`
+
| Property | Description | Type |
| ----------- | -------------------------------------------------------------------------------------------------------------------------- | --------------------- |
| caseId | The case id | string |
| title | The title of the case | string _(optional)_ |
| description | The description of the case | string _(optional)_ |
| comments | The comments of the case. A comment is of the form `{ commentId: string, version: string, comment: string }` | object[] _(optional)_ |
-| incidentID | The id of the incident in ServiceNow . If presented the incident will be update. Otherwise a new incident will be created. | string _(optional)_ |
+| externalId | The id of the incident in ServiceNow . If presented the incident will be update. Otherwise a new incident will be created. | string _(optional)_ |
+
+---
+
+## Jira
+
+ID: `.jira`
+
+The Jira action uses the [V2 API](https://developer.atlassian.com/cloud/jira/platform/rest/v2/) to create and update Jira incidents.
+
+### `config`
+
+| Property | Description | Type |
+| ------------------ | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------ |
+| apiUrl | ServiceNow instance URL. | string |
+| casesConfiguration | Case configuration object. The object should contain an attribute called `mapping`. A `mapping` is an array of objects. Each mapping object should be of the form `{ source: string, target: string, actionType: string }`. `source` is the Case field. `target` is the Jira field where `source` will be mapped to. `actionType` can be one of `nothing`, `overwrite` or `append`. For example the `{ source: 'title', target: 'summary', actionType: 'overwrite' }` record, inside mapping array, means that the title of a case will be mapped to the short description of an incident in ServiceNow and will be overwrite on each update. | object |
+
+### `secrets`
+
+| Property | Description | Type |
+| -------- | --------------------------------------- | ------ |
+| email | email for HTTP Basic authentication | string |
+| apiToken | API token for HTTP Basic authentication | string |
+
+### `params`
+
+| Property | Description | Type |
+| --------------- | ------------------------------------------------------------------------------------ | ------ |
+| subAction | The sub action to perform. It can be `pushToService`, `handshake`, and `getIncident` | string |
+| subActionParams | The parameters of the sub action | object |
+
+#### `subActionParams (pushToService)`
+
+| Property | Description | Type |
+| ----------- | ------------------------------------------------------------------------------------------------------------------- | --------------------- |
+| caseId | The case id | string |
+| title | The title of the case | string _(optional)_ |
+| description | The description of the case | string _(optional)_ |
+| comments | The comments of the case. A comment is of the form `{ commentId: string, version: string, comment: string }` | object[] _(optional)_ |
+| externalId | The id of the incident in Jira. If presented the incident will be update. Otherwise a new incident will be created. | string _(optional)_ |
# Command Line Utility
diff --git a/x-pack/plugins/actions/server/builtin_action_types/case/api.ts b/x-pack/plugins/actions/server/builtin_action_types/case/api.ts
new file mode 100644
index 0000000000000..6dc8a9cc9af6a
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/case/api.ts
@@ -0,0 +1,93 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import {
+ ExternalServiceApi,
+ ExternalServiceParams,
+ PushToServiceResponse,
+ GetIncidentApiHandlerArgs,
+ HandshakeApiHandlerArgs,
+ PushToServiceApiHandlerArgs,
+} from './types';
+import { prepareFieldsForTransformation, transformFields, transformComments } from './utils';
+
+const handshakeHandler = async ({
+ externalService,
+ mapping,
+ params,
+}: HandshakeApiHandlerArgs) => {};
+const getIncidentHandler = async ({
+ externalService,
+ mapping,
+ params,
+}: GetIncidentApiHandlerArgs) => {};
+
+const pushToServiceHandler = async ({
+ externalService,
+ mapping,
+ params,
+}: PushToServiceApiHandlerArgs): Promise => {
+ const { externalId, comments } = params;
+ const updateIncident = externalId ? true : false;
+ const defaultPipes = updateIncident ? ['informationUpdated'] : ['informationCreated'];
+ let currentIncident: ExternalServiceParams | undefined;
+ let res: PushToServiceResponse;
+
+ if (externalId) {
+ currentIncident = await externalService.getIncident(externalId);
+ }
+
+ const fields = prepareFieldsForTransformation({
+ params,
+ mapping,
+ defaultPipes,
+ });
+
+ const incident = transformFields({
+ params,
+ fields,
+ currentIncident,
+ });
+
+ if (updateIncident) {
+ res = await externalService.updateIncident({ incidentId: externalId, incident });
+ } else {
+ res = await externalService.createIncident({ incident });
+ }
+
+ if (
+ comments &&
+ Array.isArray(comments) &&
+ comments.length > 0 &&
+ mapping.get('comments')?.actionType !== 'nothing'
+ ) {
+ const commentsTransformed = transformComments(comments, ['informationAdded']);
+
+ res.comments = [];
+ for (const currentComment of commentsTransformed) {
+ const comment = await externalService.createComment({
+ incidentId: res.id,
+ comment: currentComment,
+ field: mapping.get('comments')?.target ?? 'comments',
+ });
+ res.comments = [
+ ...(res.comments ?? []),
+ {
+ commentId: comment.commentId,
+ pushedDate: comment.pushedDate,
+ },
+ ];
+ }
+ }
+
+ return res;
+};
+
+export const api: ExternalServiceApi = {
+ handshake: handshakeHandler,
+ pushToService: pushToServiceHandler,
+ getIncident: getIncidentHandler,
+};
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/constants.ts b/x-pack/plugins/actions/server/builtin_action_types/case/constants.ts
similarity index 87%
rename from x-pack/plugins/actions/server/builtin_action_types/servicenow/constants.ts
rename to x-pack/plugins/actions/server/builtin_action_types/case/constants.ts
index a0ffd859e14ca..1f2bc7f5e8e53 100644
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/constants.ts
+++ b/x-pack/plugins/actions/server/builtin_action_types/case/constants.ts
@@ -4,5 +4,4 @@
* you may not use this file except in compliance with the Elastic License.
*/
-export const ACTION_TYPE_ID = '.servicenow';
export const SUPPORTED_SOURCE_FIELDS = ['title', 'comments', 'description'];
diff --git a/x-pack/plugins/actions/server/builtin_action_types/case/schema.ts b/x-pack/plugins/actions/server/builtin_action_types/case/schema.ts
new file mode 100644
index 0000000000000..33b2ad6d18684
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/case/schema.ts
@@ -0,0 +1,98 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { schema } from '@kbn/config-schema';
+
+export const MappingActionType = schema.oneOf([
+ schema.literal('nothing'),
+ schema.literal('overwrite'),
+ schema.literal('append'),
+]);
+
+export const MapRecordSchema = schema.object({
+ source: schema.string(),
+ target: schema.string(),
+ actionType: MappingActionType,
+});
+
+export const CaseConfigurationSchema = schema.object({
+ mapping: schema.arrayOf(MapRecordSchema),
+});
+
+export const ExternalIncidentServiceConfiguration = {
+ apiUrl: schema.string(),
+ casesConfiguration: CaseConfigurationSchema,
+};
+
+export const ExternalIncidentServiceConfigurationSchema = schema.object(
+ ExternalIncidentServiceConfiguration
+);
+
+export const ExternalIncidentServiceSecretConfiguration = {
+ password: schema.string(),
+ username: schema.string(),
+};
+
+export const ExternalIncidentServiceSecretConfigurationSchema = schema.object(
+ ExternalIncidentServiceSecretConfiguration
+);
+
+export const UserSchema = schema.object({
+ fullName: schema.nullable(schema.string()),
+ username: schema.nullable(schema.string()),
+});
+
+const EntityInformation = {
+ createdAt: schema.string(),
+ createdBy: UserSchema,
+ updatedAt: schema.nullable(schema.string()),
+ updatedBy: schema.nullable(UserSchema),
+};
+
+export const EntityInformationSchema = schema.object(EntityInformation);
+
+export const CommentSchema = schema.object({
+ commentId: schema.string(),
+ comment: schema.string(),
+ ...EntityInformation,
+});
+
+export const ExecutorSubActionSchema = schema.oneOf([
+ schema.literal('getIncident'),
+ schema.literal('pushToService'),
+ schema.literal('handshake'),
+]);
+
+export const ExecutorSubActionPushParamsSchema = schema.object({
+ caseId: schema.string(),
+ title: schema.string(),
+ description: schema.nullable(schema.string()),
+ comments: schema.nullable(schema.arrayOf(CommentSchema)),
+ externalId: schema.nullable(schema.string()),
+ ...EntityInformation,
+});
+
+export const ExecutorSubActionGetIncidentParamsSchema = schema.object({
+ externalId: schema.string(),
+});
+
+// Reserved for future implementation
+export const ExecutorSubActionHandshakeParamsSchema = schema.object({});
+
+export const ExecutorParamsSchema = schema.oneOf([
+ schema.object({
+ subAction: schema.literal('getIncident'),
+ subActionParams: ExecutorSubActionGetIncidentParamsSchema,
+ }),
+ schema.object({
+ subAction: schema.literal('handshake'),
+ subActionParams: ExecutorSubActionHandshakeParamsSchema,
+ }),
+ schema.object({
+ subAction: schema.literal('pushToService'),
+ subActionParams: ExecutorSubActionPushParamsSchema,
+ }),
+]);
diff --git a/x-pack/plugins/actions/server/builtin_action_types/case/transformers.test.ts b/x-pack/plugins/actions/server/builtin_action_types/case/transformers.test.ts
new file mode 100644
index 0000000000000..75dcab65ee9f2
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/case/transformers.test.ts
@@ -0,0 +1,131 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { transformers } from './transformers';
+
+const { informationCreated, informationUpdated, informationAdded, append } = transformers;
+
+describe('informationCreated', () => {
+ test('transforms correctly', () => {
+ const res = informationCreated({
+ value: 'a value',
+ date: '2020-04-15T08:19:27.400Z',
+ user: 'elastic',
+ });
+ expect(res).toEqual({ value: 'a value (created at 2020-04-15T08:19:27.400Z by elastic)' });
+ });
+
+ test('transforms correctly without optional fields', () => {
+ const res = informationCreated({
+ value: 'a value',
+ });
+ expect(res).toEqual({ value: 'a value (created at by )' });
+ });
+
+ test('returns correctly rest fields', () => {
+ const res = informationCreated({
+ value: 'a value',
+ date: '2020-04-15T08:19:27.400Z',
+ user: 'elastic',
+ previousValue: 'previous value',
+ });
+ expect(res).toEqual({
+ value: 'a value (created at 2020-04-15T08:19:27.400Z by elastic)',
+ previousValue: 'previous value',
+ });
+ });
+});
+
+describe('informationUpdated', () => {
+ test('transforms correctly', () => {
+ const res = informationUpdated({
+ value: 'a value',
+ date: '2020-04-15T08:19:27.400Z',
+ user: 'elastic',
+ });
+ expect(res).toEqual({ value: 'a value (updated at 2020-04-15T08:19:27.400Z by elastic)' });
+ });
+
+ test('transforms correctly without optional fields', () => {
+ const res = informationUpdated({
+ value: 'a value',
+ });
+ expect(res).toEqual({ value: 'a value (updated at by )' });
+ });
+
+ test('returns correctly rest fields', () => {
+ const res = informationUpdated({
+ value: 'a value',
+ date: '2020-04-15T08:19:27.400Z',
+ user: 'elastic',
+ previousValue: 'previous value',
+ });
+ expect(res).toEqual({
+ value: 'a value (updated at 2020-04-15T08:19:27.400Z by elastic)',
+ previousValue: 'previous value',
+ });
+ });
+});
+
+describe('informationAdded', () => {
+ test('transforms correctly', () => {
+ const res = informationAdded({
+ value: 'a value',
+ date: '2020-04-15T08:19:27.400Z',
+ user: 'elastic',
+ });
+ expect(res).toEqual({ value: 'a value (added at 2020-04-15T08:19:27.400Z by elastic)' });
+ });
+
+ test('transforms correctly without optional fields', () => {
+ const res = informationAdded({
+ value: 'a value',
+ });
+ expect(res).toEqual({ value: 'a value (added at by )' });
+ });
+
+ test('returns correctly rest fields', () => {
+ const res = informationAdded({
+ value: 'a value',
+ date: '2020-04-15T08:19:27.400Z',
+ user: 'elastic',
+ previousValue: 'previous value',
+ });
+ expect(res).toEqual({
+ value: 'a value (added at 2020-04-15T08:19:27.400Z by elastic)',
+ previousValue: 'previous value',
+ });
+ });
+});
+
+describe('append', () => {
+ test('transforms correctly', () => {
+ const res = append({
+ value: 'a value',
+ previousValue: 'previous value',
+ });
+ expect(res).toEqual({ value: 'previous value \r\na value' });
+ });
+
+ test('transforms correctly without optional fields', () => {
+ const res = append({
+ value: 'a value',
+ });
+ expect(res).toEqual({ value: 'a value' });
+ });
+
+ test('returns correctly rest fields', () => {
+ const res = append({
+ value: 'a value',
+ user: 'elastic',
+ previousValue: 'previous value',
+ });
+ expect(res).toEqual({
+ value: 'previous value \r\na value',
+ user: 'elastic',
+ });
+ });
+});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/case/transformers.ts b/x-pack/plugins/actions/server/builtin_action_types/case/transformers.ts
new file mode 100644
index 0000000000000..3dca1fd703430
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/case/transformers.ts
@@ -0,0 +1,29 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { TransformerArgs } from './types';
+import * as i18n from './translations';
+
+export type Transformer = (args: TransformerArgs) => TransformerArgs;
+
+export const transformers: Record = {
+ informationCreated: ({ value, date, user, ...rest }: TransformerArgs): TransformerArgs => ({
+ value: `${value} ${i18n.FIELD_INFORMATION('create', date, user)}`,
+ ...rest,
+ }),
+ informationUpdated: ({ value, date, user, ...rest }: TransformerArgs): TransformerArgs => ({
+ value: `${value} ${i18n.FIELD_INFORMATION('update', date, user)}`,
+ ...rest,
+ }),
+ informationAdded: ({ value, date, user, ...rest }: TransformerArgs): TransformerArgs => ({
+ value: `${value} ${i18n.FIELD_INFORMATION('add', date, user)}`,
+ ...rest,
+ }),
+ append: ({ value, previousValue, ...rest }: TransformerArgs): TransformerArgs => ({
+ value: previousValue ? `${previousValue} \r\n${value}` : `${value}`,
+ ...rest,
+ }),
+};
diff --git a/x-pack/plugins/actions/server/builtin_action_types/case/translations.ts b/x-pack/plugins/actions/server/builtin_action_types/case/translations.ts
new file mode 100644
index 0000000000000..4842728b0e4e7
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/case/translations.ts
@@ -0,0 +1,55 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { i18n } from '@kbn/i18n';
+
+export const API_URL_REQUIRED = i18n.translate('xpack.actions.builtin.case.connectorApiNullError', {
+ defaultMessage: 'connector [apiUrl] is required',
+});
+
+export const FIELD_INFORMATION = (
+ mode: string,
+ date: string | undefined,
+ user: string | undefined
+) => {
+ switch (mode) {
+ case 'create':
+ return i18n.translate('xpack.actions.builtin.case.common.externalIncidentCreated', {
+ values: { date, user },
+ defaultMessage: '(created at {date} by {user})',
+ });
+ case 'update':
+ return i18n.translate('xpack.actions.builtin.case.common.externalIncidentUpdated', {
+ values: { date, user },
+ defaultMessage: '(updated at {date} by {user})',
+ });
+ case 'add':
+ return i18n.translate('xpack.actions.builtin.case.common.externalIncidentAdded', {
+ values: { date, user },
+ defaultMessage: '(added at {date} by {user})',
+ });
+ default:
+ return i18n.translate('xpack.actions.builtin.case.common.externalIncidentDefault', {
+ values: { date, user },
+ defaultMessage: '(created at {date} by {user})',
+ });
+ }
+};
+
+export const MAPPING_EMPTY = i18n.translate(
+ 'xpack.actions.builtin.case.configuration.emptyMapping',
+ {
+ defaultMessage: '[casesConfiguration.mapping]: expected non-empty but got empty',
+ }
+);
+
+export const WHITE_LISTED_ERROR = (message: string) =>
+ i18n.translate('xpack.actions.builtin.case.configuration.apiWhitelistError', {
+ defaultMessage: 'error configuring connector action: {message}',
+ values: {
+ message,
+ },
+ });
diff --git a/x-pack/plugins/actions/server/builtin_action_types/case/types.ts b/x-pack/plugins/actions/server/builtin_action_types/case/types.ts
new file mode 100644
index 0000000000000..459e9d2b03f92
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/case/types.ts
@@ -0,0 +1,161 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+// This will have to remain `any` until we can extend connectors with generics
+// and circular dependencies eliminated.
+/* eslint-disable @typescript-eslint/no-explicit-any */
+
+import { TypeOf } from '@kbn/config-schema';
+
+import {
+ ExternalIncidentServiceConfigurationSchema,
+ ExternalIncidentServiceSecretConfigurationSchema,
+ ExecutorParamsSchema,
+ CaseConfigurationSchema,
+ MapRecordSchema,
+ CommentSchema,
+ ExecutorSubActionPushParamsSchema,
+ ExecutorSubActionGetIncidentParamsSchema,
+ ExecutorSubActionHandshakeParamsSchema,
+} from './schema';
+
+export interface AnyParams {
+ [index: string]: string | number | object | undefined | null;
+}
+
+export type ExternalIncidentServiceConfiguration = TypeOf<
+ typeof ExternalIncidentServiceConfigurationSchema
+>;
+export type ExternalIncidentServiceSecretConfiguration = TypeOf<
+ typeof ExternalIncidentServiceSecretConfigurationSchema
+>;
+
+export type ExecutorParams = TypeOf;
+export type ExecutorSubActionPushParams = TypeOf;
+
+export type ExecutorSubActionGetIncidentParams = TypeOf<
+ typeof ExecutorSubActionGetIncidentParamsSchema
+>;
+
+export type ExecutorSubActionHandshakeParams = TypeOf<
+ typeof ExecutorSubActionHandshakeParamsSchema
+>;
+
+export type CaseConfiguration = TypeOf;
+export type MapRecord = TypeOf;
+export type Comment = TypeOf;
+
+export interface ExternalServiceConfiguration {
+ id: string;
+ name: string;
+}
+
+export interface ExternalServiceCredentials {
+ config: Record;
+ secrets: Record;
+}
+
+export interface ExternalServiceValidation {
+ config: (configurationUtilities: any, configObject: any) => void;
+ secrets: (configurationUtilities: any, secrets: any) => void;
+}
+
+export interface ExternalServiceIncidentResponse {
+ id: string;
+ title: string;
+ url: string;
+ pushedDate: string;
+}
+
+export interface ExternalServiceCommentResponse {
+ commentId: string;
+ pushedDate: string;
+ externalCommentId?: string;
+}
+
+export interface ExternalServiceParams {
+ [index: string]: any;
+}
+
+export interface ExternalService {
+ getIncident: (id: string) => Promise;
+ createIncident: (params: ExternalServiceParams) => Promise;
+ updateIncident: (params: ExternalServiceParams) => Promise;
+ createComment: (params: ExternalServiceParams) => Promise;
+}
+
+export interface PushToServiceApiParams extends ExecutorSubActionPushParams {
+ externalCase: Record;
+}
+
+export interface ExternalServiceApiHandlerArgs {
+ externalService: ExternalService;
+ mapping: Map;
+}
+
+export interface PushToServiceApiHandlerArgs extends ExternalServiceApiHandlerArgs {
+ params: PushToServiceApiParams;
+}
+
+export interface GetIncidentApiHandlerArgs extends ExternalServiceApiHandlerArgs {
+ params: ExecutorSubActionGetIncidentParams;
+}
+
+export interface HandshakeApiHandlerArgs extends ExternalServiceApiHandlerArgs {
+ params: ExecutorSubActionHandshakeParams;
+}
+
+export interface PushToServiceResponse extends ExternalServiceIncidentResponse {
+ comments?: ExternalServiceCommentResponse[];
+}
+
+export interface ExternalServiceApi {
+ handshake: (args: HandshakeApiHandlerArgs) => Promise;
+ pushToService: (args: PushToServiceApiHandlerArgs) => Promise;
+ getIncident: (args: GetIncidentApiHandlerArgs) => Promise;
+}
+
+export interface CreateExternalServiceBasicArgs {
+ api: ExternalServiceApi;
+ createExternalService: (credentials: ExternalServiceCredentials) => ExternalService;
+}
+
+export interface CreateExternalServiceArgs extends CreateExternalServiceBasicArgs {
+ config: ExternalServiceConfiguration;
+ validate: ExternalServiceValidation;
+ validationSchema: { config: any; secrets: any };
+}
+
+export interface CreateActionTypeArgs {
+ configurationUtilities: any;
+ executor?: any;
+}
+
+export interface PipedField {
+ key: string;
+ value: string;
+ actionType: string;
+ pipes: string[];
+}
+
+export interface PrepareFieldsForTransformArgs {
+ params: PushToServiceApiParams;
+ mapping: Map;
+ defaultPipes?: string[];
+}
+
+export interface TransformFieldsArgs {
+ params: PushToServiceApiParams;
+ fields: PipedField[];
+ currentIncident?: ExternalServiceParams;
+}
+
+export interface TransformerArgs {
+ value: string;
+ date?: string;
+ user?: string;
+ previousValue?: string;
+}
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/helpers.test.ts b/x-pack/plugins/actions/server/builtin_action_types/case/utils.test.ts
similarity index 56%
rename from x-pack/plugins/actions/server/builtin_action_types/servicenow/helpers.test.ts
rename to x-pack/plugins/actions/server/builtin_action_types/case/utils.test.ts
index cbcefe6364e8f..1e8cc3eda20e5 100644
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/helpers.test.ts
+++ b/x-pack/plugins/actions/server/builtin_action_types/case/utils.test.ts
@@ -4,28 +4,65 @@
* you may not use this file except in compliance with the Elastic License.
*/
+import axios from 'axios';
+
import {
normalizeMapping,
buildMap,
mapParams,
- appendField,
- appendInformationToField,
prepareFieldsForTransformation,
transformFields,
transformComments,
-} from './helpers';
-import { mapping, finalMapping } from './mock';
+ addTimeZoneToDate,
+ throwIfNotAlive,
+ request,
+ patch,
+ getErrorMessage,
+} from './utils';
+
import { SUPPORTED_SOURCE_FIELDS } from './constants';
-import { MapEntry, Params, Comment } from './types';
+import { Comment, MapRecord, PushToServiceApiParams } from './types';
+
+jest.mock('axios');
+const axiosMock = (axios as unknown) as jest.Mock;
+
+const mapping: MapRecord[] = [
+ { source: 'title', target: 'short_description', actionType: 'overwrite' },
+ { source: 'description', target: 'description', actionType: 'append' },
+ { source: 'comments', target: 'comments', actionType: 'append' },
+];
+
+// eslint-disable-next-line @typescript-eslint/no-explicit-any
+const finalMapping: Map = new Map();
+
+finalMapping.set('title', {
+ target: 'short_description',
+ actionType: 'overwrite',
+});
-const maliciousMapping: MapEntry[] = [
+finalMapping.set('description', {
+ target: 'description',
+ actionType: 'append',
+});
+
+finalMapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+});
+
+finalMapping.set('short_description', {
+ target: 'title',
+ actionType: 'overwrite',
+});
+
+const maliciousMapping: MapRecord[] = [
{ source: '__proto__', target: 'short_description', actionType: 'nothing' },
{ source: 'description', target: '__proto__', actionType: 'nothing' },
{ source: 'comments', target: 'comments', actionType: 'nothing' },
{ source: 'unsupportedSource', target: 'comments', actionType: 'nothing' },
];
-const fullParams: Params = {
+const fullParams: PushToServiceApiParams = {
caseId: 'd4387ac5-0899-4dc2-bbfa-0dd605c934aa',
title: 'a title',
description: 'a description',
@@ -33,15 +70,14 @@ const fullParams: Params = {
createdBy: { fullName: 'Elastic User', username: 'elastic' },
updatedAt: null,
updatedBy: null,
- incidentId: null,
- incident: {
+ externalId: null,
+ externalCase: {
short_description: 'a title',
description: 'a description',
},
comments: [
{
commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
- version: 'WzU3LDFd',
comment: 'first comment',
createdAt: '2020-03-13T08:34:53.450Z',
createdBy: { fullName: 'Elastic User', username: 'elastic' },
@@ -50,7 +86,6 @@ const fullParams: Params = {
},
{
commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
- version: 'WzU3LDFd',
comment: 'second comment',
createdAt: '2020-03-13T08:34:53.450Z',
createdBy: { fullName: 'Elastic User', username: 'elastic' },
@@ -60,7 +95,7 @@ const fullParams: Params = {
],
};
-describe('sanitizeMapping', () => {
+describe('normalizeMapping', () => {
test('remove malicious fields', () => {
const sanitizedMapping = normalizeMapping(SUPPORTED_SOURCE_FIELDS, maliciousMapping);
expect(sanitizedMapping.every(m => m.source !== '__proto__' && m.target !== '__proto__')).toBe(
@@ -194,7 +229,10 @@ describe('transformFields', () => {
params: {
...fullParams,
updatedAt: '2020-03-15T08:34:53.450Z',
- updatedBy: { username: 'anotherUser', fullName: 'Another User' },
+ updatedBy: {
+ username: 'anotherUser',
+ fullName: 'Another User',
+ },
},
mapping: finalMapping,
defaultPipes: ['informationUpdated'],
@@ -204,7 +242,10 @@ describe('transformFields', () => {
params: {
...fullParams,
updatedAt: '2020-03-15T08:34:53.450Z',
- updatedBy: { username: 'anotherUser', fullName: 'Another User' },
+ updatedBy: {
+ username: 'anotherUser',
+ fullName: 'Another User',
+ },
},
fields,
currentIncident: {
@@ -244,7 +285,10 @@ describe('transformFields', () => {
});
const res = transformFields({
- params: { ...fullParams, createdBy: { fullName: null, username: 'elastic' } },
+ params: {
+ ...fullParams,
+ createdBy: { fullName: '', username: 'elastic' },
+ },
fields,
});
@@ -259,7 +303,10 @@ describe('transformFields', () => {
params: {
...fullParams,
updatedAt: '2020-03-15T08:34:53.450Z',
- updatedBy: { username: 'anotherUser', fullName: 'Another User' },
+ updatedBy: {
+ username: 'anotherUser',
+ fullName: 'Another User',
+ },
},
mapping: finalMapping,
defaultPipes: ['informationUpdated'],
@@ -269,7 +316,7 @@ describe('transformFields', () => {
params: {
...fullParams,
updatedAt: '2020-03-15T08:34:53.450Z',
- updatedBy: { username: 'anotherUser', fullName: null },
+ updatedBy: { username: 'anotherUser', fullName: '' },
},
fields,
});
@@ -281,60 +328,11 @@ describe('transformFields', () => {
});
});
-describe('appendField', () => {
- test('prefix correctly', () => {
- expect('my_prefixmy_value ').toEqual(appendField({ value: 'my_value', prefix: 'my_prefix' }));
- });
-
- test('suffix correctly', () => {
- expect('my_value my_suffix').toEqual(appendField({ value: 'my_value', suffix: 'my_suffix' }));
- });
-
- test('prefix and suffix correctly', () => {
- expect('my_prefixmy_value my_suffix').toEqual(
- appendField({ value: 'my_value', prefix: 'my_prefix', suffix: 'my_suffix' })
- );
- });
-});
-
-describe('appendInformationToField', () => {
- test('creation mode', () => {
- const res = appendInformationToField({
- value: 'my value',
- user: 'Elastic Test User',
- date: '2020-03-13T08:34:53.450Z',
- mode: 'create',
- });
- expect(res).toEqual('my value (created at 2020-03-13T08:34:53.450Z by Elastic Test User)');
- });
-
- test('update mode', () => {
- const res = appendInformationToField({
- value: 'my value',
- user: 'Elastic Test User',
- date: '2020-03-13T08:34:53.450Z',
- mode: 'update',
- });
- expect(res).toEqual('my value (updated at 2020-03-13T08:34:53.450Z by Elastic Test User)');
- });
-
- test('add mode', () => {
- const res = appendInformationToField({
- value: 'my value',
- user: 'Elastic Test User',
- date: '2020-03-13T08:34:53.450Z',
- mode: 'add',
- });
- expect(res).toEqual('my value (added at 2020-03-13T08:34:53.450Z by Elastic Test User)');
- });
-});
-
describe('transformComments', () => {
test('transform creation comments', () => {
const comments: Comment[] = [
{
commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
- version: 'WzU3LDFd',
comment: 'first comment',
createdAt: '2020-03-13T08:34:53.450Z',
createdBy: { fullName: 'Elastic User', username: 'elastic' },
@@ -342,11 +340,10 @@ describe('transformComments', () => {
updatedBy: null,
},
];
- const res = transformComments(comments, fullParams, ['informationCreated']);
+ const res = transformComments(comments, ['informationCreated']);
expect(res).toEqual([
{
commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
- version: 'WzU3LDFd',
comment: 'first comment (created at 2020-03-13T08:34:53.450Z by Elastic User)',
createdAt: '2020-03-13T08:34:53.450Z',
createdBy: { fullName: 'Elastic User', username: 'elastic' },
@@ -360,32 +357,36 @@ describe('transformComments', () => {
const comments: Comment[] = [
{
commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
- version: 'WzU3LDFd',
comment: 'first comment',
createdAt: '2020-03-13T08:34:53.450Z',
createdBy: { fullName: 'Elastic User', username: 'elastic' },
updatedAt: '2020-03-15T08:34:53.450Z',
- updatedBy: { fullName: 'Another User', username: 'anotherUser' },
+ updatedBy: {
+ fullName: 'Another User',
+ username: 'anotherUser',
+ },
},
];
- const res = transformComments(comments, fullParams, ['informationUpdated']);
+ const res = transformComments(comments, ['informationUpdated']);
expect(res).toEqual([
{
commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
- version: 'WzU3LDFd',
comment: 'first comment (updated at 2020-03-15T08:34:53.450Z by Another User)',
createdAt: '2020-03-13T08:34:53.450Z',
createdBy: { fullName: 'Elastic User', username: 'elastic' },
updatedAt: '2020-03-15T08:34:53.450Z',
- updatedBy: { fullName: 'Another User', username: 'anotherUser' },
+ updatedBy: {
+ fullName: 'Another User',
+ username: 'anotherUser',
+ },
},
]);
});
+
test('transform added comments', () => {
const comments: Comment[] = [
{
commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
- version: 'WzU3LDFd',
comment: 'first comment',
createdAt: '2020-03-13T08:34:53.450Z',
createdBy: { fullName: 'Elastic User', username: 'elastic' },
@@ -393,11 +394,10 @@ describe('transformComments', () => {
updatedBy: null,
},
];
- const res = transformComments(comments, fullParams, ['informationAdded']);
+ const res = transformComments(comments, ['informationAdded']);
expect(res).toEqual([
{
commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
- version: 'WzU3LDFd',
comment: 'first comment (added at 2020-03-13T08:34:53.450Z by Elastic User)',
createdAt: '2020-03-13T08:34:53.450Z',
createdBy: { fullName: 'Elastic User', username: 'elastic' },
@@ -406,4 +406,171 @@ describe('transformComments', () => {
},
]);
});
+
+ test('transform comments without fullname', () => {
+ const comments: Comment[] = [
+ {
+ commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
+ comment: 'first comment',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: { fullName: '', username: 'elastic' },
+ updatedAt: null,
+ updatedBy: null,
+ },
+ ];
+ const res = transformComments(comments, ['informationAdded']);
+ expect(res).toEqual([
+ {
+ commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
+ comment: 'first comment (added at 2020-03-13T08:34:53.450Z by elastic)',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: { fullName: '', username: 'elastic' },
+ updatedAt: null,
+ updatedBy: null,
+ },
+ ]);
+ });
+
+ test('adds update user correctly', () => {
+ const comments: Comment[] = [
+ {
+ commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
+ comment: 'first comment',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: { fullName: 'Elastic', username: 'elastic' },
+ updatedAt: '2020-04-13T08:34:53.450Z',
+ updatedBy: { fullName: 'Elastic2', username: 'elastic' },
+ },
+ ];
+ const res = transformComments(comments, ['informationAdded']);
+ expect(res).toEqual([
+ {
+ commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
+ comment: 'first comment (added at 2020-04-13T08:34:53.450Z by Elastic2)',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: { fullName: 'Elastic', username: 'elastic' },
+ updatedAt: '2020-04-13T08:34:53.450Z',
+ updatedBy: { fullName: 'Elastic2', username: 'elastic' },
+ },
+ ]);
+ });
+
+ test('adds update user with empty fullname correctly', () => {
+ const comments: Comment[] = [
+ {
+ commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
+ comment: 'first comment',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: { fullName: 'Elastic', username: 'elastic' },
+ updatedAt: '2020-04-13T08:34:53.450Z',
+ updatedBy: { fullName: '', username: 'elastic2' },
+ },
+ ];
+ const res = transformComments(comments, ['informationAdded']);
+ expect(res).toEqual([
+ {
+ commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
+ comment: 'first comment (added at 2020-04-13T08:34:53.450Z by elastic2)',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: { fullName: 'Elastic', username: 'elastic' },
+ updatedAt: '2020-04-13T08:34:53.450Z',
+ updatedBy: { fullName: '', username: 'elastic2' },
+ },
+ ]);
+ });
+});
+
+describe('addTimeZoneToDate', () => {
+ test('adds timezone with default', () => {
+ const date = addTimeZoneToDate('2020-04-14T15:01:55.456Z');
+ expect(date).toBe('2020-04-14T15:01:55.456Z GMT');
+ });
+
+ test('adds timezone correctly', () => {
+ const date = addTimeZoneToDate('2020-04-14T15:01:55.456Z', 'PST');
+ expect(date).toBe('2020-04-14T15:01:55.456Z PST');
+ });
+});
+
+describe('throwIfNotAlive ', () => {
+ test('throws correctly when status is invalid', async () => {
+ expect(() => {
+ throwIfNotAlive(404, 'application/json');
+ }).toThrow('Instance is not alive.');
+ });
+
+ test('throws correctly when content is invalid', () => {
+ expect(() => {
+ throwIfNotAlive(200, 'application/html');
+ }).toThrow('Instance is not alive.');
+ });
+
+ test('do NOT throws with custom validStatusCodes', async () => {
+ expect(() => {
+ throwIfNotAlive(404, 'application/json', [404]);
+ }).not.toThrow('Instance is not alive.');
+ });
+});
+
+describe('request', () => {
+ beforeEach(() => {
+ axiosMock.mockImplementation(() => ({
+ status: 200,
+ headers: { 'content-type': 'application/json' },
+ data: { incidentId: '123' },
+ }));
+ });
+
+ test('it fetch correctly with defaults', async () => {
+ const res = await request({ axios, url: '/test' });
+
+ expect(axiosMock).toHaveBeenCalledWith('/test', { method: 'get', data: {} });
+ expect(res).toEqual({
+ status: 200,
+ headers: { 'content-type': 'application/json' },
+ data: { incidentId: '123' },
+ });
+ });
+
+ test('it fetch correctly', async () => {
+ const res = await request({ axios, url: '/test', method: 'post', data: { id: '123' } });
+
+ expect(axiosMock).toHaveBeenCalledWith('/test', { method: 'post', data: { id: '123' } });
+ expect(res).toEqual({
+ status: 200,
+ headers: { 'content-type': 'application/json' },
+ data: { incidentId: '123' },
+ });
+ });
+
+ test('it throws correctly', async () => {
+ axiosMock.mockImplementation(() => ({
+ status: 404,
+ headers: { 'content-type': 'application/json' },
+ data: { incidentId: '123' },
+ }));
+
+ await expect(request({ axios, url: '/test' })).rejects.toThrow();
+ });
+});
+
+describe('patch', () => {
+ beforeEach(() => {
+ axiosMock.mockImplementation(() => ({
+ status: 200,
+ headers: { 'content-type': 'application/json' },
+ }));
+ });
+
+ test('it fetch correctly', async () => {
+ await patch({ axios, url: '/test', data: { id: '123' } });
+ expect(axiosMock).toHaveBeenCalledWith('/test', { method: 'patch', data: { id: '123' } });
+ });
+});
+
+describe('getErrorMessage', () => {
+ test('it returns the correct error message', () => {
+ const msg = getErrorMessage('My connector name', 'An error has occurred');
+ expect(msg).toBe('[Action][My connector name]: An error has occurred');
+ });
});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/case/utils.ts b/x-pack/plugins/actions/server/builtin_action_types/case/utils.ts
new file mode 100644
index 0000000000000..7d69b2791f624
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/case/utils.ts
@@ -0,0 +1,249 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { curry, flow, get } from 'lodash';
+import { schema } from '@kbn/config-schema';
+import { AxiosInstance, Method, AxiosResponse } from 'axios';
+
+import { ActionTypeExecutorOptions, ActionTypeExecutorResult, ActionType } from '../../types';
+
+import { ExecutorParamsSchema } from './schema';
+
+import {
+ CreateExternalServiceArgs,
+ CreateActionTypeArgs,
+ ExecutorParams,
+ MapRecord,
+ AnyParams,
+ CreateExternalServiceBasicArgs,
+ PrepareFieldsForTransformArgs,
+ PipedField,
+ TransformFieldsArgs,
+ Comment,
+ ExecutorSubActionPushParams,
+} from './types';
+
+import { transformers, Transformer } from './transformers';
+
+import { SUPPORTED_SOURCE_FIELDS } from './constants';
+
+export const normalizeMapping = (supportedFields: string[], mapping: MapRecord[]): MapRecord[] => {
+ // Prevent prototype pollution and remove unsupported fields
+ return mapping.filter(
+ m => m.source !== '__proto__' && m.target !== '__proto__' && supportedFields.includes(m.source)
+ );
+};
+
+export const buildMap = (mapping: MapRecord[]): Map => {
+ return normalizeMapping(SUPPORTED_SOURCE_FIELDS, mapping).reduce((fieldsMap, field) => {
+ const { source, target, actionType } = field;
+ fieldsMap.set(source, { target, actionType });
+ fieldsMap.set(target, { target: source, actionType });
+ return fieldsMap;
+ }, new Map());
+};
+
+export const mapParams = (
+ params: Partial,
+ mapping: Map
+): AnyParams => {
+ return Object.keys(params).reduce((prev: AnyParams, curr: string): AnyParams => {
+ const field = mapping.get(curr);
+ if (field) {
+ prev[field.target] = get(params, curr);
+ }
+ return prev;
+ }, {});
+};
+
+export const createConnectorExecutor = ({
+ api,
+ createExternalService,
+}: CreateExternalServiceBasicArgs) => async (
+ execOptions: ActionTypeExecutorOptions
+): Promise => {
+ const { actionId, config, params, secrets } = execOptions;
+ const { subAction, subActionParams } = params as ExecutorParams;
+ let data = {};
+
+ const res: Pick &
+ Pick = {
+ status: 'ok',
+ actionId,
+ };
+
+ const externalService = createExternalService({
+ config,
+ secrets,
+ });
+
+ if (!api[subAction]) {
+ throw new Error('[Action][ExternalService] Unsupported subAction type.');
+ }
+
+ if (subAction !== 'pushToService') {
+ throw new Error('[Action][ExternalService] subAction not implemented.');
+ }
+
+ if (subAction === 'pushToService') {
+ const pushToServiceParams = subActionParams as ExecutorSubActionPushParams;
+ const { comments, externalId, ...restParams } = pushToServiceParams;
+
+ const mapping = buildMap(config.casesConfiguration.mapping);
+ const externalCase = mapParams(restParams, mapping);
+
+ data = await api.pushToService({
+ externalService,
+ mapping,
+ params: { ...pushToServiceParams, externalCase },
+ });
+ }
+
+ return {
+ ...res,
+ data,
+ };
+};
+
+export const createConnector = ({
+ api,
+ config,
+ validate,
+ createExternalService,
+ validationSchema,
+}: CreateExternalServiceArgs) => {
+ return ({
+ configurationUtilities,
+ executor = createConnectorExecutor({ api, createExternalService }),
+ }: CreateActionTypeArgs): ActionType => ({
+ id: config.id,
+ name: config.name,
+ minimumLicenseRequired: 'platinum',
+ validate: {
+ config: schema.object(validationSchema.config, {
+ validate: curry(validate.config)(configurationUtilities),
+ }),
+ secrets: schema.object(validationSchema.secrets, {
+ validate: curry(validate.secrets)(configurationUtilities),
+ }),
+ params: ExecutorParamsSchema,
+ },
+ executor,
+ });
+};
+
+export const throwIfNotAlive = (
+ status: number,
+ contentType: string,
+ validStatusCodes: number[] = [200, 201, 204]
+) => {
+ if (!validStatusCodes.includes(status) || !contentType.includes('application/json')) {
+ throw new Error('Instance is not alive.');
+ }
+};
+
+export const request = async ({
+ axios,
+ url,
+ method = 'get',
+ data,
+}: {
+ axios: AxiosInstance;
+ url: string;
+ method?: Method;
+ data?: T;
+}): Promise => {
+ const res = await axios(url, { method, data: data ?? {} });
+ throwIfNotAlive(res.status, res.headers['content-type']);
+ return res;
+};
+
+export const patch = async ({
+ axios,
+ url,
+ data,
+}: {
+ axios: AxiosInstance;
+ url: string;
+ data: T;
+}): Promise => {
+ return request({
+ axios,
+ url,
+ method: 'patch',
+ data,
+ });
+};
+
+export const addTimeZoneToDate = (date: string, timezone = 'GMT'): string => {
+ return `${date} ${timezone}`;
+};
+
+export const prepareFieldsForTransformation = ({
+ params,
+ mapping,
+ defaultPipes = ['informationCreated'],
+}: PrepareFieldsForTransformArgs): PipedField[] => {
+ return Object.keys(params.externalCase)
+ .filter(p => mapping.get(p)?.actionType != null && mapping.get(p)?.actionType !== 'nothing')
+ .map(p => {
+ const actionType = mapping.get(p)?.actionType ?? 'nothing';
+ return {
+ key: p,
+ value: params.externalCase[p],
+ actionType,
+ pipes: actionType === 'append' ? [...defaultPipes, 'append'] : defaultPipes,
+ };
+ });
+};
+
+export const transformFields = ({
+ params,
+ fields,
+ currentIncident,
+}: TransformFieldsArgs): Record => {
+ return fields.reduce((prev, cur) => {
+ const transform = flow(...cur.pipes.map(p => transformers[p]));
+ return {
+ ...prev,
+ [cur.key]: transform({
+ value: cur.value,
+ date: params.updatedAt ?? params.createdAt,
+ user:
+ (params.updatedBy != null
+ ? params.updatedBy.fullName
+ ? params.updatedBy.fullName
+ : params.updatedBy.username
+ : params.createdBy.fullName
+ ? params.createdBy.fullName
+ : params.createdBy.username) ?? '',
+ previousValue: currentIncident ? currentIncident[cur.key] : '',
+ }).value,
+ };
+ }, {});
+};
+
+export const transformComments = (comments: Comment[], pipes: string[]): Comment[] => {
+ return comments.map(c => ({
+ ...c,
+ comment: flow(...pipes.map(p => transformers[p]))({
+ value: c.comment,
+ date: c.updatedAt ?? c.createdAt,
+ user:
+ (c.updatedBy != null
+ ? c.updatedBy.fullName
+ ? c.updatedBy.fullName
+ : c.updatedBy.username
+ : c.createdBy.fullName
+ ? c.createdBy.fullName
+ : c.createdBy.username) ?? '',
+ }).value,
+ }));
+};
+
+export const getErrorMessage = (connector: string, msg: string) => {
+ return `[Action][${connector}]: ${msg}`;
+};
diff --git a/x-pack/plugins/actions/server/builtin_action_types/case/validators.ts b/x-pack/plugins/actions/server/builtin_action_types/case/validators.ts
new file mode 100644
index 0000000000000..80e301e5be082
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/case/validators.ts
@@ -0,0 +1,35 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { isEmpty } from 'lodash';
+
+import { ActionsConfigurationUtilities } from '../../actions_config';
+import {
+ ExternalIncidentServiceConfiguration,
+ ExternalIncidentServiceSecretConfiguration,
+} from './types';
+
+import * as i18n from './translations';
+
+export const validateCommonConfig = (
+ configurationUtilities: ActionsConfigurationUtilities,
+ configObject: ExternalIncidentServiceConfiguration
+) => {
+ try {
+ if (isEmpty(configObject.casesConfiguration.mapping)) {
+ return i18n.MAPPING_EMPTY;
+ }
+
+ configurationUtilities.ensureWhitelistedUri(configObject.apiUrl);
+ } catch (whitelistError) {
+ return i18n.WHITE_LISTED_ERROR(whitelistError.message);
+ }
+};
+
+export const validateCommonSecrets = (
+ configurationUtilities: ActionsConfigurationUtilities,
+ secrets: ExternalIncidentServiceSecretConfiguration
+) => {};
diff --git a/x-pack/plugins/actions/server/builtin_action_types/index.ts b/x-pack/plugins/actions/server/builtin_action_types/index.ts
index a92a279d08439..6ba4d7cfc7de0 100644
--- a/x-pack/plugins/actions/server/builtin_action_types/index.ts
+++ b/x-pack/plugins/actions/server/builtin_action_types/index.ts
@@ -12,9 +12,10 @@ import { getActionType as getEmailActionType } from './email';
import { getActionType as getIndexActionType } from './es_index';
import { getActionType as getPagerDutyActionType } from './pagerduty';
import { getActionType as getServerLogActionType } from './server_log';
-import { getActionType as getServiceNowActionType } from './servicenow';
import { getActionType as getSlackActionType } from './slack';
import { getActionType as getWebhookActionType } from './webhook';
+import { getActionType as getServiceNowActionType } from './servicenow';
+import { getActionType as getJiraActionType } from './jira';
export function registerBuiltInActionTypes({
actionsConfigUtils: configurationUtilities,
@@ -29,7 +30,8 @@ export function registerBuiltInActionTypes({
actionTypeRegistry.register(getIndexActionType({ logger }));
actionTypeRegistry.register(getPagerDutyActionType({ logger, configurationUtilities }));
actionTypeRegistry.register(getServerLogActionType({ logger }));
- actionTypeRegistry.register(getServiceNowActionType({ configurationUtilities }));
actionTypeRegistry.register(getSlackActionType({ configurationUtilities }));
actionTypeRegistry.register(getWebhookActionType({ logger, configurationUtilities }));
+ actionTypeRegistry.register(getServiceNowActionType({ configurationUtilities }));
+ actionTypeRegistry.register(getJiraActionType({ configurationUtilities }));
}
diff --git a/x-pack/plugins/actions/server/builtin_action_types/jira/api.test.ts b/x-pack/plugins/actions/server/builtin_action_types/jira/api.test.ts
new file mode 100644
index 0000000000000..bcfb82077d286
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/jira/api.test.ts
@@ -0,0 +1,517 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { api } from '../case/api';
+import { externalServiceMock, mapping, apiParams } from './mocks';
+import { ExternalService } from '../case/types';
+
+describe('api', () => {
+ let externalService: jest.Mocked;
+
+ beforeEach(() => {
+ externalService = externalServiceMock.create();
+ });
+
+ afterEach(() => {
+ jest.clearAllMocks();
+ });
+
+ describe('pushToService', () => {
+ describe('create incident', () => {
+ test('it creates an incident', async () => {
+ const params = { ...apiParams, externalId: null };
+ const res = await api.pushToService({ externalService, mapping, params });
+
+ expect(res).toEqual({
+ id: 'incident-1',
+ title: 'CK-1',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ url: 'https://siem-kibana.atlassian.net/browse/CK-1',
+ comments: [
+ {
+ commentId: 'case-comment-1',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ },
+ {
+ commentId: 'case-comment-2',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ },
+ ],
+ });
+ });
+
+ test('it creates an incident without comments', async () => {
+ const params = { ...apiParams, externalId: null, comments: [] };
+ const res = await api.pushToService({ externalService, mapping, params });
+
+ expect(res).toEqual({
+ id: 'incident-1',
+ title: 'CK-1',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ url: 'https://siem-kibana.atlassian.net/browse/CK-1',
+ });
+ });
+
+ test('it calls createIncident correctly', async () => {
+ const params = { ...apiParams, externalId: null };
+ await api.pushToService({ externalService, mapping, params });
+
+ expect(externalService.createIncident).toHaveBeenCalledWith({
+ incident: {
+ description:
+ 'Incident description (created at 2020-04-27T10:59:46.202Z by Elastic User)',
+ summary: 'Incident title (created at 2020-04-27T10:59:46.202Z by Elastic User)',
+ },
+ });
+ expect(externalService.updateIncident).not.toHaveBeenCalled();
+ });
+
+ test('it calls createComment correctly', async () => {
+ const params = { ...apiParams, externalId: null };
+ await api.pushToService({ externalService, mapping, params });
+ expect(externalService.createComment).toHaveBeenCalledTimes(2);
+ expect(externalService.createComment).toHaveBeenNthCalledWith(1, {
+ incidentId: 'incident-1',
+ comment: {
+ commentId: 'case-comment-1',
+ comment: 'A comment (added at 2020-04-27T10:59:46.202Z by Elastic User)',
+ createdAt: '2020-04-27T10:59:46.202Z',
+ createdBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ updatedAt: '2020-04-27T10:59:46.202Z',
+ updatedBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ },
+ field: 'comments',
+ });
+
+ expect(externalService.createComment).toHaveBeenNthCalledWith(2, {
+ incidentId: 'incident-1',
+ comment: {
+ commentId: 'case-comment-2',
+ comment: 'Another comment (added at 2020-04-27T10:59:46.202Z by Elastic User)',
+ createdAt: '2020-04-27T10:59:46.202Z',
+ createdBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ updatedAt: '2020-04-27T10:59:46.202Z',
+ updatedBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ },
+ field: 'comments',
+ });
+ });
+ });
+
+ describe('update incident', () => {
+ test('it updates an incident', async () => {
+ const res = await api.pushToService({ externalService, mapping, params: apiParams });
+
+ expect(res).toEqual({
+ id: 'incident-1',
+ title: 'CK-1',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ url: 'https://siem-kibana.atlassian.net/browse/CK-1',
+ comments: [
+ {
+ commentId: 'case-comment-1',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ },
+ {
+ commentId: 'case-comment-2',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ },
+ ],
+ });
+ });
+
+ test('it updates an incident without comments', async () => {
+ const params = { ...apiParams, comments: [] };
+ const res = await api.pushToService({ externalService, mapping, params });
+
+ expect(res).toEqual({
+ id: 'incident-1',
+ title: 'CK-1',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ url: 'https://siem-kibana.atlassian.net/browse/CK-1',
+ });
+ });
+
+ test('it calls updateIncident correctly', async () => {
+ const params = { ...apiParams };
+ await api.pushToService({ externalService, mapping, params });
+
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ description:
+ 'Incident description (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ summary: 'Incident title (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ },
+ });
+ expect(externalService.createIncident).not.toHaveBeenCalled();
+ });
+
+ test('it calls createComment correctly', async () => {
+ const params = { ...apiParams };
+ await api.pushToService({ externalService, mapping, params });
+ expect(externalService.createComment).toHaveBeenCalledTimes(2);
+ expect(externalService.createComment).toHaveBeenNthCalledWith(1, {
+ incidentId: 'incident-1',
+ comment: {
+ commentId: 'case-comment-1',
+ comment: 'A comment (added at 2020-04-27T10:59:46.202Z by Elastic User)',
+ createdAt: '2020-04-27T10:59:46.202Z',
+ createdBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ updatedAt: '2020-04-27T10:59:46.202Z',
+ updatedBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ },
+ field: 'comments',
+ });
+
+ expect(externalService.createComment).toHaveBeenNthCalledWith(2, {
+ incidentId: 'incident-1',
+ comment: {
+ commentId: 'case-comment-2',
+ comment: 'Another comment (added at 2020-04-27T10:59:46.202Z by Elastic User)',
+ createdAt: '2020-04-27T10:59:46.202Z',
+ createdBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ updatedAt: '2020-04-27T10:59:46.202Z',
+ updatedBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ },
+ field: 'comments',
+ });
+ });
+ });
+
+ describe('mapping variations', () => {
+ test('overwrite & append', async () => {
+ mapping.set('title', {
+ target: 'summary',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'append',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('summary', {
+ target: 'title',
+ actionType: 'overwrite',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ summary: 'Incident title (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ description:
+ 'description from jira \r\nIncident description (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ },
+ });
+ });
+
+ test('nothing & append', async () => {
+ mapping.set('title', {
+ target: 'summary',
+ actionType: 'nothing',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'append',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('summary', {
+ target: 'title',
+ actionType: 'nothing',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ description:
+ 'description from jira \r\nIncident description (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ },
+ });
+ });
+
+ test('append & append', async () => {
+ mapping.set('title', {
+ target: 'summary',
+ actionType: 'append',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'append',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('summary', {
+ target: 'title',
+ actionType: 'append',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ summary:
+ 'title from jira \r\nIncident title (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ description:
+ 'description from jira \r\nIncident description (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ },
+ });
+ });
+
+ test('nothing & nothing', async () => {
+ mapping.set('title', {
+ target: 'summary',
+ actionType: 'nothing',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'nothing',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('summary', {
+ target: 'title',
+ actionType: 'nothing',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {},
+ });
+ });
+
+ test('overwrite & nothing', async () => {
+ mapping.set('title', {
+ target: 'summary',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'nothing',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('summary', {
+ target: 'title',
+ actionType: 'overwrite',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ summary: 'Incident title (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ },
+ });
+ });
+
+ test('overwrite & overwrite', async () => {
+ mapping.set('title', {
+ target: 'summary',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('summary', {
+ target: 'title',
+ actionType: 'overwrite',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ summary: 'Incident title (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ description:
+ 'Incident description (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ },
+ });
+ });
+
+ test('nothing & overwrite', async () => {
+ mapping.set('title', {
+ target: 'summary',
+ actionType: 'nothing',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('summary', {
+ target: 'title',
+ actionType: 'nothing',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ description:
+ 'Incident description (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ },
+ });
+ });
+
+ test('append & overwrite', async () => {
+ mapping.set('title', {
+ target: 'summary',
+ actionType: 'append',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('summary', {
+ target: 'title',
+ actionType: 'append',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ summary:
+ 'title from jira \r\nIncident title (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ description:
+ 'Incident description (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ },
+ });
+ });
+
+ test('append & nothing', async () => {
+ mapping.set('title', {
+ target: 'summary',
+ actionType: 'append',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'nothing',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('summary', {
+ target: 'title',
+ actionType: 'append',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ summary:
+ 'title from jira \r\nIncident title (updated at 2020-04-27T10:59:46.202Z by Elastic User)',
+ },
+ });
+ });
+
+ test('comment nothing', async () => {
+ mapping.set('title', {
+ target: 'summary',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'nothing',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'nothing',
+ });
+
+ mapping.set('summary', {
+ target: 'title',
+ actionType: 'overwrite',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.createComment).not.toHaveBeenCalled();
+ });
+ });
+ });
+});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/jira/api.ts b/x-pack/plugins/actions/server/builtin_action_types/jira/api.ts
new file mode 100644
index 0000000000000..3db66e5884af4
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/jira/api.ts
@@ -0,0 +1,7 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+export { api } from '../case/api';
diff --git a/x-pack/plugins/actions/server/builtin_action_types/jira/config.ts b/x-pack/plugins/actions/server/builtin_action_types/jira/config.ts
new file mode 100644
index 0000000000000..7e415109f1bd9
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/jira/config.ts
@@ -0,0 +1,13 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { ExternalServiceConfiguration } from '../case/types';
+import * as i18n from './translations';
+
+export const config: ExternalServiceConfiguration = {
+ id: '.jira',
+ name: i18n.NAME,
+};
diff --git a/x-pack/plugins/actions/server/builtin_action_types/jira/index.ts b/x-pack/plugins/actions/server/builtin_action_types/jira/index.ts
new file mode 100644
index 0000000000000..a2d7bb5930a75
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/jira/index.ts
@@ -0,0 +1,24 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { createConnector } from '../case/utils';
+
+import { api } from './api';
+import { config } from './config';
+import { validate } from './validators';
+import { createExternalService } from './service';
+import { JiraSecretConfiguration, JiraPublicConfiguration } from './schema';
+
+export const getActionType = createConnector({
+ api,
+ config,
+ validate,
+ createExternalService,
+ validationSchema: {
+ config: JiraPublicConfiguration,
+ secrets: JiraSecretConfiguration,
+ },
+});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/jira/mocks.ts b/x-pack/plugins/actions/server/builtin_action_types/jira/mocks.ts
new file mode 100644
index 0000000000000..3ae0e9db36de0
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/jira/mocks.ts
@@ -0,0 +1,124 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import {
+ ExternalService,
+ PushToServiceApiParams,
+ ExecutorSubActionPushParams,
+ MapRecord,
+} from '../case/types';
+
+const createMock = (): jest.Mocked => {
+ const service = {
+ getIncident: jest.fn().mockImplementation(() =>
+ Promise.resolve({
+ id: 'incident-1',
+ key: 'CK-1',
+ summary: 'title from jira',
+ description: 'description from jira',
+ created: '2020-04-27T10:59:46.202Z',
+ updated: '2020-04-27T10:59:46.202Z',
+ })
+ ),
+ createIncident: jest.fn().mockImplementation(() =>
+ Promise.resolve({
+ id: 'incident-1',
+ title: 'CK-1',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ url: 'https://siem-kibana.atlassian.net/browse/CK-1',
+ })
+ ),
+ updateIncident: jest.fn().mockImplementation(() =>
+ Promise.resolve({
+ id: 'incident-1',
+ title: 'CK-1',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ url: 'https://siem-kibana.atlassian.net/browse/CK-1',
+ })
+ ),
+ createComment: jest.fn(),
+ };
+
+ service.createComment.mockImplementationOnce(() =>
+ Promise.resolve({
+ commentId: 'case-comment-1',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ externalCommentId: '1',
+ })
+ );
+
+ service.createComment.mockImplementationOnce(() =>
+ Promise.resolve({
+ commentId: 'case-comment-2',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ externalCommentId: '2',
+ })
+ );
+
+ return service;
+};
+
+const externalServiceMock = {
+ create: createMock,
+};
+
+const mapping: Map> = new Map();
+
+mapping.set('title', {
+ target: 'summary',
+ actionType: 'overwrite',
+});
+
+mapping.set('description', {
+ target: 'description',
+ actionType: 'overwrite',
+});
+
+mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+});
+
+mapping.set('summary', {
+ target: 'title',
+ actionType: 'overwrite',
+});
+
+const executorParams: ExecutorSubActionPushParams = {
+ caseId: 'd4387ac5-0899-4dc2-bbfa-0dd605c934aa',
+ externalId: 'incident-3',
+ createdAt: '2020-04-27T10:59:46.202Z',
+ createdBy: { fullName: 'Elastic User', username: 'elastic' },
+ updatedAt: '2020-04-27T10:59:46.202Z',
+ updatedBy: { fullName: 'Elastic User', username: 'elastic' },
+ title: 'Incident title',
+ description: 'Incident description',
+ comments: [
+ {
+ commentId: 'case-comment-1',
+ comment: 'A comment',
+ createdAt: '2020-04-27T10:59:46.202Z',
+ createdBy: { fullName: 'Elastic User', username: 'elastic' },
+ updatedAt: '2020-04-27T10:59:46.202Z',
+ updatedBy: { fullName: 'Elastic User', username: 'elastic' },
+ },
+ {
+ commentId: 'case-comment-2',
+ comment: 'Another comment',
+ createdAt: '2020-04-27T10:59:46.202Z',
+ createdBy: { fullName: 'Elastic User', username: 'elastic' },
+ updatedAt: '2020-04-27T10:59:46.202Z',
+ updatedBy: { fullName: 'Elastic User', username: 'elastic' },
+ },
+ ],
+};
+
+const apiParams: PushToServiceApiParams = {
+ ...executorParams,
+ externalCase: { summary: 'Incident title', description: 'Incident description' },
+};
+
+export { externalServiceMock, mapping, executorParams, apiParams };
diff --git a/x-pack/plugins/actions/server/builtin_action_types/jira/schema.ts b/x-pack/plugins/actions/server/builtin_action_types/jira/schema.ts
new file mode 100644
index 0000000000000..9c831e75d91c1
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/jira/schema.ts
@@ -0,0 +1,22 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { schema } from '@kbn/config-schema';
+import { ExternalIncidentServiceConfiguration } from '../case/schema';
+
+export const JiraPublicConfiguration = {
+ projectKey: schema.string(),
+ ...ExternalIncidentServiceConfiguration,
+};
+
+export const JiraPublicConfigurationSchema = schema.object(JiraPublicConfiguration);
+
+export const JiraSecretConfiguration = {
+ email: schema.string(),
+ apiToken: schema.string(),
+};
+
+export const JiraSecretConfigurationSchema = schema.object(JiraSecretConfiguration);
diff --git a/x-pack/plugins/actions/server/builtin_action_types/jira/service.test.ts b/x-pack/plugins/actions/server/builtin_action_types/jira/service.test.ts
new file mode 100644
index 0000000000000..b9225b043d526
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/jira/service.test.ts
@@ -0,0 +1,297 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import axios from 'axios';
+
+import { createExternalService } from './service';
+import * as utils from '../case/utils';
+import { ExternalService } from '../case/types';
+
+jest.mock('axios');
+jest.mock('../case/utils', () => {
+ const originalUtils = jest.requireActual('../case/utils');
+ return {
+ ...originalUtils,
+ request: jest.fn(),
+ };
+});
+
+axios.create = jest.fn(() => axios);
+const requestMock = utils.request as jest.Mock;
+
+describe('Jira service', () => {
+ let service: ExternalService;
+
+ beforeAll(() => {
+ service = createExternalService({
+ config: { apiUrl: 'https://siem-kibana.atlassian.net', projectKey: 'CK' },
+ secrets: { apiToken: 'token', email: 'elastic@elastic.com' },
+ });
+ });
+
+ beforeEach(() => {
+ jest.clearAllMocks();
+ });
+
+ describe('createExternalService', () => {
+ test('throws without url', () => {
+ expect(() =>
+ createExternalService({
+ config: { apiUrl: null, projectKey: 'CK' },
+ secrets: { apiToken: 'token', email: 'elastic@elastic.com' },
+ })
+ ).toThrow();
+ });
+
+ test('throws without projectKey', () => {
+ expect(() =>
+ createExternalService({
+ config: { apiUrl: 'test.com', projectKey: null },
+ secrets: { apiToken: 'token', email: 'elastic@elastic.com' },
+ })
+ ).toThrow();
+ });
+
+ test('throws without username', () => {
+ expect(() =>
+ createExternalService({
+ config: { apiUrl: 'test.com' },
+ secrets: { apiToken: '', email: 'elastic@elastic.com' },
+ })
+ ).toThrow();
+ });
+
+ test('throws without password', () => {
+ expect(() =>
+ createExternalService({
+ config: { apiUrl: 'test.com' },
+ secrets: { apiToken: '', email: undefined },
+ })
+ ).toThrow();
+ });
+ });
+
+ describe('getIncident', () => {
+ test('it returns the incident correctly', async () => {
+ requestMock.mockImplementation(() => ({
+ data: { id: '1', key: 'CK-1', fields: { summary: 'title', description: 'description' } },
+ }));
+ const res = await service.getIncident('1');
+ expect(res).toEqual({ id: '1', key: 'CK-1', summary: 'title', description: 'description' });
+ });
+
+ test('it should call request with correct arguments', async () => {
+ requestMock.mockImplementation(() => ({
+ data: { id: '1', key: 'CK-1' },
+ }));
+
+ await service.getIncident('1');
+ expect(requestMock).toHaveBeenCalledWith({
+ axios,
+ url: 'https://siem-kibana.atlassian.net/rest/api/2/issue/1',
+ });
+ });
+
+ test('it should throw an error', async () => {
+ requestMock.mockImplementation(() => {
+ throw new Error('An error has occurred');
+ });
+ expect(service.getIncident('1')).rejects.toThrow(
+ 'Unable to get incident with id 1. Error: An error has occurred'
+ );
+ });
+ });
+
+ describe('createIncident', () => {
+ test('it creates the incident correctly', async () => {
+ // The response from Jira when creating an issue contains only the key and the id.
+ // The service makes two calls when creating an issue. One to create and one to get
+ // the created incident with all the necessary fields.
+ requestMock.mockImplementationOnce(() => ({
+ data: { id: '1', key: 'CK-1', fields: { summary: 'title', description: 'description' } },
+ }));
+
+ requestMock.mockImplementationOnce(() => ({
+ data: { id: '1', key: 'CK-1', fields: { created: '2020-04-27T10:59:46.202Z' } },
+ }));
+
+ const res = await service.createIncident({
+ incident: { summary: 'title', description: 'desc' },
+ });
+
+ expect(res).toEqual({
+ title: 'CK-1',
+ id: '1',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ url: 'https://siem-kibana.atlassian.net/browse/CK-1',
+ });
+ });
+
+ test('it should call request with correct arguments', async () => {
+ requestMock.mockImplementation(() => ({
+ data: {
+ id: '1',
+ key: 'CK-1',
+ fields: { created: '2020-04-27T10:59:46.202Z' },
+ },
+ }));
+
+ await service.createIncident({
+ incident: { summary: 'title', description: 'desc' },
+ });
+
+ expect(requestMock).toHaveBeenCalledWith({
+ axios,
+ url: 'https://siem-kibana.atlassian.net/rest/api/2/issue',
+ method: 'post',
+ data: {
+ fields: {
+ summary: 'title',
+ description: 'desc',
+ project: { key: 'CK' },
+ issuetype: { name: 'Task' },
+ },
+ },
+ });
+ });
+
+ test('it should throw an error', async () => {
+ requestMock.mockImplementation(() => {
+ throw new Error('An error has occurred');
+ });
+
+ expect(
+ service.createIncident({
+ incident: { summary: 'title', description: 'desc' },
+ })
+ ).rejects.toThrow('[Action][Jira]: Unable to create incident. Error: An error has occurred');
+ });
+ });
+
+ describe('updateIncident', () => {
+ test('it updates the incident correctly', async () => {
+ requestMock.mockImplementation(() => ({
+ data: {
+ id: '1',
+ key: 'CK-1',
+ fields: { updated: '2020-04-27T10:59:46.202Z' },
+ },
+ }));
+
+ const res = await service.updateIncident({
+ incidentId: '1',
+ incident: { summary: 'title', description: 'desc' },
+ });
+
+ expect(res).toEqual({
+ title: 'CK-1',
+ id: '1',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ url: 'https://siem-kibana.atlassian.net/browse/CK-1',
+ });
+ });
+
+ test('it should call request with correct arguments', async () => {
+ requestMock.mockImplementation(() => ({
+ data: {
+ id: '1',
+ key: 'CK-1',
+ fields: { updated: '2020-04-27T10:59:46.202Z' },
+ },
+ }));
+
+ await service.updateIncident({
+ incidentId: '1',
+ incident: { summary: 'title', description: 'desc' },
+ });
+
+ expect(requestMock).toHaveBeenCalledWith({
+ axios,
+ method: 'put',
+ url: 'https://siem-kibana.atlassian.net/rest/api/2/issue/1',
+ data: { fields: { summary: 'title', description: 'desc' } },
+ });
+ });
+
+ test('it should throw an error', async () => {
+ requestMock.mockImplementation(() => {
+ throw new Error('An error has occurred');
+ });
+
+ expect(
+ service.updateIncident({
+ incidentId: '1',
+ incident: { summary: 'title', description: 'desc' },
+ })
+ ).rejects.toThrow(
+ '[Action][Jira]: Unable to update incident with id 1. Error: An error has occurred'
+ );
+ });
+ });
+
+ describe('createComment', () => {
+ test('it creates the comment correctly', async () => {
+ requestMock.mockImplementation(() => ({
+ data: {
+ id: '1',
+ key: 'CK-1',
+ created: '2020-04-27T10:59:46.202Z',
+ },
+ }));
+
+ const res = await service.createComment({
+ incidentId: '1',
+ comment: { comment: 'comment', commentId: 'comment-1' },
+ field: 'comments',
+ });
+
+ expect(res).toEqual({
+ commentId: 'comment-1',
+ pushedDate: '2020-04-27T10:59:46.202Z',
+ externalCommentId: '1',
+ });
+ });
+
+ test('it should call request with correct arguments', async () => {
+ requestMock.mockImplementation(() => ({
+ data: {
+ id: '1',
+ key: 'CK-1',
+ created: '2020-04-27T10:59:46.202Z',
+ },
+ }));
+
+ await service.createComment({
+ incidentId: '1',
+ comment: { comment: 'comment', commentId: 'comment-1' },
+ field: 'my_field',
+ });
+
+ expect(requestMock).toHaveBeenCalledWith({
+ axios,
+ method: 'post',
+ url: 'https://siem-kibana.atlassian.net/rest/api/2/issue/1/comment',
+ data: { body: 'comment' },
+ });
+ });
+
+ test('it should throw an error', async () => {
+ requestMock.mockImplementation(() => {
+ throw new Error('An error has occurred');
+ });
+
+ expect(
+ service.createComment({
+ incidentId: '1',
+ comment: { comment: 'comment', commentId: 'comment-1' },
+ field: 'comments',
+ })
+ ).rejects.toThrow(
+ '[Action][Jira]: Unable to create comment at incident with id 1. Error: An error has occurred'
+ );
+ });
+ });
+});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/jira/service.ts b/x-pack/plugins/actions/server/builtin_action_types/jira/service.ts
new file mode 100644
index 0000000000000..ff22b8368e7dd
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/jira/service.ts
@@ -0,0 +1,156 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import axios from 'axios';
+
+import { ExternalServiceCredentials, ExternalService, ExternalServiceParams } from '../case/types';
+import {
+ JiraPublicConfigurationType,
+ JiraSecretConfigurationType,
+ CreateIncidentRequest,
+ UpdateIncidentRequest,
+ CreateCommentRequest,
+} from './types';
+
+import * as i18n from './translations';
+import { getErrorMessage, request } from '../case/utils';
+
+const VERSION = '2';
+const BASE_URL = `rest/api/${VERSION}`;
+const INCIDENT_URL = `issue`;
+const COMMENT_URL = `comment`;
+
+const VIEW_INCIDENT_URL = `browse`;
+
+export const createExternalService = ({
+ config,
+ secrets,
+}: ExternalServiceCredentials): ExternalService => {
+ const { apiUrl: url, projectKey } = config as JiraPublicConfigurationType;
+ const { apiToken, email } = secrets as JiraSecretConfigurationType;
+
+ if (!url || !projectKey || !apiToken || !email) {
+ throw Error(`[Action]${i18n.NAME}: Wrong configuration.`);
+ }
+
+ const incidentUrl = `${url}/${BASE_URL}/${INCIDENT_URL}`;
+ const commentUrl = `${incidentUrl}/{issueId}/${COMMENT_URL}`;
+ const axiosInstance = axios.create({
+ auth: { username: email, password: apiToken },
+ });
+
+ const getIncidentViewURL = (key: string) => {
+ return `${url}/${VIEW_INCIDENT_URL}/${key}`;
+ };
+
+ const getCommentsURL = (issueId: string) => {
+ return commentUrl.replace('{issueId}', issueId);
+ };
+
+ const getIncident = async (id: string) => {
+ try {
+ const res = await request({
+ axios: axiosInstance,
+ url: `${incidentUrl}/${id}`,
+ });
+
+ const { fields, ...rest } = res.data;
+
+ return { ...rest, ...fields };
+ } catch (error) {
+ throw new Error(
+ getErrorMessage(i18n.NAME, `Unable to get incident with id ${id}. Error: ${error.message}`)
+ );
+ }
+ };
+
+ const createIncident = async ({ incident }: ExternalServiceParams) => {
+ // The response from Jira when creating an issue contains only the key and the id.
+ // The function makes two calls when creating an issue. One to create the issue and one to get
+ // the created issue with all the necessary fields.
+ try {
+ const res = await request({
+ axios: axiosInstance,
+ url: `${incidentUrl}`,
+ method: 'post',
+ data: {
+ fields: { ...incident, project: { key: projectKey }, issuetype: { name: 'Task' } },
+ },
+ });
+
+ const updatedIncident = await getIncident(res.data.id);
+
+ return {
+ title: updatedIncident.key,
+ id: updatedIncident.id,
+ pushedDate: new Date(updatedIncident.created).toISOString(),
+ url: getIncidentViewURL(updatedIncident.key),
+ };
+ } catch (error) {
+ throw new Error(
+ getErrorMessage(i18n.NAME, `Unable to create incident. Error: ${error.message}`)
+ );
+ }
+ };
+
+ const updateIncident = async ({ incidentId, incident }: ExternalServiceParams) => {
+ try {
+ await request({
+ axios: axiosInstance,
+ method: 'put',
+ url: `${incidentUrl}/${incidentId}`,
+ data: { fields: { ...incident } },
+ });
+
+ const updatedIncident = await getIncident(incidentId);
+
+ return {
+ title: updatedIncident.key,
+ id: updatedIncident.id,
+ pushedDate: new Date(updatedIncident.updated).toISOString(),
+ url: getIncidentViewURL(updatedIncident.key),
+ };
+ } catch (error) {
+ throw new Error(
+ getErrorMessage(
+ i18n.NAME,
+ `Unable to update incident with id ${incidentId}. Error: ${error.message}`
+ )
+ );
+ }
+ };
+
+ const createComment = async ({ incidentId, comment, field }: ExternalServiceParams) => {
+ try {
+ const res = await request({
+ axios: axiosInstance,
+ method: 'post',
+ url: getCommentsURL(incidentId),
+ data: { body: comment.comment },
+ });
+
+ return {
+ commentId: comment.commentId,
+ externalCommentId: res.data.id,
+ pushedDate: new Date(res.data.created).toISOString(),
+ };
+ } catch (error) {
+ throw new Error(
+ getErrorMessage(
+ i18n.NAME,
+ `Unable to create comment at incident with id ${incidentId}. Error: ${error.message}`
+ )
+ );
+ }
+ };
+
+ return {
+ getIncident,
+ createIncident,
+ updateIncident,
+ createComment,
+ };
+};
diff --git a/x-pack/plugins/actions/server/builtin_action_types/jira/translations.ts b/x-pack/plugins/actions/server/builtin_action_types/jira/translations.ts
new file mode 100644
index 0000000000000..dae0d75952e11
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/jira/translations.ts
@@ -0,0 +1,11 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { i18n } from '@kbn/i18n';
+
+export const NAME = i18n.translate('xpack.actions.builtin.case.jiraTitle', {
+ defaultMessage: 'Jira',
+});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/jira/types.ts b/x-pack/plugins/actions/server/builtin_action_types/jira/types.ts
new file mode 100644
index 0000000000000..8d9c6b92abb3b
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/jira/types.ts
@@ -0,0 +1,32 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { TypeOf } from '@kbn/config-schema';
+import { JiraPublicConfigurationSchema, JiraSecretConfigurationSchema } from './schema';
+
+export type JiraPublicConfigurationType = TypeOf;
+export type JiraSecretConfigurationType = TypeOf;
+
+interface CreateIncidentBasicRequestArgs {
+ summary: string;
+ description: string;
+}
+interface CreateIncidentRequestArgs extends CreateIncidentBasicRequestArgs {
+ project: { key: string };
+ issuetype: { name: string };
+}
+
+export interface CreateIncidentRequest {
+ fields: CreateIncidentRequestArgs;
+}
+
+export interface UpdateIncidentRequest {
+ fields: Partial;
+}
+
+export interface CreateCommentRequest {
+ body: string;
+}
diff --git a/x-pack/plugins/actions/server/builtin_action_types/jira/validators.ts b/x-pack/plugins/actions/server/builtin_action_types/jira/validators.ts
new file mode 100644
index 0000000000000..7226071392bc6
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/jira/validators.ts
@@ -0,0 +1,13 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { validateCommonConfig, validateCommonSecrets } from '../case/validators';
+import { ExternalServiceValidation } from '../case/types';
+
+export const validate: ExternalServiceValidation = {
+ config: validateCommonConfig,
+ secrets: validateCommonSecrets,
+};
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/action_handlers.test.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/action_handlers.test.ts
deleted file mode 100644
index aa9b1dcfcf239..0000000000000
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/action_handlers.test.ts
+++ /dev/null
@@ -1,850 +0,0 @@
-/*
- * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
- * or more contributor license agreements. Licensed under the Elastic License;
- * you may not use this file except in compliance with the Elastic License.
- */
-
-import {
- handleCreateIncident,
- handleUpdateIncident,
- handleIncident,
- createComments,
-} from './action_handlers';
-import { ServiceNow } from './lib';
-import { Mapping } from './types';
-
-jest.mock('./lib');
-
-const ServiceNowMock = ServiceNow as jest.Mock;
-
-const finalMapping: Mapping = new Map();
-
-finalMapping.set('title', {
- target: 'short_description',
- actionType: 'overwrite',
-});
-
-finalMapping.set('description', {
- target: 'description',
- actionType: 'overwrite',
-});
-
-finalMapping.set('comments', {
- target: 'comments',
- actionType: 'append',
-});
-
-finalMapping.set('short_description', {
- target: 'title',
- actionType: 'overwrite',
-});
-
-const params = {
- caseId: '123',
- title: 'a title',
- description: 'a description',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: { fullName: 'Elastic User', username: 'elastic' },
- updatedAt: null,
- updatedBy: null,
- incidentId: null,
- incident: {
- short_description: 'a title',
- description: 'a description',
- },
- comments: [
- {
- commentId: '456',
- version: 'WzU3LDFd',
- comment: 'first comment',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: { fullName: 'Elastic User', username: 'elastic' },
- updatedAt: null,
- updatedBy: null,
- },
- ],
-};
-
-beforeAll(() => {
- ServiceNowMock.mockImplementation(() => {
- return {
- serviceNow: {
- getUserID: jest.fn().mockResolvedValue('1234'),
- getIncident: jest.fn().mockResolvedValue({
- short_description: 'servicenow title',
- description: 'servicenow desc',
- }),
- createIncident: jest.fn().mockResolvedValue({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- }),
- updateIncident: jest.fn().mockResolvedValue({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- }),
- batchCreateComments: jest
- .fn()
- .mockResolvedValue([{ commentId: '456', pushedDate: '2020-03-10T12:24:20.000Z' }]),
- },
- };
- });
-});
-
-describe('handleIncident', () => {
- test('create an incident', async () => {
- const { serviceNow } = new ServiceNowMock();
-
- const res = await handleIncident({
- incidentId: null,
- serviceNow,
- params,
- comments: params.comments,
- mapping: finalMapping,
- });
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- comments: [
- {
- commentId: '456',
- pushedDate: '2020-03-10T12:24:20.000Z',
- },
- ],
- });
- });
- test('update an incident', async () => {
- const { serviceNow } = new ServiceNowMock();
-
- const res = await handleIncident({
- incidentId: '123',
- serviceNow,
- params,
- comments: params.comments,
- mapping: finalMapping,
- });
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- comments: [
- {
- commentId: '456',
- pushedDate: '2020-03-10T12:24:20.000Z',
- },
- ],
- });
- });
-});
-
-describe('handleCreateIncident', () => {
- test('create an incident without comments', async () => {
- const { serviceNow } = new ServiceNowMock();
-
- const res = await handleCreateIncident({
- serviceNow,
- params,
- comments: [],
- mapping: finalMapping,
- });
-
- expect(serviceNow.createIncident).toHaveBeenCalled();
- expect(serviceNow.createIncident).toHaveBeenCalledWith({
- short_description: 'a title (created at 2020-03-13T08:34:53.450Z by Elastic User)',
- description: 'a description (created at 2020-03-13T08:34:53.450Z by Elastic User)',
- });
- expect(serviceNow.createIncident).toHaveReturned();
- expect(serviceNow.batchCreateComments).not.toHaveBeenCalled();
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- });
- });
-
- test('create an incident with comments', async () => {
- const { serviceNow } = new ServiceNowMock();
-
- const res = await handleCreateIncident({
- serviceNow,
- params,
- comments: params.comments,
- mapping: finalMapping,
- });
-
- expect(serviceNow.createIncident).toHaveBeenCalled();
- expect(serviceNow.createIncident).toHaveBeenCalledWith({
- description: 'a description (created at 2020-03-13T08:34:53.450Z by Elastic User)',
- short_description: 'a title (created at 2020-03-13T08:34:53.450Z by Elastic User)',
- });
- expect(serviceNow.createIncident).toHaveReturned();
- expect(serviceNow.batchCreateComments).toHaveBeenCalled();
- expect(serviceNow.batchCreateComments).toHaveBeenCalledWith(
- '123',
- [
- {
- comment: 'first comment (added at 2020-03-13T08:34:53.450Z by Elastic User)',
- commentId: '456',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: {
- fullName: 'Elastic User',
- username: 'elastic',
- },
- updatedAt: null,
- updatedBy: null,
- version: 'WzU3LDFd',
- },
- ],
- 'comments'
- );
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- comments: [
- {
- commentId: '456',
- pushedDate: '2020-03-10T12:24:20.000Z',
- },
- ],
- });
- });
-});
-
-describe('handleUpdateIncident', () => {
- test('update an incident without comments', async () => {
- const { serviceNow } = new ServiceNowMock();
-
- const res = await handleUpdateIncident({
- incidentId: '123',
- serviceNow,
- params: {
- ...params,
- updatedAt: '2020-03-15T08:34:53.450Z',
- updatedBy: { fullName: 'Another User', username: 'anotherUser' },
- },
- comments: [],
- mapping: finalMapping,
- });
-
- expect(serviceNow.updateIncident).toHaveBeenCalled();
- expect(serviceNow.updateIncident).toHaveBeenCalledWith('123', {
- short_description: 'a title (updated at 2020-03-15T08:34:53.450Z by Another User)',
- description: 'a description (updated at 2020-03-15T08:34:53.450Z by Another User)',
- });
- expect(serviceNow.updateIncident).toHaveReturned();
- expect(serviceNow.batchCreateComments).not.toHaveBeenCalled();
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- });
- });
-
- test('update an incident with comments', async () => {
- const { serviceNow } = new ServiceNowMock();
- serviceNow.batchCreateComments.mockResolvedValue([
- { commentId: '456', pushedDate: '2020-03-10T12:24:20.000Z' },
- { commentId: '789', pushedDate: '2020-03-10T12:24:20.000Z' },
- ]);
-
- const res = await handleUpdateIncident({
- incidentId: '123',
- serviceNow,
- params: {
- ...params,
- updatedAt: '2020-03-15T08:34:53.450Z',
- updatedBy: { fullName: 'Another User', username: 'anotherUser' },
- },
- comments: [
- {
- comment: 'first comment',
- commentId: '456',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: {
- fullName: 'Elastic User',
- username: 'elastic',
- },
- updatedAt: null,
- updatedBy: null,
- version: 'WzU3LDFd',
- },
- {
- comment: 'second comment',
- commentId: '789',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: {
- fullName: 'Elastic User',
- username: 'elastic',
- },
- updatedAt: '2020-03-16T08:34:53.450Z',
- updatedBy: {
- fullName: 'Another User',
- username: 'anotherUser',
- },
- version: 'WzU3LDFd',
- },
- ],
- mapping: finalMapping,
- });
-
- expect(serviceNow.updateIncident).toHaveBeenCalled();
- expect(serviceNow.updateIncident).toHaveBeenCalledWith('123', {
- description: 'a description (updated at 2020-03-15T08:34:53.450Z by Another User)',
- short_description: 'a title (updated at 2020-03-15T08:34:53.450Z by Another User)',
- });
- expect(serviceNow.updateIncident).toHaveReturned();
- expect(serviceNow.batchCreateComments).toHaveBeenCalled();
- expect(serviceNow.batchCreateComments).toHaveBeenCalledWith(
- '123',
- [
- {
- comment: 'first comment (added at 2020-03-13T08:34:53.450Z by Elastic User)',
- commentId: '456',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: {
- fullName: 'Elastic User',
- username: 'elastic',
- },
- updatedAt: null,
- updatedBy: null,
- version: 'WzU3LDFd',
- },
- {
- comment: 'second comment (added at 2020-03-16T08:34:53.450Z by Another User)',
- commentId: '789',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: {
- fullName: 'Elastic User',
- username: 'elastic',
- },
- updatedAt: '2020-03-16T08:34:53.450Z',
- updatedBy: {
- fullName: 'Another User',
- username: 'anotherUser',
- },
- version: 'WzU3LDFd',
- },
- ],
- 'comments'
- );
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- comments: [
- {
- commentId: '456',
- pushedDate: '2020-03-10T12:24:20.000Z',
- },
- {
- commentId: '789',
- pushedDate: '2020-03-10T12:24:20.000Z',
- },
- ],
- });
- });
-});
-
-describe('handleUpdateIncident: different action types', () => {
- test('overwrite & append', async () => {
- const { serviceNow } = new ServiceNowMock();
- finalMapping.set('title', {
- target: 'short_description',
- actionType: 'overwrite',
- });
-
- finalMapping.set('description', {
- target: 'description',
- actionType: 'append',
- });
-
- finalMapping.set('comments', {
- target: 'comments',
- actionType: 'append',
- });
-
- finalMapping.set('short_description', {
- target: 'title',
- actionType: 'overwrite',
- });
-
- const res = await handleUpdateIncident({
- incidentId: '123',
- serviceNow,
- params,
- comments: [],
- mapping: finalMapping,
- });
-
- expect(serviceNow.updateIncident).toHaveBeenCalled();
- expect(serviceNow.updateIncident).toHaveBeenCalledWith('123', {
- short_description: 'a title (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
- description:
- 'servicenow desc \r\na description (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
- });
- expect(serviceNow.updateIncident).toHaveReturned();
- expect(serviceNow.batchCreateComments).not.toHaveBeenCalled();
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- });
- });
-
- test('nothing & append', async () => {
- const { serviceNow } = new ServiceNowMock();
- finalMapping.set('title', {
- target: 'short_description',
- actionType: 'nothing',
- });
-
- finalMapping.set('description', {
- target: 'description',
- actionType: 'append',
- });
-
- finalMapping.set('comments', {
- target: 'comments',
- actionType: 'append',
- });
-
- finalMapping.set('short_description', {
- target: 'title',
- actionType: 'nothing',
- });
-
- const res = await handleUpdateIncident({
- incidentId: '123',
- serviceNow,
- params,
- comments: [],
- mapping: finalMapping,
- });
-
- expect(serviceNow.updateIncident).toHaveBeenCalled();
- expect(serviceNow.updateIncident).toHaveBeenCalledWith('123', {
- description:
- 'servicenow desc \r\na description (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
- });
- expect(serviceNow.updateIncident).toHaveReturned();
- expect(serviceNow.batchCreateComments).not.toHaveBeenCalled();
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- });
- });
-
- test('append & append', async () => {
- const { serviceNow } = new ServiceNowMock();
- finalMapping.set('title', {
- target: 'short_description',
- actionType: 'append',
- });
-
- finalMapping.set('description', {
- target: 'description',
- actionType: 'append',
- });
-
- finalMapping.set('comments', {
- target: 'comments',
- actionType: 'append',
- });
-
- finalMapping.set('short_description', {
- target: 'title',
- actionType: 'append',
- });
-
- const res = await handleUpdateIncident({
- incidentId: '123',
- serviceNow,
- params,
- comments: [],
- mapping: finalMapping,
- });
-
- expect(serviceNow.updateIncident).toHaveBeenCalled();
- expect(serviceNow.updateIncident).toHaveBeenCalledWith('123', {
- short_description:
- 'servicenow title \r\na title (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
- description:
- 'servicenow desc \r\na description (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
- });
- expect(serviceNow.updateIncident).toHaveReturned();
- expect(serviceNow.batchCreateComments).not.toHaveBeenCalled();
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- });
- });
-
- test('nothing & nothing', async () => {
- const { serviceNow } = new ServiceNowMock();
- finalMapping.set('title', {
- target: 'short_description',
- actionType: 'nothing',
- });
-
- finalMapping.set('description', {
- target: 'description',
- actionType: 'nothing',
- });
-
- finalMapping.set('comments', {
- target: 'comments',
- actionType: 'append',
- });
-
- finalMapping.set('short_description', {
- target: 'title',
- actionType: 'nothing',
- });
-
- const res = await handleUpdateIncident({
- incidentId: '123',
- serviceNow,
- params,
- comments: [],
- mapping: finalMapping,
- });
-
- expect(serviceNow.updateIncident).toHaveBeenCalled();
- expect(serviceNow.updateIncident).toHaveBeenCalledWith('123', {});
- expect(serviceNow.updateIncident).toHaveReturned();
- expect(serviceNow.batchCreateComments).not.toHaveBeenCalled();
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- });
- });
-
- test('overwrite & nothing', async () => {
- const { serviceNow } = new ServiceNowMock();
- finalMapping.set('title', {
- target: 'short_description',
- actionType: 'overwrite',
- });
-
- finalMapping.set('description', {
- target: 'description',
- actionType: 'nothing',
- });
-
- finalMapping.set('comments', {
- target: 'comments',
- actionType: 'append',
- });
-
- finalMapping.set('short_description', {
- target: 'title',
- actionType: 'overwrite',
- });
-
- const res = await handleUpdateIncident({
- incidentId: '123',
- serviceNow,
- params,
- comments: [],
- mapping: finalMapping,
- });
-
- expect(serviceNow.updateIncident).toHaveBeenCalled();
- expect(serviceNow.updateIncident).toHaveBeenCalledWith('123', {
- short_description: 'a title (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
- });
- expect(serviceNow.updateIncident).toHaveReturned();
- expect(serviceNow.batchCreateComments).not.toHaveBeenCalled();
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- });
- });
-
- test('overwrite & overwrite', async () => {
- const { serviceNow } = new ServiceNowMock();
- finalMapping.set('title', {
- target: 'short_description',
- actionType: 'overwrite',
- });
-
- finalMapping.set('description', {
- target: 'description',
- actionType: 'overwrite',
- });
-
- finalMapping.set('comments', {
- target: 'comments',
- actionType: 'append',
- });
-
- finalMapping.set('short_description', {
- target: 'title',
- actionType: 'overwrite',
- });
-
- const res = await handleUpdateIncident({
- incidentId: '123',
- serviceNow,
- params,
- comments: [],
- mapping: finalMapping,
- });
-
- expect(serviceNow.updateIncident).toHaveBeenCalled();
- expect(serviceNow.updateIncident).toHaveBeenCalledWith('123', {
- short_description: 'a title (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
- description: 'a description (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
- });
- expect(serviceNow.updateIncident).toHaveReturned();
- expect(serviceNow.batchCreateComments).not.toHaveBeenCalled();
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- });
- });
-
- test('nothing & overwrite', async () => {
- const { serviceNow } = new ServiceNowMock();
- finalMapping.set('title', {
- target: 'short_description',
- actionType: 'nothing',
- });
-
- finalMapping.set('description', {
- target: 'description',
- actionType: 'overwrite',
- });
-
- finalMapping.set('comments', {
- target: 'comments',
- actionType: 'append',
- });
-
- finalMapping.set('short_description', {
- target: 'title',
- actionType: 'nothing',
- });
-
- const res = await handleUpdateIncident({
- incidentId: '123',
- serviceNow,
- params,
- comments: [],
- mapping: finalMapping,
- });
-
- expect(serviceNow.updateIncident).toHaveBeenCalled();
- expect(serviceNow.updateIncident).toHaveBeenCalledWith('123', {
- description: 'a description (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
- });
- expect(serviceNow.updateIncident).toHaveReturned();
- expect(serviceNow.batchCreateComments).not.toHaveBeenCalled();
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- });
- });
-
- test('append & overwrite', async () => {
- const { serviceNow } = new ServiceNowMock();
- finalMapping.set('title', {
- target: 'short_description',
- actionType: 'append',
- });
-
- finalMapping.set('description', {
- target: 'description',
- actionType: 'overwrite',
- });
-
- finalMapping.set('comments', {
- target: 'comments',
- actionType: 'append',
- });
-
- finalMapping.set('short_description', {
- target: 'title',
- actionType: 'append',
- });
-
- const res = await handleUpdateIncident({
- incidentId: '123',
- serviceNow,
- params,
- comments: [],
- mapping: finalMapping,
- });
-
- expect(serviceNow.updateIncident).toHaveBeenCalled();
- expect(serviceNow.updateIncident).toHaveBeenCalledWith('123', {
- short_description:
- 'servicenow title \r\na title (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
- description: 'a description (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
- });
- expect(serviceNow.updateIncident).toHaveReturned();
- expect(serviceNow.batchCreateComments).not.toHaveBeenCalled();
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- });
- });
-
- test('append & nothing', async () => {
- const { serviceNow } = new ServiceNowMock();
- finalMapping.set('title', {
- target: 'short_description',
- actionType: 'append',
- });
-
- finalMapping.set('description', {
- target: 'description',
- actionType: 'nothing',
- });
-
- finalMapping.set('comments', {
- target: 'comments',
- actionType: 'append',
- });
-
- finalMapping.set('short_description', {
- target: 'title',
- actionType: 'append',
- });
-
- const res = await handleUpdateIncident({
- incidentId: '123',
- serviceNow,
- params,
- comments: [],
- mapping: finalMapping,
- });
-
- expect(serviceNow.updateIncident).toHaveBeenCalled();
- expect(serviceNow.updateIncident).toHaveBeenCalledWith('123', {
- short_description:
- 'servicenow title \r\na title (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
- });
- expect(serviceNow.updateIncident).toHaveReturned();
- expect(serviceNow.batchCreateComments).not.toHaveBeenCalled();
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- });
- });
-});
-
-describe('createComments', () => {
- test('create comments correctly', async () => {
- const { serviceNow } = new ServiceNowMock();
- serviceNow.batchCreateComments.mockResolvedValue([
- { commentId: '456', pushedDate: '2020-03-10T12:24:20.000Z' },
- { commentId: '789', pushedDate: '2020-03-10T12:24:20.000Z' },
- ]);
-
- const comments = [
- {
- comment: 'first comment',
- commentId: '456',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: {
- fullName: 'Elastic User',
- username: 'elastic',
- },
- updatedAt: null,
- updatedBy: null,
- version: 'WzU3LDFd',
- },
- {
- comment: 'second comment',
- commentId: '789',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: {
- fullName: 'Elastic User',
- username: 'elastic',
- },
- updatedAt: '2020-03-13T08:34:53.450Z',
- updatedBy: {
- fullName: 'Elastic User',
- username: 'elastic',
- },
- version: 'WzU3LDFd',
- },
- ];
-
- const res = await createComments(serviceNow, '123', 'comments', comments);
-
- expect(serviceNow.batchCreateComments).toHaveBeenCalled();
- expect(serviceNow.batchCreateComments).toHaveBeenCalledWith(
- '123',
- [
- {
- comment: 'first comment',
- commentId: '456',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: {
- fullName: 'Elastic User',
- username: 'elastic',
- },
- updatedAt: null,
- updatedBy: null,
- version: 'WzU3LDFd',
- },
- {
- comment: 'second comment',
- commentId: '789',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: {
- fullName: 'Elastic User',
- username: 'elastic',
- },
- updatedAt: '2020-03-13T08:34:53.450Z',
- updatedBy: {
- fullName: 'Elastic User',
- username: 'elastic',
- },
- version: 'WzU3LDFd',
- },
- ],
- 'comments'
- );
- expect(res).toEqual([
- {
- commentId: '456',
- pushedDate: '2020-03-10T12:24:20.000Z',
- },
- {
- commentId: '789',
- pushedDate: '2020-03-10T12:24:20.000Z',
- },
- ]);
- });
-});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/action_handlers.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/action_handlers.ts
deleted file mode 100644
index 9166f53cf757e..0000000000000
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/action_handlers.ts
+++ /dev/null
@@ -1,129 +0,0 @@
-/*
- * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
- * or more contributor license agreements. Licensed under the Elastic License;
- * you may not use this file except in compliance with the Elastic License.
- */
-
-import { zipWith } from 'lodash';
-import { CommentResponse } from './lib/types';
-import {
- HandlerResponse,
- Comment,
- SimpleComment,
- CreateHandlerArguments,
- UpdateHandlerArguments,
- IncidentHandlerArguments,
-} from './types';
-import { ServiceNow } from './lib';
-import { transformFields, prepareFieldsForTransformation, transformComments } from './helpers';
-
-export const createComments = async (
- serviceNow: ServiceNow,
- incidentId: string,
- key: string,
- comments: Comment[]
-): Promise => {
- const createdComments = await serviceNow.batchCreateComments(incidentId, comments, key);
-
- return zipWith(comments, createdComments, (a: Comment, b: CommentResponse) => ({
- commentId: a.commentId,
- pushedDate: b.pushedDate,
- }));
-};
-
-export const handleCreateIncident = async ({
- serviceNow,
- params,
- comments,
- mapping,
-}: CreateHandlerArguments): Promise => {
- const fields = prepareFieldsForTransformation({
- params,
- mapping,
- });
-
- const incident = transformFields({
- params,
- fields,
- });
-
- const createdIncident = await serviceNow.createIncident({
- ...incident,
- });
-
- const res: HandlerResponse = { ...createdIncident };
-
- if (
- comments &&
- Array.isArray(comments) &&
- comments.length > 0 &&
- mapping.get('comments')?.actionType !== 'nothing'
- ) {
- comments = transformComments(comments, params, ['informationAdded']);
- res.comments = [
- ...(await createComments(
- serviceNow,
- res.incidentId,
- mapping.get('comments')!.target,
- comments
- )),
- ];
- }
-
- return { ...res };
-};
-
-export const handleUpdateIncident = async ({
- incidentId,
- serviceNow,
- params,
- comments,
- mapping,
-}: UpdateHandlerArguments): Promise => {
- const currentIncident = await serviceNow.getIncident(incidentId);
- const fields = prepareFieldsForTransformation({
- params,
- mapping,
- defaultPipes: ['informationUpdated'],
- });
-
- const incident = transformFields({
- params,
- fields,
- currentIncident,
- });
-
- const updatedIncident = await serviceNow.updateIncident(incidentId, {
- ...incident,
- });
-
- const res: HandlerResponse = { ...updatedIncident };
-
- if (
- comments &&
- Array.isArray(comments) &&
- comments.length > 0 &&
- mapping.get('comments')?.actionType !== 'nothing'
- ) {
- comments = transformComments(comments, params, ['informationAdded']);
- res.comments = [
- ...(await createComments(serviceNow, incidentId, mapping.get('comments')!.target, comments)),
- ];
- }
-
- return { ...res };
-};
-
-export const handleIncident = async ({
- incidentId,
- serviceNow,
- params,
- comments,
- mapping,
-}: IncidentHandlerArguments): Promise => {
- if (!incidentId) {
- return await handleCreateIncident({ serviceNow, params, comments, mapping });
- } else {
- return await handleUpdateIncident({ incidentId, serviceNow, params, comments, mapping });
- }
-};
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/api.test.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/api.test.ts
new file mode 100644
index 0000000000000..86a8318841271
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/servicenow/api.test.ts
@@ -0,0 +1,523 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { api } from '../case/api';
+import { externalServiceMock, mapping, apiParams } from './mocks';
+import { ExternalService } from '../case/types';
+
+describe('api', () => {
+ let externalService: jest.Mocked;
+
+ beforeEach(() => {
+ externalService = externalServiceMock.create();
+ jest.clearAllMocks();
+ });
+
+ afterEach(() => {
+ jest.clearAllMocks();
+ });
+
+ describe('pushToService', () => {
+ describe('create incident', () => {
+ test('it creates an incident', async () => {
+ const params = { ...apiParams, externalId: null };
+ const res = await api.pushToService({ externalService, mapping, params });
+
+ expect(res).toEqual({
+ id: 'incident-1',
+ title: 'INC01',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
+ comments: [
+ {
+ commentId: 'case-comment-1',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ },
+ {
+ commentId: 'case-comment-2',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ },
+ ],
+ });
+ });
+
+ test('it creates an incident without comments', async () => {
+ const params = { ...apiParams, externalId: null, comments: [] };
+ const res = await api.pushToService({ externalService, mapping, params });
+
+ expect(res).toEqual({
+ id: 'incident-1',
+ title: 'INC01',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
+ });
+ });
+
+ test('it calls createIncident correctly', async () => {
+ const params = { ...apiParams, externalId: null };
+ await api.pushToService({ externalService, mapping, params });
+
+ expect(externalService.createIncident).toHaveBeenCalledWith({
+ incident: {
+ description:
+ 'Incident description (created at 2020-03-13T08:34:53.450Z by Elastic User)',
+ short_description:
+ 'Incident title (created at 2020-03-13T08:34:53.450Z by Elastic User)',
+ },
+ });
+ expect(externalService.updateIncident).not.toHaveBeenCalled();
+ });
+
+ test('it calls createComment correctly', async () => {
+ const params = { ...apiParams, externalId: null };
+ await api.pushToService({ externalService, mapping, params });
+ expect(externalService.createComment).toHaveBeenCalledTimes(2);
+ expect(externalService.createComment).toHaveBeenNthCalledWith(1, {
+ incidentId: 'incident-1',
+ comment: {
+ commentId: 'case-comment-1',
+ comment: 'A comment (added at 2020-03-13T08:34:53.450Z by Elastic User)',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ updatedAt: '2020-03-13T08:34:53.450Z',
+ updatedBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ },
+ field: 'comments',
+ });
+
+ expect(externalService.createComment).toHaveBeenNthCalledWith(2, {
+ incidentId: 'incident-1',
+ comment: {
+ commentId: 'case-comment-2',
+ comment: 'Another comment (added at 2020-03-13T08:34:53.450Z by Elastic User)',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ updatedAt: '2020-03-13T08:34:53.450Z',
+ updatedBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ },
+ field: 'comments',
+ });
+ });
+ });
+
+ describe('update incident', () => {
+ test('it updates an incident', async () => {
+ const res = await api.pushToService({ externalService, mapping, params: apiParams });
+
+ expect(res).toEqual({
+ id: 'incident-2',
+ title: 'INC02',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
+ comments: [
+ {
+ commentId: 'case-comment-1',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ },
+ {
+ commentId: 'case-comment-2',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ },
+ ],
+ });
+ });
+
+ test('it updates an incident without comments', async () => {
+ const params = { ...apiParams, comments: [] };
+ const res = await api.pushToService({ externalService, mapping, params });
+
+ expect(res).toEqual({
+ id: 'incident-2',
+ title: 'INC02',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
+ });
+ });
+
+ test('it calls updateIncident correctly', async () => {
+ const params = { ...apiParams };
+ await api.pushToService({ externalService, mapping, params });
+
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ description:
+ 'Incident description (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ short_description:
+ 'Incident title (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ },
+ });
+ expect(externalService.createIncident).not.toHaveBeenCalled();
+ });
+
+ test('it calls createComment correctly', async () => {
+ const params = { ...apiParams };
+ await api.pushToService({ externalService, mapping, params });
+ expect(externalService.createComment).toHaveBeenCalledTimes(2);
+ expect(externalService.createComment).toHaveBeenNthCalledWith(1, {
+ incidentId: 'incident-2',
+ comment: {
+ commentId: 'case-comment-1',
+ comment: 'A comment (added at 2020-03-13T08:34:53.450Z by Elastic User)',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ updatedAt: '2020-03-13T08:34:53.450Z',
+ updatedBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ },
+ field: 'comments',
+ });
+
+ expect(externalService.createComment).toHaveBeenNthCalledWith(2, {
+ incidentId: 'incident-2',
+ comment: {
+ commentId: 'case-comment-2',
+ comment: 'Another comment (added at 2020-03-13T08:34:53.450Z by Elastic User)',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ updatedAt: '2020-03-13T08:34:53.450Z',
+ updatedBy: {
+ fullName: 'Elastic User',
+ username: 'elastic',
+ },
+ },
+ field: 'comments',
+ });
+ });
+ });
+
+ describe('mapping variations', () => {
+ test('overwrite & append', async () => {
+ mapping.set('title', {
+ target: 'short_description',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'append',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('short_description', {
+ target: 'title',
+ actionType: 'overwrite',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ short_description:
+ 'Incident title (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ description:
+ 'description from servicenow \r\nIncident description (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ },
+ });
+ });
+
+ test('nothing & append', async () => {
+ mapping.set('title', {
+ target: 'short_description',
+ actionType: 'nothing',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'append',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('short_description', {
+ target: 'title',
+ actionType: 'nothing',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ description:
+ 'description from servicenow \r\nIncident description (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ },
+ });
+ });
+
+ test('append & append', async () => {
+ mapping.set('title', {
+ target: 'short_description',
+ actionType: 'append',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'append',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('short_description', {
+ target: 'title',
+ actionType: 'append',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ short_description:
+ 'title from servicenow \r\nIncident title (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ description:
+ 'description from servicenow \r\nIncident description (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ },
+ });
+ });
+
+ test('nothing & nothing', async () => {
+ mapping.set('title', {
+ target: 'short_description',
+ actionType: 'nothing',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'nothing',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('short_description', {
+ target: 'title',
+ actionType: 'nothing',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {},
+ });
+ });
+
+ test('overwrite & nothing', async () => {
+ mapping.set('title', {
+ target: 'short_description',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'nothing',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('short_description', {
+ target: 'title',
+ actionType: 'overwrite',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ short_description:
+ 'Incident title (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ },
+ });
+ });
+
+ test('overwrite & overwrite', async () => {
+ mapping.set('title', {
+ target: 'short_description',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('short_description', {
+ target: 'title',
+ actionType: 'overwrite',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ short_description:
+ 'Incident title (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ description:
+ 'Incident description (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ },
+ });
+ });
+
+ test('nothing & overwrite', async () => {
+ mapping.set('title', {
+ target: 'short_description',
+ actionType: 'nothing',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('short_description', {
+ target: 'title',
+ actionType: 'nothing',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ description:
+ 'Incident description (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ },
+ });
+ });
+
+ test('append & overwrite', async () => {
+ mapping.set('title', {
+ target: 'short_description',
+ actionType: 'append',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('short_description', {
+ target: 'title',
+ actionType: 'append',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ short_description:
+ 'title from servicenow \r\nIncident title (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ description:
+ 'Incident description (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ },
+ });
+ });
+
+ test('append & nothing', async () => {
+ mapping.set('title', {
+ target: 'short_description',
+ actionType: 'append',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'nothing',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+ });
+
+ mapping.set('short_description', {
+ target: 'title',
+ actionType: 'append',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.updateIncident).toHaveBeenCalledWith({
+ incidentId: 'incident-3',
+ incident: {
+ short_description:
+ 'title from servicenow \r\nIncident title (updated at 2020-03-13T08:34:53.450Z by Elastic User)',
+ },
+ });
+ });
+
+ test('comment nothing', async () => {
+ mapping.set('title', {
+ target: 'short_description',
+ actionType: 'overwrite',
+ });
+
+ mapping.set('description', {
+ target: 'description',
+ actionType: 'nothing',
+ });
+
+ mapping.set('comments', {
+ target: 'comments',
+ actionType: 'nothing',
+ });
+
+ mapping.set('short_description', {
+ target: 'title',
+ actionType: 'overwrite',
+ });
+
+ await api.pushToService({ externalService, mapping, params: apiParams });
+ expect(externalService.createComment).not.toHaveBeenCalled();
+ });
+ });
+ });
+});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/api.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/api.ts
new file mode 100644
index 0000000000000..3db66e5884af4
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/servicenow/api.ts
@@ -0,0 +1,7 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+export { api } from '../case/api';
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/config.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/config.ts
new file mode 100644
index 0000000000000..4ad8108c3b137
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/servicenow/config.ts
@@ -0,0 +1,13 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { ExternalServiceConfiguration } from '../case/types';
+import * as i18n from './translations';
+
+export const config: ExternalServiceConfiguration = {
+ id: '.servicenow',
+ name: i18n.NAME,
+};
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/helpers.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/helpers.ts
deleted file mode 100644
index 0a26996ea8d69..0000000000000
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/helpers.ts
+++ /dev/null
@@ -1,125 +0,0 @@
-/*
- * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
- * or more contributor license agreements. Licensed under the Elastic License;
- * you may not use this file except in compliance with the Elastic License.
- */
-import { flow } from 'lodash';
-
-import { SUPPORTED_SOURCE_FIELDS } from './constants';
-import {
- MapEntry,
- Mapping,
- AppendFieldArgs,
- AppendInformationFieldArgs,
- Params,
- Comment,
- TransformFieldsArgs,
- PipedField,
- PrepareFieldsForTransformArgs,
- KeyAny,
-} from './types';
-import { Incident } from './lib/types';
-
-import * as transformers from './transformers';
-import * as i18n from './translations';
-
-export const normalizeMapping = (supportedFields: string[], mapping: MapEntry[]): MapEntry[] => {
- // Prevent prototype pollution and remove unsupported fields
- return mapping.filter(
- m => m.source !== '__proto__' && m.target !== '__proto__' && supportedFields.includes(m.source)
- );
-};
-
-export const buildMap = (mapping: MapEntry[]): Mapping => {
- return normalizeMapping(SUPPORTED_SOURCE_FIELDS, mapping).reduce((fieldsMap, field) => {
- const { source, target, actionType } = field;
- fieldsMap.set(source, { target, actionType });
- fieldsMap.set(target, { target: source, actionType });
- return fieldsMap;
- }, new Map());
-};
-
-export const mapParams = (params: Record, mapping: Mapping) => {
- return Object.keys(params).reduce((prev: KeyAny, curr: string): KeyAny => {
- const field = mapping.get(curr);
- if (field) {
- prev[field.target] = params[curr];
- }
- return prev;
- }, {});
-};
-
-export const appendField = ({ value, prefix = '', suffix = '' }: AppendFieldArgs): string => {
- return `${prefix}${value} ${suffix}`;
-};
-
-const t = { ...transformers } as { [index: string]: Function }; // TODO: Find a better solution exists.
-
-export const prepareFieldsForTransformation = ({
- params,
- mapping,
- defaultPipes = ['informationCreated'],
-}: PrepareFieldsForTransformArgs): PipedField[] => {
- return Object.keys(params.incident)
- .filter(p => mapping.get(p)!.actionType !== 'nothing')
- .map(p => ({
- key: p,
- value: params.incident[p] as string,
- actionType: mapping.get(p)!.actionType,
- pipes: [...defaultPipes],
- }))
- .map(p => ({
- ...p,
- pipes: p.actionType === 'append' ? [...p.pipes, 'append'] : p.pipes,
- }));
-};
-
-export const transformFields = ({
- params,
- fields,
- currentIncident,
-}: TransformFieldsArgs): Incident => {
- return fields.reduce((prev: Incident, cur) => {
- const transform = flow(...cur.pipes.map(p => t[p]));
- prev[cur.key] = transform({
- value: cur.value,
- date: params.updatedAt ?? params.createdAt,
- user:
- params.updatedBy != null
- ? params.updatedBy.fullName ?? params.updatedBy.username
- : params.createdBy.fullName ?? params.createdBy.username,
- previousValue: currentIncident ? currentIncident[cur.key] : '',
- }).value;
- return prev;
- }, {} as Incident);
-};
-
-export const appendInformationToField = ({
- value,
- user,
- date,
- mode = 'create',
-}: AppendInformationFieldArgs): string => {
- return appendField({
- value,
- suffix: i18n.FIELD_INFORMATION(mode, date, user),
- });
-};
-
-export const transformComments = (
- comments: Comment[],
- params: Params,
- pipes: string[]
-): Comment[] => {
- return comments.map(c => ({
- ...c,
- comment: flow(...pipes.map(p => t[p]))({
- value: c.comment,
- date: c.updatedAt ?? c.createdAt,
- user:
- c.updatedBy != null
- ? c.updatedBy.fullName ?? c.updatedBy.username
- : c.createdBy.fullName ?? c.createdBy.username,
- }).value,
- }));
-};
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/index.test.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/index.test.ts
deleted file mode 100644
index a6c3ae88765ac..0000000000000
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/index.test.ts
+++ /dev/null
@@ -1,268 +0,0 @@
-/*
- * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
- * or more contributor license agreements. Licensed under the Elastic License;
- * you may not use this file except in compliance with the Elastic License.
- */
-
-import { getActionType } from '.';
-import { ActionType, Services, ActionTypeExecutorOptions } from '../../types';
-import { validateConfig, validateSecrets, validateParams } from '../../lib';
-import { createActionTypeRegistry } from '../index.test';
-import { actionsConfigMock } from '../../actions_config.mock';
-import { actionsMock } from '../../mocks';
-
-import { ACTION_TYPE_ID } from './constants';
-import * as i18n from './translations';
-
-import { handleIncident } from './action_handlers';
-import { incidentResponse } from './mock';
-
-jest.mock('./action_handlers');
-
-const handleIncidentMock = handleIncident as jest.Mock;
-
-const services: Services = actionsMock.createServices();
-
-let actionType: ActionType;
-
-const mockOptions = {
- name: 'servicenow-connector',
- actionTypeId: '.servicenow',
- secrets: {
- username: 'secret-username',
- password: 'secret-password',
- },
- config: {
- apiUrl: 'https://service-now.com',
- casesConfiguration: {
- mapping: [
- {
- source: 'title',
- target: 'short_description',
- actionType: 'overwrite',
- },
- {
- source: 'description',
- target: 'description',
- actionType: 'overwrite',
- },
- {
- source: 'comments',
- target: 'work_notes',
- actionType: 'append',
- },
- ],
- },
- },
- params: {
- caseId: 'd4387ac5-0899-4dc2-bbfa-0dd605c934aa',
- incidentId: 'ceb5986e079f00100e48fbbf7c1ed06d',
- title: 'Incident title',
- description: 'Incident description',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: { fullName: 'Elastic User', username: 'elastic' },
- updatedAt: null,
- updatedBy: null,
- comments: [
- {
- commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
- version: 'WzU3LDFd',
- comment: 'A comment',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: { fullName: 'Elastic User', username: 'elastic' },
- updatedAt: null,
- updatedBy: null,
- },
- ],
- },
-};
-
-beforeAll(() => {
- const { actionTypeRegistry } = createActionTypeRegistry();
- actionType = actionTypeRegistry.get(ACTION_TYPE_ID);
-});
-
-describe('get()', () => {
- test('should return correct action type', () => {
- expect(actionType.id).toEqual(ACTION_TYPE_ID);
- expect(actionType.name).toEqual(i18n.NAME);
- });
-});
-
-describe('validateConfig()', () => {
- test('should validate and pass when config is valid', () => {
- const { config } = mockOptions;
- expect(validateConfig(actionType, config)).toEqual(config);
- });
-
- test('should validate and throw error when config is invalid', () => {
- expect(() => {
- validateConfig(actionType, { shouldNotBeHere: true });
- }).toThrowErrorMatchingInlineSnapshot(
- `"error validating action type config: [apiUrl]: expected value of type [string] but got [undefined]"`
- );
- });
-
- test('should validate and pass when the servicenow url is whitelisted', () => {
- actionType = getActionType({
- configurationUtilities: {
- ...actionsConfigMock.create(),
- ensureWhitelistedUri: url => {
- expect(url).toEqual(mockOptions.config.apiUrl);
- },
- },
- });
-
- expect(validateConfig(actionType, mockOptions.config)).toEqual(mockOptions.config);
- });
-
- test('config validation returns an error if the specified URL isnt whitelisted', () => {
- actionType = getActionType({
- configurationUtilities: {
- ...actionsConfigMock.create(),
- ensureWhitelistedUri: _ => {
- throw new Error(`target url is not whitelisted`);
- },
- },
- });
-
- expect(() => {
- validateConfig(actionType, mockOptions.config);
- }).toThrowErrorMatchingInlineSnapshot(
- `"error validating action type config: error configuring servicenow action: target url is not whitelisted"`
- );
- });
-});
-
-describe('validateSecrets()', () => {
- test('should validate and pass when secrets is valid', () => {
- const { secrets } = mockOptions;
- expect(validateSecrets(actionType, secrets)).toEqual(secrets);
- });
-
- test('should validate and throw error when secrets is invalid', () => {
- expect(() => {
- validateSecrets(actionType, { username: false });
- }).toThrowErrorMatchingInlineSnapshot(
- `"error validating action type secrets: [password]: expected value of type [string] but got [undefined]"`
- );
-
- expect(() => {
- validateSecrets(actionType, { username: false, password: 'hello' });
- }).toThrowErrorMatchingInlineSnapshot(
- `"error validating action type secrets: [username]: expected value of type [string] but got [boolean]"`
- );
- });
-});
-
-describe('validateParams()', () => {
- test('should validate and pass when params is valid', () => {
- const { params } = mockOptions;
- expect(validateParams(actionType, params)).toEqual(params);
- });
-
- test('should validate and throw error when params is invalid', () => {
- expect(() => {
- validateParams(actionType, {});
- }).toThrowErrorMatchingInlineSnapshot(
- `"error validating action params: [caseId]: expected value of type [string] but got [undefined]"`
- );
- });
-});
-
-describe('execute()', () => {
- beforeEach(() => {
- handleIncidentMock.mockReset();
- });
-
- test('should create an incident', async () => {
- const actionId = 'some-id';
- const { incidentId, ...rest } = mockOptions.params;
-
- const executorOptions: ActionTypeExecutorOptions = {
- actionId,
- config: mockOptions.config,
- params: { ...rest },
- secrets: mockOptions.secrets,
- services,
- };
-
- handleIncidentMock.mockImplementation(() => incidentResponse);
-
- const actionResponse = await actionType.executor(executorOptions);
- expect(actionResponse).toEqual({ actionId, status: 'ok', data: incidentResponse });
- });
-
- test('should throw an error when failed to create incident', async () => {
- expect.assertions(1);
- const { incidentId, ...rest } = mockOptions.params;
-
- const actionId = 'some-id';
- const executorOptions: ActionTypeExecutorOptions = {
- actionId,
- config: mockOptions.config,
- params: { ...rest },
- secrets: mockOptions.secrets,
- services,
- };
- const errorMessage = 'Failed to create incident';
-
- handleIncidentMock.mockImplementation(() => {
- throw new Error(errorMessage);
- });
-
- try {
- await actionType.executor(executorOptions);
- } catch (error) {
- expect(error.message).toEqual(errorMessage);
- }
- });
-
- test('should update an incident', async () => {
- const actionId = 'some-id';
- const executorOptions: ActionTypeExecutorOptions = {
- actionId,
- config: mockOptions.config,
- params: {
- ...mockOptions.params,
- updatedAt: '2020-03-15T08:34:53.450Z',
- updatedBy: { fullName: 'Another User', username: 'anotherUser' },
- },
- secrets: mockOptions.secrets,
- services,
- };
-
- handleIncidentMock.mockImplementation(() => incidentResponse);
-
- const actionResponse = await actionType.executor(executorOptions);
- expect(actionResponse).toEqual({ actionId, status: 'ok', data: incidentResponse });
- });
-
- test('should throw an error when failed to update an incident', async () => {
- expect.assertions(1);
-
- const actionId = 'some-id';
- const executorOptions: ActionTypeExecutorOptions = {
- actionId,
- config: mockOptions.config,
- params: {
- ...mockOptions.params,
- updatedAt: '2020-03-15T08:34:53.450Z',
- updatedBy: { fullName: 'Another User', username: 'anotherUser' },
- },
- secrets: mockOptions.secrets,
- services,
- };
- const errorMessage = 'Failed to update incident';
-
- handleIncidentMock.mockImplementation(() => {
- throw new Error(errorMessage);
- });
-
- try {
- await actionType.executor(executorOptions);
- } catch (error) {
- expect(error.message).toEqual(errorMessage);
- }
- });
-});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/index.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/index.ts
index 5066190d4fe56..dbb536d2fa53d 100644
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/index.ts
+++ b/x-pack/plugins/actions/server/builtin_action_types/servicenow/index.ts
@@ -4,108 +4,24 @@
* you may not use this file except in compliance with the Elastic License.
*/
-import { curry, isEmpty } from 'lodash';
-import { schema } from '@kbn/config-schema';
-import {
- ActionType,
- ActionTypeExecutorOptions,
- ActionTypeExecutorResult,
- ExecutorType,
-} from '../../types';
-import { ActionsConfigurationUtilities } from '../../actions_config';
-import { ServiceNow } from './lib';
-
-import * as i18n from './translations';
-
-import { ACTION_TYPE_ID } from './constants';
-import { ConfigType, SecretsType, Comment, ExecutorParams } from './types';
-
-import { ConfigSchemaProps, SecretsSchemaProps, ParamsSchema } from './schema';
-
-import { buildMap, mapParams } from './helpers';
-import { handleIncident } from './action_handlers';
-
-function validateConfig(
- configurationUtilities: ActionsConfigurationUtilities,
- configObject: ConfigType
-) {
- try {
- if (isEmpty(configObject.casesConfiguration.mapping)) {
- return i18n.MAPPING_EMPTY;
- }
-
- configurationUtilities.ensureWhitelistedUri(configObject.apiUrl);
- } catch (whitelistError) {
- return i18n.WHITE_LISTED_ERROR(whitelistError.message);
- }
-}
-
-function validateSecrets(
- configurationUtilities: ActionsConfigurationUtilities,
- secrets: SecretsType
-) {}
+import { createConnector } from '../case/utils';
-// action type definition
-export function getActionType({
- configurationUtilities,
- executor = serviceNowExecutor,
-}: {
- configurationUtilities: ActionsConfigurationUtilities;
- executor?: ExecutorType;
-}): ActionType {
- return {
- id: ACTION_TYPE_ID,
- name: i18n.NAME,
- minimumLicenseRequired: 'platinum',
- validate: {
- config: schema.object(ConfigSchemaProps, {
- validate: curry(validateConfig)(configurationUtilities),
- }),
- secrets: schema.object(SecretsSchemaProps, {
- validate: curry(validateSecrets)(configurationUtilities),
- }),
- params: ParamsSchema,
- },
- executor,
- };
-}
-
-// action executor
-
-async function serviceNowExecutor(
- execOptions: ActionTypeExecutorOptions
-): Promise {
- const actionId = execOptions.actionId;
- const {
- apiUrl,
- casesConfiguration: { mapping: configurationMapping },
- } = execOptions.config as ConfigType;
- const { username, password } = execOptions.secrets as SecretsType;
- const params = execOptions.params as ExecutorParams;
- const { comments, incidentId, ...restParams } = params;
-
- const mapping = buildMap(configurationMapping);
- const incident = mapParams((restParams as unknown) as Record, mapping);
- const serviceNow = new ServiceNow({ url: apiUrl, username, password });
-
- const handlerInput = {
- incidentId,
- serviceNow,
- params: { ...params, incident },
- comments: comments as Comment[],
- mapping,
- };
-
- const res: Pick &
- Pick = {
- status: 'ok',
- actionId,
- };
-
- const data = await handleIncident(handlerInput);
-
- return {
- ...res,
- data,
- };
-}
+import { api } from './api';
+import { config } from './config';
+import { validate } from './validators';
+import { createExternalService } from './service';
+import {
+ ExternalIncidentServiceConfiguration,
+ ExternalIncidentServiceSecretConfiguration,
+} from '../case/schema';
+
+export const getActionType = createConnector({
+ api,
+ config,
+ validate,
+ createExternalService,
+ validationSchema: {
+ config: ExternalIncidentServiceConfiguration,
+ secrets: ExternalIncidentServiceSecretConfiguration,
+ },
+});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/lib/constants.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/lib/constants.ts
deleted file mode 100644
index 3f102ae19f437..0000000000000
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/lib/constants.ts
+++ /dev/null
@@ -1,13 +0,0 @@
-/*
- * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
- * or more contributor license agreements. Licensed under the Elastic License;
- * you may not use this file except in compliance with the Elastic License.
- */
-
-export const API_VERSION = 'v2';
-export const INCIDENT_URL = `api/now/${API_VERSION}/table/incident`;
-export const USER_URL = `api/now/${API_VERSION}/table/sys_user?user_name=`;
-export const COMMENT_URL = `api/now/${API_VERSION}/table/incident`;
-
-// Based on: https://docs.servicenow.com/bundle/orlando-platform-user-interface/page/use/navigation/reference/r_NavigatingByURLExamples.html
-export const VIEW_INCIDENT_URL = `nav_to.do?uri=incident.do?sys_id=`;
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/lib/index.test.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/lib/index.test.ts
deleted file mode 100644
index 40eeb0f920f82..0000000000000
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/lib/index.test.ts
+++ /dev/null
@@ -1,334 +0,0 @@
-/*
- * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
- * or more contributor license agreements. Licensed under the Elastic License;
- * you may not use this file except in compliance with the Elastic License.
- */
-
-import axios from 'axios';
-import { ServiceNow } from '.';
-import { instance, params } from '../mock';
-
-jest.mock('axios');
-
-axios.create = jest.fn(() => axios);
-const axiosMock = (axios as unknown) as jest.Mock;
-
-let serviceNow: ServiceNow;
-
-const testMissingConfiguration = (field: string) => {
- expect.assertions(1);
- try {
- new ServiceNow({ ...instance, [field]: '' });
- } catch (error) {
- expect(error.message).toEqual('[Action][ServiceNow]: Wrong configuration.');
- }
-};
-
-const prependInstanceUrl = (url: string): string => `${instance.url}/${url}`;
-
-describe('ServiceNow lib', () => {
- beforeEach(() => {
- serviceNow = new ServiceNow(instance);
- });
-
- afterEach(() => {
- jest.clearAllMocks();
- });
-
- test('should thrown an error if url is missing', () => {
- testMissingConfiguration('url');
- });
-
- test('should thrown an error if username is missing', () => {
- testMissingConfiguration('username');
- });
-
- test('should thrown an error if password is missing', () => {
- testMissingConfiguration('password');
- });
-
- test('get user id', async () => {
- axiosMock.mockResolvedValue({
- status: 200,
- headers: {
- 'content-type': 'application/json',
- },
- data: { result: [{ sys_id: '123' }] },
- });
-
- const res = await serviceNow.getUserID();
- const [url, { method }] = axiosMock.mock.calls[0];
-
- expect(url).toEqual(prependInstanceUrl('api/now/v2/table/sys_user?user_name=username'));
- expect(method).toEqual('get');
- expect(res).toEqual('123');
- });
-
- test('create incident', async () => {
- axiosMock.mockResolvedValue({
- status: 200,
- headers: {
- 'content-type': 'application/json',
- },
- data: { result: { sys_id: '123', number: 'INC01', sys_created_on: '2020-03-10 12:24:20' } },
- });
-
- const res = await serviceNow.createIncident({
- short_description: 'A title',
- description: 'A description',
- caller_id: '123',
- });
- const [url, { method, data }] = axiosMock.mock.calls[0];
-
- expect(url).toEqual(prependInstanceUrl('api/now/v2/table/incident'));
- expect(method).toEqual('post');
- expect(data).toEqual({
- short_description: 'A title',
- description: 'A description',
- caller_id: '123',
- });
-
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- });
- });
-
- test('update incident', async () => {
- axiosMock.mockResolvedValue({
- status: 200,
- headers: {
- 'content-type': 'application/json',
- },
- data: { result: { sys_id: '123', number: 'INC01', sys_updated_on: '2020-03-10 12:24:20' } },
- });
-
- const res = await serviceNow.updateIncident('123', {
- short_description: params.title,
- });
- const [url, { method, data }] = axiosMock.mock.calls[0];
-
- expect(url).toEqual(prependInstanceUrl(`api/now/v2/table/incident/123`));
- expect(method).toEqual('patch');
- expect(data).toEqual({ short_description: params.title });
- expect(res).toEqual({
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
- });
- });
-
- test('create comment', async () => {
- axiosMock.mockResolvedValue({
- status: 200,
- headers: {
- 'content-type': 'application/json',
- },
- data: { result: { sys_updated_on: '2020-03-10 12:24:20' } },
- });
-
- const comment = {
- commentId: '456',
- version: 'WzU3LDFd',
- comment: 'A comment',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: { fullName: 'Elastic User', username: 'elastic' },
- updatedAt: null,
- updatedBy: null,
- };
-
- const res = await serviceNow.createComment('123', comment, 'comments');
-
- const [url, { method, data }] = axiosMock.mock.calls[0];
-
- expect(url).toEqual(prependInstanceUrl(`api/now/v2/table/incident/123`));
- expect(method).toEqual('patch');
- expect(data).toEqual({
- comments: 'A comment',
- });
-
- expect(res).toEqual({
- commentId: '456',
- pushedDate: '2020-03-10T12:24:20.000Z',
- });
- });
-
- test('create batch comment', async () => {
- axiosMock.mockReturnValueOnce({
- status: 200,
- headers: {
- 'content-type': 'application/json',
- },
- data: { result: { sys_updated_on: '2020-03-10 12:24:20' } },
- });
-
- axiosMock.mockReturnValueOnce({
- status: 200,
- headers: {
- 'content-type': 'application/json',
- },
- data: { result: { sys_updated_on: '2020-03-10 12:25:20' } },
- });
-
- const comments = [
- {
- commentId: '123',
- version: 'WzU3LDFd',
- comment: 'A comment',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: { fullName: 'Elastic User', username: 'elastic' },
- updatedAt: null,
- updatedBy: null,
- },
- {
- commentId: '456',
- version: 'WzU3LDFd',
- comment: 'A second comment',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: { fullName: 'Elastic User', username: 'elastic' },
- updatedAt: null,
- updatedBy: null,
- },
- ];
- const res = await serviceNow.batchCreateComments('000', comments, 'comments');
-
- comments.forEach((comment, index) => {
- const [url, { method, data }] = axiosMock.mock.calls[index];
- expect(url).toEqual(prependInstanceUrl('api/now/v2/table/incident/000'));
- expect(method).toEqual('patch');
- expect(data).toEqual({
- comments: comment.comment,
- });
- expect(res).toEqual([
- { commentId: '123', pushedDate: '2020-03-10T12:24:20.000Z' },
- { commentId: '456', pushedDate: '2020-03-10T12:25:20.000Z' },
- ]);
- });
- });
-
- test('throw if not status is not ok', async () => {
- expect.assertions(1);
-
- axiosMock.mockResolvedValue({
- status: 401,
- headers: {
- 'content-type': 'application/json',
- },
- });
- try {
- await serviceNow.getUserID();
- } catch (error) {
- expect(error.message).toEqual(
- '[Action][ServiceNow]: Unable to get user id. Error: [ServiceNow]: Instance is not alive.'
- );
- }
- });
-
- test('throw if not content-type is not application/json', async () => {
- expect.assertions(1);
-
- axiosMock.mockResolvedValue({
- status: 200,
- headers: {
- 'content-type': 'application/html',
- },
- });
- try {
- await serviceNow.getUserID();
- } catch (error) {
- expect(error.message).toEqual(
- '[Action][ServiceNow]: Unable to get user id. Error: [ServiceNow]: Instance is not alive.'
- );
- }
- });
-
- test('check error when getting user', async () => {
- expect.assertions(1);
-
- axiosMock.mockImplementationOnce(() => {
- throw new Error('Bad request.');
- });
- try {
- await serviceNow.getUserID();
- } catch (error) {
- expect(error.message).toEqual(
- '[Action][ServiceNow]: Unable to get user id. Error: Bad request.'
- );
- }
- });
-
- test('check error when getting incident', async () => {
- expect.assertions(1);
-
- axiosMock.mockImplementationOnce(() => {
- throw new Error('Bad request.');
- });
- try {
- await serviceNow.getIncident('123');
- } catch (error) {
- expect(error.message).toEqual(
- '[Action][ServiceNow]: Unable to get incident with id 123. Error: Bad request.'
- );
- }
- });
-
- test('check error when creating incident', async () => {
- expect.assertions(1);
-
- axiosMock.mockImplementationOnce(() => {
- throw new Error('Bad request.');
- });
- try {
- await serviceNow.createIncident({ short_description: 'title' });
- } catch (error) {
- expect(error.message).toEqual(
- '[Action][ServiceNow]: Unable to create incident. Error: Bad request.'
- );
- }
- });
-
- test('check error when updating incident', async () => {
- expect.assertions(1);
-
- axiosMock.mockImplementationOnce(() => {
- throw new Error('Bad request.');
- });
- try {
- await serviceNow.updateIncident('123', { short_description: 'title' });
- } catch (error) {
- expect(error.message).toEqual(
- '[Action][ServiceNow]: Unable to update incident with id 123. Error: Bad request.'
- );
- }
- });
-
- test('check error when creating comment', async () => {
- expect.assertions(1);
-
- axiosMock.mockImplementationOnce(() => {
- throw new Error('Bad request.');
- });
- try {
- await serviceNow.createComment(
- '123',
- {
- commentId: '456',
- version: 'WzU3LDFd',
- comment: 'A second comment',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: { fullName: 'Elastic User', username: 'elastic' },
- updatedAt: null,
- updatedBy: null,
- },
- 'comment'
- );
- } catch (error) {
- expect(error.message).toEqual(
- '[Action][ServiceNow]: Unable to create comment at incident with id 123. Error: Bad request.'
- );
- }
- });
-});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/lib/index.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/lib/index.ts
deleted file mode 100644
index ed9cfe67a19a1..0000000000000
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/lib/index.ts
+++ /dev/null
@@ -1,186 +0,0 @@
-/*
- * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
- * or more contributor license agreements. Licensed under the Elastic License;
- * you may not use this file except in compliance with the Elastic License.
- */
-
-import axios, { AxiosInstance, Method, AxiosResponse } from 'axios';
-
-import { INCIDENT_URL, USER_URL, COMMENT_URL, VIEW_INCIDENT_URL } from './constants';
-import { Instance, Incident, IncidentResponse, UpdateIncident, CommentResponse } from './types';
-import { Comment } from '../types';
-
-const validStatusCodes = [200, 201];
-
-class ServiceNow {
- private readonly incidentUrl: string;
- private readonly commentUrl: string;
- private readonly userUrl: string;
- private readonly axios: AxiosInstance;
-
- constructor(private readonly instance: Instance) {
- if (
- !this.instance ||
- !this.instance.url ||
- !this.instance.username ||
- !this.instance.password
- ) {
- throw Error('[Action][ServiceNow]: Wrong configuration.');
- }
-
- this.incidentUrl = `${this.instance.url}/${INCIDENT_URL}`;
- this.commentUrl = `${this.instance.url}/${COMMENT_URL}`;
- this.userUrl = `${this.instance.url}/${USER_URL}`;
- this.axios = axios.create({
- auth: { username: this.instance.username, password: this.instance.password },
- });
- }
-
- private _throwIfNotAlive(status: number, contentType: string) {
- if (!validStatusCodes.includes(status) || !contentType.includes('application/json')) {
- throw new Error('[ServiceNow]: Instance is not alive.');
- }
- }
-
- private async _request({
- url,
- method = 'get',
- data = {},
- }: {
- url: string;
- method?: Method;
- data?: unknown;
- }): Promise {
- const res = await this.axios(url, { method, data });
- this._throwIfNotAlive(res.status, res.headers['content-type']);
- return res;
- }
-
- private _patch({ url, data }: { url: string; data: unknown }): Promise {
- return this._request({
- url,
- method: 'patch',
- data,
- });
- }
-
- private _addTimeZoneToDate(date: string, timezone = 'GMT'): string {
- return `${date} GMT`;
- }
-
- private _getErrorMessage(msg: string) {
- return `[Action][ServiceNow]: ${msg}`;
- }
-
- private _getIncidentViewURL(id: string) {
- return `${this.instance.url}/${VIEW_INCIDENT_URL}${id}`;
- }
-
- async getUserID(): Promise {
- try {
- const res = await this._request({ url: `${this.userUrl}${this.instance.username}` });
- return res.data.result[0].sys_id;
- } catch (error) {
- throw new Error(this._getErrorMessage(`Unable to get user id. Error: ${error.message}`));
- }
- }
-
- async getIncident(incidentId: string) {
- try {
- const res = await this._request({
- url: `${this.incidentUrl}/${incidentId}`,
- });
-
- return { ...res.data.result };
- } catch (error) {
- throw new Error(
- this._getErrorMessage(
- `Unable to get incident with id ${incidentId}. Error: ${error.message}`
- )
- );
- }
- }
-
- async createIncident(incident: Incident): Promise {
- try {
- const res = await this._request({
- url: `${this.incidentUrl}`,
- method: 'post',
- data: { ...incident },
- });
-
- return {
- number: res.data.result.number,
- incidentId: res.data.result.sys_id,
- pushedDate: new Date(this._addTimeZoneToDate(res.data.result.sys_created_on)).toISOString(),
- url: this._getIncidentViewURL(res.data.result.sys_id),
- };
- } catch (error) {
- throw new Error(this._getErrorMessage(`Unable to create incident. Error: ${error.message}`));
- }
- }
-
- async updateIncident(incidentId: string, incident: UpdateIncident): Promise {
- try {
- const res = await this._patch({
- url: `${this.incidentUrl}/${incidentId}`,
- data: { ...incident },
- });
-
- return {
- number: res.data.result.number,
- incidentId: res.data.result.sys_id,
- pushedDate: new Date(this._addTimeZoneToDate(res.data.result.sys_updated_on)).toISOString(),
- url: this._getIncidentViewURL(res.data.result.sys_id),
- };
- } catch (error) {
- throw new Error(
- this._getErrorMessage(
- `Unable to update incident with id ${incidentId}. Error: ${error.message}`
- )
- );
- }
- }
-
- async batchCreateComments(
- incidentId: string,
- comments: Comment[],
- field: string
- ): Promise {
- // Create comments sequentially.
- const promises = comments.reduce(async (prevPromise, currentComment) => {
- const totalComments = await prevPromise;
- const res = await this.createComment(incidentId, currentComment, field);
- return [...totalComments, res];
- }, Promise.resolve([] as CommentResponse[]));
-
- const res = await promises;
- return res;
- }
-
- async createComment(
- incidentId: string,
- comment: Comment,
- field: string
- ): Promise {
- try {
- const res = await this._patch({
- url: `${this.commentUrl}/${incidentId}`,
- data: { [field]: comment.comment },
- });
-
- return {
- commentId: comment.commentId,
- pushedDate: new Date(this._addTimeZoneToDate(res.data.result.sys_updated_on)).toISOString(),
- };
- } catch (error) {
- throw new Error(
- this._getErrorMessage(
- `Unable to create comment at incident with id ${incidentId}. Error: ${error.message}`
- )
- );
- }
- }
-}
-
-export { ServiceNow };
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/lib/types.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/lib/types.ts
deleted file mode 100644
index a65e417dbc486..0000000000000
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/lib/types.ts
+++ /dev/null
@@ -1,32 +0,0 @@
-/*
- * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
- * or more contributor license agreements. Licensed under the Elastic License;
- * you may not use this file except in compliance with the Elastic License.
- */
-
-export interface Instance {
- url: string;
- username: string;
- password: string;
-}
-
-export interface Incident {
- short_description: string;
- description?: string;
- caller_id?: string;
- [index: string]: string | undefined;
-}
-
-export interface IncidentResponse {
- number: string;
- incidentId: string;
- pushedDate: string;
- url: string;
-}
-
-export interface CommentResponse {
- commentId: string;
- pushedDate: string;
-}
-
-export type UpdateIncident = Partial;
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/mock.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/mock.ts
deleted file mode 100644
index 06c006fb37825..0000000000000
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/mock.ts
+++ /dev/null
@@ -1,115 +0,0 @@
-/*
- * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
- * or more contributor license agreements. Licensed under the Elastic License;
- * you may not use this file except in compliance with the Elastic License.
- */
-
-import { MapEntry, Mapping, ExecutorParams } from './types';
-import { Incident } from './lib/types';
-
-const mapping: MapEntry[] = [
- { source: 'title', target: 'short_description', actionType: 'overwrite' },
- { source: 'description', target: 'description', actionType: 'append' },
- { source: 'comments', target: 'comments', actionType: 'append' },
-];
-
-const finalMapping: Mapping = new Map();
-
-finalMapping.set('title', {
- target: 'short_description',
- actionType: 'overwrite',
-});
-
-finalMapping.set('description', {
- target: 'description',
- actionType: 'append',
-});
-
-finalMapping.set('comments', {
- target: 'comments',
- actionType: 'append',
-});
-
-finalMapping.set('short_description', {
- target: 'title',
- actionType: 'overwrite',
-});
-
-const params: ExecutorParams = {
- caseId: 'd4387ac5-0899-4dc2-bbfa-0dd605c934aa',
- incidentId: 'ceb5986e079f00100e48fbbf7c1ed06d',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: { fullName: 'Elastic User', username: 'elastic' },
- updatedAt: '2020-03-13T08:34:53.450Z',
- updatedBy: { fullName: 'Elastic User', username: 'elastic' },
- title: 'Incident title',
- description: 'Incident description',
- comments: [
- {
- commentId: 'b5b4c4d0-574e-11ea-9e2e-21b90f8a9631',
- version: 'WzU3LDFd',
- comment: 'A comment',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: { fullName: 'Elastic User', username: 'elastic' },
- updatedAt: '2020-03-13T08:34:53.450Z',
- updatedBy: { fullName: 'Elastic User', username: 'elastic' },
- },
- {
- commentId: 'e3db587f-ca27-4ae9-ad2e-31f2dcc9bd0d',
- version: 'WlK3LDFd',
- comment: 'Another comment',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: { fullName: 'Elastic User', username: 'elastic' },
- updatedAt: '2020-03-13T08:34:53.450Z',
- updatedBy: { fullName: 'Elastic User', username: 'elastic' },
- },
- ],
-};
-
-const incidentResponse = {
- incidentId: 'c816f79cc0a8016401c5a33be04be441',
- number: 'INC0010001',
- pushedDate: '2020-03-13T08:34:53.450Z',
- url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
-};
-
-const userId = '2e9a0a5e2f79001016ab51172799b670';
-
-const axiosResponse = {
- status: 200,
- headers: {
- 'content-type': 'application/json',
- },
-};
-const userIdResponse = {
- result: [{ sys_id: userId }],
-};
-
-const incidentAxiosResponse = {
- result: { sys_id: incidentResponse.incidentId, number: incidentResponse.number },
-};
-
-const instance = {
- url: 'https://instance.service-now.com',
- username: 'username',
- password: 'password',
-};
-
-const incident: Incident = {
- short_description: params.title,
- description: params.description,
- caller_id: userId,
-};
-
-export {
- mapping,
- finalMapping,
- params,
- incidentResponse,
- incidentAxiosResponse,
- userId,
- userIdResponse,
- axiosResponse,
- instance,
- incident,
-};
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/mocks.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/mocks.ts
new file mode 100644
index 0000000000000..37228380910b3
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/servicenow/mocks.ts
@@ -0,0 +1,117 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import {
+ ExternalService,
+ PushToServiceApiParams,
+ ExecutorSubActionPushParams,
+ MapRecord,
+} from '../case/types';
+
+const createMock = (): jest.Mocked => {
+ const service = {
+ getIncident: jest.fn().mockImplementation(() =>
+ Promise.resolve({
+ short_description: 'title from servicenow',
+ description: 'description from servicenow',
+ })
+ ),
+ createIncident: jest.fn().mockImplementation(() =>
+ Promise.resolve({
+ id: 'incident-1',
+ title: 'INC01',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
+ })
+ ),
+ updateIncident: jest.fn().mockImplementation(() =>
+ Promise.resolve({
+ id: 'incident-2',
+ title: 'INC02',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ url: 'https://instance.service-now.com/nav_to.do?uri=incident.do?sys_id=123',
+ })
+ ),
+ createComment: jest.fn(),
+ };
+
+ service.createComment.mockImplementationOnce(() =>
+ Promise.resolve({
+ commentId: 'case-comment-1',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ })
+ );
+
+ service.createComment.mockImplementationOnce(() =>
+ Promise.resolve({
+ commentId: 'case-comment-2',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ })
+ );
+ return service;
+};
+
+const externalServiceMock = {
+ create: createMock,
+};
+
+const mapping: Map> = new Map();
+
+mapping.set('title', {
+ target: 'short_description',
+ actionType: 'overwrite',
+});
+
+mapping.set('description', {
+ target: 'description',
+ actionType: 'overwrite',
+});
+
+mapping.set('comments', {
+ target: 'comments',
+ actionType: 'append',
+});
+
+mapping.set('short_description', {
+ target: 'title',
+ actionType: 'overwrite',
+});
+
+const executorParams: ExecutorSubActionPushParams = {
+ caseId: 'd4387ac5-0899-4dc2-bbfa-0dd605c934aa',
+ externalId: 'incident-3',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: { fullName: 'Elastic User', username: 'elastic' },
+ updatedAt: '2020-03-13T08:34:53.450Z',
+ updatedBy: { fullName: 'Elastic User', username: 'elastic' },
+ title: 'Incident title',
+ description: 'Incident description',
+ comments: [
+ {
+ commentId: 'case-comment-1',
+ comment: 'A comment',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: { fullName: 'Elastic User', username: 'elastic' },
+ updatedAt: '2020-03-13T08:34:53.450Z',
+ updatedBy: { fullName: 'Elastic User', username: 'elastic' },
+ },
+ {
+ commentId: 'case-comment-2',
+ comment: 'Another comment',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: { fullName: 'Elastic User', username: 'elastic' },
+ updatedAt: '2020-03-13T08:34:53.450Z',
+ updatedBy: { fullName: 'Elastic User', username: 'elastic' },
+ },
+ ],
+};
+
+const apiParams: PushToServiceApiParams = {
+ ...executorParams,
+ externalCase: { short_description: 'Incident title', description: 'Incident description' },
+};
+
+export { externalServiceMock, mapping, executorParams, apiParams };
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/schema.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/schema.ts
deleted file mode 100644
index 889b57c8e92e2..0000000000000
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/schema.ts
+++ /dev/null
@@ -1,70 +0,0 @@
-/*
- * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
- * or more contributor license agreements. Licensed under the Elastic License;
- * you may not use this file except in compliance with the Elastic License.
- */
-
-import { schema } from '@kbn/config-schema';
-
-export const MapEntrySchema = schema.object({
- source: schema.string(),
- target: schema.string(),
- actionType: schema.oneOf([
- schema.literal('nothing'),
- schema.literal('overwrite'),
- schema.literal('append'),
- ]),
-});
-
-export const CasesConfigurationSchema = schema.object({
- mapping: schema.arrayOf(MapEntrySchema),
-});
-
-export const ConfigSchemaProps = {
- apiUrl: schema.string(),
- casesConfiguration: CasesConfigurationSchema,
-};
-
-export const ConfigSchema = schema.object(ConfigSchemaProps);
-
-export const SecretsSchemaProps = {
- password: schema.string(),
- username: schema.string(),
-};
-
-export const SecretsSchema = schema.object(SecretsSchemaProps);
-
-export const UserSchema = schema.object({
- fullName: schema.nullable(schema.string()),
- username: schema.string(),
-});
-
-const EntityInformationSchemaProps = {
- createdAt: schema.string(),
- createdBy: UserSchema,
- updatedAt: schema.nullable(schema.string()),
- updatedBy: schema.nullable(UserSchema),
-};
-
-export const EntityInformationSchema = schema.object(EntityInformationSchemaProps);
-
-export const CommentSchema = schema.object({
- commentId: schema.string(),
- comment: schema.string(),
- version: schema.maybe(schema.string()),
- ...EntityInformationSchemaProps,
-});
-
-export const ExecutorAction = schema.oneOf([
- schema.literal('newIncident'),
- schema.literal('updateIncident'),
-]);
-
-export const ParamsSchema = schema.object({
- caseId: schema.string(),
- title: schema.string(),
- comments: schema.maybe(schema.arrayOf(CommentSchema)),
- description: schema.maybe(schema.string()),
- incidentId: schema.nullable(schema.string()),
- ...EntityInformationSchemaProps,
-});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/service.test.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/service.test.ts
new file mode 100644
index 0000000000000..f65cd5430560e
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/servicenow/service.test.ts
@@ -0,0 +1,255 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import axios from 'axios';
+
+import { createExternalService } from './service';
+import * as utils from '../case/utils';
+import { ExternalService } from '../case/types';
+
+jest.mock('axios');
+jest.mock('../case/utils', () => {
+ const originalUtils = jest.requireActual('../case/utils');
+ return {
+ ...originalUtils,
+ request: jest.fn(),
+ patch: jest.fn(),
+ };
+});
+
+axios.create = jest.fn(() => axios);
+const requestMock = utils.request as jest.Mock;
+const patchMock = utils.patch as jest.Mock;
+
+describe('ServiceNow service', () => {
+ let service: ExternalService;
+
+ beforeAll(() => {
+ service = createExternalService({
+ config: { apiUrl: 'https://dev102283.service-now.com' },
+ secrets: { username: 'admin', password: 'admin' },
+ });
+ });
+
+ beforeEach(() => {
+ jest.clearAllMocks();
+ });
+
+ describe('createExternalService', () => {
+ test('throws without url', () => {
+ expect(() =>
+ createExternalService({
+ config: { apiUrl: null },
+ secrets: { username: 'admin', password: 'admin' },
+ })
+ ).toThrow();
+ });
+
+ test('throws without username', () => {
+ expect(() =>
+ createExternalService({
+ config: { apiUrl: 'test.com' },
+ secrets: { username: '', password: 'admin' },
+ })
+ ).toThrow();
+ });
+
+ test('throws without password', () => {
+ expect(() =>
+ createExternalService({
+ config: { apiUrl: 'test.com' },
+ secrets: { username: '', password: undefined },
+ })
+ ).toThrow();
+ });
+ });
+
+ describe('getIncident', () => {
+ test('it returns the incident correctly', async () => {
+ requestMock.mockImplementation(() => ({
+ data: { result: { sys_id: '1', number: 'INC01' } },
+ }));
+ const res = await service.getIncident('1');
+ expect(res).toEqual({ sys_id: '1', number: 'INC01' });
+ });
+
+ test('it should call request with correct arguments', async () => {
+ requestMock.mockImplementation(() => ({
+ data: { result: { sys_id: '1', number: 'INC01' } },
+ }));
+
+ await service.getIncident('1');
+ expect(requestMock).toHaveBeenCalledWith({
+ axios,
+ url: 'https://dev102283.service-now.com/api/now/v2/table/incident/1',
+ });
+ });
+
+ test('it should throw an error', async () => {
+ requestMock.mockImplementation(() => {
+ throw new Error('An error has occurred');
+ });
+ expect(service.getIncident('1')).rejects.toThrow(
+ 'Unable to get incident with id 1. Error: An error has occurred'
+ );
+ });
+ });
+
+ describe('createIncident', () => {
+ test('it creates the incident correctly', async () => {
+ requestMock.mockImplementation(() => ({
+ data: { result: { sys_id: '1', number: 'INC01', sys_created_on: '2020-03-10 12:24:20' } },
+ }));
+
+ const res = await service.createIncident({
+ incident: { short_description: 'title', description: 'desc' },
+ });
+
+ expect(res).toEqual({
+ title: 'INC01',
+ id: '1',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ url: 'https://dev102283.service-now.com/nav_to.do?uri=incident.do?sys_id=1',
+ });
+ });
+
+ test('it should call request with correct arguments', async () => {
+ requestMock.mockImplementation(() => ({
+ data: { result: { sys_id: '1', number: 'INC01', sys_created_on: '2020-03-10 12:24:20' } },
+ }));
+
+ await service.createIncident({
+ incident: { short_description: 'title', description: 'desc' },
+ });
+
+ expect(requestMock).toHaveBeenCalledWith({
+ axios,
+ url: 'https://dev102283.service-now.com/api/now/v2/table/incident',
+ method: 'post',
+ data: { short_description: 'title', description: 'desc' },
+ });
+ });
+
+ test('it should throw an error', async () => {
+ requestMock.mockImplementation(() => {
+ throw new Error('An error has occurred');
+ });
+
+ expect(
+ service.createIncident({
+ incident: { short_description: 'title', description: 'desc' },
+ })
+ ).rejects.toThrow(
+ '[Action][ServiceNow]: Unable to create incident. Error: An error has occurred'
+ );
+ });
+ });
+
+ describe('updateIncident', () => {
+ test('it updates the incident correctly', async () => {
+ patchMock.mockImplementation(() => ({
+ data: { result: { sys_id: '1', number: 'INC01', sys_updated_on: '2020-03-10 12:24:20' } },
+ }));
+
+ const res = await service.updateIncident({
+ incidentId: '1',
+ incident: { short_description: 'title', description: 'desc' },
+ });
+
+ expect(res).toEqual({
+ title: 'INC01',
+ id: '1',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ url: 'https://dev102283.service-now.com/nav_to.do?uri=incident.do?sys_id=1',
+ });
+ });
+
+ test('it should call request with correct arguments', async () => {
+ patchMock.mockImplementation(() => ({
+ data: { result: { sys_id: '1', number: 'INC01', sys_updated_on: '2020-03-10 12:24:20' } },
+ }));
+
+ await service.updateIncident({
+ incidentId: '1',
+ incident: { short_description: 'title', description: 'desc' },
+ });
+
+ expect(patchMock).toHaveBeenCalledWith({
+ axios,
+ url: 'https://dev102283.service-now.com/api/now/v2/table/incident/1',
+ data: { short_description: 'title', description: 'desc' },
+ });
+ });
+
+ test('it should throw an error', async () => {
+ patchMock.mockImplementation(() => {
+ throw new Error('An error has occurred');
+ });
+
+ expect(
+ service.updateIncident({
+ incidentId: '1',
+ incident: { short_description: 'title', description: 'desc' },
+ })
+ ).rejects.toThrow(
+ '[Action][ServiceNow]: Unable to update incident with id 1. Error: An error has occurred'
+ );
+ });
+ });
+
+ describe('createComment', () => {
+ test('it creates the comment correctly', async () => {
+ patchMock.mockImplementation(() => ({
+ data: { result: { sys_id: '1', number: 'INC01', sys_updated_on: '2020-03-10 12:24:20' } },
+ }));
+
+ const res = await service.createComment({
+ incidentId: '1',
+ comment: { comment: 'comment', commentId: 'comment-1' },
+ field: 'comments',
+ });
+
+ expect(res).toEqual({
+ commentId: 'comment-1',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ });
+ });
+
+ test('it should call request with correct arguments', async () => {
+ patchMock.mockImplementation(() => ({
+ data: { result: { sys_id: '1', number: 'INC01', sys_updated_on: '2020-03-10 12:24:20' } },
+ }));
+
+ await service.createComment({
+ incidentId: '1',
+ comment: { comment: 'comment', commentId: 'comment-1' },
+ field: 'my_field',
+ });
+
+ expect(patchMock).toHaveBeenCalledWith({
+ axios,
+ url: 'https://dev102283.service-now.com/api/now/v2/table/incident/1',
+ data: { my_field: 'comment' },
+ });
+ });
+
+ test('it should throw an error', async () => {
+ patchMock.mockImplementation(() => {
+ throw new Error('An error has occurred');
+ });
+
+ expect(
+ service.createComment({
+ incidentId: '1',
+ comment: { comment: 'comment', commentId: 'comment-1' },
+ field: 'comments',
+ })
+ ).rejects.toThrow(
+ '[Action][ServiceNow]: Unable to create comment at incident with id 1. Error: An error has occurred'
+ );
+ });
+ });
+});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/service.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/service.ts
new file mode 100644
index 0000000000000..541fefce2f2ff
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/servicenow/service.ts
@@ -0,0 +1,138 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import axios from 'axios';
+
+import { ExternalServiceCredentials, ExternalService, ExternalServiceParams } from '../case/types';
+import { addTimeZoneToDate, patch, request, getErrorMessage } from '../case/utils';
+
+import * as i18n from './translations';
+import {
+ ServiceNowPublicConfigurationType,
+ ServiceNowSecretConfigurationType,
+ CreateIncidentRequest,
+ UpdateIncidentRequest,
+ CreateCommentRequest,
+} from './types';
+
+const API_VERSION = 'v2';
+const INCIDENT_URL = `api/now/${API_VERSION}/table/incident`;
+const COMMENT_URL = `api/now/${API_VERSION}/table/incident`;
+
+// Based on: https://docs.servicenow.com/bundle/orlando-platform-user-interface/page/use/navigation/reference/r_NavigatingByURLExamples.html
+const VIEW_INCIDENT_URL = `nav_to.do?uri=incident.do?sys_id=`;
+
+export const createExternalService = ({
+ config,
+ secrets,
+}: ExternalServiceCredentials): ExternalService => {
+ const { apiUrl: url } = config as ServiceNowPublicConfigurationType;
+ const { username, password } = secrets as ServiceNowSecretConfigurationType;
+
+ if (!url || !username || !password) {
+ throw Error(`[Action]${i18n.NAME}: Wrong configuration.`);
+ }
+
+ const incidentUrl = `${url}/${INCIDENT_URL}`;
+ const commentUrl = `${url}/${COMMENT_URL}`;
+ const axiosInstance = axios.create({
+ auth: { username, password },
+ });
+
+ const getIncidentViewURL = (id: string) => {
+ return `${url}/${VIEW_INCIDENT_URL}${id}`;
+ };
+
+ const getIncident = async (id: string) => {
+ try {
+ const res = await request({
+ axios: axiosInstance,
+ url: `${incidentUrl}/${id}`,
+ });
+
+ return { ...res.data.result };
+ } catch (error) {
+ throw new Error(
+ getErrorMessage(i18n.NAME, `Unable to get incident with id ${id}. Error: ${error.message}`)
+ );
+ }
+ };
+
+ const createIncident = async ({ incident }: ExternalServiceParams) => {
+ try {
+ const res = await request({
+ axios: axiosInstance,
+ url: `${incidentUrl}`,
+ method: 'post',
+ data: { ...incident },
+ });
+
+ return {
+ title: res.data.result.number,
+ id: res.data.result.sys_id,
+ pushedDate: new Date(addTimeZoneToDate(res.data.result.sys_created_on)).toISOString(),
+ url: getIncidentViewURL(res.data.result.sys_id),
+ };
+ } catch (error) {
+ throw new Error(
+ getErrorMessage(i18n.NAME, `Unable to create incident. Error: ${error.message}`)
+ );
+ }
+ };
+
+ const updateIncident = async ({ incidentId, incident }: ExternalServiceParams) => {
+ try {
+ const res = await patch({
+ axios: axiosInstance,
+ url: `${incidentUrl}/${incidentId}`,
+ data: { ...incident },
+ });
+
+ return {
+ title: res.data.result.number,
+ id: res.data.result.sys_id,
+ pushedDate: new Date(addTimeZoneToDate(res.data.result.sys_updated_on)).toISOString(),
+ url: getIncidentViewURL(res.data.result.sys_id),
+ };
+ } catch (error) {
+ throw new Error(
+ getErrorMessage(
+ i18n.NAME,
+ `Unable to update incident with id ${incidentId}. Error: ${error.message}`
+ )
+ );
+ }
+ };
+
+ const createComment = async ({ incidentId, comment, field }: ExternalServiceParams) => {
+ try {
+ const res = await patch({
+ axios: axiosInstance,
+ url: `${commentUrl}/${incidentId}`,
+ data: { [field]: comment.comment },
+ });
+
+ return {
+ commentId: comment.commentId,
+ pushedDate: new Date(addTimeZoneToDate(res.data.result.sys_updated_on)).toISOString(),
+ };
+ } catch (error) {
+ throw new Error(
+ getErrorMessage(
+ i18n.NAME,
+ `Unable to create comment at incident with id ${incidentId}. Error: ${error.message}`
+ )
+ );
+ }
+ };
+
+ return {
+ getIncident,
+ createIncident,
+ updateIncident,
+ createComment,
+ };
+};
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/transformers.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/transformers.ts
deleted file mode 100644
index dc0a03fab8c71..0000000000000
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/transformers.ts
+++ /dev/null
@@ -1,43 +0,0 @@
-/*
- * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
- * or more contributor license agreements. Licensed under the Elastic License;
- * you may not use this file except in compliance with the Elastic License.
- */
-
-import { TransformerArgs } from './types';
-import * as i18n from './translations';
-
-export const informationCreated = ({
- value,
- date,
- user,
- ...rest
-}: TransformerArgs): TransformerArgs => ({
- value: `${value} ${i18n.FIELD_INFORMATION('create', date, user)}`,
- ...rest,
-});
-
-export const informationUpdated = ({
- value,
- date,
- user,
- ...rest
-}: TransformerArgs): TransformerArgs => ({
- value: `${value} ${i18n.FIELD_INFORMATION('update', date, user)}`,
- ...rest,
-});
-
-export const informationAdded = ({
- value,
- date,
- user,
- ...rest
-}: TransformerArgs): TransformerArgs => ({
- value: `${value} ${i18n.FIELD_INFORMATION('add', date, user)}`,
- ...rest,
-});
-
-export const append = ({ value, previousValue, ...rest }: TransformerArgs): TransformerArgs => ({
- value: previousValue ? `${previousValue} \r\n${value}` : `${value}`,
- ...rest,
-});
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/translations.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/translations.ts
index 3b216a6c3260a..3d6138169c4cc 100644
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/translations.ts
+++ b/x-pack/plugins/actions/server/builtin_action_types/servicenow/translations.ts
@@ -6,77 +6,6 @@
import { i18n } from '@kbn/i18n';
-export const API_URL_REQUIRED = i18n.translate(
- 'xpack.actions.builtin.servicenow.servicenowApiNullError',
- {
- defaultMessage: 'ServiceNow [apiUrl] is required',
- }
-);
-
-export const WHITE_LISTED_ERROR = (message: string) =>
- i18n.translate('xpack.actions.builtin.servicenow.servicenowApiWhitelistError', {
- defaultMessage: 'error configuring servicenow action: {message}',
- values: {
- message,
- },
- });
-
-export const NAME = i18n.translate('xpack.actions.builtin.servicenowTitle', {
+export const NAME = i18n.translate('xpack.actions.builtin.case.servicenowTitle', {
defaultMessage: 'ServiceNow',
});
-
-export const MAPPING_EMPTY = i18n.translate('xpack.actions.builtin.servicenow.emptyMapping', {
- defaultMessage: '[casesConfiguration.mapping]: expected non-empty but got empty',
-});
-
-export const ERROR_POSTING = i18n.translate(
- 'xpack.actions.builtin.servicenow.postingErrorMessage',
- {
- defaultMessage: 'error posting servicenow event',
- }
-);
-
-export const RETRY_POSTING = (status: number) =>
- i18n.translate('xpack.actions.builtin.servicenow.postingRetryErrorMessage', {
- defaultMessage: 'error posting servicenow event: http status {status}, retry later',
- values: {
- status,
- },
- });
-
-export const UNEXPECTED_STATUS = (status: number) =>
- i18n.translate('xpack.actions.builtin.servicenow.postingUnexpectedErrorMessage', {
- defaultMessage: 'error posting servicenow event: unexpected status {status}',
- values: {
- status,
- },
- });
-
-export const FIELD_INFORMATION = (
- mode: string,
- date: string | undefined,
- user: string | undefined
-) => {
- switch (mode) {
- case 'create':
- return i18n.translate('xpack.actions.builtin.servicenow.informationCreated', {
- values: { date, user },
- defaultMessage: '(created at {date} by {user})',
- });
- case 'update':
- return i18n.translate('xpack.actions.builtin.servicenow.informationUpdated', {
- values: { date, user },
- defaultMessage: '(updated at {date} by {user})',
- });
- case 'add':
- return i18n.translate('xpack.actions.builtin.servicenow.informationAdded', {
- values: { date, user },
- defaultMessage: '(added at {date} by {user})',
- });
- default:
- return i18n.translate('xpack.actions.builtin.servicenow.informationDefault', {
- values: { date, user },
- defaultMessage: '(created at {date} by {user})',
- });
- }
-};
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/types.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/types.ts
index c5ef282aeffa7..d8476b7dca54a 100644
--- a/x-pack/plugins/actions/server/builtin_action_types/servicenow/types.ts
+++ b/x-pack/plugins/actions/server/builtin_action_types/servicenow/types.ts
@@ -4,100 +4,18 @@
* you may not use this file except in compliance with the Elastic License.
*/
-import { TypeOf } from '@kbn/config-schema';
+export {
+ ExternalIncidentServiceConfiguration as ServiceNowPublicConfigurationType,
+ ExternalIncidentServiceSecretConfiguration as ServiceNowSecretConfigurationType,
+} from '../case/types';
-import {
- ConfigSchema,
- SecretsSchema,
- ParamsSchema,
- CasesConfigurationSchema,
- MapEntrySchema,
- CommentSchema,
-} from './schema';
-
-import { ServiceNow } from './lib';
-import { Incident, IncidentResponse } from './lib/types';
-
-// config definition
-export type ConfigType = TypeOf;
-
-// secrets definition
-export type SecretsType = TypeOf;
-
-export type ExecutorParams = TypeOf;
-
-export type CasesConfigurationType = TypeOf;
-export type MapEntry = TypeOf;
-export type Comment = TypeOf;
-
-export type Mapping = Map>;
-
-export interface Params extends ExecutorParams {
- incident: Record;
+export interface CreateIncidentRequest {
+ summary: string;
+ description: string;
}
-export interface CreateHandlerArguments {
- serviceNow: ServiceNow;
- params: Params;
- comments: Comment[];
- mapping: Mapping;
-}
-
-export type UpdateHandlerArguments = CreateHandlerArguments & {
- incidentId: string;
-};
-
-export type IncidentHandlerArguments = CreateHandlerArguments & {
- incidentId: string | null;
-};
-export interface HandlerResponse extends IncidentResponse {
- comments?: SimpleComment[];
-}
-
-export interface SimpleComment {
- commentId: string;
- pushedDate: string;
-}
-
-export interface AppendFieldArgs {
- value: string;
- prefix?: string;
- suffix?: string;
-}
-
-export interface KeyAny {
- [index: string]: unknown;
-}
-
-export interface AppendInformationFieldArgs {
- value: string;
- user: string;
- date: string;
- mode: string;
-}
-
-export interface TransformerArgs {
- value: string;
- date?: string;
- user?: string;
- previousValue?: string;
-}
-
-export interface PrepareFieldsForTransformArgs {
- params: Params;
- mapping: Mapping;
- defaultPipes?: string[];
-}
-
-export interface PipedField {
- key: string;
- value: string;
- actionType: string;
- pipes: string[];
-}
+export type UpdateIncidentRequest = Partial;
-export interface TransformFieldsArgs {
- params: Params;
- fields: PipedField[];
- currentIncident?: Incident;
+export interface CreateCommentRequest {
+ [key: string]: string;
}
diff --git a/x-pack/plugins/actions/server/builtin_action_types/servicenow/validators.ts b/x-pack/plugins/actions/server/builtin_action_types/servicenow/validators.ts
new file mode 100644
index 0000000000000..7226071392bc6
--- /dev/null
+++ b/x-pack/plugins/actions/server/builtin_action_types/servicenow/validators.ts
@@ -0,0 +1,13 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { validateCommonConfig, validateCommonSecrets } from '../case/validators';
+import { ExternalServiceValidation } from '../case/types';
+
+export const validate: ExternalServiceValidation = {
+ config: validateCommonConfig,
+ secrets: validateCommonSecrets,
+};
diff --git a/x-pack/plugins/case/common/api/cases/case.ts b/x-pack/plugins/case/common/api/cases/case.ts
index 1f08a41024905..d1bcae549805e 100644
--- a/x-pack/plugins/case/common/api/cases/case.ts
+++ b/x-pack/plugins/case/common/api/cases/case.ts
@@ -127,35 +127,34 @@ export const ServiceConnectorCommentParamsRt = rt.type({
updatedBy: rt.union([ServiceConnectorUserParams, rt.null]),
});
-export const ServiceConnectorCaseParamsRt = rt.intersection([
- rt.type({
- caseId: rt.string,
- createdAt: rt.string,
- createdBy: ServiceConnectorUserParams,
- incidentId: rt.union([rt.string, rt.null]),
- title: rt.string,
- updatedAt: rt.union([rt.string, rt.null]),
- updatedBy: rt.union([ServiceConnectorUserParams, rt.null]),
- }),
- rt.partial({
- description: rt.string,
- comments: rt.array(ServiceConnectorCommentParamsRt),
- }),
-]);
+export const ServiceConnectorCaseParamsRt = rt.type({
+ caseId: rt.string,
+ createdAt: rt.string,
+ createdBy: ServiceConnectorUserParams,
+ externalId: rt.union([rt.string, rt.null]),
+ title: rt.string,
+ updatedAt: rt.union([rt.string, rt.null]),
+ updatedBy: rt.union([ServiceConnectorUserParams, rt.null]),
+ description: rt.union([rt.string, rt.null]),
+ comments: rt.union([rt.array(ServiceConnectorCommentParamsRt), rt.null]),
+});
export const ServiceConnectorCaseResponseRt = rt.intersection([
rt.type({
- number: rt.string,
- incidentId: rt.string,
+ title: rt.string,
+ id: rt.string,
pushedDate: rt.string,
url: rt.string,
}),
rt.partial({
comments: rt.array(
- rt.type({
- commentId: rt.string,
- pushedDate: rt.string,
- })
+ rt.intersection([
+ rt.type({
+ commentId: rt.string,
+ pushedDate: rt.string,
+ }),
+ rt.partial({ externalCommentId: rt.string }),
+ ])
),
}),
]);
diff --git a/x-pack/plugins/case/common/constants.ts b/x-pack/plugins/case/common/constants.ts
index dcfa46bfa6019..855a5c3d63507 100644
--- a/x-pack/plugins/case/common/constants.ts
+++ b/x-pack/plugins/case/common/constants.ts
@@ -27,3 +27,5 @@ export const CASE_USER_ACTIONS_URL = `${CASE_DETAILS_URL}/user_actions`;
export const ACTION_URL = '/api/action';
export const ACTION_TYPES_URL = '/api/action/types';
+
+export const SUPPORTED_CONNECTORS = ['.servicenow', '.jira'];
diff --git a/x-pack/plugins/case/server/routes/api/cases/configure/get_connectors.ts b/x-pack/plugins/case/server/routes/api/cases/configure/get_connectors.ts
index 00575655d4c42..43167d56de015 100644
--- a/x-pack/plugins/case/server/routes/api/cases/configure/get_connectors.ts
+++ b/x-pack/plugins/case/server/routes/api/cases/configure/get_connectors.ts
@@ -8,14 +8,15 @@ import Boom from 'boom';
import { RouteDeps } from '../../types';
import { wrapError } from '../../utils';
-import { CASE_CONFIGURE_CONNECTORS_URL } from '../../../../../common/constants';
+import {
+ CASE_CONFIGURE_CONNECTORS_URL,
+ SUPPORTED_CONNECTORS,
+} from '../../../../../common/constants';
/*
* Be aware that this api will only return 20 connectors
*/
-const CASE_SERVICE_NOW_ACTION = '.servicenow';
-
export function initCaseConfigureGetActionConnector({ caseService, router }: RouteDeps) {
router.get(
{
@@ -30,8 +31,8 @@ export function initCaseConfigureGetActionConnector({ caseService, router }: Rou
throw Boom.notFound('Action client have not been found');
}
- const results = (await actionsClient.getAll()).filter(
- action => action.actionTypeId === CASE_SERVICE_NOW_ACTION
+ const results = (await actionsClient.getAll()).filter(action =>
+ SUPPORTED_CONNECTORS.includes(action.actionTypeId)
);
return response.ok({ body: results });
} catch (error) {
diff --git a/x-pack/plugins/siem/public/containers/case/api.test.tsx b/x-pack/plugins/siem/public/containers/case/api.test.tsx
index ad61e2b46f6c5..174738098fa10 100644
--- a/x-pack/plugins/siem/public/containers/case/api.test.tsx
+++ b/x-pack/plugins/siem/public/containers/case/api.test.tsx
@@ -418,7 +418,9 @@ describe('Case Configuration API', () => {
await pushToService(connectorId, casePushParams, abortCtrl.signal);
expect(fetchMock).toHaveBeenCalledWith(`/api/action/${connectorId}/_execute`, {
method: 'POST',
- body: JSON.stringify({ params: casePushParams }),
+ body: JSON.stringify({
+ params: { subAction: 'pushToService', subActionParams: casePushParams },
+ }),
signal: abortCtrl.signal,
});
});
diff --git a/x-pack/plugins/siem/public/containers/case/api.ts b/x-pack/plugins/siem/public/containers/case/api.ts
index b97f94a5a6b59..438eae9d88a44 100644
--- a/x-pack/plugins/siem/public/containers/case/api.ts
+++ b/x-pack/plugins/siem/public/containers/case/api.ts
@@ -245,7 +245,9 @@ export const pushToService = async (
`${ACTION_URL}/${connectorId}/_execute`,
{
method: 'POST',
- body: JSON.stringify({ params: casePushParams }),
+ body: JSON.stringify({
+ params: { subAction: 'pushToService', subActionParams: casePushParams },
+ }),
signal,
}
);
diff --git a/x-pack/plugins/siem/public/containers/case/mock.ts b/x-pack/plugins/siem/public/containers/case/mock.ts
index 0f44b3a1594ba..a3a8db2c40950 100644
--- a/x-pack/plugins/siem/public/containers/case/mock.ts
+++ b/x-pack/plugins/siem/public/containers/case/mock.ts
@@ -103,8 +103,8 @@ export const pushedCase: Case = {
};
export const serviceConnector: ServiceConnectorCaseResponse = {
- number: '123',
- incidentId: '444',
+ title: '123',
+ id: '444',
pushedDate: basicUpdatedAt,
url: 'connector.com',
comments: [
@@ -129,12 +129,13 @@ export const casePushParams = {
caseId: basicCaseId,
createdAt: basicCreatedAt,
createdBy: elasticUser,
- incidentId: null,
+ externalId: null,
title: 'what a cool value',
commentId: null,
updatedAt: basicCreatedAt,
updatedBy: elasticUser,
description: 'nice',
+ comments: null,
};
export const actionTypeExecutorResult = {
actionId: 'string',
diff --git a/x-pack/plugins/siem/public/containers/case/use_post_push_to_service.test.tsx b/x-pack/plugins/siem/public/containers/case/use_post_push_to_service.test.tsx
index b07a346a8da46..b9698c3e864e3 100644
--- a/x-pack/plugins/siem/public/containers/case/use_post_push_to_service.test.tsx
+++ b/x-pack/plugins/siem/public/containers/case/use_post_push_to_service.test.tsx
@@ -55,8 +55,8 @@ describe('usePostPushToService', () => {
{
connector_id: samplePush.connectorId,
connector_name: samplePush.connectorName,
- external_id: serviceConnector.incidentId,
- external_title: serviceConnector.number,
+ external_id: serviceConnector.id,
+ external_title: serviceConnector.title,
external_url: serviceConnector.url,
},
abortCtrl.signal
diff --git a/x-pack/plugins/siem/public/containers/case/use_post_push_to_service.tsx b/x-pack/plugins/siem/public/containers/case/use_post_push_to_service.tsx
index acd4b92ee430d..c9d1b963f411a 100644
--- a/x-pack/plugins/siem/public/containers/case/use_post_push_to_service.tsx
+++ b/x-pack/plugins/siem/public/containers/case/use_post_push_to_service.tsx
@@ -98,8 +98,8 @@ export const usePostPushToService = (): UsePostPushToService => {
{
connector_id: connectorId,
connector_name: connectorName,
- external_id: responseService.incidentId,
- external_title: responseService.number,
+ external_id: responseService.id,
+ external_title: responseService.title,
external_url: responseService.url,
},
abortCtrl.signal
@@ -180,7 +180,7 @@ export const formatServiceRequestData = (myCase: Case): ServiceConnectorCasePara
: null,
})),
description,
- incidentId: externalService?.externalId ?? null,
+ externalId: externalService?.externalId ?? null,
title,
updatedAt,
updatedBy:
diff --git a/x-pack/plugins/siem/public/lib/connectors/components/connector_flyout/index.tsx b/x-pack/plugins/siem/public/lib/connectors/components/connector_flyout/index.tsx
new file mode 100644
index 0000000000000..c5a35da56284d
--- /dev/null
+++ b/x-pack/plugins/siem/public/lib/connectors/components/connector_flyout/index.tsx
@@ -0,0 +1,148 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import React, { useCallback, useEffect } from 'react';
+import { EuiFieldText, EuiFlexGroup, EuiFlexItem, EuiFormRow, EuiSpacer } from '@elastic/eui';
+
+import { isEmpty, get } from 'lodash/fp';
+
+// eslint-disable-next-line @kbn/eslint/no-restricted-paths
+import { ActionConnectorFieldsProps } from '../../../../../../triggers_actions_ui/public/types';
+import { FieldMapping } from '../../../../pages/case/components/configure_cases/field_mapping';
+
+import { defaultMapping } from '../../config';
+import { CasesConfigurationMapping } from '../../../../containers/case/configure/types';
+
+import * as i18n from '../../translations';
+import { ActionConnector, ConnectorFlyoutHOCProps } from '../../types';
+
+export const withConnectorFlyout = ({
+ ConnectorFormComponent,
+ secretKeys = [],
+ configKeys = [],
+}: ConnectorFlyoutHOCProps) => {
+ const ConnectorFlyout: React.FC> = ({
+ action,
+ editActionConfig,
+ editActionSecrets,
+ errors,
+ }) => {
+ /* We do not provide defaults values to the fields (like empty string for apiUrl) intentionally.
+ * If we do, errors will be shown the first time the flyout is open even though the user did not
+ * interact with the form. Also, we would like to show errors for empty fields provided by the user.
+ /*/
+ const { apiUrl, casesConfiguration: { mapping = [] } = {} } = action.config;
+ const configKeysWithDefault = [...configKeys, 'apiUrl'];
+
+ const isApiUrlInvalid: boolean = errors.apiUrl.length > 0 && apiUrl != null;
+
+ /**
+ * We need to distinguish between the add flyout and the edit flyout.
+ * useEffect will run only once on component mount.
+ * This guarantees that the function below will run only once.
+ * On the first render of the component the apiUrl can be either undefined or filled.
+ * If it is filled then we are on the edit flyout. Otherwise we are on the add flyout.
+ */
+
+ useEffect(() => {
+ if (!isEmpty(apiUrl)) {
+ secretKeys.forEach((key: string) => editActionSecrets(key, ''));
+ }
+ }, []);
+
+ if (isEmpty(mapping)) {
+ editActionConfig('casesConfiguration', {
+ ...action.config.casesConfiguration,
+ mapping: defaultMapping,
+ });
+ }
+
+ const handleOnChangeActionConfig = useCallback(
+ (key: string, value: string) => editActionConfig(key, value),
+ []
+ );
+
+ const handleOnBlurActionConfig = useCallback(
+ (key: string) => {
+ if (configKeysWithDefault.includes(key) && get(key, action.config) == null) {
+ editActionConfig(key, '');
+ }
+ },
+ [action.config]
+ );
+
+ const handleOnChangeSecretConfig = useCallback(
+ (key: string, value: string) => editActionSecrets(key, value),
+ []
+ );
+
+ const handleOnBlurSecretConfig = useCallback(
+ (key: string) => {
+ if (secretKeys.includes(key) && get(key, action.secrets) == null) {
+ editActionSecrets(key, '');
+ }
+ },
+ [action.secrets]
+ );
+
+ const handleOnChangeMappingConfig = useCallback(
+ (newMapping: CasesConfigurationMapping[]) =>
+ editActionConfig('casesConfiguration', {
+ ...action.config.casesConfiguration,
+ mapping: newMapping,
+ }),
+ [action.config]
+ );
+
+ return (
+ <>
+
+
+
+ handleOnChangeActionConfig('apiUrl', evt.target.value)}
+ onBlur={handleOnBlurActionConfig.bind(null, 'apiUrl')}
+ />
+
+
+
+
+
+
+
+
+
+
+
+ >
+ );
+ };
+
+ return ConnectorFlyout;
+};
diff --git a/x-pack/plugins/siem/public/lib/connectors/config.ts b/x-pack/plugins/siem/public/lib/connectors/config.ts
index baeb69b3f6943..98473e49622a9 100644
--- a/x-pack/plugins/siem/public/lib/connectors/config.ts
+++ b/x-pack/plugins/siem/public/lib/connectors/config.ts
@@ -5,17 +5,17 @@
*/
import { CasesConfigurationMapping } from '../../containers/case/configure/types';
-import serviceNowLogo from './logos/servicenow.svg';
+
import { Connector } from './types';
+import { connector as serviceNowConnectorConfig } from './servicenow/config';
+import { connector as jiraConnectorConfig } from './jira/config';
-const connectors: Record = {
- '.servicenow': {
- actionTypeId: '.servicenow',
- logo: serviceNowLogo,
- },
+export const connectorsConfiguration: Record = {
+ '.servicenow': serviceNowConnectorConfig,
+ '.jira': jiraConnectorConfig,
};
-const defaultMapping: CasesConfigurationMapping[] = [
+export const defaultMapping: CasesConfigurationMapping[] = [
{
source: 'title',
target: 'short_description',
@@ -32,5 +32,3 @@ const defaultMapping: CasesConfigurationMapping[] = [
actionType: 'append',
},
];
-
-export { connectors, defaultMapping };
diff --git a/x-pack/plugins/siem/public/lib/connectors/index.ts b/x-pack/plugins/siem/public/lib/connectors/index.ts
index fdf337b5ef120..2ce61bef49c5e 100644
--- a/x-pack/plugins/siem/public/lib/connectors/index.ts
+++ b/x-pack/plugins/siem/public/lib/connectors/index.ts
@@ -5,3 +5,4 @@
*/
export { getActionType as serviceNowActionType } from './servicenow';
+export { getActionType as jiraActionType } from './jira';
diff --git a/x-pack/plugins/siem/public/lib/connectors/jira/config.ts b/x-pack/plugins/siem/public/lib/connectors/jira/config.ts
new file mode 100644
index 0000000000000..42bd1b9cdc191
--- /dev/null
+++ b/x-pack/plugins/siem/public/lib/connectors/jira/config.ts
@@ -0,0 +1,20 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { Connector } from '../types';
+
+import { JIRA_TITLE } from './translations';
+import logo from './logo.svg';
+
+export const connector: Connector = {
+ id: '.jira',
+ name: JIRA_TITLE,
+ logo,
+ enabled: true,
+ enabledInConfig: true,
+ enabledInLicense: true,
+ minimumLicenseRequired: 'platinum',
+};
diff --git a/x-pack/plugins/siem/public/lib/connectors/jira/flyout.tsx b/x-pack/plugins/siem/public/lib/connectors/jira/flyout.tsx
new file mode 100644
index 0000000000000..482808fca53b1
--- /dev/null
+++ b/x-pack/plugins/siem/public/lib/connectors/jira/flyout.tsx
@@ -0,0 +1,110 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+import React from 'react';
+import {
+ EuiFieldText,
+ EuiFlexGroup,
+ EuiFlexItem,
+ EuiFormRow,
+ EuiFieldPassword,
+ EuiSpacer,
+} from '@elastic/eui';
+
+import * as i18n from './translations';
+import { ConnectorFlyoutFormProps } from '../types';
+import { JiraActionConnector } from './types';
+import { withConnectorFlyout } from '../components/connector_flyout';
+
+const JiraConnectorForm: React.FC> = ({
+ errors,
+ action,
+ onChangeSecret,
+ onBlurSecret,
+ onChangeConfig,
+ onBlurConfig,
+}) => {
+ const { projectKey } = action.config;
+ const { email, apiToken } = action.secrets;
+ const isProjectKeyInvalid: boolean = errors.projectKey.length > 0 && projectKey != null;
+ const isEmailInvalid: boolean = errors.email.length > 0 && email != null;
+ const isApiTokenInvalid: boolean = errors.apiToken.length > 0 && apiToken != null;
+
+ return (
+ <>
+
+
+
+ onChangeConfig('projectKey', evt.target.value)}
+ onBlur={() => onBlurConfig('projectKey')}
+ />
+
+
+
+
+
+
+
+ onChangeSecret('email', evt.target.value)}
+ onBlur={() => onBlurSecret('email')}
+ />
+
+
+
+
+
+
+
+ onChangeSecret('apiToken', evt.target.value)}
+ onBlur={() => onBlurSecret('apiToken')}
+ />
+
+
+
+ >
+ );
+};
+
+export const JiraConnectorFlyout = withConnectorFlyout({
+ ConnectorFormComponent: JiraConnectorForm,
+ secretKeys: ['email', 'apiToken'],
+ configKeys: ['projectKey'],
+});
diff --git a/x-pack/plugins/siem/public/lib/connectors/jira/index.tsx b/x-pack/plugins/siem/public/lib/connectors/jira/index.tsx
new file mode 100644
index 0000000000000..ada9608e37c98
--- /dev/null
+++ b/x-pack/plugins/siem/public/lib/connectors/jira/index.tsx
@@ -0,0 +1,54 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import {
+ ValidationResult,
+ // eslint-disable-next-line @kbn/eslint/no-restricted-paths
+} from '../../../../../triggers_actions_ui/public/types';
+
+import { connector } from './config';
+import { createActionType } from '../utils';
+import logo from './logo.svg';
+import { JiraActionConnector } from './types';
+import { JiraConnectorFlyout } from './flyout';
+import * as i18n from './translations';
+
+interface Errors {
+ projectKey: string[];
+ email: string[];
+ apiToken: string[];
+}
+
+const validateConnector = (action: JiraActionConnector): ValidationResult => {
+ const errors: Errors = {
+ projectKey: [],
+ email: [],
+ apiToken: [],
+ };
+
+ if (!action.config.projectKey) {
+ errors.projectKey = [...errors.projectKey, i18n.JIRA_PROJECT_KEY_REQUIRED];
+ }
+
+ if (!action.secrets.email) {
+ errors.email = [...errors.email, i18n.EMAIL_REQUIRED];
+ }
+
+ if (!action.secrets.apiToken) {
+ errors.apiToken = [...errors.apiToken, i18n.API_TOKEN_REQUIRED];
+ }
+
+ return { errors };
+};
+
+export const getActionType = createActionType({
+ id: connector.id,
+ iconClass: logo,
+ selectMessage: i18n.JIRA_DESC,
+ actionTypeTitle: connector.name,
+ validateConnector,
+ actionConnectorFields: JiraConnectorFlyout,
+});
diff --git a/x-pack/plugins/siem/public/lib/connectors/logos/servicenow.svg b/x-pack/plugins/siem/public/lib/connectors/jira/logo.svg
old mode 100755
new mode 100644
similarity index 100%
rename from x-pack/plugins/siem/public/lib/connectors/logos/servicenow.svg
rename to x-pack/plugins/siem/public/lib/connectors/jira/logo.svg
diff --git a/x-pack/plugins/siem/public/lib/connectors/jira/translations.ts b/x-pack/plugins/siem/public/lib/connectors/jira/translations.ts
new file mode 100644
index 0000000000000..751aaecdad964
--- /dev/null
+++ b/x-pack/plugins/siem/public/lib/connectors/jira/translations.ts
@@ -0,0 +1,28 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { i18n } from '@kbn/i18n';
+
+export * from '../translations';
+
+export const JIRA_DESC = i18n.translate('xpack.siem.case.connectors.jira.selectMessageText', {
+ defaultMessage: 'Push or update SIEM case data to a new issue in Jira',
+});
+
+export const JIRA_TITLE = i18n.translate('xpack.siem.case.connectors.jira.actionTypeTitle', {
+ defaultMessage: 'Jira',
+});
+
+export const JIRA_PROJECT_KEY_LABEL = i18n.translate('xpack.siem.case.connectors.jira.projectKey', {
+ defaultMessage: 'Project key',
+});
+
+export const JIRA_PROJECT_KEY_REQUIRED = i18n.translate(
+ 'xpack.siem.case.connectors.jira.requiredProjectKeyTextField',
+ {
+ defaultMessage: 'Project key is required',
+ }
+);
diff --git a/x-pack/plugins/siem/public/lib/connectors/jira/types.ts b/x-pack/plugins/siem/public/lib/connectors/jira/types.ts
new file mode 100644
index 0000000000000..13e4e8f6a289e
--- /dev/null
+++ b/x-pack/plugins/siem/public/lib/connectors/jira/types.ts
@@ -0,0 +1,18 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+/* eslint-disable no-restricted-imports */
+/* eslint-disable @kbn/eslint/no-restricted-paths */
+
+import {
+ JiraPublicConfigurationType,
+ JiraSecretConfigurationType,
+} from '../../../../../actions/server/builtin_action_types/jira/types';
+
+export interface JiraActionConnector {
+ config: JiraPublicConfigurationType;
+ secrets: JiraSecretConfigurationType;
+}
diff --git a/x-pack/plugins/siem/public/lib/connectors/servicenow.tsx b/x-pack/plugins/siem/public/lib/connectors/servicenow.tsx
deleted file mode 100644
index 9fe0b4a957ceb..0000000000000
--- a/x-pack/plugins/siem/public/lib/connectors/servicenow.tsx
+++ /dev/null
@@ -1,246 +0,0 @@
-/*
- * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
- * or more contributor license agreements. Licensed under the Elastic License;
- * you may not use this file except in compliance with the Elastic License.
- */
-import React, { useCallback, ChangeEvent, useEffect } from 'react';
-import {
- EuiFieldText,
- EuiFlexGroup,
- EuiFlexItem,
- EuiFormRow,
- EuiFieldPassword,
- EuiSpacer,
-} from '@elastic/eui';
-
-import { isEmpty, get } from 'lodash/fp';
-
-import {
- ActionConnectorFieldsProps,
- ActionTypeModel,
- ValidationResult,
- ActionParamsProps,
- // eslint-disable-next-line @kbn/eslint/no-restricted-paths
-} from '../../../../triggers_actions_ui/public/types';
-
-import { FieldMapping } from '../../pages/case/components/configure_cases/field_mapping';
-
-import * as i18n from './translations';
-
-import { ServiceNowActionConnector } from './types';
-import { isUrlInvalid } from './validators';
-
-import { connectors, defaultMapping } from './config';
-import { CasesConfigurationMapping } from '../../containers/case/configure/types';
-
-const serviceNowDefinition = connectors['.servicenow'];
-
-interface ServiceNowActionParams {
- message: string;
-}
-
-interface Errors {
- apiUrl: string[];
- username: string[];
- password: string[];
-}
-
-export function getActionType(): ActionTypeModel {
- return {
- id: serviceNowDefinition.actionTypeId,
- iconClass: serviceNowDefinition.logo,
- selectMessage: i18n.SERVICENOW_DESC,
- actionTypeTitle: i18n.SERVICENOW_TITLE,
- validateConnector: (action: ServiceNowActionConnector): ValidationResult => {
- const errors: Errors = {
- apiUrl: [],
- username: [],
- password: [],
- };
-
- if (!action.config.apiUrl) {
- errors.apiUrl = [...errors.apiUrl, i18n.SERVICENOW_API_URL_REQUIRED];
- }
-
- if (isUrlInvalid(action.config.apiUrl)) {
- errors.apiUrl = [...errors.apiUrl, i18n.SERVICENOW_API_URL_INVALID];
- }
-
- if (!action.secrets.username) {
- errors.username = [...errors.username, i18n.SERVICENOW_USERNAME_REQUIRED];
- }
-
- if (!action.secrets.password) {
- errors.password = [...errors.password, i18n.SERVICENOW_PASSWORD_REQUIRED];
- }
-
- return { errors };
- },
- validateParams: (actionParams: ServiceNowActionParams): ValidationResult => {
- return { errors: {} };
- },
- actionConnectorFields: ServiceNowConnectorFields,
- actionParamsFields: ServiceNowParamsFields,
- };
-}
-
-const ServiceNowConnectorFields: React.FunctionComponent> = ({ action, editActionConfig, editActionSecrets, errors }) => {
- /* We do not provide defaults values to the fields (like empty string for apiUrl) intentionally.
- * If we do, errors will be shown the first time the flyout is open even though the user did not
- * interact with the form. Also, we would like to show errors for empty fields provided by the user.
- /*/
- const { apiUrl, casesConfiguration: { mapping = [] } = {} } = action.config;
- const { username, password } = action.secrets;
-
- const isApiUrlInvalid: boolean = errors.apiUrl.length > 0 && apiUrl != null;
- const isUsernameInvalid: boolean = errors.username.length > 0 && username != null;
- const isPasswordInvalid: boolean = errors.password.length > 0 && password != null;
-
- /**
- * We need to distinguish between the add flyout and the edit flyout.
- * useEffect will run only once on component mount.
- * This guarantees that the function below will run only once.
- * On the first render of the component the apiUrl can be either undefined or filled.
- * If it is filled then we are on the edit flyout. Otherwise we are on the add flyout.
- */
-
- useEffect(() => {
- if (!isEmpty(apiUrl)) {
- editActionSecrets('username', '');
- editActionSecrets('password', '');
- }
- }, []);
-
- if (isEmpty(mapping)) {
- editActionConfig('casesConfiguration', {
- ...action.config.casesConfiguration,
- mapping: defaultMapping,
- });
- }
-
- const handleOnChangeActionConfig = useCallback(
- (key: string, evt: ChangeEvent) => editActionConfig(key, evt.target.value),
- []
- );
-
- const handleOnBlurActionConfig = useCallback(
- (key: string) => {
- if (key === 'apiUrl' && action.config[key] == null) {
- editActionConfig(key, '');
- }
- },
- [action.config]
- );
-
- const handleOnChangeSecretConfig = useCallback(
- (key: string, evt: ChangeEvent) => editActionSecrets(key, evt.target.value),
- []
- );
-
- const handleOnBlurSecretConfig = useCallback(
- (key: string) => {
- if (['username', 'password'].includes(key) && get(key, action.secrets) == null) {
- editActionSecrets(key, '');
- }
- },
- [action.secrets]
- );
-
- const handleOnChangeMappingConfig = useCallback(
- (newMapping: CasesConfigurationMapping[]) =>
- editActionConfig('casesConfiguration', {
- ...action.config.casesConfiguration,
- mapping: newMapping,
- }),
- [action.config]
- );
-
- return (
- <>
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- >
- );
-};
-
-const ServiceNowParamsFields: React.FunctionComponent> = ({ actionParams, editAction, index, errors }) => {
- return null;
-};
diff --git a/x-pack/plugins/siem/public/lib/connectors/servicenow/config.ts b/x-pack/plugins/siem/public/lib/connectors/servicenow/config.ts
new file mode 100644
index 0000000000000..7bc1b117b3422
--- /dev/null
+++ b/x-pack/plugins/siem/public/lib/connectors/servicenow/config.ts
@@ -0,0 +1,20 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { Connector } from '../types';
+
+import { SERVICENOW_TITLE } from './translations';
+import logo from './logo.svg';
+
+export const connector: Connector = {
+ id: '.servicenow',
+ name: SERVICENOW_TITLE,
+ logo,
+ enabled: true,
+ enabledInConfig: true,
+ enabledInLicense: true,
+ minimumLicenseRequired: 'platinum',
+};
diff --git a/x-pack/plugins/siem/public/lib/connectors/servicenow/flyout.tsx b/x-pack/plugins/siem/public/lib/connectors/servicenow/flyout.tsx
new file mode 100644
index 0000000000000..bcde802e7bd1e
--- /dev/null
+++ b/x-pack/plugins/siem/public/lib/connectors/servicenow/flyout.tsx
@@ -0,0 +1,83 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+import React from 'react';
+import {
+ EuiFieldText,
+ EuiFlexGroup,
+ EuiFlexItem,
+ EuiFormRow,
+ EuiFieldPassword,
+ EuiSpacer,
+} from '@elastic/eui';
+
+import * as i18n from './translations';
+import { ConnectorFlyoutFormProps } from '../types';
+import { ServiceNowActionConnector } from './types';
+import { withConnectorFlyout } from '../components/connector_flyout';
+
+const ServiceNowConnectorForm: React.FC> = ({
+ errors,
+ action,
+ onChangeSecret,
+ onBlurSecret,
+}) => {
+ const { username, password } = action.secrets;
+ const isUsernameInvalid: boolean = errors.username.length > 0 && username != null;
+ const isPasswordInvalid: boolean = errors.password.length > 0 && password != null;
+
+ return (
+ <>
+
+
+
+ onChangeSecret('username', evt.target.value)}
+ onBlur={() => onBlurSecret('username')}
+ />
+
+
+
+
+
+
+
+ onChangeSecret('password', evt.target.value)}
+ onBlur={() => onBlurSecret('password')}
+ />
+
+
+
+ >
+ );
+};
+
+export const ServiceNowConnectorFlyout = withConnectorFlyout({
+ ConnectorFormComponent: ServiceNowConnectorForm,
+ secretKeys: ['username', 'password'],
+});
diff --git a/x-pack/plugins/siem/public/lib/connectors/servicenow/index.tsx b/x-pack/plugins/siem/public/lib/connectors/servicenow/index.tsx
new file mode 100644
index 0000000000000..1f8e61b6d3ea7
--- /dev/null
+++ b/x-pack/plugins/siem/public/lib/connectors/servicenow/index.tsx
@@ -0,0 +1,48 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import {
+ ValidationResult,
+ // eslint-disable-next-line @kbn/eslint/no-restricted-paths
+} from '../../../../../triggers_actions_ui/public/types';
+
+import { connector } from './config';
+import { createActionType } from '../utils';
+import logo from './logo.svg';
+import { ServiceNowActionConnector } from './types';
+import { ServiceNowConnectorFlyout } from './flyout';
+import * as i18n from './translations';
+
+interface Errors {
+ username: string[];
+ password: string[];
+}
+
+const validateConnector = (action: ServiceNowActionConnector): ValidationResult => {
+ const errors: Errors = {
+ username: [],
+ password: [],
+ };
+
+ if (!action.secrets.username) {
+ errors.username = [...errors.username, i18n.USERNAME_REQUIRED];
+ }
+
+ if (!action.secrets.password) {
+ errors.password = [...errors.password, i18n.PASSWORD_REQUIRED];
+ }
+
+ return { errors };
+};
+
+export const getActionType = createActionType({
+ id: connector.id,
+ iconClass: logo,
+ selectMessage: i18n.SERVICENOW_DESC,
+ actionTypeTitle: connector.name,
+ validateConnector,
+ actionConnectorFields: ServiceNowConnectorFlyout,
+});
diff --git a/x-pack/plugins/siem/public/lib/connectors/servicenow/logo.svg b/x-pack/plugins/siem/public/lib/connectors/servicenow/logo.svg
new file mode 100644
index 0000000000000..dcd022a8dca18
--- /dev/null
+++ b/x-pack/plugins/siem/public/lib/connectors/servicenow/logo.svg
@@ -0,0 +1,5 @@
+
+
+
+
+
diff --git a/x-pack/plugins/siem/public/lib/connectors/servicenow/translations.ts b/x-pack/plugins/siem/public/lib/connectors/servicenow/translations.ts
new file mode 100644
index 0000000000000..5dac9eddd1536
--- /dev/null
+++ b/x-pack/plugins/siem/public/lib/connectors/servicenow/translations.ts
@@ -0,0 +1,23 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { i18n } from '@kbn/i18n';
+
+export * from '../translations';
+
+export const SERVICENOW_DESC = i18n.translate(
+ 'xpack.siem.case.connectors.servicenow.selectMessageText',
+ {
+ defaultMessage: 'Push or update SIEM case data to a new incident in ServiceNow',
+ }
+);
+
+export const SERVICENOW_TITLE = i18n.translate(
+ 'xpack.siem.case.connectors.servicenow.actionTypeTitle',
+ {
+ defaultMessage: 'ServiceNow',
+ }
+);
diff --git a/x-pack/plugins/siem/public/lib/connectors/servicenow/types.ts b/x-pack/plugins/siem/public/lib/connectors/servicenow/types.ts
new file mode 100644
index 0000000000000..b7f0e79eb37e3
--- /dev/null
+++ b/x-pack/plugins/siem/public/lib/connectors/servicenow/types.ts
@@ -0,0 +1,18 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+/* eslint-disable no-restricted-imports */
+/* eslint-disable @kbn/eslint/no-restricted-paths */
+
+import {
+ ServiceNowPublicConfigurationType,
+ ServiceNowSecretConfigurationType,
+} from '../../../../../actions/server/builtin_action_types/servicenow/types';
+
+export interface ServiceNowActionConnector {
+ config: ServiceNowPublicConfigurationType;
+ secrets: ServiceNowSecretConfigurationType;
+}
diff --git a/x-pack/plugins/siem/public/lib/connectors/translations.ts b/x-pack/plugins/siem/public/lib/connectors/translations.ts
index ae2084120255c..b9c1d0fa2a17f 100644
--- a/x-pack/plugins/siem/public/lib/connectors/translations.ts
+++ b/x-pack/plugins/siem/public/lib/connectors/translations.ts
@@ -6,65 +6,76 @@
import { i18n } from '@kbn/i18n';
-export const SERVICENOW_DESC = i18n.translate(
- 'xpack.siem.case.connectors.servicenow.selectMessageText',
+export const API_URL_LABEL = i18n.translate(
+ 'xpack.siem.case.connectors.common.apiUrlTextFieldLabel',
{
- defaultMessage: 'Push or update SIEM case data to a new incident in ServiceNow',
+ defaultMessage: 'URL',
}
);
-export const SERVICENOW_TITLE = i18n.translate(
- 'xpack.siem.case.connectors.servicenow.actionTypeTitle',
+export const API_URL_REQUIRED = i18n.translate(
+ 'xpack.siem.case.connectors.common.requiredApiUrlTextField',
{
- defaultMessage: 'ServiceNow',
+ defaultMessage: 'URL is required',
}
);
-export const SERVICENOW_API_URL_LABEL = i18n.translate(
- 'xpack.siem.case.connectors.servicenow.apiUrlTextFieldLabel',
+export const API_URL_INVALID = i18n.translate(
+ 'xpack.siem.case.connectors.common.invalidApiUrlTextField',
{
- defaultMessage: 'URL',
+ defaultMessage: 'URL is invalid',
}
);
-export const SERVICENOW_API_URL_REQUIRED = i18n.translate(
- 'xpack.siem.case.connectors.servicenow.requiredApiUrlTextField',
+export const USERNAME_LABEL = i18n.translate(
+ 'xpack.siem.case.connectors.common.usernameTextFieldLabel',
{
- defaultMessage: 'URL is required',
+ defaultMessage: 'Username',
}
);
-export const SERVICENOW_API_URL_INVALID = i18n.translate(
- 'xpack.siem.case.connectors.servicenow.invalidApiUrlTextField',
+export const USERNAME_REQUIRED = i18n.translate(
+ 'xpack.siem.case.connectors.common.requiredUsernameTextField',
{
- defaultMessage: 'URL is invalid',
+ defaultMessage: 'Username is required',
}
);
-export const SERVICENOW_USERNAME_LABEL = i18n.translate(
- 'xpack.siem.case.connectors.servicenow.usernameTextFieldLabel',
+export const PASSWORD_LABEL = i18n.translate(
+ 'xpack.siem.case.connectors.common.passwordTextFieldLabel',
{
- defaultMessage: 'Username',
+ defaultMessage: 'Password',
}
);
-export const SERVICENOW_USERNAME_REQUIRED = i18n.translate(
- 'xpack.siem.case.connectors.servicenow.requiredUsernameTextField',
+export const PASSWORD_REQUIRED = i18n.translate(
+ 'xpack.siem.case.connectors.common.requiredPasswordTextField',
{
- defaultMessage: 'Username is required',
+ defaultMessage: 'Password is required',
}
);
-export const SERVICENOW_PASSWORD_LABEL = i18n.translate(
- 'xpack.siem.case.connectors.servicenow.passwordTextFieldLabel',
+export const API_TOKEN_LABEL = i18n.translate(
+ 'xpack.siem.case.connectors.common.apiTokenTextFieldLabel',
{
- defaultMessage: 'Password',
+ defaultMessage: 'Api token',
}
);
-export const SERVICENOW_PASSWORD_REQUIRED = i18n.translate(
- 'xpack.siem.case.connectors.servicenow.requiredPasswordTextField',
+export const API_TOKEN_REQUIRED = i18n.translate(
+ 'xpack.siem.case.connectors.common.requiredApiTokenTextField',
{
- defaultMessage: 'Password is required',
+ defaultMessage: 'Api token is required',
+ }
+);
+
+export const EMAIL_LABEL = i18n.translate('xpack.siem.case.connectors.common.emailTextFieldLabel', {
+ defaultMessage: 'Email',
+});
+
+export const EMAIL_REQUIRED = i18n.translate(
+ 'xpack.siem.case.connectors.common.requiredEmailTextField',
+ {
+ defaultMessage: 'Email is required',
}
);
diff --git a/x-pack/plugins/siem/public/lib/connectors/types.ts b/x-pack/plugins/siem/public/lib/connectors/types.ts
index 2def4b5107aee..9af60f4995e54 100644
--- a/x-pack/plugins/siem/public/lib/connectors/types.ts
+++ b/x-pack/plugins/siem/public/lib/connectors/types.ts
@@ -7,17 +7,39 @@
/* eslint-disable no-restricted-imports */
/* eslint-disable @kbn/eslint/no-restricted-paths */
-import {
- ConfigType,
- SecretsType,
-} from '../../../../actions/server/builtin_action_types/servicenow/types';
-
-export interface ServiceNowActionConnector {
- config: ConfigType;
- secrets: SecretsType;
-}
+import { ActionType } from '../../../../triggers_actions_ui/public';
+import { ExternalIncidentServiceConfiguration } from '../../../../actions/server/builtin_action_types/case/types';
-export interface Connector {
- actionTypeId: string;
+export interface Connector extends ActionType {
logo: string;
}
+
+export interface ActionConnector {
+ config: ExternalIncidentServiceConfiguration;
+ secrets: {};
+}
+
+export interface ActionConnectorParams {
+ message: string;
+}
+
+export interface ActionConnectorValidationErrors {
+ apiUrl: string[];
+}
+
+export type Optional = Omit & Partial;
+
+export interface ConnectorFlyoutFormProps {
+ errors: { [key: string]: string[] };
+ action: T;
+ onChangeSecret: (key: string, value: string) => void;
+ onBlurSecret: (key: string) => void;
+ onChangeConfig: (key: string, value: string) => void;
+ onBlurConfig: (key: string) => void;
+}
+
+export interface ConnectorFlyoutHOCProps {
+ ConnectorFormComponent: React.FC>;
+ configKeys?: string[];
+ secretKeys?: string[];
+}
diff --git a/x-pack/plugins/siem/public/lib/connectors/utils.ts b/x-pack/plugins/siem/public/lib/connectors/utils.ts
new file mode 100644
index 0000000000000..5b5270ade5a65
--- /dev/null
+++ b/x-pack/plugins/siem/public/lib/connectors/utils.ts
@@ -0,0 +1,71 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import {
+ ActionTypeModel,
+ ValidationResult,
+ ActionParamsProps,
+ // eslint-disable-next-line @kbn/eslint/no-restricted-paths
+} from '../../../../triggers_actions_ui/public/types';
+
+import {
+ ActionConnector,
+ ActionConnectorParams,
+ ActionConnectorValidationErrors,
+ Optional,
+} from './types';
+import { isUrlInvalid } from './validators';
+
+import * as i18n from './translations';
+
+export const createActionType = ({
+ id,
+ actionTypeTitle,
+ selectMessage,
+ iconClass,
+ validateConnector,
+ validateParams = connectorParamsValidator,
+ actionConnectorFields,
+ actionParamsFields = ConnectorParamsFields,
+}: Optional) => (): ActionTypeModel => {
+ return {
+ id,
+ iconClass,
+ selectMessage,
+ actionTypeTitle,
+ validateConnector: (action: ActionConnector): ValidationResult => {
+ const errors: ActionConnectorValidationErrors = {
+ apiUrl: [],
+ };
+
+ if (!action.config.apiUrl) {
+ errors.apiUrl = [...errors.apiUrl, i18n.API_URL_REQUIRED];
+ }
+
+ if (isUrlInvalid(action.config.apiUrl)) {
+ errors.apiUrl = [...errors.apiUrl, i18n.API_URL_INVALID];
+ }
+
+ return { errors: { ...errors, ...validateConnector(action).errors } };
+ },
+ validateParams,
+ actionConnectorFields,
+ actionParamsFields,
+ };
+};
+
+const ConnectorParamsFields: React.FunctionComponent> = ({
+ actionParams,
+ editAction,
+ index,
+ errors,
+}) => {
+ return null;
+};
+
+const connectorParamsValidator = (actionParams: ActionConnectorParams): ValidationResult => {
+ return { errors: {} };
+};
diff --git a/x-pack/plugins/siem/public/pages/case/components/configure_cases/connectors_dropdown.tsx b/x-pack/plugins/siem/public/pages/case/components/configure_cases/connectors_dropdown.tsx
index 15066e73eee82..d5575f3bac4c8 100644
--- a/x-pack/plugins/siem/public/pages/case/components/configure_cases/connectors_dropdown.tsx
+++ b/x-pack/plugins/siem/public/pages/case/components/configure_cases/connectors_dropdown.tsx
@@ -9,7 +9,7 @@ import { EuiIcon, EuiSuperSelect } from '@elastic/eui';
import styled from 'styled-components';
import { Connector } from '../../../../containers/case/configure/types';
-import { connectors as connectorsDefinition } from '../../../../lib/connectors/config';
+import { connectorsConfiguration } from '../../../../lib/connectors/config';
import * as i18n from './translations';
export interface Props {
@@ -54,7 +54,7 @@ const ConnectorsDropdownComponent: React.FC = ({
inputDisplay: (
<>
{connector.name}
diff --git a/x-pack/plugins/siem/public/pages/case/components/configure_cases/index.test.tsx b/x-pack/plugins/siem/public/pages/case/components/configure_cases/index.test.tsx
index 545eceb0f73a1..fde179f3d25fc 100644
--- a/x-pack/plugins/siem/public/pages/case/components/configure_cases/index.test.tsx
+++ b/x-pack/plugins/siem/public/pages/case/components/configure_cases/index.test.tsx
@@ -186,6 +186,16 @@ describe('ConfigureCases', () => {
id: '.servicenow',
name: 'ServiceNow',
enabled: true,
+ logo: 'test-file-stub',
+ enabledInConfig: true,
+ enabledInLicense: true,
+ minimumLicenseRequired: 'platinum',
+ },
+ {
+ id: '.jira',
+ name: 'Jira',
+ logo: 'test-file-stub',
+ enabled: true,
enabledInConfig: true,
enabledInLicense: true,
minimumLicenseRequired: 'platinum',
diff --git a/x-pack/plugins/siem/public/pages/case/components/configure_cases/index.tsx b/x-pack/plugins/siem/public/pages/case/components/configure_cases/index.tsx
index a970fe895eb71..66eef9e3ec7bf 100644
--- a/x-pack/plugins/siem/public/pages/case/components/configure_cases/index.tsx
+++ b/x-pack/plugins/siem/public/pages/case/components/configure_cases/index.tsx
@@ -32,6 +32,8 @@ import { ActionConnectorTableItem } from '../../../../../../triggers_actions_ui/
import { getCaseUrl } from '../../../../components/link_to';
import { useGetUrlSearch } from '../../../../components/navigation/use_get_url_search';
import { CCMapsCombinedActionAttributes } from '../../../../containers/case/configure/types';
+import { connectorsConfiguration } from '../../../../lib/connectors/config';
+
import { Connectors } from '../configure_cases/connectors';
import { ClosureOptions } from '../configure_cases/closure_options';
import { Mapping } from '../configure_cases/mapping';
@@ -54,16 +56,7 @@ const FormWrapper = styled.div`
`}
`;
-const actionTypes: ActionType[] = [
- {
- id: '.servicenow',
- name: 'ServiceNow',
- enabled: true,
- enabledInConfig: true,
- enabledInLicense: true,
- minimumLicenseRequired: 'platinum',
- },
-];
+const actionTypes: ActionType[] = Object.values(connectorsConfiguration);
interface ConfigureCasesComponentProps {
userCanCrud: boolean;
diff --git a/x-pack/plugins/siem/public/plugin.tsx b/x-pack/plugins/siem/public/plugin.tsx
index f9c44bd341fac..2f2bd70569dcd 100644
--- a/x-pack/plugins/siem/public/plugin.tsx
+++ b/x-pack/plugins/siem/public/plugin.tsx
@@ -31,7 +31,7 @@ import { SecurityPluginSetup } from '../../security/public';
import { APP_ID, APP_NAME, APP_PATH, APP_ICON } from '../common/constants';
import { initTelemetry } from './lib/telemetry';
import { KibanaServices } from './lib/kibana/services';
-import { serviceNowActionType } from './lib/connectors';
+import { serviceNowActionType, jiraActionType } from './lib/connectors';
export interface SetupPlugins {
home: HomePublicPluginSetup;
@@ -84,6 +84,7 @@ export class Plugin implements IPlugin
getExternalServiceSimulatorPath(service)
);
+
allPaths.push(`/api/_${NAME}/${ExternalServiceSimulator.SERVICENOW}/api/now/v2/table/incident`);
+ allPaths.push(`/api/_${NAME}/${ExternalServiceSimulator.JIRA}/rest/api/2/issue`);
return allPaths;
}
@@ -78,9 +82,10 @@ export default function(kibana: any) {
});
initPagerduty(server, getExternalServiceSimulatorPath(ExternalServiceSimulator.PAGERDUTY));
- initServiceNow(server, getExternalServiceSimulatorPath(ExternalServiceSimulator.SERVICENOW));
initSlack(server, getExternalServiceSimulatorPath(ExternalServiceSimulator.SLACK));
initWebhook(server, getExternalServiceSimulatorPath(ExternalServiceSimulator.WEBHOOK));
+ initServiceNow(server, getExternalServiceSimulatorPath(ExternalServiceSimulator.SERVICENOW));
+ initJira(server, getExternalServiceSimulatorPath(ExternalServiceSimulator.JIRA));
},
});
}
diff --git a/x-pack/test/alerting_api_integration/common/fixtures/plugins/actions_simulators/jira_simulation.ts b/x-pack/test/alerting_api_integration/common/fixtures/plugins/actions_simulators/jira_simulation.ts
new file mode 100644
index 0000000000000..629d0197b2292
--- /dev/null
+++ b/x-pack/test/alerting_api_integration/common/fixtures/plugins/actions_simulators/jira_simulation.ts
@@ -0,0 +1,101 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import Hapi from 'hapi';
+
+interface JiraRequest extends Hapi.Request {
+ payload: {
+ summary: string;
+ description?: string;
+ comments?: string;
+ };
+}
+export function initPlugin(server: Hapi.Server, path: string) {
+ server.route({
+ method: 'POST',
+ path: `${path}/rest/api/2/issue`,
+ options: {
+ auth: false,
+ },
+ handler: createHandler as Hapi.Lifecycle.Method,
+ });
+
+ server.route({
+ method: 'PUT',
+ path: `${path}/rest/api/2/issue/{id}`,
+ options: {
+ auth: false,
+ },
+ handler: updateHandler as Hapi.Lifecycle.Method,
+ });
+
+ server.route({
+ method: 'GET',
+ path: `${path}/rest/api/2/issue/{id}`,
+ options: {
+ auth: false,
+ },
+ handler: getHandler as Hapi.Lifecycle.Method,
+ });
+
+ server.route({
+ method: 'POST',
+ path: `${path}/rest/api/2/issue/{id}/comment`,
+ options: {
+ auth: false,
+ },
+ handler: createCommentHanlder as Hapi.Lifecycle.Method,
+ });
+}
+
+// ServiceNow simulator: create a servicenow action pointing here, and you can get
+// different responses based on the message posted. See the README.md for
+// more info.
+function createHandler(request: JiraRequest, h: any) {
+ return jsonResponse(h, 200, {
+ id: '123',
+ key: 'CK-1',
+ created: '2020-04-27T14:17:45.490Z',
+ });
+}
+
+function updateHandler(request: JiraRequest, h: any) {
+ return jsonResponse(h, 200, {
+ id: '123',
+ key: 'CK-1',
+ created: '2020-04-27T14:17:45.490Z',
+ updated: '2020-04-27T14:17:45.490Z',
+ });
+}
+
+function getHandler(request: JiraRequest, h: any) {
+ return jsonResponse(h, 200, {
+ id: '123',
+ key: 'CK-1',
+ created: '2020-04-27T14:17:45.490Z',
+ updated: '2020-04-27T14:17:45.490Z',
+ summary: 'title',
+ description: 'description',
+ });
+}
+
+function createCommentHanlder(request: JiraRequest, h: any) {
+ return jsonResponse(h, 200, {
+ id: '123',
+ created: '2020-04-27T14:17:45.490Z',
+ });
+}
+
+function jsonResponse(h: any, code: number, object?: any) {
+ if (object == null) {
+ return h.response('').code(code);
+ }
+
+ return h
+ .response(JSON.stringify(object))
+ .type('application/json')
+ .code(code);
+}
diff --git a/x-pack/test/alerting_api_integration/common/fixtures/plugins/actions_simulators/servicenow_simulation.ts b/x-pack/test/alerting_api_integration/common/fixtures/plugins/actions_simulators/servicenow_simulation.ts
index a58738e387aeb..cc9521369a47d 100644
--- a/x-pack/test/alerting_api_integration/common/fixtures/plugins/actions_simulators/servicenow_simulation.ts
+++ b/x-pack/test/alerting_api_integration/common/fixtures/plugins/actions_simulators/servicenow_simulation.ts
@@ -4,7 +4,6 @@
* you may not use this file except in compliance with the Elastic License.
*/
-import Joi from 'joi';
import Hapi from 'hapi';
interface ServiceNowRequest extends Hapi.Request {
@@ -29,18 +28,13 @@ export function initPlugin(server: Hapi.Server, path: string) {
path: `${path}/api/now/v2/table/incident/{id}`,
options: {
auth: false,
- validate: {
- params: Joi.object({
- id: Joi.string(),
- }),
- },
},
handler: updateHandler as Hapi.Lifecycle.Method,
});
server.route({
method: 'GET',
- path: `${path}/api/now/v2/table/incident`,
+ path: `${path}/api/now/v2/table/incident/{id}`,
options: {
auth: false,
},
diff --git a/x-pack/test/alerting_api_integration/security_and_spaces/tests/actions/builtin_action_types/jira.ts b/x-pack/test/alerting_api_integration/security_and_spaces/tests/actions/builtin_action_types/jira.ts
new file mode 100644
index 0000000000000..ed63d25d86aca
--- /dev/null
+++ b/x-pack/test/alerting_api_integration/security_and_spaces/tests/actions/builtin_action_types/jira.ts
@@ -0,0 +1,549 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import expect from '@kbn/expect';
+
+import { FtrProviderContext } from '../../../../common/ftr_provider_context';
+
+import {
+ getExternalServiceSimulatorPath,
+ ExternalServiceSimulator,
+} from '../../../../common/fixtures/plugins/actions_simulators';
+
+const mapping = [
+ {
+ source: 'title',
+ target: 'summary',
+ actionType: 'overwrite',
+ },
+ {
+ source: 'description',
+ target: 'description',
+ actionType: 'overwrite',
+ },
+ {
+ source: 'comments',
+ target: 'comments',
+ actionType: 'append',
+ },
+];
+
+// eslint-disable-next-line import/no-default-export
+export default function jiraTest({ getService }: FtrProviderContext) {
+ const supertest = getService('supertest');
+ const esArchiver = getService('esArchiver');
+ const kibanaServer = getService('kibanaServer');
+
+ const mockJira = {
+ config: {
+ apiUrl: 'www.jiraisinkibanaactions.com',
+ projectKey: 'CK',
+ casesConfiguration: { mapping },
+ },
+ secrets: {
+ apiToken: 'elastic',
+ email: 'elastic@elastic.co',
+ },
+ params: {
+ subAction: 'pushToService',
+ subActionParams: {
+ caseId: '123',
+ title: 'a title',
+ description: 'a description',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: { fullName: 'Elastic User', username: 'elastic' },
+ updatedAt: null,
+ updatedBy: null,
+ externalId: null,
+ comments: [
+ {
+ commentId: '456',
+ version: 'WzU3LDFd',
+ comment: 'first comment',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: { fullName: 'Elastic User', username: 'elastic' },
+ updatedAt: null,
+ updatedBy: null,
+ },
+ ],
+ },
+ },
+ };
+
+ let jiraSimulatorURL: string = '';
+
+ describe('Jira', () => {
+ before(() => {
+ jiraSimulatorURL = kibanaServer.resolveUrl(
+ getExternalServiceSimulatorPath(ExternalServiceSimulator.JIRA)
+ );
+ });
+
+ after(() => esArchiver.unload('empty_kibana'));
+
+ describe('Jira - Action Creation', () => {
+ it('should return 200 when creating a jira action successfully', async () => {
+ const { body: createdAction } = await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A jira action',
+ actionTypeId: '.jira',
+ config: {
+ ...mockJira.config,
+ apiUrl: jiraSimulatorURL,
+ },
+ secrets: mockJira.secrets,
+ })
+ .expect(200);
+
+ expect(createdAction).to.eql({
+ id: createdAction.id,
+ isPreconfigured: false,
+ name: 'A jira action',
+ actionTypeId: '.jira',
+ config: {
+ apiUrl: jiraSimulatorURL,
+ projectKey: mockJira.config.projectKey,
+ casesConfiguration: mockJira.config.casesConfiguration,
+ },
+ });
+
+ const { body: fetchedAction } = await supertest
+ .get(`/api/action/${createdAction.id}`)
+ .expect(200);
+
+ expect(fetchedAction).to.eql({
+ id: fetchedAction.id,
+ isPreconfigured: false,
+ name: 'A jira action',
+ actionTypeId: '.jira',
+ config: {
+ apiUrl: jiraSimulatorURL,
+ projectKey: mockJira.config.projectKey,
+ casesConfiguration: mockJira.config.casesConfiguration,
+ },
+ });
+ });
+
+ it('should respond with a 400 Bad Request when creating a jira action with no apiUrl', async () => {
+ await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A jira action',
+ actionTypeId: '.jira',
+ config: { projectKey: 'CK' },
+ })
+ .expect(400)
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ statusCode: 400,
+ error: 'Bad Request',
+ message:
+ 'error validating action type config: [apiUrl]: expected value of type [string] but got [undefined]',
+ });
+ });
+ });
+
+ it('should respond with a 400 Bad Request when creating a jira action with no projectKey', async () => {
+ await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A jira action',
+ actionTypeId: '.jira',
+ config: { apiUrl: jiraSimulatorURL },
+ })
+ .expect(400)
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ statusCode: 400,
+ error: 'Bad Request',
+ message:
+ 'error validating action type config: [projectKey]: expected value of type [string] but got [undefined]',
+ });
+ });
+ });
+
+ it('should respond with a 400 Bad Request when creating a jira action with a non whitelisted apiUrl', async () => {
+ await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A jira action',
+ actionTypeId: '.jira',
+ config: {
+ apiUrl: 'http://jira.mynonexistent.com',
+ projectKey: mockJira.config.projectKey,
+ casesConfiguration: mockJira.config.casesConfiguration,
+ },
+ secrets: mockJira.secrets,
+ })
+ .expect(400)
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ statusCode: 400,
+ error: 'Bad Request',
+ message:
+ 'error validating action type config: error configuring connector action: target url "http://jira.mynonexistent.com" is not whitelisted in the Kibana config xpack.actions.whitelistedHosts',
+ });
+ });
+ });
+
+ it('should respond with a 400 Bad Request when creating a jira action without secrets', async () => {
+ await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A jira action',
+ actionTypeId: '.jira',
+ config: {
+ apiUrl: jiraSimulatorURL,
+ projectKey: mockJira.config.projectKey,
+ casesConfiguration: mockJira.config.casesConfiguration,
+ },
+ })
+ .expect(400)
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ statusCode: 400,
+ error: 'Bad Request',
+ message:
+ 'error validating action type secrets: [email]: expected value of type [string] but got [undefined]',
+ });
+ });
+ });
+
+ it('should respond with a 400 Bad Request when creating a jira action without casesConfiguration', async () => {
+ await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A jira action',
+ actionTypeId: '.jira',
+ config: {
+ apiUrl: jiraSimulatorURL,
+ projectKey: mockJira.config.projectKey,
+ },
+ secrets: mockJira.secrets,
+ })
+ .expect(400)
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ statusCode: 400,
+ error: 'Bad Request',
+ message:
+ 'error validating action type config: [casesConfiguration.mapping]: expected value of type [array] but got [undefined]',
+ });
+ });
+ });
+
+ it('should respond with a 400 Bad Request when creating a jira action with empty mapping', async () => {
+ await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A jira action',
+ actionTypeId: '.jira',
+ config: {
+ apiUrl: jiraSimulatorURL,
+ projectKey: mockJira.config.projectKey,
+ casesConfiguration: { mapping: [] },
+ },
+ secrets: mockJira.secrets,
+ })
+ .expect(400)
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ statusCode: 400,
+ error: 'Bad Request',
+ message:
+ 'error validating action type config: [casesConfiguration.mapping]: expected non-empty but got empty',
+ });
+ });
+ });
+
+ it('should respond with a 400 Bad Request when creating a jira action with wrong actionType', async () => {
+ await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A jira action',
+ actionTypeId: '.jira',
+ config: {
+ apiUrl: jiraSimulatorURL,
+ projectKey: mockJira.config.projectKey,
+ casesConfiguration: {
+ mapping: [
+ {
+ source: 'title',
+ target: 'description',
+ actionType: 'non-supported',
+ },
+ ],
+ },
+ },
+ secrets: mockJira.secrets,
+ })
+ .expect(400);
+ });
+ });
+
+ describe('Jira - Executor', () => {
+ let simulatedActionId: string;
+ before(async () => {
+ const { body } = await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A jira simulator',
+ actionTypeId: '.jira',
+ config: {
+ apiUrl: jiraSimulatorURL,
+ projectKey: mockJira.config.projectKey,
+ casesConfiguration: mockJira.config.casesConfiguration,
+ },
+ secrets: mockJira.secrets,
+ });
+ simulatedActionId = body.id;
+ });
+
+ describe('Validation', () => {
+ it('should handle failing with a simulated success without action', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {},
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message: `error validating action params: Cannot read property 'Symbol(Symbol.iterator)' of undefined`,
+ });
+ });
+ });
+
+ it('should handle failing with a simulated success without unsupported action', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: { subAction: 'non-supported' },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subAction]: expected value to equal [pushToService]',
+ });
+ });
+ });
+
+ it('should handle failing with a simulated success without subActionParams', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: { subAction: 'pushToService' },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.caseId]: expected value of type [string] but got [undefined]',
+ });
+ });
+ });
+
+ it('should handle failing with a simulated success without caseId', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: { subAction: 'pushToService', subActionParams: {} },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.caseId]: expected value of type [string] but got [undefined]',
+ });
+ });
+ });
+
+ it('should handle failing with a simulated success without title', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {
+ ...mockJira.params,
+ subActionParams: {
+ caseId: 'success',
+ },
+ },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.title]: expected value of type [string] but got [undefined]',
+ });
+ });
+ });
+
+ it('should handle failing with a simulated success without createdAt', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {
+ ...mockJira.params,
+ subActionParams: {
+ caseId: 'success',
+ title: 'success',
+ },
+ },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.createdAt]: expected value of type [string] but got [undefined]',
+ });
+ });
+ });
+
+ it('should handle failing with a simulated success without commentId', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {
+ ...mockJira.params,
+ subActionParams: {
+ ...mockJira.params.subActionParams,
+ caseId: 'success',
+ title: 'success',
+ createdAt: 'success',
+ createdBy: { username: 'elastic' },
+ comments: [{}],
+ },
+ },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.comments]: types that failed validation:\n - [subActionParams.comments.0.0.commentId]: expected value of type [string] but got [undefined]\n - [subActionParams.comments.1]: expected value to equal [null]',
+ });
+ });
+ });
+
+ it('should handle failing with a simulated success without comment message', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {
+ ...mockJira.params,
+ subActionParams: {
+ ...mockJira.params.subActionParams,
+ caseId: 'success',
+ title: 'success',
+ createdAt: 'success',
+ createdBy: { username: 'elastic' },
+ comments: [{ commentId: 'success' }],
+ },
+ },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.comments]: types that failed validation:\n - [subActionParams.comments.0.0.comment]: expected value of type [string] but got [undefined]\n - [subActionParams.comments.1]: expected value to equal [null]',
+ });
+ });
+ });
+
+ it('should handle failing with a simulated success without comment.createdAt', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {
+ ...mockJira.params,
+ subActionParams: {
+ ...mockJira.params.subActionParams,
+ caseId: 'success',
+ title: 'success',
+ createdAt: 'success',
+ createdBy: { username: 'elastic' },
+ comments: [{ commentId: 'success', comment: 'success' }],
+ },
+ },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.comments]: types that failed validation:\n - [subActionParams.comments.0.0.createdAt]: expected value of type [string] but got [undefined]\n - [subActionParams.comments.1]: expected value to equal [null]',
+ });
+ });
+ });
+ });
+
+ describe('Execution', () => {
+ it('should handle creating an incident without comments', async () => {
+ const { body } = await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {
+ ...mockJira.params,
+ subActionParams: {
+ ...mockJira.params.subActionParams,
+ comments: [],
+ },
+ },
+ })
+ .expect(200);
+
+ expect(body).to.eql({
+ status: 'ok',
+ actionId: simulatedActionId,
+ data: {
+ id: '123',
+ title: 'CK-1',
+ pushedDate: '2020-04-27T14:17:45.490Z',
+ url: `${jiraSimulatorURL}/browse/CK-1`,
+ },
+ });
+ });
+ });
+ });
+ });
+}
diff --git a/x-pack/test/alerting_api_integration/security_and_spaces/tests/actions/builtin_action_types/servicenow.ts b/x-pack/test/alerting_api_integration/security_and_spaces/tests/actions/builtin_action_types/servicenow.ts
index 399ae0f27f5b1..04cd06999f432 100644
--- a/x-pack/test/alerting_api_integration/security_and_spaces/tests/actions/builtin_action_types/servicenow.ts
+++ b/x-pack/test/alerting_api_integration/security_and_spaces/tests/actions/builtin_action_types/servicenow.ts
@@ -13,8 +13,6 @@ import {
ExternalServiceSimulator,
} from '../../../../common/fixtures/plugins/actions_simulators';
-// node ../scripts/functional_test_runner.js --grep "servicenow" --config=test/alerting_api_integration/security_and_spaces/config.ts
-
const mapping = [
{
source: 'title',
@@ -24,7 +22,7 @@ const mapping = [
{
source: 'description',
target: 'description',
- actionType: 'append',
+ actionType: 'overwrite',
},
{
source: 'comments',
@@ -42,40 +40,41 @@ export default function servicenowTest({ getService }: FtrProviderContext) {
const mockServiceNow = {
config: {
apiUrl: 'www.servicenowisinkibanaactions.com',
- casesConfiguration: { mapping: [...mapping] },
+ casesConfiguration: { mapping },
},
secrets: {
password: 'elastic',
username: 'changeme',
},
params: {
- caseId: '123',
- title: 'a title',
- description: 'a description',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: { fullName: 'Elastic User', username: 'elastic' },
- updatedAt: null,
- updatedBy: null,
- incidentId: null,
- comments: [
- {
- commentId: '456',
- version: 'WzU3LDFd',
- comment: 'first comment',
- createdAt: '2020-03-13T08:34:53.450Z',
- createdBy: { fullName: 'Elastic User', username: 'elastic' },
- updatedAt: null,
- updatedBy: null,
- },
- ],
+ subAction: 'pushToService',
+ subActionParams: {
+ caseId: '123',
+ title: 'a title',
+ description: 'a description',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: { fullName: 'Elastic User', username: 'elastic' },
+ updatedAt: null,
+ updatedBy: null,
+ externalId: null,
+ comments: [
+ {
+ commentId: '456',
+ version: 'WzU3LDFd',
+ comment: 'first comment',
+ createdAt: '2020-03-13T08:34:53.450Z',
+ createdBy: { fullName: 'Elastic User', username: 'elastic' },
+ updatedAt: null,
+ updatedBy: null,
+ },
+ ],
+ },
},
};
- describe('servicenow', () => {
- let simulatedActionId = '';
- let servicenowSimulatorURL: string = '';
+ let servicenowSimulatorURL: string = '';
- // need to wait for kibanaServer to settle ...
+ describe('ServiceNow', () => {
before(() => {
servicenowSimulatorURL = kibanaServer.resolveUrl(
getExternalServiceSimulatorPath(ExternalServiceSimulator.SERVICENOW)
@@ -84,351 +83,438 @@ export default function servicenowTest({ getService }: FtrProviderContext) {
after(() => esArchiver.unload('empty_kibana'));
- it('should return 200 when creating a servicenow action successfully', async () => {
- const { body: createdAction } = await supertest
- .post('/api/action')
- .set('kbn-xsrf', 'foo')
- .send({
+ describe('ServiceNow - Action Creation', () => {
+ it('should return 200 when creating a servicenow action successfully', async () => {
+ const { body: createdAction } = await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A servicenow action',
+ actionTypeId: '.servicenow',
+ config: {
+ apiUrl: servicenowSimulatorURL,
+ casesConfiguration: mockServiceNow.config.casesConfiguration,
+ },
+ secrets: mockServiceNow.secrets,
+ })
+ .expect(200);
+
+ expect(createdAction).to.eql({
+ id: createdAction.id,
+ isPreconfigured: false,
name: 'A servicenow action',
actionTypeId: '.servicenow',
config: {
apiUrl: servicenowSimulatorURL,
- casesConfiguration: { ...mockServiceNow.config.casesConfiguration },
+ casesConfiguration: mockServiceNow.config.casesConfiguration,
},
- secrets: { ...mockServiceNow.secrets },
- })
- .expect(200);
-
- expect(createdAction).to.eql({
- id: createdAction.id,
- isPreconfigured: false,
- name: 'A servicenow action',
- actionTypeId: '.servicenow',
- config: {
- apiUrl: servicenowSimulatorURL,
- casesConfiguration: { ...mockServiceNow.config.casesConfiguration },
- },
- });
-
- expect(typeof createdAction.id).to.be('string');
-
- const { body: fetchedAction } = await supertest
- .get(`/api/action/${createdAction.id}`)
- .expect(200);
-
- expect(fetchedAction).to.eql({
- id: fetchedAction.id,
- isPreconfigured: false,
- name: 'A servicenow action',
- actionTypeId: '.servicenow',
- config: {
- apiUrl: servicenowSimulatorURL,
- casesConfiguration: { ...mockServiceNow.config.casesConfiguration },
- },
- });
- });
-
- it('should respond with a 400 Bad Request when creating a servicenow action with no apiUrl', async () => {
- await supertest
- .post('/api/action')
- .set('kbn-xsrf', 'foo')
- .send({
- name: 'A servicenow action',
- actionTypeId: '.servicenow',
- config: {},
- })
- .expect(400)
- .then((resp: any) => {
- expect(resp.body).to.eql({
- statusCode: 400,
- error: 'Bad Request',
- message:
- 'error validating action type config: [apiUrl]: expected value of type [string] but got [undefined]',
- });
});
- });
- it('should respond with a 400 Bad Request when creating a servicenow action with a non whitelisted apiUrl', async () => {
- await supertest
- .post('/api/action')
- .set('kbn-xsrf', 'foo')
- .send({
- name: 'A servicenow action',
- actionTypeId: '.servicenow',
- config: {
- apiUrl: 'http://servicenow.mynonexistent.com',
- casesConfiguration: { ...mockServiceNow.config.casesConfiguration },
- },
- secrets: { ...mockServiceNow.secrets },
- })
- .expect(400)
- .then((resp: any) => {
- expect(resp.body).to.eql({
- statusCode: 400,
- error: 'Bad Request',
- message:
- 'error validating action type config: error configuring servicenow action: target url "http://servicenow.mynonexistent.com" is not whitelisted in the Kibana config xpack.actions.whitelistedHosts',
- });
- });
- });
+ const { body: fetchedAction } = await supertest
+ .get(`/api/action/${createdAction.id}`)
+ .expect(200);
- it('should respond with a 400 Bad Request when creating a servicenow action without secrets', async () => {
- await supertest
- .post('/api/action')
- .set('kbn-xsrf', 'foo')
- .send({
+ expect(fetchedAction).to.eql({
+ id: fetchedAction.id,
+ isPreconfigured: false,
name: 'A servicenow action',
actionTypeId: '.servicenow',
config: {
apiUrl: servicenowSimulatorURL,
- casesConfiguration: { ...mockServiceNow.config.casesConfiguration },
+ casesConfiguration: mockServiceNow.config.casesConfiguration,
},
- })
- .expect(400)
- .then((resp: any) => {
- expect(resp.body).to.eql({
- statusCode: 400,
- error: 'Bad Request',
- message:
- 'error validating action type secrets: [password]: expected value of type [string] but got [undefined]',
- });
});
- });
+ });
- it('should respond with a 400 Bad Request when creating a servicenow action without casesConfiguration', async () => {
- await supertest
- .post('/api/action')
- .set('kbn-xsrf', 'foo')
- .send({
- name: 'A servicenow action',
- actionTypeId: '.servicenow',
- config: {
- apiUrl: servicenowSimulatorURL,
- },
- secrets: { ...mockServiceNow.secrets },
- })
- .expect(400)
- .then((resp: any) => {
- expect(resp.body).to.eql({
- statusCode: 400,
- error: 'Bad Request',
- message:
- 'error validating action type config: [casesConfiguration.mapping]: expected value of type [array] but got [undefined]',
+ it('should respond with a 400 Bad Request when creating a servicenow action with no apiUrl', async () => {
+ await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A servicenow action',
+ actionTypeId: '.servicenow',
+ config: {},
+ })
+ .expect(400)
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ statusCode: 400,
+ error: 'Bad Request',
+ message:
+ 'error validating action type config: [apiUrl]: expected value of type [string] but got [undefined]',
+ });
});
- });
- });
+ });
- it('should respond with a 400 Bad Request when creating a servicenow action with empty mapping', async () => {
- await supertest
- .post('/api/action')
- .set('kbn-xsrf', 'foo')
- .send({
- name: 'A servicenow action',
- actionTypeId: '.servicenow',
- config: {
- apiUrl: servicenowSimulatorURL,
- casesConfiguration: { mapping: [] },
- },
- secrets: { ...mockServiceNow.secrets },
- })
- .expect(400)
- .then((resp: any) => {
- expect(resp.body).to.eql({
- statusCode: 400,
- error: 'Bad Request',
- message:
- 'error validating action type config: [casesConfiguration.mapping]: expected non-empty but got empty',
+ it('should respond with a 400 Bad Request when creating a servicenow action with a non whitelisted apiUrl', async () => {
+ await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A servicenow action',
+ actionTypeId: '.servicenow',
+ config: {
+ apiUrl: 'http://servicenow.mynonexistent.com',
+ casesConfiguration: mockServiceNow.config.casesConfiguration,
+ },
+ secrets: mockServiceNow.secrets,
+ })
+ .expect(400)
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ statusCode: 400,
+ error: 'Bad Request',
+ message:
+ 'error validating action type config: error configuring connector action: target url "http://servicenow.mynonexistent.com" is not whitelisted in the Kibana config xpack.actions.whitelistedHosts',
+ });
});
- });
- });
+ });
- it('should respond with a 400 Bad Request when creating a servicenow action with wrong actionType', async () => {
- await supertest
- .post('/api/action')
- .set('kbn-xsrf', 'foo')
- .send({
- name: 'A servicenow action',
- actionTypeId: '.servicenow',
- config: {
- apiUrl: servicenowSimulatorURL,
- casesConfiguration: {
- mapping: [
- {
- source: 'title',
- target: 'description',
- actionType: 'non-supported',
- },
- ],
+ it('should respond with a 400 Bad Request when creating a servicenow action without secrets', async () => {
+ await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A servicenow action',
+ actionTypeId: '.servicenow',
+ config: {
+ apiUrl: servicenowSimulatorURL,
+ casesConfiguration: mockServiceNow.config.casesConfiguration,
},
- },
- secrets: { ...mockServiceNow.secrets },
- })
- .expect(400);
- });
-
- it('should create our servicenow simulator action successfully', async () => {
- const { body: createdSimulatedAction } = await supertest
- .post('/api/action')
- .set('kbn-xsrf', 'foo')
- .send({
- name: 'A servicenow simulator',
- actionTypeId: '.servicenow',
- config: {
- apiUrl: servicenowSimulatorURL,
- casesConfiguration: { ...mockServiceNow.config.casesConfiguration },
- },
- secrets: { ...mockServiceNow.secrets },
- })
- .expect(200);
+ })
+ .expect(400)
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ statusCode: 400,
+ error: 'Bad Request',
+ message:
+ 'error validating action type secrets: [password]: expected value of type [string] but got [undefined]',
+ });
+ });
+ });
- simulatedActionId = createdSimulatedAction.id;
- });
+ it('should respond with a 400 Bad Request when creating a servicenow action without casesConfiguration', async () => {
+ await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A servicenow action',
+ actionTypeId: '.servicenow',
+ config: {
+ apiUrl: servicenowSimulatorURL,
+ },
+ secrets: mockServiceNow.secrets,
+ })
+ .expect(400)
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ statusCode: 400,
+ error: 'Bad Request',
+ message:
+ 'error validating action type config: [casesConfiguration.mapping]: expected value of type [array] but got [undefined]',
+ });
+ });
+ });
- it('should handle executing with a simulated success', async () => {
- const { body: result } = await supertest
- .post(`/api/action/${simulatedActionId}/_execute`)
- .set('kbn-xsrf', 'foo')
- .send({
- params: { ...mockServiceNow.params, title: 'success', comments: [] },
- })
- .expect(200);
+ it('should respond with a 400 Bad Request when creating a servicenow action with empty mapping', async () => {
+ await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A servicenow action',
+ actionTypeId: '.servicenow',
+ config: {
+ apiUrl: servicenowSimulatorURL,
+ casesConfiguration: { mapping: [] },
+ },
+ secrets: mockServiceNow.secrets,
+ })
+ .expect(400)
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ statusCode: 400,
+ error: 'Bad Request',
+ message:
+ 'error validating action type config: [casesConfiguration.mapping]: expected non-empty but got empty',
+ });
+ });
+ });
- expect(result).to.eql({
- status: 'ok',
- actionId: simulatedActionId,
- data: {
- incidentId: '123',
- number: 'INC01',
- pushedDate: '2020-03-10T12:24:20.000Z',
- url: `${servicenowSimulatorURL}/nav_to.do?uri=incident.do?sys_id=123`,
- },
+ it('should respond with a 400 Bad Request when creating a servicenow action with wrong actionType', async () => {
+ await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A servicenow action',
+ actionTypeId: '.servicenow',
+ config: {
+ apiUrl: servicenowSimulatorURL,
+ casesConfiguration: {
+ mapping: [
+ {
+ source: 'title',
+ target: 'description',
+ actionType: 'non-supported',
+ },
+ ],
+ },
+ },
+ secrets: mockServiceNow.secrets,
+ })
+ .expect(400);
});
});
- it('should handle failing with a simulated success without caseId', async () => {
- await supertest
- .post(`/api/action/${simulatedActionId}/_execute`)
- .set('kbn-xsrf', 'foo')
- .send({
- params: {},
- })
- .then((resp: any) => {
- expect(resp.body).to.eql({
- actionId: simulatedActionId,
- status: 'error',
- retry: false,
- message:
- 'error validating action params: [caseId]: expected value of type [string] but got [undefined]',
+ describe('ServiceNow - Executor', () => {
+ let simulatedActionId: string;
+ before(async () => {
+ const { body } = await supertest
+ .post('/api/action')
+ .set('kbn-xsrf', 'foo')
+ .send({
+ name: 'A servicenow simulator',
+ actionTypeId: '.servicenow',
+ config: {
+ apiUrl: servicenowSimulatorURL,
+ casesConfiguration: mockServiceNow.config.casesConfiguration,
+ },
+ secrets: mockServiceNow.secrets,
});
+ simulatedActionId = body.id;
+ });
+
+ describe('Validation', () => {
+ it('should handle failing with a simulated success without action', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {},
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message: `error validating action params: Cannot read property 'Symbol(Symbol.iterator)' of undefined`,
+ });
+ });
});
- });
- it('should handle failing with a simulated success without title', async () => {
- await supertest
- .post(`/api/action/${simulatedActionId}/_execute`)
- .set('kbn-xsrf', 'foo')
- .send({
- params: { caseId: 'success' },
- })
- .then((resp: any) => {
- expect(resp.body).to.eql({
- actionId: simulatedActionId,
- status: 'error',
- retry: false,
- message:
- 'error validating action params: [title]: expected value of type [string] but got [undefined]',
- });
+ it('should handle failing with a simulated success without unsupported action', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: { subAction: 'non-supported' },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subAction]: expected value to equal [pushToService]',
+ });
+ });
});
- });
- it('should handle failing with a simulated success without createdAt', async () => {
- await supertest
- .post(`/api/action/${simulatedActionId}/_execute`)
- .set('kbn-xsrf', 'foo')
- .send({
- params: { caseId: 'success', title: 'success' },
- })
- .then((resp: any) => {
- expect(resp.body).to.eql({
- actionId: simulatedActionId,
- status: 'error',
- retry: false,
- message:
- 'error validating action params: [createdAt]: expected value of type [string] but got [undefined]',
- });
+ it('should handle failing with a simulated success without subActionParams', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: { subAction: 'pushToService' },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.caseId]: expected value of type [string] but got [undefined]',
+ });
+ });
});
- });
- it('should handle failing with a simulated success without commentId', async () => {
- await supertest
- .post(`/api/action/${simulatedActionId}/_execute`)
- .set('kbn-xsrf', 'foo')
- .send({
- params: {
- caseId: 'success',
- title: 'success',
- createdAt: 'success',
- createdBy: { username: 'elastic' },
- comments: [{}],
- },
- })
- .then((resp: any) => {
- expect(resp.body).to.eql({
- actionId: simulatedActionId,
- status: 'error',
- retry: false,
- message:
- 'error validating action params: [comments.0.commentId]: expected value of type [string] but got [undefined]',
- });
+ it('should handle failing with a simulated success without caseId', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: { subAction: 'pushToService', subActionParams: {} },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.caseId]: expected value of type [string] but got [undefined]',
+ });
+ });
});
- });
- it('should handle failing with a simulated success without comment message', async () => {
- await supertest
- .post(`/api/action/${simulatedActionId}/_execute`)
- .set('kbn-xsrf', 'foo')
- .send({
- params: {
- caseId: 'success',
- title: 'success',
- createdAt: 'success',
- createdBy: { username: 'elastic' },
- comments: [{ commentId: 'success' }],
- },
- })
- .then((resp: any) => {
- expect(resp.body).to.eql({
- actionId: simulatedActionId,
- status: 'error',
- retry: false,
- message:
- 'error validating action params: [comments.0.comment]: expected value of type [string] but got [undefined]',
- });
+ it('should handle failing with a simulated success without title', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {
+ ...mockServiceNow.params,
+ subActionParams: {
+ caseId: 'success',
+ },
+ },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.title]: expected value of type [string] but got [undefined]',
+ });
+ });
});
- });
- it('should handle failing with a simulated success without comment.createdAt', async () => {
- await supertest
- .post(`/api/action/${simulatedActionId}/_execute`)
- .set('kbn-xsrf', 'foo')
- .send({
- params: {
- caseId: 'success',
- title: 'success',
- createdAt: 'success',
- createdBy: { username: 'elastic' },
- comments: [{ commentId: 'success', comment: 'success' }],
- },
- })
- .then((resp: any) => {
- expect(resp.body).to.eql({
+ it('should handle failing with a simulated success without createdAt', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {
+ ...mockServiceNow.params,
+ subActionParams: {
+ caseId: 'success',
+ title: 'success',
+ },
+ },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.createdAt]: expected value of type [string] but got [undefined]',
+ });
+ });
+ });
+
+ it('should handle failing with a simulated success without commentId', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {
+ ...mockServiceNow.params,
+ subActionParams: {
+ ...mockServiceNow.params.subActionParams,
+ caseId: 'success',
+ title: 'success',
+ createdAt: 'success',
+ createdBy: { username: 'elastic' },
+ comments: [{}],
+ },
+ },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.comments]: types that failed validation:\n - [subActionParams.comments.0.0.commentId]: expected value of type [string] but got [undefined]\n - [subActionParams.comments.1]: expected value to equal [null]',
+ });
+ });
+ });
+
+ it('should handle failing with a simulated success without comment message', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {
+ ...mockServiceNow.params,
+ subActionParams: {
+ ...mockServiceNow.params.subActionParams,
+ caseId: 'success',
+ title: 'success',
+ createdAt: 'success',
+ createdBy: { username: 'elastic' },
+ comments: [{ commentId: 'success' }],
+ },
+ },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.comments]: types that failed validation:\n - [subActionParams.comments.0.0.comment]: expected value of type [string] but got [undefined]\n - [subActionParams.comments.1]: expected value to equal [null]',
+ });
+ });
+ });
+
+ it('should handle failing with a simulated success without comment.createdAt', async () => {
+ await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {
+ ...mockServiceNow.params,
+ subActionParams: {
+ ...mockServiceNow.params.subActionParams,
+ caseId: 'success',
+ title: 'success',
+ createdAt: 'success',
+ createdBy: { username: 'elastic' },
+ comments: [{ commentId: 'success', comment: 'success' }],
+ },
+ },
+ })
+ .then((resp: any) => {
+ expect(resp.body).to.eql({
+ actionId: simulatedActionId,
+ status: 'error',
+ retry: false,
+ message:
+ 'error validating action params: types that failed validation:\n- [0.subAction]: expected value to equal [getIncident]\n- [1.subAction]: expected value to equal [handshake]\n- [2.subActionParams.comments]: types that failed validation:\n - [subActionParams.comments.0.0.createdAt]: expected value of type [string] but got [undefined]\n - [subActionParams.comments.1]: expected value to equal [null]',
+ });
+ });
+ });
+ });
+
+ describe('Execution', () => {
+ it('should handle creating an incident without comments', async () => {
+ const { body: result } = await supertest
+ .post(`/api/action/${simulatedActionId}/_execute`)
+ .set('kbn-xsrf', 'foo')
+ .send({
+ params: {
+ ...mockServiceNow.params,
+ subActionParams: {
+ ...mockServiceNow.params.subActionParams,
+ comments: [],
+ },
+ },
+ })
+ .expect(200);
+
+ expect(result).to.eql({
+ status: 'ok',
actionId: simulatedActionId,
- status: 'error',
- retry: false,
- message:
- 'error validating action params: [comments.0.createdAt]: expected value of type [string] but got [undefined]',
+ data: {
+ id: '123',
+ title: 'INC01',
+ pushedDate: '2020-03-10T12:24:20.000Z',
+ url: `${servicenowSimulatorURL}/nav_to.do?uri=incident.do?sys_id=123`,
+ },
});
});
+ });
});
});
}
diff --git a/x-pack/test/alerting_api_integration/security_and_spaces/tests/actions/index.ts b/x-pack/test/alerting_api_integration/security_and_spaces/tests/actions/index.ts
index 8e002bcc8d3da..18b1714582d13 100644
--- a/x-pack/test/alerting_api_integration/security_and_spaces/tests/actions/index.ts
+++ b/x-pack/test/alerting_api_integration/security_and_spaces/tests/actions/index.ts
@@ -15,6 +15,7 @@ export default function actionsTests({ loadTestFile }: FtrProviderContext) {
loadTestFile(require.resolve('./builtin_action_types/pagerduty'));
loadTestFile(require.resolve('./builtin_action_types/server_log'));
loadTestFile(require.resolve('./builtin_action_types/servicenow'));
+ loadTestFile(require.resolve('./builtin_action_types/jira'));
loadTestFile(require.resolve('./builtin_action_types/slack'));
loadTestFile(require.resolve('./builtin_action_types/webhook'));
loadTestFile(require.resolve('./create'));