$reasonCode->value, ExecutionDenialReasonCode::cases(), ); if ($candidate === '') { return ProviderReasonCodes::UnknownError; } if (ProviderReasonCodes::isKnown($candidate) || in_array($candidate, ['ok', 'not_applicable'], true) || in_array($candidate, $executionDenialReasonCodes, true)) { return $candidate; } if (str_starts_with($candidate, 'ext.')) { return $candidate; } /** * Appendix-A taxonomy mappings: * - `graph_throttled`/`throttled` -> `rate_limited` * - transport/transient/outage classes -> `network_unreachable` * - auth failures -> `provider_auth_failed` * - permission denied classes -> `provider_permission_denied` * - generic missing/invalid configuration classes -> `provider_connection_*` */ // Compatibility mappings from existing codebase labels. $candidate = match ($candidate) { self::REASON_GRAPH_THROTTLED, 'throttled' => ProviderReasonCodes::RateLimited, self::REASON_GRAPH_TIMEOUT, self::REASON_PROVIDER_OUTAGE, 'graph_transient', 'dependency_unreachable' => ProviderReasonCodes::NetworkUnreachable, self::REASON_PERMISSION_DENIED, 'graph_forbidden', 'permission_denied' => ProviderReasonCodes::ProviderPermissionDenied, self::REASON_PROVIDER_AUTH_FAILED, 'authentication_failed' => ProviderReasonCodes::ProviderAuthFailed, self::REASON_VALIDATION_ERROR, self::REASON_CONFLICT_DETECTED, 'invalid_state' => ProviderReasonCodes::ProviderConnectionInvalid, 'missing_configuration' => ProviderReasonCodes::ProviderConnectionMissing, 'unknown', self::REASON_UNKNOWN_ERROR => ProviderReasonCodes::UnknownError, default => $candidate, }; if (ProviderReasonCodes::isKnown($candidate) || in_array($candidate, ['ok', 'not_applicable'], true) || in_array($candidate, $executionDenialReasonCodes, true)) { return $candidate; } // Heuristic normalization for ad-hoc codes used across jobs/services. if (str_contains($candidate, 'throttle') || str_contains($candidate, '429')) { return ProviderReasonCodes::RateLimited; } if (str_contains($candidate, 'invalid_client') || str_contains($candidate, 'invalid_grant') || str_contains($candidate, '401') || str_contains($candidate, 'aadsts')) { return ProviderReasonCodes::ProviderAuthFailed; } if (str_contains($candidate, 'timeout') || str_contains($candidate, 'transient') || str_contains($candidate, '503') || str_contains($candidate, '504')) { return ProviderReasonCodes::NetworkUnreachable; } if (str_contains($candidate, 'outage') || str_contains($candidate, '500') || str_contains($candidate, '502') || str_contains($candidate, 'bad_gateway')) { return ProviderReasonCodes::NetworkUnreachable; } if (str_contains($candidate, 'forbidden') || str_contains($candidate, 'permission') || str_contains($candidate, 'unauthorized') || str_contains($candidate, '403')) { return ProviderReasonCodes::ProviderPermissionDenied; } if (str_contains($candidate, 'validation') || str_contains($candidate, 'not_found') || str_contains($candidate, 'bad_request') || str_contains($candidate, '400') || str_contains($candidate, '422')) { return ProviderReasonCodes::ProviderConnectionInvalid; } if (str_contains($candidate, 'conflict') || str_contains($candidate, '409')) { return ProviderReasonCodes::ProviderConnectionInvalid; } return ProviderReasonCodes::UnknownError; } public static function sanitizeMessage(string $message): string { $message = trim(str_replace(["\r", "\n"], ' ', $message)); $message = self::classifier()->sanitizeOpsFailureString($message); $message = preg_replace('/\b[A-Za-z0-9\-\._~\+\/]{64,}\b/', '[REDACTED]', $message) ?? $message; $message = preg_replace('/\b(access_token|refresh_token|client_secret|password)\b\s*=\s*\[REDACTED_SECRET\]/i', '[REDACTED_SECRET]', $message) ?? $message; $message = preg_replace('/"(access_token|refresh_token|client_secret|password)"\s*:\s*"\[REDACTED_SECRET\]"/i', '"[REDACTED_SECRET]"', $message) ?? $message; return substr($message, 0, 120); } private static function classifier(): SecretClassificationService { return app(SecretClassificationService::class); } }