2021-03-31 15:00:56 -05:00
|
|
|
package api
|
|
|
|
|
|
|
|
import (
|
2021-08-17 07:49:05 -05:00
|
|
|
"context"
|
2021-03-31 15:00:56 -05:00
|
|
|
"errors"
|
2021-05-14 13:49:54 -05:00
|
|
|
"fmt"
|
2021-03-31 15:00:56 -05:00
|
|
|
"net/http"
|
2021-08-17 07:49:05 -05:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"time"
|
2021-03-31 15:00:56 -05:00
|
|
|
|
2022-04-27 02:55:47 -05:00
|
|
|
"github.com/go-openapi/strfmt"
|
2023-02-03 10:36:49 -06:00
|
|
|
alertingNotify "github.com/grafana/alerting/notify"
|
2022-10-17 14:43:37 -05:00
|
|
|
|
2021-03-31 15:00:56 -05:00
|
|
|
"github.com/grafana/grafana/pkg/api/response"
|
|
|
|
"github.com/grafana/grafana/pkg/infra/log"
|
2022-04-01 08:39:59 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/accesscontrol"
|
2023-01-27 01:50:36 -06:00
|
|
|
contextmodel "github.com/grafana/grafana/pkg/services/contexthandler/model"
|
2021-04-19 13:26:04 -05:00
|
|
|
apimodels "github.com/grafana/grafana/pkg/services/ngalert/api/tooling/definitions"
|
2021-03-31 15:00:56 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/ngalert/notifier"
|
|
|
|
"github.com/grafana/grafana/pkg/services/ngalert/store"
|
2023-03-27 15:35:54 -05:00
|
|
|
"github.com/grafana/grafana/pkg/services/secrets"
|
2021-03-31 15:00:56 -05:00
|
|
|
"github.com/grafana/grafana/pkg/util"
|
|
|
|
)
|
|
|
|
|
2021-08-17 07:49:05 -05:00
|
|
|
const (
|
|
|
|
defaultTestReceiversTimeout = 15 * time.Second
|
|
|
|
maxTestReceiversTimeout = 30 * time.Second
|
|
|
|
)
|
|
|
|
|
2021-03-31 15:00:56 -05:00
|
|
|
type AlertmanagerSrv struct {
|
2022-04-14 13:06:21 -05:00
|
|
|
log log.Logger
|
|
|
|
ac accesscontrol.AccessControl
|
|
|
|
mam *notifier.MultiOrgAlertmanager
|
|
|
|
crypto notifier.Crypto
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
|
2021-08-17 07:49:05 -05:00
|
|
|
type UnknownReceiverError struct {
|
|
|
|
UID string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e UnknownReceiverError) Error() string {
|
|
|
|
return fmt.Sprintf("unknown receiver: %s", e.UID)
|
|
|
|
}
|
|
|
|
|
2023-01-27 01:50:36 -06:00
|
|
|
func (srv AlertmanagerSrv) RouteGetAMStatus(c *contextmodel.ReqContext) response.Response {
|
2022-08-11 06:28:55 -05:00
|
|
|
am, errResp := srv.AlertmanagerFor(c.OrgID)
|
2021-08-24 05:28:09 -05:00
|
|
|
if errResp != nil {
|
|
|
|
return errResp
|
|
|
|
}
|
|
|
|
|
|
|
|
return response.JSON(http.StatusOK, am.GetStatus())
|
2021-06-15 11:14:02 -05:00
|
|
|
}
|
|
|
|
|
2023-01-27 01:50:36 -06:00
|
|
|
func (srv AlertmanagerSrv) RouteCreateSilence(c *contextmodel.ReqContext, postableSilence apimodels.PostableSilence) response.Response {
|
2022-04-27 02:55:47 -05:00
|
|
|
err := postableSilence.Validate(strfmt.Default)
|
|
|
|
if err != nil {
|
2022-10-19 16:36:54 -05:00
|
|
|
srv.log.Error("silence failed validation", "error", err)
|
2022-04-27 02:55:47 -05:00
|
|
|
return ErrResp(http.StatusBadRequest, err, "silence failed validation")
|
|
|
|
}
|
|
|
|
|
2022-08-11 06:28:55 -05:00
|
|
|
am, errResp := srv.AlertmanagerFor(c.OrgID)
|
2021-08-24 05:28:09 -05:00
|
|
|
if errResp != nil {
|
|
|
|
return errResp
|
|
|
|
}
|
|
|
|
|
2022-04-01 08:39:59 -05:00
|
|
|
action := accesscontrol.ActionAlertingInstanceUpdate
|
|
|
|
if postableSilence.ID == "" {
|
|
|
|
action = accesscontrol.ActionAlertingInstanceCreate
|
|
|
|
}
|
|
|
|
if !accesscontrol.HasAccess(srv.ac, c)(accesscontrol.ReqOrgAdminOrEditor, accesscontrol.EvalPermission(action)) {
|
|
|
|
errAction := "update"
|
|
|
|
if postableSilence.ID == "" {
|
|
|
|
errAction = "create"
|
|
|
|
}
|
|
|
|
return ErrResp(http.StatusUnauthorized, fmt.Errorf("user is not authorized to %s silences", errAction), "")
|
|
|
|
}
|
|
|
|
|
2021-08-24 05:28:09 -05:00
|
|
|
silenceID, err := am.CreateSilence(&postableSilence)
|
2021-03-31 15:00:56 -05:00
|
|
|
if err != nil {
|
2023-02-03 10:36:49 -06:00
|
|
|
if errors.Is(err, alertingNotify.ErrSilenceNotFound) {
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusNotFound, err, "")
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
|
2023-02-03 10:36:49 -06:00
|
|
|
if errors.Is(err, alertingNotify.ErrCreateSilenceBadPayload) {
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusBadRequest, err, "")
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusInternalServerError, err, "failed to create silence")
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
2022-10-17 14:43:37 -05:00
|
|
|
return response.JSON(http.StatusAccepted, apimodels.PostSilencesOKBody{
|
|
|
|
SilenceID: silenceID,
|
|
|
|
})
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
|
2023-01-27 01:50:36 -06:00
|
|
|
func (srv AlertmanagerSrv) RouteDeleteAlertingConfig(c *contextmodel.ReqContext) response.Response {
|
2022-08-11 06:28:55 -05:00
|
|
|
am, errResp := srv.AlertmanagerFor(c.OrgID)
|
2021-08-24 05:28:09 -05:00
|
|
|
if errResp != nil {
|
|
|
|
return errResp
|
|
|
|
}
|
|
|
|
|
2022-02-09 03:22:09 -06:00
|
|
|
if err := am.SaveAndApplyDefaultConfig(c.Req.Context()); err != nil {
|
2022-10-19 16:36:54 -05:00
|
|
|
srv.log.Error("unable to save and apply default alertmanager configuration", "error", err)
|
2021-07-16 12:07:31 -05:00
|
|
|
return ErrResp(http.StatusInternalServerError, err, "failed to save and apply default Alertmanager configuration")
|
|
|
|
}
|
|
|
|
|
|
|
|
return response.JSON(http.StatusAccepted, util.DynMap{"message": "configuration deleted; the default is applied"})
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
|
2023-01-27 01:50:36 -06:00
|
|
|
func (srv AlertmanagerSrv) RouteDeleteSilence(c *contextmodel.ReqContext, silenceID string) response.Response {
|
2022-08-11 06:28:55 -05:00
|
|
|
am, errResp := srv.AlertmanagerFor(c.OrgID)
|
2021-08-24 05:28:09 -05:00
|
|
|
if errResp != nil {
|
|
|
|
return errResp
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := am.DeleteSilence(silenceID); err != nil {
|
2023-02-03 10:36:49 -06:00
|
|
|
if errors.Is(err, alertingNotify.ErrSilenceNotFound) {
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusNotFound, err, "")
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusInternalServerError, err, "")
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
return response.JSON(http.StatusOK, util.DynMap{"message": "silence deleted"})
|
|
|
|
}
|
|
|
|
|
2023-01-27 01:50:36 -06:00
|
|
|
func (srv AlertmanagerSrv) RouteGetAlertingConfig(c *contextmodel.ReqContext) response.Response {
|
2022-08-11 06:28:55 -05:00
|
|
|
config, err := srv.mam.GetAlertmanagerConfiguration(c.Req.Context(), c.OrgID)
|
2022-04-14 13:06:21 -05:00
|
|
|
if err != nil {
|
2021-04-05 09:03:00 -05:00
|
|
|
if errors.Is(err, store.ErrNoAlertmanagerConfiguration) {
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusNotFound, err, "")
|
2021-04-05 09:03:00 -05:00
|
|
|
}
|
2022-04-14 13:06:21 -05:00
|
|
|
return ErrResp(http.StatusInternalServerError, err, err.Error())
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
2022-04-14 13:06:21 -05:00
|
|
|
return response.JSON(http.StatusOK, config)
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
|
2023-03-31 15:43:04 -05:00
|
|
|
func (srv AlertmanagerSrv) RouteGetAlertingConfigHistory(c *contextmodel.ReqContext) response.Response {
|
|
|
|
limit := c.QueryInt("limit")
|
|
|
|
configs, err := srv.mam.GetAppliedAlertmanagerConfigurations(c.Req.Context(), c.OrgID, limit)
|
|
|
|
if err != nil {
|
|
|
|
return ErrResp(http.StatusInternalServerError, err, err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
return response.JSON(http.StatusOK, configs)
|
|
|
|
}
|
|
|
|
|
2023-01-27 01:50:36 -06:00
|
|
|
func (srv AlertmanagerSrv) RouteGetAMAlertGroups(c *contextmodel.ReqContext) response.Response {
|
2022-08-11 06:28:55 -05:00
|
|
|
am, errResp := srv.AlertmanagerFor(c.OrgID)
|
2021-08-24 05:28:09 -05:00
|
|
|
if errResp != nil {
|
|
|
|
return errResp
|
|
|
|
}
|
|
|
|
|
|
|
|
groups, err := am.GetAlertGroups(
|
2021-04-21 05:34:42 -05:00
|
|
|
c.QueryBoolWithDefault("active", true),
|
|
|
|
c.QueryBoolWithDefault("silenced", true),
|
|
|
|
c.QueryBoolWithDefault("inhibited", true),
|
2021-04-08 06:27:59 -05:00
|
|
|
c.QueryStrings("filter"),
|
|
|
|
c.Query("receiver"),
|
|
|
|
)
|
|
|
|
if err != nil {
|
2023-02-03 10:36:49 -06:00
|
|
|
if errors.Is(err, alertingNotify.ErrGetAlertGroupsBadPayload) {
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusBadRequest, err, "")
|
2021-04-08 06:27:59 -05:00
|
|
|
}
|
|
|
|
// any other error here should be an unexpected failure and thus an internal error
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusInternalServerError, err, "")
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
2021-04-08 06:27:59 -05:00
|
|
|
|
|
|
|
return response.JSON(http.StatusOK, groups)
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
|
2023-01-27 01:50:36 -06:00
|
|
|
func (srv AlertmanagerSrv) RouteGetAMAlerts(c *contextmodel.ReqContext) response.Response {
|
2022-08-11 06:28:55 -05:00
|
|
|
am, errResp := srv.AlertmanagerFor(c.OrgID)
|
2021-08-24 05:28:09 -05:00
|
|
|
if errResp != nil {
|
|
|
|
return errResp
|
|
|
|
}
|
|
|
|
|
|
|
|
alerts, err := am.GetAlerts(
|
2021-04-21 05:34:42 -05:00
|
|
|
c.QueryBoolWithDefault("active", true),
|
|
|
|
c.QueryBoolWithDefault("silenced", true),
|
|
|
|
c.QueryBoolWithDefault("inhibited", true),
|
2021-04-08 06:27:59 -05:00
|
|
|
c.QueryStrings("filter"),
|
|
|
|
c.Query("receiver"),
|
|
|
|
)
|
|
|
|
if err != nil {
|
2023-02-03 10:36:49 -06:00
|
|
|
if errors.Is(err, alertingNotify.ErrGetAlertsBadPayload) {
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusBadRequest, err, "")
|
2021-04-08 06:27:59 -05:00
|
|
|
}
|
2023-02-03 10:36:49 -06:00
|
|
|
if errors.Is(err, alertingNotify.ErrGetAlertsUnavailable) {
|
2021-07-12 00:45:16 -05:00
|
|
|
return ErrResp(http.StatusServiceUnavailable, err, "")
|
|
|
|
}
|
2021-04-08 06:27:59 -05:00
|
|
|
// any other error here should be an unexpected failure and thus an internal error
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusInternalServerError, err, "")
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
2021-04-08 06:27:59 -05:00
|
|
|
|
|
|
|
return response.JSON(http.StatusOK, alerts)
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
|
2023-01-27 01:50:36 -06:00
|
|
|
func (srv AlertmanagerSrv) RouteGetSilence(c *contextmodel.ReqContext, silenceID string) response.Response {
|
2022-08-11 06:28:55 -05:00
|
|
|
am, errResp := srv.AlertmanagerFor(c.OrgID)
|
2021-08-24 05:28:09 -05:00
|
|
|
if errResp != nil {
|
|
|
|
return errResp
|
|
|
|
}
|
|
|
|
|
|
|
|
gettableSilence, err := am.GetSilence(silenceID)
|
2021-03-31 15:00:56 -05:00
|
|
|
if err != nil {
|
2023-02-03 10:36:49 -06:00
|
|
|
if errors.Is(err, alertingNotify.ErrSilenceNotFound) {
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusNotFound, err, "")
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
// any other error here should be an unexpected failure and thus an internal error
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusInternalServerError, err, "")
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
return response.JSON(http.StatusOK, gettableSilence)
|
|
|
|
}
|
|
|
|
|
2023-01-27 01:50:36 -06:00
|
|
|
func (srv AlertmanagerSrv) RouteGetSilences(c *contextmodel.ReqContext) response.Response {
|
2022-08-11 06:28:55 -05:00
|
|
|
am, errResp := srv.AlertmanagerFor(c.OrgID)
|
2021-08-24 05:28:09 -05:00
|
|
|
if errResp != nil {
|
|
|
|
return errResp
|
|
|
|
}
|
|
|
|
|
|
|
|
gettableSilences, err := am.ListSilences(c.QueryStrings("filter"))
|
2021-03-31 15:00:56 -05:00
|
|
|
if err != nil {
|
2023-02-03 10:36:49 -06:00
|
|
|
if errors.Is(err, alertingNotify.ErrListSilencesBadPayload) {
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusBadRequest, err, "")
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
// any other error here should be an unexpected failure and thus an internal error
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusInternalServerError, err, "")
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
return response.JSON(http.StatusOK, gettableSilences)
|
|
|
|
}
|
|
|
|
|
2023-04-05 13:10:03 -05:00
|
|
|
func (srv AlertmanagerSrv) RoutePostGrafanaAlertingConfigHistoryActivate(c *contextmodel.ReqContext, id string) response.Response {
|
|
|
|
confId, err := strconv.ParseInt(id, 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
return ErrResp(http.StatusBadRequest, err, "failed to parse config id")
|
|
|
|
}
|
|
|
|
|
|
|
|
err = srv.mam.ActivateHistoricalConfiguration(c.Req.Context(), c.OrgID, confId)
|
|
|
|
if err != nil {
|
|
|
|
var unknownReceiverError notifier.UnknownReceiverError
|
|
|
|
if errors.As(err, &unknownReceiverError) {
|
|
|
|
return ErrResp(http.StatusBadRequest, unknownReceiverError, "")
|
|
|
|
}
|
|
|
|
var configRejectedError notifier.AlertmanagerConfigRejectedError
|
|
|
|
if errors.As(err, &configRejectedError) {
|
|
|
|
return ErrResp(http.StatusBadRequest, configRejectedError, "")
|
|
|
|
}
|
|
|
|
if errors.Is(err, store.ErrNoAlertmanagerConfiguration) {
|
|
|
|
return response.Error(http.StatusNotFound, err.Error(), err)
|
|
|
|
}
|
|
|
|
if errors.Is(err, notifier.ErrNoAlertmanagerForOrg) {
|
|
|
|
return response.Error(http.StatusNotFound, err.Error(), err)
|
|
|
|
}
|
|
|
|
if errors.Is(err, notifier.ErrAlertmanagerNotReady) {
|
|
|
|
return response.Error(http.StatusConflict, err.Error(), err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ErrResp(http.StatusInternalServerError, err, "")
|
|
|
|
}
|
|
|
|
|
|
|
|
return response.JSON(http.StatusAccepted, util.DynMap{"message": "configuration activated"})
|
|
|
|
}
|
|
|
|
|
2023-01-27 01:50:36 -06:00
|
|
|
func (srv AlertmanagerSrv) RoutePostAlertingConfig(c *contextmodel.ReqContext, body apimodels.PostableUserConfig) response.Response {
|
2022-08-11 06:28:55 -05:00
|
|
|
currentConfig, err := srv.mam.GetAlertmanagerConfiguration(c.Req.Context(), c.OrgID)
|
2022-06-04 07:55:46 -05:00
|
|
|
// If a config is present and valid we proceed with the guard, otherwise we
|
|
|
|
// just bypass the guard which is okay as we are anyway in an invalid state.
|
|
|
|
if err == nil {
|
|
|
|
if err := srv.provenanceGuard(currentConfig, body); err != nil {
|
|
|
|
return ErrResp(http.StatusBadRequest, err, "")
|
|
|
|
}
|
|
|
|
}
|
2022-08-11 06:28:55 -05:00
|
|
|
err = srv.mam.ApplyAlertmanagerConfiguration(c.Req.Context(), c.OrgID, body)
|
2022-04-14 13:06:21 -05:00
|
|
|
if err == nil {
|
|
|
|
return response.JSON(http.StatusAccepted, util.DynMap{"message": "configuration created"})
|
2021-05-14 13:49:54 -05:00
|
|
|
}
|
2022-04-14 13:06:21 -05:00
|
|
|
var unknownReceiverError notifier.UnknownReceiverError
|
|
|
|
if errors.As(err, &unknownReceiverError) {
|
|
|
|
return ErrResp(http.StatusBadRequest, unknownReceiverError, "")
|
2021-05-14 13:49:54 -05:00
|
|
|
}
|
2022-04-14 13:06:21 -05:00
|
|
|
var configRejectedError notifier.AlertmanagerConfigRejectedError
|
|
|
|
if errors.As(err, &configRejectedError) {
|
|
|
|
return ErrResp(http.StatusBadRequest, configRejectedError, "")
|
2021-08-17 07:49:05 -05:00
|
|
|
}
|
2022-04-14 13:06:21 -05:00
|
|
|
if errors.Is(err, notifier.ErrNoAlertmanagerForOrg) {
|
|
|
|
return response.Error(http.StatusNotFound, err.Error(), err)
|
2021-08-24 05:28:09 -05:00
|
|
|
}
|
2022-04-14 13:06:21 -05:00
|
|
|
if errors.Is(err, notifier.ErrAlertmanagerNotReady) {
|
|
|
|
return response.Error(http.StatusConflict, err.Error(), err)
|
2021-08-17 07:49:05 -05:00
|
|
|
}
|
2021-05-18 09:31:00 -05:00
|
|
|
|
2022-04-14 13:06:21 -05:00
|
|
|
return ErrResp(http.StatusInternalServerError, err, "")
|
2021-08-17 07:49:05 -05:00
|
|
|
}
|
2021-05-18 09:31:00 -05:00
|
|
|
|
2023-01-27 01:50:36 -06:00
|
|
|
func (srv AlertmanagerSrv) RouteGetReceivers(c *contextmodel.ReqContext) response.Response {
|
2022-10-03 08:58:41 -05:00
|
|
|
am, errResp := srv.AlertmanagerFor(c.OrgID)
|
|
|
|
if errResp != nil {
|
|
|
|
return errResp
|
|
|
|
}
|
|
|
|
|
|
|
|
rcvs := am.GetReceivers(c.Req.Context())
|
|
|
|
return response.JSON(http.StatusOK, rcvs)
|
|
|
|
}
|
|
|
|
|
2023-01-27 01:50:36 -06:00
|
|
|
func (srv AlertmanagerSrv) RoutePostTestReceivers(c *contextmodel.ReqContext, body apimodels.TestReceiversConfigBodyParams) response.Response {
|
2022-08-11 06:28:55 -05:00
|
|
|
if err := srv.crypto.LoadSecureSettings(c.Req.Context(), c.OrgID, body.Receivers); err != nil {
|
2021-08-17 07:49:05 -05:00
|
|
|
var unknownReceiverError UnknownReceiverError
|
|
|
|
if errors.As(err, &unknownReceiverError) {
|
|
|
|
return ErrResp(http.StatusBadRequest, err, "")
|
2021-05-14 13:49:54 -05:00
|
|
|
}
|
2021-08-17 07:49:05 -05:00
|
|
|
return ErrResp(http.StatusInternalServerError, err, "")
|
2021-05-14 13:49:54 -05:00
|
|
|
}
|
|
|
|
|
2023-03-27 15:35:54 -05:00
|
|
|
if err := body.ProcessConfig(func(ctx context.Context, payload []byte) ([]byte, error) {
|
|
|
|
return srv.crypto.Encrypt(ctx, payload, secrets.WithoutScope())
|
|
|
|
}); err != nil {
|
2021-05-28 10:55:03 -05:00
|
|
|
return ErrResp(http.StatusInternalServerError, err, "failed to post process Alertmanager configuration")
|
2021-05-10 07:30:42 -05:00
|
|
|
}
|
|
|
|
|
2021-08-17 07:49:05 -05:00
|
|
|
ctx, cancelFunc, err := contextWithTimeoutFromRequest(
|
|
|
|
c.Req.Context(),
|
2021-09-01 04:18:30 -05:00
|
|
|
c.Req,
|
2021-08-17 07:49:05 -05:00
|
|
|
defaultTestReceiversTimeout,
|
|
|
|
maxTestReceiversTimeout)
|
|
|
|
if err != nil {
|
|
|
|
return ErrResp(http.StatusBadRequest, err, "")
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
2021-08-17 07:49:05 -05:00
|
|
|
defer cancelFunc()
|
2021-03-31 15:00:56 -05:00
|
|
|
|
2022-08-11 06:28:55 -05:00
|
|
|
am, errResp := srv.AlertmanagerFor(c.OrgID)
|
2021-08-24 05:28:09 -05:00
|
|
|
if errResp != nil {
|
|
|
|
return errResp
|
|
|
|
}
|
|
|
|
|
|
|
|
result, err := am.TestReceivers(ctx, body)
|
2021-08-17 07:49:05 -05:00
|
|
|
if err != nil {
|
2023-02-03 10:36:49 -06:00
|
|
|
if errors.Is(err, alertingNotify.ErrNoReceivers) {
|
2021-08-17 07:49:05 -05:00
|
|
|
return response.Error(http.StatusBadRequest, "", err)
|
|
|
|
}
|
|
|
|
return response.Error(http.StatusInternalServerError, "", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return response.JSON(statusForTestReceivers(result.Receivers), newTestReceiversResult(result))
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
|
|
|
|
2023-04-28 09:56:59 -05:00
|
|
|
func (srv AlertmanagerSrv) RoutePostTestTemplates(c *contextmodel.ReqContext, body apimodels.TestTemplatesConfigBodyParams) response.Response {
|
|
|
|
am, errResp := srv.AlertmanagerFor(c.OrgID)
|
|
|
|
if errResp != nil {
|
|
|
|
return errResp
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := am.TestTemplate(c.Req.Context(), body)
|
|
|
|
if err != nil {
|
|
|
|
return response.Error(http.StatusInternalServerError, "", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return response.JSON(http.StatusOK, newTestTemplateResult(res))
|
|
|
|
}
|
|
|
|
|
2021-08-17 07:49:05 -05:00
|
|
|
// contextWithTimeoutFromRequest returns a context with a deadline set from the
|
|
|
|
// Request-Timeout header in the HTTP request. If the header is absent then the
|
|
|
|
// context will use the default timeout. The timeout in the Request-Timeout
|
|
|
|
// header cannot exceed the maximum timeout.
|
|
|
|
func contextWithTimeoutFromRequest(ctx context.Context, r *http.Request, defaultTimeout, maxTimeout time.Duration) (context.Context, context.CancelFunc, error) {
|
|
|
|
timeout := defaultTimeout
|
|
|
|
if s := strings.TrimSpace(r.Header.Get("Request-Timeout")); s != "" {
|
|
|
|
// the timeout is measured in seconds
|
|
|
|
v, err := strconv.ParseInt(s, 10, 16)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
if d := time.Duration(v) * time.Second; d < maxTimeout {
|
|
|
|
timeout = d
|
|
|
|
} else {
|
|
|
|
return nil, nil, fmt.Errorf("exceeded maximum timeout of %d seconds", maxTimeout)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ctx, cancelFunc := context.WithTimeout(ctx, timeout)
|
|
|
|
return ctx, cancelFunc, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func newTestReceiversResult(r *notifier.TestReceiversResult) apimodels.TestReceiversResult {
|
|
|
|
v := apimodels.TestReceiversResult{
|
2021-10-21 07:47:06 -05:00
|
|
|
Alert: apimodels.TestReceiversConfigAlertParams{
|
|
|
|
Annotations: r.Alert.Annotations,
|
|
|
|
Labels: r.Alert.Labels,
|
|
|
|
},
|
|
|
|
Receivers: make([]apimodels.TestReceiverResult, len(r.Receivers)),
|
|
|
|
NotifiedAt: r.NotifedAt,
|
2021-08-17 07:49:05 -05:00
|
|
|
}
|
|
|
|
for ix, next := range r.Receivers {
|
|
|
|
configs := make([]apimodels.TestReceiverConfigResult, len(next.Configs))
|
|
|
|
for jx, config := range next.Configs {
|
|
|
|
configs[jx].Name = config.Name
|
|
|
|
configs[jx].UID = config.UID
|
|
|
|
configs[jx].Status = config.Status
|
|
|
|
if config.Error != nil {
|
|
|
|
configs[jx].Error = config.Error.Error()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
v.Receivers[ix].Configs = configs
|
|
|
|
v.Receivers[ix].Name = next.Name
|
|
|
|
}
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
|
|
|
|
// statusForTestReceivers returns the appropriate status code for the response
|
|
|
|
// for the results.
|
|
|
|
//
|
|
|
|
// It returns an HTTP 200 OK status code if notifications were sent to all receivers,
|
|
|
|
// an HTTP 400 Bad Request status code if all receivers contain invalid configuration,
|
|
|
|
// an HTTP 408 Request Timeout status code if all receivers timed out when sending
|
|
|
|
// a test notification or an HTTP 207 Multi Status.
|
|
|
|
func statusForTestReceivers(v []notifier.TestReceiverResult) int {
|
|
|
|
var (
|
|
|
|
numBadRequests int
|
|
|
|
numTimeouts int
|
|
|
|
numUnknownErrors int
|
|
|
|
)
|
|
|
|
for _, receiver := range v {
|
|
|
|
for _, next := range receiver.Configs {
|
|
|
|
if next.Error != nil {
|
|
|
|
var (
|
2023-04-25 12:39:46 -05:00
|
|
|
invalidReceiverErr alertingNotify.IntegrationValidationError
|
|
|
|
receiverTimeoutErr alertingNotify.IntegrationTimeoutError
|
2021-08-17 07:49:05 -05:00
|
|
|
)
|
|
|
|
if errors.As(next.Error, &invalidReceiverErr) {
|
|
|
|
numBadRequests += 1
|
|
|
|
} else if errors.As(next.Error, &receiverTimeoutErr) {
|
|
|
|
numTimeouts += 1
|
|
|
|
} else {
|
|
|
|
numUnknownErrors += 1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if numBadRequests == len(v) {
|
|
|
|
// if all receivers contain invalid configuration
|
|
|
|
return http.StatusBadRequest
|
|
|
|
} else if numTimeouts == len(v) {
|
|
|
|
// if all receivers contain valid configuration but timed out
|
|
|
|
return http.StatusRequestTimeout
|
|
|
|
} else if numBadRequests+numTimeouts+numUnknownErrors > 0 {
|
|
|
|
return http.StatusMultiStatus
|
|
|
|
} else {
|
|
|
|
// all receivers were sent a notification without error
|
|
|
|
return http.StatusOK
|
|
|
|
}
|
2021-03-31 15:00:56 -05:00
|
|
|
}
|
2021-08-24 05:28:09 -05:00
|
|
|
|
2023-04-28 09:56:59 -05:00
|
|
|
func newTestTemplateResult(res *notifier.TestTemplatesResults) apimodels.TestTemplatesResults {
|
|
|
|
apiRes := apimodels.TestTemplatesResults{}
|
|
|
|
for _, r := range res.Results {
|
|
|
|
apiRes.Results = append(apiRes.Results, apimodels.TestTemplatesResult{
|
|
|
|
Name: r.Name,
|
|
|
|
Text: r.Text,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
for _, e := range res.Errors {
|
|
|
|
apiRes.Errors = append(apiRes.Errors, apimodels.TestTemplatesErrorResult{
|
|
|
|
Name: e.Name,
|
|
|
|
Kind: apimodels.TemplateErrorKind(e.Kind),
|
|
|
|
Message: e.Error.Error(),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
return apiRes
|
|
|
|
}
|
|
|
|
|
2021-08-24 05:28:09 -05:00
|
|
|
func (srv AlertmanagerSrv) AlertmanagerFor(orgID int64) (Alertmanager, *response.NormalResponse) {
|
|
|
|
am, err := srv.mam.AlertmanagerFor(orgID)
|
|
|
|
if err == nil {
|
|
|
|
return am, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if errors.Is(err, notifier.ErrNoAlertmanagerForOrg) {
|
2021-12-27 17:01:17 -06:00
|
|
|
return nil, response.Error(http.StatusNotFound, err.Error(), err)
|
2021-08-24 05:28:09 -05:00
|
|
|
}
|
|
|
|
if errors.Is(err, notifier.ErrAlertmanagerNotReady) {
|
2021-12-27 17:01:17 -06:00
|
|
|
return am, response.Error(http.StatusConflict, err.Error(), err)
|
2021-08-24 05:28:09 -05:00
|
|
|
}
|
|
|
|
|
2022-10-19 16:36:54 -05:00
|
|
|
srv.log.Error("unable to obtain the org's Alertmanager", "error", err)
|
2021-08-24 05:28:09 -05:00
|
|
|
return nil, response.Error(http.StatusInternalServerError, "unable to obtain org's Alertmanager", err)
|
|
|
|
}
|