mirror of
https://github.com/grafana/grafana.git
synced 2024-11-26 02:40:26 -06:00
baab021fec
Refactor usage of legacy data contracts. Moves legacy data contracts to pkg/tsdb/legacydata package. Refactor pkg/expr to be a proper service/dependency that can be provided to wire to remove some unneeded dependencies to SSE in ngalert and other places. Refactor pkg/expr to not use the legacydata,RequestHandler and use backend.QueryDataHandler instead.
265 lines
8.2 KiB
Go
265 lines
8.2 KiB
Go
package api
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"net/url"
|
|
"regexp"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/grafana/grafana-plugin-sdk-go/data"
|
|
"github.com/grafana/grafana/pkg/api/response"
|
|
"github.com/grafana/grafana/pkg/expr"
|
|
"github.com/grafana/grafana/pkg/infra/log"
|
|
"github.com/grafana/grafana/pkg/models"
|
|
"github.com/grafana/grafana/pkg/services/datasourceproxy"
|
|
"github.com/grafana/grafana/pkg/services/datasources"
|
|
apimodels "github.com/grafana/grafana/pkg/services/ngalert/api/tooling/definitions"
|
|
"github.com/grafana/grafana/pkg/services/ngalert/eval"
|
|
ngmodels "github.com/grafana/grafana/pkg/services/ngalert/models"
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
"github.com/grafana/grafana/pkg/util"
|
|
"github.com/grafana/grafana/pkg/web"
|
|
"github.com/pkg/errors"
|
|
"gopkg.in/yaml.v3"
|
|
)
|
|
|
|
var searchRegex = regexp.MustCompile(`\{(\w+)\}`)
|
|
|
|
var NotImplementedResp = ErrResp(http.StatusNotImplemented, errors.New("endpoint not implemented"), "")
|
|
|
|
func toMacaronPath(path string) string {
|
|
return string(searchRegex.ReplaceAllFunc([]byte(path), func(s []byte) []byte {
|
|
m := string(s[1 : len(s)-1])
|
|
return []byte(fmt.Sprintf(":%s", m))
|
|
}))
|
|
}
|
|
|
|
func backendType(ctx *models.ReqContext, cache datasources.CacheService) (apimodels.Backend, error) {
|
|
recipient := web.Params(ctx.Req)[":Recipient"]
|
|
if recipient == apimodels.GrafanaBackend.String() {
|
|
return apimodels.GrafanaBackend, nil
|
|
}
|
|
if datasourceID, err := strconv.ParseInt(recipient, 10, 64); err == nil {
|
|
if ds, err := cache.GetDatasource(datasourceID, ctx.SignedInUser, ctx.SkipCache); err == nil {
|
|
switch ds.Type {
|
|
case "loki", "prometheus":
|
|
return apimodels.LoTexRulerBackend, nil
|
|
case "alertmanager":
|
|
return apimodels.AlertmanagerBackend, nil
|
|
default:
|
|
return 0, fmt.Errorf("unexpected backend type (%v)", ds.Type)
|
|
}
|
|
}
|
|
}
|
|
return 0, fmt.Errorf("unexpected backend type (%v)", recipient)
|
|
}
|
|
|
|
// macaron unsafely asserts the http.ResponseWriter is an http.CloseNotifier, which will panic.
|
|
// Here we impl it, which will ensure this no longer happens, but neither will we take
|
|
// advantage cancelling upstream requests when the downstream has closed.
|
|
// NB: http.CloseNotifier is a deprecated ifc from before the context pkg.
|
|
type safeMacaronWrapper struct {
|
|
http.ResponseWriter
|
|
}
|
|
|
|
func (w *safeMacaronWrapper) CloseNotify() <-chan bool {
|
|
return make(chan bool)
|
|
}
|
|
|
|
// replacedResponseWriter overwrites the underlying responsewriter used by a *models.ReqContext.
|
|
// It's ugly because it needs to replace a value behind a few nested pointers.
|
|
func replacedResponseWriter(ctx *models.ReqContext) (*models.ReqContext, *response.NormalResponse) {
|
|
resp := response.CreateNormalResponse(make(http.Header), nil, 0)
|
|
cpy := *ctx
|
|
cpyMCtx := *cpy.Context
|
|
cpyMCtx.Resp = web.NewResponseWriter(ctx.Req.Method, &safeMacaronWrapper{resp})
|
|
cpy.Context = &cpyMCtx
|
|
return &cpy, resp
|
|
}
|
|
|
|
type AlertingProxy struct {
|
|
DataProxy *datasourceproxy.DataSourceProxyService
|
|
}
|
|
|
|
// withReq proxies a different request
|
|
func (p *AlertingProxy) withReq(
|
|
ctx *models.ReqContext,
|
|
method string,
|
|
u *url.URL,
|
|
body io.Reader,
|
|
extractor func(*response.NormalResponse) (interface{}, error),
|
|
headers map[string]string,
|
|
) response.Response {
|
|
req, err := http.NewRequest(method, u.String(), body)
|
|
if err != nil {
|
|
return ErrResp(http.StatusBadRequest, err, "")
|
|
}
|
|
for h, v := range headers {
|
|
req.Header.Add(h, v)
|
|
}
|
|
newCtx, resp := replacedResponseWriter(ctx)
|
|
newCtx.Req = req
|
|
p.DataProxy.ProxyDatasourceRequestWithID(newCtx, ctx.ParamsInt64(":Recipient"))
|
|
|
|
status := resp.Status()
|
|
if status >= 400 {
|
|
errMessage := string(resp.Body())
|
|
// if Content-Type is application/json
|
|
// and it is successfully decoded and contains a message
|
|
// return this as response error message
|
|
if strings.HasPrefix(resp.Header().Get("Content-Type"), "application/json") {
|
|
var m map[string]interface{}
|
|
if err := json.Unmarshal(resp.Body(), &m); err == nil {
|
|
if message, ok := m["message"]; ok {
|
|
errMessage = message.(string)
|
|
}
|
|
}
|
|
} else if strings.HasPrefix(resp.Header().Get("Content-Type"), "text/html") {
|
|
// if Content-Type is text/html
|
|
// do not return the body
|
|
errMessage = "redacted html"
|
|
}
|
|
return ErrResp(status, errors.New(errMessage), "")
|
|
}
|
|
|
|
t, err := extractor(resp)
|
|
if err != nil {
|
|
return ErrResp(http.StatusInternalServerError, err, "")
|
|
}
|
|
|
|
b, err := json.Marshal(t)
|
|
if err != nil {
|
|
return ErrResp(http.StatusInternalServerError, err, "")
|
|
}
|
|
|
|
return response.JSON(status, b)
|
|
}
|
|
|
|
func yamlExtractor(v interface{}) func(*response.NormalResponse) (interface{}, error) {
|
|
return func(resp *response.NormalResponse) (interface{}, error) {
|
|
contentType := resp.Header().Get("Content-Type")
|
|
if !strings.Contains(contentType, "yaml") {
|
|
return nil, fmt.Errorf("unexpected content type from upstream. expected YAML, got %v", contentType)
|
|
}
|
|
decoder := yaml.NewDecoder(bytes.NewReader(resp.Body()))
|
|
decoder.KnownFields(true)
|
|
|
|
err := decoder.Decode(v)
|
|
|
|
return v, err
|
|
}
|
|
}
|
|
|
|
func jsonExtractor(v interface{}) func(*response.NormalResponse) (interface{}, error) {
|
|
if v == nil {
|
|
// json unmarshal expects a pointer
|
|
v = &map[string]interface{}{}
|
|
}
|
|
return func(resp *response.NormalResponse) (interface{}, error) {
|
|
contentType := resp.Header().Get("Content-Type")
|
|
if !strings.Contains(contentType, "json") {
|
|
return nil, fmt.Errorf("unexpected content type from upstream. expected JSON, got %v", contentType)
|
|
}
|
|
return v, json.Unmarshal(resp.Body(), v)
|
|
}
|
|
}
|
|
|
|
func messageExtractor(resp *response.NormalResponse) (interface{}, error) {
|
|
return map[string]string{"message": string(resp.Body())}, nil
|
|
}
|
|
|
|
func validateCondition(c ngmodels.Condition, user *models.SignedInUser, skipCache bool, datasourceCache datasources.CacheService) error {
|
|
if len(c.Data) == 0 {
|
|
return nil
|
|
}
|
|
|
|
refIDs, err := validateQueriesAndExpressions(c.Data, user, skipCache, datasourceCache)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
t := make([]string, 0, len(refIDs))
|
|
for refID := range refIDs {
|
|
t = append(t, refID)
|
|
}
|
|
if _, ok := refIDs[c.Condition]; !ok {
|
|
return fmt.Errorf("condition %s not found in any query or expression: it should be one of: [%s]", c.Condition, strings.Join(t, ","))
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func validateQueriesAndExpressions(data []ngmodels.AlertQuery, user *models.SignedInUser, skipCache bool, datasourceCache datasources.CacheService) (map[string]struct{}, error) {
|
|
refIDs := make(map[string]struct{})
|
|
if len(data) == 0 {
|
|
return nil, nil
|
|
}
|
|
|
|
for _, query := range data {
|
|
datasourceUID, err := query.GetDatasource()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
isExpression, err := query.IsExpression()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if isExpression {
|
|
refIDs[query.RefID] = struct{}{}
|
|
continue
|
|
}
|
|
|
|
_, err = datasourceCache.GetDatasourceByUID(datasourceUID, user, skipCache)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("invalid query %s: %w: %s", query.RefID, err, datasourceUID)
|
|
}
|
|
refIDs[query.RefID] = struct{}{}
|
|
}
|
|
return refIDs, nil
|
|
}
|
|
|
|
func conditionEval(c *models.ReqContext, cmd ngmodels.EvalAlertConditionCommand, datasourceCache datasources.CacheService, expressionService *expr.Service, cfg *setting.Cfg, log log.Logger) response.Response {
|
|
evalCond := ngmodels.Condition{
|
|
Condition: cmd.Condition,
|
|
OrgID: c.SignedInUser.OrgId,
|
|
Data: cmd.Data,
|
|
}
|
|
if err := validateCondition(evalCond, c.SignedInUser, c.SkipCache, datasourceCache); err != nil {
|
|
return ErrResp(http.StatusBadRequest, err, "invalid condition")
|
|
}
|
|
|
|
now := cmd.Now
|
|
if now.IsZero() {
|
|
now = timeNow()
|
|
}
|
|
|
|
evaluator := eval.Evaluator{Cfg: cfg, Log: log}
|
|
evalResults, err := evaluator.ConditionEval(&evalCond, now, expressionService)
|
|
if err != nil {
|
|
return ErrResp(http.StatusBadRequest, err, "Failed to evaluate conditions")
|
|
}
|
|
|
|
frame := evalResults.AsDataFrame()
|
|
return response.JSONStreaming(http.StatusOK, util.DynMap{
|
|
"instances": []*data.Frame{&frame},
|
|
})
|
|
}
|
|
|
|
// ErrorResp creates a response with a visible error
|
|
func ErrResp(status int, err error, msg string, args ...interface{}) *response.NormalResponse {
|
|
if msg != "" {
|
|
err = errors.WithMessagef(err, msg, args...)
|
|
}
|
|
return response.Error(status, err.Error(), nil)
|
|
}
|
|
|
|
// accessForbiddenResp creates a response of forbidden access.
|
|
func accessForbiddenResp() response.Response {
|
|
return ErrResp(http.StatusForbidden, errors.New("Permission denied"), "")
|
|
}
|