mirror of
https://github.com/grafana/grafana.git
synced 2024-11-26 02:40:26 -06:00
223 lines
5.1 KiB
Go
223 lines
5.1 KiB
Go
package api
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"net/http"
|
|
"net/url"
|
|
|
|
apimodels "github.com/grafana/grafana/pkg/services/ngalert/api/tooling/definitions"
|
|
"github.com/grafana/grafana/pkg/web"
|
|
"gopkg.in/yaml.v3"
|
|
|
|
"github.com/grafana/grafana/pkg/api/response"
|
|
"github.com/grafana/grafana/pkg/infra/log"
|
|
"github.com/grafana/grafana/pkg/models"
|
|
)
|
|
|
|
const (
|
|
Prometheus = "prometheus"
|
|
Cortex = "cortex"
|
|
Mimir = "mimir"
|
|
)
|
|
|
|
const (
|
|
PrometheusDatasourceType = "prometheus"
|
|
LokiDatasourceType = "loki"
|
|
|
|
mimirPrefix = "/config/v1/rules"
|
|
prometheusPrefix = "/rules"
|
|
lokiPrefix = "/api/prom/rules"
|
|
|
|
subtypeQuery = "subtype"
|
|
)
|
|
|
|
var dsTypeToRulerPrefix = map[string]string{
|
|
PrometheusDatasourceType: prometheusPrefix,
|
|
LokiDatasourceType: lokiPrefix,
|
|
}
|
|
|
|
var subtypeToPrefix = map[string]string{
|
|
Prometheus: prometheusPrefix,
|
|
Cortex: prometheusPrefix,
|
|
Mimir: mimirPrefix,
|
|
}
|
|
|
|
type LotexRuler struct {
|
|
log log.Logger
|
|
*AlertingProxy
|
|
}
|
|
|
|
func NewLotexRuler(proxy *AlertingProxy, log log.Logger) *LotexRuler {
|
|
return &LotexRuler{
|
|
log: log,
|
|
AlertingProxy: proxy,
|
|
}
|
|
}
|
|
|
|
func (r *LotexRuler) RouteDeleteNamespaceRulesConfig(ctx *models.ReqContext, namespace string) response.Response {
|
|
legacyRulerPrefix, err := r.validateAndGetPrefix(ctx)
|
|
if err != nil {
|
|
return ErrResp(500, err, "")
|
|
}
|
|
return r.withReq(
|
|
ctx,
|
|
http.MethodDelete,
|
|
withPath(
|
|
*ctx.Req.URL,
|
|
fmt.Sprintf("%s/%s", legacyRulerPrefix, namespace),
|
|
),
|
|
nil,
|
|
messageExtractor,
|
|
nil,
|
|
)
|
|
}
|
|
|
|
func (r *LotexRuler) RouteDeleteRuleGroupConfig(ctx *models.ReqContext, namespace string, group string) response.Response {
|
|
legacyRulerPrefix, err := r.validateAndGetPrefix(ctx)
|
|
if err != nil {
|
|
return ErrResp(500, err, "")
|
|
}
|
|
return r.withReq(
|
|
ctx,
|
|
http.MethodDelete,
|
|
withPath(
|
|
*ctx.Req.URL,
|
|
fmt.Sprintf(
|
|
"%s/%s/%s",
|
|
legacyRulerPrefix,
|
|
namespace,
|
|
group,
|
|
),
|
|
),
|
|
nil,
|
|
messageExtractor,
|
|
nil,
|
|
)
|
|
}
|
|
|
|
func (r *LotexRuler) RouteGetNamespaceRulesConfig(ctx *models.ReqContext, namespace string) response.Response {
|
|
legacyRulerPrefix, err := r.validateAndGetPrefix(ctx)
|
|
if err != nil {
|
|
return ErrResp(500, err, "")
|
|
}
|
|
return r.withReq(
|
|
ctx,
|
|
http.MethodGet,
|
|
withPath(
|
|
*ctx.Req.URL,
|
|
fmt.Sprintf(
|
|
"%s/%s",
|
|
legacyRulerPrefix,
|
|
namespace,
|
|
),
|
|
),
|
|
nil,
|
|
yamlExtractor(apimodels.NamespaceConfigResponse{}),
|
|
nil,
|
|
)
|
|
}
|
|
|
|
func (r *LotexRuler) RouteGetRulegGroupConfig(ctx *models.ReqContext, namespace string, group string) response.Response {
|
|
legacyRulerPrefix, err := r.validateAndGetPrefix(ctx)
|
|
if err != nil {
|
|
return ErrResp(500, err, "")
|
|
}
|
|
return r.withReq(
|
|
ctx,
|
|
http.MethodGet,
|
|
withPath(
|
|
*ctx.Req.URL,
|
|
fmt.Sprintf(
|
|
"%s/%s/%s",
|
|
legacyRulerPrefix,
|
|
namespace,
|
|
group,
|
|
),
|
|
),
|
|
nil,
|
|
yamlExtractor(&apimodels.GettableRuleGroupConfig{}),
|
|
nil,
|
|
)
|
|
}
|
|
|
|
func (r *LotexRuler) RouteGetRulesConfig(ctx *models.ReqContext) response.Response {
|
|
legacyRulerPrefix, err := r.validateAndGetPrefix(ctx)
|
|
if err != nil {
|
|
return ErrResp(500, err, "")
|
|
}
|
|
|
|
return r.withReq(
|
|
ctx,
|
|
http.MethodGet,
|
|
withPath(
|
|
*ctx.Req.URL,
|
|
legacyRulerPrefix,
|
|
),
|
|
nil,
|
|
yamlExtractor(apimodels.NamespaceConfigResponse{}),
|
|
nil,
|
|
)
|
|
}
|
|
|
|
func (r *LotexRuler) RoutePostNameRulesConfig(ctx *models.ReqContext, conf apimodels.PostableRuleGroupConfig, ns string) response.Response {
|
|
legacyRulerPrefix, err := r.validateAndGetPrefix(ctx)
|
|
if err != nil {
|
|
return ErrResp(500, err, "")
|
|
}
|
|
yml, err := yaml.Marshal(conf)
|
|
if err != nil {
|
|
return ErrResp(500, err, "Failed marshal rule group")
|
|
}
|
|
u := withPath(*ctx.Req.URL, fmt.Sprintf("%s/%s", legacyRulerPrefix, ns))
|
|
return r.withReq(ctx, http.MethodPost, u, bytes.NewBuffer(yml), jsonExtractor(nil), nil)
|
|
}
|
|
|
|
func (r *LotexRuler) validateAndGetPrefix(ctx *models.ReqContext) (string, error) {
|
|
datasourceUID := web.Params(ctx.Req)[":DatasourceUID"]
|
|
if datasourceUID == "" {
|
|
return "", fmt.Errorf("datasource UID is invalid")
|
|
}
|
|
|
|
ds, err := r.DataProxy.DataSourceCache.GetDatasourceByUID(ctx.Req.Context(), datasourceUID, ctx.SignedInUser, ctx.SkipCache)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// Validate URL
|
|
if ds.Url == "" {
|
|
return "", fmt.Errorf("URL for this data source is empty")
|
|
}
|
|
|
|
prefix, ok := dsTypeToRulerPrefix[ds.Type]
|
|
if !ok {
|
|
return "", fmt.Errorf("unexpected datasource type. expecting loki or prometheus")
|
|
}
|
|
|
|
// If the datasource is Loki, there's nothing else for us to do - it doesn't have subtypes.
|
|
if ds.Type == LokiDatasourceType {
|
|
return prefix, nil
|
|
}
|
|
|
|
// A Prometheus datasource, can have many subtypes: Cortex, Mimir and vanilla Prometheus.
|
|
// Based on these subtypes, we want to use a different proxying path.
|
|
subtype := ctx.Query(subtypeQuery)
|
|
subTypePrefix, ok := subtypeToPrefix[subtype]
|
|
if !ok {
|
|
r.log.Debug(
|
|
"Unable to determine prometheus datasource subtype, using default prefix",
|
|
"datasource", ds.Uid, "datasourceType", ds.Type, "subtype", subtype, "prefix", prefix)
|
|
return prefix, nil
|
|
}
|
|
|
|
r.log.Debug("Determined prometheus datasource subtype",
|
|
"datasource", ds.Uid, "datasourceType", ds.Type, "subtype", subtype)
|
|
return subTypePrefix, nil
|
|
}
|
|
|
|
func withPath(u url.URL, newPath string) *url.URL {
|
|
// TODO: handle path escaping
|
|
u.Path = newPath
|
|
return &u
|
|
}
|