debian-mirror-gitlab/app/services/projects/alerting/notify_service.rb

122 lines
3.1 KiB
Ruby
Raw Normal View History

2020-03-13 15:44:24 +05:30
# frozen_string_literal: true
module Projects
module Alerting
class NotifyService < BaseService
include Gitlab::Utils::StrongMemoize
2020-07-28 23:09:34 +05:30
include ::IncidentManagement::Settings
2020-03-13 15:44:24 +05:30
def execute(token)
return forbidden unless alerts_service_activated?
return unauthorized unless valid_token?(token)
2020-06-23 00:09:42 +05:30
alert = process_alert
2020-05-24 23:13:21 +05:30
return bad_request unless alert.persisted?
process_incident_issues(alert) if process_issues?
2020-04-08 14:13:33 +05:30
send_alert_email if send_email?
2020-03-13 15:44:24 +05:30
ServiceResponse.success
rescue Gitlab::Alerting::NotificationPayloadParser::BadPayloadError
bad_request
end
private
delegate :alerts_service, :alerts_service_activated?, to: :project
2020-05-24 23:13:21 +05:30
def am_alert_params
2020-06-23 00:09:42 +05:30
strong_memoize(:am_alert_params) do
Gitlab::AlertManagement::AlertParams.from_generic_alert(project: project, payload: params.to_h)
end
end
def process_alert
existing_alert = find_alert_by_fingerprint(am_alert_params[:fingerprint])
if existing_alert
process_existing_alert(existing_alert)
else
create_alert
end
end
def process_existing_alert(alert)
2020-11-24 15:15:51 +05:30
if am_alert_params[:ended_at].present?
process_resolved_alert(alert)
else
alert.register_new_event!
end
alert
end
def process_resolved_alert(alert)
return unless auto_close_incident?
if alert.resolve(am_alert_params[:ended_at])
close_issue(alert.issue)
end
alert
end
def close_issue(issue)
return if issue.blank? || issue.closed?
::Issues::CloseService
.new(project, User.alert_bot)
.execute(issue, system_note: false)
SystemNoteService.auto_resolve_prometheus_alert(issue, project, User.alert_bot) if issue.reset.closed?
2020-05-24 23:13:21 +05:30
end
def create_alert
2020-11-24 15:15:51 +05:30
alert = AlertManagement::Alert.create(am_alert_params.except(:ended_at))
2020-06-23 00:09:42 +05:30
alert.execute_services if alert.persisted?
2020-11-24 15:15:51 +05:30
SystemNoteService.create_new_alert(alert, 'Generic Alert Endpoint')
2020-06-23 00:09:42 +05:30
alert
end
def find_alert_by_fingerprint(fingerprint)
return unless fingerprint
2020-07-28 23:09:34 +05:30
AlertManagement::Alert.not_resolved.for_fingerprint(project, fingerprint).first
2020-05-24 23:13:21 +05:30
end
def process_incident_issues(alert)
2020-06-23 00:09:42 +05:30
return if alert.issue
2020-07-28 23:09:34 +05:30
::IncidentManagement::ProcessAlertWorker.perform_async(nil, nil, alert.id)
2020-03-13 15:44:24 +05:30
end
2020-04-08 14:13:33 +05:30
def send_alert_email
notification_service
.async
.prometheus_alerts_fired(project, [parsed_payload])
end
2020-03-13 15:44:24 +05:30
def parsed_payload
2020-07-28 23:09:34 +05:30
Gitlab::Alerting::NotificationPayloadParser.call(params.to_h, project)
2020-03-13 15:44:24 +05:30
end
def valid_token?(token)
token == alerts_service.token
end
def bad_request
2020-04-22 19:07:51 +05:30
ServiceResponse.error(message: 'Bad Request', http_status: :bad_request)
2020-03-13 15:44:24 +05:30
end
def unauthorized
2020-04-22 19:07:51 +05:30
ServiceResponse.error(message: 'Unauthorized', http_status: :unauthorized)
2020-03-13 15:44:24 +05:30
end
def forbidden
2020-04-22 19:07:51 +05:30
ServiceResponse.error(message: 'Forbidden', http_status: :forbidden)
2020-03-13 15:44:24 +05:30
end
end
end
end