debian-mirror-gitlab/app/services/projects/alerting/notify_service.rb

62 lines
1.5 KiB
Ruby
Raw Normal View History

2020-03-13 15:44:24 +05:30
# frozen_string_literal: true
module Projects
module Alerting
class NotifyService < BaseService
include Gitlab::Utils::StrongMemoize
2020-04-08 14:13:33 +05:30
include IncidentManagement::Settings
2020-03-13 15:44:24 +05:30
def execute(token)
return forbidden unless alerts_service_activated?
return unauthorized unless valid_token?(token)
2020-04-08 14:13:33 +05:30
process_incident_issues if process_issues?
send_alert_email if send_email?
2020-03-13 15:44:24 +05:30
ServiceResponse.success
rescue Gitlab::Alerting::NotificationPayloadParser::BadPayloadError
bad_request
end
private
delegate :alerts_service, :alerts_service_activated?, to: :project
2020-04-08 14:13:33 +05:30
def send_email?
incident_management_setting.send_email?
end
2020-03-13 15:44:24 +05:30
def process_incident_issues
IncidentManagement::ProcessAlertWorker
.perform_async(project.id, parsed_payload)
end
2020-04-08 14:13:33 +05:30
def send_alert_email
notification_service
.async
.prometheus_alerts_fired(project, [parsed_payload])
end
2020-03-13 15:44:24 +05:30
def parsed_payload
Gitlab::Alerting::NotificationPayloadParser.call(params.to_h)
end
def valid_token?(token)
token == alerts_service.token
end
def bad_request
2020-04-22 19:07:51 +05:30
ServiceResponse.error(message: 'Bad Request', http_status: :bad_request)
2020-03-13 15:44:24 +05:30
end
def unauthorized
2020-04-22 19:07:51 +05:30
ServiceResponse.error(message: 'Unauthorized', http_status: :unauthorized)
2020-03-13 15:44:24 +05:30
end
def forbidden
2020-04-22 19:07:51 +05:30
ServiceResponse.error(message: 'Forbidden', http_status: :forbidden)
2020-03-13 15:44:24 +05:30
end
end
end
end