2020-03-13 15:44:24 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
module Projects
|
|
|
|
module Alerting
|
|
|
|
class NotifyService < BaseService
|
|
|
|
include Gitlab::Utils::StrongMemoize
|
2020-04-08 14:13:33 +05:30
|
|
|
include IncidentManagement::Settings
|
2020-03-13 15:44:24 +05:30
|
|
|
|
|
|
|
def execute(token)
|
|
|
|
return forbidden unless alerts_service_activated?
|
|
|
|
return unauthorized unless valid_token?(token)
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
process_incident_issues if process_issues?
|
|
|
|
send_alert_email if send_email?
|
2020-03-13 15:44:24 +05:30
|
|
|
|
|
|
|
ServiceResponse.success
|
|
|
|
rescue Gitlab::Alerting::NotificationPayloadParser::BadPayloadError
|
|
|
|
bad_request
|
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
delegate :alerts_service, :alerts_service_activated?, to: :project
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
def send_email?
|
|
|
|
incident_management_setting.send_email?
|
|
|
|
end
|
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
def process_incident_issues
|
|
|
|
IncidentManagement::ProcessAlertWorker
|
|
|
|
.perform_async(project.id, parsed_payload)
|
|
|
|
end
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
def send_alert_email
|
|
|
|
notification_service
|
|
|
|
.async
|
|
|
|
.prometheus_alerts_fired(project, [parsed_payload])
|
|
|
|
end
|
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
def parsed_payload
|
|
|
|
Gitlab::Alerting::NotificationPayloadParser.call(params.to_h)
|
|
|
|
end
|
|
|
|
|
|
|
|
def valid_token?(token)
|
|
|
|
token == alerts_service.token
|
|
|
|
end
|
|
|
|
|
|
|
|
def bad_request
|
|
|
|
ServiceResponse.error(message: 'Bad Request', http_status: 400)
|
|
|
|
end
|
|
|
|
|
|
|
|
def unauthorized
|
|
|
|
ServiceResponse.error(message: 'Unauthorized', http_status: 401)
|
|
|
|
end
|
|
|
|
|
|
|
|
def forbidden
|
|
|
|
ServiceResponse.error(message: 'Forbidden', http_status: 403)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|