2025-02-18 13:06:31 +05:30
|
|
|
package alertmanager
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"context"
|
2025-10-03 19:47:15 +05:30
|
|
|
"encoding/json"
|
2025-02-18 13:06:31 +05:30
|
|
|
"io"
|
|
|
|
|
"net/http"
|
|
|
|
|
"time"
|
|
|
|
|
|
2025-03-20 21:01:41 +05:30
|
|
|
"github.com/SigNoz/signoz/pkg/errors"
|
|
|
|
|
"github.com/SigNoz/signoz/pkg/http/render"
|
|
|
|
|
"github.com/SigNoz/signoz/pkg/types/alertmanagertypes"
|
|
|
|
|
"github.com/SigNoz/signoz/pkg/types/authtypes"
|
2025-04-03 23:26:49 +05:30
|
|
|
"github.com/SigNoz/signoz/pkg/valuer"
|
2025-02-18 13:06:31 +05:30
|
|
|
"github.com/gorilla/mux"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
type API struct {
|
|
|
|
|
alertmanager Alertmanager
|
|
|
|
|
}
|
|
|
|
|
|
2025-02-20 14:14:09 +05:30
|
|
|
func NewAPI(alertmanager Alertmanager) *API {
|
2025-02-18 13:06:31 +05:30
|
|
|
return &API{
|
|
|
|
|
alertmanager: alertmanager,
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-03-05 10:01:02 +05:30
|
|
|
func (api *API) GetAlerts(rw http.ResponseWriter, req *http.Request) {
|
2025-02-18 13:06:31 +05:30
|
|
|
ctx, cancel := context.WithTimeout(req.Context(), 30*time.Second)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
2025-04-26 15:50:02 +05:30
|
|
|
claims, err := authtypes.ClaimsFromContext(ctx)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
2025-02-18 13:06:31 +05:30
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
params, err := alertmanagertypes.NewGettableAlertsParams(req)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
alerts, err := api.alertmanager.GetAlerts(ctx, claims.OrgID, params)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
render.Success(rw, http.StatusOK, alerts)
|
|
|
|
|
}
|
|
|
|
|
|
2025-03-05 10:01:02 +05:30
|
|
|
func (api *API) TestReceiver(rw http.ResponseWriter, req *http.Request) {
|
2025-02-18 13:06:31 +05:30
|
|
|
ctx, cancel := context.WithTimeout(req.Context(), 30*time.Second)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
2025-04-26 15:50:02 +05:30
|
|
|
claims, err := authtypes.ClaimsFromContext(ctx)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
2025-02-18 13:06:31 +05:30
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
body, err := io.ReadAll(req.Body)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
defer req.Body.Close() //nolint:errcheck
|
|
|
|
|
|
|
|
|
|
receiver, err := alertmanagertypes.NewReceiver(string(body))
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
err = api.alertmanager.TestReceiver(ctx, claims.OrgID, receiver)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
render.Success(rw, http.StatusNoContent, nil)
|
|
|
|
|
}
|
|
|
|
|
|
2025-03-05 10:01:02 +05:30
|
|
|
func (api *API) ListChannels(rw http.ResponseWriter, req *http.Request) {
|
2025-02-18 13:06:31 +05:30
|
|
|
ctx, cancel := context.WithTimeout(req.Context(), 30*time.Second)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
2025-04-26 15:50:02 +05:30
|
|
|
claims, err := authtypes.ClaimsFromContext(ctx)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
2025-02-18 13:06:31 +05:30
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
2025-02-20 14:14:09 +05:30
|
|
|
channels, err := api.alertmanager.ListChannels(ctx, claims.OrgID)
|
2025-02-18 13:06:31 +05:30
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
2025-03-14 21:16:37 +05:30
|
|
|
// This ensures that the UI receives an empty array instead of null
|
|
|
|
|
if len(channels) == 0 {
|
|
|
|
|
channels = make([]*alertmanagertypes.Channel, 0)
|
|
|
|
|
}
|
|
|
|
|
|
2025-02-20 14:14:09 +05:30
|
|
|
render.Success(rw, http.StatusOK, channels)
|
2025-02-18 13:06:31 +05:30
|
|
|
}
|
|
|
|
|
|
2025-03-05 10:01:02 +05:30
|
|
|
func (api *API) ListAllChannels(rw http.ResponseWriter, req *http.Request) {
|
|
|
|
|
ctx, cancel := context.WithTimeout(req.Context(), 30*time.Second)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
|
|
channels, err := api.alertmanager.ListAllChannels(ctx)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
render.Success(rw, http.StatusOK, channels)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (api *API) GetChannelByID(rw http.ResponseWriter, req *http.Request) {
|
2025-02-18 13:06:31 +05:30
|
|
|
ctx, cancel := context.WithTimeout(req.Context(), 30*time.Second)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
2025-04-26 15:50:02 +05:30
|
|
|
claims, err := authtypes.ClaimsFromContext(ctx)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
2025-02-18 13:06:31 +05:30
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
vars := mux.Vars(req)
|
|
|
|
|
if vars == nil {
|
|
|
|
|
render.Error(rw, errors.Newf(errors.TypeInvalidInput, errors.CodeInvalidInput, "id is required in path"))
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
idString, ok := vars["id"]
|
|
|
|
|
if !ok {
|
|
|
|
|
render.Error(rw, errors.Newf(errors.TypeInvalidInput, errors.CodeInvalidInput, "id is required in path"))
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
2025-04-03 23:26:49 +05:30
|
|
|
id, err := valuer.NewUUID(idString)
|
2025-02-18 13:06:31 +05:30
|
|
|
if err != nil {
|
2025-04-03 23:26:49 +05:30
|
|
|
render.Error(rw, errors.Newf(errors.TypeInvalidInput, errors.CodeInvalidInput, "id is not a valid uuid-v7"))
|
2025-02-18 13:06:31 +05:30
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
2025-02-20 14:14:09 +05:30
|
|
|
channel, err := api.alertmanager.GetChannelByID(ctx, claims.OrgID, id)
|
2025-02-18 13:06:31 +05:30
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
render.Success(rw, http.StatusOK, channel)
|
|
|
|
|
}
|
|
|
|
|
|
2025-03-05 10:01:02 +05:30
|
|
|
func (api *API) UpdateChannelByID(rw http.ResponseWriter, req *http.Request) {
|
2025-02-18 13:06:31 +05:30
|
|
|
ctx, cancel := context.WithTimeout(req.Context(), 30*time.Second)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
2025-04-26 15:50:02 +05:30
|
|
|
claims, err := authtypes.ClaimsFromContext(ctx)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
2025-02-18 13:06:31 +05:30
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
2025-03-05 10:01:02 +05:30
|
|
|
vars := mux.Vars(req)
|
|
|
|
|
if vars == nil {
|
|
|
|
|
render.Error(rw, errors.Newf(errors.TypeInvalidInput, errors.CodeInvalidInput, "id is required in path"))
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
idString, ok := vars["id"]
|
|
|
|
|
if !ok {
|
|
|
|
|
render.Error(rw, errors.Newf(errors.TypeInvalidInput, errors.CodeInvalidInput, "id is required in path"))
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
2025-04-03 23:26:49 +05:30
|
|
|
id, err := valuer.NewUUID(idString)
|
2025-03-05 10:01:02 +05:30
|
|
|
if err != nil {
|
2025-04-03 23:26:49 +05:30
|
|
|
render.Error(rw, errors.Newf(errors.TypeInvalidInput, errors.CodeInvalidInput, "id is not a valid uuid-v7"))
|
2025-03-05 10:01:02 +05:30
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
2025-02-18 13:06:31 +05:30
|
|
|
body, err := io.ReadAll(req.Body)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
defer req.Body.Close() //nolint:errcheck
|
|
|
|
|
|
|
|
|
|
receiver, err := alertmanagertypes.NewReceiver(string(body))
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
2025-03-05 10:01:02 +05:30
|
|
|
err = api.alertmanager.UpdateChannelByReceiverAndID(ctx, claims.OrgID, receiver, id)
|
2025-02-18 13:06:31 +05:30
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
render.Success(rw, http.StatusNoContent, nil)
|
|
|
|
|
}
|
|
|
|
|
|
2025-03-05 10:01:02 +05:30
|
|
|
func (api *API) DeleteChannelByID(rw http.ResponseWriter, req *http.Request) {
|
2025-02-18 13:06:31 +05:30
|
|
|
ctx, cancel := context.WithTimeout(req.Context(), 30*time.Second)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
2025-04-26 15:50:02 +05:30
|
|
|
claims, err := authtypes.ClaimsFromContext(ctx)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
2025-02-18 13:06:31 +05:30
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
vars := mux.Vars(req)
|
|
|
|
|
if vars == nil {
|
|
|
|
|
render.Error(rw, errors.Newf(errors.TypeInvalidInput, errors.CodeInvalidInput, "id is required in path"))
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
idString, ok := vars["id"]
|
|
|
|
|
if !ok {
|
|
|
|
|
render.Error(rw, errors.Newf(errors.TypeInvalidInput, errors.CodeInvalidInput, "id is required in path"))
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
2025-04-03 23:26:49 +05:30
|
|
|
id, err := valuer.NewUUID(idString)
|
2025-02-18 13:06:31 +05:30
|
|
|
if err != nil {
|
2025-04-03 23:26:49 +05:30
|
|
|
render.Error(rw, errors.Newf(errors.TypeInvalidInput, errors.CodeInvalidInput, "id is not a valid uuid-v7"))
|
2025-02-18 13:06:31 +05:30
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
2025-02-20 14:14:09 +05:30
|
|
|
err = api.alertmanager.DeleteChannelByID(ctx, claims.OrgID, id)
|
2025-02-18 13:06:31 +05:30
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
2025-02-20 14:14:09 +05:30
|
|
|
render.Success(rw, http.StatusNoContent, nil)
|
|
|
|
|
}
|
|
|
|
|
|
2025-03-05 10:01:02 +05:30
|
|
|
func (api *API) CreateChannel(rw http.ResponseWriter, req *http.Request) {
|
2025-02-20 14:14:09 +05:30
|
|
|
ctx, cancel := context.WithTimeout(req.Context(), 30*time.Second)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
2025-04-26 15:50:02 +05:30
|
|
|
claims, err := authtypes.ClaimsFromContext(ctx)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
2025-02-20 14:14:09 +05:30
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
body, err := io.ReadAll(req.Body)
|
2025-02-18 13:06:31 +05:30
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
2025-02-20 14:14:09 +05:30
|
|
|
defer req.Body.Close() //nolint:errcheck
|
2025-02-18 13:06:31 +05:30
|
|
|
|
2025-02-20 14:14:09 +05:30
|
|
|
receiver, err := alertmanagertypes.NewReceiver(string(body))
|
2025-02-18 13:06:31 +05:30
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
2025-02-20 14:14:09 +05:30
|
|
|
err = api.alertmanager.CreateChannel(ctx, claims.OrgID, receiver)
|
2025-02-18 13:06:31 +05:30
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
render.Success(rw, http.StatusNoContent, nil)
|
|
|
|
|
}
|
2025-10-03 19:47:15 +05:30
|
|
|
|
|
|
|
|
func (api *API) CreateRoutePolicy(rw http.ResponseWriter, req *http.Request) {
|
|
|
|
|
ctx, cancel := context.WithTimeout(req.Context(), 30*time.Second)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
|
|
body, err := io.ReadAll(req.Body)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
defer req.Body.Close()
|
|
|
|
|
var policy alertmanagertypes.PostableRoutePolicy
|
|
|
|
|
err = json.Unmarshal(body, &policy)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
policy.ExpressionKind = alertmanagertypes.PolicyBasedExpression
|
|
|
|
|
|
|
|
|
|
// Validate the postable route
|
|
|
|
|
if err := policy.Validate(); err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
result, err := api.alertmanager.CreateRoutePolicy(ctx, &policy)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
render.Success(rw, http.StatusCreated, result)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (api *API) GetAllRoutePolicies(rw http.ResponseWriter, req *http.Request) {
|
|
|
|
|
ctx, cancel := context.WithTimeout(req.Context(), 30*time.Second)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
|
|
policies, err := api.alertmanager.GetAllRoutePolicies(ctx)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
render.Success(rw, http.StatusOK, policies)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (api *API) GetRoutePolicyByID(rw http.ResponseWriter, req *http.Request) {
|
|
|
|
|
ctx, cancel := context.WithTimeout(req.Context(), 30*time.Second)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
|
|
vars := mux.Vars(req)
|
|
|
|
|
policyID := vars["id"]
|
|
|
|
|
if policyID == "" {
|
|
|
|
|
render.Error(rw, errors.NewInvalidInputf(errors.CodeInvalidInput, "policy ID is required"))
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
policy, err := api.alertmanager.GetRoutePolicyByID(ctx, policyID)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
render.Success(rw, http.StatusOK, policy)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (api *API) DeleteRoutePolicyByID(rw http.ResponseWriter, req *http.Request) {
|
|
|
|
|
ctx, cancel := context.WithTimeout(req.Context(), 30*time.Second)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
|
|
vars := mux.Vars(req)
|
|
|
|
|
policyID := vars["id"]
|
|
|
|
|
if policyID == "" {
|
|
|
|
|
render.Error(rw, errors.NewInvalidInputf(errors.CodeInvalidInput, "policy ID is required"))
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
err := api.alertmanager.DeleteRoutePolicyByID(ctx, policyID)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
render.Success(rw, http.StatusNoContent, nil)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (api *API) UpdateRoutePolicy(rw http.ResponseWriter, req *http.Request) {
|
|
|
|
|
ctx, cancel := context.WithTimeout(req.Context(), 30*time.Second)
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
|
|
vars := mux.Vars(req)
|
|
|
|
|
policyID := vars["id"]
|
|
|
|
|
if policyID == "" {
|
|
|
|
|
render.Error(rw, errors.NewInvalidInputf(errors.CodeInvalidInput, "policy ID is required"))
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
body, err := io.ReadAll(req.Body)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
defer req.Body.Close()
|
|
|
|
|
var policy alertmanagertypes.PostableRoutePolicy
|
|
|
|
|
err = json.Unmarshal(body, &policy)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
policy.ExpressionKind = alertmanagertypes.PolicyBasedExpression
|
|
|
|
|
|
|
|
|
|
// Validate the postable route
|
|
|
|
|
if err := policy.Validate(); err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
result, err := api.alertmanager.UpdateRoutePolicyByID(ctx, policyID, &policy)
|
|
|
|
|
if err != nil {
|
|
|
|
|
render.Error(rw, err)
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
render.Success(rw, http.StatusOK, result)
|
|
|
|
|
}
|