grafana/pkg/services/ngalert/notifier/config_test.go

164 lines
5.0 KiB
Go
Raw Normal View History

package notifier
import (
"errors"
"io/ioutil"
"path/filepath"
"testing"
Inhouse alerting api (#33129) * init * autogens AM route * POST dashboards/db spec * POST alert-notifications spec * fix description * re inits vendor, updates grafana to master * go mod updates * alerting routes * renames to receivers * prometheus endpoints * align config endpoint with cortex, include templates * Change grafana receiver type * Update receivers.go * rename struct to stop swagger thrashing * add rules API * index html * standalone swagger ui html page * Update README.md * Expose GrafanaManagedAlert properties * Some fixes - /api/v1/rules/{Namespace} should return a map - update ExtendedUpsertAlertDefinitionCommand properties * am alerts routes * rename prom swagger section for clarity, remove example endpoints * Add missing json and yaml tags * folder perms * make folders POST again * fix grafana receiver type * rename fodler->namespace for perms * make ruler json again * PR fixes * silences * fix Ok -> Ack * Add id to POST /api/v1/silences (#9) Signed-off-by: Ganesh Vernekar <cs15btech11018@iith.ac.in> * Add POST /api/v1/alerts (#10) Signed-off-by: Ganesh Vernekar <cs15btech11018@iith.ac.in> * fix silences * Add testing endpoints * removes grpc replace directives * [wip] starts validation * pkg cleanup * go mod tidy * ignores vendor dir * Change response type for Cortex/Loki alerts * receiver unmarshaling tests * ability to split routes between AM & Grafana * api marshaling & validation * begins work on routing lib * [hack] ignores embedded field in generation * path specific datasource for alerting * align endpoint names with cloud * single route per Alerting config * removes unused routing pkg * regens spec * adds datasource param to ruler/prom route paths * Modifications for supporting migration * Apply suggestions from code review * hack for cleaning circular refs in swagger definition * generates files * minor fixes for prom endpoints * decorate prom apis with required: true where applicable * Revert "generates files" This reverts commit ef7e97558477d79bcad416e043b04dbd04a2c8f7. * removes server autogen * Update imported structs from ngalert * Fix listing rules response * Update github.com/prometheus/common dependency * Update get silence response * Update get silences response * adds ruler validation & backend switching * Fix GET /alertmanager/{DatasourceId}/config/api/v1/alerts response * Distinct gettable and postable grafana receivers * Remove permissions routes * Latest JSON specs * Fix testing routes * inline yaml annotation on apirulenode * yaml test & yamlv3 + comments * Fix yaml annotations for embedded type * Rename DatasourceId path parameter * Implement Backend.String() * backend zero value is a real backend * exports DiscoveryBase * Fix GO initialisms * Silences: Use PostableSilence as the base struct for creating silences * Use type alias instead of struct embedding * More fixes to alertmanager silencing routes * post and spec JSONs * Split rule config to postable/gettable * Fix empty POST /silences payload Recreating the generated JSON specs fixes the issue without further modifications * better yaml unmarshaling for nested yaml docs in cortex-am configs * regens spec * re-adds config.receivers * omitempty to align with prometheus API behavior * Prefix routes with /api * Update Alertmanager models * Make adjustments to follow the Alertmanager API * ruler: add for and annotations to grafana alert (#45) * Modify testing API routes * Fix grafana rule for field type * Move PostableUserConfig validation to this library * Fix PostableUserConfig YAML encoding/decoding * Use common fields for grafana and lotex rules * Add namespace id in GettableGrafanaRule * Apply suggestions from code review * fixup * more changes * Apply suggestions from code review * aligns structure pre merge * fix new imports & tests * updates tooling readme * goimports * lint * more linting!! * revive lint Co-authored-by: Sofia Papagiannaki <papagian@gmail.com> Co-authored-by: Domas <domasx2@gmail.com> Co-authored-by: Sofia Papagiannaki <papagian@users.noreply.github.com> Co-authored-by: Ganesh Vernekar <15064823+codesome@users.noreply.github.com> Co-authored-by: gotjosh <josue@grafana.com> Co-authored-by: David Parrott <stomp.box.yo@gmail.com> Co-authored-by: Kyle Brandt <kyle@grafana.com>
2021-04-19 13:26:04 -05:00
api "github.com/grafana/grafana/pkg/services/ngalert/api/tooling/definitions"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
func TestPersistTemplates(t *testing.T) {
tc := []struct {
name string
templates map[string]string
existingTemplates map[string]string
expectedPaths []string
expectedError error
expectedChange bool
}{
{
name: "With valid templates file names, it persists successfully",
templates: map[string]string{"email.template": "a perfectly fine template"},
expectedChange: true,
expectedError: nil,
expectedPaths: []string{"email.template"},
},
{
name: "With a invalid filename, it fails",
templates: map[string]string{"adirectory/email.template": "a perfectly fine template"},
expectedError: errors.New("template file name 'adirectory/email.template' is not valid"),
},
{
name: "with a template that has the same name but different content to an existing one",
existingTemplates: map[string]string{"email.template": "a perfectly fine template"},
templates: map[string]string{"email.template": "a completely different content"},
expectedChange: true,
expectedError: nil,
expectedPaths: []string{"email.template"},
},
{
name: "with a template that has the same name and the same content as an existing one",
existingTemplates: map[string]string{"email.template": "a perfectly fine template"},
templates: map[string]string{"email.template": "a perfectly fine template"},
expectedChange: false,
expectedError: nil,
expectedPaths: []string{"email.template"},
},
{
name: "with two new template files, it changes the template tree",
existingTemplates: map[string]string{"email.template": "a perfectly fine template"},
templates: map[string]string{"slack.template": "a perfectly fine template", "webhook.template": "a webhook template"},
expectedChange: true,
expectedError: nil,
expectedPaths: []string{"slack.template", "webhook.template"},
},
{
name: "when we remove a template file from the list, it changes the template tree",
existingTemplates: map[string]string{"slack.template": "a perfectly fine template", "webhook.template": "a webhook template"},
templates: map[string]string{"slack.template": "a perfectly fine template"},
expectedChange: true,
expectedError: nil,
expectedPaths: []string{"slack.template"},
},
}
for _, tt := range tc {
t.Run(tt.name, func(t *testing.T) {
dir := t.TempDir()
// Write "existing files"
for name, content := range tt.existingTemplates {
err := ioutil.WriteFile(filepath.Join(dir, name), []byte(content), 0644)
require.NoError(t, err)
}
c := &api.PostableUserConfig{TemplateFiles: tt.templates}
paths, changed, persistErr := PersistTemplates(c, dir)
files := map[string]string{}
readFiles, err := ioutil.ReadDir(dir)
require.NoError(t, err)
for _, f := range readFiles {
if f.IsDir() || f.Name() == "" {
continue
}
// Safe to disable, this is a test.
// nolint:gosec
content, err := ioutil.ReadFile(filepath.Join(dir, f.Name()))
// nolint:gosec
require.NoError(t, err)
files[f.Name()] = string(content)
}
// Given we use a temporary directory in tests, we need to prepend the expected paths with it.
for i, p := range tt.expectedPaths {
tt.expectedPaths[i] = filepath.Join(dir, p)
}
require.Equal(t, tt.expectedError, persistErr)
require.ElementsMatch(t, tt.expectedPaths, paths)
require.Equal(t, tt.expectedChange, changed)
if tt.expectedError == nil {
require.Equal(t, tt.templates, files)
}
})
}
}
func TestLoad(t *testing.T) {
tc := []struct {
name string
rawConfig string
expectedTemplates map[string]string
expectedError error
}{
{
name: "with a valid config and template",
rawConfig: `
{
"alertmanager_config": {
"global": {
"smtp_from": "noreply@grafana.net"
},
"route": {
"receiver": "email"
},
"receivers": [
{
"name": "email"
}
]
},
"template_files": {
"email.template": "something with a pretty good content"
}
}
`,
expectedTemplates: map[string]string{"email.template": "something with a pretty good content"},
},
{
name: "with an empty configuration, it is not valid.",
rawConfig: "{}",
expectedError: errors.New("unable to parse Alertmanager configuration: no route provided in config"),
},
}
for _, tt := range tc {
t.Run(tt.name, func(t *testing.T) {
c, err := Load([]byte(tt.rawConfig))
if tt.expectedError != nil {
assert.Nil(t, c)
assert.Equal(t, tt.expectedError.Error(), err.Error())
} else {
require.NoError(t, err)
assert.NotNil(t, c.TemplateFiles)
assert.Equal(t, tt.expectedTemplates, c.TemplateFiles)
}
})
}
}