mirror of
https://github.com/grafana/grafana.git
synced 2024-11-29 12:14:08 -06:00
747 lines
24 KiB
Go
747 lines
24 KiB
Go
package setting
|
|
|
|
import (
|
|
"bufio"
|
|
"math/rand"
|
|
"net/url"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"runtime"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"gopkg.in/ini.v1"
|
|
)
|
|
|
|
const (
|
|
windows = "windows"
|
|
)
|
|
|
|
func TestLoadingSettings(t *testing.T) {
|
|
skipStaticRootValidation = true
|
|
|
|
t.Run("Given the default ini files", func(t *testing.T) {
|
|
cfg := NewCfg()
|
|
err := cfg.Load(CommandLineArgs{HomePath: "../../", Config: "../../conf/defaults.ini"})
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, "admin", cfg.AdminUser)
|
|
require.Equal(t, "http://localhost:3000/", cfg.RendererCallbackUrl)
|
|
})
|
|
|
|
t.Run("default.ini should have no semi-colon commented entries", func(t *testing.T) {
|
|
file, err := os.Open("../../conf/defaults.ini")
|
|
if err != nil {
|
|
t.Errorf("failed to load defaults.ini file: %v", err)
|
|
}
|
|
defer func() {
|
|
err := file.Close()
|
|
require.Nil(t, err)
|
|
}()
|
|
|
|
scanner := bufio.NewScanner(file)
|
|
for scanner.Scan() {
|
|
// This only catches values commented out with ";" and will not catch those that are commented out with "#".
|
|
if strings.HasPrefix(scanner.Text(), ";") {
|
|
t.Errorf("entries in defaults.ini must not be commented or environment variables will not work: %v", scanner.Text())
|
|
}
|
|
}
|
|
})
|
|
|
|
t.Run("sample.ini should load successfully", func(t *testing.T) {
|
|
customInitPath := CustomInitPath
|
|
CustomInitPath = "conf/sample.ini"
|
|
cfg := NewCfg()
|
|
err := cfg.Load(CommandLineArgs{HomePath: "../../"})
|
|
require.Nil(t, err)
|
|
// Restore CustomInitPath to avoid side effects.
|
|
CustomInitPath = customInitPath
|
|
})
|
|
|
|
t.Run("Should be able to override via environment variables", func(t *testing.T) {
|
|
err := os.Setenv("GF_SECURITY_ADMIN_USER", "superduper")
|
|
require.NoError(t, err)
|
|
|
|
cfg := NewCfg()
|
|
err = cfg.Load(CommandLineArgs{HomePath: "../../"})
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, "superduper", cfg.AdminUser)
|
|
require.Equal(t, filepath.Join(HomePath, "data"), cfg.DataPath)
|
|
require.Equal(t, filepath.Join(cfg.DataPath, "log"), cfg.LogsPath)
|
|
})
|
|
|
|
t.Run("Should replace password when defined in environment", func(t *testing.T) {
|
|
err := os.Setenv("GF_SECURITY_ADMIN_PASSWORD", "supersecret")
|
|
require.NoError(t, err)
|
|
|
|
cfg := NewCfg()
|
|
err = cfg.Load(CommandLineArgs{HomePath: "../../"})
|
|
require.Nil(t, err)
|
|
|
|
require.Contains(t, appliedEnvOverrides, "GF_SECURITY_ADMIN_PASSWORD=*********")
|
|
})
|
|
|
|
t.Run("Should replace password in URL when url environment is defined", func(t *testing.T) {
|
|
err := os.Setenv("GF_DATABASE_URL", "mysql://user:secret@localhost:3306/database")
|
|
require.NoError(t, err)
|
|
|
|
cfg := NewCfg()
|
|
err = cfg.Load(CommandLineArgs{HomePath: "../../"})
|
|
require.Nil(t, err)
|
|
|
|
require.Contains(t, appliedEnvOverrides, "GF_DATABASE_URL=mysql://user:xxxxx@localhost:3306/database")
|
|
})
|
|
|
|
t.Run("Should get property map from command line args array", func(t *testing.T) {
|
|
cfg := NewCfg()
|
|
props := cfg.getCommandLineProperties([]string{"cfg:test=value", "cfg:map.test=1"})
|
|
|
|
require.Equal(t, 2, len(props))
|
|
require.Equal(t, "value", props["test"])
|
|
require.Equal(t, "1", props["map.test"])
|
|
})
|
|
|
|
t.Run("Should be able to override via command line", func(t *testing.T) {
|
|
if runtime.GOOS == windows {
|
|
cfg := NewCfg()
|
|
err := cfg.Load(CommandLineArgs{
|
|
HomePath: "../../",
|
|
Args: []string{`cfg:paths.data=c:\tmp\data`, `cfg:paths.logs=c:\tmp\logs`},
|
|
})
|
|
require.Nil(t, err)
|
|
require.Equal(t, `c:\tmp\data`, cfg.DataPath)
|
|
require.Equal(t, `c:\tmp\logs`, cfg.LogsPath)
|
|
} else {
|
|
cfg := NewCfg()
|
|
err := cfg.Load(CommandLineArgs{
|
|
HomePath: "../../",
|
|
Args: []string{"cfg:paths.data=/tmp/data", "cfg:paths.logs=/tmp/logs"},
|
|
})
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, "/tmp/data", cfg.DataPath)
|
|
require.Equal(t, "/tmp/logs", cfg.LogsPath)
|
|
}
|
|
})
|
|
|
|
t.Run("Should be able to override defaults via command line", func(t *testing.T) {
|
|
cfg := NewCfg()
|
|
err := cfg.Load(CommandLineArgs{
|
|
HomePath: "../../",
|
|
Args: []string{
|
|
"cfg:default.server.domain=test2",
|
|
},
|
|
Config: filepath.Join(HomePath, "pkg/setting/testdata/override.ini"),
|
|
})
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, "test2", cfg.Domain)
|
|
})
|
|
|
|
t.Run("Defaults can be overridden in specified config file", func(t *testing.T) {
|
|
if runtime.GOOS == windows {
|
|
cfg := NewCfg()
|
|
err := cfg.Load(CommandLineArgs{
|
|
HomePath: "../../",
|
|
Config: filepath.Join(HomePath, "pkg/setting/testdata/override_windows.ini"),
|
|
Args: []string{`cfg:default.paths.data=c:\tmp\data`},
|
|
})
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, `c:\tmp\override`, cfg.DataPath)
|
|
} else {
|
|
cfg := NewCfg()
|
|
err := cfg.Load(CommandLineArgs{
|
|
HomePath: "../../",
|
|
Config: filepath.Join(HomePath, "pkg/setting/testdata/override.ini"),
|
|
Args: []string{"cfg:default.paths.data=/tmp/data"},
|
|
})
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, "/tmp/override", cfg.DataPath)
|
|
}
|
|
})
|
|
|
|
t.Run("Command line overrides specified config file", func(t *testing.T) {
|
|
if runtime.GOOS == windows {
|
|
cfg := NewCfg()
|
|
err := cfg.Load(CommandLineArgs{
|
|
HomePath: "../../",
|
|
Config: filepath.Join(HomePath, "pkg/setting/testdata/override_windows.ini"),
|
|
Args: []string{`cfg:paths.data=c:\tmp\data`},
|
|
})
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, `c:\tmp\data`, cfg.DataPath)
|
|
} else {
|
|
cfg := NewCfg()
|
|
err := cfg.Load(CommandLineArgs{
|
|
HomePath: "../../",
|
|
Config: filepath.Join(HomePath, "pkg/setting/testdata/override.ini"),
|
|
Args: []string{"cfg:paths.data=/tmp/data"},
|
|
})
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, "/tmp/data", cfg.DataPath)
|
|
}
|
|
})
|
|
|
|
t.Run("Can use environment variables in config values", func(t *testing.T) {
|
|
if runtime.GOOS == windows {
|
|
err := os.Setenv("GF_DATA_PATH", `c:\tmp\env_override`)
|
|
require.NoError(t, err)
|
|
cfg := NewCfg()
|
|
err = cfg.Load(CommandLineArgs{
|
|
HomePath: "../../",
|
|
Args: []string{"cfg:paths.data=${GF_DATA_PATH}"},
|
|
})
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, `c:\tmp\env_override`, cfg.DataPath)
|
|
} else {
|
|
err := os.Setenv("GF_DATA_PATH", "/tmp/env_override")
|
|
require.NoError(t, err)
|
|
cfg := NewCfg()
|
|
err = cfg.Load(CommandLineArgs{
|
|
HomePath: "../../",
|
|
Args: []string{"cfg:paths.data=${GF_DATA_PATH}"},
|
|
})
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, "/tmp/env_override", cfg.DataPath)
|
|
}
|
|
})
|
|
|
|
t.Run("instance_name default to hostname even if hostname env is empty", func(t *testing.T) {
|
|
cfg := NewCfg()
|
|
err := cfg.Load(CommandLineArgs{
|
|
HomePath: "../../",
|
|
})
|
|
require.Nil(t, err)
|
|
|
|
hostname, err := os.Hostname()
|
|
require.Nil(t, err)
|
|
require.Equal(t, hostname, InstanceName)
|
|
})
|
|
|
|
t.Run("Reading callback_url should add trailing slash", func(t *testing.T) {
|
|
cfg := NewCfg()
|
|
err := cfg.Load(CommandLineArgs{
|
|
HomePath: "../../",
|
|
Args: []string{"cfg:rendering.callback_url=http://myserver/renderer"},
|
|
})
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, "http://myserver/renderer/", cfg.RendererCallbackUrl)
|
|
})
|
|
|
|
t.Run("Only sync_ttl should return the value sync_ttl", func(t *testing.T) {
|
|
cfg := NewCfg()
|
|
err := cfg.Load(CommandLineArgs{
|
|
HomePath: "../../",
|
|
Args: []string{"cfg:auth.proxy.sync_ttl=2"},
|
|
})
|
|
require.Nil(t, err)
|
|
|
|
require.Equal(t, 2, cfg.AuthProxySyncTTL)
|
|
})
|
|
|
|
t.Run("Test reading string values from .ini file", func(t *testing.T) {
|
|
iniFile, err := ini.Load(path.Join(HomePath, "pkg/setting/testdata/invalid.ini"))
|
|
require.Nil(t, err)
|
|
|
|
t.Run("If key is found - should return value from ini file", func(t *testing.T) {
|
|
value := valueAsString(iniFile.Section("server"), "alt_url", "")
|
|
require.Equal(t, "https://grafana.com/", value)
|
|
})
|
|
|
|
t.Run("If key is not found - should return default value", func(t *testing.T) {
|
|
value := valueAsString(iniFile.Section("server"), "extra_url", "default_url_val")
|
|
require.Equal(t, "default_url_val", value)
|
|
})
|
|
})
|
|
}
|
|
|
|
func TestParseAppURLAndSubURL(t *testing.T) {
|
|
testCases := []struct {
|
|
rootURL string
|
|
expectedAppURL string
|
|
expectedAppSubURL string
|
|
}{
|
|
{rootURL: "http://localhost:3000/", expectedAppURL: "http://localhost:3000/"},
|
|
{rootURL: "http://localhost:3000", expectedAppURL: "http://localhost:3000/"},
|
|
{rootURL: "http://localhost:3000/grafana", expectedAppURL: "http://localhost:3000/grafana/", expectedAppSubURL: "/grafana"},
|
|
{rootURL: "http://localhost:3000/grafana/", expectedAppURL: "http://localhost:3000/grafana/", expectedAppSubURL: "/grafana"},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
f := ini.Empty()
|
|
cfg := NewCfg()
|
|
s, err := f.NewSection("server")
|
|
require.NoError(t, err)
|
|
_, err = s.NewKey("root_url", tc.rootURL)
|
|
require.NoError(t, err)
|
|
appURL, appSubURL, err := cfg.parseAppUrlAndSubUrl(s)
|
|
require.NoError(t, err)
|
|
require.Equal(t, tc.expectedAppURL, appURL)
|
|
require.Equal(t, tc.expectedAppSubURL, appSubURL)
|
|
}
|
|
}
|
|
|
|
func TestAuthDurationSettings(t *testing.T) {
|
|
const maxInactiveDaysTest = 240 * time.Hour
|
|
|
|
f := ini.Empty()
|
|
cfg := NewCfg()
|
|
sec, err := f.NewSection("auth")
|
|
require.NoError(t, err)
|
|
_, err = sec.NewKey("login_maximum_inactive_lifetime_duration", "10d")
|
|
require.NoError(t, err)
|
|
err = readAuthSettings(f, cfg)
|
|
require.NoError(t, err)
|
|
require.Equal(t, maxInactiveDaysTest, cfg.LoginMaxInactiveLifetime)
|
|
|
|
f = ini.Empty()
|
|
sec, err = f.NewSection("auth")
|
|
require.NoError(t, err)
|
|
_, err = sec.NewKey("login_maximum_inactive_lifetime_duration", "824h")
|
|
require.NoError(t, err)
|
|
maxInactiveDurationTest, err := time.ParseDuration("824h")
|
|
require.NoError(t, err)
|
|
err = readAuthSettings(f, cfg)
|
|
require.NoError(t, err)
|
|
require.Equal(t, maxInactiveDurationTest, cfg.LoginMaxInactiveLifetime)
|
|
|
|
f = ini.Empty()
|
|
sec, err = f.NewSection("auth")
|
|
require.NoError(t, err)
|
|
_, err = sec.NewKey("login_maximum_lifetime_duration", "24d")
|
|
require.NoError(t, err)
|
|
maxLifetimeDaysTest, err := time.ParseDuration("576h")
|
|
require.NoError(t, err)
|
|
err = readAuthSettings(f, cfg)
|
|
require.NoError(t, err)
|
|
require.Equal(t, maxLifetimeDaysTest, cfg.LoginMaxLifetime)
|
|
|
|
f = ini.Empty()
|
|
sec, err = f.NewSection("auth")
|
|
require.NoError(t, err)
|
|
_, err = sec.NewKey("login_maximum_lifetime_duration", "824h")
|
|
require.NoError(t, err)
|
|
maxLifetimeDurationTest, err := time.ParseDuration("824h")
|
|
require.NoError(t, err)
|
|
err = readAuthSettings(f, cfg)
|
|
require.NoError(t, err)
|
|
require.Equal(t, maxLifetimeDurationTest, cfg.LoginMaxLifetime)
|
|
|
|
f = ini.Empty()
|
|
sec, err = f.NewSection("auth")
|
|
require.NoError(t, err)
|
|
_, err = sec.NewKey("login_maximum_lifetime_duration", "")
|
|
require.NoError(t, err)
|
|
maxLifetimeDurationTest, err = time.ParseDuration("720h")
|
|
require.NoError(t, err)
|
|
err = readAuthSettings(f, cfg)
|
|
require.NoError(t, err)
|
|
require.Equal(t, maxLifetimeDurationTest, cfg.LoginMaxLifetime)
|
|
}
|
|
|
|
func TestGetCDNPath(t *testing.T) {
|
|
var err error
|
|
cfg := NewCfg()
|
|
cfg.BuildVersion = "v7.5.0-11124"
|
|
cfg.CDNRootURL, err = url.Parse("http://cdn.grafana.com")
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, "http://cdn.grafana.com/grafana-oss/v7.5.0-11124/", cfg.GetContentDeliveryURL("grafana-oss"))
|
|
require.Equal(t, "http://cdn.grafana.com/grafana/v7.5.0-11124/", cfg.GetContentDeliveryURL("grafana"))
|
|
}
|
|
|
|
func TestGetContentDeliveryURLWhenNoCDNRootURLIsSet(t *testing.T) {
|
|
cfg := NewCfg()
|
|
require.Equal(t, "", cfg.GetContentDeliveryURL("grafana-oss"))
|
|
}
|
|
|
|
func TestGetCDNPathWithPreReleaseVersionAndSubPath(t *testing.T) {
|
|
var err error
|
|
cfg := NewCfg()
|
|
cfg.BuildVersion = "v7.5.0-11124pre"
|
|
cfg.CDNRootURL, err = url.Parse("http://cdn.grafana.com/sub")
|
|
require.NoError(t, err)
|
|
require.Equal(t, "http://cdn.grafana.com/sub/grafana-oss/v7.5.0-11124pre/", cfg.GetContentDeliveryURL("grafana-oss"))
|
|
require.Equal(t, "http://cdn.grafana.com/sub/grafana/v7.5.0-11124pre/", cfg.GetContentDeliveryURL("grafana"))
|
|
}
|
|
|
|
// Adding a case for this in case we switch to proper semver version strings
|
|
func TestGetCDNPathWithAlphaVersion(t *testing.T) {
|
|
var err error
|
|
cfg := NewCfg()
|
|
cfg.BuildVersion = "v7.5.0-alpha.11124"
|
|
cfg.CDNRootURL, err = url.Parse("http://cdn.grafana.com")
|
|
require.NoError(t, err)
|
|
require.Equal(t, "http://cdn.grafana.com/grafana-oss/v7.5.0-alpha.11124/", cfg.GetContentDeliveryURL("grafana-oss"))
|
|
require.Equal(t, "http://cdn.grafana.com/grafana/v7.5.0-alpha.11124/", cfg.GetContentDeliveryURL("grafana"))
|
|
}
|
|
|
|
func TestAlertingEnabled(t *testing.T) {
|
|
anyBoolean := func() bool {
|
|
return rand.Int63()%2 == 0
|
|
}
|
|
|
|
testCases := []struct {
|
|
desc string
|
|
unifiedAlertingEnabled string
|
|
legacyAlertingEnabled string
|
|
featureToggleSet bool
|
|
isEnterprise bool
|
|
verifyCfg func(*testing.T, Cfg, *ini.File)
|
|
}{
|
|
{
|
|
desc: "when legacy alerting is enabled and unified is disabled",
|
|
legacyAlertingEnabled: "true",
|
|
unifiedAlertingEnabled: "false",
|
|
isEnterprise: anyBoolean(),
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
assert.NotNil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.Equal(t, *cfg.UnifiedAlerting.Enabled, false)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, *AlertingEnabled, true)
|
|
},
|
|
},
|
|
{
|
|
desc: "when legacy alerting is disabled and unified is enabled",
|
|
legacyAlertingEnabled: "false",
|
|
unifiedAlertingEnabled: "true",
|
|
isEnterprise: anyBoolean(),
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
assert.NotNil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.Equal(t, *cfg.UnifiedAlerting.Enabled, true)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, *AlertingEnabled, false)
|
|
},
|
|
},
|
|
{
|
|
desc: "when both alerting are enabled",
|
|
legacyAlertingEnabled: "true",
|
|
unifiedAlertingEnabled: "true",
|
|
isEnterprise: anyBoolean(),
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
require.Error(t, err)
|
|
},
|
|
},
|
|
{
|
|
desc: "when legacy alerting is invalid (or not defined) and unified is disabled",
|
|
legacyAlertingEnabled: "",
|
|
unifiedAlertingEnabled: "false",
|
|
isEnterprise: anyBoolean(),
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
assert.NotNil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.Equal(t, *cfg.UnifiedAlerting.Enabled, false)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, *AlertingEnabled, true)
|
|
},
|
|
},
|
|
{
|
|
desc: "when legacy alerting is invalid (or not defined) and unified is enabled",
|
|
legacyAlertingEnabled: "",
|
|
unifiedAlertingEnabled: "true",
|
|
isEnterprise: anyBoolean(),
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
assert.NotNil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.Equal(t, *cfg.UnifiedAlerting.Enabled, true)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, *AlertingEnabled, false)
|
|
},
|
|
},
|
|
{
|
|
desc: "when legacy alerting is enabled and unified is not defined [OSS]",
|
|
legacyAlertingEnabled: "true",
|
|
unifiedAlertingEnabled: "",
|
|
isEnterprise: false,
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
assert.NotNil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.Equal(t, true, *cfg.UnifiedAlerting.Enabled)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, false, *AlertingEnabled)
|
|
},
|
|
},
|
|
{
|
|
desc: "when legacy alerting is enabled and unified is invalid [OSS]",
|
|
legacyAlertingEnabled: "true",
|
|
unifiedAlertingEnabled: "invalid",
|
|
isEnterprise: false,
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
assert.EqualError(t, err, "failed to read unified alerting enabled setting: invalid value invalid, should be either true or false")
|
|
assert.Nil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, false, *AlertingEnabled)
|
|
},
|
|
},
|
|
{
|
|
desc: "when legacy alerting is enabled and unified is not defined [Enterprise]",
|
|
legacyAlertingEnabled: "true",
|
|
unifiedAlertingEnabled: "",
|
|
isEnterprise: true,
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
assert.NotNil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.Equal(t, true, *cfg.UnifiedAlerting.Enabled)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, false, *AlertingEnabled)
|
|
},
|
|
},
|
|
{
|
|
desc: "when legacy alerting is enabled and unified is invalid [Enterprise]",
|
|
legacyAlertingEnabled: "true",
|
|
unifiedAlertingEnabled: "invalid",
|
|
isEnterprise: false,
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
assert.EqualError(t, err, "failed to read unified alerting enabled setting: invalid value invalid, should be either true or false")
|
|
assert.Nil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, false, *AlertingEnabled)
|
|
},
|
|
},
|
|
{
|
|
desc: "when legacy alerting is disabled and unified is not defined [OSS]",
|
|
legacyAlertingEnabled: "false",
|
|
unifiedAlertingEnabled: "",
|
|
isEnterprise: false,
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
assert.NotNil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.Equal(t, *cfg.UnifiedAlerting.Enabled, true)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, *AlertingEnabled, false)
|
|
},
|
|
},
|
|
{
|
|
desc: "when legacy alerting is disabled and unified is invalid [OSS]",
|
|
legacyAlertingEnabled: "false",
|
|
unifiedAlertingEnabled: "invalid",
|
|
isEnterprise: false,
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
assert.EqualError(t, err, "failed to read unified alerting enabled setting: invalid value invalid, should be either true or false")
|
|
assert.Nil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, false, *AlertingEnabled)
|
|
},
|
|
},
|
|
{
|
|
desc: "when legacy alerting is disabled and unified is not defined [Enterprise]",
|
|
legacyAlertingEnabled: "false",
|
|
unifiedAlertingEnabled: "",
|
|
isEnterprise: true,
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
assert.NotNil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.Equal(t, *cfg.UnifiedAlerting.Enabled, true)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, *AlertingEnabled, false)
|
|
},
|
|
},
|
|
{
|
|
desc: "when legacy alerting is disabled and unified is invalid [Enterprise]",
|
|
legacyAlertingEnabled: "false",
|
|
unifiedAlertingEnabled: "invalid",
|
|
isEnterprise: false,
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
assert.EqualError(t, err, "failed to read unified alerting enabled setting: invalid value invalid, should be either true or false")
|
|
assert.Nil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, false, *AlertingEnabled)
|
|
},
|
|
},
|
|
{
|
|
desc: "when both are not defined [OSS]",
|
|
legacyAlertingEnabled: "",
|
|
unifiedAlertingEnabled: "",
|
|
isEnterprise: false,
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
assert.NotNil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.True(t, *cfg.UnifiedAlerting.Enabled)
|
|
assert.Nil(t, AlertingEnabled)
|
|
},
|
|
},
|
|
{
|
|
desc: "when both are not invalid [OSS]",
|
|
legacyAlertingEnabled: "invalid",
|
|
unifiedAlertingEnabled: "invalid",
|
|
isEnterprise: false,
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
assert.EqualError(t, err, "failed to read unified alerting enabled setting: invalid value invalid, should be either true or false")
|
|
assert.Nil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, false, *AlertingEnabled)
|
|
},
|
|
},
|
|
{
|
|
desc: "when both are not defined [Enterprise]",
|
|
legacyAlertingEnabled: "",
|
|
unifiedAlertingEnabled: "",
|
|
isEnterprise: true,
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
assert.NotNil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.True(t, *cfg.UnifiedAlerting.Enabled)
|
|
assert.Nil(t, AlertingEnabled)
|
|
},
|
|
},
|
|
{
|
|
desc: "when both are not invalid [Enterprise]",
|
|
legacyAlertingEnabled: "invalid",
|
|
unifiedAlertingEnabled: "invalid",
|
|
isEnterprise: false,
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
assert.EqualError(t, err, "failed to read unified alerting enabled setting: invalid value invalid, should be either true or false")
|
|
assert.Nil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, false, *AlertingEnabled)
|
|
},
|
|
},
|
|
{
|
|
desc: "when both are false",
|
|
legacyAlertingEnabled: "false",
|
|
unifiedAlertingEnabled: "false",
|
|
isEnterprise: anyBoolean(),
|
|
verifyCfg: func(t *testing.T, cfg Cfg, f *ini.File) {
|
|
err := readAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
err = cfg.readFeatureToggles(f)
|
|
require.NoError(t, err)
|
|
err = cfg.ReadUnifiedAlertingSettings(f)
|
|
require.NoError(t, err)
|
|
assert.NotNil(t, cfg.UnifiedAlerting.Enabled)
|
|
assert.Equal(t, *cfg.UnifiedAlerting.Enabled, false)
|
|
assert.NotNil(t, AlertingEnabled)
|
|
assert.Equal(t, *AlertingEnabled, false)
|
|
},
|
|
},
|
|
}
|
|
|
|
var isEnterpriseOld = IsEnterprise
|
|
t.Cleanup(func() {
|
|
IsEnterprise = isEnterpriseOld
|
|
})
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.desc, func(t *testing.T) {
|
|
IsEnterprise = tc.isEnterprise
|
|
t.Cleanup(func() {
|
|
AlertingEnabled = nil
|
|
})
|
|
|
|
f := ini.Empty()
|
|
cfg := NewCfg()
|
|
unifiedAlertingSec, err := f.NewSection("unified_alerting")
|
|
require.NoError(t, err)
|
|
_, err = unifiedAlertingSec.NewKey("enabled", tc.unifiedAlertingEnabled)
|
|
require.NoError(t, err)
|
|
|
|
alertingSec, err := f.NewSection("alerting")
|
|
require.NoError(t, err)
|
|
_, err = alertingSec.NewKey("enabled", tc.legacyAlertingEnabled)
|
|
require.NoError(t, err)
|
|
|
|
tc.verifyCfg(t, *cfg, f)
|
|
})
|
|
}
|
|
}
|