mirror of
https://github.com/grafana/grafana.git
synced 2024-12-01 21:19:28 -06:00
e37a780e14
* init
* autogens AM route
* POST dashboards/db spec
* POST alert-notifications spec
* fix description
* re inits vendor, updates grafana to master
* go mod updates
* alerting routes
* renames to receivers
* prometheus endpoints
* align config endpoint with cortex, include templates
* Change grafana receiver type
* Update receivers.go
* rename struct to stop swagger thrashing
* add rules API
* index html
* standalone swagger ui html page
* Update README.md
* Expose GrafanaManagedAlert properties
* Some fixes
- /api/v1/rules/{Namespace} should return a map
- update ExtendedUpsertAlertDefinitionCommand properties
* am alerts routes
* rename prom swagger section for clarity, remove example endpoints
* Add missing json and yaml tags
* folder perms
* make folders POST again
* fix grafana receiver type
* rename fodler->namespace for perms
* make ruler json again
* PR fixes
* silences
* fix Ok -> Ack
* Add id to POST /api/v1/silences (#9)
Signed-off-by: Ganesh Vernekar <cs15btech11018@iith.ac.in>
* Add POST /api/v1/alerts (#10)
Signed-off-by: Ganesh Vernekar <cs15btech11018@iith.ac.in>
* fix silences
* Add testing endpoints
* removes grpc replace directives
* [wip] starts validation
* pkg cleanup
* go mod tidy
* ignores vendor dir
* Change response type for Cortex/Loki alerts
* receiver unmarshaling tests
* ability to split routes between AM & Grafana
* api marshaling & validation
* begins work on routing lib
* [hack] ignores embedded field in generation
* path specific datasource for alerting
* align endpoint names with cloud
* single route per Alerting config
* removes unused routing pkg
* regens spec
* adds datasource param to ruler/prom route paths
* Modifications for supporting migration
* Apply suggestions from code review
* hack for cleaning circular refs in swagger definition
* generates files
* minor fixes for prom endpoints
* decorate prom apis with required: true where applicable
* Revert "generates files"
This reverts commit ef7e975584
.
* removes server autogen
* Update imported structs from ngalert
* Fix listing rules response
* Update github.com/prometheus/common dependency
* Update get silence response
* Update get silences response
* adds ruler validation & backend switching
* Fix GET /alertmanager/{DatasourceId}/config/api/v1/alerts response
* Distinct gettable and postable grafana receivers
* Remove permissions routes
* Latest JSON specs
* Fix testing routes
* inline yaml annotation on apirulenode
* yaml test & yamlv3 + comments
* Fix yaml annotations for embedded type
* Rename DatasourceId path parameter
* Implement Backend.String()
* backend zero value is a real backend
* exports DiscoveryBase
* Fix GO initialisms
* Silences: Use PostableSilence as the base struct for creating silences
* Use type alias instead of struct embedding
* More fixes to alertmanager silencing routes
* post and spec JSONs
* Split rule config to postable/gettable
* Fix empty POST /silences payload
Recreating the generated JSON specs fixes the issue
without further modifications
* better yaml unmarshaling for nested yaml docs in cortex-am configs
* regens spec
* re-adds config.receivers
* omitempty to align with prometheus API behavior
* Prefix routes with /api
* Update Alertmanager models
* Make adjustments to follow the Alertmanager API
* ruler: add for and annotations to grafana alert (#45)
* Modify testing API routes
* Fix grafana rule for field type
* Move PostableUserConfig validation to this library
* Fix PostableUserConfig YAML encoding/decoding
* Use common fields for grafana and lotex rules
* Add namespace id in GettableGrafanaRule
* Apply suggestions from code review
* fixup
* more changes
* Apply suggestions from code review
* aligns structure pre merge
* fix new imports & tests
* updates tooling readme
* goimports
* lint
* more linting!!
* revive lint
Co-authored-by: Sofia Papagiannaki <papagian@gmail.com>
Co-authored-by: Domas <domasx2@gmail.com>
Co-authored-by: Sofia Papagiannaki <papagian@users.noreply.github.com>
Co-authored-by: Ganesh Vernekar <15064823+codesome@users.noreply.github.com>
Co-authored-by: gotjosh <josue@grafana.com>
Co-authored-by: David Parrott <stomp.box.yo@gmail.com>
Co-authored-by: Kyle Brandt <kyle@grafana.com>
164 lines
5.0 KiB
Go
164 lines
5.0 KiB
Go
package notifier
|
|
|
|
import (
|
|
"errors"
|
|
"io/ioutil"
|
|
"path/filepath"
|
|
"testing"
|
|
|
|
api "github.com/grafana/grafana/pkg/services/ngalert/api/tooling/definitions"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestPersistTemplates(t *testing.T) {
|
|
tc := []struct {
|
|
name string
|
|
templates map[string]string
|
|
existingTemplates map[string]string
|
|
expectedPaths []string
|
|
expectedError error
|
|
expectedChange bool
|
|
}{
|
|
{
|
|
name: "With valid templates file names, it persists successfully",
|
|
templates: map[string]string{"email.template": "a perfectly fine template"},
|
|
expectedChange: true,
|
|
expectedError: nil,
|
|
expectedPaths: []string{"email.template"},
|
|
},
|
|
{
|
|
name: "With a invalid filename, it fails",
|
|
templates: map[string]string{"adirectory/email.template": "a perfectly fine template"},
|
|
expectedError: errors.New("template file name 'adirectory/email.template' is not valid"),
|
|
},
|
|
{
|
|
name: "with a template that has the same name but different content to an existing one",
|
|
existingTemplates: map[string]string{"email.template": "a perfectly fine template"},
|
|
templates: map[string]string{"email.template": "a completely different content"},
|
|
expectedChange: true,
|
|
expectedError: nil,
|
|
expectedPaths: []string{"email.template"},
|
|
},
|
|
{
|
|
name: "with a template that has the same name and the same content as an existing one",
|
|
existingTemplates: map[string]string{"email.template": "a perfectly fine template"},
|
|
templates: map[string]string{"email.template": "a perfectly fine template"},
|
|
expectedChange: false,
|
|
expectedError: nil,
|
|
expectedPaths: []string{"email.template"},
|
|
},
|
|
{
|
|
name: "with two new template files, it changes the template tree",
|
|
existingTemplates: map[string]string{"email.template": "a perfectly fine template"},
|
|
templates: map[string]string{"slack.template": "a perfectly fine template", "webhook.template": "a webhook template"},
|
|
expectedChange: true,
|
|
expectedError: nil,
|
|
expectedPaths: []string{"slack.template", "webhook.template"},
|
|
},
|
|
{
|
|
name: "when we remove a template file from the list, it changes the template tree",
|
|
existingTemplates: map[string]string{"slack.template": "a perfectly fine template", "webhook.template": "a webhook template"},
|
|
templates: map[string]string{"slack.template": "a perfectly fine template"},
|
|
expectedChange: true,
|
|
expectedError: nil,
|
|
expectedPaths: []string{"slack.template"},
|
|
},
|
|
}
|
|
|
|
for _, tt := range tc {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
dir := t.TempDir()
|
|
// Write "existing files"
|
|
for name, content := range tt.existingTemplates {
|
|
err := ioutil.WriteFile(filepath.Join(dir, name), []byte(content), 0644)
|
|
require.NoError(t, err)
|
|
}
|
|
c := &api.PostableUserConfig{TemplateFiles: tt.templates}
|
|
|
|
paths, changed, persistErr := PersistTemplates(c, dir)
|
|
|
|
files := map[string]string{}
|
|
readFiles, err := ioutil.ReadDir(dir)
|
|
require.NoError(t, err)
|
|
for _, f := range readFiles {
|
|
if f.IsDir() || f.Name() == "" {
|
|
continue
|
|
}
|
|
// Safe to disable, this is a test.
|
|
// nolint:gosec
|
|
content, err := ioutil.ReadFile(filepath.Join(dir, f.Name()))
|
|
// nolint:gosec
|
|
require.NoError(t, err)
|
|
files[f.Name()] = string(content)
|
|
}
|
|
|
|
// Given we use a temporary directory in tests, we need to prepend the expected paths with it.
|
|
for i, p := range tt.expectedPaths {
|
|
tt.expectedPaths[i] = filepath.Join(dir, p)
|
|
}
|
|
|
|
require.Equal(t, tt.expectedError, persistErr)
|
|
require.ElementsMatch(t, tt.expectedPaths, paths)
|
|
require.Equal(t, tt.expectedChange, changed)
|
|
if tt.expectedError == nil {
|
|
require.Equal(t, tt.templates, files)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestLoad(t *testing.T) {
|
|
tc := []struct {
|
|
name string
|
|
rawConfig string
|
|
expectedTemplates map[string]string
|
|
expectedError error
|
|
}{
|
|
{
|
|
name: "with a valid config and template",
|
|
rawConfig: `
|
|
{
|
|
"alertmanager_config": {
|
|
"global": {
|
|
"smtp_from": "noreply@grafana.net"
|
|
},
|
|
"route": {
|
|
"receiver": "email"
|
|
},
|
|
"receivers": [
|
|
{
|
|
"name": "email"
|
|
}
|
|
]
|
|
},
|
|
"template_files": {
|
|
"email.template": "something with a pretty good content"
|
|
}
|
|
}
|
|
`,
|
|
expectedTemplates: map[string]string{"email.template": "something with a pretty good content"},
|
|
},
|
|
{
|
|
name: "with an empty configuration, it is not valid.",
|
|
rawConfig: "{}",
|
|
expectedError: errors.New("unable to parse Alertmanager configuration: no route provided in config"),
|
|
},
|
|
}
|
|
|
|
for _, tt := range tc {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
c, err := Load([]byte(tt.rawConfig))
|
|
|
|
if tt.expectedError != nil {
|
|
assert.Nil(t, c)
|
|
assert.Equal(t, tt.expectedError.Error(), err.Error())
|
|
} else {
|
|
require.NoError(t, err)
|
|
assert.NotNil(t, c.TemplateFiles)
|
|
assert.Equal(t, tt.expectedTemplates, c.TemplateFiles)
|
|
}
|
|
})
|
|
}
|
|
}
|