alertmanager/notify/webex/webex_test.go

170 lines
4.7 KiB
Go
Raw Normal View History

// Copyright 2022 Prometheus Team
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package webex
import (
"context"
"fmt"
"io"
"net/http"
"net/http/httptest"
"net/url"
"testing"
"time"
commoncfg "github.com/prometheus/common/config"
"github.com/prometheus/common/model"
"github.com/prometheus/common/promslog"
"github.com/stretchr/testify/require"
"github.com/prometheus/alertmanager/config"
"github.com/prometheus/alertmanager/notify"
"github.com/prometheus/alertmanager/notify/test"
"github.com/prometheus/alertmanager/types"
)
func TestWebexRetry(t *testing.T) {
testWebhookURL, err := url.Parse("https://api.ciscospark.com/v1/message")
require.NoError(t, err)
notifier, err := New(
&config.WebexConfig{
HTTPConfig: &commoncfg.HTTPClientConfig{},
APIURL: &config.URL{URL: testWebhookURL},
},
test.CreateTmpl(t),
promslog.NewNopLogger(),
)
require.NoError(t, err)
for statusCode, expected := range test.RetryTests(test.DefaultRetryCodes()) {
actual, _ := notifier.retrier.Check(statusCode, nil)
require.Equal(t, expected, actual, fmt.Sprintf("error on status %d", statusCode))
}
}
func TestWebexTemplating(t *testing.T) {
tc := []struct {
name string
cfg *config.WebexConfig
Message string
expJSON string
commonCfg *commoncfg.HTTPClientConfig
retry bool
errMsg string
expHeader string
}{
{
name: "with a valid message and a set http_config.authorization, it is formatted as expected",
cfg: &config.WebexConfig{
Message: `{{ template "webex.default.message" . }}`,
},
commonCfg: &commoncfg.HTTPClientConfig{
Authorization: &commoncfg.Authorization{Type: "Bearer", Credentials: "anewsecret"},
},
expJSON: `{"markdown":"\n\nAlerts Firing:\nLabels:\n - lbl1 = val1\n - lbl3 = val3\nAnnotations:\nSource: \nLabels:\n - lbl1 = val1\n - lbl2 = val2\nAnnotations:\nSource: \n\n\n\n"}`,
retry: false,
expHeader: "Bearer anewsecret",
},
{
name: "with message templating errors, it fails.",
cfg: &config.WebexConfig{
Message: "{{ ",
},
commonCfg: &commoncfg.HTTPClientConfig{},
errMsg: "template: :1: unclosed action",
},
{
name: "with a valid roomID set, the roomID is used accordingly.",
cfg: &config.WebexConfig{
RoomID: "my-room-id",
},
commonCfg: &commoncfg.HTTPClientConfig{},
expJSON: `{"markdown":"", "roomId":"my-room-id"}`,
retry: false,
},
{
name: "with a valid roomID template, the roomID is used accordingly.",
cfg: &config.WebexConfig{
RoomID: "{{.GroupLabels.webex_room_id}}",
},
commonCfg: &commoncfg.HTTPClientConfig{},
expJSON: `{"markdown":"", "roomId":"group-label-room-id"}`,
retry: false,
},
}
for _, tt := range tc {
t.Run(tt.name, func(t *testing.T) {
var out []byte
var header http.Header
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
var err error
out, err = io.ReadAll(r.Body)
header = r.Header.Clone()
require.NoError(t, err)
}))
defer srv.Close()
u, _ := url.Parse(srv.URL)
tt.cfg.APIURL = &config.URL{URL: u}
tt.cfg.HTTPConfig = tt.commonCfg
notifierWebex, err := New(tt.cfg, test.CreateTmpl(t), promslog.NewNopLogger())
require.NoError(t, err)
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
defer cancel()
ctx = notify.WithGroupKey(ctx, "1")
ctx = notify.WithGroupLabels(ctx, model.LabelSet{"webex_room_id": "group-label-room-id"})
ok, err := notifierWebex.Notify(ctx, []*types.Alert{
{
Alert: model.Alert{
Labels: model.LabelSet{
"lbl1": "val1",
"lbl3": "val3",
},
StartsAt: time.Now(),
EndsAt: time.Now().Add(time.Hour),
},
},
{
Alert: model.Alert{
Labels: model.LabelSet{
"lbl1": "val1",
"lbl2": "val2",
},
StartsAt: time.Now(),
EndsAt: time.Now().Add(time.Hour),
},
},
}...)
if tt.errMsg == "" {
require.NoError(t, err)
require.Equal(t, tt.expHeader, header.Get("Authorization"))
require.JSONEq(t, tt.expJSON, string(out))
} else {
require.Error(t, err)
require.Contains(t, err.Error(), tt.errMsg)
}
require.Equal(t, tt.retry, ok)
})
}
}