2019-06-18 13:34:46 +00:00
// Copyright 2019 Prometheus Team
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package pagerduty
import (
"bytes"
2019-10-29 09:46:40 +00:00
"context"
"encoding/json"
2019-06-18 13:34:46 +00:00
"fmt"
"io"
"net/http"
2019-10-29 09:46:40 +00:00
"net/http/httptest"
"net/url"
2022-10-14 12:55:59 +00:00
"os"
2020-05-15 13:15:18 +00:00
"strings"
2019-06-18 13:34:46 +00:00
"testing"
2019-10-29 09:46:40 +00:00
"time"
2019-06-18 13:34:46 +00:00
2021-07-30 08:11:43 +00:00
"github.com/go-kit/log"
2019-06-18 13:34:46 +00:00
commoncfg "github.com/prometheus/common/config"
2019-10-29 09:46:40 +00:00
"github.com/prometheus/common/model"
2019-06-18 13:34:46 +00:00
"github.com/stretchr/testify/require"
"github.com/prometheus/alertmanager/config"
2019-10-29 09:46:40 +00:00
"github.com/prometheus/alertmanager/notify"
2019-06-18 13:34:46 +00:00
"github.com/prometheus/alertmanager/notify/test"
2019-10-29 09:46:40 +00:00
"github.com/prometheus/alertmanager/types"
2019-06-18 13:34:46 +00:00
)
func TestPagerDutyRetryV1 ( t * testing . T ) {
2019-08-02 14:17:40 +00:00
notifier , err := New (
& config . PagerdutyConfig {
ServiceKey : config . Secret ( "01234567890123456789012345678901" ) ,
HTTPConfig : & commoncfg . HTTPClientConfig { } ,
} ,
test . CreateTmpl ( t ) ,
log . NewNopLogger ( ) ,
)
require . NoError ( t , err )
2019-06-18 13:34:46 +00:00
retryCodes := append ( test . DefaultRetryCodes ( ) , http . StatusForbidden )
for statusCode , expected := range test . RetryTests ( retryCodes ) {
2019-08-02 14:17:40 +00:00
actual , _ := notifier . retrier . Check ( statusCode , nil )
2019-06-18 13:34:46 +00:00
require . Equal ( t , expected , actual , fmt . Sprintf ( "retryv1 - error on status %d" , statusCode ) )
}
}
func TestPagerDutyRetryV2 ( t * testing . T ) {
2019-08-02 14:17:40 +00:00
notifier , err := New (
& config . PagerdutyConfig {
RoutingKey : config . Secret ( "01234567890123456789012345678901" ) ,
HTTPConfig : & commoncfg . HTTPClientConfig { } ,
} ,
test . CreateTmpl ( t ) ,
log . NewNopLogger ( ) ,
)
require . NoError ( t , err )
2019-06-18 13:34:46 +00:00
retryCodes := append ( test . DefaultRetryCodes ( ) , http . StatusTooManyRequests )
for statusCode , expected := range test . RetryTests ( retryCodes ) {
2019-08-02 14:17:40 +00:00
actual , _ := notifier . retrier . Check ( statusCode , nil )
2019-06-18 13:34:46 +00:00
require . Equal ( t , expected , actual , fmt . Sprintf ( "retryv2 - error on status %d" , statusCode ) )
}
}
func TestPagerDutyRedactedURLV1 ( t * testing . T ) {
ctx , u , fn := test . GetContextWithCancelingURL ( )
defer fn ( )
key := "01234567890123456789012345678901"
notifier , err := New (
& config . PagerdutyConfig {
ServiceKey : config . Secret ( key ) ,
HTTPConfig : & commoncfg . HTTPClientConfig { } ,
} ,
test . CreateTmpl ( t ) ,
log . NewNopLogger ( ) ,
)
require . NoError ( t , err )
notifier . apiV1 = u . String ( )
2022-03-25 16:59:51 +00:00
test . AssertNotifyLeaksNoSecret ( ctx , t , notifier , key )
2019-06-18 13:34:46 +00:00
}
func TestPagerDutyRedactedURLV2 ( t * testing . T ) {
ctx , u , fn := test . GetContextWithCancelingURL ( )
defer fn ( )
key := "01234567890123456789012345678901"
notifier , err := New (
& config . PagerdutyConfig {
URL : & config . URL { URL : u } ,
RoutingKey : config . Secret ( key ) ,
HTTPConfig : & commoncfg . HTTPClientConfig { } ,
} ,
test . CreateTmpl ( t ) ,
log . NewNopLogger ( ) ,
)
require . NoError ( t , err )
2022-03-25 16:59:51 +00:00
test . AssertNotifyLeaksNoSecret ( ctx , t , notifier , key )
2019-06-18 13:34:46 +00:00
}
2022-10-14 12:55:59 +00:00
func TestPagerDutyV1ServiceKeyFromFile ( t * testing . T ) {
key := "01234567890123456789012345678901"
f , err := os . CreateTemp ( "" , "pagerduty_test" )
require . NoError ( t , err , "creating temp file failed" )
_ , err = f . WriteString ( key )
require . NoError ( t , err , "writing to temp file failed" )
ctx , u , fn := test . GetContextWithCancelingURL ( )
defer fn ( )
notifier , err := New (
& config . PagerdutyConfig {
ServiceKeyFile : f . Name ( ) ,
HTTPConfig : & commoncfg . HTTPClientConfig { } ,
} ,
test . CreateTmpl ( t ) ,
log . NewNopLogger ( ) ,
)
require . NoError ( t , err )
notifier . apiV1 = u . String ( )
test . AssertNotifyLeaksNoSecret ( ctx , t , notifier , key )
}
func TestPagerDutyV2RoutingKeyFromFile ( t * testing . T ) {
key := "01234567890123456789012345678901"
f , err := os . CreateTemp ( "" , "pagerduty_test" )
require . NoError ( t , err , "creating temp file failed" )
_ , err = f . WriteString ( key )
require . NoError ( t , err , "writing to temp file failed" )
ctx , u , fn := test . GetContextWithCancelingURL ( )
defer fn ( )
notifier , err := New (
& config . PagerdutyConfig {
URL : & config . URL { URL : u } ,
RoutingKeyFile : f . Name ( ) ,
HTTPConfig : & commoncfg . HTTPClientConfig { } ,
} ,
test . CreateTmpl ( t ) ,
log . NewNopLogger ( ) ,
)
require . NoError ( t , err )
test . AssertNotifyLeaksNoSecret ( ctx , t , notifier , key )
}
2019-10-29 09:46:40 +00:00
func TestPagerDutyTemplating ( t * testing . T ) {
srv := httptest . NewServer ( http . HandlerFunc ( func ( w http . ResponseWriter , r * http . Request ) {
dec := json . NewDecoder ( r . Body )
out := make ( map [ string ] interface { } )
err := dec . Decode ( & out )
if err != nil {
panic ( err )
}
} ) )
defer srv . Close ( )
u , _ := url . Parse ( srv . URL )
for _ , tc := range [ ] struct {
title string
cfg * config . PagerdutyConfig
retry bool
errMsg string
} {
{
title : "full-blown message" ,
cfg : & config . PagerdutyConfig {
RoutingKey : config . Secret ( "01234567890123456789012345678901" ) ,
Images : [ ] config . PagerdutyImage {
{
Src : "{{ .Status }}" ,
Alt : "{{ .Status }}" ,
Href : "{{ .Status }}" ,
} ,
} ,
Links : [ ] config . PagerdutyLink {
{
Href : "{{ .Status }}" ,
Text : "{{ .Status }}" ,
} ,
} ,
Details : map [ string ] string {
"firing" : ` {{ template "pagerduty.default.instances" .Alerts .Firing }} ` ,
"resolved" : ` {{ template "pagerduty.default.instances" .Alerts .Resolved }} ` ,
"num_firing" : ` {{ .Alerts .Firing | len }} ` ,
"num_resolved" : ` {{ .Alerts .Resolved | len }} ` ,
} ,
} ,
} ,
{
title : "details with templating errors" ,
cfg : & config . PagerdutyConfig {
RoutingKey : config . Secret ( "01234567890123456789012345678901" ) ,
Details : map [ string ] string {
"firing" : ` {{ template "pagerduty.default.instances" .Alerts .Firing ` ,
"resolved" : ` {{ template "pagerduty.default.instances" .Alerts .Resolved }} ` ,
"num_firing" : ` {{ .Alerts .Firing | len }} ` ,
"num_resolved" : ` {{ .Alerts .Resolved | len }} ` ,
} ,
} ,
errMsg : "failed to template" ,
} ,
{
title : "v2 message with templating errors" ,
cfg : & config . PagerdutyConfig {
RoutingKey : config . Secret ( "01234567890123456789012345678901" ) ,
Severity : "{{ " ,
} ,
errMsg : "failed to template" ,
} ,
{
title : "v1 message with templating errors" ,
cfg : & config . PagerdutyConfig {
ServiceKey : config . Secret ( "01234567890123456789012345678901" ) ,
Client : "{{ " ,
} ,
errMsg : "failed to template" ,
} ,
{
title : "routing key cannot be empty" ,
cfg : & config . PagerdutyConfig {
RoutingKey : config . Secret ( ` {{ "" }} ` ) ,
} ,
errMsg : "routing key cannot be empty" ,
} ,
{
title : "service_key cannot be empty" ,
cfg : & config . PagerdutyConfig {
ServiceKey : config . Secret ( ` {{ "" }} ` ) ,
} ,
errMsg : "service key cannot be empty" ,
} ,
} {
t . Run ( tc . title , func ( t * testing . T ) {
tc . cfg . URL = & config . URL { URL : u }
tc . cfg . HTTPConfig = & commoncfg . HTTPClientConfig { }
pd , err := New ( tc . cfg , test . CreateTmpl ( t ) , log . NewNopLogger ( ) )
require . NoError ( t , err )
if pd . apiV1 != "" {
pd . apiV1 = u . String ( )
}
ctx := context . Background ( )
ctx = notify . WithGroupKey ( ctx , "1" )
ok , err := pd . Notify ( ctx , [ ] * types . Alert {
2022-03-25 16:59:51 +00:00
{
2019-10-29 09:46:40 +00:00
Alert : model . Alert {
Labels : model . LabelSet {
"lbl1" : "val1" ,
} ,
StartsAt : time . Now ( ) ,
EndsAt : time . Now ( ) . Add ( time . Hour ) ,
} ,
} ,
} ... )
if tc . errMsg == "" {
require . NoError ( t , err )
} else {
require . Error ( t , err )
require . Contains ( t , err . Error ( ) , tc . errMsg )
}
require . Equal ( t , tc . retry , ok )
} )
}
}
2019-08-02 14:17:40 +00:00
func TestErrDetails ( t * testing . T ) {
2019-06-18 13:34:46 +00:00
for _ , tc := range [ ] struct {
status int
body io . Reader
exp string
} {
{
status : http . StatusBadRequest ,
body : bytes . NewBuffer ( [ ] byte (
` { "status":"invalid event","message":"Event object is invalid","errors":["Length of 'routing_key' is incorrect (should be 32 characters)"]} ` ,
) ) ,
exp : "Length of 'routing_key' is incorrect" ,
} ,
{
status : http . StatusBadRequest ,
body : bytes . NewBuffer ( [ ] byte ( ` { "status"} ` ) ) ,
2019-08-02 14:17:40 +00:00
exp : "" ,
2019-06-18 13:34:46 +00:00
} ,
{
status : http . StatusBadRequest ,
2019-08-02 14:17:40 +00:00
exp : "" ,
2019-06-18 13:34:46 +00:00
} ,
{
status : http . StatusTooManyRequests ,
2019-08-02 14:17:40 +00:00
exp : "" ,
2019-06-18 13:34:46 +00:00
} ,
} {
tc := tc
t . Run ( "" , func ( t * testing . T ) {
2019-08-02 14:17:40 +00:00
err := errDetails ( tc . status , tc . body )
require . Contains ( t , err , tc . exp )
2019-06-18 13:34:46 +00:00
} )
}
}
2020-05-15 13:15:18 +00:00
func TestEventSizeEnforcement ( t * testing . T ) {
bigDetails := map [ string ] string {
"firing" : strings . Repeat ( "a" , 513000 ) ,
}
// V1 Messages
msgV1 := & pagerDutyMessage {
ServiceKey : "01234567890123456789012345678901" ,
EventType : "trigger" ,
Details : bigDetails ,
}
notifierV1 , err := New (
& config . PagerdutyConfig {
ServiceKey : config . Secret ( "01234567890123456789012345678901" ) ,
HTTPConfig : & commoncfg . HTTPClientConfig { } ,
} ,
test . CreateTmpl ( t ) ,
log . NewNopLogger ( ) ,
)
require . NoError ( t , err )
encodedV1 , err := notifierV1 . encodeMessage ( msgV1 )
require . NoError ( t , err )
require . Contains ( t , encodedV1 . String ( ) , ` "details": { "error":"Custom details have been removed because the original event exceeds the maximum size of 512KB"} ` )
// V2 Messages
msgV2 := & pagerDutyMessage {
RoutingKey : "01234567890123456789012345678901" ,
EventAction : "trigger" ,
Payload : & pagerDutyPayload {
CustomDetails : bigDetails ,
} ,
}
notifierV2 , err := New (
& config . PagerdutyConfig {
RoutingKey : config . Secret ( "01234567890123456789012345678901" ) ,
HTTPConfig : & commoncfg . HTTPClientConfig { } ,
} ,
test . CreateTmpl ( t ) ,
log . NewNopLogger ( ) ,
)
require . NoError ( t , err )
encodedV2 , err := notifierV2 . encodeMessage ( msgV2 )
require . NoError ( t , err )
require . Contains ( t , encodedV2 . String ( ) , ` "custom_details": { "error":"Custom details have been removed because the original event exceeds the maximum size of 512KB"} ` )
}
2020-09-25 15:31:22 +00:00
func TestPagerDutyEmptySrcHref ( t * testing . T ) {
type pagerDutyEvent struct {
RoutingKey string ` json:"routing_key" `
EventAction string ` json:"event_action" `
DedupKey string ` json:"dedup_key" `
Payload pagerDutyPayload ` json:"payload" `
Images [ ] pagerDutyImage
Links [ ] pagerDutyLink
}
images := [ ] config . PagerdutyImage {
{
Src : "" ,
Alt : "Empty src" ,
Href : "https://example.com/" ,
} ,
{
Src : "https://example.com/cat.jpg" ,
Alt : "Empty href" ,
Href : "" ,
} ,
{
Src : "https://example.com/cat.jpg" ,
Alt : "" ,
Href : "https://example.com/" ,
} ,
}
links := [ ] config . PagerdutyLink {
{
Href : "" ,
Text : "Empty href" ,
} ,
{
Href : "https://example.com/" ,
Text : "" ,
} ,
}
expectedImages := make ( [ ] pagerDutyImage , 0 , len ( images ) )
for _ , image := range images {
if image . Src == "" {
continue
}
expectedImages = append ( expectedImages , pagerDutyImage {
Src : image . Src ,
Alt : image . Alt ,
Href : image . Href ,
} )
}
expectedLinks := make ( [ ] pagerDutyLink , 0 , len ( links ) )
for _ , link := range links {
if link . Href == "" {
continue
}
expectedLinks = append ( expectedLinks , pagerDutyLink {
HRef : link . Href ,
Text : link . Text ,
} )
}
server := httptest . NewServer ( http . HandlerFunc (
func ( w http . ResponseWriter , r * http . Request ) {
decoder := json . NewDecoder ( r . Body )
var event pagerDutyEvent
if err := decoder . Decode ( & event ) ; err != nil {
panic ( err )
}
if event . RoutingKey == "" || event . EventAction == "" {
http . Error ( w , http . StatusText ( http . StatusBadRequest ) , http . StatusBadRequest )
return
}
for _ , image := range event . Images {
if image . Src == "" {
http . Error ( w , "Event object is invalid: 'image src' is missing or blank" , http . StatusBadRequest )
return
}
}
for _ , link := range event . Links {
if link . HRef == "" {
http . Error ( w , "Event object is invalid: 'link href' is missing or blank" , http . StatusBadRequest )
return
}
}
require . Equal ( t , expectedImages , event . Images )
require . Equal ( t , expectedLinks , event . Links )
} ,
) )
defer server . Close ( )
url , err := url . Parse ( server . URL )
require . NoError ( t , err )
pagerDutyConfig := config . PagerdutyConfig {
HTTPConfig : & commoncfg . HTTPClientConfig { } ,
RoutingKey : config . Secret ( "01234567890123456789012345678901" ) ,
URL : & config . URL { URL : url } ,
Images : images ,
Links : links ,
}
pagerDuty , err := New ( & pagerDutyConfig , test . CreateTmpl ( t ) , log . NewNopLogger ( ) )
require . NoError ( t , err )
ctx := context . Background ( )
ctx = notify . WithGroupKey ( ctx , "1" )
_ , err = pagerDuty . Notify ( ctx , [ ] * types . Alert {
{
Alert : model . Alert {
Labels : model . LabelSet {
"lbl1" : "val1" ,
} ,
StartsAt : time . Now ( ) ,
EndsAt : time . Now ( ) . Add ( time . Hour ) ,
} ,
} ,
} ... )
require . NoError ( t , err )
}