// Copyright 2019 Prometheus Team // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package test import ( "fmt" "os" "testing" "time" . "github.com/prometheus/alertmanager/test/cli" "github.com/stretchr/testify/require" ) func TestMain(m *testing.M) { if ok, err := AmtoolOk(); !ok { panic("unable to access amtool binary: " + err.Error()) } os.Exit(m.Run()) } // TestAmtoolVersion checks that amtool is executable and // is reporting valid version info. func TestAmtoolVersion(t *testing.T) { t.Parallel() version, err := Version() if err != nil { t.Fatal("Unable to get amtool version", err) } t.Logf("testing amtool version: %v", version) } func TestAddAlert(t *testing.T) { t.Parallel() conf := ` route: receiver: "default" group_by: [alertname] group_wait: 1s group_interval: 1s repeat_interval: 1ms receivers: - name: "default" webhook_configs: - url: 'http://%s' send_resolved: true ` at := NewAcceptanceTest(t, &AcceptanceOpts{ Tolerance: 150 * time.Millisecond, }) co := at.Collector("webhook") wh := NewWebhook(co) amc := at.AlertmanagerCluster(fmt.Sprintf(conf, wh.Address()), 1) am := amc.Members()[0] alert1 := Alert("alertname", "test1").Active(1, 2) am.AddAlertsAt(0, alert1) co.Want(Between(1, 2), Alert("alertname", "test1").Active(1)) at.Run() t.Log(co.Check()) } func TestQueryAlert(t *testing.T) { t.Parallel() conf := ` route: receiver: "default" group_by: [alertname] group_wait: 1s group_interval: 1s repeat_interval: 1ms receivers: - name: "default" webhook_configs: - url: 'http://%s' send_resolved: true ` at := NewAcceptanceTest(t, &AcceptanceOpts{ Tolerance: 1 * time.Second, }) co := at.Collector("webhook") wh := NewWebhook(co) amc := at.AlertmanagerCluster(fmt.Sprintf(conf, wh.Address()), 1) require.NoError(t, amc.Start()) defer amc.Terminate() am := amc.Members()[0] alert1 := Alert("alertname", "test1", "severity", "warning").Active(1) alert2 := Alert("alertname", "test2", "severity", "info").Active(1) am.AddAlerts(alert1, alert2) alerts, err := am.QueryAlerts() if err != nil { t.Fatal("Failed to query alerts", err) } expectedAlerts := 2 if len(alerts) != expectedAlerts { t.Fatalf("Incorrect number of alerts, expected %v, got %v", expectedAlerts, len(alerts)) } } func TestQuerySilence(t *testing.T) { t.Parallel() conf := ` route: receiver: "default" group_by: [alertname] group_wait: 1s group_interval: 1s repeat_interval: 1ms receivers: - name: "default" webhook_configs: - url: 'http://%s' send_resolved: true ` at := NewAcceptanceTest(t, &AcceptanceOpts{ Tolerance: 1 * time.Second, }) co := at.Collector("webhook") wh := NewWebhook(co) amc := at.AlertmanagerCluster(fmt.Sprintf(conf, wh.Address()), 1) require.NoError(t, amc.Start()) defer amc.Terminate() am := amc.Members()[0] silence1 := Silence(0, 4).Match("alertname=test1", "severity=warn").Comment("test1") silence2 := Silence(0, 4).Match("foo").Comment("test foo") am.SetSilence(0, silence1) am.SetSilence(0, silence2) sils, err := am.QuerySilence() if err != nil { t.Error("Failed to query silences: ", err) } expectedSils := 2 if len(sils) != expectedSils { t.Errorf("Incorrect number of silences queried, expected: %v, actual: %v", expectedSils, len(sils)) } }