242 lines
5.2 KiB
Go
242 lines
5.2 KiB
Go
package test
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"reflect"
|
|
"time"
|
|
|
|
"github.com/prometheus/common/model"
|
|
|
|
"github.com/prometheus/alertmanager/notify"
|
|
)
|
|
|
|
// At is a convenience method to allow for declarative syntax of Acceptance
|
|
// test definitions.
|
|
func At(ts float64) float64 {
|
|
return ts
|
|
}
|
|
|
|
type Interval struct {
|
|
start, end float64
|
|
}
|
|
|
|
func (iv Interval) String() string {
|
|
return fmt.Sprintf("[%v,%v]", iv.start, iv.end)
|
|
}
|
|
|
|
func (iv Interval) contains(f float64) bool {
|
|
return f >= iv.start && f <= iv.end
|
|
}
|
|
|
|
// Between is a convenience constructor for an interval for declarative syntax
|
|
// of Acceptance test definitions.
|
|
func Between(start, end float64) Interval {
|
|
return Interval{start: start, end: end}
|
|
}
|
|
|
|
// TestSilence models a model.Silence with relative times.
|
|
type TestSilence struct {
|
|
ID uint64
|
|
match []string
|
|
matchRE []string
|
|
startsAt, endsAt float64
|
|
}
|
|
|
|
// Silence creates a new TestSilence active for the relative interval given
|
|
// by start and end.
|
|
func Silence(start, end float64) *TestSilence {
|
|
return &TestSilence{
|
|
startsAt: start,
|
|
endsAt: end,
|
|
}
|
|
}
|
|
|
|
// Match adds a new plain matcher to the silence.
|
|
func (s *TestSilence) Match(v ...string) *TestSilence {
|
|
s.match = append(s.match, v...)
|
|
return s
|
|
}
|
|
|
|
// MatchRE adds a new regex matcher to the silence
|
|
func (s *TestSilence) MatchRE(v ...string) *TestSilence {
|
|
if len(v)%2 == 1 {
|
|
panic("bad key/values")
|
|
}
|
|
s.matchRE = append(s.matchRE, v...)
|
|
return s
|
|
}
|
|
|
|
// nativeSilence converts the declared test silence into a regular
|
|
// silence with resolved times.
|
|
func (sil *TestSilence) nativeSilence(opts *AcceptanceOpts) *model.Silence {
|
|
nsil := &model.Silence{}
|
|
|
|
for i := 0; i < len(sil.match); i += 2 {
|
|
nsil.Matchers = append(nsil.Matchers, &model.Matcher{
|
|
Name: model.LabelName(sil.match[i]),
|
|
Value: sil.match[i+1],
|
|
})
|
|
}
|
|
for i := 0; i < len(sil.matchRE); i += 2 {
|
|
nsil.Matchers = append(nsil.Matchers, &model.Matcher{
|
|
Name: model.LabelName(sil.match[i]),
|
|
Value: sil.match[i+1],
|
|
IsRegex: true,
|
|
})
|
|
}
|
|
|
|
if sil.startsAt > 0 {
|
|
nsil.StartsAt = opts.expandTime(sil.startsAt)
|
|
}
|
|
if sil.endsAt > 0 {
|
|
nsil.EndsAt = opts.expandTime(sil.endsAt)
|
|
}
|
|
return nsil
|
|
}
|
|
|
|
// TestAlert models a model.Alert with relative times.
|
|
type TestAlert struct {
|
|
labels model.LabelSet
|
|
annotations model.LabelSet
|
|
startsAt, endsAt float64
|
|
}
|
|
|
|
// alert creates a new alert declaration with the given key/value pairs
|
|
// as identifying labels.
|
|
func Alert(keyval ...interface{}) *TestAlert {
|
|
if len(keyval)%2 == 1 {
|
|
panic("bad key/values")
|
|
}
|
|
a := &TestAlert{
|
|
labels: model.LabelSet{},
|
|
annotations: model.LabelSet{},
|
|
}
|
|
|
|
for i := 0; i < len(keyval); i += 2 {
|
|
ln := model.LabelName(keyval[i].(string))
|
|
lv := model.LabelValue(keyval[i+1].(string))
|
|
|
|
a.labels[ln] = lv
|
|
}
|
|
|
|
return a
|
|
}
|
|
|
|
// nativeAlert converts the declared test alert into a full alert based
|
|
// on the given paramters.
|
|
func (a *TestAlert) nativeAlert(opts *AcceptanceOpts) *model.Alert {
|
|
na := &model.Alert{
|
|
Labels: a.labels,
|
|
Annotations: a.annotations,
|
|
}
|
|
|
|
if a.startsAt > 0 {
|
|
na.StartsAt = opts.expandTime(a.startsAt)
|
|
}
|
|
if a.endsAt > 0 {
|
|
na.EndsAt = opts.expandTime(a.endsAt)
|
|
}
|
|
return na
|
|
}
|
|
|
|
// Annotate the alert with the given key/value pairs.
|
|
func (a *TestAlert) Annotate(keyval ...interface{}) *TestAlert {
|
|
if len(keyval)%2 == 1 {
|
|
panic("bad key/values")
|
|
}
|
|
|
|
for i := 0; i < len(keyval); i += 2 {
|
|
ln := model.LabelName(keyval[i].(string))
|
|
lv := model.LabelValue(keyval[i+1].(string))
|
|
|
|
a.annotations[ln] = lv
|
|
}
|
|
|
|
return a
|
|
}
|
|
|
|
// Active declares the relative activity time for this alert. It
|
|
// must be a single starting value or two values where the second value
|
|
// declares the resolved time.
|
|
func (a *TestAlert) Active(tss ...float64) *TestAlert {
|
|
if len(tss) > 2 || len(tss) == 0 {
|
|
panic("only one or two timestamps allowed")
|
|
}
|
|
if len(tss) == 2 {
|
|
a.endsAt = tss[1]
|
|
}
|
|
a.startsAt = tss[0]
|
|
|
|
return a
|
|
}
|
|
|
|
func equalAlerts(a, b *model.Alert, opts *AcceptanceOpts) bool {
|
|
if !reflect.DeepEqual(a.Labels, b.Labels) {
|
|
return false
|
|
}
|
|
if !reflect.DeepEqual(a.Annotations, b.Annotations) {
|
|
return false
|
|
}
|
|
|
|
if !equalTime(a.StartsAt, b.StartsAt, opts) {
|
|
return false
|
|
}
|
|
if !equalTime(a.EndsAt, b.EndsAt, opts) {
|
|
return false
|
|
}
|
|
return true
|
|
}
|
|
|
|
func equalTime(a, b time.Time, opts *AcceptanceOpts) bool {
|
|
if a.IsZero() != b.IsZero() {
|
|
return false
|
|
}
|
|
|
|
diff := a.Sub(b)
|
|
if diff < 0 {
|
|
diff = -diff
|
|
}
|
|
return diff <= opts.Tolerance
|
|
}
|
|
|
|
type MockWebhook struct {
|
|
collector *Collector
|
|
listener net.Listener
|
|
}
|
|
|
|
func NewWebhook(c *Collector) *MockWebhook {
|
|
l, err := net.Listen("tcp", ":0")
|
|
if err != nil {
|
|
// TODO(fabxc): if shutdown of mock destinations ever becomes a concern
|
|
// we want to shut them down after test completion. Then we might want to
|
|
// log the error properly, too.
|
|
panic(err)
|
|
}
|
|
wh := &MockWebhook{
|
|
listener: l,
|
|
collector: c,
|
|
}
|
|
go http.Serve(l, wh)
|
|
|
|
return wh
|
|
}
|
|
|
|
func (ws *MockWebhook) ServeHTTP(w http.ResponseWriter, req *http.Request) {
|
|
dec := json.NewDecoder(req.Body)
|
|
defer req.Body.Close()
|
|
|
|
var v notify.WebhookMessage
|
|
if err := dec.Decode(&v); err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
ws.collector.add(v.Alerts...)
|
|
}
|
|
|
|
func (ws *MockWebhook) Address() string {
|
|
return ws.listener.Addr().String()
|
|
}
|