mirror of https://github.com/prometheus/prometheus
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
623 lines
16 KiB
623 lines
16 KiB
// Copyright 2018 The Prometheus Authors |
|
// Licensed under the Apache License, Version 2.0 (the "License"); |
|
// you may not use this file except in compliance with the License. |
|
// You may obtain a copy of the License at |
|
// |
|
// http://www.apache.org/licenses/LICENSE-2.0 |
|
// |
|
// Unless required by applicable law or agreed to in writing, software |
|
// distributed under the License is distributed on an "AS IS" BASIS, |
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
|
// See the License for the specific language governing permissions and |
|
// limitations under the License. |
|
|
|
package main |
|
|
|
import ( |
|
"bytes" |
|
"context" |
|
"errors" |
|
"fmt" |
|
"net/http" |
|
"net/http/httptest" |
|
"net/url" |
|
"os" |
|
"os/exec" |
|
"path/filepath" |
|
"runtime" |
|
"strconv" |
|
"strings" |
|
"syscall" |
|
"testing" |
|
"time" |
|
|
|
"github.com/prometheus/common/model" |
|
"github.com/stretchr/testify/require" |
|
|
|
"github.com/prometheus/prometheus/model/labels" |
|
"github.com/prometheus/prometheus/model/rulefmt" |
|
"github.com/prometheus/prometheus/promql/promqltest" |
|
) |
|
|
|
func init() { |
|
// This can be removed when the default validation scheme in common is updated. |
|
model.NameValidationScheme = model.UTF8Validation |
|
} |
|
|
|
var promtoolPath = os.Args[0] |
|
|
|
func TestMain(m *testing.M) { |
|
for i, arg := range os.Args { |
|
if arg == "-test.main" { |
|
os.Args = append(os.Args[:i], os.Args[i+1:]...) |
|
main() |
|
return |
|
} |
|
} |
|
|
|
exitCode := m.Run() |
|
os.Exit(exitCode) |
|
} |
|
|
|
func TestQueryRange(t *testing.T) { |
|
t.Parallel() |
|
s, getRequest := mockServer(200, `{"status": "success", "data": {"resultType": "matrix", "result": []}}`) |
|
defer s.Close() |
|
|
|
urlObject, err := url.Parse(s.URL) |
|
require.NoError(t, err) |
|
|
|
p := &promqlPrinter{} |
|
exitCode := QueryRange(urlObject, http.DefaultTransport, map[string]string{}, "up", "0", "300", 0, p) |
|
require.Equal(t, "/api/v1/query_range", getRequest().URL.Path) |
|
form := getRequest().Form |
|
require.Equal(t, "up", form.Get("query")) |
|
require.Equal(t, "1", form.Get("step")) |
|
require.Equal(t, 0, exitCode) |
|
|
|
exitCode = QueryRange(urlObject, http.DefaultTransport, map[string]string{}, "up", "0", "300", 10*time.Millisecond, p) |
|
require.Equal(t, "/api/v1/query_range", getRequest().URL.Path) |
|
form = getRequest().Form |
|
require.Equal(t, "up", form.Get("query")) |
|
require.Equal(t, "0.01", form.Get("step")) |
|
require.Equal(t, 0, exitCode) |
|
} |
|
|
|
func TestQueryInstant(t *testing.T) { |
|
t.Parallel() |
|
s, getRequest := mockServer(200, `{"status": "success", "data": {"resultType": "vector", "result": []}}`) |
|
defer s.Close() |
|
|
|
urlObject, err := url.Parse(s.URL) |
|
require.NoError(t, err) |
|
|
|
p := &promqlPrinter{} |
|
exitCode := QueryInstant(urlObject, http.DefaultTransport, "up", "300", p) |
|
require.Equal(t, "/api/v1/query", getRequest().URL.Path) |
|
form := getRequest().Form |
|
require.Equal(t, "up", form.Get("query")) |
|
require.Equal(t, "300", form.Get("time")) |
|
require.Equal(t, 0, exitCode) |
|
} |
|
|
|
func mockServer(code int, body string) (*httptest.Server, func() *http.Request) { |
|
var req *http.Request |
|
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { |
|
r.ParseForm() |
|
req = r |
|
w.WriteHeader(code) |
|
fmt.Fprintln(w, body) |
|
})) |
|
|
|
f := func() *http.Request { |
|
return req |
|
} |
|
return server, f |
|
} |
|
|
|
func TestCheckSDFile(t *testing.T) { |
|
t.Parallel() |
|
cases := []struct { |
|
name string |
|
file string |
|
err string |
|
}{ |
|
{ |
|
name: "good .yml", |
|
file: "./testdata/good-sd-file.yml", |
|
}, |
|
{ |
|
name: "good .yaml", |
|
file: "./testdata/good-sd-file.yaml", |
|
}, |
|
{ |
|
name: "good .json", |
|
file: "./testdata/good-sd-file.json", |
|
}, |
|
{ |
|
name: "bad file extension", |
|
file: "./testdata/bad-sd-file-extension.nonexistant", |
|
err: "invalid file extension: \".nonexistant\"", |
|
}, |
|
{ |
|
name: "bad format", |
|
file: "./testdata/bad-sd-file-format.yml", |
|
err: "yaml: unmarshal errors:\n line 1: field targats not found in type struct { Targets []string \"yaml:\\\"targets\\\"\"; Labels model.LabelSet \"yaml:\\\"labels\\\"\" }", |
|
}, |
|
} |
|
for _, test := range cases { |
|
t.Run(test.name, func(t *testing.T) { |
|
t.Parallel() |
|
_, err := checkSDFile(test.file) |
|
if test.err != "" { |
|
require.EqualErrorf(t, err, test.err, "Expected error %q, got %q", test.err, err.Error()) |
|
return |
|
} |
|
require.NoError(t, err) |
|
}) |
|
} |
|
} |
|
|
|
func TestCheckDuplicates(t *testing.T) { |
|
t.Parallel() |
|
cases := []struct { |
|
name string |
|
ruleFile string |
|
expectedDups []compareRuleType |
|
}{ |
|
{ |
|
name: "no duplicates", |
|
ruleFile: "./testdata/rules.yml", |
|
}, |
|
{ |
|
name: "duplicate in other group", |
|
ruleFile: "./testdata/rules_duplicates.yml", |
|
expectedDups: []compareRuleType{ |
|
{ |
|
metric: "job:test:count_over_time1m", |
|
label: labels.New(), |
|
}, |
|
}, |
|
}, |
|
} |
|
|
|
for _, test := range cases { |
|
c := test |
|
t.Run(c.name, func(t *testing.T) { |
|
t.Parallel() |
|
rgs, err := rulefmt.ParseFile(c.ruleFile) |
|
require.Empty(t, err) |
|
dups := checkDuplicates(rgs.Groups) |
|
require.Equal(t, c.expectedDups, dups) |
|
}) |
|
} |
|
} |
|
|
|
func BenchmarkCheckDuplicates(b *testing.B) { |
|
rgs, err := rulefmt.ParseFile("./testdata/rules_large.yml") |
|
require.Empty(b, err) |
|
b.ResetTimer() |
|
|
|
for i := 0; i < b.N; i++ { |
|
checkDuplicates(rgs.Groups) |
|
} |
|
} |
|
|
|
func TestCheckTargetConfig(t *testing.T) { |
|
t.Parallel() |
|
cases := []struct { |
|
name string |
|
file string |
|
err string |
|
}{ |
|
{ |
|
name: "url_in_scrape_targetgroup_with_relabel_config.good", |
|
file: "url_in_scrape_targetgroup_with_relabel_config.good.yml", |
|
err: "", |
|
}, |
|
{ |
|
name: "url_in_alert_targetgroup_with_relabel_config.good", |
|
file: "url_in_alert_targetgroup_with_relabel_config.good.yml", |
|
err: "", |
|
}, |
|
{ |
|
name: "url_in_scrape_targetgroup_with_relabel_config.bad", |
|
file: "url_in_scrape_targetgroup_with_relabel_config.bad.yml", |
|
err: "instance 0 in group 0: \"http://bad\" is not a valid hostname", |
|
}, |
|
{ |
|
name: "url_in_alert_targetgroup_with_relabel_config.bad", |
|
file: "url_in_alert_targetgroup_with_relabel_config.bad.yml", |
|
err: "\"http://bad\" is not a valid hostname", |
|
}, |
|
} |
|
for _, test := range cases { |
|
t.Run(test.name, func(t *testing.T) { |
|
t.Parallel() |
|
_, err := checkConfig(false, "testdata/"+test.file, false) |
|
if test.err != "" { |
|
require.EqualErrorf(t, err, test.err, "Expected error %q, got %q", test.err, err.Error()) |
|
return |
|
} |
|
require.NoError(t, err) |
|
}) |
|
} |
|
} |
|
|
|
func TestCheckConfigSyntax(t *testing.T) { |
|
t.Parallel() |
|
cases := []struct { |
|
name string |
|
file string |
|
syntaxOnly bool |
|
err string |
|
errWindows string |
|
}{ |
|
{ |
|
name: "check with syntax only succeeds with nonexistent rule files", |
|
file: "config_with_rule_files.yml", |
|
syntaxOnly: true, |
|
err: "", |
|
errWindows: "", |
|
}, |
|
{ |
|
name: "check without syntax only fails with nonexistent rule files", |
|
file: "config_with_rule_files.yml", |
|
syntaxOnly: false, |
|
err: "\"testdata/non-existent-file.yml\" does not point to an existing file", |
|
errWindows: "\"testdata\\\\non-existent-file.yml\" does not point to an existing file", |
|
}, |
|
{ |
|
name: "check with syntax only succeeds with nonexistent service discovery files", |
|
file: "config_with_service_discovery_files.yml", |
|
syntaxOnly: true, |
|
err: "", |
|
errWindows: "", |
|
}, |
|
// The test below doesn't fail because the file verification for ServiceDiscoveryConfigs doesn't fail the check if |
|
// file isn't found; it only outputs a warning message. |
|
{ |
|
name: "check without syntax only succeeds with nonexistent service discovery files", |
|
file: "config_with_service_discovery_files.yml", |
|
syntaxOnly: false, |
|
err: "", |
|
errWindows: "", |
|
}, |
|
{ |
|
name: "check with syntax only succeeds with nonexistent TLS files", |
|
file: "config_with_tls_files.yml", |
|
syntaxOnly: true, |
|
err: "", |
|
errWindows: "", |
|
}, |
|
{ |
|
name: "check without syntax only fails with nonexistent TLS files", |
|
file: "config_with_tls_files.yml", |
|
syntaxOnly: false, |
|
err: "error checking client cert file \"testdata/nonexistent_cert_file.yml\": " + |
|
"stat testdata/nonexistent_cert_file.yml: no such file or directory", |
|
errWindows: "error checking client cert file \"testdata\\\\nonexistent_cert_file.yml\": " + |
|
"CreateFile testdata\\nonexistent_cert_file.yml: The system cannot find the file specified.", |
|
}, |
|
{ |
|
name: "check with syntax only succeeds with nonexistent credentials file", |
|
file: "authorization_credentials_file.bad.yml", |
|
syntaxOnly: true, |
|
err: "", |
|
errWindows: "", |
|
}, |
|
{ |
|
name: "check without syntax only fails with nonexistent credentials file", |
|
file: "authorization_credentials_file.bad.yml", |
|
syntaxOnly: false, |
|
err: "error checking authorization credentials or bearer token file \"/random/file/which/does/not/exist.yml\": " + |
|
"stat /random/file/which/does/not/exist.yml: no such file or directory", |
|
errWindows: "error checking authorization credentials or bearer token file \"testdata\\\\random\\\\file\\\\which\\\\does\\\\not\\\\exist.yml\": " + |
|
"CreateFile testdata\\random\\file\\which\\does\\not\\exist.yml: The system cannot find the path specified.", |
|
}, |
|
} |
|
for _, test := range cases { |
|
t.Run(test.name, func(t *testing.T) { |
|
t.Parallel() |
|
_, err := checkConfig(false, "testdata/"+test.file, test.syntaxOnly) |
|
expectedErrMsg := test.err |
|
if strings.Contains(runtime.GOOS, "windows") { |
|
expectedErrMsg = test.errWindows |
|
} |
|
if expectedErrMsg != "" { |
|
require.EqualErrorf(t, err, expectedErrMsg, "Expected error %q, got %q", test.err, err.Error()) |
|
return |
|
} |
|
require.NoError(t, err) |
|
}) |
|
} |
|
} |
|
|
|
func TestAuthorizationConfig(t *testing.T) { |
|
t.Parallel() |
|
cases := []struct { |
|
name string |
|
file string |
|
err string |
|
}{ |
|
{ |
|
name: "authorization_credentials_file.bad", |
|
file: "authorization_credentials_file.bad.yml", |
|
err: "error checking authorization credentials or bearer token file", |
|
}, |
|
{ |
|
name: "authorization_credentials_file.good", |
|
file: "authorization_credentials_file.good.yml", |
|
err: "", |
|
}, |
|
} |
|
|
|
for _, test := range cases { |
|
t.Run(test.name, func(t *testing.T) { |
|
t.Parallel() |
|
_, err := checkConfig(false, "testdata/"+test.file, false) |
|
if test.err != "" { |
|
require.ErrorContains(t, err, test.err, "Expected error to contain %q, got %q", test.err, err.Error()) |
|
return |
|
} |
|
require.NoError(t, err) |
|
}) |
|
} |
|
} |
|
|
|
func TestCheckMetricsExtended(t *testing.T) { |
|
if runtime.GOOS == "windows" { |
|
t.Skip("Skipping on windows") |
|
} |
|
t.Parallel() |
|
|
|
f, err := os.Open("testdata/metrics-test.prom") |
|
require.NoError(t, err) |
|
defer f.Close() |
|
|
|
stats, total, err := checkMetricsExtended(f) |
|
require.NoError(t, err) |
|
require.Equal(t, 27, total) |
|
require.Equal(t, []metricStat{ |
|
{ |
|
name: "prometheus_tsdb_compaction_chunk_size_bytes", |
|
cardinality: 15, |
|
percentage: float64(15) / float64(27), |
|
}, |
|
{ |
|
name: "go_gc_duration_seconds", |
|
cardinality: 7, |
|
percentage: float64(7) / float64(27), |
|
}, |
|
{ |
|
name: "net_conntrack_dialer_conn_attempted_total", |
|
cardinality: 4, |
|
percentage: float64(4) / float64(27), |
|
}, |
|
{ |
|
name: "go_info", |
|
cardinality: 1, |
|
percentage: float64(1) / float64(27), |
|
}, |
|
}, stats) |
|
} |
|
|
|
func TestExitCodes(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("skipping test in short mode.") |
|
} |
|
t.Parallel() |
|
|
|
for _, c := range []struct { |
|
file string |
|
exitCode int |
|
lintIssue bool |
|
}{ |
|
{ |
|
file: "prometheus-config.good.yml", |
|
}, |
|
{ |
|
file: "prometheus-config.bad.yml", |
|
exitCode: 1, |
|
}, |
|
{ |
|
file: "prometheus-config.nonexistent.yml", |
|
exitCode: 1, |
|
}, |
|
{ |
|
file: "prometheus-config.lint.yml", |
|
lintIssue: true, |
|
exitCode: 3, |
|
}, |
|
} { |
|
t.Run(c.file, func(t *testing.T) { |
|
t.Parallel() |
|
for _, lintFatal := range []bool{true, false} { |
|
t.Run(strconv.FormatBool(lintFatal), func(t *testing.T) { |
|
t.Parallel() |
|
args := []string{"-test.main", "check", "config", "testdata/" + c.file} |
|
if lintFatal { |
|
args = append(args, "--lint-fatal") |
|
} |
|
tool := exec.Command(promtoolPath, args...) |
|
err := tool.Run() |
|
if c.exitCode == 0 || (c.lintIssue && !lintFatal) { |
|
require.NoError(t, err) |
|
return |
|
} |
|
|
|
require.Error(t, err) |
|
|
|
var exitError *exec.ExitError |
|
if errors.As(err, &exitError) { |
|
status := exitError.Sys().(syscall.WaitStatus) |
|
require.Equal(t, c.exitCode, status.ExitStatus()) |
|
} else { |
|
t.Errorf("unable to retrieve the exit status for promtool: %v", err) |
|
} |
|
}) |
|
} |
|
}) |
|
} |
|
} |
|
|
|
func TestDocumentation(t *testing.T) { |
|
if runtime.GOOS == "windows" { |
|
t.SkipNow() |
|
} |
|
t.Parallel() |
|
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second) |
|
defer cancel() |
|
|
|
cmd := exec.CommandContext(ctx, promtoolPath, "-test.main", "write-documentation") |
|
|
|
var stdout bytes.Buffer |
|
cmd.Stdout = &stdout |
|
|
|
if err := cmd.Run(); err != nil { |
|
var exitError *exec.ExitError |
|
if errors.As(err, &exitError) && exitError.ExitCode() != 0 { |
|
fmt.Println("Command failed with non-zero exit code") |
|
} |
|
} |
|
|
|
generatedContent := strings.ReplaceAll(stdout.String(), filepath.Base(promtoolPath), strings.TrimSuffix(filepath.Base(promtoolPath), ".test")) |
|
|
|
expectedContent, err := os.ReadFile(filepath.Join("..", "..", "docs", "command-line", "promtool.md")) |
|
require.NoError(t, err) |
|
|
|
require.Equal(t, string(expectedContent), generatedContent, "Generated content does not match documentation. Hint: run `make cli-documentation`.") |
|
} |
|
|
|
func TestCheckRules(t *testing.T) { |
|
t.Run("rules-good", func(t *testing.T) { |
|
data, err := os.ReadFile("./testdata/rules.yml") |
|
require.NoError(t, err) |
|
r, w, err := os.Pipe() |
|
if err != nil { |
|
t.Fatal(err) |
|
} |
|
|
|
_, err = w.Write(data) |
|
if err != nil { |
|
t.Error(err) |
|
} |
|
w.Close() |
|
|
|
// Restore stdin right after the test. |
|
defer func(v *os.File) { os.Stdin = v }(os.Stdin) |
|
os.Stdin = r |
|
|
|
exitCode := CheckRules(newLintConfig(lintOptionDuplicateRules, false)) |
|
require.Equal(t, successExitCode, exitCode, "") |
|
}) |
|
|
|
t.Run("rules-bad", func(t *testing.T) { |
|
data, err := os.ReadFile("./testdata/rules-bad.yml") |
|
require.NoError(t, err) |
|
r, w, err := os.Pipe() |
|
if err != nil { |
|
t.Fatal(err) |
|
} |
|
|
|
_, err = w.Write(data) |
|
if err != nil { |
|
t.Error(err) |
|
} |
|
w.Close() |
|
|
|
// Restore stdin right after the test. |
|
defer func(v *os.File) { os.Stdin = v }(os.Stdin) |
|
os.Stdin = r |
|
|
|
exitCode := CheckRules(newLintConfig(lintOptionDuplicateRules, false)) |
|
require.Equal(t, failureExitCode, exitCode, "") |
|
}) |
|
|
|
t.Run("rules-lint-fatal", func(t *testing.T) { |
|
data, err := os.ReadFile("./testdata/prometheus-rules.lint.yml") |
|
require.NoError(t, err) |
|
r, w, err := os.Pipe() |
|
if err != nil { |
|
t.Fatal(err) |
|
} |
|
|
|
_, err = w.Write(data) |
|
if err != nil { |
|
t.Error(err) |
|
} |
|
w.Close() |
|
|
|
// Restore stdin right after the test. |
|
defer func(v *os.File) { os.Stdin = v }(os.Stdin) |
|
os.Stdin = r |
|
|
|
exitCode := CheckRules(newLintConfig(lintOptionDuplicateRules, true)) |
|
require.Equal(t, lintErrExitCode, exitCode, "") |
|
}) |
|
} |
|
|
|
func TestCheckRulesWithRuleFiles(t *testing.T) { |
|
t.Run("rules-good", func(t *testing.T) { |
|
t.Parallel() |
|
exitCode := CheckRules(newLintConfig(lintOptionDuplicateRules, false), "./testdata/rules.yml") |
|
require.Equal(t, successExitCode, exitCode, "") |
|
}) |
|
|
|
t.Run("rules-bad", func(t *testing.T) { |
|
t.Parallel() |
|
exitCode := CheckRules(newLintConfig(lintOptionDuplicateRules, false), "./testdata/rules-bad.yml") |
|
require.Equal(t, failureExitCode, exitCode, "") |
|
}) |
|
|
|
t.Run("rules-lint-fatal", func(t *testing.T) { |
|
t.Parallel() |
|
exitCode := CheckRules(newLintConfig(lintOptionDuplicateRules, true), "./testdata/prometheus-rules.lint.yml") |
|
require.Equal(t, lintErrExitCode, exitCode, "") |
|
}) |
|
} |
|
|
|
func TestTSDBDumpCommand(t *testing.T) { |
|
if testing.Short() { |
|
t.Skip("skipping test in short mode.") |
|
} |
|
t.Parallel() |
|
|
|
storage := promqltest.LoadedStorage(t, ` |
|
load 1m |
|
metric{foo="bar"} 1 2 3 |
|
`) |
|
t.Cleanup(func() { storage.Close() }) |
|
|
|
for _, c := range []struct { |
|
name string |
|
subCmd string |
|
sandboxDirRoot string |
|
}{ |
|
{ |
|
name: "dump", |
|
subCmd: "dump", |
|
}, |
|
{ |
|
name: "dump with sandbox dir root", |
|
subCmd: "dump", |
|
sandboxDirRoot: t.TempDir(), |
|
}, |
|
{ |
|
name: "dump-openmetrics", |
|
subCmd: "dump-openmetrics", |
|
}, |
|
{ |
|
name: "dump-openmetrics with sandbox dir root", |
|
subCmd: "dump-openmetrics", |
|
sandboxDirRoot: t.TempDir(), |
|
}, |
|
} { |
|
t.Run(c.name, func(t *testing.T) { |
|
t.Parallel() |
|
args := []string{"-test.main", "tsdb", c.subCmd, storage.Dir()} |
|
cmd := exec.Command(promtoolPath, args...) |
|
require.NoError(t, cmd.Run()) |
|
}) |
|
} |
|
}
|
|
|