mirror of
https://github.com/SigNoz/signoz.git
synced 2025-12-17 07:26:20 +00:00
* chore: added custom distpatcher * feat(notification-grouping): added notification grouping * feat(notification-grouping): addded integration test dependency * feat(notification-grouping): linting and test cases * feat(notification-grouping): linting and test cases * feat(notification-grouping): linting and test cases * feat(notification-grouping): addded integration test dependency * feat(notification-grouping): debug log lines * feat(notification-grouping): debug log lines * feat(notification-grouping): debug log lines * feat(notification-grouping): addded integration test dependency * feat(notification-grouping): addded integration test dependency * feat(notification-grouping): addded integration test dependency * feat(notification-grouping): added structure changes * feat(notification-grouping): added structure changes * feat(notification-routing): added notification routing * chore(notification-grouping): added notificaiton grouping * Update pkg/alertmanager/nfmanager/rulebasednotification/provider.go Co-authored-by: ellipsis-dev[bot] <65095814+ellipsis-dev[bot]@users.noreply.github.com> * chore(notification-grouping): added renotification interval * fix(notification-grouping): added fix for renotification * chore(notificaiton-grouping): added no data renotify * chore(notificaiton-grouping): added no data renotify * chore(notificaiton-grouping): added no data renotify * chore(notification-grouping): added no data renotify interval * chore(notification-grouping): removed errors package from dispatcher * chore(notification-grouping): removed errors package from dispatcher * chore(notification-grouping): removed unwanted tests * chore(notification-grouping): removed unwanted pkg name * chore(notification-grouping): added delete notification setting * chore(notification-grouping): added delete notification setting * Update pkg/alertmanager/nfmanager/nfmanagertest/provider.go Co-authored-by: ellipsis-dev[bot] <65095814+ellipsis-dev[bot]@users.noreply.github.com> * chore(notification-grouping): removed nfmanager config| notification settings in postable rule * chore(notification-grouping): removed nfmanager config| notification settings in postable rule * chore(notification-grouping): added test for dispatcher * chore(notification-grouping): added test for dispatcher * chore(notification-grouping): go linting errors * chore(notification-grouping): added test cases for aggGroupPerRoute * chore(notification-grouping): added test cases for aggGroupPerRoute * chore(notification-grouping): corrected get notification config logic * Update pkg/alertmanager/nfmanager/rulebasednotification/provider_test.go Co-authored-by: ellipsis-dev[bot] <65095814+ellipsis-dev[bot]@users.noreply.github.com> * chore(notification-routing): added notification routing policies * feat(notification-routing): added test cases for dispatcher * chore(notification-routing): added notification routing policies * chore(notification-routing): added notification routing policies * Apply suggestions from code review Co-authored-by: ellipsis-dev[bot] <65095814+ellipsis-dev[bot]@users.noreply.github.com> * chore(notification-routing): added notification routing policies * chore(notification-routing): added notification routing policies * Update pkg/alertmanager/alertmanagerserver/distpatcher_test.go Co-authored-by: ellipsis-dev[bot] <65095814+ellipsis-dev[bot]@users.noreply.github.com> * chore(notification-routing): sorted imports * chore(notification-routing): minor edit |pr resolve comments * chore(notification-grouping): corrected dispatcher test cases * chore(notification-routing): added notification routing policies * chore(notification-routing): corrected race condition in test * chore: resolved pr comments * chore: passing threshold value to tempalte * chore: completed delete rule functionality * chore: added grouping disabled functionality * chore: added grouping disabled functionality * chore(notification-routing): resolved pr comments * chore(notification-routing): resolved pr comments * chore(notification-routing): resolved pr comments * chore(notification-routing): sorted imports * chore(notification-routing): fix linting errors * chore(notification-routing): removed enabled flags * fix: test rule multiple threhsold (#9224) * chore: corrected linting errors * chore: corrected linting errors * chore: corrected linting errors * chore: corrected linting errors * chore: corrected migration errors * chore: corrected migration errors * chore: corrected migration errors * chore: corrected migration errors * Update pkg/sqlmigration/049_add_route_policy.go Co-authored-by: ellipsis-dev[bot] <65095814+ellipsis-dev[bot]@users.noreply.github.com> * chore: added org_is as foreign key * chore: resolved pr comments * chore: removed route store unused --------- Co-authored-by: Srikanth Chekuri <srikanth.chekuri92@gmail.com> Co-authored-by: ellipsis-dev[bot] <65095814+ellipsis-dev[bot]@users.noreply.github.com>
177 lines
6.5 KiB
Go
177 lines
6.5 KiB
Go
package nfroutingstoretest
|
|
|
|
import (
|
|
"context"
|
|
"regexp"
|
|
"strings"
|
|
|
|
"github.com/DATA-DOG/go-sqlmock"
|
|
"github.com/SigNoz/signoz/pkg/alertmanager/nfmanager/nfroutingstore/sqlroutingstore"
|
|
"github.com/SigNoz/signoz/pkg/sqlstore"
|
|
"github.com/SigNoz/signoz/pkg/sqlstore/sqlstoretest"
|
|
"github.com/SigNoz/signoz/pkg/types/alertmanagertypes"
|
|
)
|
|
|
|
type MockSQLRouteStore struct {
|
|
routeStore alertmanagertypes.RouteStore
|
|
mock sqlmock.Sqlmock
|
|
}
|
|
|
|
func NewMockSQLRouteStore() *MockSQLRouteStore {
|
|
sqlStore := sqlstoretest.New(sqlstore.Config{Provider: "sqlite"}, sqlmock.QueryMatcherRegexp)
|
|
routeStore := sqlroutingstore.NewStore(sqlStore)
|
|
|
|
return &MockSQLRouteStore{
|
|
routeStore: routeStore,
|
|
mock: sqlStore.Mock(),
|
|
}
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) Mock() sqlmock.Sqlmock {
|
|
return m.mock
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) GetByID(ctx context.Context, orgId string, id string) (*alertmanagertypes.RoutePolicy, error) {
|
|
return m.routeStore.GetByID(ctx, orgId, id)
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) Create(ctx context.Context, route *alertmanagertypes.RoutePolicy) error {
|
|
return m.routeStore.Create(ctx, route)
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) CreateBatch(ctx context.Context, routes []*alertmanagertypes.RoutePolicy) error {
|
|
return m.routeStore.CreateBatch(ctx, routes)
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) Delete(ctx context.Context, orgId string, id string) error {
|
|
return m.routeStore.Delete(ctx, orgId, id)
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) GetAllByKind(ctx context.Context, orgID string, kind alertmanagertypes.ExpressionKind) ([]*alertmanagertypes.RoutePolicy, error) {
|
|
return m.routeStore.GetAllByKind(ctx, orgID, kind)
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) GetAllByName(ctx context.Context, orgID string, name string) ([]*alertmanagertypes.RoutePolicy, error) {
|
|
return m.routeStore.GetAllByName(ctx, orgID, name)
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) DeleteRouteByName(ctx context.Context, orgID string, name string) error {
|
|
return m.routeStore.DeleteRouteByName(ctx, orgID, name)
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) ExpectGetByID(orgID, id string, route *alertmanagertypes.RoutePolicy) {
|
|
rows := sqlmock.NewRows([]string{"id", "org_id", "name", "expression", "kind", "description", "enabled", "tags", "channels", "created_at", "updated_at", "created_by", "updated_by"})
|
|
|
|
if route != nil {
|
|
rows.AddRow(
|
|
route.ID.StringValue(),
|
|
route.OrgID,
|
|
route.Name,
|
|
route.Expression,
|
|
route.ExpressionKind.StringValue(),
|
|
route.Description,
|
|
route.Enabled,
|
|
"[]", // tags as JSON
|
|
`["`+strings.Join(route.Channels, `","`)+`"]`, // channels as JSON
|
|
"0001-01-01T00:00:00Z", // created_at
|
|
"0001-01-01T00:00:00Z", // updated_at
|
|
"", // created_by
|
|
"", // updated_by
|
|
)
|
|
}
|
|
|
|
m.mock.ExpectQuery(`SELECT (.+) FROM "route_policy" WHERE \(id = \$1\) AND \(org_id = \$2\)`).
|
|
WithArgs(id, orgID).
|
|
WillReturnRows(rows)
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) ExpectCreate(route *alertmanagertypes.RoutePolicy) {
|
|
expectedPattern := `INSERT INTO "route_policy" \(.+\) VALUES .+`
|
|
m.mock.ExpectExec(expectedPattern).
|
|
WillReturnResult(sqlmock.NewResult(1, 1))
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) ExpectCreateBatch(routes []*alertmanagertypes.RoutePolicy) {
|
|
if len(routes) == 0 {
|
|
return
|
|
}
|
|
|
|
// Simplified pattern that should match any INSERT into route_policy
|
|
expectedPattern := `INSERT INTO "route_policy" \(.+\) VALUES .+`
|
|
|
|
m.mock.ExpectExec(expectedPattern).
|
|
WillReturnResult(sqlmock.NewResult(1, int64(len(routes))))
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) ExpectDelete(orgID, id string) {
|
|
m.mock.ExpectExec(`DELETE FROM "route_policy" AS "route_policy" WHERE \(org_id = '` + regexp.QuoteMeta(orgID) + `'\) AND \(id = '` + regexp.QuoteMeta(id) + `'\)`).
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) ExpectGetAllByKindAndOrgID(orgID string, kind alertmanagertypes.ExpressionKind, routes []*alertmanagertypes.RoutePolicy) {
|
|
rows := sqlmock.NewRows([]string{"id", "org_id", "name", "expression", "kind", "description", "enabled", "tags", "channels", "created_at", "updated_at", "created_by", "updated_by"})
|
|
|
|
for _, route := range routes {
|
|
if route.OrgID == orgID && route.ExpressionKind == kind {
|
|
rows.AddRow(
|
|
route.ID.StringValue(),
|
|
route.OrgID,
|
|
route.Name,
|
|
route.Expression,
|
|
route.ExpressionKind.StringValue(),
|
|
route.Description,
|
|
route.Enabled,
|
|
"[]", // tags as JSON
|
|
`["`+strings.Join(route.Channels, `","`)+`"]`, // channels as JSON
|
|
"0001-01-01T00:00:00Z", // created_at
|
|
"0001-01-01T00:00:00Z", // updated_at
|
|
"", // created_by
|
|
"", // updated_by
|
|
)
|
|
}
|
|
}
|
|
|
|
m.mock.ExpectQuery(`SELECT (.+) FROM "route_policy" WHERE \(org_id = '` + regexp.QuoteMeta(orgID) + `'\) AND \(kind = '` + regexp.QuoteMeta(kind.StringValue()) + `'\)`).
|
|
WillReturnRows(rows)
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) ExpectGetAllByName(orgID, name string, routes []*alertmanagertypes.RoutePolicy) {
|
|
rows := sqlmock.NewRows([]string{"id", "org_id", "name", "expression", "kind", "description", "enabled", "tags", "channels", "created_at", "updated_at", "created_by", "updated_by"})
|
|
|
|
for _, route := range routes {
|
|
if route.OrgID == orgID && route.Name == name {
|
|
rows.AddRow(
|
|
route.ID.StringValue(),
|
|
route.OrgID,
|
|
route.Name,
|
|
route.Expression,
|
|
route.ExpressionKind.StringValue(),
|
|
route.Description,
|
|
route.Enabled,
|
|
"[]", // tags as JSON
|
|
`["`+strings.Join(route.Channels, `","`)+`"]`, // channels as JSON
|
|
"0001-01-01T00:00:00Z", // created_at
|
|
"0001-01-01T00:00:00Z", // updated_at
|
|
"", // created_by
|
|
"", // updated_by
|
|
)
|
|
}
|
|
}
|
|
|
|
m.mock.ExpectQuery(`SELECT (.+) FROM "route_policy" WHERE \(org_id = '` + regexp.QuoteMeta(orgID) + `'\) AND \(name = '` + regexp.QuoteMeta(name) + `'\)`).
|
|
WillReturnRows(rows)
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) ExpectDeleteRouteByName(orgID, name string) {
|
|
m.mock.ExpectExec(`DELETE FROM "route_policy" AS "route_policy" WHERE \(org_id = '` + regexp.QuoteMeta(orgID) + `'\) AND \(name = '` + regexp.QuoteMeta(name) + `'\)`).
|
|
WillReturnResult(sqlmock.NewResult(0, 1))
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) ExpectationsWereMet() error {
|
|
return m.mock.ExpectationsWereMet()
|
|
}
|
|
|
|
func (m *MockSQLRouteStore) MatchExpectationsInOrder(match bool) {
|
|
m.mock.MatchExpectationsInOrder(match)
|
|
}
|