|
9 | 9 | "github.com/go-kit/log" |
10 | 10 | "github.com/prometheus/client_golang/prometheus" |
11 | 11 | "github.com/prometheus/prometheus/model/labels" |
| 12 | + "github.com/prometheus/prometheus/model/rulefmt" |
12 | 13 | "github.com/prometheus/prometheus/notifier" |
13 | 14 | promRules "github.com/prometheus/prometheus/rules" |
14 | 15 | "github.com/stretchr/testify/require" |
@@ -361,3 +362,93 @@ func (m *mockRulesManager) Stop() { |
361 | 362 | m.running.Store(false) |
362 | 363 | close(m.done) |
363 | 364 | } |
| 365 | + |
| 366 | +func TestValidateRuleGroup_AcceptsXFunctions(t *testing.T) { |
| 367 | + manager := &DefaultMultiTenantManager{} |
| 368 | + |
| 369 | + // Test rule with XFunction |
| 370 | + ruleGroupWithXFunc := rulefmt.RuleGroup{ |
| 371 | + Name: "test_group", |
| 372 | + Rules: []rulefmt.Rule{ |
| 373 | + { |
| 374 | + Alert: "TestAlert", |
| 375 | + Expr: "xrate(cpu_usage[5m]) > 0.8", // XFunction |
| 376 | + }, |
| 377 | + }, |
| 378 | + } |
| 379 | + |
| 380 | + errs := manager.ValidateRuleGroup(ruleGroupWithXFunc) |
| 381 | + |
| 382 | + // Should not have validation errors |
| 383 | + if len(errs) != 0 { |
| 384 | + t.Fatalf("Expected no validation errors for XFunction after fix, got: %v", errs) |
| 385 | + } |
| 386 | +} |
| 387 | + |
| 388 | +func TestValidateRuleGroup_AcceptsStandardFunctions(t *testing.T) { |
| 389 | + manager := &DefaultMultiTenantManager{} |
| 390 | + |
| 391 | + // Test rule with standard function (should pass) |
| 392 | + ruleGroupStandard := rulefmt.RuleGroup{ |
| 393 | + Name: "test_group", |
| 394 | + Rules: []rulefmt.Rule{ |
| 395 | + { |
| 396 | + Alert: "TestAlert", |
| 397 | + Expr: "rate(cpu_usage[5m]) > 0.8", // Standard function |
| 398 | + }, |
| 399 | + }, |
| 400 | + } |
| 401 | + |
| 402 | + errs := manager.ValidateRuleGroup(ruleGroupStandard) |
| 403 | + |
| 404 | + // Should have no validation errors |
| 405 | + if len(errs) != 0 { |
| 406 | + t.Fatalf("Expected no validation errors for standard function, got: %v", errs) |
| 407 | + } |
| 408 | +} |
| 409 | + |
| 410 | +func TestValidateRuleGroup_RejectsInvalidRules(t *testing.T) { |
| 411 | + manager := &DefaultMultiTenantManager{} |
| 412 | + |
| 413 | + // Test rule with invalid expression syntax |
| 414 | + ruleGroupInvalid := rulefmt.RuleGroup{ |
| 415 | + Name: "test_group", |
| 416 | + Rules: []rulefmt.Rule{ |
| 417 | + { |
| 418 | + Alert: "TestAlert", |
| 419 | + Expr: "invalid_syntax_here >", // Invalid expression |
| 420 | + }, |
| 421 | + }, |
| 422 | + } |
| 423 | + |
| 424 | + errs := manager.ValidateRuleGroup(ruleGroupInvalid) |
| 425 | + |
| 426 | + // Should have validation errors and they should be properly propagated |
| 427 | + require.NotEmpty(t, errs, "Expected validation errors for invalid expression") |
| 428 | + // Verify the error is a rulefmt.Error with proper group information |
| 429 | + ruleErr, ok := errs[0].(*rulefmt.Error) |
| 430 | + require.True(t, ok, "Error should be of type *rulefmt.Error") |
| 431 | + require.Equal(t, "test_group", ruleErr.Group, "Error should contain correct group name") |
| 432 | + require.Equal(t, "TestAlert", ruleErr.RuleName, "Error should contain correct rule name") |
| 433 | +} |
| 434 | + |
| 435 | +func TestValidateRuleGroup_RejectsEmptyGroupName(t *testing.T) { |
| 436 | + manager := &DefaultMultiTenantManager{} |
| 437 | + |
| 438 | + // Test rule group with empty name |
| 439 | + ruleGroupEmptyName := rulefmt.RuleGroup{ |
| 440 | + Name: "", // Empty name |
| 441 | + Rules: []rulefmt.Rule{ |
| 442 | + { |
| 443 | + Alert: "TestAlert", |
| 444 | + Expr: "rate(cpu_usage[5m]) > 0.8", |
| 445 | + }, |
| 446 | + }, |
| 447 | + } |
| 448 | + |
| 449 | + errs := manager.ValidateRuleGroup(ruleGroupEmptyName) |
| 450 | + |
| 451 | + // Should have validation errors |
| 452 | + require.NotEmpty(t, errs, "Expected validation errors for empty group name") |
| 453 | + require.Contains(t, errs[0].Error(), "rule group name must not be empty", "Error should mention empty group name") |
| 454 | +} |
0 commit comments