|
| 1 | +//go:build requires_docker |
| 2 | +// +build requires_docker |
| 3 | + |
| 4 | +package integration |
| 5 | + |
| 6 | +import ( |
| 7 | + "fmt" |
| 8 | + "path/filepath" |
| 9 | + "testing" |
| 10 | + "time" |
| 11 | + |
| 12 | + "github.com/prometheus/prometheus/model/labels" |
| 13 | + "github.com/prometheus/prometheus/prompb" |
| 14 | + "github.com/stretchr/testify/require" |
| 15 | + |
| 16 | + "github.com/cortexproject/cortex/integration/e2e" |
| 17 | + e2edb "github.com/cortexproject/cortex/integration/e2e/db" |
| 18 | + "github.com/cortexproject/cortex/integration/e2ecortex" |
| 19 | +) |
| 20 | + |
| 21 | +func Test_RulerExternalLabels_UTF8Validation(t *testing.T) { |
| 22 | + s, err := e2e.NewScenario(networkName) |
| 23 | + require.NoError(t, err) |
| 24 | + defer s.Close() |
| 25 | + |
| 26 | + // Start dependencies. |
| 27 | + minio := e2edb.NewMinio(9000, bucketName) |
| 28 | + require.NoError(t, s.StartAndWaitReady(minio)) |
| 29 | + |
| 30 | + require.NoError(t, copyFileToSharedDir(s, "docs/configuration/single-process-config-blocks-local.yaml", cortexConfigFile)) |
| 31 | + |
| 32 | + runtimeConfigYamlFile := ` |
| 33 | +overrides: |
| 34 | + 'user-2': |
| 35 | + name_validation_scheme: utf8 |
| 36 | + ruler_external_labels: |
| 37 | + test.utf8.metric: 😄 |
| 38 | +` |
| 39 | + require.NoError(t, writeFileToSharedDir(s, runtimeConfigFile, []byte(runtimeConfigYamlFile))) |
| 40 | + filePath := filepath.Join(e2e.ContainerSharedDir, runtimeConfigFile) |
| 41 | + |
| 42 | + // Start Cortex components. |
| 43 | + require.NoError(t, copyFileToSharedDir(s, "docs/configuration/single-process-config-blocks.yaml", cortexConfigFile)) |
| 44 | + |
| 45 | + flags := map[string]string{ |
| 46 | + "-runtime-config.file": filePath, |
| 47 | + "-runtime-config.backend": "filesystem", |
| 48 | + // ingester |
| 49 | + "-blocks-storage.s3.access-key-id": e2edb.MinioAccessKey, |
| 50 | + "-blocks-storage.s3.secret-access-key": e2edb.MinioSecretKey, |
| 51 | + "-blocks-storage.s3.bucket-name": bucketName, |
| 52 | + "-blocks-storage.s3.endpoint": fmt.Sprintf("%s-minio-9000:9000", networkName), |
| 53 | + "-blocks-storage.s3.insecure": "true", |
| 54 | + // alert manager |
| 55 | + "-alertmanager.web.external-url": "http://localhost/alertmanager", |
| 56 | + "-alertmanager-storage.backend": "local", |
| 57 | + "-alertmanager-storage.local.path": filepath.Join(e2e.ContainerSharedDir, "alertmanager_configs"), |
| 58 | + } |
| 59 | + // make alert manager config dir |
| 60 | + require.NoError(t, writeFileToSharedDir(s, "alertmanager_configs", []byte{})) |
| 61 | + |
| 62 | + cortex := e2ecortex.NewSingleBinaryWithConfigFile("cortex-1", cortexConfigFile, flags, "", 9009, 9095) |
| 63 | + require.NoError(t, s.StartAndWaitReady(cortex)) |
| 64 | +} |
| 65 | + |
| 66 | +func Test_Distributor_UTF8ValidationPerTenant(t *testing.T) { |
| 67 | + s, err := e2e.NewScenario(networkName) |
| 68 | + require.NoError(t, err) |
| 69 | + defer s.Close() |
| 70 | + |
| 71 | + runtimeConfigYamlFile := ` |
| 72 | +overrides: |
| 73 | + 'user-2': |
| 74 | + name_validation_scheme: utf8 |
| 75 | +` |
| 76 | + |
| 77 | + require.NoError(t, writeFileToSharedDir(s, runtimeConfigFile, []byte(runtimeConfigYamlFile))) |
| 78 | + filePath := filepath.Join(e2e.ContainerSharedDir, runtimeConfigFile) |
| 79 | + |
| 80 | + flags := mergeFlags(BlocksStorageFlags(), map[string]string{ |
| 81 | + "-runtime-config.file": filePath, |
| 82 | + "-runtime-config.backend": "filesystem", |
| 83 | + "-validation.name-validation-scheme": "legacy", |
| 84 | + "-ingester.heartbeat-period": "1s", |
| 85 | + // distributor |
| 86 | + "-distributor.replication-factor": "1", |
| 87 | + // alert manager |
| 88 | + "-alertmanager.web.external-url": "http://localhost/alertmanager", |
| 89 | + "-alertmanager-storage.backend": "local", |
| 90 | + "-alertmanager-storage.local.path": filepath.Join(e2e.ContainerSharedDir, "alertmanager_configs"), |
| 91 | + }) |
| 92 | + |
| 93 | + // Start dependencies. |
| 94 | + consul := e2edb.NewConsul() |
| 95 | + minio := e2edb.NewMinio(9000, flags["-blocks-storage.s3.bucket-name"]) |
| 96 | + require.NoError(t, s.StartAndWaitReady(consul, minio)) |
| 97 | + |
| 98 | + // make alert manager config dir |
| 99 | + require.NoError(t, writeFileToSharedDir(s, "alertmanager_configs", []byte{})) |
| 100 | + |
| 101 | + // Start Cortex components. |
| 102 | + distributor := e2ecortex.NewDistributor("distributor", e2ecortex.RingStoreConsul, consul.NetworkHTTPEndpoint(), flags, "") |
| 103 | + ingester := e2ecortex.NewIngester("ingester", e2ecortex.RingStoreConsul, consul.NetworkHTTPEndpoint(), flags, "") |
| 104 | + require.NoError(t, s.StartAndWaitReady(distributor, ingester)) |
| 105 | + |
| 106 | + // Wait until distributor has updated the ring. |
| 107 | + require.NoError(t, distributor.WaitSumMetricsWithOptions(e2e.Equals(1), []string{"cortex_ring_members"}, e2e.WithLabelMatchers( |
| 108 | + labels.MustNewMatcher(labels.MatchEqual, "name", "ingester"), |
| 109 | + labels.MustNewMatcher(labels.MatchEqual, "state", "ACTIVE")))) |
| 110 | + |
| 111 | + // user-1 uses legacy validation |
| 112 | + user1Client, err := e2ecortex.NewClient(distributor.HTTPEndpoint(), "", "", "", "user-1") |
| 113 | + require.NoError(t, err) |
| 114 | + |
| 115 | + // user-2 uses utf8 validation |
| 116 | + user2Client, err := e2ecortex.NewClient(distributor.HTTPEndpoint(), "", "", "", "user-2") |
| 117 | + require.NoError(t, err) |
| 118 | + |
| 119 | + now := time.Now() |
| 120 | + |
| 121 | + utf8Series, _ := generateSeries("series_1", now, prompb.Label{Name: "test.utf8.metric", Value: "😄"}) |
| 122 | + legacySeries, _ := generateSeries("series_2", now, prompb.Label{Name: "job", Value: "test"}) |
| 123 | + |
| 124 | + res, err := user1Client.Push(legacySeries) |
| 125 | + require.NoError(t, err) |
| 126 | + require.Equal(t, 200, res.StatusCode) |
| 127 | + |
| 128 | + // utf8Series push should be fail for user-1 |
| 129 | + res, err = user1Client.Push(utf8Series) |
| 130 | + require.NoError(t, err) |
| 131 | + require.Equal(t, 400, res.StatusCode) |
| 132 | + |
| 133 | + res, err = user2Client.Push(legacySeries) |
| 134 | + require.NoError(t, err) |
| 135 | + require.Equal(t, 200, res.StatusCode) |
| 136 | + |
| 137 | + // utf8Series push should be success for user-2 |
| 138 | + res, err = user2Client.Push(utf8Series) |
| 139 | + require.NoError(t, err) |
| 140 | + require.Equal(t, 200, res.StatusCode) |
| 141 | +} |
0 commit comments