github.com/m3db/m3@v1.5.0/src/metrics/rules/validator/validator_test.go (about)

     1  // Copyright (c) 2017 Uber Technologies, Inc.
     2  //
     3  // Permission is hereby granted, free of charge, to any person obtaining a copy
     4  // of this software and associated documentation files (the "Software"), to deal
     5  // in the Software without restriction, including without limitation the rights
     6  // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
     7  // copies of the Software, and to permit persons to whom the Software is
     8  // furnished to do so, subject to the following conditions:
     9  //
    10  // The above copyright notice and this permission notice shall be included in
    11  // all copies or substantial portions of the Software.
    12  //
    13  // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
    14  // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
    15  // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
    16  // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
    17  // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
    18  // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
    19  // THE SOFTWARE.
    20  
    21  package validator
    22  
    23  import (
    24  	"fmt"
    25  	"math"
    26  	"strings"
    27  	"testing"
    28  
    29  	"github.com/m3db/m3/src/cluster/generated/proto/commonpb"
    30  	"github.com/m3db/m3/src/cluster/kv/mem"
    31  	"github.com/m3db/m3/src/metrics/aggregation"
    32  	"github.com/m3db/m3/src/metrics/errors"
    33  	"github.com/m3db/m3/src/metrics/filters"
    34  	"github.com/m3db/m3/src/metrics/metric"
    35  	"github.com/m3db/m3/src/metrics/pipeline"
    36  	"github.com/m3db/m3/src/metrics/policy"
    37  	"github.com/m3db/m3/src/metrics/rules/validator/namespace"
    38  	"github.com/m3db/m3/src/metrics/rules/validator/namespace/kv"
    39  	"github.com/m3db/m3/src/metrics/rules/view"
    40  	"github.com/m3db/m3/src/metrics/transformation"
    41  
    42  	"github.com/fortytw2/leaktest"
    43  	"github.com/stretchr/testify/assert"
    44  	"github.com/stretchr/testify/require"
    45  )
    46  
    47  const (
    48  	testTypeTag       = "type"
    49  	testCounterType   = "counter"
    50  	testTimerType     = "timer"
    51  	testGaugeType     = "gauge"
    52  	testNamespacesKey = "testNamespaces"
    53  )
    54  
    55  var (
    56  	testNamespaces = []string{"foo", "bar"}
    57  )
    58  
    59  func TestValidatorDefaultNamespaceValidator(t *testing.T) {
    60  	v := NewValidator(testValidatorOptions()).(*validator)
    61  
    62  	inputs := []string{"foo", "bar", "baz"}
    63  	for _, input := range inputs {
    64  		require.NoError(t, v.validateNamespace(input))
    65  	}
    66  }
    67  
    68  func TestValidatorInvalidNamespace(t *testing.T) {
    69  	defer leaktest.Check(t)()
    70  
    71  	nsValidator := testKVNamespaceValidator(t)
    72  	opts := testValidatorOptions().SetNamespaceValidator(nsValidator)
    73  	v := NewValidator(opts)
    74  	defer v.Close()
    75  
    76  	view := view.RuleSet{Namespace: "baz"}
    77  	require.Error(t, v.ValidateSnapshot(view))
    78  }
    79  
    80  func TestValidatorValidNamespace(t *testing.T) {
    81  	defer leaktest.Check(t)()
    82  
    83  	nsValidator := testKVNamespaceValidator(t)
    84  	opts := testValidatorOptions().SetNamespaceValidator(nsValidator)
    85  	v := NewValidator(opts)
    86  	defer v.Close()
    87  
    88  	view := view.RuleSet{Namespace: "foo"}
    89  	require.NoError(t, v.ValidateSnapshot(view))
    90  }
    91  
    92  func TestValidatorValidateDuplicateMappingRules(t *testing.T) {
    93  	view := view.RuleSet{
    94  		MappingRules: []view.MappingRule{
    95  			{
    96  				Name:            "snapshot1",
    97  				Filter:          "tag1:value1",
    98  				StoragePolicies: testStoragePolicies(),
    99  			},
   100  			{
   101  				Name:            "snapshot1",
   102  				Filter:          "tag1:value1",
   103  				StoragePolicies: testStoragePolicies(),
   104  			},
   105  		},
   106  	}
   107  	validator := NewValidator(testValidatorOptions())
   108  	err := validator.ValidateSnapshot(view)
   109  	require.Error(t, err)
   110  	_, ok := err.(errors.InvalidInputError)
   111  	require.True(t, ok)
   112  }
   113  
   114  func TestValidatorValidateNoDuplicateMappingRulesWithTombstone(t *testing.T) {
   115  	view := view.RuleSet{
   116  		MappingRules: []view.MappingRule{
   117  			{
   118  				Name:            "snapshot1",
   119  				Filter:          "tag1:value1",
   120  				Tombstoned:      true,
   121  				StoragePolicies: testStoragePolicies(),
   122  			},
   123  			{
   124  				Name:            "snapshot1",
   125  				Filter:          "tag1:value1",
   126  				StoragePolicies: testStoragePolicies(),
   127  			},
   128  		},
   129  	}
   130  
   131  	validator := NewValidator(testValidatorOptions())
   132  	require.NoError(t, validator.ValidateSnapshot(view))
   133  }
   134  
   135  func TestValidatorValidateMappingRuleInvalidFilterExpr(t *testing.T) {
   136  	view := view.RuleSet{
   137  		MappingRules: []view.MappingRule{
   138  			{
   139  				Name:   "snapshot1",
   140  				Filter: "randomTag:*too*many*wildcards*",
   141  			},
   142  		},
   143  	}
   144  	validator := NewValidator(testValidatorOptions())
   145  	require.Error(t, validator.ValidateSnapshot(view))
   146  }
   147  
   148  func TestValidatorValidateMappingRuleInvalidFilterTagName(t *testing.T) {
   149  	invalidChars := []rune{'$'}
   150  	view := view.RuleSet{
   151  		MappingRules: []view.MappingRule{
   152  			{
   153  				Name:   "snapshot1",
   154  				Filter: "random$Tag:foo",
   155  			},
   156  		},
   157  	}
   158  	validator := NewValidator(testValidatorOptions().SetTagNameInvalidChars(invalidChars))
   159  	require.Error(t, validator.ValidateSnapshot(view))
   160  }
   161  
   162  func TestValidatorValidateMappingRuleInvalidMetricType(t *testing.T) {
   163  	view := view.RuleSet{
   164  		MappingRules: []view.MappingRule{
   165  			{
   166  				Name:            "snapshot1",
   167  				Filter:          testTypeTag + ":nonexistent",
   168  				StoragePolicies: testStoragePolicies(),
   169  			},
   170  		},
   171  	}
   172  
   173  	validator := NewValidator(testValidatorOptions())
   174  	require.Error(t, validator.ValidateSnapshot(view))
   175  }
   176  
   177  func TestValidatorValidateMappingRuleInvalidAggregationType(t *testing.T) {
   178  	view := view.RuleSet{
   179  		MappingRules: []view.MappingRule{
   180  			{
   181  				Name:          "snapshot1",
   182  				Filter:        testTypeTag + ":" + testCounterType,
   183  				AggregationID: aggregation.ID{1234567789},
   184  			},
   185  		},
   186  	}
   187  
   188  	validator := NewValidator(testValidatorOptions())
   189  	require.Error(t, validator.ValidateSnapshot(view))
   190  }
   191  
   192  func TestValidatorValidateMappingRuleMultipleAggregationTypes(t *testing.T) {
   193  	testAggregationTypes := []aggregation.Type{aggregation.Count, aggregation.Max}
   194  	view := view.RuleSet{
   195  		MappingRules: []view.MappingRule{
   196  			{
   197  				Name:            "snapshot1",
   198  				Filter:          testTypeTag + ":" + testTimerType,
   199  				AggregationID:   aggregation.MustCompressTypes(aggregation.Count, aggregation.Max),
   200  				StoragePolicies: testStoragePolicies(),
   201  			},
   202  		},
   203  	}
   204  	inputs := []struct {
   205  		opts      Options
   206  		expectErr bool
   207  	}{
   208  		{
   209  			// By default multiple aggregation types are allowed for timers.
   210  			opts:      testValidatorOptions().SetAllowedFirstLevelAggregationTypesFor(metric.TimerType, testAggregationTypes),
   211  			expectErr: false,
   212  		},
   213  		{
   214  			// Explicitly disallow multiple aggregation types for timers.
   215  			opts:      testValidatorOptions().SetAllowedFirstLevelAggregationTypesFor(metric.TimerType, testAggregationTypes).SetMultiAggregationTypesEnabledFor(nil),
   216  			expectErr: true,
   217  		},
   218  	}
   219  
   220  	for _, input := range inputs {
   221  		validator := NewValidator(input.opts)
   222  		if input.expectErr {
   223  			require.Error(t, validator.ValidateSnapshot(view))
   224  		} else {
   225  			require.NoError(t, validator.ValidateSnapshot(view))
   226  		}
   227  	}
   228  }
   229  
   230  func TestValidatorValidateMappingRuleFirstLevelAggregationType(t *testing.T) {
   231  	testAggregationTypes := []aggregation.Type{aggregation.Count, aggregation.Max}
   232  	view := view.RuleSet{
   233  		MappingRules: []view.MappingRule{
   234  			{
   235  				Name:            "snapshot1",
   236  				Filter:          testTypeTag + ":" + testTimerType,
   237  				AggregationID:   aggregation.MustCompressTypes(aggregation.Count, aggregation.Max),
   238  				StoragePolicies: testStoragePolicies(),
   239  			},
   240  		},
   241  	}
   242  	inputs := []struct {
   243  		opts      Options
   244  		expectErr bool
   245  	}{
   246  		{
   247  			// By default no custom aggregation type is allowed.
   248  			opts:      testValidatorOptions(),
   249  			expectErr: true,
   250  		},
   251  		{
   252  			// Aggregation type is allowed through the default list of custom aggregation types.
   253  			opts:      testValidatorOptions().SetDefaultAllowedFirstLevelAggregationTypes(testAggregationTypes),
   254  			expectErr: false,
   255  		},
   256  		{
   257  			// Aggregation type is allowed through the list of custom aggregation types for timers.
   258  			opts:      testValidatorOptions().SetAllowedFirstLevelAggregationTypesFor(metric.TimerType, testAggregationTypes),
   259  			expectErr: false,
   260  		},
   261  	}
   262  
   263  	for _, input := range inputs {
   264  		validator := NewValidator(input.opts)
   265  		if input.expectErr {
   266  			require.Error(t, validator.ValidateSnapshot(view))
   267  		} else {
   268  			require.NoError(t, validator.ValidateSnapshot(view))
   269  		}
   270  	}
   271  }
   272  
   273  func TestValidatorValidateMappingRuleNoStoragePolicies(t *testing.T) {
   274  	view := view.RuleSet{
   275  		MappingRules: []view.MappingRule{
   276  			{
   277  				Name:   "snapshot1",
   278  				Filter: testTypeTag + ":" + testCounterType,
   279  			},
   280  		},
   281  	}
   282  
   283  	validator := NewValidator(testValidatorOptions())
   284  	err := validator.ValidateSnapshot(view)
   285  	require.Error(t, err)
   286  	require.True(t, strings.Contains(err.Error(), "no storage policies"))
   287  }
   288  
   289  func TestValidatorValidateMappingRuleDuplicateStoragePolicies(t *testing.T) {
   290  	view := view.RuleSet{
   291  		MappingRules: []view.MappingRule{
   292  			{
   293  				Name:   "snapshot1",
   294  				Filter: testTypeTag + ":" + testCounterType,
   295  				StoragePolicies: policy.StoragePolicies{
   296  					policy.MustParseStoragePolicy("10s:6h"),
   297  					policy.MustParseStoragePolicy("10s:6h"),
   298  				},
   299  			},
   300  		},
   301  	}
   302  
   303  	validator := NewValidator(testValidatorOptions())
   304  	err := validator.ValidateSnapshot(view)
   305  	require.Error(t, err)
   306  	require.True(t, strings.Contains(err.Error(), "duplicate storage policy '10s:6h'"))
   307  }
   308  
   309  func TestValidatorValidateMappingRuleDisallowedStoragePolicies(t *testing.T) {
   310  	view := view.RuleSet{
   311  		MappingRules: []view.MappingRule{
   312  			{
   313  				Name:   "snapshot1",
   314  				Filter: testTypeTag + ":" + testCounterType,
   315  				StoragePolicies: policy.StoragePolicies{
   316  					policy.MustParseStoragePolicy("1s:6h"),
   317  				},
   318  			},
   319  		},
   320  	}
   321  
   322  	validator := NewValidator(testValidatorOptions())
   323  	require.Error(t, validator.ValidateSnapshot(view))
   324  }
   325  
   326  func TestValidatorValidateMappingRule(t *testing.T) {
   327  	view := view.RuleSet{
   328  		MappingRules: []view.MappingRule{
   329  			{
   330  				Name:            "snapshot1",
   331  				Filter:          testTypeTag + ":" + testCounterType,
   332  				StoragePolicies: testStoragePolicies(),
   333  			},
   334  		},
   335  	}
   336  
   337  	validator := NewValidator(testValidatorOptions())
   338  	require.NoError(t, validator.ValidateSnapshot(view))
   339  }
   340  
   341  func TestValidatorValidateDuplicateRollupRules(t *testing.T) {
   342  	view := view.RuleSet{
   343  		RollupRules: []view.RollupRule{
   344  			{
   345  				Name:   "snapshot1",
   346  				Filter: "tag1:value1",
   347  			},
   348  			{
   349  				Name:   "snapshot1",
   350  				Filter: "tag1:value1",
   351  			},
   352  		},
   353  	}
   354  	validator := NewValidator(testValidatorOptions())
   355  	err := validator.ValidateSnapshot(view)
   356  	require.Error(t, err)
   357  	_, ok := err.(errors.InvalidInputError)
   358  	require.True(t, ok)
   359  }
   360  
   361  func TestValidatorValidateNoDuplicateRollupRulesWithTombstone(t *testing.T) {
   362  	rr1, err := pipeline.NewRollupOp(
   363  		pipeline.GroupByRollupType,
   364  		"rName1",
   365  		[]string{"rtagName1", "rtagName2"},
   366  		aggregation.DefaultID,
   367  	)
   368  	require.NoError(t, err)
   369  	rr2, err := pipeline.NewRollupOp(
   370  		pipeline.GroupByRollupType,
   371  		"rName1",
   372  		[]string{"rtagName1", "rtagName2"},
   373  		aggregation.DefaultID,
   374  	)
   375  	require.NoError(t, err)
   376  
   377  	view := view.RuleSet{
   378  		RollupRules: []view.RollupRule{
   379  			{
   380  				Name:       "snapshot1",
   381  				Filter:     "tag1:value1",
   382  				Tombstoned: true,
   383  				Targets: []view.RollupTarget{
   384  					{
   385  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   386  							{
   387  								Type:   pipeline.RollupOpType,
   388  								Rollup: rr1,
   389  							},
   390  						}),
   391  						StoragePolicies: testStoragePolicies(),
   392  					},
   393  				},
   394  			},
   395  			{
   396  				Name:   "snapshot1",
   397  				Filter: "tag1:value1",
   398  				Targets: []view.RollupTarget{
   399  					{
   400  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   401  							{
   402  								Type:   pipeline.RollupOpType,
   403  								Rollup: rr2,
   404  							},
   405  						}),
   406  						StoragePolicies: testStoragePolicies(),
   407  					},
   408  				},
   409  			},
   410  		},
   411  	}
   412  
   413  	validator := NewValidator(testValidatorOptions())
   414  	require.NoError(t, validator.ValidateSnapshot(view))
   415  }
   416  
   417  func TestValidatorValidateRollupRuleInvalidFilterExpr(t *testing.T) {
   418  	rr1, err := pipeline.NewRollupOp(
   419  		pipeline.GroupByRollupType,
   420  		"rName1",
   421  		[]string{"rtagName1", "rtagName2"},
   422  		aggregation.DefaultID,
   423  	)
   424  	require.NoError(t, err)
   425  
   426  	view := view.RuleSet{
   427  		RollupRules: []view.RollupRule{
   428  			{
   429  				Name:   "snapshot1",
   430  				Filter: "randomTag:*too*many*wildcards*",
   431  				Targets: []view.RollupTarget{
   432  					{
   433  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   434  							{
   435  								Type:   pipeline.RollupOpType,
   436  								Rollup: rr1,
   437  							},
   438  						}),
   439  						StoragePolicies: testStoragePolicies(),
   440  					},
   441  				},
   442  			},
   443  		},
   444  	}
   445  
   446  	validator := NewValidator(testValidatorOptions())
   447  	require.Error(t, validator.ValidateSnapshot(view))
   448  }
   449  
   450  func TestValidatorValidateRollupRuleInvalidFilterTagName(t *testing.T) {
   451  	rr1, err := pipeline.NewRollupOp(
   452  		pipeline.GroupByRollupType,
   453  		"rName1",
   454  		[]string{"rtagName1", "rtagName2"},
   455  		aggregation.DefaultID,
   456  	)
   457  	require.NoError(t, err)
   458  
   459  	invalidChars := []rune{'$'}
   460  	view := view.RuleSet{
   461  		RollupRules: []view.RollupRule{
   462  			{
   463  				Name:   "snapshot1",
   464  				Filter: "random$Tag:foo",
   465  				Targets: []view.RollupTarget{
   466  					{
   467  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   468  							{
   469  								Type:   pipeline.RollupOpType,
   470  								Rollup: rr1,
   471  							},
   472  						}),
   473  						StoragePolicies: testStoragePolicies(),
   474  					},
   475  				},
   476  			},
   477  		},
   478  	}
   479  	validator := NewValidator(testValidatorOptions().SetTagNameInvalidChars(invalidChars))
   480  	require.Error(t, validator.ValidateSnapshot(view))
   481  }
   482  
   483  func TestValidatorValidateRollupRuleInvalidMetricType(t *testing.T) {
   484  	rr1, err := pipeline.NewRollupOp(
   485  		pipeline.GroupByRollupType,
   486  		"rName1",
   487  		[]string{"rtagName1", "rtagName2"},
   488  		aggregation.DefaultID,
   489  	)
   490  	require.NoError(t, err)
   491  
   492  	view := view.RuleSet{
   493  		RollupRules: []view.RollupRule{
   494  			{
   495  				Name:   "snapshot1",
   496  				Filter: testTypeTag + ":nonexistent",
   497  				Targets: []view.RollupTarget{
   498  					{
   499  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   500  							{
   501  								Type:   pipeline.RollupOpType,
   502  								Rollup: rr1,
   503  							},
   504  						}),
   505  						StoragePolicies: testStoragePolicies(),
   506  					},
   507  				},
   508  			},
   509  		},
   510  	}
   511  	validator := NewValidator(testValidatorOptions())
   512  	require.Error(t, validator.ValidateSnapshot(view))
   513  }
   514  
   515  func TestValidatorValidateRollupRulePipelineEmptyPipeline(t *testing.T) {
   516  	view := view.RuleSet{
   517  		RollupRules: []view.RollupRule{
   518  			{
   519  				Name:   "snapshot1",
   520  				Filter: testTypeTag + ":" + testCounterType,
   521  				Targets: []view.RollupTarget{
   522  					{
   523  						Pipeline:        pipeline.NewPipeline([]pipeline.OpUnion{}),
   524  						StoragePolicies: testStoragePolicies(),
   525  					},
   526  				},
   527  			},
   528  		},
   529  	}
   530  	validator := NewValidator(testValidatorOptions())
   531  	err := validator.ValidateSnapshot(view)
   532  	require.Error(t, err)
   533  	require.True(t, strings.Contains(err.Error(), "empty pipeline"))
   534  }
   535  
   536  func TestValidatorValidateRollupRulePipelineInvalidPipelineOp(t *testing.T) {
   537  	view := view.RuleSet{
   538  		RollupRules: []view.RollupRule{
   539  			{
   540  				Name:   "snapshot1",
   541  				Filter: testTypeTag + ":" + testCounterType,
   542  				Targets: []view.RollupTarget{
   543  					{
   544  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   545  							{},
   546  						}),
   547  						StoragePolicies: testStoragePolicies(),
   548  					},
   549  				},
   550  			},
   551  		},
   552  	}
   553  	validator := NewValidator(testValidatorOptions())
   554  	err := validator.ValidateSnapshot(view)
   555  	require.Error(t, err)
   556  	require.True(t, strings.Contains(err.Error(), "operation at index 0 has invalid type"))
   557  }
   558  
   559  func TestValidatorValidateRollupRulePipelineMultipleAggregationOps(t *testing.T) {
   560  	view := view.RuleSet{
   561  		RollupRules: []view.RollupRule{
   562  			{
   563  				Name:   "snapshot1",
   564  				Filter: testTypeTag + ":" + testCounterType,
   565  				Targets: []view.RollupTarget{
   566  					{
   567  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   568  							{
   569  								Type:        pipeline.AggregationOpType,
   570  								Aggregation: pipeline.AggregationOp{Type: aggregation.Sum},
   571  							},
   572  							{
   573  								Type:        pipeline.AggregationOpType,
   574  								Aggregation: pipeline.AggregationOp{Type: aggregation.Sum},
   575  							},
   576  						}),
   577  						StoragePolicies: testStoragePolicies(),
   578  					},
   579  				},
   580  			},
   581  		},
   582  	}
   583  	allowedAggregationTypes := aggregation.Types{aggregation.Sum}
   584  	opts := testValidatorOptions().
   585  		SetAllowedFirstLevelAggregationTypesFor(metric.CounterType, allowedAggregationTypes)
   586  	validator := NewValidator(opts)
   587  	err := validator.ValidateSnapshot(view)
   588  	require.Error(t, err)
   589  	require.True(t, strings.Contains(err.Error(), "more than one aggregation operation in pipeline"))
   590  }
   591  
   592  func TestValidatorValidateRollupRulePipelineAggregationOpNotFirst(t *testing.T) {
   593  	view := view.RuleSet{
   594  		RollupRules: []view.RollupRule{
   595  			{
   596  				Name:   "snapshot1",
   597  				Filter: testTypeTag + ":" + testCounterType,
   598  				Targets: []view.RollupTarget{
   599  					{
   600  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   601  							{
   602  								Type:           pipeline.TransformationOpType,
   603  								Transformation: pipeline.TransformationOp{Type: transformation.PerSecond},
   604  							},
   605  							{
   606  								Type:        pipeline.AggregationOpType,
   607  								Aggregation: pipeline.AggregationOp{Type: aggregation.Sum},
   608  							},
   609  						}),
   610  						StoragePolicies: testStoragePolicies(),
   611  					},
   612  				},
   613  			},
   614  		},
   615  	}
   616  	allowedAggregationTypes := aggregation.Types{aggregation.Sum}
   617  	opts := testValidatorOptions().
   618  		SetAllowedFirstLevelAggregationTypesFor(metric.CounterType, allowedAggregationTypes)
   619  	validator := NewValidator(opts)
   620  	err := validator.ValidateSnapshot(view)
   621  	require.Error(t, err)
   622  	require.True(t, strings.Contains(err.Error(), "aggregation operation is not the first operation in pipeline"))
   623  }
   624  
   625  func TestValidatorValidateRollupRulePipelineAggregationOpInvalidAggregationType(t *testing.T) {
   626  	view := view.RuleSet{
   627  		RollupRules: []view.RollupRule{
   628  			{
   629  				Name:   "snapshot1",
   630  				Filter: testTypeTag + ":" + testCounterType,
   631  				Targets: []view.RollupTarget{
   632  					{
   633  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   634  							{
   635  								Type:        pipeline.AggregationOpType,
   636  								Aggregation: pipeline.AggregationOp{},
   637  							},
   638  						}),
   639  						StoragePolicies: testStoragePolicies(),
   640  					},
   641  				},
   642  			},
   643  		},
   644  	}
   645  	allowedAggregationTypes := aggregation.Types{aggregation.Sum}
   646  	opts := testValidatorOptions().
   647  		SetAllowedFirstLevelAggregationTypesFor(metric.CounterType, allowedAggregationTypes)
   648  	validator := NewValidator(opts)
   649  	err := validator.ValidateSnapshot(view)
   650  	require.Error(t, err)
   651  	require.True(t, strings.Contains(err.Error(), "invalid aggregation operation at index 0"))
   652  }
   653  
   654  func TestValidatorValidateRollupRulePipelineAggregationOpDisallowedAggregationType(t *testing.T) {
   655  	view := view.RuleSet{
   656  		RollupRules: []view.RollupRule{
   657  			{
   658  				Name:   "snapshot1",
   659  				Filter: testTypeTag + ":" + testCounterType,
   660  				Targets: []view.RollupTarget{
   661  					{
   662  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   663  							{
   664  								Type:        pipeline.AggregationOpType,
   665  								Aggregation: pipeline.AggregationOp{Type: aggregation.Sum},
   666  							},
   667  						}),
   668  						StoragePolicies: testStoragePolicies(),
   669  					},
   670  				},
   671  			},
   672  		},
   673  	}
   674  	validator := NewValidator(testValidatorOptions())
   675  	err := validator.ValidateSnapshot(view)
   676  	require.Error(t, err)
   677  	require.True(t, strings.Contains(err.Error(), "invalid aggregation operation at index 0"))
   678  }
   679  
   680  func TestValidatorValidateRollupRulePipelineTransformationDerivativeOrderNotSupported(t *testing.T) {
   681  	rr1, err := pipeline.NewRollupOp(
   682  		pipeline.GroupByRollupType,
   683  		"rName1",
   684  		[]string{"rtagName1", "rtagName2"},
   685  		aggregation.DefaultID,
   686  	)
   687  	require.NoError(t, err)
   688  
   689  	view := view.RuleSet{
   690  		RollupRules: []view.RollupRule{
   691  			{
   692  				Name:   "snapshot1",
   693  				Filter: testTypeTag + ":" + testCounterType,
   694  				Targets: []view.RollupTarget{
   695  					{
   696  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   697  							{
   698  								Type:   pipeline.RollupOpType,
   699  								Rollup: rr1,
   700  							},
   701  							{
   702  								Type:           pipeline.TransformationOpType,
   703  								Transformation: pipeline.TransformationOp{Type: transformation.PerSecond},
   704  							},
   705  							{
   706  								Type:           pipeline.TransformationOpType,
   707  								Transformation: pipeline.TransformationOp{Type: transformation.PerSecond},
   708  							},
   709  						}),
   710  						StoragePolicies: testStoragePolicies(),
   711  					},
   712  				},
   713  			},
   714  		},
   715  	}
   716  	validator := NewValidator(testValidatorOptions())
   717  	err = validator.ValidateSnapshot(view)
   718  	require.Error(t, err)
   719  	require.True(t, strings.Contains(err.Error(), "transformation derivative order is 2 higher than supported 1"))
   720  }
   721  
   722  func TestValidatorValidateRollupRulePipelineInvalidTransformationType(t *testing.T) {
   723  	view := view.RuleSet{
   724  		RollupRules: []view.RollupRule{
   725  			{
   726  				Name:   "snapshot1",
   727  				Filter: testTypeTag + ":" + testCounterType,
   728  				Targets: []view.RollupTarget{
   729  					{
   730  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   731  							{
   732  								Type:           pipeline.TransformationOpType,
   733  								Transformation: pipeline.TransformationOp{},
   734  							},
   735  						}),
   736  						StoragePolicies: testStoragePolicies(),
   737  					},
   738  				},
   739  			},
   740  		},
   741  	}
   742  	validator := NewValidator(testValidatorOptions())
   743  	err := validator.ValidateSnapshot(view)
   744  	require.Error(t, err)
   745  	require.True(t, strings.Contains(err.Error(), "invalid transformation operation at index 0"))
   746  }
   747  
   748  func TestValidatorValidateRollupRulePipelineNoRollupOp(t *testing.T) {
   749  	view := view.RuleSet{
   750  		RollupRules: []view.RollupRule{
   751  			{
   752  				Name:   "snapshot1",
   753  				Filter: testTypeTag + ":" + testCounterType,
   754  				Targets: []view.RollupTarget{
   755  					{
   756  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   757  							{
   758  								Type:           pipeline.TransformationOpType,
   759  								Transformation: pipeline.TransformationOp{Type: transformation.PerSecond},
   760  							},
   761  						}),
   762  						StoragePolicies: testStoragePolicies(),
   763  					},
   764  				},
   765  			},
   766  		},
   767  	}
   768  	validator := NewValidator(testValidatorOptions())
   769  	err := validator.ValidateSnapshot(view)
   770  	require.Error(t, err)
   771  	require.True(t, strings.Contains(err.Error(), "no rollup operation in pipeline"))
   772  }
   773  
   774  func TestValidatorValidateRollupRulePipelineRollupLevelHigherThanMax(t *testing.T) {
   775  	rr1, err := pipeline.NewRollupOp(
   776  		pipeline.GroupByRollupType,
   777  		"rName1",
   778  		[]string{"rtagName1", "rtagName2"},
   779  		aggregation.DefaultID,
   780  	)
   781  	require.NoError(t, err)
   782  	rr2, err := pipeline.NewRollupOp(
   783  		pipeline.GroupByRollupType,
   784  		"rName2",
   785  		[]string{"rtagName1", "rtagName2"},
   786  		aggregation.DefaultID,
   787  	)
   788  	require.NoError(t, err)
   789  
   790  	view := view.RuleSet{
   791  		RollupRules: []view.RollupRule{
   792  			{
   793  				Name:   "snapshot1",
   794  				Filter: testTypeTag + ":" + testCounterType,
   795  				Targets: []view.RollupTarget{
   796  					{
   797  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   798  							{
   799  								Type:   pipeline.RollupOpType,
   800  								Rollup: rr1,
   801  							},
   802  							{
   803  								Type:   pipeline.RollupOpType,
   804  								Rollup: rr2,
   805  							},
   806  						}),
   807  						StoragePolicies: testStoragePolicies(),
   808  					},
   809  				},
   810  			},
   811  		},
   812  	}
   813  	validator := NewValidator(testValidatorOptions())
   814  	err = validator.ValidateSnapshot(view)
   815  	require.Error(t, err)
   816  	require.True(t, strings.Contains(err.Error(), "number of rollup levels is 2 higher than supported 1"))
   817  }
   818  
   819  func TestValidatorValidateRollupRulePipelineRollupTagNotFoundInPrevRollupOp(t *testing.T) {
   820  	rr1, err := pipeline.NewRollupOp(
   821  		pipeline.GroupByRollupType,
   822  		"rName1",
   823  		[]string{"rtagName1", "rtagName2"},
   824  		aggregation.DefaultID,
   825  	)
   826  	require.NoError(t, err)
   827  	rr2, err := pipeline.NewRollupOp(
   828  		pipeline.GroupByRollupType,
   829  		"rName2",
   830  		[]string{"rtagName1", "rtagName2", "rtagName3"},
   831  		aggregation.DefaultID,
   832  	)
   833  	require.NoError(t, err)
   834  
   835  	view := view.RuleSet{
   836  		RollupRules: []view.RollupRule{
   837  			{
   838  				Name:   "snapshot1",
   839  				Filter: testTypeTag + ":" + testCounterType,
   840  				Targets: []view.RollupTarget{
   841  					{
   842  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   843  							{
   844  								Type:   pipeline.RollupOpType,
   845  								Rollup: rr1,
   846  							},
   847  							{
   848  								Type:   pipeline.RollupOpType,
   849  								Rollup: rr2,
   850  							},
   851  						}),
   852  						StoragePolicies: testStoragePolicies(),
   853  					},
   854  				},
   855  			},
   856  		},
   857  	}
   858  	validator := NewValidator(testValidatorOptions().SetMaxRollupLevels(100))
   859  	err = validator.ValidateSnapshot(view)
   860  	require.Error(t, err)
   861  	require.True(t, strings.Contains(err.Error(), "tag rtagName3 not found in previous rollup operations"))
   862  }
   863  
   864  func TestValidatorValidateRollupRulePipelineRollupTagUnchangedInConsecutiveRollupOps(t *testing.T) {
   865  	rr1, err := pipeline.NewRollupOp(
   866  		pipeline.GroupByRollupType,
   867  		"rName1",
   868  		[]string{"rtagName1", "rtagName2"},
   869  		aggregation.DefaultID,
   870  	)
   871  	require.NoError(t, err)
   872  	rr2, err := pipeline.NewRollupOp(
   873  		pipeline.GroupByRollupType,
   874  		"rName2",
   875  		[]string{"rtagName1", "rtagName2"},
   876  		aggregation.DefaultID,
   877  	)
   878  	require.NoError(t, err)
   879  	view := view.RuleSet{
   880  		RollupRules: []view.RollupRule{
   881  			{
   882  				Name:   "snapshot1",
   883  				Filter: testTypeTag + ":" + testCounterType,
   884  				Targets: []view.RollupTarget{
   885  					{
   886  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   887  							{
   888  								Type:   pipeline.RollupOpType,
   889  								Rollup: rr1,
   890  							},
   891  							{
   892  								Type:   pipeline.RollupOpType,
   893  								Rollup: rr2,
   894  							},
   895  						}),
   896  						StoragePolicies: testStoragePolicies(),
   897  					},
   898  				},
   899  			},
   900  		},
   901  	}
   902  	validator := NewValidator(testValidatorOptions().SetMaxRollupLevels(100))
   903  	err = validator.ValidateSnapshot(view)
   904  	require.Error(t, err)
   905  	require.True(t, strings.Contains(err.Error(), "same set of 2 rollup tags in consecutive rollup operations"))
   906  }
   907  
   908  func TestValidatorValidateRollupRulePipelineMultiLevelRollup(t *testing.T) {
   909  	rr1, err := pipeline.NewRollupOp(
   910  		pipeline.GroupByRollupType,
   911  		"rName1",
   912  		[]string{"rtagName1", "rtagName2", "rtagName3"},
   913  		aggregation.DefaultID,
   914  	)
   915  	require.NoError(t, err)
   916  	rr2, err := pipeline.NewRollupOp(
   917  		pipeline.GroupByRollupType,
   918  		"rName2",
   919  		[]string{"rtagName1", "rtagName2"},
   920  		aggregation.DefaultID,
   921  	)
   922  	require.NoError(t, err)
   923  	rr3, err := pipeline.NewRollupOp(
   924  		pipeline.GroupByRollupType,
   925  		"rName2",
   926  		[]string{"rtagName1"},
   927  		aggregation.DefaultID,
   928  	)
   929  	require.NoError(t, err)
   930  
   931  	view := view.RuleSet{
   932  		RollupRules: []view.RollupRule{
   933  			{
   934  				Name:   "snapshot1",
   935  				Filter: testTypeTag + ":" + testCounterType,
   936  				Targets: []view.RollupTarget{
   937  					{
   938  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   939  							{
   940  								Type:   pipeline.RollupOpType,
   941  								Rollup: rr1,
   942  							},
   943  							{
   944  								Type:   pipeline.RollupOpType,
   945  								Rollup: rr2,
   946  							},
   947  							{
   948  								Type:   pipeline.RollupOpType,
   949  								Rollup: rr3,
   950  							},
   951  						}),
   952  						StoragePolicies: testStoragePolicies(),
   953  					},
   954  				},
   955  			},
   956  		},
   957  	}
   958  	validator := NewValidator(testValidatorOptions().SetMaxRollupLevels(3))
   959  	require.NoError(t, validator.ValidateSnapshot(view))
   960  }
   961  
   962  func TestValidatorValidateRollupRuleRollupOpDuplicateRollupTag(t *testing.T) {
   963  	rr1, err := pipeline.NewRollupOp(
   964  		pipeline.GroupByRollupType,
   965  		"rName1",
   966  		[]string{"rtagName1", "rtagName2", "rtagName2"},
   967  		aggregation.DefaultID,
   968  	)
   969  	require.NoError(t, err)
   970  
   971  	view := view.RuleSet{
   972  		RollupRules: []view.RollupRule{
   973  			{
   974  				Name:   "snapshot1",
   975  				Filter: testTypeTag + ":" + testCounterType,
   976  				Targets: []view.RollupTarget{
   977  					{
   978  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
   979  							{
   980  								Type:   pipeline.RollupOpType,
   981  								Rollup: rr1,
   982  							},
   983  						}),
   984  						StoragePolicies: testStoragePolicies(),
   985  					},
   986  				},
   987  			},
   988  		},
   989  	}
   990  	validator := NewValidator(testValidatorOptions())
   991  	err = validator.ValidateSnapshot(view)
   992  	require.Error(t, err)
   993  	require.True(t, strings.Contains(err.Error(), "duplicate rollup tag: 'rtagName2'"))
   994  }
   995  
   996  func TestValidatorValidateRollupRuleRollupOpMissingRequiredTag(t *testing.T) {
   997  	rr1, err := pipeline.NewRollupOp(
   998  		pipeline.GroupByRollupType,
   999  		"rName1",
  1000  		[]string{"rtagName1", "rtagName2"},
  1001  		aggregation.DefaultID,
  1002  	)
  1003  	require.NoError(t, err)
  1004  
  1005  	view := view.RuleSet{
  1006  		RollupRules: []view.RollupRule{
  1007  			{
  1008  				Name:   "snapshot1",
  1009  				Filter: testTypeTag + ":" + testCounterType,
  1010  				Targets: []view.RollupTarget{
  1011  					{
  1012  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1013  							{
  1014  								Type:   pipeline.RollupOpType,
  1015  								Rollup: rr1,
  1016  							},
  1017  						}),
  1018  						StoragePolicies: testStoragePolicies(),
  1019  					},
  1020  				},
  1021  			},
  1022  		},
  1023  	}
  1024  	validator := NewValidator(testValidatorOptions().SetRequiredRollupTags([]string{"requiredTag"}))
  1025  	err = validator.ValidateSnapshot(view)
  1026  	require.Error(t, err)
  1027  	require.True(t, strings.Contains(err.Error(), "missing required rollup tag: 'requiredTag'"))
  1028  }
  1029  
  1030  func TestValidatorValidateRollupRuleRollupOpWithInvalidMetricName(t *testing.T) {
  1031  	rr1, err := pipeline.NewRollupOp(
  1032  		pipeline.GroupByRollupType,
  1033  		"rName$1",
  1034  		[]string{"rtagName1", "rtagName2"},
  1035  		aggregation.DefaultID,
  1036  	)
  1037  	require.NoError(t, err)
  1038  	invalidChars := []rune{'$'}
  1039  	view := view.RuleSet{
  1040  		RollupRules: []view.RollupRule{
  1041  			{
  1042  				Name:   "snapshot1",
  1043  				Filter: testTypeTag + ":" + testCounterType,
  1044  				Targets: []view.RollupTarget{
  1045  					{
  1046  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1047  							{
  1048  								Type:   pipeline.RollupOpType,
  1049  								Rollup: rr1,
  1050  							},
  1051  						}),
  1052  						StoragePolicies: testStoragePolicies(),
  1053  					},
  1054  				},
  1055  			},
  1056  		},
  1057  	}
  1058  
  1059  	validator := NewValidator(testValidatorOptions().SetMetricNameInvalidChars(invalidChars))
  1060  	require.Error(t, validator.ValidateSnapshot(view))
  1061  }
  1062  
  1063  func TestValidatorValidateRollupRuleRollupOpWithEmptyMetricName(t *testing.T) {
  1064  	rr1, err := pipeline.NewRollupOp(
  1065  		pipeline.GroupByRollupType,
  1066  		"",
  1067  		[]string{"rtagName1", "rtagName2"},
  1068  		aggregation.DefaultID,
  1069  	)
  1070  	require.NoError(t, err)
  1071  	invalidChars := []rune{'$'}
  1072  	view := view.RuleSet{
  1073  		RollupRules: []view.RollupRule{
  1074  			{
  1075  				Name:   "snapshot1",
  1076  				Filter: testTypeTag + ":" + testCounterType,
  1077  				Targets: []view.RollupTarget{
  1078  					{
  1079  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1080  							{
  1081  								Type:   pipeline.RollupOpType,
  1082  								Rollup: rr1,
  1083  							},
  1084  						}),
  1085  						StoragePolicies: testStoragePolicies(),
  1086  					},
  1087  				},
  1088  			},
  1089  		},
  1090  	}
  1091  
  1092  	validator := NewValidator(testValidatorOptions().SetMetricNameInvalidChars(invalidChars))
  1093  	require.Error(t, validator.ValidateSnapshot(view))
  1094  }
  1095  
  1096  func TestValidatorValidateRollupRuleRollupOpWithValidMetricName(t *testing.T) {
  1097  	rr1, err := pipeline.NewRollupOp(
  1098  		pipeline.GroupByRollupType,
  1099  		"",
  1100  		[]string{"rtagName1", "rtagName2"},
  1101  		aggregation.DefaultID,
  1102  	)
  1103  	require.NoError(t, err)
  1104  	invalidChars := []rune{' ', '%'}
  1105  	view := view.RuleSet{
  1106  		RollupRules: []view.RollupRule{
  1107  			{
  1108  				Name:   "snapshot1",
  1109  				Filter: testTypeTag + ":" + testCounterType,
  1110  				Targets: []view.RollupTarget{
  1111  					{
  1112  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1113  							{
  1114  								Type:   pipeline.RollupOpType,
  1115  								Rollup: rr1,
  1116  							},
  1117  						}),
  1118  						StoragePolicies: testStoragePolicies(),
  1119  					},
  1120  				},
  1121  			},
  1122  		},
  1123  	}
  1124  
  1125  	validator := NewValidator(testValidatorOptions().SetMetricNameInvalidChars(invalidChars))
  1126  	require.Error(t, validator.ValidateSnapshot(view))
  1127  }
  1128  
  1129  func TestValidatorValidateRollupRuleRollupOpWithInvalidTagName(t *testing.T) {
  1130  	rr1, err := pipeline.NewRollupOp(
  1131  		pipeline.GroupByRollupType,
  1132  		"foo",
  1133  		[]string{"rtagName1", "rtagName2", "$"},
  1134  		aggregation.DefaultID,
  1135  	)
  1136  	require.NoError(t, err)
  1137  	invalidChars := []rune{'$'}
  1138  	view := view.RuleSet{
  1139  		RollupRules: []view.RollupRule{
  1140  			{
  1141  				Name:   "snapshot1",
  1142  				Filter: testTypeTag + ":" + testCounterType,
  1143  				Targets: []view.RollupTarget{
  1144  					{
  1145  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1146  							{
  1147  								Type:   pipeline.RollupOpType,
  1148  								Rollup: rr1,
  1149  							},
  1150  						}),
  1151  						StoragePolicies: testStoragePolicies(),
  1152  					},
  1153  				},
  1154  			},
  1155  		},
  1156  	}
  1157  
  1158  	validator := NewValidator(testValidatorOptions().SetTagNameInvalidChars(invalidChars))
  1159  	require.Error(t, validator.ValidateSnapshot(view))
  1160  }
  1161  
  1162  func TestValidatorValidateRollupRuleRollupOpWithValidTagName(t *testing.T) {
  1163  	rr1, err := pipeline.NewRollupOp(
  1164  		pipeline.GroupByRollupType,
  1165  		"foo",
  1166  		[]string{"rtagName1", "rtagName2", "$"},
  1167  		aggregation.DefaultID,
  1168  	)
  1169  	require.NoError(t, err)
  1170  	invalidChars := []rune{' ', '%'}
  1171  	view := view.RuleSet{
  1172  		RollupRules: []view.RollupRule{
  1173  			{
  1174  				Name:   "snapshot1",
  1175  				Filter: testTypeTag + ":" + testCounterType,
  1176  				Targets: []view.RollupTarget{
  1177  					{
  1178  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1179  							{
  1180  								Type:   pipeline.RollupOpType,
  1181  								Rollup: rr1,
  1182  							},
  1183  						}),
  1184  						StoragePolicies: testStoragePolicies(),
  1185  					},
  1186  				},
  1187  			},
  1188  		},
  1189  	}
  1190  
  1191  	validator := NewValidator(testValidatorOptions().SetMetricNameInvalidChars(invalidChars))
  1192  	require.NoError(t, validator.ValidateSnapshot(view))
  1193  }
  1194  
  1195  func TestValidatorValidateNoTimertypeFilter(t *testing.T) {
  1196  	for _, test := range []string{
  1197  		"rollup",
  1198  		"mapping",
  1199  	} {
  1200  		t.Run(test, func(t *testing.T) {
  1201  			ruleView := view.RuleSet{}
  1202  			if test == "rollup" {
  1203  				ruleView.RollupRules = []view.RollupRule{
  1204  					{
  1205  						Name:   "foo",
  1206  						Filter: "service:bar timertype:count",
  1207  					},
  1208  				}
  1209  			} else {
  1210  				ruleView.MappingRules = []view.MappingRule{
  1211  					{
  1212  						Name:       "foo",
  1213  						Filter:     "service:bar timertype:count",
  1214  						DropPolicy: policy.DropMust,
  1215  					},
  1216  				}
  1217  			}
  1218  
  1219  			validator := NewValidator(testValidatorOptions().SetFilterInvalidTagNames([]string{"timertype"}))
  1220  			assert.Error(t, validator.ValidateSnapshot(ruleView))
  1221  
  1222  			if test == "rollup" {
  1223  				ruleView.RollupRules = ruleView.RollupRules[:0]
  1224  			} else {
  1225  				ruleView.MappingRules = ruleView.MappingRules[:0]
  1226  			}
  1227  
  1228  			assert.NoError(t, validator.ValidateSnapshot(ruleView))
  1229  		})
  1230  	}
  1231  }
  1232  
  1233  func TestValidatorValidateRollupRuleRollupOpMultipleAggregationTypes(t *testing.T) {
  1234  	rr1, err := pipeline.NewRollupOp(
  1235  		pipeline.GroupByRollupType,
  1236  		"rName1",
  1237  		[]string{"rtagName1", "rtagName2"},
  1238  		aggregation.MustCompressTypes(aggregation.Count, aggregation.Max),
  1239  	)
  1240  	require.NoError(t, err)
  1241  
  1242  	testAggregationTypes := []aggregation.Type{aggregation.Count, aggregation.Max}
  1243  	view := view.RuleSet{
  1244  		RollupRules: []view.RollupRule{
  1245  			{
  1246  				Name:   "snapshot1",
  1247  				Filter: testTypeTag + ":" + testTimerType,
  1248  				Targets: []view.RollupTarget{
  1249  					{
  1250  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1251  							{
  1252  								Type:   pipeline.RollupOpType,
  1253  								Rollup: rr1,
  1254  							},
  1255  						}),
  1256  						StoragePolicies: policy.StoragePolicies{
  1257  							policy.MustParseStoragePolicy("10s:6h"),
  1258  						},
  1259  					},
  1260  				},
  1261  			},
  1262  		},
  1263  	}
  1264  	inputs := []struct {
  1265  		opts      Options
  1266  		expectErr bool
  1267  	}{
  1268  		{
  1269  			// By default multiple aggregation types are allowed for timers.
  1270  			opts:      testValidatorOptions().SetDefaultAllowedFirstLevelAggregationTypes(testAggregationTypes),
  1271  			expectErr: false,
  1272  		},
  1273  		{
  1274  			// Explicitly disallow multiple aggregation types for timers.
  1275  			opts:      testValidatorOptions().SetDefaultAllowedFirstLevelAggregationTypes(testAggregationTypes).SetMultiAggregationTypesEnabledFor(nil),
  1276  			expectErr: true,
  1277  		},
  1278  	}
  1279  
  1280  	for _, input := range inputs {
  1281  		validator := NewValidator(input.opts)
  1282  		if input.expectErr {
  1283  			require.Error(t, validator.ValidateSnapshot(view))
  1284  		} else {
  1285  			require.NoError(t, validator.ValidateSnapshot(view))
  1286  		}
  1287  	}
  1288  }
  1289  
  1290  func TestValidatorValidateRollupRuleRollupOpFirstLevelAggregationTypes(t *testing.T) {
  1291  	rr1, err := pipeline.NewRollupOp(
  1292  		pipeline.GroupByRollupType,
  1293  		"rName1",
  1294  		[]string{"rtagName1", "rtagName2"},
  1295  		aggregation.MustCompressTypes(aggregation.Count, aggregation.Max),
  1296  	)
  1297  	require.NoError(t, err)
  1298  	testAggregationTypes := []aggregation.Type{aggregation.Count, aggregation.Max}
  1299  	view := view.RuleSet{
  1300  		RollupRules: []view.RollupRule{
  1301  			{
  1302  				Name:   "snapshot1",
  1303  				Filter: testTypeTag + ":" + testTimerType,
  1304  				Targets: []view.RollupTarget{
  1305  					{
  1306  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1307  							{
  1308  								Type:   pipeline.RollupOpType,
  1309  								Rollup: rr1,
  1310  							},
  1311  						}),
  1312  						StoragePolicies: policy.StoragePolicies{
  1313  							policy.MustParseStoragePolicy("10s:6h"),
  1314  						},
  1315  					},
  1316  				},
  1317  			},
  1318  		},
  1319  	}
  1320  	inputs := []struct {
  1321  		opts      Options
  1322  		expectErr bool
  1323  	}{
  1324  		{
  1325  			// By default no custom aggregation type is allowed.
  1326  			opts:      testValidatorOptions(),
  1327  			expectErr: true,
  1328  		},
  1329  		{
  1330  			// Aggregation type is allowed through the default list of custom aggregation types.
  1331  			opts:      testValidatorOptions().SetDefaultAllowedFirstLevelAggregationTypes(testAggregationTypes),
  1332  			expectErr: false,
  1333  		},
  1334  		{
  1335  			// Aggregation type is allowed through the list of custom aggregation types for timers.
  1336  			opts:      testValidatorOptions().SetAllowedFirstLevelAggregationTypesFor(metric.TimerType, testAggregationTypes),
  1337  			expectErr: false,
  1338  		},
  1339  	}
  1340  
  1341  	for _, input := range inputs {
  1342  		validator := NewValidator(input.opts)
  1343  		if input.expectErr {
  1344  			require.Error(t, validator.ValidateSnapshot(view))
  1345  		} else {
  1346  			require.NoError(t, validator.ValidateSnapshot(view))
  1347  		}
  1348  	}
  1349  }
  1350  
  1351  func TestValidatorValidateRollupRuleRollupOpNonFirstLevelAggregationTypes(t *testing.T) {
  1352  	rr1, err := pipeline.NewRollupOp(
  1353  		pipeline.GroupByRollupType,
  1354  		"rName1",
  1355  		[]string{"rtagName1", "rtagName2"},
  1356  		aggregation.MustCompressTypes(aggregation.Count, aggregation.Max),
  1357  	)
  1358  	require.NoError(t, err)
  1359  	testAggregationTypes := []aggregation.Type{aggregation.Count, aggregation.Max}
  1360  	view := view.RuleSet{
  1361  		RollupRules: []view.RollupRule{
  1362  			{
  1363  				Name:   "snapshot1",
  1364  				Filter: testTypeTag + ":" + testTimerType,
  1365  				Targets: []view.RollupTarget{
  1366  					{
  1367  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1368  							{
  1369  								Type:           pipeline.TransformationOpType,
  1370  								Transformation: pipeline.TransformationOp{Type: transformation.PerSecond},
  1371  							},
  1372  							{
  1373  								Type:   pipeline.RollupOpType,
  1374  								Rollup: rr1,
  1375  							},
  1376  						}),
  1377  						StoragePolicies: policy.StoragePolicies{
  1378  							policy.MustParseStoragePolicy("10s:6h"),
  1379  						},
  1380  					},
  1381  				},
  1382  			},
  1383  		},
  1384  	}
  1385  	inputs := []struct {
  1386  		opts      Options
  1387  		expectErr bool
  1388  	}{
  1389  		{
  1390  			// By default no custom aggregation type is allowed.
  1391  			opts:      testValidatorOptions(),
  1392  			expectErr: true,
  1393  		},
  1394  		{
  1395  			// Aggregation type is allowed through the default list of custom aggregation types.
  1396  			opts:      testValidatorOptions().SetDefaultAllowedNonFirstLevelAggregationTypes(testAggregationTypes),
  1397  			expectErr: false,
  1398  		},
  1399  		{
  1400  			// Aggregation type is allowed through the list of non-first-level aggregation types for timers.
  1401  			opts:      testValidatorOptions().SetAllowedNonFirstLevelAggregationTypesFor(metric.TimerType, testAggregationTypes),
  1402  			expectErr: false,
  1403  		},
  1404  	}
  1405  
  1406  	for _, input := range inputs {
  1407  		validator := NewValidator(input.opts)
  1408  		if input.expectErr {
  1409  			require.Error(t, validator.ValidateSnapshot(view))
  1410  		} else {
  1411  			require.NoError(t, validator.ValidateSnapshot(view))
  1412  		}
  1413  	}
  1414  }
  1415  
  1416  func TestValidatorValidateRollupRuleRollupTargetWithStoragePolicies(t *testing.T) {
  1417  	rr1, err := pipeline.NewRollupOp(
  1418  		pipeline.GroupByRollupType,
  1419  		"rName1",
  1420  		[]string{"rtagName1", "rtagName2"},
  1421  		aggregation.DefaultID,
  1422  	)
  1423  	require.NoError(t, err)
  1424  	storagePolicies := testStoragePolicies()
  1425  	view := view.RuleSet{
  1426  		RollupRules: []view.RollupRule{
  1427  			{
  1428  				Name:   "snapshot1",
  1429  				Filter: testTypeTag + ":" + testTimerType,
  1430  				Targets: []view.RollupTarget{
  1431  					{
  1432  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1433  							{
  1434  								Type:   pipeline.RollupOpType,
  1435  								Rollup: rr1,
  1436  							},
  1437  						}),
  1438  						StoragePolicies: storagePolicies,
  1439  					},
  1440  				},
  1441  			},
  1442  		},
  1443  	}
  1444  
  1445  	inputs := []struct {
  1446  		opts      Options
  1447  		expectErr bool
  1448  	}{
  1449  		{
  1450  			// By default policy is allowed.
  1451  			opts:      testValidatorOptions().SetDefaultAllowedStoragePolicies(policy.StoragePolicies{}),
  1452  			expectErr: true,
  1453  		},
  1454  		{
  1455  			// Policy is allowed through the default list of policies.
  1456  			opts:      testValidatorOptions().SetDefaultAllowedStoragePolicies(storagePolicies),
  1457  			expectErr: false,
  1458  		},
  1459  		{
  1460  			// Policy is allowed through the list of policies allowed for timers.
  1461  			opts:      testValidatorOptions().SetAllowedStoragePoliciesFor(metric.TimerType, storagePolicies),
  1462  			expectErr: false,
  1463  		},
  1464  	}
  1465  
  1466  	for _, input := range inputs {
  1467  		validator := NewValidator(input.opts)
  1468  		if input.expectErr {
  1469  			require.Error(t, validator.ValidateSnapshot(view))
  1470  		} else {
  1471  			require.NoError(t, validator.ValidateSnapshot(view))
  1472  		}
  1473  	}
  1474  }
  1475  
  1476  func TestValidatorValidateRollupRuleRollupTargetWithNoStoragePolicies(t *testing.T) {
  1477  	rr1, err := pipeline.NewRollupOp(
  1478  		pipeline.GroupByRollupType,
  1479  		"rName1",
  1480  		[]string{"rtagName1", "rtagName2"},
  1481  		aggregation.DefaultID,
  1482  	)
  1483  	require.NoError(t, err)
  1484  	view := view.RuleSet{
  1485  		RollupRules: []view.RollupRule{
  1486  			{
  1487  				Name:   "snapshot1",
  1488  				Filter: testTypeTag + ":" + testTimerType,
  1489  				Targets: []view.RollupTarget{
  1490  					{
  1491  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1492  							{
  1493  								Type:   pipeline.RollupOpType,
  1494  								Rollup: rr1,
  1495  							},
  1496  						}),
  1497  					},
  1498  				},
  1499  			},
  1500  		},
  1501  	}
  1502  	validator := NewValidator(testValidatorOptions())
  1503  	err = validator.ValidateSnapshot(view)
  1504  	require.Error(t, err)
  1505  	require.True(t, strings.Contains(err.Error(), "no storage policies"))
  1506  }
  1507  
  1508  func TestValidatorValidateRollupRuleRollupOpWithDuplicateStoragePolicies(t *testing.T) {
  1509  	rr1, err := pipeline.NewRollupOp(
  1510  		pipeline.GroupByRollupType,
  1511  		"rName1",
  1512  		[]string{"rtagName1", "rtagName2"},
  1513  		aggregation.DefaultID,
  1514  	)
  1515  	require.NoError(t, err)
  1516  	view := view.RuleSet{
  1517  		RollupRules: []view.RollupRule{
  1518  			{
  1519  				Name:   "snapshot1",
  1520  				Filter: testTypeTag + ":" + testTimerType,
  1521  				Targets: []view.RollupTarget{
  1522  					{
  1523  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1524  							{
  1525  								Type:   pipeline.RollupOpType,
  1526  								Rollup: rr1,
  1527  							},
  1528  						}),
  1529  						StoragePolicies: policy.StoragePolicies{
  1530  							policy.MustParseStoragePolicy("10s:6h"),
  1531  							policy.MustParseStoragePolicy("10s:6h"),
  1532  						},
  1533  					},
  1534  				},
  1535  			},
  1536  		},
  1537  	}
  1538  
  1539  	validator := NewValidator(testValidatorOptions())
  1540  	err = validator.ValidateSnapshot(view)
  1541  	require.Error(t, err)
  1542  	require.True(t, strings.Contains(err.Error(), "duplicate storage policy '10s:6h'"))
  1543  }
  1544  
  1545  func TestValidatorValidateRollupRuleDisallowedStoragePolicies(t *testing.T) {
  1546  	rr1, err := pipeline.NewRollupOp(
  1547  		pipeline.GroupByRollupType,
  1548  		"rName1",
  1549  		[]string{"rtagName1", "rtagName2"},
  1550  		aggregation.DefaultID,
  1551  	)
  1552  	require.NoError(t, err)
  1553  	view := view.RuleSet{
  1554  		RollupRules: []view.RollupRule{
  1555  			{
  1556  				Name:   "snapshot1",
  1557  				Filter: testTypeTag + ":" + testTimerType,
  1558  				Targets: []view.RollupTarget{
  1559  					{
  1560  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1561  							{
  1562  								Type:   pipeline.RollupOpType,
  1563  								Rollup: rr1,
  1564  							},
  1565  						}),
  1566  						StoragePolicies: policy.StoragePolicies{
  1567  							policy.MustParseStoragePolicy("1s:6h"),
  1568  						},
  1569  					},
  1570  				},
  1571  			},
  1572  		},
  1573  	}
  1574  
  1575  	validator := NewValidator(testValidatorOptions())
  1576  	require.Error(t, validator.ValidateSnapshot(view))
  1577  }
  1578  
  1579  func TestValidatorRollupRule(t *testing.T) {
  1580  	rr1, err := pipeline.NewRollupOp(
  1581  		pipeline.GroupByRollupType,
  1582  		"rName1",
  1583  		[]string{"rtagName1", "rtagName2"},
  1584  		aggregation.MustCompressTypes(aggregation.Sum),
  1585  	)
  1586  	require.NoError(t, err)
  1587  	view := view.RuleSet{
  1588  		RollupRules: []view.RollupRule{
  1589  			{
  1590  				Name:   "snapshot1",
  1591  				Filter: testTypeTag + ":" + testGaugeType,
  1592  				Targets: []view.RollupTarget{
  1593  					{
  1594  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1595  							{
  1596  								Type:        pipeline.AggregationOpType,
  1597  								Aggregation: pipeline.AggregationOp{Type: aggregation.Last},
  1598  							},
  1599  							{
  1600  								Type:           pipeline.TransformationOpType,
  1601  								Transformation: pipeline.TransformationOp{Type: transformation.PerSecond},
  1602  							},
  1603  							{
  1604  								Type:   pipeline.RollupOpType,
  1605  								Rollup: rr1,
  1606  							},
  1607  						}),
  1608  						StoragePolicies: testStoragePolicies(),
  1609  					},
  1610  				},
  1611  			},
  1612  		},
  1613  	}
  1614  
  1615  	firstLevelAggregationTypes := aggregation.Types{aggregation.Last}
  1616  	nonFirstLevelAggregationTypes := aggregation.Types{aggregation.Sum}
  1617  	opts := testValidatorOptions().
  1618  		SetAllowedFirstLevelAggregationTypesFor(metric.GaugeType, firstLevelAggregationTypes).
  1619  		SetAllowedNonFirstLevelAggregationTypesFor(metric.GaugeType, nonFirstLevelAggregationTypes)
  1620  	validator := NewValidator(opts)
  1621  	require.NoError(t, validator.ValidateSnapshot(view))
  1622  }
  1623  
  1624  func TestValidatorValidateRollupRuleDuplicateRollupIDs(t *testing.T) {
  1625  	rr1, err := pipeline.NewRollupOp(
  1626  		pipeline.GroupByRollupType,
  1627  		"rName1",
  1628  		[]string{"rtagName1", "rtagName2"},
  1629  		aggregation.MustCompressTypes(aggregation.Sum),
  1630  	)
  1631  	require.NoError(t, err)
  1632  	rr2, err := pipeline.NewRollupOp(
  1633  		pipeline.GroupByRollupType,
  1634  		"rName1",
  1635  		[]string{"rtagName1", "rtagName2"},
  1636  		aggregation.DefaultID,
  1637  	)
  1638  	require.NoError(t, err)
  1639  	view := view.RuleSet{
  1640  		RollupRules: []view.RollupRule{
  1641  			{
  1642  				Name:   "snapshot1",
  1643  				Filter: testTypeTag + ":" + testGaugeType,
  1644  				Targets: []view.RollupTarget{
  1645  					{
  1646  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1647  							{
  1648  								Type:        pipeline.AggregationOpType,
  1649  								Aggregation: pipeline.AggregationOp{Type: aggregation.Last},
  1650  							},
  1651  							{
  1652  								Type:           pipeline.TransformationOpType,
  1653  								Transformation: pipeline.TransformationOp{Type: transformation.PerSecond},
  1654  							},
  1655  							{
  1656  								Type:   pipeline.RollupOpType,
  1657  								Rollup: rr1,
  1658  							},
  1659  						}),
  1660  						StoragePolicies: testStoragePolicies(),
  1661  					},
  1662  				},
  1663  			},
  1664  			{
  1665  				Name:   "snapshot2",
  1666  				Filter: testTypeTag + ":" + testGaugeType,
  1667  				Targets: []view.RollupTarget{
  1668  					{
  1669  						Pipeline: pipeline.NewPipeline([]pipeline.OpUnion{
  1670  							{
  1671  								Type:   pipeline.RollupOpType,
  1672  								Rollup: rr2,
  1673  							},
  1674  						}),
  1675  						StoragePolicies: testStoragePolicies(),
  1676  					},
  1677  				},
  1678  			},
  1679  		},
  1680  	}
  1681  	firstLevelAggregationTypes := aggregation.Types{aggregation.Last}
  1682  	nonFirstLevelAggregationTypes := aggregation.Types{aggregation.Sum}
  1683  	opts := testValidatorOptions().
  1684  		SetAllowedFirstLevelAggregationTypesFor(metric.GaugeType, firstLevelAggregationTypes).
  1685  		SetAllowedNonFirstLevelAggregationTypesFor(metric.GaugeType, nonFirstLevelAggregationTypes)
  1686  	validator := NewValidator(opts)
  1687  	err = validator.ValidateSnapshot(view)
  1688  	require.Error(t, err)
  1689  	require.True(t, strings.Contains(err.Error(), "more than one rollup operations with name 'rName1' and tags '[rtagName1 rtagName2]' exist"))
  1690  	_, ok := err.(errors.InvalidInputError)
  1691  	require.True(t, ok)
  1692  }
  1693  
  1694  func TestValidatorValidateMappingRuleValidDropPolicy(t *testing.T) {
  1695  	view := view.RuleSet{
  1696  		MappingRules: []view.MappingRule{
  1697  			{
  1698  				Name:       "snapshot1",
  1699  				Filter:     "tag1:value1",
  1700  				DropPolicy: policy.DropMust,
  1701  			},
  1702  		},
  1703  	}
  1704  	validator := NewValidator(testValidatorOptions())
  1705  	require.NoError(t, validator.ValidateSnapshot(view))
  1706  }
  1707  
  1708  func TestValidatorValidateMappingRuleInvalidDropPolicy(t *testing.T) {
  1709  	type invalidDropPolicyTest struct {
  1710  		name string
  1711  		view view.RuleSet
  1712  	}
  1713  
  1714  	tests := []invalidDropPolicyTest{
  1715  		{
  1716  			name: "invalid drop policy",
  1717  			view: view.RuleSet{
  1718  				MappingRules: []view.MappingRule{
  1719  					{
  1720  						Name:       "snapshot1",
  1721  						Filter:     "tag1:value1",
  1722  						DropPolicy: policy.DropPolicy(math.MaxUint32),
  1723  					},
  1724  				},
  1725  			},
  1726  		},
  1727  	}
  1728  
  1729  	for _, dropPolicy := range policy.ValidDropPolicies() {
  1730  		if dropPolicy == policy.DropNone {
  1731  			continue // The drop none policy is always valid, since its not active
  1732  		}
  1733  
  1734  		tests = append(tests, []invalidDropPolicyTest{
  1735  			{
  1736  				name: dropPolicy.String() + " policy with storage policies",
  1737  				view: view.RuleSet{
  1738  					MappingRules: []view.MappingRule{
  1739  						{
  1740  							Name:            "snapshot1",
  1741  							Filter:          "tag1:value1",
  1742  							DropPolicy:      policy.DropMust,
  1743  							StoragePolicies: testStoragePolicies(),
  1744  						},
  1745  					},
  1746  				},
  1747  			},
  1748  			{
  1749  				name: dropPolicy.String() + " policy with non-default aggregation ID",
  1750  				view: view.RuleSet{
  1751  					MappingRules: []view.MappingRule{
  1752  						{
  1753  							Name:       "snapshot1",
  1754  							Filter:     "tag1:value1",
  1755  							DropPolicy: policy.DropMust,
  1756  							AggregationID: aggregation.NewIDCompressor().MustCompress(
  1757  								aggregation.Types{aggregation.Last},
  1758  							),
  1759  						},
  1760  					},
  1761  				},
  1762  			},
  1763  		}...)
  1764  	}
  1765  
  1766  	validator := NewValidator(testValidatorOptions())
  1767  
  1768  	for _, test := range tests {
  1769  		t.Run(test.name, func(t *testing.T) {
  1770  			require.Error(t, validator.ValidateSnapshot(test.view))
  1771  		})
  1772  	}
  1773  }
  1774  
  1775  func testKVNamespaceValidator(t *testing.T) namespace.Validator {
  1776  	store := mem.NewStore()
  1777  	_, err := store.Set(testNamespacesKey, &commonpb.StringArrayProto{Values: testNamespaces})
  1778  	require.NoError(t, err)
  1779  	kvOpts := kv.NewNamespaceValidatorOptions().
  1780  		SetKVStore(store).
  1781  		SetValidNamespacesKey(testNamespacesKey)
  1782  	nsValidator, err := kv.NewNamespaceValidator(kvOpts)
  1783  	require.NoError(t, err)
  1784  	return nsValidator
  1785  }
  1786  
  1787  func testMetricTypesFn() MetricTypesFn {
  1788  	return func(filters filters.TagFilterValueMap) ([]metric.Type, error) {
  1789  		fv, exists := filters[testTypeTag]
  1790  		if !exists {
  1791  			return []metric.Type{metric.UnknownType}, nil
  1792  		}
  1793  		switch fv.Pattern {
  1794  		case testCounterType:
  1795  			return []metric.Type{metric.CounterType}, nil
  1796  		case testTimerType:
  1797  			return []metric.Type{metric.TimerType}, nil
  1798  		case testGaugeType:
  1799  			return []metric.Type{metric.GaugeType}, nil
  1800  		default:
  1801  			return nil, fmt.Errorf("unknown metric type %v", fv.Pattern)
  1802  		}
  1803  	}
  1804  }
  1805  
  1806  func testStoragePolicies() policy.StoragePolicies {
  1807  	return policy.StoragePolicies{
  1808  		policy.MustParseStoragePolicy("10s:6h"),
  1809  		policy.MustParseStoragePolicy("1m:24h"),
  1810  	}
  1811  }
  1812  
  1813  func testValidatorOptions() Options {
  1814  	return NewOptions().
  1815  		SetDefaultAllowedStoragePolicies(testStoragePolicies()).
  1816  		SetDefaultAllowedFirstLevelAggregationTypes(nil).
  1817  		SetMetricTypesFn(testMetricTypesFn()).
  1818  		SetMultiAggregationTypesEnabledFor([]metric.Type{metric.TimerType})
  1819  }