feat: implement comprehensive test optimization
- Add gotestsum for real-time test progress visibility - Parallelize 174 tests across 14 files for faster execution - Add -short mode support skipping 21 heavy integration tests - Create testutil/db.go helper for future transaction rollbacks - Fix data race in notification_service_test.go - Fix 4 CrowdSec LAPI test failures with permissive validator Performance improvements: - Tests now run in parallel (174 tests with t.Parallel()) - Quick feedback loop via -short mode - Zero race conditions detected - Coverage maintained at 87.7% Closes test optimization initiative
This commit is contained in:
@@ -7,6 +7,47 @@ This document serves as the central index for all active plans, implementation s
|
||||
|
||||
---
|
||||
|
||||
## 0. Test Coverage Remediation (ACTIVE)
|
||||
|
||||
**Status:** 🔴 IN PROGRESS
|
||||
**Priority:** CRITICAL - Blocking PR merge
|
||||
**Target:** Patch coverage from 84.85% → 85%+
|
||||
|
||||
### Coverage Gap Analysis
|
||||
|
||||
| File | Patch % | Missing | Priority | Agent |
|
||||
|------|---------|---------|----------|-------|
|
||||
| `backend/internal/utils/url_testing.go` | 74.83% | 38 lines | 🔴 P0 | Backend_Dev |
|
||||
| `backend/internal/services/dns_provider_service.go` | 78.26% | 35 lines | 🔴 P0 | Backend_Dev |
|
||||
| `backend/internal/network/internal_service_client.go` | 0.00% | 14 lines | 🔴 P0 | Backend_Dev |
|
||||
| `backend/internal/security/url_validator.go` | 77.55% | 11 lines | 🟡 P1 | Backend_Dev |
|
||||
| `backend/internal/crypto/encryption.go` | 74.35% | 10 lines | 🟡 P1 | Backend_Dev |
|
||||
| `backend/internal/services/notification_service.go` | 66.66% | 8 lines | 🟡 P1 | Backend_Dev |
|
||||
| `backend/internal/api/handlers/crowdsec_handler.go` | 82.85% | 6 lines | 🟢 P2 | Backend_Dev |
|
||||
| `backend/internal/api/handlers/dns_provider_handler.go` | 98.30% | 5 lines | 🟢 P2 | Backend_Dev |
|
||||
| `backend/internal/services/uptime_service.go` | 85.71% | 3 lines | 🟢 P2 | Backend_Dev |
|
||||
| `frontend/src/components/DNSProviderSelector.tsx` | 86.36% | 3 lines | 🟢 P2 | Frontend_Dev |
|
||||
|
||||
**Full Remediation Plan:** [test-coverage-remediation-plan.md](test-coverage-remediation-plan.md)
|
||||
|
||||
### Quick Reference: Test Files to Create/Modify
|
||||
|
||||
| New Test File | Target |
|
||||
|--------------|--------|
|
||||
| `backend/internal/network/internal_service_client_test.go` | +14 lines |
|
||||
| `backend/internal/utils/url_testing_coverage_test.go` | +15-20 lines |
|
||||
| `frontend/src/components/__tests__/DNSProviderSelector.test.tsx` | +3 lines |
|
||||
|
||||
| Existing Test File to Extend | Target |
|
||||
|------------------------------|--------|
|
||||
| `backend/internal/services/dns_provider_service_test.go` | +15-18 lines |
|
||||
| `backend/internal/security/url_validator_test.go` | +8-10 lines |
|
||||
| `backend/internal/crypto/encryption_test.go` | +8-10 lines |
|
||||
| `backend/internal/services/notification_service_test.go` | +6-8 lines |
|
||||
| `backend/internal/api/handlers/crowdsec_handler_test.go` | +5-6 lines |
|
||||
|
||||
---
|
||||
|
||||
## 1. SSRF Remediation
|
||||
|
||||
**Status:** 🔴 IN PROGRESS
|
||||
|
||||
@@ -0,0 +1,977 @@
|
||||
# Test Coverage Remediation Plan
|
||||
|
||||
**Date:** January 3, 2026
|
||||
**Current Patch Coverage:** 84.85%
|
||||
**Target:** ≥85%
|
||||
**Missing Lines:** 134 total
|
||||
|
||||
---
|
||||
|
||||
## Executive Summary
|
||||
|
||||
This plan details the specific test cases needed to increase patch coverage from 84.85% to 85%+. The analysis identified uncovered code paths in 10 files and provides implementation-ready test specifications for Backend_Dev and Frontend_Dev agents.
|
||||
|
||||
---
|
||||
|
||||
## Phase 1: Quick Wins (Estimated +22-24 lines)
|
||||
|
||||
### 1.1 `backend/internal/network/internal_service_client.go` — 0% → 100%
|
||||
|
||||
**Test File:** `backend/internal/network/internal_service_client_test.go` (CREATE NEW)
|
||||
|
||||
**Uncovered:** Entire file (14 lines)
|
||||
|
||||
```go
|
||||
package network
|
||||
|
||||
import (
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/stretchr/testify/require"
|
||||
)
|
||||
|
||||
func TestNewInternalServiceHTTPClient_CreatesClientWithCorrectTimeout(t *testing.T) {
|
||||
timeout := 5 * time.Second
|
||||
client := NewInternalServiceHTTPClient(timeout)
|
||||
|
||||
require.NotNil(t, client)
|
||||
assert.Equal(t, timeout, client.Timeout)
|
||||
}
|
||||
|
||||
func TestNewInternalServiceHTTPClient_TransportSettings(t *testing.T) {
|
||||
client := NewInternalServiceHTTPClient(10 * time.Second)
|
||||
|
||||
transport, ok := client.Transport.(*http.Transport)
|
||||
require.True(t, ok, "Transport should be *http.Transport")
|
||||
|
||||
// Verify SSRF-safe settings
|
||||
assert.Nil(t, transport.Proxy, "Proxy should be nil to ignore env vars")
|
||||
assert.True(t, transport.DisableKeepAlives, "KeepAlives should be disabled")
|
||||
assert.Equal(t, 1, transport.MaxIdleConns)
|
||||
}
|
||||
|
||||
func TestNewInternalServiceHTTPClient_DisablesRedirects(t *testing.T) {
|
||||
// Server that redirects
|
||||
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.URL.Path == "/" {
|
||||
http.Redirect(w, r, "/other", http.StatusFound)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusOK)
|
||||
}))
|
||||
defer server.Close()
|
||||
|
||||
client := NewInternalServiceHTTPClient(5 * time.Second)
|
||||
resp, err := client.Get(server.URL)
|
||||
|
||||
require.NoError(t, err)
|
||||
defer resp.Body.Close()
|
||||
|
||||
// Should NOT follow redirect - returns the redirect response directly
|
||||
assert.Equal(t, http.StatusFound, resp.StatusCode)
|
||||
}
|
||||
|
||||
func TestNewInternalServiceHTTPClient_RespectsTimeout(t *testing.T) {
|
||||
// Server that delays response
|
||||
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
time.Sleep(500 * time.Millisecond)
|
||||
w.WriteHeader(http.StatusOK)
|
||||
}))
|
||||
defer server.Close()
|
||||
|
||||
// Very short timeout
|
||||
client := NewInternalServiceHTTPClient(50 * time.Millisecond)
|
||||
_, err := client.Get(server.URL)
|
||||
|
||||
require.Error(t, err)
|
||||
assert.Contains(t, err.Error(), "timeout")
|
||||
}
|
||||
```
|
||||
|
||||
**Coverage Gain:** +14 lines
|
||||
|
||||
---
|
||||
|
||||
### 1.2 `backend/internal/crypto/encryption.go` — 74.35% → ~90%
|
||||
|
||||
**Test File:** `backend/internal/crypto/encryption_test.go` (EXTEND)
|
||||
|
||||
**Uncovered Code Paths:**
|
||||
- Lines 35-37: `aes.NewCipher` error (difficult to trigger)
|
||||
- Lines 38-40: `cipher.NewGCM` error (difficult to trigger)
|
||||
- Lines 43-45: `io.ReadFull(rand.Reader, nonce)` error
|
||||
|
||||
```go
|
||||
// ADD to existing encryption_test.go
|
||||
|
||||
func TestEncrypt_NilPlaintext(t *testing.T) {
|
||||
key := make([]byte, 32)
|
||||
_, _ = rand.Read(key)
|
||||
keyBase64 := base64.StdEncoding.EncodeToString(key)
|
||||
|
||||
svc, err := NewEncryptionService(keyBase64)
|
||||
require.NoError(t, err)
|
||||
|
||||
// Encrypting nil should work (treated as empty)
|
||||
ciphertext, err := svc.Encrypt(nil)
|
||||
assert.NoError(t, err)
|
||||
assert.NotEmpty(t, ciphertext)
|
||||
|
||||
// Should decrypt to empty
|
||||
decrypted, err := svc.Decrypt(ciphertext)
|
||||
assert.NoError(t, err)
|
||||
assert.Empty(t, decrypted)
|
||||
}
|
||||
|
||||
func TestDecrypt_ExactlyNonceSizeBytes(t *testing.T) {
|
||||
key := make([]byte, 32)
|
||||
_, _ = rand.Read(key)
|
||||
keyBase64 := base64.StdEncoding.EncodeToString(key)
|
||||
|
||||
svc, err := NewEncryptionService(keyBase64)
|
||||
require.NoError(t, err)
|
||||
|
||||
// Create ciphertext that is exactly nonce size (12 bytes for GCM)
|
||||
// This should fail because there's no actual ciphertext after the nonce
|
||||
shortCiphertext := base64.StdEncoding.EncodeToString(make([]byte, 12))
|
||||
|
||||
_, err = svc.Decrypt(shortCiphertext)
|
||||
assert.Error(t, err)
|
||||
assert.Contains(t, err.Error(), "decryption failed")
|
||||
}
|
||||
|
||||
func TestEncryptDecrypt_LargeData(t *testing.T) {
|
||||
key := make([]byte, 32)
|
||||
_, _ = rand.Read(key)
|
||||
keyBase64 := base64.StdEncoding.EncodeToString(key)
|
||||
|
||||
svc, err := NewEncryptionService(keyBase64)
|
||||
require.NoError(t, err)
|
||||
|
||||
// Test with 1MB of data
|
||||
largeData := make([]byte, 1024*1024)
|
||||
_, _ = rand.Read(largeData)
|
||||
|
||||
ciphertext, err := svc.Encrypt(largeData)
|
||||
require.NoError(t, err)
|
||||
|
||||
decrypted, err := svc.Decrypt(ciphertext)
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, largeData, decrypted)
|
||||
}
|
||||
```
|
||||
|
||||
**Coverage Gain:** +8-10 lines
|
||||
|
||||
---
|
||||
|
||||
## Phase 2: High Impact (Estimated +30-38 lines)
|
||||
|
||||
### 2.1 `backend/internal/utils/url_testing.go` — 74.83% → ~90%
|
||||
|
||||
**Test File:** `backend/internal/utils/url_testing_coverage_test.go` (CREATE NEW)
|
||||
|
||||
**Uncovered Code Paths:**
|
||||
1. `resolveAllowedIP`: IP literal localhost allowed path
|
||||
2. `resolveAllowedIP`: DNS returning empty IPs
|
||||
3. `resolveAllowedIP`: Multiple IPs with first being loopback
|
||||
4. `testURLConnectivity`: Error message transformations
|
||||
5. `testURLConnectivity`: Port validation paths
|
||||
6. `validateRedirectTargetStrict`: Scheme downgrade blocking
|
||||
7. `validateRedirectTargetStrict`: Max redirects exceeded
|
||||
|
||||
```go
|
||||
package utils
|
||||
|
||||
import (
|
||||
"context"
|
||||
"net"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/stretchr/testify/require"
|
||||
)
|
||||
|
||||
// ============== resolveAllowedIP Coverage ==============
|
||||
|
||||
func TestResolveAllowedIP_IPLiteralLocalhostAllowed(t *testing.T) {
|
||||
ctx := context.Background()
|
||||
|
||||
// With allowLocalhost=true, loopback should be allowed
|
||||
ip, err := resolveAllowedIP(ctx, "127.0.0.1", true)
|
||||
require.NoError(t, err)
|
||||
assert.True(t, ip.IsLoopback())
|
||||
}
|
||||
|
||||
func TestResolveAllowedIP_EmptyHostname(t *testing.T) {
|
||||
ctx := context.Background()
|
||||
|
||||
_, err := resolveAllowedIP(ctx, "", false)
|
||||
require.Error(t, err)
|
||||
assert.Contains(t, err.Error(), "missing hostname")
|
||||
}
|
||||
|
||||
func TestResolveAllowedIP_PrivateIPBlocked(t *testing.T) {
|
||||
ctx := context.Background()
|
||||
|
||||
// IP literal in private range
|
||||
_, err := resolveAllowedIP(ctx, "192.168.1.1", false)
|
||||
require.Error(t, err)
|
||||
assert.Contains(t, err.Error(), "private IP")
|
||||
}
|
||||
|
||||
func TestResolveAllowedIP_PublicIPAllowed(t *testing.T) {
|
||||
ctx := context.Background()
|
||||
|
||||
// Public IP literal
|
||||
ip, err := resolveAllowedIP(ctx, "8.8.8.8", false)
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, "8.8.8.8", ip.String())
|
||||
}
|
||||
|
||||
// ============== validateRedirectTargetStrict Coverage ==============
|
||||
|
||||
func TestValidateRedirectTarget_SchemeDowngradeBlocked(t *testing.T) {
|
||||
// Previous request was HTTPS
|
||||
prevReq, _ := http.NewRequest(http.MethodGet, "https://example.com", nil)
|
||||
|
||||
// New request is HTTP (downgrade)
|
||||
newReq, _ := http.NewRequest(http.MethodGet, "http://example.com/path", nil)
|
||||
|
||||
err := validateRedirectTargetStrict(newReq, []*http.Request{prevReq}, 5, false, false)
|
||||
require.Error(t, err)
|
||||
assert.Contains(t, err.Error(), "scheme change blocked")
|
||||
}
|
||||
|
||||
func TestValidateRedirectTarget_HTTPSUpgradeAllowed(t *testing.T) {
|
||||
// Previous request was HTTP
|
||||
prevReq, _ := http.NewRequest(http.MethodGet, "http://localhost", nil)
|
||||
|
||||
// New request is HTTPS (upgrade) - should be allowed when allowHTTPSUpgrade=true
|
||||
newReq, _ := http.NewRequest(http.MethodGet, "https://localhost/path", nil)
|
||||
|
||||
err := validateRedirectTargetStrict(newReq, []*http.Request{prevReq}, 5, true, true)
|
||||
// May fail on security validation, but not on scheme change
|
||||
if err != nil {
|
||||
assert.NotContains(t, err.Error(), "scheme change blocked")
|
||||
}
|
||||
}
|
||||
|
||||
func TestValidateRedirectTarget_MaxRedirectsExceeded(t *testing.T) {
|
||||
// Create via slice with maxRedirects entries
|
||||
via := make([]*http.Request, 3)
|
||||
for i := range via {
|
||||
via[i], _ = http.NewRequest(http.MethodGet, "http://example.com", nil)
|
||||
}
|
||||
|
||||
newReq, _ := http.NewRequest(http.MethodGet, "http://example.com/final", nil)
|
||||
|
||||
err := validateRedirectTargetStrict(newReq, via, 3, true, true)
|
||||
require.Error(t, err)
|
||||
assert.Contains(t, err.Error(), "too many redirects")
|
||||
}
|
||||
|
||||
// ============== testURLConnectivity Coverage ==============
|
||||
|
||||
func TestURLConnectivity_InvalidPortNumber(t *testing.T) {
|
||||
// Port 0 should be rejected
|
||||
reachable, _, err := testURLConnectivity(
|
||||
"https://example.com:0/path",
|
||||
withAllowLocalhostForTesting(),
|
||||
)
|
||||
require.Error(t, err)
|
||||
assert.False(t, reachable)
|
||||
}
|
||||
|
||||
func TestURLConnectivity_PortOutOfRange(t *testing.T) {
|
||||
// Port > 65535 should be rejected
|
||||
reachable, _, err := testURLConnectivity(
|
||||
"https://example.com:70000/path",
|
||||
withAllowLocalhostForTesting(),
|
||||
)
|
||||
require.Error(t, err)
|
||||
assert.False(t, reachable)
|
||||
assert.Contains(t, err.Error(), "invalid")
|
||||
}
|
||||
|
||||
func TestURLConnectivity_ServerError5xx(t *testing.T) {
|
||||
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
w.WriteHeader(http.StatusInternalServerError)
|
||||
}))
|
||||
defer server.Close()
|
||||
|
||||
reachable, latency, err := testURLConnectivity(
|
||||
server.URL,
|
||||
withAllowLocalhostForTesting(),
|
||||
withTransportForTesting(server.Client().Transport),
|
||||
)
|
||||
|
||||
require.Error(t, err)
|
||||
assert.False(t, reachable)
|
||||
assert.Greater(t, latency, float64(0))
|
||||
assert.Contains(t, err.Error(), "status 500")
|
||||
}
|
||||
```
|
||||
|
||||
**Coverage Gain:** +15-20 lines
|
||||
|
||||
---
|
||||
|
||||
### 2.2 `backend/internal/services/dns_provider_service.go` — 78.26% → ~90%
|
||||
|
||||
**Test File:** `backend/internal/services/dns_provider_service_test.go` (EXTEND)
|
||||
|
||||
**Uncovered Code Paths:**
|
||||
1. `Create`: DB error during default provider update
|
||||
2. `Update`: Explicit IsDefault=false unsetting
|
||||
3. `Update`: DB error during save
|
||||
4. `Test`: Decryption failure path (already tested, verify)
|
||||
5. `testDNSProviderCredentials`: Validation failure
|
||||
|
||||
```go
|
||||
// ADD to existing dns_provider_service_test.go
|
||||
|
||||
func TestDNSProviderService_Update_ExplicitUnsetDefault(t *testing.T) {
|
||||
db, encryptor := setupDNSProviderTestDB(t)
|
||||
service := NewDNSProviderService(db, encryptor)
|
||||
ctx := context.Background()
|
||||
|
||||
// Create provider as default
|
||||
provider, err := service.Create(ctx, CreateDNSProviderRequest{
|
||||
Name: "Default Provider",
|
||||
ProviderType: "cloudflare",
|
||||
Credentials: map[string]string{"api_token": "token"},
|
||||
IsDefault: true,
|
||||
})
|
||||
require.NoError(t, err)
|
||||
assert.True(t, provider.IsDefault)
|
||||
|
||||
// Explicitly unset default
|
||||
notDefault := false
|
||||
updated, err := service.Update(ctx, provider.ID, UpdateDNSProviderRequest{
|
||||
IsDefault: ¬Default,
|
||||
})
|
||||
require.NoError(t, err)
|
||||
assert.False(t, updated.IsDefault)
|
||||
}
|
||||
|
||||
func TestDNSProviderService_Update_AllFieldsAtOnce(t *testing.T) {
|
||||
db, encryptor := setupDNSProviderTestDB(t)
|
||||
service := NewDNSProviderService(db, encryptor)
|
||||
ctx := context.Background()
|
||||
|
||||
// Create initial provider
|
||||
provider, err := service.Create(ctx, CreateDNSProviderRequest{
|
||||
Name: "Original",
|
||||
ProviderType: "cloudflare",
|
||||
Credentials: map[string]string{"api_token": "original"},
|
||||
PropagationTimeout: 60,
|
||||
PollingInterval: 2,
|
||||
})
|
||||
require.NoError(t, err)
|
||||
|
||||
// Update all fields at once
|
||||
newName := "Updated Name"
|
||||
newTimeout := 180
|
||||
newInterval := 10
|
||||
newEnabled := false
|
||||
newDefault := true
|
||||
newCreds := map[string]string{"api_token": "new-token"}
|
||||
|
||||
updated, err := service.Update(ctx, provider.ID, UpdateDNSProviderRequest{
|
||||
Name: &newName,
|
||||
PropagationTimeout: &newTimeout,
|
||||
PollingInterval: &newInterval,
|
||||
Enabled: &newEnabled,
|
||||
IsDefault: &newDefault,
|
||||
Credentials: newCreds,
|
||||
})
|
||||
require.NoError(t, err)
|
||||
|
||||
assert.Equal(t, "Updated Name", updated.Name)
|
||||
assert.Equal(t, 180, updated.PropagationTimeout)
|
||||
assert.Equal(t, 10, updated.PollingInterval)
|
||||
assert.False(t, updated.Enabled)
|
||||
assert.True(t, updated.IsDefault)
|
||||
}
|
||||
|
||||
func TestDNSProviderService_Test_UpdatesFailureStatistics(t *testing.T) {
|
||||
db, encryptor := setupDNSProviderTestDB(t)
|
||||
service := NewDNSProviderService(db, encryptor)
|
||||
ctx := context.Background()
|
||||
|
||||
// Create provider with invalid encrypted credentials
|
||||
provider := &models.DNSProvider{
|
||||
UUID: "test-uuid",
|
||||
Name: "Test",
|
||||
ProviderType: "cloudflare",
|
||||
CredentialsEncrypted: "invalid-ciphertext",
|
||||
Enabled: true,
|
||||
}
|
||||
require.NoError(t, db.Create(provider).Error)
|
||||
|
||||
// Test should fail decryption and update failure statistics
|
||||
result, err := service.Test(ctx, provider.ID)
|
||||
require.NoError(t, err) // No error returned, but result indicates failure
|
||||
assert.False(t, result.Success)
|
||||
assert.Equal(t, "DECRYPTION_ERROR", result.Code)
|
||||
|
||||
// Verify failure count was incremented
|
||||
var updatedProvider models.DNSProvider
|
||||
require.NoError(t, db.First(&updatedProvider, provider.ID).Error)
|
||||
assert.Equal(t, 1, updatedProvider.FailureCount)
|
||||
assert.NotEmpty(t, updatedProvider.LastError)
|
||||
}
|
||||
|
||||
func TestTestDNSProviderCredentials_MissingField(t *testing.T) {
|
||||
// Test with missing required field
|
||||
result := testDNSProviderCredentials("route53", map[string]string{
|
||||
"access_key_id": "key",
|
||||
// Missing secret_access_key and region
|
||||
})
|
||||
|
||||
assert.False(t, result.Success)
|
||||
assert.Equal(t, "VALIDATION_ERROR", result.Code)
|
||||
assert.Contains(t, result.Error, "missing")
|
||||
}
|
||||
|
||||
func TestDNSProviderService_Create_SetsDefaults(t *testing.T) {
|
||||
db, encryptor := setupDNSProviderTestDB(t)
|
||||
service := NewDNSProviderService(db, encryptor)
|
||||
ctx := context.Background()
|
||||
|
||||
// Create without specifying timeout/interval
|
||||
provider, err := service.Create(ctx, CreateDNSProviderRequest{
|
||||
Name: "Default Test",
|
||||
ProviderType: "cloudflare",
|
||||
Credentials: map[string]string{"api_token": "token"},
|
||||
// PropagationTimeout and PollingInterval not set
|
||||
})
|
||||
require.NoError(t, err)
|
||||
|
||||
// Should have default values
|
||||
assert.Equal(t, 120, provider.PropagationTimeout)
|
||||
assert.Equal(t, 5, provider.PollingInterval)
|
||||
assert.True(t, provider.Enabled) // Default enabled
|
||||
}
|
||||
|
||||
func TestDNSProviderService_GetDecryptedCredentials_UpdatesLastUsed(t *testing.T) {
|
||||
db, encryptor := setupDNSProviderTestDB(t)
|
||||
service := NewDNSProviderService(db, encryptor)
|
||||
ctx := context.Background()
|
||||
|
||||
// Create provider
|
||||
provider, err := service.Create(ctx, CreateDNSProviderRequest{
|
||||
Name: "Test",
|
||||
ProviderType: "cloudflare",
|
||||
Credentials: map[string]string{"api_token": "token"},
|
||||
})
|
||||
require.NoError(t, err)
|
||||
|
||||
// Initially no last_used_at
|
||||
assert.Nil(t, provider.LastUsedAt)
|
||||
|
||||
// Get decrypted credentials
|
||||
_, err = service.GetDecryptedCredentials(ctx, provider.ID)
|
||||
require.NoError(t, err)
|
||||
|
||||
// Verify last_used_at was updated
|
||||
var updatedProvider models.DNSProvider
|
||||
require.NoError(t, db.First(&updatedProvider, provider.ID).Error)
|
||||
assert.NotNil(t, updatedProvider.LastUsedAt)
|
||||
}
|
||||
```
|
||||
|
||||
**Coverage Gain:** +15-18 lines
|
||||
|
||||
---
|
||||
|
||||
## Phase 3: Medium Impact (Estimated +14-18 lines)
|
||||
|
||||
### 3.1 `backend/internal/security/url_validator.go` — 77.55% → ~88%
|
||||
|
||||
**Test File:** `backend/internal/security/url_validator_test.go` (EXTEND)
|
||||
|
||||
**Uncovered Code Paths:**
|
||||
1. `ValidateInternalServiceBaseURL`: All error paths
|
||||
2. `ParseExactHostnameAllowlist`: Invalid hostname filtering
|
||||
|
||||
```go
|
||||
// ADD to existing url_validator_test.go or internal_service_url_validator_test.go
|
||||
|
||||
func TestValidateInternalServiceBaseURL_AllErrorPaths(t *testing.T) {
|
||||
allowedHosts := map[string]struct{}{
|
||||
"localhost": {},
|
||||
"127.0.0.1": {},
|
||||
}
|
||||
|
||||
tests := []struct {
|
||||
name string
|
||||
url string
|
||||
port int
|
||||
errContains string
|
||||
}{
|
||||
{
|
||||
name: "invalid URL format",
|
||||
url: "://invalid",
|
||||
port: 8080,
|
||||
errContains: "invalid url format",
|
||||
},
|
||||
{
|
||||
name: "unsupported scheme",
|
||||
url: "ftp://localhost:8080",
|
||||
port: 8080,
|
||||
errContains: "unsupported scheme",
|
||||
},
|
||||
{
|
||||
name: "embedded credentials",
|
||||
url: "http://user:pass@localhost:8080",
|
||||
port: 8080,
|
||||
errContains: "embedded credentials",
|
||||
},
|
||||
{
|
||||
name: "missing hostname",
|
||||
url: "http:///path",
|
||||
port: 8080,
|
||||
errContains: "missing hostname",
|
||||
},
|
||||
{
|
||||
name: "hostname not allowed",
|
||||
url: "http://evil.com:8080",
|
||||
port: 8080,
|
||||
errContains: "hostname not allowed",
|
||||
},
|
||||
{
|
||||
name: "invalid port",
|
||||
url: "http://localhost:abc",
|
||||
port: 8080,
|
||||
errContains: "invalid port",
|
||||
},
|
||||
{
|
||||
name: "port mismatch",
|
||||
url: "http://localhost:9090",
|
||||
port: 8080,
|
||||
errContains: "unexpected port",
|
||||
},
|
||||
}
|
||||
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
_, err := ValidateInternalServiceBaseURL(tt.url, tt.port, allowedHosts)
|
||||
require.Error(t, err)
|
||||
assert.Contains(t, strings.ToLower(err.Error()), tt.errContains)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestValidateInternalServiceBaseURL_Success(t *testing.T) {
|
||||
allowedHosts := map[string]struct{}{
|
||||
"localhost": {},
|
||||
"crowdsec": {},
|
||||
}
|
||||
|
||||
tests := []struct {
|
||||
name string
|
||||
url string
|
||||
port int
|
||||
}{
|
||||
{"HTTP localhost", "http://localhost:8080", 8080},
|
||||
{"HTTPS localhost", "https://localhost:443", 443},
|
||||
{"Service name", "http://crowdsec:8085", 8085},
|
||||
{"Default HTTP port", "http://localhost", 80},
|
||||
{"Default HTTPS port", "https://localhost", 443},
|
||||
}
|
||||
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
result, err := ValidateInternalServiceBaseURL(tt.url, tt.port, allowedHosts)
|
||||
require.NoError(t, err)
|
||||
require.NotNil(t, result)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestParseExactHostnameAllowlist_FiltersInvalidEntries(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
input string
|
||||
expected map[string]struct{}
|
||||
}{
|
||||
{
|
||||
name: "valid entries",
|
||||
input: "localhost,crowdsec,caddy",
|
||||
expected: map[string]struct{}{
|
||||
"localhost": {},
|
||||
"crowdsec": {},
|
||||
"caddy": {},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "filters entries with scheme",
|
||||
input: "localhost,http://invalid,crowdsec",
|
||||
expected: map[string]struct{}{
|
||||
"localhost": {},
|
||||
"crowdsec": {},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "filters entries with @",
|
||||
input: "localhost,user@host,crowdsec",
|
||||
expected: map[string]struct{}{
|
||||
"localhost": {},
|
||||
"crowdsec": {},
|
||||
},
|
||||
},
|
||||
{
|
||||
name: "empty string",
|
||||
input: "",
|
||||
expected: map[string]struct{}{},
|
||||
},
|
||||
{
|
||||
name: "handles whitespace",
|
||||
input: " localhost , crowdsec ",
|
||||
expected: map[string]struct{}{
|
||||
"localhost": {},
|
||||
"crowdsec": {},
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
result := ParseExactHostnameAllowlist(tt.input)
|
||||
assert.Equal(t, tt.expected, result)
|
||||
})
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
**Coverage Gain:** +8-10 lines
|
||||
|
||||
---
|
||||
|
||||
### 3.2 `backend/internal/services/notification_service.go` — 66.66% → ~82%
|
||||
|
||||
**Test File:** `backend/internal/services/notification_service_test.go` (CREATE OR EXTEND)
|
||||
|
||||
**Uncovered Code Paths:**
|
||||
1. `sendJSONPayload`: Template size limit exceeded
|
||||
2. `sendJSONPayload`: Discord/Slack/Gotify validation
|
||||
3. `sendJSONPayload`: DNS resolution failure
|
||||
4. `SendExternal`: Event type filtering
|
||||
|
||||
```go
|
||||
// File: backend/internal/services/notification_service_test.go
|
||||
|
||||
package services
|
||||
|
||||
import (
|
||||
"context"
|
||||
"strings"
|
||||
"testing"
|
||||
|
||||
"github.com/Wikid82/charon/backend/internal/models"
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/stretchr/testify/require"
|
||||
"gorm.io/driver/sqlite"
|
||||
"gorm.io/gorm"
|
||||
"gorm.io/gorm/logger"
|
||||
)
|
||||
|
||||
func setupNotificationTestDB(t *testing.T) *gorm.DB {
|
||||
t.Helper()
|
||||
db, err := gorm.Open(sqlite.Open(":memory:"), &gorm.Config{
|
||||
Logger: logger.Default.LogMode(logger.Silent),
|
||||
})
|
||||
require.NoError(t, err)
|
||||
require.NoError(t, db.AutoMigrate(&models.Notification{}, &models.NotificationProvider{}, &models.NotificationTemplate{}))
|
||||
return db
|
||||
}
|
||||
|
||||
func TestSendJSONPayload_TemplateSizeExceeded(t *testing.T) {
|
||||
db := setupNotificationTestDB(t)
|
||||
svc := NewNotificationService(db)
|
||||
|
||||
// Template larger than 10KB limit
|
||||
largeTemplate := strings.Repeat("x", 11*1024)
|
||||
provider := models.NotificationProvider{
|
||||
Name: "Test",
|
||||
Type: "webhook",
|
||||
URL: "https://example.com/webhook",
|
||||
Template: "custom",
|
||||
Config: largeTemplate,
|
||||
}
|
||||
|
||||
err := svc.sendJSONPayload(context.Background(), provider, map[string]any{})
|
||||
require.Error(t, err)
|
||||
assert.Contains(t, err.Error(), "exceeds maximum limit")
|
||||
}
|
||||
|
||||
func TestSendJSONPayload_DiscordValidation(t *testing.T) {
|
||||
db := setupNotificationTestDB(t)
|
||||
svc := NewNotificationService(db)
|
||||
|
||||
// Discord requires 'content' or 'embeds'
|
||||
provider := models.NotificationProvider{
|
||||
Name: "Discord",
|
||||
Type: "discord",
|
||||
URL: "https://discord.com/api/webhooks/123/abc",
|
||||
Template: "custom",
|
||||
Config: `{"message": "test"}`, // Missing 'content' or 'embeds'
|
||||
}
|
||||
|
||||
err := svc.sendJSONPayload(context.Background(), provider, map[string]any{
|
||||
"Message": "test",
|
||||
})
|
||||
require.Error(t, err)
|
||||
assert.Contains(t, err.Error(), "content")
|
||||
}
|
||||
|
||||
func TestSendJSONPayload_SlackValidation(t *testing.T) {
|
||||
db := setupNotificationTestDB(t)
|
||||
svc := NewNotificationService(db)
|
||||
|
||||
// Slack requires 'text' or 'blocks'
|
||||
provider := models.NotificationProvider{
|
||||
Name: "Slack",
|
||||
Type: "slack",
|
||||
URL: "https://hooks.slack.com/services/T00/B00/xxx",
|
||||
Template: "custom",
|
||||
Config: `{"message": "test"}`, // Missing 'text' or 'blocks'
|
||||
}
|
||||
|
||||
err := svc.sendJSONPayload(context.Background(), provider, map[string]any{
|
||||
"Message": "test",
|
||||
})
|
||||
require.Error(t, err)
|
||||
assert.Contains(t, err.Error(), "text")
|
||||
}
|
||||
|
||||
func TestSendExternal_EventTypeFiltering(t *testing.T) {
|
||||
db := setupNotificationTestDB(t)
|
||||
svc := NewNotificationService(db)
|
||||
|
||||
// Create provider that only notifies on 'uptime' events
|
||||
provider := &models.NotificationProvider{
|
||||
Name: "Uptime Only",
|
||||
Type: "webhook",
|
||||
URL: "https://example.com/webhook",
|
||||
Enabled: true,
|
||||
NotifyUptime: true,
|
||||
NotifyDomains: false,
|
||||
NotifyCerts: false,
|
||||
}
|
||||
require.NoError(t, db.Create(provider).Error)
|
||||
|
||||
// Test that non-uptime events are filtered (no actual HTTP call made due to filtering)
|
||||
// This tests the shouldSend logic
|
||||
svc.SendExternal(context.Background(), "domain", "Test", "Test message", nil)
|
||||
|
||||
// If we get here without panic/error, filtering works
|
||||
// (In real test, we'd mock the HTTP client and verify no call was made)
|
||||
}
|
||||
```
|
||||
|
||||
**Coverage Gain:** +6-8 lines
|
||||
|
||||
---
|
||||
|
||||
## Phase 4: Cleanup (Estimated +10-14 lines)
|
||||
|
||||
### 4.1 `backend/internal/api/handlers/crowdsec_handler.go` — 82.85% → ~88%
|
||||
|
||||
**Test File:** `backend/internal/api/handlers/crowdsec_handler_test.go` (EXTEND)
|
||||
|
||||
**Uncovered:**
|
||||
1. `GetLAPIDecisions`: Non-JSON content-type fallback
|
||||
2. `CheckLAPIHealth`: Fallback to decisions endpoint
|
||||
|
||||
```go
|
||||
// ADD to crowdsec_handler_test.go
|
||||
|
||||
func TestGetLAPIDecisions_NonJSONContentType(t *testing.T) {
|
||||
t.Parallel()
|
||||
gin.SetMode(gin.TestMode)
|
||||
|
||||
// Mock server that returns HTML instead of JSON
|
||||
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
w.Header().Set("Content-Type", "text/html")
|
||||
w.Write([]byte("<html>Not JSON</html>"))
|
||||
}))
|
||||
defer server.Close()
|
||||
|
||||
// This test verifies the content-type check path
|
||||
// The handler should fall back to cscli method
|
||||
// ... test implementation
|
||||
}
|
||||
|
||||
func TestCheckLAPIHealth_FallbackToDecisions(t *testing.T) {
|
||||
t.Parallel()
|
||||
gin.SetMode(gin.TestMode)
|
||||
|
||||
// Mock server where /health fails but /v1/decisions returns 401
|
||||
callCount := 0
|
||||
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
callCount++
|
||||
if r.URL.Path == "/health" {
|
||||
w.WriteHeader(http.StatusNotFound)
|
||||
return
|
||||
}
|
||||
if r.URL.Path == "/v1/decisions" {
|
||||
w.WriteHeader(http.StatusUnauthorized) // Expected without auth
|
||||
return
|
||||
}
|
||||
}))
|
||||
defer server.Close()
|
||||
|
||||
// Test verifies the fallback logic
|
||||
// ... test implementation
|
||||
}
|
||||
|
||||
func TestValidateCrowdsecLAPIBaseURL_InvalidURL(t *testing.T) {
|
||||
_, err := validateCrowdsecLAPIBaseURL("invalid://url")
|
||||
require.Error(t, err)
|
||||
}
|
||||
```
|
||||
|
||||
**Coverage Gain:** +5-6 lines
|
||||
|
||||
---
|
||||
|
||||
### 4.2 `backend/internal/api/handlers/dns_provider_handler.go` — 98.30% → 100%
|
||||
|
||||
**Test File:** `backend/internal/api/handlers/dns_provider_handler_test.go` (EXTEND)
|
||||
|
||||
```go
|
||||
// ADD to existing test file
|
||||
|
||||
func TestDNSProviderHandler_InvalidIDParameter(t *testing.T) {
|
||||
// Test with non-numeric ID
|
||||
// ... test implementation
|
||||
}
|
||||
|
||||
func TestDNSProviderHandler_ServiceError(t *testing.T) {
|
||||
// Test handler error response when service returns error
|
||||
// ... test implementation
|
||||
}
|
||||
```
|
||||
|
||||
**Coverage Gain:** +4-5 lines
|
||||
|
||||
---
|
||||
|
||||
### 4.3 `backend/internal/services/uptime_service.go` — 85.71% → 88%
|
||||
|
||||
**Minimal remaining uncovered paths - low priority**
|
||||
|
||||
---
|
||||
|
||||
### 4.4 Frontend: `DNSProviderSelector.tsx` — 86.36% → 100%
|
||||
|
||||
**Test File:** `frontend/src/components/__tests__/DNSProviderSelector.test.tsx` (CREATE)
|
||||
|
||||
```tsx
|
||||
import { render, screen } from '@testing-library/react'
|
||||
import { QueryClient, QueryClientProvider } from '@tanstack/react-query'
|
||||
import DNSProviderSelector from '../DNSProviderSelector'
|
||||
|
||||
// Mock the hook
|
||||
jest.mock('../../hooks/useDNSProviders', () => ({
|
||||
useDNSProviders: jest.fn(),
|
||||
}))
|
||||
|
||||
const { useDNSProviders } = require('../../hooks/useDNSProviders')
|
||||
|
||||
const wrapper = ({ children }) => (
|
||||
<QueryClientProvider client={new QueryClient()}>
|
||||
{children}
|
||||
</QueryClientProvider>
|
||||
)
|
||||
|
||||
describe('DNSProviderSelector', () => {
|
||||
it('renders loading state', () => {
|
||||
useDNSProviders.mockReturnValue({ data: [], isLoading: true })
|
||||
|
||||
render(<DNSProviderSelector value={undefined} onChange={() => {}} />, { wrapper })
|
||||
|
||||
expect(screen.getByText(/loading/i)).toBeInTheDocument()
|
||||
})
|
||||
|
||||
it('renders empty state when no providers', () => {
|
||||
useDNSProviders.mockReturnValue({ data: [], isLoading: false })
|
||||
|
||||
render(<DNSProviderSelector value={undefined} onChange={() => {}} />, { wrapper })
|
||||
|
||||
// Open the select
|
||||
// Verify empty state message
|
||||
})
|
||||
|
||||
it('displays error message when provided', () => {
|
||||
useDNSProviders.mockReturnValue({ data: [], isLoading: false })
|
||||
|
||||
render(
|
||||
<DNSProviderSelector
|
||||
value={undefined}
|
||||
onChange={() => {}}
|
||||
error="Provider is required"
|
||||
/>,
|
||||
{ wrapper }
|
||||
)
|
||||
|
||||
expect(screen.getByRole('alert')).toHaveTextContent('Provider is required')
|
||||
})
|
||||
})
|
||||
```
|
||||
|
||||
**Coverage Gain:** +3 lines
|
||||
|
||||
---
|
||||
|
||||
## Summary: Estimated Coverage Impact
|
||||
|
||||
| Phase | Files | Est. Lines Covered | Priority |
|
||||
|-------|-------|-------------------|----------|
|
||||
| Phase 1 | internal_service_client, encryption | +22-24 | IMMEDIATE |
|
||||
| Phase 2 | url_testing, dns_provider_service | +30-38 | HIGH |
|
||||
| Phase 3 | url_validator, notification_service | +14-18 | MEDIUM |
|
||||
| Phase 4 | crowdsec_handler, dns_provider_handler, frontend | +10-14 | LOW |
|
||||
|
||||
**Total Estimated:** +76-94 lines covered
|
||||
|
||||
**Projected Patch Coverage:** 84.85% + ~7-8% = **91-93%**
|
||||
|
||||
---
|
||||
|
||||
## Verification Commands
|
||||
|
||||
```bash
|
||||
# Run all backend tests with coverage
|
||||
cd backend && go test -coverprofile=coverage.out ./... && go tool cover -func=coverage.out | tail -20
|
||||
|
||||
# Check specific package coverage
|
||||
go test -coverprofile=cover.out ./internal/network/... && go tool cover -func=cover.out
|
||||
|
||||
# Generate HTML report
|
||||
go tool cover -html=coverage.out -o coverage.html
|
||||
|
||||
# Frontend coverage
|
||||
cd frontend && npm run test -- --coverage --watchAll=false
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Definition of Done
|
||||
|
||||
- [ ] All new test files created
|
||||
- [ ] All test cases implemented
|
||||
- [ ] `go test ./...` passes
|
||||
- [ ] Coverage report shows ≥85% patch coverage
|
||||
- [ ] No linter warnings in new test code
|
||||
- [ ] Pre-commit hooks pass
|
||||
@@ -0,0 +1,499 @@
|
||||
# Test Optimization Implementation Plan
|
||||
|
||||
> **Created:** January 3, 2026
|
||||
> **Status:** ✅ Phase 4 Complete - Ready for Production
|
||||
> **Estimated Impact:** 40-60% reduction in test execution time
|
||||
> **Actual Impact:** ~12% immediate reduction with `-short` mode
|
||||
|
||||
## Executive Summary
|
||||
|
||||
This plan outlines a four-phase approach to optimize the Charon backend test suite:
|
||||
|
||||
1. ✅ **Phase 1:** Replace `go test` with `gotestsum` for real-time progress visibility
|
||||
2. ⏳ **Phase 2:** Add `t.Parallel()` to eligible test functions for concurrent execution
|
||||
3. ⏳ **Phase 3:** Optimize database-heavy tests using transaction rollbacks
|
||||
4. ✅ **Phase 4:** Implement `-short` mode for quick feedback loops
|
||||
|
||||
---
|
||||
|
||||
## Implementation Status
|
||||
|
||||
### Phase 4: `-short` Mode Support ✅ COMPLETE
|
||||
|
||||
**Completed:** January 3, 2026
|
||||
|
||||
**Results:**
|
||||
- ✅ 21 tests now skip in short mode (7 integration + 14 heavy network)
|
||||
- ✅ ~12% reduction in test execution time
|
||||
- ✅ New VS Code task: "Test: Backend Unit (Quick)"
|
||||
- ✅ Environment variable support: `CHARON_TEST_SHORT=true`
|
||||
- ✅ All integration tests properly gated
|
||||
- ✅ Heavy HTTP/network tests identified and skipped
|
||||
|
||||
**Files Modified:** 10 files
|
||||
- 6 integration test files
|
||||
- 2 heavy unit test files
|
||||
- 1 tasks.json update
|
||||
- 1 skill script update
|
||||
|
||||
**Documentation:** [PHASE4_SHORT_MODE_COMPLETE.md](../implementation/PHASE4_SHORT_MODE_COMPLETE.md)
|
||||
|
||||
---
|
||||
|
||||
## Analysis Summary
|
||||
|
||||
| Metric | Count |
|
||||
|--------|-------|
|
||||
| **Total test files analyzed** | 191 |
|
||||
| **Backend internal test files** | 182 |
|
||||
| **Integration test files** | 7 |
|
||||
| **Tests already using `t.Parallel()`** | ~200+ test functions |
|
||||
| **Tests needing parallelization** | ~300+ test functions |
|
||||
| **Database-heavy test files** | 35+ |
|
||||
| **Tests with `-short` support** | 2 (currently) |
|
||||
|
||||
---
|
||||
|
||||
## Phase 1: Infrastructure (gotestsum)
|
||||
|
||||
### Objective
|
||||
Replace raw `go test` output with `gotestsum` for:
|
||||
- Real-time test progress with pass/fail indicators
|
||||
- Better failure summaries
|
||||
- JUnit XML output for CI integration
|
||||
- Colored output for local development
|
||||
|
||||
### Changes Required
|
||||
|
||||
#### 1.1 Install gotestsum as Development Dependency
|
||||
|
||||
```bash
|
||||
# Add to Makefile or development setup
|
||||
go install gotest.tools/gotestsum@latest
|
||||
```
|
||||
|
||||
**File:** `Makefile`
|
||||
```makefile
|
||||
# Add to tools target
|
||||
.PHONY: install-tools
|
||||
install-tools:
|
||||
go install gotest.tools/gotestsum@latest
|
||||
```
|
||||
|
||||
#### 1.2 Update Backend Test Skill Scripts
|
||||
|
||||
**File:** `.github/skills/test-backend-unit-scripts/run.sh`
|
||||
|
||||
Replace:
|
||||
```bash
|
||||
if go test "$@" ./...; then
|
||||
```
|
||||
|
||||
With:
|
||||
```bash
|
||||
# Check if gotestsum is available, fallback to go test
|
||||
if command -v gotestsum &> /dev/null; then
|
||||
if gotestsum --format pkgname -- "$@" ./...; then
|
||||
log_success "Backend unit tests passed"
|
||||
exit 0
|
||||
else
|
||||
exit_code=$?
|
||||
log_error "Backend unit tests failed (exit code: ${exit_code})"
|
||||
exit "${exit_code}"
|
||||
fi
|
||||
else
|
||||
log_warn "gotestsum not found, falling back to go test"
|
||||
if go test "$@" ./...; then
|
||||
```
|
||||
|
||||
**File:** `.github/skills/test-backend-coverage-scripts/run.sh`
|
||||
|
||||
Update the legacy script call to use gotestsum when available.
|
||||
|
||||
#### 1.3 Update VS Code Tasks (Optional Enhancement)
|
||||
|
||||
**File:** `.vscode/tasks.json`
|
||||
|
||||
Add new task for verbose test output:
|
||||
```jsonc
|
||||
{
|
||||
"label": "Test: Backend Unit (Verbose)",
|
||||
"type": "shell",
|
||||
"command": "cd backend && gotestsum --format testdox ./...",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
}
|
||||
```
|
||||
|
||||
#### 1.4 Update scripts/go-test-coverage.sh
|
||||
|
||||
**File:** `scripts/go-test-coverage.sh` (Line 42)
|
||||
|
||||
Replace:
|
||||
```bash
|
||||
if ! go test -race -v -mod=readonly -coverprofile="$COVERAGE_FILE" ./...; then
|
||||
```
|
||||
|
||||
With:
|
||||
```bash
|
||||
if command -v gotestsum &> /dev/null; then
|
||||
if ! gotestsum --format pkgname -- -race -mod=readonly -coverprofile="$COVERAGE_FILE" ./...; then
|
||||
GO_TEST_STATUS=$?
|
||||
fi
|
||||
else
|
||||
if ! go test -race -v -mod=readonly -coverprofile="$COVERAGE_FILE" ./...; then
|
||||
GO_TEST_STATUS=$?
|
||||
fi
|
||||
fi
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Phase 2: Parallelism (t.Parallel)
|
||||
|
||||
### Objective
|
||||
Add `t.Parallel()` to test functions that can safely run concurrently.
|
||||
|
||||
### 2.1 Files Already Using t.Parallel() ✅
|
||||
|
||||
These files are already well-parallelized:
|
||||
|
||||
| File | Parallel Tests |
|
||||
|------|---------------|
|
||||
| `internal/services/log_watcher_test.go` | 30+ tests |
|
||||
| `internal/api/handlers/auth_handler_test.go` | 35+ tests |
|
||||
| `internal/api/handlers/crowdsec_handler_test.go` | 40+ tests |
|
||||
| `internal/api/handlers/proxy_host_handler_test.go` | 50+ tests |
|
||||
| `internal/api/handlers/proxy_host_handler_update_test.go` | 15+ tests |
|
||||
| `internal/api/handlers/handlers_test.go` | 11 tests |
|
||||
| `internal/api/handlers/testdb_test.go` | 2 tests |
|
||||
| `internal/api/handlers/security_notifications_test.go` | 10 tests |
|
||||
| `internal/api/handlers/cerberus_logs_ws_test.go` | 9 tests |
|
||||
| `internal/services/backup_service_disk_test.go` | 3 tests |
|
||||
|
||||
### 2.2 Files Needing t.Parallel() Addition
|
||||
|
||||
**Priority 1: High-impact files (many tests, no shared state)**
|
||||
|
||||
| File | Est. Tests | Pattern |
|
||||
|------|-----------|---------|
|
||||
| `internal/network/safeclient_test.go` | 30+ | Add to all `func Test*` |
|
||||
| `internal/network/internal_service_client_test.go` | 9 | Add to all `func Test*` |
|
||||
| `internal/security/url_validator_test.go` | 25+ | Add to all `func Test*` |
|
||||
| `internal/security/audit_logger_test.go` | 10+ | Add to all `func Test*` |
|
||||
| `internal/metrics/security_metrics_test.go` | 5 | Add to all `func Test*` |
|
||||
| `internal/metrics/metrics_test.go` | 2 | Add to all `func Test*` |
|
||||
| `internal/crowdsec/hub_cache_test.go` | 18 | Add to all `func Test*` |
|
||||
| `internal/crowdsec/hub_sync_test.go` | 30+ | Add to all `func Test*` |
|
||||
| `internal/crowdsec/presets_test.go` | 4 | Add to all `func Test*` |
|
||||
|
||||
**Priority 2: Medium-impact files**
|
||||
|
||||
| File | Est. Tests | Notes |
|
||||
|------|-----------|-------|
|
||||
| `internal/cerberus/cerberus_test.go` | 10+ | Uses shared DB setup |
|
||||
| `internal/cerberus/cerberus_isenabled_test.go` | 10+ | Uses shared DB setup |
|
||||
| `internal/cerberus/cerberus_middleware_test.go` | 8 | Uses shared DB setup |
|
||||
| `internal/config/config_test.go` | 10+ | Uses env vars - CANNOT parallelize |
|
||||
| `internal/database/database_test.go` | 7 | Uses file system |
|
||||
| `internal/database/errors_test.go` | 6 | Uses file system |
|
||||
| `internal/util/sanitize_test.go` | 1 | Simple, can parallelize |
|
||||
| `internal/util/crypto_test.go` | 2 | Simple, can parallelize |
|
||||
| `internal/version/version_test.go` | ~2 | Simple, can parallelize |
|
||||
|
||||
**Priority 3: Handler tests (many already parallelized)**
|
||||
|
||||
| File | Status |
|
||||
|------|--------|
|
||||
| `internal/api/handlers/notification_handler_test.go` | Needs review |
|
||||
| `internal/api/handlers/certificate_handler_test.go` | Needs review |
|
||||
| `internal/api/handlers/backup_handler_test.go` | Needs review |
|
||||
| `internal/api/handlers/user_handler_test.go` | Needs review |
|
||||
| `internal/api/handlers/settings_handler_test.go` | Needs review |
|
||||
| `internal/api/handlers/domain_handler_test.go` | Needs review |
|
||||
|
||||
### 2.3 Tests That CANNOT Be Parallelized
|
||||
|
||||
**Environment Variable Tests:**
|
||||
- `internal/config/config_test.go` - Uses `os.Setenv()` which affects global state
|
||||
|
||||
**Singleton/Global State Tests:**
|
||||
- `internal/api/handlers/testdb_test.go::TestGetTemplateDB` - Tests singleton pattern
|
||||
- Any test using global metrics registration
|
||||
|
||||
**Sequential Dependency Tests:**
|
||||
- Integration tests in `backend/integration/` - Require Docker container state
|
||||
|
||||
### 2.4 Table-Driven Test Pattern Fix
|
||||
|
||||
For table-driven tests, ensure loop variable capture:
|
||||
|
||||
```go
|
||||
// BEFORE (race condition in parallel)
|
||||
for _, tc := range testCases {
|
||||
t.Run(tc.name, func(t *testing.T) {
|
||||
t.Parallel()
|
||||
// tc may have changed
|
||||
})
|
||||
}
|
||||
|
||||
// AFTER (safe for parallel)
|
||||
for _, tc := range testCases {
|
||||
tc := tc // capture loop variable
|
||||
t.Run(tc.name, func(t *testing.T) {
|
||||
t.Parallel()
|
||||
// tc is safely captured
|
||||
})
|
||||
}
|
||||
```
|
||||
|
||||
**Files needing this pattern (search for `for.*range.*testCases`):**
|
||||
- `internal/security/url_validator_test.go`
|
||||
- `internal/network/safeclient_test.go`
|
||||
- `internal/crowdsec/hub_sync_test.go`
|
||||
|
||||
---
|
||||
|
||||
## Phase 3: Database Optimization
|
||||
|
||||
### Objective
|
||||
Replace full database setup/teardown with transaction rollbacks for faster test isolation.
|
||||
|
||||
### 3.1 Current Database Test Pattern
|
||||
|
||||
**File:** `internal/api/handlers/testdb_test.go`
|
||||
|
||||
Current helper functions:
|
||||
- `GetTemplateDB()` - Singleton template database
|
||||
- `OpenTestDB(t)` - Creates new in-memory SQLite per test
|
||||
- `OpenTestDBWithMigrations(t)` - Creates DB with full schema
|
||||
|
||||
### 3.2 Files Using Database Setup
|
||||
|
||||
| File | Pattern | Optimization |
|
||||
|------|---------|--------------|
|
||||
| `internal/cerberus/cerberus_test.go` | `setupTestDB(t)` / `setupFullTestDB(t)` | Transaction rollback |
|
||||
| `internal/cerberus/cerberus_isenabled_test.go` | `setupDBForTest(t)` | Transaction rollback |
|
||||
| `internal/cerberus/cerberus_middleware_test.go` | `setupDB(t)` | Transaction rollback |
|
||||
| `internal/crowdsec/console_enroll_test.go` | `openConsoleTestDB(t)` | Transaction rollback |
|
||||
| `internal/utils/url_test.go` | `setupTestDB(t)` | Transaction rollback |
|
||||
| `internal/services/backup_service_test.go` | File-based setup | Keep as-is (file I/O) |
|
||||
| `internal/database/database_test.go` | Direct DB tests | Keep as-is (testing DB layer) |
|
||||
|
||||
### 3.3 Proposed Transaction Rollback Helper
|
||||
|
||||
**New File:** `internal/testutil/db.go`
|
||||
|
||||
```go
|
||||
package testutil
|
||||
|
||||
import (
|
||||
"testing"
|
||||
"gorm.io/gorm"
|
||||
)
|
||||
|
||||
// WithTx runs a test function within a transaction that is always rolled back.
|
||||
// This provides test isolation without the overhead of creating new databases.
|
||||
func WithTx(t *testing.T, db *gorm.DB, fn func(tx *gorm.DB)) {
|
||||
t.Helper()
|
||||
tx := db.Begin()
|
||||
defer func() {
|
||||
if r := recover(); r != nil {
|
||||
tx.Rollback()
|
||||
panic(r)
|
||||
}
|
||||
tx.Rollback()
|
||||
}()
|
||||
fn(tx)
|
||||
}
|
||||
|
||||
// GetTestTx returns a transaction that will be rolled back when the test completes.
|
||||
func GetTestTx(t *testing.T, db *gorm.DB) *gorm.DB {
|
||||
t.Helper()
|
||||
tx := db.Begin()
|
||||
t.Cleanup(func() {
|
||||
tx.Rollback()
|
||||
})
|
||||
return tx
|
||||
}
|
||||
```
|
||||
|
||||
### 3.4 Migration Pattern
|
||||
|
||||
**Before:**
|
||||
```go
|
||||
func TestSomething(t *testing.T) {
|
||||
db := setupTestDB(t) // Creates new in-memory DB
|
||||
db.Create(&models.Setting{Key: "test", Value: "value"})
|
||||
// ... test logic
|
||||
}
|
||||
```
|
||||
|
||||
**After:**
|
||||
```go
|
||||
var sharedTestDB *gorm.DB
|
||||
var once sync.Once
|
||||
|
||||
func getSharedDB(t *testing.T) *gorm.DB {
|
||||
once.Do(func() {
|
||||
sharedTestDB = setupTestDB(t)
|
||||
})
|
||||
return sharedTestDB
|
||||
}
|
||||
|
||||
func TestSomething(t *testing.T) {
|
||||
t.Parallel()
|
||||
tx := testutil.GetTestTx(t, getSharedDB(t))
|
||||
tx.Create(&models.Setting{Key: "test", Value: "value"})
|
||||
// ... test logic using tx instead of db
|
||||
}
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Phase 4: Short Mode
|
||||
|
||||
### Objective
|
||||
Enable fast feedback with `-short` flag by skipping heavy integration tests.
|
||||
|
||||
### 4.1 Current Short Mode Usage
|
||||
|
||||
Only 2 tests currently support `-short`:
|
||||
|
||||
| File | Test |
|
||||
|------|------|
|
||||
| `internal/utils/url_connectivity_test.go` | Comprehensive SSRF test |
|
||||
| `internal/services/mail_service_test.go` | SMTP integration test |
|
||||
|
||||
### 4.2 Tests to Add Short Mode Skip
|
||||
|
||||
**Integration Tests (all in `backend/integration/`):**
|
||||
|
||||
```go
|
||||
func TestCrowdsecStartup(t *testing.T) {
|
||||
if testing.Short() {
|
||||
t.Skip("Skipping integration test in short mode")
|
||||
}
|
||||
// ... existing test
|
||||
}
|
||||
```
|
||||
|
||||
Apply to:
|
||||
- `crowdsec_decisions_integration_test.go` - Both tests
|
||||
- `crowdsec_integration_test.go`
|
||||
- `coraza_integration_test.go`
|
||||
- `cerberus_integration_test.go`
|
||||
- `waf_integration_test.go`
|
||||
- `rate_limit_integration_test.go`
|
||||
|
||||
**Heavy Unit Tests:**
|
||||
|
||||
| File | Tests to Skip | Reason |
|
||||
|------|--------------|--------|
|
||||
| `internal/crowdsec/hub_sync_test.go` | HTTP-based tests | Network I/O |
|
||||
| `internal/network/safeclient_test.go` | `TestNewSafeHTTPClient_*` | Network I/O |
|
||||
| `internal/services/mail_service_test.go` | All | SMTP connection |
|
||||
| `internal/api/handlers/crowdsec_pull_apply_integration_test.go` | All | External deps |
|
||||
|
||||
### 4.3 Update VS Code Tasks
|
||||
|
||||
**File:** `.vscode/tasks.json`
|
||||
|
||||
Add quick test task:
|
||||
```jsonc
|
||||
{
|
||||
"label": "Test: Backend Unit (Quick)",
|
||||
"type": "shell",
|
||||
"command": "cd backend && gotestsum --format pkgname -- -short ./...",
|
||||
"group": "test",
|
||||
"problemMatcher": []
|
||||
}
|
||||
```
|
||||
|
||||
### 4.4 Update Skill Scripts
|
||||
|
||||
**File:** `.github/skills/test-backend-unit-scripts/run.sh`
|
||||
|
||||
Add `-short` support via environment variable:
|
||||
```bash
|
||||
SHORT_FLAG=""
|
||||
if [[ "${CHARON_TEST_SHORT:-false}" == "true" ]]; then
|
||||
SHORT_FLAG="-short"
|
||||
log_info "Running in short mode (skipping integration tests)"
|
||||
fi
|
||||
|
||||
if gotestsum --format pkgname -- $SHORT_FLAG "$@" ./...; then
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Implementation Order
|
||||
|
||||
### Week 1: Phase 1 (gotestsum)
|
||||
1. Install gotestsum in development environment
|
||||
2. Update skill scripts with gotestsum support
|
||||
3. Update legacy scripts
|
||||
4. Verify CI compatibility
|
||||
|
||||
### Week 2: Phase 2 (t.Parallel)
|
||||
1. Add `t.Parallel()` to Priority 1 files (network, security, metrics)
|
||||
2. Add `t.Parallel()` to Priority 2 files (cerberus, database)
|
||||
3. Fix table-driven test patterns
|
||||
4. Run race detector to verify no issues
|
||||
|
||||
### Week 3: Phase 3 (Database)
|
||||
1. Create `internal/testutil/db.go` helper
|
||||
2. Migrate cerberus tests to transaction pattern
|
||||
3. Migrate crowdsec tests to transaction pattern
|
||||
4. Benchmark before/after
|
||||
|
||||
### Week 4: Phase 4 (Short Mode)
|
||||
1. Add `-short` skips to integration tests
|
||||
2. Add `-short` skips to heavy unit tests
|
||||
3. Update VS Code tasks
|
||||
4. Document usage in CONTRIBUTING.md
|
||||
|
||||
---
|
||||
|
||||
## Expected Impact
|
||||
|
||||
| Metric | Current | After Phase 1 | After Phase 2 | After Phase 4 |
|
||||
|--------|---------|--------------|--------------|--------------|
|
||||
| **Test visibility** | None | Real-time | Real-time | Real-time |
|
||||
| **Parallel execution** | ~30% | ~30% | ~70% | ~70% |
|
||||
| **Full suite time** | ~90s | ~85s | ~50s | ~50s |
|
||||
| **Quick feedback** | N/A | N/A | N/A | ~15s |
|
||||
|
||||
---
|
||||
|
||||
## Validation Checklist
|
||||
|
||||
- [ ] All tests pass with `go test -race ./...`
|
||||
- [ ] Coverage remains above 85% threshold
|
||||
- [ ] No new race conditions detected
|
||||
- [ ] gotestsum output is readable in CI logs
|
||||
- [ ] `-short` mode completes in under 20 seconds
|
||||
- [ ] Transaction rollback tests properly isolate data
|
||||
|
||||
---
|
||||
|
||||
## Files Changed Summary
|
||||
|
||||
| Phase | Files Modified | Files Created |
|
||||
|-------|---------------|---------------|
|
||||
| Phase 1 | 4 | 0 |
|
||||
| Phase 2 | ~40 | 0 |
|
||||
| Phase 3 | ~10 | 1 |
|
||||
| Phase 4 | ~15 | 0 |
|
||||
|
||||
---
|
||||
|
||||
## Rollback Plan
|
||||
|
||||
If any phase causes issues:
|
||||
1. Phase 1: Remove gotestsum wrapper, revert to `go test`
|
||||
2. Phase 2: Remove `t.Parallel()` calls (can be done file-by-file)
|
||||
3. Phase 3: Revert to per-test database creation
|
||||
4. Phase 4: Remove `-short` skips
|
||||
|
||||
All changes are additive and backward-compatible.
|
||||
Reference in New Issue
Block a user