Files
Charon/backend/internal/cerberus/cerberus_isenabled_test.go
GitHub Actions 8294d6ee49 Add QA test outputs, build scripts, and Dockerfile validation
- Created `qa-test-output-after-fix.txt` and `qa-test-output.txt` to log results of certificate page authentication tests.
- Added `build.sh` for deterministic backend builds in CI, utilizing `go list` for efficiency.
- Introduced `codeql_scan.sh` for CodeQL database creation and analysis for Go and JavaScript/TypeScript.
- Implemented `dockerfile_check.sh` to validate Dockerfiles for base image and package manager mismatches.
- Added `sourcery_precommit_wrapper.sh` to facilitate Sourcery CLI usage in pre-commit hooks.
2025-12-11 18:26:24 +00:00

108 lines
3.2 KiB
Go

package cerberus_test
import (
"fmt"
"testing"
"time"
"github.com/Wikid82/charon/backend/internal/cerberus"
"github.com/Wikid82/charon/backend/internal/config"
"github.com/Wikid82/charon/backend/internal/models"
"github.com/stretchr/testify/require"
"gorm.io/driver/sqlite"
"gorm.io/gorm"
)
func setupDBForTest(t *testing.T) *gorm.DB {
dsn := fmt.Sprintf("file:cerberus_isenabled_test_%d?mode=memory&cache=shared", time.Now().UnixNano())
db, err := gorm.Open(sqlite.Open(dsn), &gorm.Config{})
require.NoError(t, err)
require.NoError(t, db.AutoMigrate(&models.Setting{}))
return db
}
func TestIsEnabled_ConfigTrue(t *testing.T) {
cfg := config.SecurityConfig{CerberusEnabled: true}
c := cerberus.New(cfg, nil)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_WAFModeEnabled(t *testing.T) {
cfg := config.SecurityConfig{WAFMode: "block"}
c := cerberus.New(cfg, nil)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_ACLModeEnabled(t *testing.T) {
cfg := config.SecurityConfig{ACLMode: "enabled"}
c := cerberus.New(cfg, nil)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_RateLimitModeEnabled(t *testing.T) {
cfg := config.SecurityConfig{RateLimitMode: "enabled"}
c := cerberus.New(cfg, nil)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_CrowdSecModeLocal(t *testing.T) {
cfg := config.SecurityConfig{CrowdSecMode: "local"}
c := cerberus.New(cfg, nil)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_DBSetting_FeatureFlag(t *testing.T) {
db := setupDBForTest(t)
// Test new feature flag key
s := models.Setting{Key: "feature.cerberus.enabled", Value: "true"}
require.NoError(t, db.Create(&s).Error)
cfg := config.SecurityConfig{}
c := cerberus.New(cfg, db)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_DBSetting_LegacyKey(t *testing.T) {
db := setupDBForTest(t)
// Test backward compatibility with legacy key
s := models.Setting{Key: "security.cerberus.enabled", Value: "true"}
require.NoError(t, db.Create(&s).Error)
cfg := config.SecurityConfig{}
c := cerberus.New(cfg, db)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_DBSetting_FeatureFlagTakesPrecedence(t *testing.T) {
db := setupDBForTest(t)
// Feature flag should take precedence over legacy key
require.NoError(t, db.Create(&models.Setting{Key: "feature.cerberus.enabled", Value: "false"}).Error)
require.NoError(t, db.Create(&models.Setting{Key: "security.cerberus.enabled", Value: "true"}).Error)
cfg := config.SecurityConfig{}
c := cerberus.New(cfg, db)
require.False(t, c.IsEnabled())
}
func TestIsEnabled_DBSettingCaseInsensitive(t *testing.T) {
db := setupDBForTest(t)
s := models.Setting{Key: "feature.cerberus.enabled", Value: "TrUe"}
require.NoError(t, db.Create(&s).Error)
cfg := config.SecurityConfig{}
c := cerberus.New(cfg, db)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_DBSettingFalse(t *testing.T) {
db := setupDBForTest(t)
s := models.Setting{Key: "feature.cerberus.enabled", Value: "false"}
require.NoError(t, db.Create(&s).Error)
cfg := config.SecurityConfig{}
c := cerberus.New(cfg, db)
require.False(t, c.IsEnabled())
}
func TestIsEnabled_DefaultTrue(t *testing.T) {
cfg := config.SecurityConfig{}
c := cerberus.New(cfg, nil)
// Default to true per Optional Features spec
require.True(t, c.IsEnabled())
}