Files
Charon/backend/internal/api/handlers/crowdsec_exec_test.go
T
GitHub Actions e41c4a12da fix: resolve CrowdSec 500 error and state mismatch after container restart
- Make Stop() idempotent: return nil instead of error when PID file missing
- Add startup reconciliation: auto-start CrowdSec if DB says enabled
- Ensure log file exists for LogWatcher to prevent disconnection

Fixes:
- "Failed to stop CrowdSec: 500 error" when toggling off
- CrowdSec showing "not running" despite being enabled in settings
- Live logs showing disconnected after container restart
2025-12-15 07:30:35 +00:00

190 lines
5.0 KiB
Go

package handlers
import (
"context"
"os"
"path/filepath"
"strconv"
"testing"
"time"
"github.com/stretchr/testify/assert"
)
func TestDefaultCrowdsecExecutorPidFile(t *testing.T) {
e := NewDefaultCrowdsecExecutor()
tmp := t.TempDir()
expected := filepath.Join(tmp, "crowdsec.pid")
if p := e.pidFile(tmp); p != expected {
t.Fatalf("pidFile mismatch got %s expected %s", p, expected)
}
}
func TestDefaultCrowdsecExecutorStartStatusStop(t *testing.T) {
e := NewDefaultCrowdsecExecutor()
tmp := t.TempDir()
// create a tiny script that sleeps and traps TERM
script := filepath.Join(tmp, "runscript.sh")
content := `#!/bin/sh
trap 'exit 0' TERM INT
while true; do sleep 1; done
`
if err := os.WriteFile(script, []byte(content), 0o755); err != nil {
t.Fatalf("write script: %v", err)
}
ctx, cancel := context.WithTimeout(context.Background(), time.Second*10)
defer cancel()
pid, err := e.Start(ctx, script, tmp)
if err != nil {
t.Fatalf("start err: %v", err)
}
if pid <= 0 {
t.Fatalf("invalid pid %d", pid)
}
// ensure pid file exists and content matches
pidB, err := os.ReadFile(e.pidFile(tmp))
if err != nil {
t.Fatalf("read pid file: %v", err)
}
gotPid, _ := strconv.Atoi(string(pidB))
if gotPid != pid {
t.Fatalf("pid file mismatch got %d expected %d", gotPid, pid)
}
// Status should return running
running, got, err := e.Status(ctx, tmp)
if err != nil {
t.Fatalf("status err: %v", err)
}
if !running || got != pid {
t.Fatalf("status expected running for %d got %d running=%v", pid, got, running)
}
// Stop should terminate and remove pid file
if err := e.Stop(ctx, tmp); err != nil {
t.Fatalf("stop err: %v", err)
}
// give a little time for process to exit
time.Sleep(200 * time.Millisecond)
running2, _, _ := e.Status(ctx, tmp)
if running2 {
t.Fatalf("process still running after stop")
}
}
// Additional coverage tests for error paths
func TestDefaultCrowdsecExecutor_Status_NoPidFile(t *testing.T) {
exec := NewDefaultCrowdsecExecutor()
tmpDir := t.TempDir()
running, pid, err := exec.Status(context.Background(), tmpDir)
assert.NoError(t, err)
assert.False(t, running)
assert.Equal(t, 0, pid)
}
func TestDefaultCrowdsecExecutor_Status_InvalidPid(t *testing.T) {
exec := NewDefaultCrowdsecExecutor()
tmpDir := t.TempDir()
// Write invalid pid
os.WriteFile(filepath.Join(tmpDir, "crowdsec.pid"), []byte("invalid"), 0o644)
running, pid, err := exec.Status(context.Background(), tmpDir)
assert.NoError(t, err)
assert.False(t, running)
assert.Equal(t, 0, pid)
}
func TestDefaultCrowdsecExecutor_Status_NonExistentProcess(t *testing.T) {
exec := NewDefaultCrowdsecExecutor()
tmpDir := t.TempDir()
// Write a pid that doesn't exist
// Use a very high PID that's unlikely to exist
os.WriteFile(filepath.Join(tmpDir, "crowdsec.pid"), []byte("999999999"), 0o644)
running, pid, err := exec.Status(context.Background(), tmpDir)
assert.NoError(t, err)
assert.False(t, running)
assert.Equal(t, 999999999, pid)
}
func TestDefaultCrowdsecExecutor_Stop_NoPidFile(t *testing.T) {
exec := NewDefaultCrowdsecExecutor()
tmpDir := t.TempDir()
err := exec.Stop(context.Background(), tmpDir)
// Stop should be idempotent - no PID file means already stopped
assert.NoError(t, err)
}
func TestDefaultCrowdsecExecutor_Stop_InvalidPid(t *testing.T) {
exec := NewDefaultCrowdsecExecutor()
tmpDir := t.TempDir()
// Write invalid pid
os.WriteFile(filepath.Join(tmpDir, "crowdsec.pid"), []byte("invalid"), 0o644)
err := exec.Stop(context.Background(), tmpDir)
// Stop should clean up malformed PID file and succeed
assert.NoError(t, err)
// Verify PID file was cleaned up
_, statErr := os.Stat(filepath.Join(tmpDir, "crowdsec.pid"))
assert.True(t, os.IsNotExist(statErr), "PID file should be removed after Stop with invalid PID")
}
func TestDefaultCrowdsecExecutor_Stop_NonExistentProcess(t *testing.T) {
exec := NewDefaultCrowdsecExecutor()
tmpDir := t.TempDir()
// Write a pid that doesn't exist
os.WriteFile(filepath.Join(tmpDir, "crowdsec.pid"), []byte("999999999"), 0o644)
err := exec.Stop(context.Background(), tmpDir)
// Stop should be idempotent - stale PID file means process already dead
assert.NoError(t, err)
// Verify PID file was cleaned up
_, statErr := os.Stat(filepath.Join(tmpDir, "crowdsec.pid"))
assert.True(t, os.IsNotExist(statErr), "Stale PID file should be cleaned up after Stop")
}
func TestDefaultCrowdsecExecutor_Stop_Idempotent(t *testing.T) {
exec := NewDefaultCrowdsecExecutor()
tmpDir := t.TempDir()
// Stop should succeed even when called multiple times
err1 := exec.Stop(context.Background(), tmpDir)
err2 := exec.Stop(context.Background(), tmpDir)
err3 := exec.Stop(context.Background(), tmpDir)
assert.NoError(t, err1)
assert.NoError(t, err2)
assert.NoError(t, err3)
}
func TestDefaultCrowdsecExecutor_Start_InvalidBinary(t *testing.T) {
exec := NewDefaultCrowdsecExecutor()
tmpDir := t.TempDir()
pid, err := exec.Start(context.Background(), "/nonexistent/binary", tmpDir)
assert.Error(t, err)
assert.Equal(t, 0, pid)
}