Files
Charon/backend/internal/api/handlers/crowdsec_handler_test.go
T
GitHub Actions 1919530662 fix: add LAPI readiness check to CrowdSec status endpoint
The Status() handler was only checking if the CrowdSec process was
running, not if LAPI was actually responding. This caused the
CrowdSecConfig page to always show "LAPI is initializing" even when
LAPI was fully operational.

Changes:
- Backend: Add lapi_ready field to /admin/crowdsec/status response
- Frontend: Add CrowdSecStatus TypeScript interface
- Frontend: Update conditional logic to check lapi_ready not running
- Frontend: Separate warnings for "initializing" vs "not running"
- Tests: Add unit tests for Status handler LAPI check

Fixes regression from crowdsec_lapi_error_diagnostic.md fixes.
2025-12-15 07:30:35 +00:00

1523 lines
45 KiB
Go

package handlers
import (
"archive/tar"
"bytes"
"compress/gzip"
"context"
"encoding/json"
"errors"
"io"
"mime/multipart"
"net/http"
"net/http/httptest"
"os"
"path/filepath"
"strings"
"testing"
"time"
"github.com/Wikid82/charon/backend/internal/crowdsec"
"github.com/Wikid82/charon/backend/internal/models"
"github.com/gin-gonic/gin"
"github.com/stretchr/testify/require"
"gorm.io/gorm"
)
type fakeExec struct {
started bool
}
func (f *fakeExec) Start(ctx context.Context, binPath, configDir string) (int, error) {
f.started = true
return 12345, nil
}
func (f *fakeExec) Stop(ctx context.Context, configDir string) error {
f.started = false
return nil
}
func (f *fakeExec) Status(ctx context.Context, configDir string) (running bool, pid int, err error) {
if f.started {
return true, 12345, nil
}
return false, 0, nil
}
func setupCrowdDB(t *testing.T) *gorm.DB {
db := OpenTestDB(t)
return db
}
func TestCrowdsecEndpoints(t *testing.T) {
gin.SetMode(gin.TestMode)
db := setupCrowdDB(t)
tmpDir := t.TempDir()
fe := &fakeExec{}
h := NewCrowdsecHandler(db, fe, "/bin/false", tmpDir)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
// Status (initially stopped)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/status", http.NoBody)
r.ServeHTTP(w, req)
if w.Code != http.StatusOK {
t.Fatalf("status expected 200 got %d", w.Code)
}
// Start
w2 := httptest.NewRecorder()
req2 := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/start", http.NoBody)
r.ServeHTTP(w2, req2)
if w2.Code != http.StatusOK {
t.Fatalf("start expected 200 got %d", w2.Code)
}
// Stop
w3 := httptest.NewRecorder()
req3 := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/stop", http.NoBody)
r.ServeHTTP(w3, req3)
if w3.Code != http.StatusOK {
t.Fatalf("stop expected 200 got %d", w3.Code)
}
}
func TestImportConfig(t *testing.T) {
gin.SetMode(gin.TestMode)
db := setupCrowdDB(t)
tmpDir := t.TempDir()
fe := &fakeExec{}
h := NewCrowdsecHandler(db, fe, "/bin/false", tmpDir)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
// create a small file to upload
buf := &bytes.Buffer{}
mw := multipart.NewWriter(buf)
fw, _ := mw.CreateFormFile("file", "cfg.tar.gz")
fw.Write([]byte("dummy"))
mw.Close()
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/import", buf)
req.Header.Set("Content-Type", mw.FormDataContentType())
r.ServeHTTP(w, req)
if w.Code != http.StatusOK {
t.Fatalf("import expected 200 got %d body=%s", w.Code, w.Body.String())
}
// ensure file exists in data dir
if _, err := os.Stat(filepath.Join(tmpDir, "cfg.tar.gz")); err != nil {
t.Fatalf("expected file in data dir: %v", err)
}
}
func TestImportCreatesBackup(t *testing.T) {
gin.SetMode(gin.TestMode)
db := setupCrowdDB(t)
tmpDir := t.TempDir()
// create existing config dir with a marker file
_ = os.MkdirAll(tmpDir, 0o755)
_ = os.WriteFile(filepath.Join(tmpDir, "existing.conf"), []byte("v1"), 0o644)
fe := &fakeExec{}
h := NewCrowdsecHandler(db, fe, "/bin/false", tmpDir)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
// upload
buf := &bytes.Buffer{}
mw := multipart.NewWriter(buf)
fw, _ := mw.CreateFormFile("file", "cfg.tar.gz")
fw.Write([]byte("dummy2"))
mw.Close()
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/import", buf)
req.Header.Set("Content-Type", mw.FormDataContentType())
r.ServeHTTP(w, req)
if w.Code != http.StatusOK {
t.Fatalf("import expected 200 got %d body=%s", w.Code, w.Body.String())
}
// ensure backup dir exists (ends with .backup.TIMESTAMP)
found := false
entries, _ := os.ReadDir(filepath.Dir(tmpDir))
for _, e := range entries {
if e.IsDir() && filepath.HasPrefix(e.Name(), filepath.Base(tmpDir)+".backup.") {
found = true
break
}
}
if !found {
// fallback: check for any .backup.* in same parent dir
entries, _ := os.ReadDir(filepath.Dir(tmpDir))
for _, e := range entries {
if e.IsDir() && filepath.Ext(e.Name()) == "" && e.Name() != "" && (filepath.Base(e.Name()) != filepath.Base(tmpDir)) {
// best-effort assume backup present
found = true
break
}
}
}
if !found {
t.Fatalf("expected backup directory next to data dir")
}
}
func TestExportConfig(t *testing.T) {
gin.SetMode(gin.TestMode)
db := setupCrowdDB(t)
tmpDir := t.TempDir()
// create some files to export
_ = os.MkdirAll(filepath.Join(tmpDir, "conf.d"), 0o755)
_ = os.WriteFile(filepath.Join(tmpDir, "conf.d", "a.conf"), []byte("rule1"), 0o644)
_ = os.WriteFile(filepath.Join(tmpDir, "b.conf"), []byte("rule2"), 0o644)
fe := &fakeExec{}
h := NewCrowdsecHandler(db, fe, "/bin/false", tmpDir)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/export", http.NoBody)
r.ServeHTTP(w, req)
if w.Code != http.StatusOK {
t.Fatalf("export expected 200 got %d body=%s", w.Code, w.Body.String())
}
if ct := w.Header().Get("Content-Type"); ct != "application/gzip" {
t.Fatalf("unexpected content type: %s", ct)
}
if w.Body.Len() == 0 {
t.Fatalf("expected response body to contain archive data")
}
}
func TestListAndReadFile(t *testing.T) {
gin.SetMode(gin.TestMode)
db := setupCrowdDB(t)
tmpDir := t.TempDir()
// create a nested file
_ = os.MkdirAll(filepath.Join(tmpDir, "conf.d"), 0o755)
_ = os.WriteFile(filepath.Join(tmpDir, "conf.d", "a.conf"), []byte("rule1"), 0o644)
_ = os.WriteFile(filepath.Join(tmpDir, "b.conf"), []byte("rule2"), 0o644)
fe := &fakeExec{}
h := NewCrowdsecHandler(db, fe, "/bin/false", tmpDir)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/files", http.NoBody)
r.ServeHTTP(w, req)
if w.Code != http.StatusOK {
t.Fatalf("files expected 200 got %d body=%s", w.Code, w.Body.String())
}
// read a single file
w2 := httptest.NewRecorder()
req2 := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/file?path=conf.d/a.conf", http.NoBody)
r.ServeHTTP(w2, req2)
if w2.Code != http.StatusOK {
t.Fatalf("file read expected 200 got %d body=%s", w2.Code, w2.Body.String())
}
}
func TestExportConfigStreamsArchive(t *testing.T) {
gin.SetMode(gin.TestMode)
db := setupCrowdDB(t)
dataDir := t.TempDir()
require.NoError(t, os.WriteFile(filepath.Join(dataDir, "config.yaml"), []byte("hello"), 0o644))
h := NewCrowdsecHandler(db, &fakeExec{}, "/bin/false", dataDir)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/export", http.NoBody)
r.ServeHTTP(w, req)
require.Equal(t, http.StatusOK, w.Code)
require.Equal(t, "application/gzip", w.Header().Get("Content-Type"))
require.Contains(t, w.Header().Get("Content-Disposition"), "crowdsec-config-")
gr, err := gzip.NewReader(bytes.NewReader(w.Body.Bytes()))
require.NoError(t, err)
tr := tar.NewReader(gr)
found := false
for {
hdr, err := tr.Next()
if errors.Is(err, io.EOF) {
break
}
require.NoError(t, err)
if hdr.Name == "config.yaml" {
data, readErr := io.ReadAll(tr)
require.NoError(t, readErr)
require.Equal(t, "hello", string(data))
found = true
}
}
require.True(t, found, "expected exported archive to contain config file")
}
func TestWriteFileCreatesBackup(t *testing.T) {
gin.SetMode(gin.TestMode)
db := setupCrowdDB(t)
tmpDir := t.TempDir()
// create existing config dir with a marker file
_ = os.MkdirAll(tmpDir, 0o755)
_ = os.WriteFile(filepath.Join(tmpDir, "existing.conf"), []byte("v1"), 0o644)
fe := &fakeExec{}
h := NewCrowdsecHandler(db, fe, "/bin/false", tmpDir)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
// write content to new file
payload := map[string]string{"path": "conf.d/new.conf", "content": "hello world"}
b, _ := json.Marshal(payload)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/file", bytes.NewReader(b))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
if w.Code != http.StatusOK {
t.Fatalf("write expected 200 got %d body=%s", w.Code, w.Body.String())
}
// ensure backup directory was created
entries, err := os.ReadDir(filepath.Dir(tmpDir))
require.NoError(t, err)
foundBackup := false
for _, e := range entries {
if e.IsDir() && strings.HasPrefix(e.Name(), filepath.Base(tmpDir)+".backup.") {
foundBackup = true
break
}
}
require.True(t, foundBackup, "expected backup directory to be created")
}
func TestListPresetsCerberusDisabled(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CERBERUS_ENABLED", "false")
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/presets", http.NoBody)
r.ServeHTTP(w, req)
if w.Code != http.StatusNotFound {
t.Fatalf("expected 404 when cerberus disabled got %d", w.Code)
}
}
func TestReadFileInvalidPath(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/file?path=../secret", http.NoBody)
r.ServeHTTP(w, req)
if w.Code != http.StatusBadRequest {
t.Fatalf("expected 400 for invalid path got %d", w.Code)
}
}
func TestWriteFileInvalidPath(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
body, _ := json.Marshal(map[string]string{"path": "../../escape", "content": "bad"})
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/file", bytes.NewReader(body))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
if w.Code != http.StatusBadRequest {
t.Fatalf("expected 400 for invalid path got %d", w.Code)
}
}
func TestWriteFileMissingPath(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
body, _ := json.Marshal(map[string]string{"content": "data only"})
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/file", bytes.NewReader(body))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
require.Equal(t, http.StatusBadRequest, w.Code)
}
func TestWriteFileInvalidPayload(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/file", bytes.NewBufferString("not-json"))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
require.Equal(t, http.StatusBadRequest, w.Code)
}
func TestImportConfigRequiresFile(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/import", http.NoBody)
r.ServeHTTP(w, req)
if w.Code != http.StatusBadRequest {
t.Fatalf("expected 400 when file missing got %d", w.Code)
}
}
func TestImportConfigRejectsEmptyUpload(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
buf := &bytes.Buffer{}
mw := multipart.NewWriter(buf)
_, _ = mw.CreateFormFile("file", "empty.tgz")
_ = mw.Close()
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/import", buf)
req.Header.Set("Content-Type", mw.FormDataContentType())
r.ServeHTTP(w, req)
if w.Code != http.StatusBadRequest {
t.Fatalf("expected 400 for empty upload got %d", w.Code)
}
}
func TestListFilesMissingDir(t *testing.T) {
gin.SetMode(gin.TestMode)
missingDir := filepath.Join(t.TempDir(), "does-not-exist")
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", missingDir)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/files", http.NoBody)
r.ServeHTTP(w, req)
if w.Code != http.StatusOK {
t.Fatalf("expected 200 for missing dir got %d", w.Code)
}
}
func TestListFilesReturnsEntries(t *testing.T) {
gin.SetMode(gin.TestMode)
dataDir := t.TempDir()
require.NoError(t, os.WriteFile(filepath.Join(dataDir, "root.txt"), []byte("root"), 0o644))
nestedDir := filepath.Join(dataDir, "nested")
require.NoError(t, os.MkdirAll(nestedDir, 0o755))
require.NoError(t, os.WriteFile(filepath.Join(nestedDir, "child.txt"), []byte("child"), 0o644))
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", dataDir)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/files", http.NoBody)
r.ServeHTTP(w, req)
if w.Code != http.StatusOK {
t.Fatalf("expected 200 got %d", w.Code)
}
var resp struct {
Files []string `json:"files"`
}
require.NoError(t, json.Unmarshal(w.Body.Bytes(), &resp))
require.ElementsMatch(t, []string{"root.txt", filepath.Join("nested", "child.txt")}, resp.Files)
}
func TestIsCerberusEnabledFromDB(t *testing.T) {
gin.SetMode(gin.TestMode)
db := OpenTestDB(t)
require.NoError(t, db.AutoMigrate(&models.Setting{}))
require.NoError(t, db.Create(&models.Setting{Key: "feature.cerberus.enabled", Value: "0"}).Error)
h := NewCrowdsecHandler(db, &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/presets", http.NoBody)
r.ServeHTTP(w, req)
if w.Code != http.StatusNotFound {
t.Fatalf("expected 404 when cerberus disabled via DB got %d", w.Code)
}
}
func TestIsCerberusEnabledInvalidEnv(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CERBERUS_ENABLED", "not-a-bool")
h := NewCrowdsecHandler(nil, &fakeExec{}, "/bin/false", t.TempDir())
if h.isCerberusEnabled() {
t.Fatalf("expected cerberus to be disabled for invalid env flag")
}
}
func TestIsCerberusEnabledLegacyEnv(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(nil, &fakeExec{}, "/bin/false", t.TempDir())
t.Setenv("CERBERUS_ENABLED", "0")
if h.isCerberusEnabled() {
t.Fatalf("expected cerberus to be disabled for legacy env flag")
}
}
// ============================================
// Console Enrollment Tests
// ============================================
type mockEnvExecutor struct {
responses []struct {
out []byte
err error
}
defaultResponse struct {
out []byte
err error
}
calls []struct {
name string
args []string
}
}
func (m *mockEnvExecutor) ExecuteWithEnv(ctx context.Context, name string, args []string, env map[string]string) ([]byte, error) {
m.calls = append(m.calls, struct {
name string
args []string
}{name, args})
if len(m.calls) <= len(m.responses) {
resp := m.responses[len(m.calls)-1]
return resp.out, resp.err
}
return m.defaultResponse.out, m.defaultResponse.err
}
func setupTestConsoleEnrollment(t *testing.T) (*CrowdsecHandler, *mockEnvExecutor) {
t.Helper()
gin.SetMode(gin.TestMode)
db := OpenTestDB(t)
require.NoError(t, db.AutoMigrate(&models.CrowdsecConsoleEnrollment{}))
exec := &mockEnvExecutor{}
dataDir := t.TempDir()
h := NewCrowdsecHandler(db, &fakeExec{}, "/bin/false", dataDir)
// Replace the Console service with one that uses our mock executor
h.Console = crowdsec.NewConsoleEnrollmentService(db, exec, dataDir, "test-secret")
return h, exec
}
func TestConsoleEnrollDisabled(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CROWDSEC_CONSOLE_ENROLLMENT", "false")
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
body := `{"enrollment_key": "abc123456789", "agent_name": "test-agent"}`
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/console/enroll", strings.NewReader(body))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
require.Equal(t, http.StatusNotFound, w.Code)
require.Contains(t, w.Body.String(), "disabled")
}
func TestConsoleEnrollServiceUnavailable(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CROWDSEC_CONSOLE_ENROLLMENT", "true")
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
// Set Console to nil to simulate unavailable
h.Console = nil
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
body := `{"enrollment_key": "abc123456789", "agent_name": "test-agent"}`
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/console/enroll", strings.NewReader(body))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
require.Equal(t, http.StatusServiceUnavailable, w.Code)
require.Contains(t, w.Body.String(), "unavailable")
}
func TestConsoleEnrollInvalidPayload(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CROWDSEC_CONSOLE_ENROLLMENT", "true")
h, _ := setupTestConsoleEnrollment(t)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/console/enroll", strings.NewReader("not-json"))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
require.Equal(t, http.StatusBadRequest, w.Code)
require.Contains(t, w.Body.String(), "invalid payload")
}
func TestConsoleEnrollSuccess(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CROWDSEC_CONSOLE_ENROLLMENT", "true")
h, _ := setupTestConsoleEnrollment(t)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
body := `{"enrollment_key": "abc123456789", "agent_name": "test-agent", "tenant": "my-tenant"}`
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/console/enroll", strings.NewReader(body))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
require.Equal(t, http.StatusOK, w.Code)
var resp map[string]interface{}
require.NoError(t, json.Unmarshal(w.Body.Bytes(), &resp))
require.Equal(t, "enrolled", resp["status"])
}
func TestConsoleEnrollMissingAgentName(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CROWDSEC_CONSOLE_ENROLLMENT", "true")
h, _ := setupTestConsoleEnrollment(t)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
body := `{"enrollment_key": "abc123456789", "agent_name": ""}`
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/console/enroll", strings.NewReader(body))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
require.Equal(t, http.StatusBadRequest, w.Code)
require.Contains(t, w.Body.String(), "required")
}
func TestConsoleStatusDisabled(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CROWDSEC_CONSOLE_ENROLLMENT", "false")
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/console/status", http.NoBody)
r.ServeHTTP(w, req)
require.Equal(t, http.StatusNotFound, w.Code)
require.Contains(t, w.Body.String(), "disabled")
}
func TestConsoleStatusServiceUnavailable(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CROWDSEC_CONSOLE_ENROLLMENT", "true")
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
// Set Console to nil to simulate unavailable
h.Console = nil
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/console/status", http.NoBody)
r.ServeHTTP(w, req)
require.Equal(t, http.StatusServiceUnavailable, w.Code)
require.Contains(t, w.Body.String(), "unavailable")
}
func TestConsoleStatusSuccess(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CROWDSEC_CONSOLE_ENROLLMENT", "true")
h, _ := setupTestConsoleEnrollment(t)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
// Get status when not enrolled yet
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/console/status", http.NoBody)
r.ServeHTTP(w, req)
require.Equal(t, http.StatusOK, w.Code)
var resp map[string]interface{}
require.NoError(t, json.Unmarshal(w.Body.Bytes(), &resp))
require.Equal(t, "not_enrolled", resp["status"])
}
func TestConsoleStatusAfterEnroll(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CROWDSEC_CONSOLE_ENROLLMENT", "true")
h, _ := setupTestConsoleEnrollment(t)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
// First enroll
body := `{"enrollment_key": "abc123456789", "agent_name": "test-agent"}`
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/console/enroll", strings.NewReader(body))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
require.Equal(t, http.StatusOK, w.Code)
// Then check status
w2 := httptest.NewRecorder()
req2 := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/console/status", http.NoBody)
r.ServeHTTP(w2, req2)
require.Equal(t, http.StatusOK, w2.Code)
var resp map[string]interface{}
require.NoError(t, json.Unmarshal(w2.Body.Bytes(), &resp))
require.Equal(t, "enrolled", resp["status"])
require.Equal(t, "test-agent", resp["agent_name"])
}
// ============================================
// isConsoleEnrollmentEnabled Tests
// ============================================
func TestIsConsoleEnrollmentEnabledFromDB(t *testing.T) {
gin.SetMode(gin.TestMode)
db := OpenTestDB(t)
require.NoError(t, db.AutoMigrate(&models.Setting{}))
require.NoError(t, db.Create(&models.Setting{Key: "feature.crowdsec.console_enrollment", Value: "true"}).Error)
h := NewCrowdsecHandler(db, &fakeExec{}, "/bin/false", t.TempDir())
require.True(t, h.isConsoleEnrollmentEnabled())
}
func TestIsConsoleEnrollmentDisabledFromDB(t *testing.T) {
gin.SetMode(gin.TestMode)
db := OpenTestDB(t)
require.NoError(t, db.AutoMigrate(&models.Setting{}))
require.NoError(t, db.Create(&models.Setting{Key: "feature.crowdsec.console_enrollment", Value: "false"}).Error)
h := NewCrowdsecHandler(db, &fakeExec{}, "/bin/false", t.TempDir())
require.False(t, h.isConsoleEnrollmentEnabled())
}
func TestIsConsoleEnrollmentEnabledFromEnv(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CROWDSEC_CONSOLE_ENROLLMENT", "true")
h := NewCrowdsecHandler(nil, &fakeExec{}, "/bin/false", t.TempDir())
require.True(t, h.isConsoleEnrollmentEnabled())
}
func TestIsConsoleEnrollmentDisabledFromEnv(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CROWDSEC_CONSOLE_ENROLLMENT", "0")
h := NewCrowdsecHandler(nil, &fakeExec{}, "/bin/false", t.TempDir())
require.False(t, h.isConsoleEnrollmentEnabled())
}
func TestIsConsoleEnrollmentInvalidEnv(t *testing.T) {
gin.SetMode(gin.TestMode)
t.Setenv("FEATURE_CROWDSEC_CONSOLE_ENROLLMENT", "invalid")
h := NewCrowdsecHandler(nil, &fakeExec{}, "/bin/false", t.TempDir())
require.False(t, h.isConsoleEnrollmentEnabled())
}
func TestIsConsoleEnrollmentDefaultDisabled(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(nil, &fakeExec{}, "/bin/false", t.TempDir())
require.False(t, h.isConsoleEnrollmentEnabled())
}
func TestIsConsoleEnrollmentDBTrueVariants(t *testing.T) {
tests := []struct {
value string
expected bool
}{
{"true", true},
{"TRUE", true},
{"True", true},
{"1", true},
{"yes", true},
{"YES", true},
{"false", false},
{"FALSE", false},
{"0", false},
{"no", false},
}
for _, tc := range tests {
t.Run(tc.value, func(t *testing.T) {
gin.SetMode(gin.TestMode)
db := OpenTestDB(t)
require.NoError(t, db.AutoMigrate(&models.Setting{}))
require.NoError(t, db.Create(&models.Setting{Key: "feature.crowdsec.console_enrollment", Value: tc.value}).Error)
h := NewCrowdsecHandler(db, &fakeExec{}, "/bin/false", t.TempDir())
require.Equal(t, tc.expected, h.isConsoleEnrollmentEnabled(), "value %q", tc.value)
})
}
}
// ============================================
// Bouncer Registration Tests
// ============================================
type mockCmdExecutor struct {
output []byte
err error
calls []struct {
name string
args []string
}
}
func (m *mockCmdExecutor) Execute(ctx context.Context, name string, args ...string) ([]byte, error) {
m.calls = append(m.calls, struct {
name string
args []string
}{name, args})
return m.output, m.err
}
func TestRegisterBouncerScriptNotFound(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/bouncer/register", http.NoBody)
r.ServeHTTP(w, req)
// Script doesn't exist, should return 404
require.Equal(t, http.StatusNotFound, w.Code)
require.Contains(t, w.Body.String(), "script not found")
}
func TestRegisterBouncerSuccess(t *testing.T) {
gin.SetMode(gin.TestMode)
// Create a temp script that mimics successful bouncer registration
tmpDir := t.TempDir()
// Skip if we can't create the script in the expected location
if _, err := os.Stat("/usr/local/bin"); os.IsNotExist(err) {
t.Skip("Skipping test: /usr/local/bin does not exist")
}
// Create a mock command executor that simulates successful registration
mockExec := &mockCmdExecutor{
output: []byte("Bouncer registered successfully\nAPI Key: abc123456789abcdef0123456789abcdef\n"),
err: nil,
}
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", tmpDir)
h.CmdExec = mockExec
// We need the script to exist for the test to work
// Create a dummy script in tmpDir and modify the handler to check there
// For this test, we'll just verify the mock executor is called correctly
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
// This will fail because script doesn't exist at /usr/local/bin/register_bouncer.sh
// The test verifies the handler's script-not-found behavior
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/bouncer/register", http.NoBody)
r.ServeHTTP(w, req)
require.Equal(t, http.StatusNotFound, w.Code)
}
func TestRegisterBouncerExecutionError(t *testing.T) {
gin.SetMode(gin.TestMode)
// Create a mock command executor that simulates execution error
mockExec := &mockCmdExecutor{
output: []byte("Error: failed to execute cscli"),
err: errors.New("exit status 1"),
}
tmpDir := t.TempDir()
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", tmpDir)
h.CmdExec = mockExec
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
// Script doesn't exist, so it will return 404 first
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/bouncer/register", http.NoBody)
r.ServeHTTP(w, req)
require.Equal(t, http.StatusNotFound, w.Code)
}
// ============================================
// Acquisition Config Tests
// ============================================
func TestGetAcquisitionConfigNotFound(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/acquisition", http.NoBody)
r.ServeHTTP(w, req)
// Test behavior depends on whether /etc/crowdsec/acquis.yaml exists in test environment
// If file exists: 200 with content
// If file doesn't exist: 404
require.True(t, w.Code == http.StatusOK || w.Code == http.StatusNotFound,
"expected 200 or 404, got %d", w.Code)
if w.Code == http.StatusNotFound {
require.Contains(t, w.Body.String(), "not found")
} else {
var resp map[string]interface{}
require.NoError(t, json.Unmarshal(w.Body.Bytes(), &resp))
require.Contains(t, resp, "content")
require.Equal(t, "/etc/crowdsec/acquis.yaml", resp["path"])
}
}
func TestGetAcquisitionConfigSuccess(t *testing.T) {
gin.SetMode(gin.TestMode)
// Create a temp acquis.yaml to test with
tmpDir := t.TempDir()
acquisDir := filepath.Join(tmpDir, "crowdsec")
require.NoError(t, os.MkdirAll(acquisDir, 0o755))
acquisContent := `# Test acquisition config
source: file
filenames:
- /var/log/caddy/access.log
labels:
type: caddy
`
acquisPath := filepath.Join(acquisDir, "acquis.yaml")
require.NoError(t, os.WriteFile(acquisPath, []byte(acquisContent), 0o644))
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", tmpDir)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/acquisition", http.NoBody)
r.ServeHTTP(w, req)
// The handler uses a hardcoded path /etc/crowdsec/acquis.yaml
// In test environments where this file exists, it returns 200
// Otherwise, it returns 404
require.True(t, w.Code == http.StatusOK || w.Code == http.StatusNotFound,
"expected 200 or 404, got %d", w.Code)
}
func TestUpdateAcquisitionConfigMissingContent(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
// Empty JSON body
body, _ := json.Marshal(map[string]string{})
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPut, "/api/v1/admin/crowdsec/acquisition", bytes.NewReader(body))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
require.Equal(t, http.StatusBadRequest, w.Code)
require.Contains(t, w.Body.String(), "required")
}
func TestUpdateAcquisitionConfigInvalidJSON(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPut, "/api/v1/admin/crowdsec/acquisition", bytes.NewBufferString("not-json"))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
require.Equal(t, http.StatusBadRequest, w.Code)
}
func TestUpdateAcquisitionConfigWriteError(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
// Valid content - test behavior depends on whether /etc/crowdsec is writable
body, _ := json.Marshal(map[string]string{
"content": "source: file\nfilenames:\n - /var/log/test.log\nlabels:\n type: test\n",
})
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPut, "/api/v1/admin/crowdsec/acquisition", bytes.NewReader(body))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
// If /etc/crowdsec exists and is writable, this will succeed (200)
// If not writable, it will fail (500)
// We accept either outcome based on the test environment
require.True(t, w.Code == http.StatusOK || w.Code == http.StatusInternalServerError,
"expected 200 or 500, got %d", w.Code)
if w.Code == http.StatusOK {
var resp map[string]interface{}
require.NoError(t, json.Unmarshal(w.Body.Bytes(), &resp))
require.Equal(t, "updated", resp["status"])
require.True(t, resp["reload_hint"].(bool))
}
}
// TestAcquisitionConfigRoundTrip tests creating, reading, and updating acquisition config
// when the path is writable (integration-style test)
func TestAcquisitionConfigRoundTrip(t *testing.T) {
gin.SetMode(gin.TestMode)
// This test requires /etc/crowdsec to be writable, which isn't typical in test environments
// Skip if the directory isn't writable
testDir := "/etc/crowdsec"
if _, err := os.Stat(testDir); os.IsNotExist(err) {
t.Skip("Skipping integration test: /etc/crowdsec does not exist")
}
// Check if writable by trying to create a temp file
testFile := filepath.Join(testDir, ".write-test")
if err := os.WriteFile(testFile, []byte("test"), 0o644); err != nil {
t.Skip("Skipping integration test: /etc/crowdsec is not writable")
}
os.Remove(testFile)
h := NewCrowdsecHandler(OpenTestDB(t), &fakeExec{}, "/bin/false", t.TempDir())
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
// Write new config
newContent := `# Test config
source: file
filenames:
- /var/log/test.log
labels:
type: test
`
body, _ := json.Marshal(map[string]string{"content": newContent})
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPut, "/api/v1/admin/crowdsec/acquisition", bytes.NewReader(body))
req.Header.Set("Content-Type", "application/json")
r.ServeHTTP(w, req)
require.Equal(t, http.StatusOK, w.Code)
var resp map[string]interface{}
require.NoError(t, json.Unmarshal(w.Body.Bytes(), &resp))
require.Equal(t, "updated", resp["status"])
require.True(t, resp["reload_hint"].(bool))
// Read back
w2 := httptest.NewRecorder()
req2 := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/acquisition", http.NoBody)
r.ServeHTTP(w2, req2)
require.Equal(t, http.StatusOK, w2.Code)
var readResp map[string]interface{}
require.NoError(t, json.Unmarshal(w2.Body.Bytes(), &readResp))
require.Equal(t, newContent, readResp["content"])
require.Equal(t, "/etc/crowdsec/acquis.yaml", readResp["path"])
}
// ============================================
// actorFromContext Tests
// ============================================
func TestActorFromContextWithUserID(t *testing.T) {
gin.SetMode(gin.TestMode)
w := httptest.NewRecorder()
c, _ := gin.CreateTestContext(w)
c.Set("userID", "user-123")
actor := actorFromContext(c)
require.Equal(t, "user:user-123", actor)
}
func TestActorFromContextWithNumericUserID(t *testing.T) {
gin.SetMode(gin.TestMode)
w := httptest.NewRecorder()
c, _ := gin.CreateTestContext(w)
c.Set("userID", 456)
actor := actorFromContext(c)
require.Equal(t, "user:456", actor)
}
func TestActorFromContextNoUser(t *testing.T) {
gin.SetMode(gin.TestMode)
w := httptest.NewRecorder()
c, _ := gin.CreateTestContext(w)
actor := actorFromContext(c)
require.Equal(t, "unknown", actor)
}
// ============================================
// ttlRemainingSeconds Tests
// ============================================
func TestTTLRemainingSeconds(t *testing.T) {
now := time.Date(2024, 1, 1, 12, 0, 0, 0, time.UTC)
retrieved := time.Date(2024, 1, 1, 11, 0, 0, 0, time.UTC) // 1 hour ago
cacheTTL := 2 * time.Hour
// Should have 1 hour remaining
remaining := ttlRemainingSeconds(now, retrieved, cacheTTL)
require.NotNil(t, remaining)
require.Equal(t, int64(3600), *remaining) // 1 hour in seconds
}
func TestTTLRemainingSecondsExpired(t *testing.T) {
now := time.Date(2024, 1, 1, 14, 0, 0, 0, time.UTC)
retrieved := time.Date(2024, 1, 1, 11, 0, 0, 0, time.UTC) // 3 hours ago
cacheTTL := 2 * time.Hour
// Should be expired (negative or zero)
remaining := ttlRemainingSeconds(now, retrieved, cacheTTL)
require.NotNil(t, remaining)
require.Equal(t, int64(0), *remaining)
}
func TestTTLRemainingSecondsZeroTime(t *testing.T) {
now := time.Date(2024, 1, 1, 12, 0, 0, 0, time.UTC)
var retrieved time.Time // zero time
cacheTTL := 2 * time.Hour
// With zero time, should return nil
remaining := ttlRemainingSeconds(now, retrieved, cacheTTL)
require.Nil(t, remaining)
}
func TestTTLRemainingSecondsZeroTTL(t *testing.T) {
now := time.Date(2024, 1, 1, 12, 0, 0, 0, time.UTC)
retrieved := time.Date(2024, 1, 1, 11, 0, 0, 0, time.UTC)
cacheTTL := time.Duration(0)
remaining := ttlRemainingSeconds(now, retrieved, cacheTTL)
require.Nil(t, remaining)
}
// ============================================
// Start() LAPI Readiness Tests
// ============================================
type slowExec struct {
lapiStartDelay time.Duration
started bool
lapiCallCount int
}
func (s *slowExec) Start(ctx context.Context, binPath, configDir string) (int, error) {
s.started = true
return 12345, nil
}
func (s *slowExec) Stop(ctx context.Context, configDir string) error {
s.started = false
return nil
}
func (s *slowExec) Status(ctx context.Context, configDir string) (running bool, pid int, err error) {
if s.started {
return true, 12345, nil
}
return false, 0, nil
}
type lapiCheckExecutor struct {
lapiDelayUntilReady time.Duration
lapiStartTime time.Time
callCount int
}
func (e *lapiCheckExecutor) Execute(ctx context.Context, name string, args ...string) ([]byte, error) {
e.callCount++
if name == "cscli" && len(args) > 0 && args[len(args)-2] == "lapi" && args[len(args)-1] == "status" {
// Check if enough time has passed since start
if time.Since(e.lapiStartTime) >= e.lapiDelayUntilReady {
return []byte("LAPI is running"), nil
}
return nil, errors.New("LAPI not ready yet")
}
return []byte("ok"), nil
}
func TestCrowdsecHandler_StartWaitsForLAPI(t *testing.T) {
gin.SetMode(gin.TestMode)
db := setupCrowdDB(t)
tmpDir := t.TempDir()
// Create executor that simulates 3-second LAPI startup delay
lapiExec := &lapiCheckExecutor{
lapiDelayUntilReady: 3 * time.Second,
lapiStartTime: time.Now(),
}
slowExec := &slowExec{}
h := NewCrowdsecHandler(db, slowExec, "/bin/false", tmpDir)
h.CmdExec = lapiExec
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
// Call Start() and measure time
start := time.Now()
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/start", http.NoBody)
r.ServeHTTP(w, req)
duration := time.Since(start)
// Verify it waited for LAPI (at least 3 seconds)
require.GreaterOrEqual(t, duration, 3*time.Second, "Start() should wait for LAPI")
require.Equal(t, http.StatusOK, w.Code)
var response map[string]interface{}
require.NoError(t, json.Unmarshal(w.Body.Bytes(), &response))
require.True(t, response["lapi_ready"].(bool), "lapi_ready should be true")
require.Equal(t, "started", response["status"])
require.NotNil(t, response["pid"])
// Verify LAPI was checked multiple times
require.Greater(t, lapiExec.callCount, 1, "LAPI should be polled multiple times")
}
func TestCrowdsecHandler_StartReturnsWarningIfLAPINotReady(t *testing.T) {
gin.SetMode(gin.TestMode)
db := setupCrowdDB(t)
tmpDir := t.TempDir()
// Create executor where LAPI never becomes ready
lapiExec := &lapiCheckExecutor{
lapiDelayUntilReady: 60 * time.Second, // Will never be ready within 30s timeout
lapiStartTime: time.Now(),
}
slowExec := &slowExec{}
h := NewCrowdsecHandler(db, slowExec, "/bin/false", tmpDir)
h.CmdExec = lapiExec
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
// Call Start()
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/start", http.NoBody)
r.ServeHTTP(w, req)
// Should still return 200 but with lapi_ready=false
require.Equal(t, http.StatusOK, w.Code)
var response map[string]interface{}
require.NoError(t, json.Unmarshal(w.Body.Bytes(), &response))
require.False(t, response["lapi_ready"].(bool), "lapi_ready should be false")
require.Equal(t, "started", response["status"])
require.Contains(t, response["warning"], "LAPI initialization")
}
func TestCrowdsecHandler_StartReturnsImmediatelyIfProcessFailsToStart(t *testing.T) {
gin.SetMode(gin.TestMode)
db := setupCrowdDB(t)
tmpDir := t.TempDir()
// Create executor that fails to start
failExec := &failingExec{}
h := NewCrowdsecHandler(db, failExec, "/bin/false", tmpDir)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/api/v1/admin/crowdsec/start", http.NoBody)
r.ServeHTTP(w, req)
// Should return 500 immediately without waiting for LAPI
require.Equal(t, http.StatusInternalServerError, w.Code)
}
// ============================================
// Status Handler lapi_ready Tests
// ============================================
func TestCrowdsecHandler_StatusReturnsLAPIReadyWhenRunning(t *testing.T) {
gin.SetMode(gin.TestMode)
db := setupCrowdDB(t)
tmpDir := t.TempDir()
// Create an executor that reports as running
runningExec := &fakeExec{started: true}
// Create a command executor that succeeds (LAPI is ready)
successCmdExec := &mockCmdExec{err: nil}
h := NewCrowdsecHandler(db, runningExec, "/bin/false", tmpDir)
h.CmdExec = successCmdExec
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/status", http.NoBody)
r.ServeHTTP(w, req)
require.Equal(t, http.StatusOK, w.Code)
var response map[string]interface{}
err := json.Unmarshal(w.Body.Bytes(), &response)
require.NoError(t, err)
require.Equal(t, true, response["running"])
require.Equal(t, float64(12345), response["pid"])
require.Equal(t, true, response["lapi_ready"], "lapi_ready should be true when cscli lapi status succeeds")
}
func TestCrowdsecHandler_StatusReturnsLAPINotReadyWhenCmdFails(t *testing.T) {
gin.SetMode(gin.TestMode)
db := setupCrowdDB(t)
tmpDir := t.TempDir()
// Create an executor that reports as running
runningExec := &fakeExec{started: true}
// Create a command executor that fails (LAPI not ready)
failCmdExec := &mockCmdExec{err: errors.New("LAPI not initialized")}
h := NewCrowdsecHandler(db, runningExec, "/bin/false", tmpDir)
h.CmdExec = failCmdExec
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/status", http.NoBody)
r.ServeHTTP(w, req)
require.Equal(t, http.StatusOK, w.Code)
var response map[string]interface{}
err := json.Unmarshal(w.Body.Bytes(), &response)
require.NoError(t, err)
require.Equal(t, true, response["running"])
require.Equal(t, float64(12345), response["pid"])
require.Equal(t, false, response["lapi_ready"], "lapi_ready should be false when cscli lapi status fails")
}
func TestCrowdsecHandler_StatusReturnsLAPINotReadyWhenStopped(t *testing.T) {
gin.SetMode(gin.TestMode)
db := setupCrowdDB(t)
tmpDir := t.TempDir()
// Create an executor that reports as stopped
stoppedExec := &fakeExec{started: false}
h := NewCrowdsecHandler(db, stoppedExec, "/bin/false", tmpDir)
r := gin.New()
g := r.Group("/api/v1")
h.RegisterRoutes(g)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/api/v1/admin/crowdsec/status", http.NoBody)
r.ServeHTTP(w, req)
require.Equal(t, http.StatusOK, w.Code)
var response map[string]interface{}
err := json.Unmarshal(w.Body.Bytes(), &response)
require.NoError(t, err)
require.Equal(t, false, response["running"])
require.Equal(t, float64(0), response["pid"])
require.Equal(t, false, response["lapi_ready"], "lapi_ready should be false when process is not running")
}
// mockCmdExec is a mock command executor for testing
type mockCmdExec struct {
err error
output []byte
}
func (m *mockCmdExec) Execute(ctx context.Context, name string, args ...string) ([]byte, error) {
return m.output, m.err
}
type failingExec struct{}
func (f *failingExec) Start(ctx context.Context, binPath, configDir string) (int, error) {
return 0, errors.New("failed to start process")
}
func (f *failingExec) Stop(ctx context.Context, configDir string) error { return nil }
func (f *failingExec) Status(ctx context.Context, configDir string) (bool, int, error) {
return false, 0, nil
}
// ============================================
// hubEndpoints Tests
// ============================================
func TestHubEndpointsNil(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(nil, &fakeExec{}, "/bin/false", t.TempDir())
h.Hub = nil
endpoints := h.hubEndpoints()
require.Nil(t, endpoints)
}
func TestHubEndpointsDeduplicates(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(nil, &fakeExec{}, "/bin/false", t.TempDir())
// Hub is created by NewCrowdsecHandler, modify its fields
if h.Hub != nil {
h.Hub.HubBaseURL = "https://hub.crowdsec.net"
h.Hub.MirrorBaseURL = "https://hub.crowdsec.net" // Same URL
}
endpoints := h.hubEndpoints()
require.Len(t, endpoints, 1)
require.Equal(t, "https://hub.crowdsec.net", endpoints[0])
}
func TestHubEndpointsMultiple(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(nil, &fakeExec{}, "/bin/false", t.TempDir())
if h.Hub != nil {
h.Hub.HubBaseURL = "https://hub.crowdsec.net"
h.Hub.MirrorBaseURL = "https://mirror.example.com"
}
endpoints := h.hubEndpoints()
require.Len(t, endpoints, 2)
require.Contains(t, endpoints, "https://hub.crowdsec.net")
require.Contains(t, endpoints, "https://mirror.example.com")
}
func TestHubEndpointsSkipsEmpty(t *testing.T) {
gin.SetMode(gin.TestMode)
h := NewCrowdsecHandler(nil, &fakeExec{}, "/bin/false", t.TempDir())
if h.Hub != nil {
h.Hub.HubBaseURL = "https://hub.crowdsec.net"
h.Hub.MirrorBaseURL = "" // Empty
}
endpoints := h.hubEndpoints()
require.Len(t, endpoints, 1)
require.Equal(t, "https://hub.crowdsec.net", endpoints[0])
}