Files
Charon/backend/internal/cerberus/cerberus_isenabled_test.go
T
2026-03-04 18:34:49 +00:00

127 lines
4.0 KiB
Go

package cerberus_test
import (
"fmt"
"testing"
"time"
"github.com/Wikid82/charon/backend/internal/cerberus"
"github.com/Wikid82/charon/backend/internal/config"
"github.com/Wikid82/charon/backend/internal/models"
"github.com/stretchr/testify/require"
"gorm.io/driver/sqlite"
"gorm.io/gorm"
)
func setupDBForTest(t *testing.T) *gorm.DB {
dsn := fmt.Sprintf("file:cerberus_isenabled_test_%d?mode=memory&cache=shared", time.Now().UnixNano())
db, err := gorm.Open(sqlite.Open(dsn), &gorm.Config{})
require.NoError(t, err)
require.NoError(t, db.AutoMigrate(&models.Setting{}, &models.SecurityConfig{}))
return db
}
func TestIsEnabled_ConfigTrue(t *testing.T) {
cfg := config.SecurityConfig{CerberusEnabled: true}
c := cerberus.New(cfg, nil)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_WAFModeEnabled(t *testing.T) {
cfg := config.SecurityConfig{WAFMode: "block"}
c := cerberus.New(cfg, nil)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_ACLModeEnabled(t *testing.T) {
cfg := config.SecurityConfig{ACLMode: "enabled"}
c := cerberus.New(cfg, nil)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_RateLimitModeEnabled(t *testing.T) {
cfg := config.SecurityConfig{RateLimitMode: "enabled"}
c := cerberus.New(cfg, nil)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_CrowdSecModeLocal(t *testing.T) {
cfg := config.SecurityConfig{CrowdSecMode: "local"}
c := cerberus.New(cfg, nil)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_DBSetting_FeatureFlag(t *testing.T) {
db := setupDBForTest(t)
// Test new feature flag key
s := models.Setting{Key: "feature.cerberus.enabled", Value: "true"}
require.NoError(t, db.Create(&s).Error)
cfg := config.SecurityConfig{}
c := cerberus.New(cfg, db)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_DBSetting_LegacyKey(t *testing.T) {
db := setupDBForTest(t)
// Test backward compatibility with legacy key
s := models.Setting{Key: "security.cerberus.enabled", Value: "true"}
require.NoError(t, db.Create(&s).Error)
cfg := config.SecurityConfig{}
c := cerberus.New(cfg, db)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_DBSetting_FeatureFlagTakesPrecedence(t *testing.T) {
db := setupDBForTest(t)
// Feature flag should take precedence over legacy key
require.NoError(t, db.Create(&models.Setting{Key: "feature.cerberus.enabled", Value: "false"}).Error)
require.NoError(t, db.Create(&models.Setting{Key: "security.cerberus.enabled", Value: "true"}).Error)
cfg := config.SecurityConfig{}
c := cerberus.New(cfg, db)
require.False(t, c.IsEnabled())
}
func TestIsEnabled_DBSettingCaseInsensitive(t *testing.T) {
db := setupDBForTest(t)
s := models.Setting{Key: "feature.cerberus.enabled", Value: "TrUe"}
require.NoError(t, db.Create(&s).Error)
cfg := config.SecurityConfig{}
c := cerberus.New(cfg, db)
require.True(t, c.IsEnabled())
}
func TestIsEnabled_DBSettingFalse(t *testing.T) {
db := setupDBForTest(t)
s := models.Setting{Key: "feature.cerberus.enabled", Value: "false"}
require.NoError(t, db.Create(&s).Error)
cfg := config.SecurityConfig{}
c := cerberus.New(cfg, db)
require.False(t, c.IsEnabled())
}
func TestIsEnabled_DefaultTrue(t *testing.T) {
cfg := config.SecurityConfig{}
c := cerberus.New(cfg, nil)
// Default to true per Optional Features spec
require.True(t, c.IsEnabled())
}
func TestIsEnabled_SecurityConfigDisabledOverridesConfig(t *testing.T) {
db := setupDBForTest(t)
require.NoError(t, db.Create(&models.SecurityConfig{Name: "default", UUID: "test", Enabled: false}).Error)
cfg := config.SecurityConfig{CerberusEnabled: true, ACLMode: "enabled"}
c := cerberus.New(cfg, db)
require.False(t, c.IsEnabled())
}
func TestIsEnabled_SecurityConfigDisabledOverridesFeatureFlag(t *testing.T) {
db := setupDBForTest(t)
require.NoError(t, db.Create(&models.SecurityConfig{Name: "default", UUID: "test", Enabled: false}).Error)
require.NoError(t, db.Create(&models.Setting{Key: "feature.cerberus.enabled", Value: "true"}).Error)
cfg := config.SecurityConfig{CerberusEnabled: true}
c := cerberus.New(cfg, db)
require.False(t, c.IsEnabled())
}