mirror of
https://github.com/rcourtman/Pulse.git
synced 2026-02-18 00:17:39 +01:00
New test files with expanded coverage: API tests: - ai_handler_test.go: AI handler unit tests with mocking - agent_profiles_tools_test.go: Profile management tests - alerts_endpoints_test.go: Alert API endpoint tests - alerts_test.go: Updated for interface changes - audit_handlers_test.go: Audit handler tests - frontend_embed_test.go: Frontend embedding tests - metadata_handlers_test.go, metadata_provider_test.go: Metadata tests - notifications_test.go: Updated for interface changes - profile_suggestions_test.go: Profile suggestion tests - saml_service_test.go: SAML authentication tests - sensor_proxy_gate_test.go: Sensor proxy tests - updates_test.go: Updated for interface changes Agent tests: - dockeragent/signature_test.go: Docker agent signature tests - hostagent/agent_metrics_test.go: Host agent metrics tests - hostagent/commands_test.go: Command execution tests - hostagent/network_helpers_test.go: Network helper tests - hostagent/proxmox_setup_test.go: Updated setup tests - kubernetesagent/*_test.go: Kubernetes agent tests Core package tests: - monitoring/kubernetes_agents_test.go, reload_test.go - remoteconfig/client_test.go, signature_test.go - sensors/collector_test.go - updates/adapter_installsh_*_test.go: Install adapter tests - updates/manager_*_test.go: Update manager tests - websocket/hub_*_test.go: WebSocket hub tests Library tests: - pkg/audit/export_test.go: Audit export tests - pkg/metrics/store_test.go: Metrics store tests - pkg/proxmox/*_test.go: Proxmox client tests - pkg/reporting/reporting_test.go: Reporting tests - pkg/server/*_test.go: Server tests - pkg/tlsutil/extra_test.go: TLS utility tests Total: ~8000 lines of new test code
95 lines
2.4 KiB
Go
95 lines
2.4 KiB
Go
package audit
|
|
|
|
import (
|
|
"encoding/csv"
|
|
"encoding/json"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
)
|
|
|
|
func TestExporterExportAndSummary(t *testing.T) {
|
|
logger, err := NewSQLiteLogger(SQLiteLoggerConfig{DataDir: t.TempDir()})
|
|
if err != nil {
|
|
t.Fatalf("failed to create logger: %v", err)
|
|
}
|
|
defer logger.Close()
|
|
|
|
events := []Event{
|
|
{
|
|
ID: "e1",
|
|
Timestamp: time.Now().Add(-time.Minute),
|
|
EventType: "login",
|
|
User: "alice",
|
|
IP: "127.0.0.1",
|
|
Success: true,
|
|
Details: "ok",
|
|
},
|
|
{
|
|
ID: "e2",
|
|
Timestamp: time.Now(),
|
|
EventType: "config_change",
|
|
User: "",
|
|
IP: "127.0.0.2",
|
|
Success: false,
|
|
Details: "failed",
|
|
},
|
|
}
|
|
|
|
for _, event := range events {
|
|
if err := logger.Log(event); err != nil {
|
|
t.Fatalf("log event: %v", err)
|
|
}
|
|
}
|
|
|
|
exporter := NewExporter(logger)
|
|
result, err := exporter.Export(QueryFilter{}, ExportFormatCSV, true)
|
|
if err != nil {
|
|
t.Fatalf("export csv: %v", err)
|
|
}
|
|
if !strings.HasPrefix(result.Filename, "audit-log-") || !strings.HasSuffix(result.Filename, ".csv") {
|
|
t.Fatalf("unexpected filename: %s", result.Filename)
|
|
}
|
|
|
|
reader := csv.NewReader(strings.NewReader(string(result.Data)))
|
|
records, err := reader.ReadAll()
|
|
if err != nil {
|
|
t.Fatalf("read csv: %v", err)
|
|
}
|
|
if len(records) < 3 || records[0][0] != "ID" {
|
|
t.Fatalf("unexpected csv records: %+v", records)
|
|
}
|
|
|
|
jsonResult, err := exporter.Export(QueryFilter{}, ExportFormatJSON, false)
|
|
if err != nil {
|
|
t.Fatalf("export json: %v", err)
|
|
}
|
|
var parsed struct {
|
|
EventCount int `json:"event_count"`
|
|
Events []ExportEvent `json:"events"`
|
|
}
|
|
if err := json.Unmarshal(jsonResult.Data, &parsed); err != nil {
|
|
t.Fatalf("decode json export: %v", err)
|
|
}
|
|
if parsed.EventCount != 2 || len(parsed.Events) != 2 {
|
|
t.Fatalf("unexpected json export: %+v", parsed)
|
|
}
|
|
|
|
if _, err := exporter.Export(QueryFilter{}, "xml", false); err == nil {
|
|
t.Fatal("expected error for unsupported format")
|
|
}
|
|
|
|
// Tamper with signature to test verification in summary/export
|
|
if _, err := logger.db.Exec(`UPDATE audit_events SET signature = 'bad' WHERE id = ?`, "e2"); err != nil {
|
|
t.Fatalf("tamper signature: %v", err)
|
|
}
|
|
|
|
summary, err := exporter.GenerateSummary(QueryFilter{}, true)
|
|
if err != nil {
|
|
t.Fatalf("summary error: %v", err)
|
|
}
|
|
if summary.TotalEvents != 2 || summary.InvalidSigCount == 0 {
|
|
t.Fatalf("unexpected summary: %+v", summary)
|
|
}
|
|
}
|