Pulse/cmd/pulse-sensor-proxy/audit_test.go
rcourtman 524f42cc28 security: complete Phase 1 sensor proxy hardening
Implements comprehensive security hardening for pulse-sensor-proxy:
- Privilege drop from root to unprivileged user (UID 995)
- Hash-chained tamper-evident audit logging with remote forwarding
- Per-UID rate limiting (0.2 QPS, burst 2) with concurrency caps
- Enhanced command validation with 10+ attack pattern tests
- Fuzz testing (7M+ executions, 0 crashes)
- SSH hardening, AppArmor/seccomp profiles, operational runbooks

All 27 Phase 1 tasks complete. Ready for production deployment.
2025-10-20 15:13:37 +00:00

64 lines
1.7 KiB
Go

package main
import (
"bufio"
"encoding/json"
"os"
"testing"
)
type auditRecord map[string]interface{}
func TestAuditLogValidationFailure(t *testing.T) {
tmp, err := os.CreateTemp("", "audit-test-*.log")
if err != nil {
t.Fatalf("temp file: %v", err)
}
path := tmp.Name()
tmp.Close()
defer os.Remove(path)
logger, err := newAuditLogger(path)
if err != nil {
t.Fatalf("newAuditLogger: %v", err)
}
cred := &peerCredentials{uid: 1000, gid: 1000, pid: 4242}
logger.LogValidationFailure("corr-123", cred, "remote", "get_temperature", []string{"node"}, "invalid_node")
logger.Close()
file, err := os.Open(path)
if err != nil {
t.Fatalf("open log: %v", err)
}
defer file.Close()
scanner := bufio.NewScanner(file)
if !scanner.Scan() {
t.Fatalf("expected at least one audit entry")
}
var record auditRecord
if err := json.Unmarshal(scanner.Bytes(), &record); err != nil {
t.Fatalf("unmarshal: %v", err)
}
if record["event_type"] != "command.validation_failed" {
t.Fatalf("unexpected event_type: %v", record["event_type"])
}
if record["correlation_id"] != "corr-123" {
t.Fatalf("unexpected correlation id: %v", record["correlation_id"])
}
if record["command"] != "get_temperature" {
t.Fatalf("unexpected command: %v", record["command"])
}
if record["reason"] != "invalid_node" {
t.Fatalf("unexpected reason: %v", record["reason"])
}
if record["decision"] != "denied" {
t.Fatalf("unexpected decision: %v", record["decision"])
}
if record["event_hash"] == "" {
t.Fatalf("expected event_hash to be set")
}
}