mirror of
https://github.com/rcourtman/Pulse.git
synced 2026-04-28 03:20:11 +00:00
New test files with expanded coverage: API tests: - ai_handler_test.go: AI handler unit tests with mocking - agent_profiles_tools_test.go: Profile management tests - alerts_endpoints_test.go: Alert API endpoint tests - alerts_test.go: Updated for interface changes - audit_handlers_test.go: Audit handler tests - frontend_embed_test.go: Frontend embedding tests - metadata_handlers_test.go, metadata_provider_test.go: Metadata tests - notifications_test.go: Updated for interface changes - profile_suggestions_test.go: Profile suggestion tests - saml_service_test.go: SAML authentication tests - sensor_proxy_gate_test.go: Sensor proxy tests - updates_test.go: Updated for interface changes Agent tests: - dockeragent/signature_test.go: Docker agent signature tests - hostagent/agent_metrics_test.go: Host agent metrics tests - hostagent/commands_test.go: Command execution tests - hostagent/network_helpers_test.go: Network helper tests - hostagent/proxmox_setup_test.go: Updated setup tests - kubernetesagent/*_test.go: Kubernetes agent tests Core package tests: - monitoring/kubernetes_agents_test.go, reload_test.go - remoteconfig/client_test.go, signature_test.go - sensors/collector_test.go - updates/adapter_installsh_*_test.go: Install adapter tests - updates/manager_*_test.go: Update manager tests - websocket/hub_*_test.go: WebSocket hub tests Library tests: - pkg/audit/export_test.go: Audit export tests - pkg/metrics/store_test.go: Metrics store tests - pkg/proxmox/*_test.go: Proxmox client tests - pkg/reporting/reporting_test.go: Reporting tests - pkg/server/*_test.go: Server tests - pkg/tlsutil/extra_test.go: TLS utility tests Total: ~8000 lines of new test code
180 lines
5.9 KiB
Go
180 lines
5.9 KiB
Go
package monitoring
|
|
|
|
import (
|
|
"crypto/sha256"
|
|
"encoding/hex"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/rcourtman/pulse-go-rewrite/internal/config"
|
|
"github.com/rcourtman/pulse-go-rewrite/internal/models"
|
|
agentsk8s "github.com/rcourtman/pulse-go-rewrite/pkg/agents/kubernetes"
|
|
)
|
|
|
|
func newKubernetesTestMonitor() *Monitor {
|
|
return &Monitor{
|
|
state: models.NewState(),
|
|
config: &config.Config{},
|
|
removedKubernetesClusters: make(map[string]time.Time),
|
|
kubernetesTokenBindings: make(map[string]string),
|
|
}
|
|
}
|
|
|
|
func TestNormalizeKubernetesClusterIdentifier(t *testing.T) {
|
|
report := agentsk8s.Report{
|
|
Cluster: agentsk8s.ClusterInfo{ID: "cluster-1"},
|
|
Agent: agentsk8s.AgentInfo{ID: "agent-1"},
|
|
}
|
|
if got := normalizeKubernetesClusterIdentifier(report); got != "cluster-1" {
|
|
t.Fatalf("unexpected identifier: %s", got)
|
|
}
|
|
|
|
report.Cluster.ID = ""
|
|
if got := normalizeKubernetesClusterIdentifier(report); got != "agent-1" {
|
|
t.Fatalf("unexpected identifier: %s", got)
|
|
}
|
|
|
|
report.Agent.ID = ""
|
|
report.Cluster.Server = "https://server"
|
|
report.Cluster.Context = "ctx"
|
|
report.Cluster.Name = "name"
|
|
stableKey := "https://server|ctx|name"
|
|
sum := sha256.Sum256([]byte(stableKey))
|
|
expected := hex.EncodeToString(sum[:])
|
|
if got := normalizeKubernetesClusterIdentifier(report); got != expected {
|
|
t.Fatalf("unexpected hashed identifier: %s", got)
|
|
}
|
|
|
|
report.Cluster.Server = ""
|
|
report.Cluster.Context = ""
|
|
report.Cluster.Name = ""
|
|
if got := normalizeKubernetesClusterIdentifier(report); got != "" {
|
|
t.Fatalf("expected empty identifier, got %s", got)
|
|
}
|
|
}
|
|
|
|
func TestApplyKubernetesReport(t *testing.T) {
|
|
monitor := newKubernetesTestMonitor()
|
|
report := agentsk8s.Report{
|
|
Agent: agentsk8s.AgentInfo{ID: "agent-1", IntervalSeconds: 10},
|
|
Cluster: agentsk8s.ClusterInfo{ID: "cluster-1", Name: "cluster"},
|
|
}
|
|
|
|
cluster, err := monitor.ApplyKubernetesReport(report, nil)
|
|
if err != nil {
|
|
t.Fatalf("unexpected error: %v", err)
|
|
}
|
|
if cluster.ID != "cluster-1" || cluster.DisplayName != "cluster" {
|
|
t.Fatalf("unexpected cluster: %+v", cluster)
|
|
}
|
|
if !monitor.state.ConnectionHealth[kubernetesConnectionPrefix+"cluster-1"] {
|
|
t.Fatal("expected connection health to be true")
|
|
}
|
|
|
|
monitor.removedKubernetesClusters["cluster-2"] = time.Now()
|
|
report.Cluster.ID = "cluster-2"
|
|
if _, err := monitor.ApplyKubernetesReport(report, nil); err == nil {
|
|
t.Fatal("expected error for removed cluster")
|
|
}
|
|
|
|
token := &config.APITokenRecord{ID: "token-1", Name: "Token"}
|
|
monitor.kubernetesTokenBindings["token-1"] = "other-agent"
|
|
report.Cluster.ID = "cluster-3"
|
|
report.Agent.ID = "agent-1"
|
|
if _, err := monitor.ApplyKubernetesReport(report, token); err == nil {
|
|
t.Fatal("expected error for token bound to different agent")
|
|
}
|
|
}
|
|
|
|
func TestRemoveAndReenrollKubernetesCluster(t *testing.T) {
|
|
monitor := newKubernetesTestMonitor()
|
|
monitor.kubernetesTokenBindings["token-1"] = "agent-1"
|
|
monitor.config.APITokens = []config.APITokenRecord{{ID: "token-1"}}
|
|
monitor.state.UpsertKubernetesCluster(models.KubernetesCluster{
|
|
ID: "cluster-1",
|
|
Name: "cluster",
|
|
DisplayName: "cluster",
|
|
TokenID: "token-1",
|
|
TokenName: "Token",
|
|
})
|
|
monitor.state.SetConnectionHealth(kubernetesConnectionPrefix+"cluster-1", true)
|
|
|
|
_, err := monitor.RemoveKubernetesCluster("cluster-1")
|
|
if err != nil {
|
|
t.Fatalf("unexpected error: %v", err)
|
|
}
|
|
if len(monitor.state.GetKubernetesClusters()) != 0 {
|
|
t.Fatal("expected cluster removed")
|
|
}
|
|
if _, exists := monitor.kubernetesTokenBindings["token-1"]; exists {
|
|
t.Fatal("expected token binding removed")
|
|
}
|
|
if _, exists := monitor.state.ConnectionHealth[kubernetesConnectionPrefix+"cluster-1"]; exists {
|
|
t.Fatal("expected connection health removed")
|
|
}
|
|
if len(monitor.state.GetRemovedKubernetesClusters()) != 1 {
|
|
t.Fatal("expected removed cluster entry")
|
|
}
|
|
|
|
if err := monitor.AllowKubernetesClusterReenroll("cluster-1"); err != nil {
|
|
t.Fatalf("unexpected reenroll error: %v", err)
|
|
}
|
|
if len(monitor.state.GetRemovedKubernetesClusters()) != 0 {
|
|
t.Fatal("expected removed entry cleared")
|
|
}
|
|
}
|
|
|
|
func TestKubernetesClusterUpdates(t *testing.T) {
|
|
monitor := newKubernetesTestMonitor()
|
|
monitor.state.UpsertKubernetesCluster(models.KubernetesCluster{
|
|
ID: "cluster-1",
|
|
Name: "cluster",
|
|
LastSeen: time.Now().Add(-10 * time.Second),
|
|
Status: "online",
|
|
IntervalSeconds: 5,
|
|
})
|
|
monitor.state.UpsertKubernetesCluster(models.KubernetesCluster{
|
|
ID: "cluster-2",
|
|
Name: "cluster2",
|
|
LastSeen: time.Now().Add(-10 * time.Hour),
|
|
Status: "online",
|
|
})
|
|
|
|
now := time.Now()
|
|
monitor.evaluateKubernetesAgents(now)
|
|
if monitor.state.ConnectionHealth[kubernetesConnectionPrefix+"cluster-1"] != true {
|
|
t.Fatal("expected cluster-1 healthy")
|
|
}
|
|
if monitor.state.ConnectionHealth[kubernetesConnectionPrefix+"cluster-2"] != false {
|
|
t.Fatal("expected cluster-2 unhealthy")
|
|
}
|
|
|
|
_, err := monitor.UnhideKubernetesCluster("cluster-1")
|
|
if err != nil {
|
|
t.Fatalf("unexpected unhide error: %v", err)
|
|
}
|
|
if _, err := monitor.MarkKubernetesClusterPendingUninstall("cluster-1"); err != nil {
|
|
t.Fatalf("unexpected pending uninstall error: %v", err)
|
|
}
|
|
if _, err := monitor.SetKubernetesClusterCustomDisplayName("cluster-1", "custom"); err != nil {
|
|
t.Fatalf("unexpected set display name error: %v", err)
|
|
}
|
|
}
|
|
|
|
func TestCleanupRemovedKubernetesClusters(t *testing.T) {
|
|
monitor := newKubernetesTestMonitor()
|
|
monitor.removedKubernetesClusters["cluster-1"] = time.Now().Add(-2 * removedKubernetesClustersTTL)
|
|
monitor.state.AddRemovedKubernetesCluster(models.RemovedKubernetesCluster{
|
|
ID: "cluster-1",
|
|
Name: "cluster",
|
|
RemovedAt: time.Now().Add(-2 * removedKubernetesClustersTTL),
|
|
})
|
|
|
|
monitor.cleanupRemovedKubernetesClusters(time.Now())
|
|
if len(monitor.removedKubernetesClusters) != 0 {
|
|
t.Fatal("expected removed clusters cleaned up")
|
|
}
|
|
if len(monitor.state.GetRemovedKubernetesClusters()) != 0 {
|
|
t.Fatal("expected state cleanup")
|
|
}
|
|
}
|