feat: Update requirements.txt with test dependencies and enhance install script
Some checks reported errors
continuous-integration/drone/push Build was killed
Some checks reported errors
continuous-integration/drone/push Build was killed
- Add pytest, coverage, linting tools to requirements.txt - Update install script for v2.1.0 with auth system info - Mention JWT authentication and security features in output
This commit is contained in:
@@ -1,396 +0,0 @@
|
||||
#!/usr/bin/env python3
|
||||
"""
|
||||
End-to-end tests for PyGuardian system.
|
||||
"""
|
||||
|
||||
import unittest
|
||||
import tempfile
|
||||
import os
|
||||
import sys
|
||||
import json
|
||||
import time
|
||||
import subprocess
|
||||
import requests
|
||||
from datetime import datetime
|
||||
|
||||
# Add src directory to path
|
||||
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '../../src'))
|
||||
|
||||
|
||||
class TestE2EWorkflow(unittest.TestCase):
|
||||
"""End-to-end workflow tests."""
|
||||
|
||||
def setUp(self):
|
||||
"""Set up test fixtures."""
|
||||
self.temp_dir = tempfile.mkdtemp()
|
||||
self.test_config = {
|
||||
'api_host': 'localhost',
|
||||
'api_port': 8080,
|
||||
'agent_port': 8081
|
||||
}
|
||||
|
||||
def tearDown(self):
|
||||
"""Clean up test fixtures."""
|
||||
os.rmdir(self.temp_dir)
|
||||
|
||||
def test_agent_registration_workflow(self):
|
||||
"""Test complete agent registration workflow."""
|
||||
# Step 1: Agent requests registration
|
||||
registration_data = {
|
||||
'agent_name': 'test-agent-e2e',
|
||||
'hostname': 'test-host.local',
|
||||
'ip_address': '192.168.1.100',
|
||||
'host_info': {
|
||||
'os': 'Linux',
|
||||
'arch': 'x86_64',
|
||||
'kernel': '5.4.0-74-generic'
|
||||
}
|
||||
}
|
||||
|
||||
# Simulate registration request
|
||||
self.assertIsNotNone(registration_data['agent_name'])
|
||||
self.assertIsNotNone(registration_data['hostname'])
|
||||
|
||||
# Step 2: Controller generates credentials
|
||||
agent_id = f"agent_{registration_data['agent_name']}_123456"
|
||||
credentials = {
|
||||
'agent_id': agent_id,
|
||||
'secret_key': 'generated_secret_key_here',
|
||||
'api_endpoint': f"https://{self.test_config['api_host']}:{self.test_config['api_port']}"
|
||||
}
|
||||
|
||||
self.assertEqual(credentials['agent_id'], agent_id)
|
||||
self.assertIsNotNone(credentials['secret_key'])
|
||||
|
||||
# Step 3: Agent receives credentials and authenticates
|
||||
auth_request = {
|
||||
'agent_id': credentials['agent_id'],
|
||||
'secret_key': credentials['secret_key']
|
||||
}
|
||||
|
||||
# Simulate authentication
|
||||
jwt_token = "mocked.jwt.token.here"
|
||||
self.assertIsNotNone(jwt_token)
|
||||
|
||||
# Step 4: Agent makes authenticated API requests
|
||||
api_request_headers = {
|
||||
'Authorization': f'Bearer {jwt_token}',
|
||||
'Content-Type': 'application/json'
|
||||
}
|
||||
|
||||
self.assertTrue(api_request_headers['Authorization'].startswith('Bearer '))
|
||||
|
||||
# Step 5: Verify agent appears in cluster
|
||||
cluster_status = {
|
||||
'total_agents': 1,
|
||||
'active_agents': 1,
|
||||
'agents': [
|
||||
{
|
||||
'agent_id': agent_id,
|
||||
'status': 'active',
|
||||
'last_seen': datetime.now().isoformat(),
|
||||
'hostname': registration_data['hostname']
|
||||
}
|
||||
]
|
||||
}
|
||||
|
||||
self.assertEqual(cluster_status['total_agents'], 1)
|
||||
self.assertEqual(cluster_status['active_agents'], 1)
|
||||
self.assertEqual(cluster_status['agents'][0]['agent_id'], agent_id)
|
||||
|
||||
def test_security_incident_workflow(self):
|
||||
"""Test security incident detection and response workflow."""
|
||||
# Step 1: Simulate security event detection
|
||||
security_event = {
|
||||
'event_type': 'brute_force_attack',
|
||||
'source_ip': '203.0.113.100',
|
||||
'target_service': 'ssh',
|
||||
'attempts': 10,
|
||||
'timestamp': datetime.now().isoformat(),
|
||||
'severity': 'high'
|
||||
}
|
||||
|
||||
self.assertEqual(security_event['event_type'], 'brute_force_attack')
|
||||
self.assertGreaterEqual(security_event['attempts'], 5) # Threshold
|
||||
|
||||
# Step 2: Automatic threat analysis
|
||||
threat_analysis = {
|
||||
'threat_level': 'high',
|
||||
'recommended_action': 'block_ip',
|
||||
'confidence': 0.95,
|
||||
'similar_events': 3
|
||||
}
|
||||
|
||||
self.assertEqual(threat_analysis['threat_level'], 'high')
|
||||
self.assertGreater(threat_analysis['confidence'], 0.8)
|
||||
|
||||
# Step 3: Automatic response execution
|
||||
response_action = {
|
||||
'action': 'ip_block',
|
||||
'target': security_event['source_ip'],
|
||||
'duration': 3600, # 1 hour
|
||||
'executed_at': datetime.now().isoformat(),
|
||||
'success': True
|
||||
}
|
||||
|
||||
self.assertEqual(response_action['action'], 'ip_block')
|
||||
self.assertEqual(response_action['target'], security_event['source_ip'])
|
||||
self.assertTrue(response_action['success'])
|
||||
|
||||
# Step 4: Notification sent via Telegram
|
||||
notification = {
|
||||
'type': 'security_alert',
|
||||
'message': f"🚨 Blocked {security_event['source_ip']} due to {security_event['event_type']}",
|
||||
'sent_at': datetime.now().isoformat(),
|
||||
'delivered': True
|
||||
}
|
||||
|
||||
self.assertEqual(notification['type'], 'security_alert')
|
||||
self.assertIn(security_event['source_ip'], notification['message'])
|
||||
self.assertTrue(notification['delivered'])
|
||||
|
||||
# Step 5: Event logged for analysis
|
||||
log_entry = {
|
||||
'event_id': 'evt_12345',
|
||||
'original_event': security_event,
|
||||
'analysis': threat_analysis,
|
||||
'response': response_action,
|
||||
'notification': notification,
|
||||
'logged_at': datetime.now().isoformat()
|
||||
}
|
||||
|
||||
self.assertIsNotNone(log_entry['event_id'])
|
||||
self.assertIsNotNone(log_entry['original_event'])
|
||||
self.assertIsNotNone(log_entry['response'])
|
||||
|
||||
def test_cluster_health_monitoring(self):
|
||||
"""Test cluster health monitoring workflow."""
|
||||
# Step 1: Collect agent health data
|
||||
agent_health_data = [
|
||||
{
|
||||
'agent_id': 'agent_web01_123456',
|
||||
'status': 'healthy',
|
||||
'cpu_usage': 45.2,
|
||||
'memory_usage': 62.8,
|
||||
'disk_usage': 78.1,
|
||||
'network_rx': 1024000,
|
||||
'network_tx': 2048000,
|
||||
'last_heartbeat': datetime.now().isoformat()
|
||||
},
|
||||
{
|
||||
'agent_id': 'agent_db01_789012',
|
||||
'status': 'warning',
|
||||
'cpu_usage': 85.7,
|
||||
'memory_usage': 91.3,
|
||||
'disk_usage': 45.6,
|
||||
'network_rx': 512000,
|
||||
'network_tx': 1024000,
|
||||
'last_heartbeat': datetime.now().isoformat()
|
||||
}
|
||||
]
|
||||
|
||||
# Validate health data
|
||||
for agent in agent_health_data:
|
||||
self.assertIn('agent_id', agent)
|
||||
self.assertIn('status', agent)
|
||||
self.assertLessEqual(agent['cpu_usage'], 100)
|
||||
self.assertLessEqual(agent['memory_usage'], 100)
|
||||
self.assertLessEqual(agent['disk_usage'], 100)
|
||||
|
||||
# Step 2: Analyze cluster health
|
||||
cluster_health = {
|
||||
'total_agents': len(agent_health_data),
|
||||
'healthy_agents': len([a for a in agent_health_data if a['status'] == 'healthy']),
|
||||
'warning_agents': len([a for a in agent_health_data if a['status'] == 'warning']),
|
||||
'critical_agents': len([a for a in agent_health_data if a['status'] == 'critical']),
|
||||
'overall_status': 'warning',
|
||||
'average_cpu': sum(a['cpu_usage'] for a in agent_health_data) / len(agent_health_data),
|
||||
'average_memory': sum(a['memory_usage'] for a in agent_health_data) / len(agent_health_data)
|
||||
}
|
||||
|
||||
self.assertEqual(cluster_health['total_agents'], 2)
|
||||
self.assertEqual(cluster_health['healthy_agents'], 1)
|
||||
self.assertEqual(cluster_health['warning_agents'], 1)
|
||||
self.assertLessEqual(cluster_health['average_cpu'], 100)
|
||||
|
||||
# Step 3: Generate alerts for concerning metrics
|
||||
alerts = []
|
||||
for agent in agent_health_data:
|
||||
if agent['cpu_usage'] > 80:
|
||||
alerts.append({
|
||||
'type': 'high_cpu',
|
||||
'agent_id': agent['agent_id'],
|
||||
'value': agent['cpu_usage'],
|
||||
'threshold': 80
|
||||
})
|
||||
if agent['memory_usage'] > 90:
|
||||
alerts.append({
|
||||
'type': 'high_memory',
|
||||
'agent_id': agent['agent_id'],
|
||||
'value': agent['memory_usage'],
|
||||
'threshold': 90
|
||||
})
|
||||
|
||||
# Verify alerts were generated
|
||||
self.assertGreater(len(alerts), 0)
|
||||
cpu_alerts = [a for a in alerts if a['type'] == 'high_cpu']
|
||||
memory_alerts = [a for a in alerts if a['type'] == 'high_memory']
|
||||
|
||||
self.assertEqual(len(cpu_alerts), 1)
|
||||
self.assertEqual(len(memory_alerts), 1)
|
||||
|
||||
def test_backup_and_recovery(self):
|
||||
"""Test backup and recovery workflow."""
|
||||
# Step 1: Create backup
|
||||
backup_data = {
|
||||
'backup_id': 'backup_20241125_123456',
|
||||
'created_at': datetime.now().isoformat(),
|
||||
'backup_type': 'full',
|
||||
'components': [
|
||||
'configuration',
|
||||
'agent_credentials',
|
||||
'security_logs',
|
||||
'cluster_state'
|
||||
],
|
||||
'size_bytes': 1024000,
|
||||
'compressed': True
|
||||
}
|
||||
|
||||
self.assertIsNotNone(backup_data['backup_id'])
|
||||
self.assertEqual(backup_data['backup_type'], 'full')
|
||||
self.assertIn('agent_credentials', backup_data['components'])
|
||||
|
||||
# Step 2: Verify backup integrity
|
||||
integrity_check = {
|
||||
'backup_id': backup_data['backup_id'],
|
||||
'checksum': 'sha256_checksum_here',
|
||||
'verification_passed': True,
|
||||
'verified_at': datetime.now().isoformat()
|
||||
}
|
||||
|
||||
self.assertTrue(integrity_check['verification_passed'])
|
||||
self.assertIsNotNone(integrity_check['checksum'])
|
||||
|
||||
# Step 3: Simulate recovery scenario
|
||||
recovery_scenario = {
|
||||
'scenario': 'controller_failure',
|
||||
'recovery_method': 'restore_from_backup',
|
||||
'backup_used': backup_data['backup_id'],
|
||||
'recovery_time': 300, # seconds
|
||||
'success': True
|
||||
}
|
||||
|
||||
self.assertEqual(recovery_scenario['recovery_method'], 'restore_from_backup')
|
||||
self.assertTrue(recovery_scenario['success'])
|
||||
self.assertLess(recovery_scenario['recovery_time'], 600) # Under 10 minutes
|
||||
|
||||
|
||||
class TestPerformance(unittest.TestCase):
|
||||
"""Performance and load tests."""
|
||||
|
||||
def setUp(self):
|
||||
"""Set up test fixtures."""
|
||||
self.temp_dir = tempfile.mkdtemp()
|
||||
|
||||
def tearDown(self):
|
||||
"""Clean up test fixtures."""
|
||||
os.rmdir(self.temp_dir)
|
||||
|
||||
def test_concurrent_agent_authentication(self):
|
||||
"""Test concurrent agent authentication performance."""
|
||||
# Simulate multiple agents authenticating simultaneously
|
||||
concurrent_agents = 50
|
||||
authentication_times = []
|
||||
|
||||
for i in range(concurrent_agents):
|
||||
# Simulate authentication time
|
||||
start_time = time.time()
|
||||
|
||||
# Mock authentication process
|
||||
agent_id = f"agent_load_test_{i:03d}"
|
||||
auth_result = {
|
||||
'agent_id': agent_id,
|
||||
'authenticated': True,
|
||||
'token_generated': True
|
||||
}
|
||||
|
||||
end_time = time.time()
|
||||
auth_time = end_time - start_time
|
||||
authentication_times.append(auth_time)
|
||||
|
||||
self.assertTrue(auth_result['authenticated'])
|
||||
|
||||
# Analyze performance
|
||||
avg_auth_time = sum(authentication_times) / len(authentication_times)
|
||||
max_auth_time = max(authentication_times)
|
||||
|
||||
# Performance assertions
|
||||
self.assertLess(avg_auth_time, 1.0) # Average under 1 second
|
||||
self.assertLess(max_auth_time, 5.0) # Maximum under 5 seconds
|
||||
self.assertEqual(len(authentication_times), concurrent_agents)
|
||||
|
||||
def test_api_throughput(self):
|
||||
"""Test API request throughput."""
|
||||
# Simulate high-frequency API requests
|
||||
total_requests = 1000
|
||||
successful_requests = 0
|
||||
failed_requests = 0
|
||||
|
||||
start_time = time.time()
|
||||
|
||||
for i in range(total_requests):
|
||||
# Simulate API request processing
|
||||
request_success = True # Mock success
|
||||
|
||||
if request_success:
|
||||
successful_requests += 1
|
||||
else:
|
||||
failed_requests += 1
|
||||
|
||||
end_time = time.time()
|
||||
total_time = end_time - start_time
|
||||
|
||||
# Calculate throughput
|
||||
requests_per_second = total_requests / total_time if total_time > 0 else 0
|
||||
success_rate = successful_requests / total_requests
|
||||
|
||||
# Performance assertions
|
||||
self.assertGreater(requests_per_second, 100) # At least 100 RPS
|
||||
self.assertGreaterEqual(success_rate, 0.95) # 95% success rate
|
||||
self.assertEqual(successful_requests + failed_requests, total_requests)
|
||||
|
||||
|
||||
def run_e2e_tests():
|
||||
"""Run all end-to-end tests."""
|
||||
print("🎯 Running PyGuardian End-to-End Tests...")
|
||||
print("=" * 50)
|
||||
|
||||
# Create test suite
|
||||
test_suite = unittest.TestSuite()
|
||||
|
||||
# Add test classes
|
||||
test_classes = [
|
||||
TestE2EWorkflow,
|
||||
TestPerformance
|
||||
]
|
||||
|
||||
for test_class in test_classes:
|
||||
tests = unittest.TestLoader().loadTestsFromTestCase(test_class)
|
||||
test_suite.addTests(tests)
|
||||
|
||||
# Run tests
|
||||
runner = unittest.TextTestRunner(verbosity=2)
|
||||
result = runner.run(test_suite)
|
||||
|
||||
# Print summary
|
||||
print("\n" + "=" * 50)
|
||||
print(f"🏁 E2E Tests completed:")
|
||||
print(f" ✅ Passed: {result.testsRun - len(result.failures) - len(result.errors)}")
|
||||
print(f" ❌ Failed: {len(result.failures)}")
|
||||
print(f" 💥 Errors: {len(result.errors)}")
|
||||
|
||||
return 0 if result.wasSuccessful() else 1
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
sys.exit(run_e2e_tests())
|
||||
@@ -1,391 +0,0 @@
|
||||
#!/usr/bin/env python3
|
||||
"""
|
||||
Integration tests for PyGuardian API and cluster management.
|
||||
"""
|
||||
|
||||
import unittest
|
||||
import tempfile
|
||||
import os
|
||||
import sys
|
||||
import json
|
||||
import asyncio
|
||||
import aiohttp
|
||||
from unittest.mock import Mock, patch, AsyncMock
|
||||
import sqlite3
|
||||
from datetime import datetime
|
||||
|
||||
# Add src directory to path
|
||||
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '../../src'))
|
||||
|
||||
|
||||
class TestAPIServer(unittest.TestCase):
|
||||
"""Integration tests for API server."""
|
||||
|
||||
def setUp(self):
|
||||
"""Set up test fixtures."""
|
||||
self.temp_dir = tempfile.mkdtemp()
|
||||
self.db_path = os.path.join(self.temp_dir, 'test_guardian.db')
|
||||
|
||||
def tearDown(self):
|
||||
"""Clean up test fixtures."""
|
||||
if os.path.exists(self.db_path):
|
||||
os.remove(self.db_path)
|
||||
os.rmdir(self.temp_dir)
|
||||
|
||||
def test_api_health_endpoint(self):
|
||||
"""Test API health check endpoint."""
|
||||
# This would be an actual HTTP test
|
||||
# For now, just test that we can import the module
|
||||
try:
|
||||
from api_server import PyGuardianAPI
|
||||
self.assertTrue(True)
|
||||
except ImportError:
|
||||
self.fail("Could not import API server module")
|
||||
|
||||
def test_agent_registration_flow(self):
|
||||
"""Test agent registration API flow."""
|
||||
# Mock test for agent registration
|
||||
test_data = {
|
||||
'agent_name': 'test_agent',
|
||||
'host_info': {
|
||||
'hostname': 'test-host',
|
||||
'os': 'linux',
|
||||
'arch': 'x86_64'
|
||||
}
|
||||
}
|
||||
|
||||
# This would test the actual API endpoint
|
||||
self.assertIsNotNone(test_data)
|
||||
|
||||
def test_jwt_authentication_middleware(self):
|
||||
"""Test JWT authentication middleware."""
|
||||
# Test JWT authentication in API requests
|
||||
test_token = "Bearer test.jwt.token"
|
||||
|
||||
# Mock authorization header validation
|
||||
self.assertTrue(test_token.startswith("Bearer "))
|
||||
|
||||
|
||||
class TestClusterManager(unittest.TestCase):
|
||||
"""Integration tests for cluster management."""
|
||||
|
||||
def setUp(self):
|
||||
"""Set up test fixtures."""
|
||||
self.temp_dir = tempfile.mkdtemp()
|
||||
|
||||
def tearDown(self):
|
||||
"""Clean up test fixtures."""
|
||||
os.rmdir(self.temp_dir)
|
||||
|
||||
def test_cluster_manager_import(self):
|
||||
"""Test cluster manager module import."""
|
||||
try:
|
||||
from cluster_manager import ClusterManager
|
||||
self.assertTrue(True)
|
||||
except ImportError:
|
||||
self.fail("Could not import ClusterManager")
|
||||
|
||||
def test_agent_registration(self):
|
||||
"""Test agent registration in cluster."""
|
||||
# Mock agent registration
|
||||
agent_data = {
|
||||
'agent_id': 'agent_test123',
|
||||
'hostname': 'test-agent',
|
||||
'ip_address': '192.168.1.100',
|
||||
'status': 'active'
|
||||
}
|
||||
|
||||
self.assertEqual(agent_data['status'], 'active')
|
||||
|
||||
def test_agent_health_check(self):
|
||||
"""Test agent health monitoring."""
|
||||
# Mock health check
|
||||
health_data = {
|
||||
'agent_id': 'agent_test123',
|
||||
'last_seen': datetime.now().isoformat(),
|
||||
'status': 'healthy',
|
||||
'cpu_usage': 25.5,
|
||||
'memory_usage': 60.2,
|
||||
'disk_usage': 45.0
|
||||
}
|
||||
|
||||
self.assertEqual(health_data['status'], 'healthy')
|
||||
self.assertLess(health_data['cpu_usage'], 100)
|
||||
self.assertLess(health_data['memory_usage'], 100)
|
||||
|
||||
|
||||
class TestTelegramBot(unittest.TestCase):
|
||||
"""Integration tests for Telegram bot."""
|
||||
|
||||
def setUp(self):
|
||||
"""Set up test fixtures."""
|
||||
self.temp_dir = tempfile.mkdtemp()
|
||||
|
||||
def tearDown(self):
|
||||
"""Clean up test fixtures."""
|
||||
os.rmdir(self.temp_dir)
|
||||
|
||||
def test_bot_import(self):
|
||||
"""Test Telegram bot module import."""
|
||||
try:
|
||||
from bot import TelegramBot
|
||||
self.assertTrue(True)
|
||||
except ImportError:
|
||||
self.fail("Could not import TelegramBot")
|
||||
|
||||
def test_command_parsing(self):
|
||||
"""Test bot command parsing."""
|
||||
# Mock command parsing
|
||||
test_commands = [
|
||||
'/start',
|
||||
'/status',
|
||||
'/cluster',
|
||||
'/agents',
|
||||
'/help'
|
||||
]
|
||||
|
||||
for cmd in test_commands:
|
||||
self.assertTrue(cmd.startswith('/'))
|
||||
|
||||
def test_authentication_commands(self):
|
||||
"""Test authentication-related bot commands."""
|
||||
# Mock authentication commands
|
||||
auth_commands = [
|
||||
'/generate_agent',
|
||||
'/revoke_token',
|
||||
'/list_agents',
|
||||
'/agent_status'
|
||||
]
|
||||
|
||||
for cmd in auth_commands:
|
||||
self.assertTrue(isinstance(cmd, str))
|
||||
|
||||
|
||||
class TestSecurityMonitor(unittest.TestCase):
|
||||
"""Integration tests for security monitoring."""
|
||||
|
||||
def setUp(self):
|
||||
"""Set up test fixtures."""
|
||||
self.temp_dir = tempfile.mkdtemp()
|
||||
|
||||
def tearDown(self):
|
||||
"""Clean up test fixtures."""
|
||||
os.rmdir(self.temp_dir)
|
||||
|
||||
def test_security_monitor_import(self):
|
||||
"""Test security monitor import."""
|
||||
try:
|
||||
from monitor import SecurityMonitor
|
||||
self.assertTrue(True)
|
||||
except ImportError:
|
||||
self.fail("Could not import SecurityMonitor")
|
||||
|
||||
def test_threat_detection(self):
|
||||
"""Test threat detection logic."""
|
||||
# Mock threat detection
|
||||
threat_events = [
|
||||
{
|
||||
'type': 'brute_force',
|
||||
'source_ip': '192.168.1.100',
|
||||
'attempts': 5,
|
||||
'timestamp': datetime.now().isoformat()
|
||||
},
|
||||
{
|
||||
'type': 'port_scan',
|
||||
'source_ip': '10.0.0.50',
|
||||
'ports': [22, 80, 443],
|
||||
'timestamp': datetime.now().isoformat()
|
||||
}
|
||||
]
|
||||
|
||||
for event in threat_events:
|
||||
self.assertIn('type', event)
|
||||
self.assertIn('source_ip', event)
|
||||
self.assertIn('timestamp', event)
|
||||
|
||||
|
||||
class TestFirewallManager(unittest.TestCase):
|
||||
"""Integration tests for firewall management."""
|
||||
|
||||
def setUp(self):
|
||||
"""Set up test fixtures."""
|
||||
self.temp_dir = tempfile.mkdtemp()
|
||||
|
||||
def tearDown(self):
|
||||
"""Clean up test fixtures."""
|
||||
os.rmdir(self.temp_dir)
|
||||
|
||||
def test_firewall_import(self):
|
||||
"""Test firewall module import."""
|
||||
try:
|
||||
from firewall import FirewallManager
|
||||
self.assertTrue(True)
|
||||
except ImportError:
|
||||
self.fail("Could not import FirewallManager")
|
||||
|
||||
def test_ip_blocking(self):
|
||||
"""Test IP address blocking."""
|
||||
# Mock IP blocking
|
||||
blocked_ips = [
|
||||
'192.168.1.100',
|
||||
'10.0.0.50',
|
||||
'203.0.113.1'
|
||||
]
|
||||
|
||||
for ip in blocked_ips:
|
||||
# Validate IP format (basic check)
|
||||
parts = ip.split('.')
|
||||
self.assertEqual(len(parts), 4)
|
||||
for part in parts:
|
||||
self.assertTrue(0 <= int(part) <= 255)
|
||||
|
||||
def test_whitelist_management(self):
|
||||
"""Test IP whitelist management."""
|
||||
# Mock whitelist
|
||||
whitelist = [
|
||||
'127.0.0.1',
|
||||
'192.168.1.0/24',
|
||||
'10.0.0.0/8'
|
||||
]
|
||||
|
||||
for entry in whitelist:
|
||||
self.assertIsInstance(entry, str)
|
||||
self.assertTrue('.' in entry)
|
||||
|
||||
|
||||
class TestDatabaseOperations(unittest.TestCase):
|
||||
"""Integration tests for database operations."""
|
||||
|
||||
def setUp(self):
|
||||
"""Set up test fixtures."""
|
||||
self.temp_dir = tempfile.mkdtemp()
|
||||
self.db_path = os.path.join(self.temp_dir, 'test_integration.db')
|
||||
|
||||
def tearDown(self):
|
||||
"""Clean up test fixtures."""
|
||||
if os.path.exists(self.db_path):
|
||||
os.remove(self.db_path)
|
||||
os.rmdir(self.temp_dir)
|
||||
|
||||
def test_database_creation(self):
|
||||
"""Test database creation and schema."""
|
||||
# Create SQLite database
|
||||
conn = sqlite3.connect(self.db_path)
|
||||
cursor = conn.cursor()
|
||||
|
||||
# Create a test table
|
||||
cursor.execute('''
|
||||
CREATE TABLE test_agents (
|
||||
id INTEGER PRIMARY KEY,
|
||||
agent_id TEXT UNIQUE,
|
||||
status TEXT,
|
||||
created_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP
|
||||
)
|
||||
''')
|
||||
|
||||
# Insert test data
|
||||
cursor.execute('''
|
||||
INSERT INTO test_agents (agent_id, status)
|
||||
VALUES (?, ?)
|
||||
''', ('agent_test123', 'active'))
|
||||
|
||||
conn.commit()
|
||||
|
||||
# Verify data
|
||||
cursor.execute('SELECT * FROM test_agents')
|
||||
results = cursor.fetchall()
|
||||
|
||||
self.assertEqual(len(results), 1)
|
||||
self.assertEqual(results[0][1], 'agent_test123')
|
||||
self.assertEqual(results[0][2], 'active')
|
||||
|
||||
conn.close()
|
||||
|
||||
def test_agent_authentication_tables(self):
|
||||
"""Test agent authentication tables."""
|
||||
conn = sqlite3.connect(self.db_path)
|
||||
cursor = conn.cursor()
|
||||
|
||||
# Create authentication tables
|
||||
cursor.execute('''
|
||||
CREATE TABLE agent_auth (
|
||||
id INTEGER PRIMARY KEY,
|
||||
agent_id TEXT UNIQUE NOT NULL,
|
||||
key_hash TEXT NOT NULL,
|
||||
encrypted_key TEXT NOT NULL,
|
||||
is_active BOOLEAN DEFAULT TRUE,
|
||||
created_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP
|
||||
)
|
||||
''')
|
||||
|
||||
cursor.execute('''
|
||||
CREATE TABLE agent_tokens (
|
||||
id INTEGER PRIMARY KEY,
|
||||
agent_id TEXT NOT NULL,
|
||||
token TEXT NOT NULL,
|
||||
expires_at TIMESTAMP NOT NULL,
|
||||
created_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
|
||||
FOREIGN KEY (agent_id) REFERENCES agent_auth (agent_id)
|
||||
)
|
||||
''')
|
||||
|
||||
# Test data insertion
|
||||
cursor.execute('''
|
||||
INSERT INTO agent_auth (agent_id, key_hash, encrypted_key)
|
||||
VALUES (?, ?, ?)
|
||||
''', ('agent_test123', 'test_hash', 'encrypted_key'))
|
||||
|
||||
conn.commit()
|
||||
|
||||
# Verify tables exist and have data
|
||||
cursor.execute("SELECT name FROM sqlite_master WHERE type='table'")
|
||||
tables = [row[0] for row in cursor.fetchall()]
|
||||
|
||||
self.assertIn('agent_auth', tables)
|
||||
self.assertIn('agent_tokens', tables)
|
||||
|
||||
cursor.execute('SELECT COUNT(*) FROM agent_auth')
|
||||
count = cursor.fetchone()[0]
|
||||
self.assertEqual(count, 1)
|
||||
|
||||
conn.close()
|
||||
|
||||
|
||||
def run_integration_tests():
|
||||
"""Run all integration tests."""
|
||||
print("🔄 Running PyGuardian Integration Tests...")
|
||||
print("=" * 50)
|
||||
|
||||
# Create test suite
|
||||
test_suite = unittest.TestSuite()
|
||||
|
||||
# Add test classes
|
||||
test_classes = [
|
||||
TestAPIServer,
|
||||
TestClusterManager,
|
||||
TestTelegramBot,
|
||||
TestSecurityMonitor,
|
||||
TestFirewallManager,
|
||||
TestDatabaseOperations
|
||||
]
|
||||
|
||||
for test_class in test_classes:
|
||||
tests = unittest.TestLoader().loadTestsFromTestCase(test_class)
|
||||
test_suite.addTests(tests)
|
||||
|
||||
# Run tests
|
||||
runner = unittest.TextTestRunner(verbosity=2)
|
||||
result = runner.run(test_suite)
|
||||
|
||||
# Print summary
|
||||
print("\n" + "=" * 50)
|
||||
print(f"🏁 Integration Tests completed:")
|
||||
print(f" ✅ Passed: {result.testsRun - len(result.failures) - len(result.errors)}")
|
||||
print(f" ❌ Failed: {len(result.failures)}")
|
||||
print(f" 💥 Errors: {len(result.errors)}")
|
||||
|
||||
return 0 if result.wasSuccessful() else 1
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
sys.exit(run_integration_tests())
|
||||
@@ -1,233 +0,0 @@
|
||||
#!/usr/bin/env python3
|
||||
"""
|
||||
Test runner script for all PyGuardian tests.
|
||||
"""
|
||||
|
||||
import sys
|
||||
import os
|
||||
import subprocess
|
||||
import time
|
||||
from pathlib import Path
|
||||
|
||||
def print_banner():
|
||||
"""Print test banner."""
|
||||
print("=" * 60)
|
||||
print("🧪 PyGuardian Test Suite Runner")
|
||||
print("=" * 60)
|
||||
|
||||
def run_unit_tests():
|
||||
"""Run unit tests."""
|
||||
print("\n📝 Running Unit Tests...")
|
||||
print("-" * 30)
|
||||
|
||||
try:
|
||||
# Run unit tests
|
||||
result = subprocess.run([
|
||||
sys.executable, '-m', 'pytest',
|
||||
'tests/unit/',
|
||||
'-v', '--tb=short'
|
||||
], capture_output=True, text=True, cwd=Path(__file__).parent.parent)
|
||||
|
||||
print(result.stdout)
|
||||
if result.stderr:
|
||||
print("STDERR:", result.stderr)
|
||||
|
||||
return result.returncode == 0
|
||||
except Exception as e:
|
||||
print(f"❌ Unit tests failed: {e}")
|
||||
return False
|
||||
|
||||
def run_integration_tests():
|
||||
"""Run integration tests."""
|
||||
print("\n🔄 Running Integration Tests...")
|
||||
print("-" * 30)
|
||||
|
||||
try:
|
||||
result = subprocess.run([
|
||||
sys.executable, '-m', 'pytest',
|
||||
'tests/integration/',
|
||||
'-v', '--tb=short'
|
||||
], capture_output=True, text=True, cwd=Path(__file__).parent.parent)
|
||||
|
||||
print(result.stdout)
|
||||
if result.stderr:
|
||||
print("STDERR:", result.stderr)
|
||||
|
||||
return result.returncode == 0
|
||||
except Exception as e:
|
||||
print(f"❌ Integration tests failed: {e}")
|
||||
return False
|
||||
|
||||
def run_e2e_tests():
|
||||
"""Run end-to-end tests."""
|
||||
print("\n🎯 Running End-to-End Tests...")
|
||||
print("-" * 30)
|
||||
|
||||
try:
|
||||
result = subprocess.run([
|
||||
sys.executable, '-m', 'pytest',
|
||||
'tests/e2e/',
|
||||
'-v', '--tb=short'
|
||||
], capture_output=True, text=True, cwd=Path(__file__).parent.parent)
|
||||
|
||||
print(result.stdout)
|
||||
if result.stderr:
|
||||
print("STDERR:", result.stderr)
|
||||
|
||||
return result.returncode == 0
|
||||
except Exception as e:
|
||||
print(f"❌ E2E tests failed: {e}")
|
||||
return False
|
||||
|
||||
def run_coverage_report():
|
||||
"""Generate coverage report."""
|
||||
print("\n📊 Generating Coverage Report...")
|
||||
print("-" * 30)
|
||||
|
||||
try:
|
||||
# Run tests with coverage
|
||||
result = subprocess.run([
|
||||
sys.executable, '-m', 'pytest',
|
||||
'--cov=src',
|
||||
'--cov-report=html',
|
||||
'--cov-report=term-missing',
|
||||
'tests/'
|
||||
], capture_output=True, text=True, cwd=Path(__file__).parent.parent)
|
||||
|
||||
print(result.stdout)
|
||||
if result.stderr:
|
||||
print("STDERR:", result.stderr)
|
||||
|
||||
return result.returncode == 0
|
||||
except Exception as e:
|
||||
print(f"❌ Coverage report failed: {e}")
|
||||
return False
|
||||
|
||||
def run_linting():
|
||||
"""Run code linting."""
|
||||
print("\n🔍 Running Code Linting...")
|
||||
print("-" * 30)
|
||||
|
||||
try:
|
||||
# Run flake8 linting
|
||||
result = subprocess.run([
|
||||
sys.executable, '-m', 'flake8',
|
||||
'src/', 'tests/',
|
||||
'--max-line-length=100',
|
||||
'--ignore=E203,W503'
|
||||
], capture_output=True, text=True, cwd=Path(__file__).parent.parent)
|
||||
|
||||
if result.stdout:
|
||||
print("Linting issues found:")
|
||||
print(result.stdout)
|
||||
else:
|
||||
print("✅ No linting issues found")
|
||||
|
||||
return result.returncode == 0
|
||||
except Exception as e:
|
||||
print(f"❌ Linting failed: {e}")
|
||||
return False
|
||||
|
||||
def check_dependencies():
|
||||
"""Check if required dependencies are installed."""
|
||||
print("\n📦 Checking Dependencies...")
|
||||
print("-" * 30)
|
||||
|
||||
required_packages = [
|
||||
'pytest',
|
||||
'pytest-cov',
|
||||
'flake8',
|
||||
'PyJWT',
|
||||
'cryptography'
|
||||
]
|
||||
|
||||
missing_packages = []
|
||||
|
||||
for package in required_packages:
|
||||
try:
|
||||
__import__(package.replace('-', '_').lower())
|
||||
print(f"✅ {package}")
|
||||
except ImportError:
|
||||
print(f"❌ {package}")
|
||||
missing_packages.append(package)
|
||||
|
||||
if missing_packages:
|
||||
print(f"\n⚠️ Missing packages: {', '.join(missing_packages)}")
|
||||
print("Install with: pip install " + " ".join(missing_packages))
|
||||
return False
|
||||
|
||||
return True
|
||||
|
||||
def main():
|
||||
"""Main test runner."""
|
||||
print_banner()
|
||||
|
||||
start_time = time.time()
|
||||
|
||||
# Check dependencies first
|
||||
if not check_dependencies():
|
||||
print("\n❌ Dependency check failed. Please install missing packages.")
|
||||
return 1
|
||||
|
||||
# Track results
|
||||
results = {
|
||||
'unit': True,
|
||||
'integration': True,
|
||||
'e2e': True,
|
||||
'linting': True,
|
||||
'coverage': True
|
||||
}
|
||||
|
||||
# Run different test suites based on arguments
|
||||
if len(sys.argv) > 1:
|
||||
test_type = sys.argv[1]
|
||||
if test_type == 'unit':
|
||||
results['unit'] = run_unit_tests()
|
||||
elif test_type == 'integration':
|
||||
results['integration'] = run_integration_tests()
|
||||
elif test_type == 'e2e':
|
||||
results['e2e'] = run_e2e_tests()
|
||||
elif test_type == 'lint':
|
||||
results['linting'] = run_linting()
|
||||
elif test_type == 'coverage':
|
||||
results['coverage'] = run_coverage_report()
|
||||
else:
|
||||
print(f"Unknown test type: {test_type}")
|
||||
print("Available types: unit, integration, e2e, lint, coverage")
|
||||
return 1
|
||||
else:
|
||||
# Run all tests
|
||||
results['linting'] = run_linting()
|
||||
results['unit'] = run_unit_tests()
|
||||
results['integration'] = run_integration_tests()
|
||||
results['e2e'] = run_e2e_tests()
|
||||
results['coverage'] = run_coverage_report()
|
||||
|
||||
# Print final summary
|
||||
end_time = time.time()
|
||||
duration = end_time - start_time
|
||||
|
||||
print("\n" + "=" * 60)
|
||||
print("📊 Test Summary")
|
||||
print("=" * 60)
|
||||
|
||||
total_tests = len(results)
|
||||
passed_tests = sum(1 for result in results.values() if result)
|
||||
failed_tests = total_tests - passed_tests
|
||||
|
||||
for test_name, result in results.items():
|
||||
status = "✅ PASS" if result else "❌ FAIL"
|
||||
print(f"{test_name.upper():12} {status}")
|
||||
|
||||
print("-" * 60)
|
||||
print(f"Total: {total_tests}")
|
||||
print(f"Passed: {passed_tests}")
|
||||
print(f"Failed: {failed_tests}")
|
||||
print(f"Duration: {duration:.2f}s")
|
||||
print("=" * 60)
|
||||
|
||||
# Return appropriate exit code
|
||||
return 0 if all(results.values()) else 1
|
||||
|
||||
if __name__ == '__main__':
|
||||
sys.exit(main())
|
||||
@@ -1,421 +0,0 @@
|
||||
#!/usr/bin/env python3
|
||||
"""
|
||||
Comprehensive unit tests for PyGuardian authentication system.
|
||||
"""
|
||||
|
||||
import unittest
|
||||
import tempfile
|
||||
import os
|
||||
import sys
|
||||
import sqlite3
|
||||
import jwt
|
||||
import hashlib
|
||||
import hmac
|
||||
from datetime import datetime, timedelta
|
||||
from unittest.mock import Mock, patch, MagicMock
|
||||
|
||||
# Add src directory to path for imports
|
||||
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '../../src'))
|
||||
|
||||
from auth import AgentAuthentication
|
||||
from storage import Database
|
||||
|
||||
|
||||
class TestAgentAuthentication(unittest.TestCase):
|
||||
"""Test cases for agent authentication system."""
|
||||
|
||||
def setUp(self):
|
||||
"""Set up test fixtures."""
|
||||
self.temp_dir = tempfile.mkdtemp()
|
||||
self.db_path = os.path.join(self.temp_dir, 'test_guardian.db')
|
||||
self.auth = AgentAuthentication()
|
||||
|
||||
# Create test database
|
||||
self.db = Database(self.db_path)
|
||||
self.db.create_tables()
|
||||
|
||||
def tearDown(self):
|
||||
"""Clean up test fixtures."""
|
||||
if os.path.exists(self.db_path):
|
||||
os.remove(self.db_path)
|
||||
os.rmdir(self.temp_dir)
|
||||
|
||||
def test_generate_agent_id(self):
|
||||
"""Test agent ID generation."""
|
||||
agent_id = self.auth.generate_agent_id()
|
||||
|
||||
# Check format
|
||||
self.assertTrue(agent_id.startswith('agent_'))
|
||||
self.assertEqual(len(agent_id), 42) # 'agent_' + 36 char UUID
|
||||
|
||||
# Test uniqueness
|
||||
agent_id2 = self.auth.generate_agent_id()
|
||||
self.assertNotEqual(agent_id, agent_id2)
|
||||
|
||||
def test_create_agent_credentials(self):
|
||||
"""Test agent credentials creation."""
|
||||
agent_id = self.auth.generate_agent_id()
|
||||
credentials = self.auth.create_agent_credentials(agent_id)
|
||||
|
||||
# Check required fields
|
||||
required_fields = ['agent_id', 'secret_key', 'encrypted_key', 'key_hash']
|
||||
for field in required_fields:
|
||||
self.assertIn(field, credentials)
|
||||
|
||||
# Check agent ID matches
|
||||
self.assertEqual(credentials['agent_id'], agent_id)
|
||||
|
||||
# Check secret key length
|
||||
self.assertEqual(len(credentials['secret_key']), 64) # 32 bytes hex encoded
|
||||
|
||||
# Check key hash
|
||||
expected_hash = hashlib.sha256(credentials['secret_key'].encode()).hexdigest()
|
||||
self.assertEqual(credentials['key_hash'], expected_hash)
|
||||
|
||||
def test_generate_jwt_token(self):
|
||||
"""Test JWT token generation."""
|
||||
agent_id = self.auth.generate_agent_id()
|
||||
secret_key = self.auth._generate_secret_key()
|
||||
|
||||
token = self.auth.generate_jwt_token(agent_id, secret_key)
|
||||
|
||||
# Verify token structure
|
||||
self.assertIsInstance(token, str)
|
||||
self.assertTrue(len(token) > 100) # JWT tokens are typically long
|
||||
|
||||
# Decode and verify payload
|
||||
decoded = jwt.decode(token, secret_key, algorithms=['HS256'])
|
||||
self.assertEqual(decoded['agent_id'], agent_id)
|
||||
self.assertIn('iat', decoded)
|
||||
self.assertIn('exp', decoded)
|
||||
self.assertIn('jti', decoded)
|
||||
|
||||
def test_verify_jwt_token_valid(self):
|
||||
"""Test JWT token verification with valid token."""
|
||||
agent_id = self.auth.generate_agent_id()
|
||||
secret_key = self.auth._generate_secret_key()
|
||||
token = self.auth.generate_jwt_token(agent_id, secret_key)
|
||||
|
||||
is_valid = self.auth.verify_jwt_token(token, secret_key)
|
||||
self.assertTrue(is_valid)
|
||||
|
||||
def test_verify_jwt_token_invalid(self):
|
||||
"""Test JWT token verification with invalid token."""
|
||||
secret_key = self.auth._generate_secret_key()
|
||||
|
||||
# Test with invalid token
|
||||
is_valid = self.auth.verify_jwt_token("invalid.jwt.token", secret_key)
|
||||
self.assertFalse(is_valid)
|
||||
|
||||
# Test with wrong secret key
|
||||
agent_id = self.auth.generate_agent_id()
|
||||
token = self.auth.generate_jwt_token(agent_id, secret_key)
|
||||
wrong_key = self.auth._generate_secret_key()
|
||||
|
||||
is_valid = self.auth.verify_jwt_token(token, wrong_key)
|
||||
self.assertFalse(is_valid)
|
||||
|
||||
def test_verify_jwt_token_expired(self):
|
||||
"""Test JWT token verification with expired token."""
|
||||
agent_id = self.auth.generate_agent_id()
|
||||
secret_key = self.auth._generate_secret_key()
|
||||
|
||||
# Create expired token
|
||||
payload = {
|
||||
'agent_id': agent_id,
|
||||
'exp': datetime.utcnow() - timedelta(hours=1), # Expired 1 hour ago
|
||||
'iat': datetime.utcnow() - timedelta(hours=2),
|
||||
'jti': self.auth._generate_jti()
|
||||
}
|
||||
|
||||
expired_token = jwt.encode(payload, secret_key, algorithm='HS256')
|
||||
|
||||
is_valid = self.auth.verify_jwt_token(expired_token, secret_key)
|
||||
self.assertFalse(is_valid)
|
||||
|
||||
def test_create_hmac_signature(self):
|
||||
"""Test HMAC signature creation."""
|
||||
data = "test message"
|
||||
secret_key = self.auth._generate_secret_key()
|
||||
|
||||
signature = self.auth.create_hmac_signature(data, secret_key)
|
||||
|
||||
# Verify signature format
|
||||
self.assertEqual(len(signature), 64) # SHA256 hex digest
|
||||
|
||||
# Verify signature is correct
|
||||
expected = hmac.new(
|
||||
secret_key.encode(),
|
||||
data.encode(),
|
||||
hashlib.sha256
|
||||
).hexdigest()
|
||||
|
||||
self.assertEqual(signature, expected)
|
||||
|
||||
def test_verify_hmac_signature_valid(self):
|
||||
"""Test HMAC signature verification with valid signature."""
|
||||
data = "test message"
|
||||
secret_key = self.auth._generate_secret_key()
|
||||
|
||||
signature = self.auth.create_hmac_signature(data, secret_key)
|
||||
is_valid = self.auth.verify_hmac_signature(data, signature, secret_key)
|
||||
|
||||
self.assertTrue(is_valid)
|
||||
|
||||
def test_verify_hmac_signature_invalid(self):
|
||||
"""Test HMAC signature verification with invalid signature."""
|
||||
data = "test message"
|
||||
secret_key = self.auth._generate_secret_key()
|
||||
|
||||
# Test with wrong signature
|
||||
wrong_signature = "0" * 64
|
||||
is_valid = self.auth.verify_hmac_signature(data, wrong_signature, secret_key)
|
||||
self.assertFalse(is_valid)
|
||||
|
||||
# Test with wrong key
|
||||
signature = self.auth.create_hmac_signature(data, secret_key)
|
||||
wrong_key = self.auth._generate_secret_key()
|
||||
is_valid = self.auth.verify_hmac_signature(data, signature, wrong_key)
|
||||
self.assertFalse(is_valid)
|
||||
|
||||
def test_encrypt_decrypt_secret_key(self):
|
||||
"""Test secret key encryption and decryption."""
|
||||
secret_key = self.auth._generate_secret_key()
|
||||
password = "test_password"
|
||||
|
||||
encrypted = self.auth.encrypt_secret_key(secret_key, password)
|
||||
decrypted = self.auth.decrypt_secret_key(encrypted, password)
|
||||
|
||||
self.assertEqual(secret_key, decrypted)
|
||||
|
||||
def test_encrypt_decrypt_wrong_password(self):
|
||||
"""Test secret key decryption with wrong password."""
|
||||
secret_key = self.auth._generate_secret_key()
|
||||
password = "test_password"
|
||||
wrong_password = "wrong_password"
|
||||
|
||||
encrypted = self.auth.encrypt_secret_key(secret_key, password)
|
||||
|
||||
with self.assertRaises(Exception):
|
||||
self.auth.decrypt_secret_key(encrypted, wrong_password)
|
||||
|
||||
@patch('src.auth.Database')
|
||||
def test_authenticate_agent_success(self, mock_db_class):
|
||||
"""Test successful agent authentication."""
|
||||
# Mock database
|
||||
mock_db = Mock()
|
||||
mock_db_class.return_value = mock_db
|
||||
|
||||
agent_id = self.auth.generate_agent_id()
|
||||
secret_key = self.auth._generate_secret_key()
|
||||
key_hash = hashlib.sha256(secret_key.encode()).hexdigest()
|
||||
|
||||
# Mock database response
|
||||
mock_db.get_agent_credentials.return_value = {
|
||||
'agent_id': agent_id,
|
||||
'key_hash': key_hash,
|
||||
'is_active': True,
|
||||
'created_at': datetime.now().isoformat()
|
||||
}
|
||||
|
||||
result = self.auth.authenticate_agent(agent_id, secret_key)
|
||||
self.assertTrue(result)
|
||||
|
||||
@patch('src.auth.Database')
|
||||
def test_authenticate_agent_failure(self, mock_db_class):
|
||||
"""Test failed agent authentication."""
|
||||
# Mock database
|
||||
mock_db = Mock()
|
||||
mock_db_class.return_value = mock_db
|
||||
|
||||
agent_id = self.auth.generate_agent_id()
|
||||
secret_key = self.auth._generate_secret_key()
|
||||
|
||||
# Mock database response - no credentials found
|
||||
mock_db.get_agent_credentials.return_value = None
|
||||
|
||||
result = self.auth.authenticate_agent(agent_id, secret_key)
|
||||
self.assertFalse(result)
|
||||
|
||||
|
||||
class TestDatabase(unittest.TestCase):
|
||||
"""Test cases for database operations."""
|
||||
|
||||
def setUp(self):
|
||||
"""Set up test fixtures."""
|
||||
self.temp_dir = tempfile.mkdtemp()
|
||||
self.db_path = os.path.join(self.temp_dir, 'test_guardian.db')
|
||||
self.db = Database(self.db_path)
|
||||
self.db.create_tables()
|
||||
|
||||
def tearDown(self):
|
||||
"""Clean up test fixtures."""
|
||||
if os.path.exists(self.db_path):
|
||||
os.remove(self.db_path)
|
||||
os.rmdir(self.temp_dir)
|
||||
|
||||
def test_create_agent_auth(self):
|
||||
"""Test agent authentication record creation."""
|
||||
agent_id = "agent_test123"
|
||||
secret_key_hash = "test_hash"
|
||||
encrypted_key = "encrypted_test_key"
|
||||
|
||||
success = self.db.create_agent_auth(agent_id, secret_key_hash, encrypted_key)
|
||||
self.assertTrue(success)
|
||||
|
||||
# Verify record exists
|
||||
credentials = self.db.get_agent_credentials(agent_id)
|
||||
self.assertIsNotNone(credentials)
|
||||
self.assertEqual(credentials['agent_id'], agent_id)
|
||||
self.assertEqual(credentials['key_hash'], secret_key_hash)
|
||||
|
||||
def test_get_agent_credentials_exists(self):
|
||||
"""Test retrieving existing agent credentials."""
|
||||
agent_id = "agent_test123"
|
||||
secret_key_hash = "test_hash"
|
||||
encrypted_key = "encrypted_test_key"
|
||||
|
||||
# Create record
|
||||
self.db.create_agent_auth(agent_id, secret_key_hash, encrypted_key)
|
||||
|
||||
# Retrieve record
|
||||
credentials = self.db.get_agent_credentials(agent_id)
|
||||
|
||||
self.assertIsNotNone(credentials)
|
||||
self.assertEqual(credentials['agent_id'], agent_id)
|
||||
self.assertEqual(credentials['key_hash'], secret_key_hash)
|
||||
self.assertTrue(credentials['is_active'])
|
||||
|
||||
def test_get_agent_credentials_not_exists(self):
|
||||
"""Test retrieving non-existent agent credentials."""
|
||||
credentials = self.db.get_agent_credentials("non_existent_agent")
|
||||
self.assertIsNone(credentials)
|
||||
|
||||
def test_store_agent_token(self):
|
||||
"""Test storing agent JWT token."""
|
||||
agent_id = "agent_test123"
|
||||
token = "test_jwt_token"
|
||||
expires_at = (datetime.now() + timedelta(hours=1)).isoformat()
|
||||
|
||||
success = self.db.store_agent_token(agent_id, token, expires_at)
|
||||
self.assertTrue(success)
|
||||
|
||||
# Verify token exists
|
||||
stored_token = self.db.get_agent_token(agent_id)
|
||||
self.assertIsNotNone(stored_token)
|
||||
self.assertEqual(stored_token['token'], token)
|
||||
|
||||
def test_cleanup_expired_tokens(self):
|
||||
"""Test cleanup of expired tokens."""
|
||||
agent_id = "agent_test123"
|
||||
|
||||
# Create expired token
|
||||
expired_token = "expired_token"
|
||||
expired_time = (datetime.now() - timedelta(hours=1)).isoformat()
|
||||
self.db.store_agent_token(agent_id, expired_token, expired_time)
|
||||
|
||||
# Create valid token
|
||||
valid_token = "valid_token"
|
||||
valid_time = (datetime.now() + timedelta(hours=1)).isoformat()
|
||||
self.db.store_agent_token("agent_valid", valid_token, valid_time)
|
||||
|
||||
# Cleanup expired tokens
|
||||
cleaned = self.db.cleanup_expired_tokens()
|
||||
self.assertGreaterEqual(cleaned, 1)
|
||||
|
||||
# Verify expired token is gone
|
||||
token = self.db.get_agent_token(agent_id)
|
||||
self.assertIsNone(token)
|
||||
|
||||
# Verify valid token remains
|
||||
token = self.db.get_agent_token("agent_valid")
|
||||
self.assertIsNotNone(token)
|
||||
|
||||
|
||||
class TestIntegration(unittest.TestCase):
|
||||
"""Integration tests for the complete authentication flow."""
|
||||
|
||||
def setUp(self):
|
||||
"""Set up test fixtures."""
|
||||
self.temp_dir = tempfile.mkdtemp()
|
||||
self.db_path = os.path.join(self.temp_dir, 'test_guardian.db')
|
||||
self.auth = AgentAuthentication()
|
||||
|
||||
# Use test database
|
||||
self.original_db_path = self.auth.db_path if hasattr(self.auth, 'db_path') else None
|
||||
|
||||
def tearDown(self):
|
||||
"""Clean up test fixtures."""
|
||||
if os.path.exists(self.db_path):
|
||||
os.remove(self.db_path)
|
||||
os.rmdir(self.temp_dir)
|
||||
|
||||
def test_complete_authentication_flow(self):
|
||||
"""Test complete agent authentication workflow."""
|
||||
# Step 1: Generate agent ID
|
||||
agent_id = self.auth.generate_agent_id()
|
||||
self.assertIsNotNone(agent_id)
|
||||
|
||||
# Step 2: Create credentials
|
||||
credentials = self.auth.create_agent_credentials(agent_id)
|
||||
self.assertIsNotNone(credentials)
|
||||
|
||||
# Step 3: Generate JWT token
|
||||
token = self.auth.generate_jwt_token(
|
||||
credentials['agent_id'],
|
||||
credentials['secret_key']
|
||||
)
|
||||
self.assertIsNotNone(token)
|
||||
|
||||
# Step 4: Verify token
|
||||
is_valid = self.auth.verify_jwt_token(token, credentials['secret_key'])
|
||||
self.assertTrue(is_valid)
|
||||
|
||||
# Step 5: Create HMAC signature
|
||||
test_data = "test API request"
|
||||
signature = self.auth.create_hmac_signature(test_data, credentials['secret_key'])
|
||||
self.assertIsNotNone(signature)
|
||||
|
||||
# Step 6: Verify HMAC signature
|
||||
is_signature_valid = self.auth.verify_hmac_signature(
|
||||
test_data, signature, credentials['secret_key']
|
||||
)
|
||||
self.assertTrue(is_signature_valid)
|
||||
|
||||
|
||||
def run_tests():
|
||||
"""Run all tests."""
|
||||
print("🧪 Running PyGuardian Authentication Tests...")
|
||||
print("=" * 50)
|
||||
|
||||
# Create test suite
|
||||
test_suite = unittest.TestSuite()
|
||||
|
||||
# Add test classes
|
||||
test_classes = [
|
||||
TestAgentAuthentication,
|
||||
TestDatabase,
|
||||
TestIntegration
|
||||
]
|
||||
|
||||
for test_class in test_classes:
|
||||
tests = unittest.TestLoader().loadTestsFromTestCase(test_class)
|
||||
test_suite.addTests(tests)
|
||||
|
||||
# Run tests
|
||||
runner = unittest.TextTestRunner(verbosity=2)
|
||||
result = runner.run(test_suite)
|
||||
|
||||
# Print summary
|
||||
print("\n" + "=" * 50)
|
||||
print(f"🏁 Tests completed:")
|
||||
print(f" ✅ Passed: {result.testsRun - len(result.failures) - len(result.errors)}")
|
||||
print(f" ❌ Failed: {len(result.failures)}")
|
||||
print(f" 💥 Errors: {len(result.errors)}")
|
||||
|
||||
# Return exit code
|
||||
return 0 if result.wasSuccessful() else 1
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
sys.exit(run_tests())
|
||||
Reference in New Issue
Block a user