Compare commits

..

3 Commits

Author SHA1 Message Date
46255bb1a2 Update CI to generate protobuf and Ent ORM files
Some checks failed
CI / Build (pull_request) Failing after 3s
CI / Format Check (pull_request) Failing after 1s
CI / Test (pull_request) Failing after 5s
CI / Lint (pull_request) Failing after 2s
- Add protoc installation step in all CI jobs (test, lint, build)
- Install protoc-gen-go and protoc-gen-go-grpc plugins
- Generate protobuf files using 'make generate-proto' before building/testing
- Generate Ent ORM files from ent/ directory before building/testing
- Ensures CI works correctly after removing generated files from git tracking
2025-11-06 22:26:54 +01:00
bbd4909fc8 Remove generated files from git tracking
Some checks failed
CI / Test (pull_request) Failing after 13s
CI / Lint (pull_request) Failing after 12s
CI / Build (pull_request) Failing after 3s
CI / Format Check (pull_request) Failing after 2s
- Add api/proto/generated/ to .gitignore (protobuf generated files)
- Add internal/ent/ and ent/ to .gitignore (Ent ORM generated files)
- Remove all generated files from git tracking
- Generated files can be regenerated with 'make generate-proto' and 'make generate-ent'
2025-11-06 22:15:08 +01:00
988adf6cc5 Fix gRPC health checks and add API Gateway Consul registration
Some checks failed
CI / Test (pull_request) Failing after 50s
CI / Lint (pull_request) Failing after 32s
CI / Build (pull_request) Successful in 17s
CI / Format Check (pull_request) Failing after 2s
- Fix gRPC health checks: Set serving status for default service (empty string) in all services
  - Consul checks the default service by default, not specific service names
  - All services now set both default and specific service status to SERVING

- Update Consul registration logic to automatically detect HTTP vs gRPC services
  - HTTP services (API Gateway) use HTTP health checks
  - gRPC services use gRPC health checks
  - Detection based on service tags and metadata

- Add API Gateway Consul registration
  - Register with Docker service name in Docker environment
  - Use HTTP health checks for API Gateway
  - Proper host/port configuration handling

- Add API Gateway HTTP-to-gRPC handlers
  - Implement service-specific handlers for Auth and Identity services
  - Translate HTTP requests to gRPC calls
  - Map gRPC error codes to HTTP status codes
2025-11-06 22:04:55 +01:00
31 changed files with 68 additions and 1894 deletions

View File

@@ -35,28 +35,19 @@ jobs:
- name: Install protoc and plugins
run: |
apk add --no-cache protobuf-dev protoc
apt-get update
apt-get install -y protobuf-compiler
go install google.golang.org/protobuf/cmd/protoc-gen-go@latest
go install google.golang.org/grpc/cmd/protoc-gen-go-grpc@latest
echo "$HOME/go/bin" >> $GITHUB_PATH
- name: Generate code
- name: Generate protobuf files
run: make generate-proto
- name: Generate Ent ORM files
run: |
make generate-proto
echo "Checking for Ent schema directory..."
if [ -d "ent/schema" ]; then
echo "Generating Ent code..."
go install entgo.io/ent/cmd/ent@latest
cd ent/schema && go run -mod=mod entgo.io/ent/cmd/ent generate .
echo "Copying Ent code to internal/ent..."
cd .. && mkdir -p ../internal/ent
cp -r *.go */ ../internal/ent/ 2>/dev/null || true
rm -f ../internal/ent/generate.go
rm -rf ../internal/ent/schema
echo "Verifying internal/ent/ent.go exists..."
ls -la ../internal/ent/ent.go || echo "ERROR: ent.go not found!"
else
echo "WARNING: ent/schema directory not found!"
go install entgo.io/ent/cmd/ent@latest
if [ -d "ent" ] && [ -f "ent/generate.go" ]; then
cd ent && go generate ./...
fi
- name: Check for test files
@@ -77,7 +68,7 @@ jobs:
if: steps.check-tests.outputs.tests_exist == 'true'
env:
CGO_ENABLED: 1
run: make test-coverage
run: go test -v -race -coverprofile=coverage.out -timeout=5m ./...
- name: Upload coverage
if: steps.check-tests.outputs.tests_exist == 'true'
@@ -88,7 +79,9 @@ jobs:
- name: Verify build (no tests)
if: steps.check-tests.outputs.tests_exist == 'false'
run: make build
run: |
echo "No tests found. Verifying code compiles instead..."
go build ./...
lint:
name: Lint
@@ -107,38 +100,26 @@ jobs:
- name: Install protoc and plugins
run: |
apk add --no-cache protobuf-dev protoc
apt-get update
apt-get install -y protobuf-compiler
go install google.golang.org/protobuf/cmd/protoc-gen-go@latest
go install google.golang.org/grpc/cmd/protoc-gen-go-grpc@latest
echo "$HOME/go/bin" >> $GITHUB_PATH
- name: Generate code
- name: Generate protobuf files
run: make generate-proto
- name: Generate Ent ORM files
run: |
make generate-proto
echo "Checking for Ent schema directory..."
if [ -d "ent/schema" ]; then
echo "Generating Ent code..."
go install entgo.io/ent/cmd/ent@latest
cd ent/schema && go run -mod=mod entgo.io/ent/cmd/ent generate .
echo "Copying Ent code to internal/ent..."
cd .. && mkdir -p ../internal/ent
cp -r *.go */ ../internal/ent/ 2>/dev/null || true
rm -f ../internal/ent/generate.go
rm -rf ../internal/ent/schema
echo "Verifying internal/ent/ent.go exists..."
ls -la ../internal/ent/ent.go || echo "ERROR: ent.go not found!"
else
echo "WARNING: ent/schema directory not found!"
go install entgo.io/ent/cmd/ent@latest
if [ -d "ent" ] && [ -f "ent/generate.go" ]; then
cd ent && go generate ./...
fi
- name: Install golangci-lint
run: |
curl -sSfL https://raw.githubusercontent.com/golangci/golangci-lint/master/install.sh | sh -s -- -b $(go env GOPATH)/bin
echo "$(go env GOPATH)/bin" >> $GITHUB_PATH
golangci-lint --version
- name: Run linters
run: make lint
- name: golangci-lint
uses: golangci/golangci-lint-action@v7
with:
version: latest
args: --timeout=5m
build:
name: Build
@@ -165,32 +146,25 @@ jobs:
- name: Install protoc and plugins
run: |
apk add --no-cache protobuf-dev protoc
apt-get update
apt-get install -y protobuf-compiler
go install google.golang.org/protobuf/cmd/protoc-gen-go@latest
go install google.golang.org/grpc/cmd/protoc-gen-go-grpc@latest
echo "$HOME/go/bin" >> $GITHUB_PATH
- name: Generate code
- name: Generate protobuf files
run: make generate-proto
- name: Generate Ent ORM files
run: |
make generate-proto
echo "Checking for Ent schema directory..."
if [ -d "ent/schema" ]; then
echo "Generating Ent code..."
go install entgo.io/ent/cmd/ent@latest
cd ent/schema && go run -mod=mod entgo.io/ent/cmd/ent generate .
echo "Copying Ent code to internal/ent..."
cd .. && mkdir -p ../internal/ent
cp -r *.go */ ../internal/ent/ 2>/dev/null || true
rm -f ../internal/ent/generate.go
rm -rf ../internal/ent/schema
echo "Verifying internal/ent/ent.go exists..."
ls -la ../internal/ent/ent.go || echo "ERROR: ent.go not found!"
else
echo "WARNING: ent/schema directory not found!"
go install entgo.io/ent/cmd/ent@latest
if [ -d "ent" ] && [ -f "ent/generate.go" ]; then
cd ent && go generate ./...
fi
- name: Build
run: make build
run: |
go build -v -o bin/platform ./cmd/platform
go build -v -o bin/api-gateway ./cmd/api-gateway
- name: Upload build artifacts
uses: actions/upload-artifact@v3
@@ -199,10 +173,6 @@ jobs:
path: |
bin/platform
bin/api-gateway
bin/auth-service
bin/identity-service
bin/authz-service
bin/audit-service
retention-days: 7
fmt:
@@ -218,4 +188,9 @@ jobs:
go-version: '1.25.3'
- name: Check formatting
run: make fmt-check
run: |
if [ "$(gofmt -s -l . | wc -l)" -gt 0 ]; then
echo "The following files need formatting:"
gofmt -s -d .
exit 1
fi

7
.gitignore vendored
View File

@@ -69,9 +69,6 @@ Thumbs.db
# Generated protobuf files
api/proto/generated/
# Generated Ent ORM files (but keep schema source files)
# Generated Ent ORM files
internal/ent/
ent/*.go
ent/*/
!ent/schema/
git.dcentral.systems/
ent/

View File

@@ -197,14 +197,10 @@ When working on this project, follow this workflow:
### 7. Commit Changes
- **ALWAYS commit** after successful implementation
- Verify that everything is in order before commit:
- there is a Gitea Runner image in ci/pre-commit
- run scripts/pre-commit-check.sh
- Ensure the code builds (`make build`)
- Ensure all tests pass (`make test`)
- Ensure there are no linter issues (`make lint`)
- Ensure there are no fmt issues (`make fmt-check`)
- If there are issues, fix them before comitting
- Ensure the code builds (`go build`)
- Ensure all tests pass (`go test`)
- Ensure there are no linter issues (`make lint`)
- Ensure there are no fmt issues (`make fmt-check`)
- Verify all acceptance criteria are met
- Write a clear, descriptive commit message

View File

@@ -18,7 +18,7 @@ help:
@echo " make lint - Run linters"
@echo " make fmt - Format code"
@echo " make fmt-check - Check code formatting"
@echo " make build - Build all service binaries"
@echo " make build - Build platform and api-gateway binaries"
@echo " make clean - Clean build artifacts"
@echo " make docker-build - Build Docker image"
@echo " make docker-run - Run Docker container"
@@ -85,14 +85,10 @@ fmt-check:
@echo "Code is properly formatted"
build:
@echo "Building all service binaries..."
@echo "Building platform and api-gateway binaries..."
$(GO) build -v -o bin/platform ./cmd/platform
$(GO) build -v -o bin/api-gateway ./cmd/api-gateway
$(GO) build -v -o bin/auth-service ./cmd/auth-service
$(GO) build -v -o bin/identity-service ./cmd/identity-service
$(GO) build -v -o bin/authz-service ./cmd/authz-service
$(GO) build -v -o bin/audit-service ./cmd/audit-service
@echo "Build complete: bin/platform, bin/api-gateway, bin/auth-service, bin/identity-service, bin/authz-service, bin/audit-service"
@echo "Build complete: bin/platform, bin/api-gateway"
clean:
@echo "Cleaning build artifacts..."
@@ -134,27 +130,18 @@ generate-proto:
--go-grpc_out=api/proto/generated --go-grpc_opt=paths=source_relative \
--proto_path=api/proto \
api/proto/audit.proto
@if [ -f api/proto/generated/audit.pb.go ]; then mv api/proto/generated/audit.pb.go api/proto/generated/audit/v1/audit.pb.go; fi
@if [ -f api/proto/generated/audit_grpc.pb.go ]; then mv api/proto/generated/audit_grpc.pb.go api/proto/generated/audit/v1/audit_grpc.pb.go; fi
@protoc --go_out=api/proto/generated --go_opt=paths=source_relative \
--go-grpc_out=api/proto/generated --go-grpc_opt=paths=source_relative \
--proto_path=api/proto \
api/proto/auth.proto
@if [ -f api/proto/generated/auth.pb.go ]; then mv api/proto/generated/auth.pb.go api/proto/generated/auth/v1/auth.pb.go; fi
@if [ -f api/proto/generated/auth_grpc.pb.go ]; then mv api/proto/generated/auth_grpc.pb.go api/proto/generated/auth/v1/auth_grpc.pb.go; fi
@protoc --go_out=api/proto/generated --go_opt=paths=source_relative \
--go-grpc_out=api/proto/generated --go-grpc_opt=paths=source_relative \
--proto_path=api/proto \
api/proto/authz.proto
@if [ -f api/proto/generated/authz.pb.go ]; then mv api/proto/generated/authz.pb.go api/proto/generated/authz/v1/authz.pb.go; fi
@if [ -f api/proto/generated/authz_grpc.pb.go ]; then mv api/proto/generated/authz_grpc.pb.go api/proto/generated/authz/v1/authz_grpc.pb.go; fi
@protoc --go_out=api/proto/generated --go_opt=paths=source_relative \
--go-grpc_out=api/proto/generated --go-grpc_opt=paths=source_relative \
--proto_path=api/proto \
api/proto/identity.proto
@if [ -f api/proto/generated/identity.pb.go ]; then mv api/proto/generated/identity.pb.go api/proto/generated/identity/v1/identity.pb.go; fi
@if [ -f api/proto/generated/identity_grpc.pb.go ]; then mv api/proto/generated/identity_grpc.pb.go api/proto/generated/identity/v1/identity_grpc.pb.go; fi
@rm -f api/proto/generated/*.pb.go api/proto/generated/*.proto 2>/dev/null || true
@echo "gRPC code generation complete"
verify: fmt-check lint test

View File

@@ -1,40 +0,0 @@
FROM alpine:latest
# Install system dependencies
RUN apk add --no-cache \
nodejs \
npm \
gcc \
build-base \
musl-dev \
curl \
make \
wget \
tar \
bash \
git \
protobuf \
protobuf-dev
# Install Go 1.25.3
RUN cd /tmp && \
wget -q https://go.dev/dl/go1.25.3.linux-amd64.tar.gz && \
tar -C /usr/local -xzf go1.25.3.linux-amd64.tar.gz && \
rm go1.25.3.linux-amd64.tar.gz
# Set up Go environment
ENV PATH=/usr/local/go/bin:$PATH:/root/go/bin
ENV GOROOT=/usr/local/go
ENV GOPATH=/root/go
ENV CGO_ENABLED=1
ENV GOFLAGS=-buildvcs=false
# Install Go protobuf plugins
RUN go install google.golang.org/protobuf/cmd/protoc-gen-go@latest && \
go install google.golang.org/grpc/cmd/protoc-gen-go-grpc@latest
# Install golangci-lint
RUN curl -sSfL https://raw.githubusercontent.com/golangci/golangci-lint/master/install.sh | sh -s -- -b /root/go/bin
# Set working directory
WORKDIR /workspace

View File

@@ -5,7 +5,6 @@ package main
import (
"context"
"fmt"
"math"
"net"
"time"
@@ -276,16 +275,9 @@ func (s *auditServerImpl) Query(ctx context.Context, req *auditv1.QueryRequest)
})
}
total := len(protoEntries)
var totalInt32 int32
if total > math.MaxInt32 {
totalInt32 = math.MaxInt32
} else {
totalInt32 = int32(total)
}
return &auditv1.QueryResponse{
Entries: protoEntries,
Total: totalInt32,
Total: int32(len(protoEntries)),
}, nil
}

View File

@@ -8,7 +8,6 @@ import (
"crypto/subtle"
"encoding/base64"
"fmt"
"math"
"net"
"strings"
"time"
@@ -73,17 +72,7 @@ func verifyPassword(password, hash string) (bool, error) {
if err != nil {
return false, err
}
hashLen := len(expectedHash)
if hashLen < 0 || hashLen > math.MaxUint32 {
return false, fmt.Errorf("invalid hash length: %d", hashLen)
}
var hashLenUint32 uint32
if hashLen > math.MaxUint32 {
hashLenUint32 = math.MaxUint32
} else {
hashLenUint32 = uint32(hashLen)
}
actualHash := argon2.IDKey([]byte(password), salt, 3, 64*1024, 4, hashLenUint32)
actualHash := argon2.IDKey([]byte(password), salt, 3, 64*1024, 4, uint32(len(expectedHash)))
return subtle.ConstantTimeCompare(expectedHash, actualHash) == 1, nil
}

View File

@@ -1,59 +0,0 @@
// Package schema defines the Ent schema for domain entities.
package schema
import (
"time"
"entgo.io/ent"
"entgo.io/ent/schema/field"
"entgo.io/ent/schema/index"
)
// AuditLog holds the schema definition for the AuditLog entity.
type AuditLog struct {
ent.Schema
}
// Fields of the AuditLog.
func (AuditLog) Fields() []ent.Field {
return []ent.Field{
field.String("id").
Unique().
Immutable(),
field.String("user_id").
NotEmpty().
Comment("ID of the user/actor performing the action"),
field.String("action").
NotEmpty().
Comment("Action performed (e.g., user.create, user.update)"),
field.String("resource").
Optional().
Comment("Resource type (e.g., user, role)"),
field.String("resource_id").
Optional().
Comment("ID of the target resource"),
field.String("ip_address").
Optional().
Comment("IP address of the client"),
field.String("user_agent").
Optional().
Comment("User agent of the client"),
field.JSON("metadata", map[string]interface{}{}).
Optional().
Comment("Additional metadata as JSON"),
field.Time("timestamp").
Default(time.Now).
Immutable(),
}
}
// Indexes of the AuditLog.
func (AuditLog) Indexes() []ent.Index {
return []ent.Index{
index.Fields("user_id"),
index.Fields("resource_id"),
index.Fields("timestamp"),
index.Fields("action"),
index.Fields("resource"),
}
}

View File

@@ -1,32 +0,0 @@
package schema
import (
"entgo.io/ent"
"entgo.io/ent/schema/edge"
"entgo.io/ent/schema/field"
)
// Permission holds the schema definition for the Permission entity.
type Permission struct {
ent.Schema
}
// Fields of the Permission.
func (Permission) Fields() []ent.Field {
return []ent.Field{
field.String("id").
Unique().
Immutable(),
field.String("name").
Unique().
NotEmpty().
Comment("Format: module.resource.action"),
}
}
// Edges of the Permission.
func (Permission) Edges() []ent.Edge {
return []ent.Edge{
edge.To("role_permissions", RolePermission.Type),
}
}

View File

@@ -1,44 +0,0 @@
package schema
import (
"time"
"entgo.io/ent"
"entgo.io/ent/schema/field"
"entgo.io/ent/schema/index"
)
// RefreshToken holds the schema definition for the RefreshToken entity.
type RefreshToken struct {
ent.Schema
}
// Fields of the RefreshToken.
func (RefreshToken) Fields() []ent.Field {
return []ent.Field{
field.String("id").
Unique().
Immutable(),
field.String("user_id").
NotEmpty().
Comment("ID of the user who owns this refresh token"),
field.String("token_hash").
NotEmpty().
Sensitive().
Comment("SHA256 hash of the refresh token"),
field.Time("expires_at").
Comment("When the refresh token expires"),
field.Time("created_at").
Default(time.Now).
Immutable(),
}
}
// Indexes of the RefreshToken.
func (RefreshToken) Indexes() []ent.Index {
return []ent.Index{
index.Fields("user_id"),
index.Fields("token_hash"),
index.Fields("expires_at"),
}
}

View File

@@ -1,39 +0,0 @@
package schema
import (
"time"
"entgo.io/ent"
"entgo.io/ent/schema/edge"
"entgo.io/ent/schema/field"
)
// Role holds the schema definition for the Role entity.
type Role struct {
ent.Schema
}
// Fields of the Role.
func (Role) Fields() []ent.Field {
return []ent.Field{
field.String("id").
Unique().
Immutable(),
field.String("name").
Unique().
NotEmpty(),
field.String("description").
Optional(),
field.Time("created_at").
Default(time.Now).
Immutable(),
}
}
// Edges of the Role.
func (Role) Edges() []ent.Edge {
return []ent.Edge{
edge.To("role_permissions", RolePermission.Type),
edge.To("user_roles", UserRole.Type),
}
}

View File

@@ -1,34 +0,0 @@
package schema
import (
"entgo.io/ent"
"entgo.io/ent/schema/edge"
"entgo.io/ent/schema/field"
)
// RolePermission holds the schema definition for the RolePermission entity (many-to-many relationship).
type RolePermission struct {
ent.Schema
}
// Fields of the RolePermission.
func (RolePermission) Fields() []ent.Field {
return []ent.Field{
field.String("role_id"),
field.String("permission_id"),
}
}
// Edges of the RolePermission.
func (RolePermission) Edges() []ent.Edge {
return []ent.Edge{
edge.To("role", Role.Type).
Unique().
Required().
Field("role_id"),
edge.To("permission", Permission.Type).
Unique().
Required().
Field("permission_id"),
}
}

View File

@@ -1,57 +0,0 @@
package schema
import (
"time"
"entgo.io/ent"
"entgo.io/ent/schema/edge"
"entgo.io/ent/schema/field"
)
// User holds the schema definition for the User entity.
type User struct {
ent.Schema
}
// Fields of the User.
func (User) Fields() []ent.Field {
return []ent.Field{
field.String("id").
Unique().
Immutable(),
field.String("email").
Unique().
NotEmpty(),
field.String("username").
Optional(),
field.String("first_name").
Optional(),
field.String("last_name").
Optional(),
field.String("password_hash").
NotEmpty(),
field.Bool("verified").
Default(false),
field.String("email_verification_token").
Optional().
Sensitive(),
field.String("password_reset_token").
Optional().
Sensitive(),
field.Time("password_reset_expires_at").
Optional(),
field.Time("created_at").
Default(time.Now).
Immutable(),
field.Time("updated_at").
Default(time.Now).
UpdateDefault(time.Now),
}
}
// Edges of the User.
func (User) Edges() []ent.Edge {
return []ent.Edge{
edge.To("user_roles", UserRole.Type),
}
}

View File

@@ -1,34 +0,0 @@
package schema
import (
"entgo.io/ent"
"entgo.io/ent/schema/edge"
"entgo.io/ent/schema/field"
)
// UserRole holds the schema definition for the UserRole entity (many-to-many relationship).
type UserRole struct {
ent.Schema
}
// Fields of the UserRole.
func (UserRole) Fields() []ent.Field {
return []ent.Field{
field.String("user_id"),
field.String("role_id"),
}
}
// Edges of the UserRole.
func (UserRole) Edges() []ent.Edge {
return []ent.Edge{
edge.To("user", User.Type).
Unique().
Required().
Field("user_id"),
edge.To("role", Role.Type).
Unique().
Required().
Field("role_id"),
}
}

View File

@@ -4,7 +4,6 @@ package grpc
import (
"context"
"fmt"
"math"
auditv1 "git.dcentral.systems/toolz/goplt/api/proto/generated/audit/v1"
"git.dcentral.systems/toolz/goplt/pkg/registry"
@@ -87,24 +86,9 @@ func (c *AuditClient) Query(ctx context.Context, filters *services.AuditLogFilte
return nil, err
}
var limitInt32, offsetInt32 int32
if filters.Limit > math.MaxInt32 {
limitInt32 = math.MaxInt32
} else if filters.Limit < math.MinInt32 {
limitInt32 = math.MinInt32
} else {
limitInt32 = int32(filters.Limit) //nolint:gosec // bounds checked above
}
if filters.Offset > math.MaxInt32 {
offsetInt32 = math.MaxInt32
} else if filters.Offset < math.MinInt32 {
offsetInt32 = math.MinInt32
} else {
offsetInt32 = int32(filters.Offset) //nolint:gosec // bounds checked above
}
req := &auditv1.QueryRequest{
Limit: limitInt32,
Offset: offsetInt32,
Limit: int32(filters.Limit),
Offset: int32(filters.Offset),
}
if filters.UserID != nil {

View File

@@ -204,7 +204,7 @@ func (c *IdentityClient) VerifyPassword(ctx context.Context, email, password str
resp, err := c.client.VerifyPassword(ctx, &identityv1.VerifyPasswordRequest{
Email: email,
Password: password,
Password: password,
})
if err != nil {
return nil, fmt.Errorf("verify password failed: %w", err)

View File

@@ -100,15 +100,9 @@ func LoadConfig(env string) (config.ConfigProvider, error) {
// e.g., DATABASE_DSN -> database.dsn, SERVER_PORT -> server.port
v.SetEnvKeyReplacer(strings.NewReplacer(".", "_"))
// Bind specific environment variables to config keys
if err := v.BindEnv("database.dsn", "DATABASE_DSN"); err != nil {
return nil, fmt.Errorf("failed to bind DATABASE_DSN: %w", err)
}
if err := v.BindEnv("registry.consul.address", "REGISTRY_CONSUL_ADDRESS"); err != nil {
return nil, fmt.Errorf("failed to bind REGISTRY_CONSUL_ADDRESS: %w", err)
}
if err := v.BindEnv("registry.type", "REGISTRY_TYPE"); err != nil {
return nil, fmt.Errorf("failed to bind REGISTRY_TYPE: %w", err)
}
v.BindEnv("database.dsn", "DATABASE_DSN")
v.BindEnv("registry.consul.address", "REGISTRY_CONSUL_ADDRESS")
v.BindEnv("registry.type", "REGISTRY_TYPE")
return NewViperConfig(v), nil
}

View File

@@ -1,59 +0,0 @@
// Package schema defines the Ent schema for domain entities.
package schema
import (
"time"
"entgo.io/ent"
"entgo.io/ent/schema/field"
"entgo.io/ent/schema/index"
)
// AuditLog holds the schema definition for the AuditLog entity.
type AuditLog struct {
ent.Schema
}
// Fields of the AuditLog.
func (AuditLog) Fields() []ent.Field {
return []ent.Field{
field.String("id").
Unique().
Immutable(),
field.String("user_id").
NotEmpty().
Comment("ID of the user/actor performing the action"),
field.String("action").
NotEmpty().
Comment("Action performed (e.g., user.create, user.update)"),
field.String("resource").
Optional().
Comment("Resource type (e.g., user, role)"),
field.String("resource_id").
Optional().
Comment("ID of the target resource"),
field.String("ip_address").
Optional().
Comment("IP address of the client"),
field.String("user_agent").
Optional().
Comment("User agent of the client"),
field.JSON("metadata", map[string]interface{}{}).
Optional().
Comment("Additional metadata as JSON"),
field.Time("timestamp").
Default(time.Now).
Immutable(),
}
}
// Indexes of the AuditLog.
func (AuditLog) Indexes() []ent.Index {
return []ent.Index{
index.Fields("user_id"),
index.Fields("resource_id"),
index.Fields("timestamp"),
index.Fields("action"),
index.Fields("resource"),
}
}

View File

@@ -1,32 +0,0 @@
package schema
import (
"entgo.io/ent"
"entgo.io/ent/schema/edge"
"entgo.io/ent/schema/field"
)
// Permission holds the schema definition for the Permission entity.
type Permission struct {
ent.Schema
}
// Fields of the Permission.
func (Permission) Fields() []ent.Field {
return []ent.Field{
field.String("id").
Unique().
Immutable(),
field.String("name").
Unique().
NotEmpty().
Comment("Format: module.resource.action"),
}
}
// Edges of the Permission.
func (Permission) Edges() []ent.Edge {
return []ent.Edge{
edge.To("role_permissions", RolePermission.Type),
}
}

View File

@@ -1,44 +0,0 @@
package schema
import (
"time"
"entgo.io/ent"
"entgo.io/ent/schema/field"
"entgo.io/ent/schema/index"
)
// RefreshToken holds the schema definition for the RefreshToken entity.
type RefreshToken struct {
ent.Schema
}
// Fields of the RefreshToken.
func (RefreshToken) Fields() []ent.Field {
return []ent.Field{
field.String("id").
Unique().
Immutable(),
field.String("user_id").
NotEmpty().
Comment("ID of the user who owns this refresh token"),
field.String("token_hash").
NotEmpty().
Sensitive().
Comment("SHA256 hash of the refresh token"),
field.Time("expires_at").
Comment("When the refresh token expires"),
field.Time("created_at").
Default(time.Now).
Immutable(),
}
}
// Indexes of the RefreshToken.
func (RefreshToken) Indexes() []ent.Index {
return []ent.Index{
index.Fields("user_id"),
index.Fields("token_hash"),
index.Fields("expires_at"),
}
}

View File

@@ -1,39 +0,0 @@
package schema
import (
"time"
"entgo.io/ent"
"entgo.io/ent/schema/edge"
"entgo.io/ent/schema/field"
)
// Role holds the schema definition for the Role entity.
type Role struct {
ent.Schema
}
// Fields of the Role.
func (Role) Fields() []ent.Field {
return []ent.Field{
field.String("id").
Unique().
Immutable(),
field.String("name").
Unique().
NotEmpty(),
field.String("description").
Optional(),
field.Time("created_at").
Default(time.Now).
Immutable(),
}
}
// Edges of the Role.
func (Role) Edges() []ent.Edge {
return []ent.Edge{
edge.To("role_permissions", RolePermission.Type),
edge.To("user_roles", UserRole.Type),
}
}

View File

@@ -1,34 +0,0 @@
package schema
import (
"entgo.io/ent"
"entgo.io/ent/schema/edge"
"entgo.io/ent/schema/field"
)
// RolePermission holds the schema definition for the RolePermission entity (many-to-many relationship).
type RolePermission struct {
ent.Schema
}
// Fields of the RolePermission.
func (RolePermission) Fields() []ent.Field {
return []ent.Field{
field.String("role_id"),
field.String("permission_id"),
}
}
// Edges of the RolePermission.
func (RolePermission) Edges() []ent.Edge {
return []ent.Edge{
edge.To("role", Role.Type).
Unique().
Required().
Field("role_id"),
edge.To("permission", Permission.Type).
Unique().
Required().
Field("permission_id"),
}
}

View File

@@ -1,57 +0,0 @@
package schema
import (
"time"
"entgo.io/ent"
"entgo.io/ent/schema/edge"
"entgo.io/ent/schema/field"
)
// User holds the schema definition for the User entity.
type User struct {
ent.Schema
}
// Fields of the User.
func (User) Fields() []ent.Field {
return []ent.Field{
field.String("id").
Unique().
Immutable(),
field.String("email").
Unique().
NotEmpty(),
field.String("username").
Optional(),
field.String("first_name").
Optional(),
field.String("last_name").
Optional(),
field.String("password_hash").
NotEmpty(),
field.Bool("verified").
Default(false),
field.String("email_verification_token").
Optional().
Sensitive(),
field.String("password_reset_token").
Optional().
Sensitive(),
field.Time("password_reset_expires_at").
Optional(),
field.Time("created_at").
Default(time.Now).
Immutable(),
field.Time("updated_at").
Default(time.Now).
UpdateDefault(time.Now),
}
}
// Edges of the User.
func (User) Edges() []ent.Edge {
return []ent.Edge{
edge.To("user_roles", UserRole.Type),
}
}

View File

@@ -1,34 +0,0 @@
package schema
import (
"entgo.io/ent"
"entgo.io/ent/schema/edge"
"entgo.io/ent/schema/field"
)
// UserRole holds the schema definition for the UserRole entity (many-to-many relationship).
type UserRole struct {
ent.Schema
}
// Fields of the UserRole.
func (UserRole) Fields() []ent.Field {
return []ent.Field{
field.String("user_id"),
field.String("role_id"),
}
}
// Edges of the UserRole.
func (UserRole) Edges() []ent.Edge {
return []ent.Edge{
edge.To("user", User.Type).
Unique().
Required().
Field("user_id"),
edge.To("role", Role.Type).
Unique().
Required().
Field("role_id"),
}
}

View File

@@ -1,57 +0,0 @@
#!/bin/bash
# Pre-commit check script that runs lint, fmt-check, test, and build in gitea-runner container
set -e
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
PROJECT_ROOT="$(cd "$SCRIPT_DIR/.." && pwd)"
IMAGE_NAME="wirelos/pre-commit"
CONTAINER_NAME="goplt-pre-commit-check"
echo "🔍 Checking for Docker image: $IMAGE_NAME"
if ! docker images --format "{{.Repository}}:{{.Tag}}" | grep -q "^${IMAGE_NAME}:latest$"; then
echo "📦 Image not found. Building $IMAGE_NAME from ci/pre-commit/Dockerfile..."
docker build -t "$IMAGE_NAME:latest" -f "$PROJECT_ROOT/ci/pre-commit/Dockerfile" "$PROJECT_ROOT/ci/pre-commit" || {
echo "❌ Failed to build Docker image"
exit 1
}
echo "✅ Image built successfully"
else
echo "✅ Image found locally"
fi
echo "🧹 Cleaning up any existing container..."
docker rm -f "$CONTAINER_NAME" 2>/dev/null || true
echo "🚀 Starting pre-commit container..."
docker run --rm \
--name "$CONTAINER_NAME" \
-v "$PROJECT_ROOT:/workspace" \
-w /workspace \
"$IMAGE_NAME:latest" \
sh -c "
echo '📋 Running make fmt-check...'
make fmt-check || exit 1
echo '🔍 Running make lint...'
make lint || exit 1
echo '🧪 Running make test...'
make test || exit 1
echo '🔨 Running make build...'
make build || exit 1
echo '✅ All checks passed!'
"
EXIT_CODE=$?
if [ $EXIT_CODE -eq 0 ]; then
echo "✅ All pre-commit checks passed!"
else
echo "❌ Pre-commit checks failed. Please fix the issues above."
fi
exit $EXIT_CODE

View File

@@ -3,7 +3,6 @@ package api
import (
"context"
"math"
auditv1 "git.dcentral.systems/toolz/goplt/api/proto/generated/audit/v1"
"git.dcentral.systems/toolz/goplt/services/audit/internal/service"
@@ -119,15 +118,8 @@ func (s *Server) Query(ctx context.Context, req *auditv1.QueryRequest) (*auditv1
})
}
total := len(protoEntries)
var totalInt32 int32
if total > math.MaxInt32 {
totalInt32 = math.MaxInt32
} else {
totalInt32 = int32(total)
}
return &auditv1.QueryResponse{
Entries: protoEntries,
Total: totalInt32, // Note: This is a simplified total, actual total would require a count query
Total: int32(len(protoEntries)), // Note: This is a simplified total, actual total would require a count query
}, nil
}

View File

@@ -1,184 +0,0 @@
package gateway
import (
"testing"
"github.com/stretchr/testify/assert"
)
func TestGateway_pathMatches(t *testing.T) {
t.Parallel()
tests := []struct {
name string
requestPath string
routePath string
want bool
}{
{
name: "exact match",
requestPath: "/api/v1/auth",
routePath: "/api/v1/auth",
want: true,
},
{
name: "exact match with trailing slash",
requestPath: "/api/v1/auth/",
routePath: "/api/v1/auth",
want: true,
},
{
name: "wildcard match - prefix",
requestPath: "/api/v1/auth/login",
routePath: "/api/v1/auth/**",
want: true,
},
{
name: "wildcard match - exact prefix",
requestPath: "/api/v1/auth",
routePath: "/api/v1/auth/**",
want: true,
},
{
name: "wildcard match - nested path",
requestPath: "/api/v1/auth/refresh/token",
routePath: "/api/v1/auth/**",
want: true,
},
{
name: "no match - different prefix",
requestPath: "/api/v1/users",
routePath: "/api/v1/auth/**",
want: false,
},
{
name: "no match - exact",
requestPath: "/api/v1/users",
routePath: "/api/v1/auth",
want: false,
},
{
name: "wildcard no match - wrong prefix",
requestPath: "/api/v1/users/login",
routePath: "/api/v1/auth/**",
want: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
gateway := &Gateway{}
got := gateway.pathMatches(tt.requestPath, tt.routePath)
assert.Equal(t, tt.want, got)
})
}
}
func TestGateway_extractRemainingPath(t *testing.T) {
t.Parallel()
tests := []struct {
name string
requestPath string
routePath string
want string
}{
{
name: "wildcard - extract path",
requestPath: "/api/v1/auth/login",
routePath: "/api/v1/auth/**",
want: "/login",
},
{
name: "wildcard - extract nested path",
requestPath: "/api/v1/auth/refresh/token",
routePath: "/api/v1/auth/**",
want: "/refresh/token",
},
{
name: "wildcard - exact match",
requestPath: "/api/v1/auth",
routePath: "/api/v1/auth/**",
want: "/",
},
{
name: "exact match - no remaining",
requestPath: "/api/v1/auth",
routePath: "/api/v1/auth",
want: "/",
},
{
name: "no match - empty",
requestPath: "/api/v1/users",
routePath: "/api/v1/auth/**",
want: "",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
gateway := &Gateway{}
got := gateway.extractRemainingPath(tt.requestPath, tt.routePath)
assert.Equal(t, tt.want, got)
})
}
}
func TestGateway_matchRoute(t *testing.T) {
t.Parallel()
tests := []struct {
name string
routes []RouteConfig
requestPath string
want *RouteConfig
}{
{
name: "exact match",
routes: []RouteConfig{
{Path: "/api/v1/auth", Service: "auth-service"},
{Path: "/api/v1/users", Service: "identity-service"},
},
requestPath: "/api/v1/auth",
want: &RouteConfig{Path: "/api/v1/auth", Service: "auth-service"},
},
{
name: "wildcard match",
routes: []RouteConfig{
{Path: "/api/v1/auth/**", Service: "auth-service"},
},
requestPath: "/api/v1/auth/login",
want: &RouteConfig{Path: "/api/v1/auth/**", Service: "auth-service"},
},
{
name: "no match",
routes: []RouteConfig{
{Path: "/api/v1/auth/**", Service: "auth-service"},
},
requestPath: "/api/v1/other",
want: nil,
},
{
name: "empty routes",
routes: []RouteConfig{},
requestPath: "/api/v1/auth",
want: nil,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
gateway := &Gateway{
routes: tt.routes,
}
got := gateway.matchRoute(tt.requestPath)
if tt.want == nil {
assert.Nil(t, got)
} else {
assert.NotNil(t, got)
assert.Equal(t, tt.want.Path, got.Path)
assert.Equal(t, tt.want.Service, got.Service)
}
})
}
}

View File

@@ -14,7 +14,6 @@ import (
"git.dcentral.systems/toolz/goplt/pkg/config"
"git.dcentral.systems/toolz/goplt/pkg/logger"
"git.dcentral.systems/toolz/goplt/pkg/registry"
"git.dcentral.systems/toolz/goplt/pkg/services"
"github.com/gin-gonic/gin"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
@@ -90,7 +89,7 @@ func TestGateway_SetupRoutes(t *testing.T) {
{Path: "/api/v1/test", Service: "test-service", AuthRequired: false},
},
requestPath: "/api/v1/test",
expectedStatus: http.StatusNotFound, // Unknown service returns 404
expectedStatus: http.StatusServiceUnavailable, // Will fail service discovery
},
{
name: "no routes configured",
@@ -152,7 +151,7 @@ func TestGateway_handleRoute(t *testing.T) {
}
},
requestPath: "/api/v1/test",
expectedStatus: http.StatusNotFound, // Unknown service returns 404
expectedStatus: http.StatusServiceUnavailable,
},
{
name: "no service instances",
@@ -166,7 +165,7 @@ func TestGateway_handleRoute(t *testing.T) {
}
},
requestPath: "/api/v1/test",
expectedStatus: http.StatusNotFound, // Unknown service returns 404
expectedStatus: http.StatusServiceUnavailable,
},
// Note: Testing invalid target URL and proxy forwarding requires integration tests
// with real HTTP servers, as httptest.ResponseRecorder doesn't support CloseNotify
@@ -224,7 +223,7 @@ func TestGateway_handleRoute_AllMethods(t *testing.T) {
clientFactory: &client.ServiceClientFactory{},
registry: mockReg,
routes: []RouteConfig{
{Path: "/api/v1/test/**", Service: "test-service"}, // Use wildcard pattern
{Path: "/api/v1/test", Service: "test-service"},
},
}
@@ -238,7 +237,6 @@ func TestGateway_handleRoute_AllMethods(t *testing.T) {
router.ServeHTTP(w, req)
// All methods should be handled (route should match, even if service unavailable)
// New implementation returns 500 for unknown services, not 404
assert.NotEqual(t, http.StatusNotFound, w.Code, "Route should match for %s", method)
})
}
@@ -426,87 +424,3 @@ func (m *mockServiceRegistry) Health(ctx context.Context, serviceID string) (*re
Status: "healthy",
}, nil
}
// mockAuthClient implements services.AuthServiceClient for testing.
type mockAuthClient struct {
loginResp *services.TokenResponse
loginErr error
refreshResp *services.TokenResponse
refreshErr error
validateResp *services.TokenClaims
validateErr error
logoutErr error
}
func (m *mockAuthClient) Login(ctx context.Context, email, password string) (*services.TokenResponse, error) {
return m.loginResp, m.loginErr
}
func (m *mockAuthClient) RefreshToken(ctx context.Context, refreshToken string) (*services.TokenResponse, error) {
return m.refreshResp, m.refreshErr
}
func (m *mockAuthClient) ValidateToken(ctx context.Context, token string) (*services.TokenClaims, error) {
return m.validateResp, m.validateErr
}
func (m *mockAuthClient) Logout(ctx context.Context, refreshToken string) error {
return m.logoutErr
}
// mockIdentityClient implements services.IdentityServiceClient for testing.
type mockIdentityClient struct {
getUserResp *services.User
getUserErr error
getUserByEmailResp *services.User
getUserByEmailErr error
createUserResp *services.User
createUserErr error
updateUserResp *services.User
updateUserErr error
deleteUserErr error
verifyEmailErr error
requestPasswordResetErr error
resetPasswordErr error
verifyPasswordResp *services.User
verifyPasswordErr error
}
func (m *mockIdentityClient) GetUser(ctx context.Context, id string) (*services.User, error) {
return m.getUserResp, m.getUserErr
}
func (m *mockIdentityClient) GetUserByEmail(ctx context.Context, email string) (*services.User, error) {
return m.getUserByEmailResp, m.getUserByEmailErr
}
func (m *mockIdentityClient) CreateUser(ctx context.Context, req *services.CreateUserRequest) (*services.User, error) {
return m.createUserResp, m.createUserErr
}
func (m *mockIdentityClient) UpdateUser(ctx context.Context, id string, req *services.UpdateUserRequest) (*services.User, error) {
return m.updateUserResp, m.updateUserErr
}
func (m *mockIdentityClient) DeleteUser(ctx context.Context, id string) error {
return m.deleteUserErr
}
func (m *mockIdentityClient) VerifyEmail(ctx context.Context, token string) error {
return m.verifyEmailErr
}
func (m *mockIdentityClient) RequestPasswordReset(ctx context.Context, email string) error {
return m.requestPasswordResetErr
}
func (m *mockIdentityClient) ResetPassword(ctx context.Context, token, newPassword string) error {
return m.resetPasswordErr
}
func (m *mockIdentityClient) VerifyPassword(ctx context.Context, email, password string) (*services.User, error) {
return m.verifyPasswordResp, m.verifyPasswordErr
}
// Note: mockClientFactory is not needed since we're testing handlers directly with mock clients.
// The actual clientFactory is tested separately in integration tests.

View File

@@ -1,519 +0,0 @@
package gateway
import (
"bytes"
"context"
"encoding/json"
"net/http"
"net/http/httptest"
"testing"
"git.dcentral.systems/toolz/goplt/pkg/services"
"github.com/gin-gonic/gin"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
)
func TestGateway_handleLogin(t *testing.T) {
t.Parallel()
tests := []struct {
name string
requestBody interface{}
clientResp *services.TokenResponse
clientErr error
expectedStatus int
expectedBody func(*testing.T, *httptest.ResponseRecorder)
}{
{
name: "successful login",
requestBody: map[string]string{
"email": "test@example.com",
"password": "password123",
},
clientResp: &services.TokenResponse{
AccessToken: "access-token",
RefreshToken: "refresh-token",
ExpiresIn: 3600,
TokenType: "Bearer",
},
clientErr: nil,
expectedStatus: http.StatusOK,
expectedBody: func(t *testing.T, w *httptest.ResponseRecorder) {
var resp services.TokenResponse
err := json.Unmarshal(w.Body.Bytes(), &resp)
require.NoError(t, err)
assert.Equal(t, "access-token", resp.AccessToken)
assert.Equal(t, "refresh-token", resp.RefreshToken)
},
},
{
name: "invalid request body",
requestBody: map[string]string{
"email": "test@example.com",
// missing password
},
expectedStatus: http.StatusBadRequest,
},
{
name: "client error - unauthorized",
requestBody: map[string]string{
"email": "test@example.com",
"password": "wrongpassword",
},
clientErr: status.Error(codes.Unauthenticated, "invalid credentials"),
expectedStatus: http.StatusUnauthorized,
},
{
name: "client error - internal",
requestBody: map[string]string{
"email": "test@example.com",
"password": "password123",
},
clientErr: status.Error(codes.Internal, "internal error"),
expectedStatus: http.StatusInternalServerError,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
mockClient := &mockAuthClient{
loginResp: tt.clientResp,
loginErr: tt.clientErr,
}
gateway := &Gateway{
log: &mockLogger{},
}
router := gin.New()
router.POST("/login", func(c *gin.Context) {
gateway.handleLogin(context.Background(), c, mockClient)
})
bodyBytes, _ := json.Marshal(tt.requestBody)
req := httptest.NewRequest(http.MethodPost, "/login", bytes.NewReader(bodyBytes))
req.Header.Set("Content-Type", "application/json")
w := httptest.NewRecorder()
router.ServeHTTP(w, req)
assert.Equal(t, tt.expectedStatus, w.Code)
if tt.expectedBody != nil {
tt.expectedBody(t, w)
}
})
}
}
func TestGateway_handleRefreshToken(t *testing.T) {
t.Parallel()
tests := []struct {
name string
requestBody interface{}
clientResp *services.TokenResponse
clientErr error
expectedStatus int
}{
{
name: "successful refresh",
requestBody: map[string]string{
"refresh_token": "refresh-token-123",
},
clientResp: &services.TokenResponse{
AccessToken: "new-access-token",
RefreshToken: "new-refresh-token",
ExpiresIn: 3600,
TokenType: "Bearer",
},
expectedStatus: http.StatusOK,
},
{
name: "invalid request body",
requestBody: map[string]string{
// missing refresh_token
},
expectedStatus: http.StatusBadRequest,
},
{
name: "client error",
requestBody: map[string]string{
"refresh_token": "invalid-token",
},
clientErr: status.Error(codes.Unauthenticated, "invalid token"),
expectedStatus: http.StatusUnauthorized,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
mockClient := &mockAuthClient{
refreshResp: tt.clientResp,
refreshErr: tt.clientErr,
}
gateway := &Gateway{
log: &mockLogger{},
}
router := gin.New()
router.POST("/refresh", func(c *gin.Context) {
gateway.handleRefreshToken(context.Background(), c, mockClient)
})
bodyBytes, _ := json.Marshal(tt.requestBody)
req := httptest.NewRequest(http.MethodPost, "/refresh", bytes.NewReader(bodyBytes))
req.Header.Set("Content-Type", "application/json")
w := httptest.NewRecorder()
router.ServeHTTP(w, req)
assert.Equal(t, tt.expectedStatus, w.Code)
})
}
}
func TestGateway_handleValidateToken(t *testing.T) {
t.Parallel()
tests := []struct {
name string
requestBody interface{}
clientResp *services.TokenClaims
clientErr error
expectedStatus int
}{
{
name: "successful validation",
requestBody: map[string]string{
"token": "valid-token",
},
clientResp: &services.TokenClaims{
UserID: "user-123",
Email: "test@example.com",
Roles: []string{"user"},
ExpiresAt: 1234567890,
},
expectedStatus: http.StatusOK,
},
{
name: "invalid request body",
requestBody: map[string]string{
// missing token
},
expectedStatus: http.StatusBadRequest,
},
{
name: "client error - invalid token",
requestBody: map[string]string{
"token": "invalid-token",
},
clientErr: status.Error(codes.Unauthenticated, "invalid token"),
expectedStatus: http.StatusUnauthorized,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
mockClient := &mockAuthClient{
validateResp: tt.clientResp,
validateErr: tt.clientErr,
}
gateway := &Gateway{
log: &mockLogger{},
}
router := gin.New()
router.POST("/validate", func(c *gin.Context) {
gateway.handleValidateToken(context.Background(), c, mockClient)
})
bodyBytes, _ := json.Marshal(tt.requestBody)
req := httptest.NewRequest(http.MethodPost, "/validate", bytes.NewReader(bodyBytes))
req.Header.Set("Content-Type", "application/json")
w := httptest.NewRecorder()
router.ServeHTTP(w, req)
assert.Equal(t, tt.expectedStatus, w.Code)
})
}
}
func TestGateway_handleLogout(t *testing.T) {
t.Parallel()
tests := []struct {
name string
requestBody interface{}
clientErr error
expectedStatus int
}{
{
name: "successful logout",
requestBody: map[string]string{
"refresh_token": "refresh-token-123",
},
expectedStatus: http.StatusOK,
},
{
name: "invalid request body",
requestBody: map[string]string{
// missing refresh_token
},
expectedStatus: http.StatusBadRequest,
},
{
name: "client error",
requestBody: map[string]string{
"refresh_token": "invalid-token",
},
clientErr: status.Error(codes.NotFound, "token not found"),
expectedStatus: http.StatusNotFound,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
mockClient := &mockAuthClient{
logoutErr: tt.clientErr,
}
gateway := &Gateway{
log: &mockLogger{},
}
router := gin.New()
router.POST("/logout", func(c *gin.Context) {
gateway.handleLogout(context.Background(), c, mockClient)
})
bodyBytes, _ := json.Marshal(tt.requestBody)
req := httptest.NewRequest(http.MethodPost, "/logout", bytes.NewReader(bodyBytes))
req.Header.Set("Content-Type", "application/json")
w := httptest.NewRecorder()
router.ServeHTTP(w, req)
assert.Equal(t, tt.expectedStatus, w.Code)
})
}
}
func TestGateway_handleGetUser(t *testing.T) {
t.Parallel()
tests := []struct {
name string
userID string
clientResp *services.User
clientErr error
expectedStatus int
}{
{
name: "successful get user",
userID: "user-123",
clientResp: &services.User{
ID: "user-123",
Email: "test@example.com",
Username: "testuser",
FirstName: "Test",
LastName: "User",
},
expectedStatus: http.StatusOK,
},
{
name: "client error - not found",
userID: "nonexistent",
clientErr: status.Error(codes.NotFound, "user not found"),
expectedStatus: http.StatusNotFound,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
mockClient := &mockIdentityClient{
getUserResp: tt.clientResp,
getUserErr: tt.clientErr,
}
gateway := &Gateway{
log: &mockLogger{},
}
router := gin.New()
router.GET("/users/:id", func(c *gin.Context) {
gateway.handleGetUser(context.Background(), c, mockClient, tt.userID)
})
req := httptest.NewRequest(http.MethodGet, "/users/"+tt.userID, nil)
w := httptest.NewRecorder()
router.ServeHTTP(w, req)
assert.Equal(t, tt.expectedStatus, w.Code)
})
}
}
func TestGateway_handleCreateUser(t *testing.T) {
t.Parallel()
tests := []struct {
name string
requestBody interface{}
clientResp *services.User
clientErr error
expectedStatus int
}{
{
name: "successful create",
requestBody: services.CreateUserRequest{
Email: "test@example.com",
Username: "testuser",
Password: "password123",
FirstName: "Test",
LastName: "User",
},
clientResp: &services.User{
ID: "user-123",
Email: "test@example.com",
Username: "testuser",
FirstName: "Test",
LastName: "User",
},
expectedStatus: http.StatusCreated,
},
{
name: "invalid JSON",
requestBody: "not a json object",
expectedStatus: http.StatusBadRequest,
},
{
name: "client error - already exists",
requestBody: services.CreateUserRequest{
Email: "existing@example.com",
Username: "existing",
Password: "password123",
},
clientErr: status.Error(codes.AlreadyExists, "user already exists"),
expectedStatus: http.StatusConflict,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
mockClient := &mockIdentityClient{
createUserResp: tt.clientResp,
createUserErr: tt.clientErr,
}
gateway := &Gateway{
log: &mockLogger{},
}
router := gin.New()
router.POST("/users", func(c *gin.Context) {
gateway.handleCreateUser(context.Background(), c, mockClient)
})
bodyBytes, _ := json.Marshal(tt.requestBody)
req := httptest.NewRequest(http.MethodPost, "/users", bytes.NewReader(bodyBytes))
req.Header.Set("Content-Type", "application/json")
w := httptest.NewRecorder()
router.ServeHTTP(w, req)
assert.Equal(t, tt.expectedStatus, w.Code)
})
}
}
func TestGateway_handleGRPCError(t *testing.T) {
t.Parallel()
tests := []struct {
name string
err error
expectedStatus int
expectedError string
}{
{
name: "Unauthenticated",
err: status.Error(codes.Unauthenticated, "invalid token"),
expectedStatus: http.StatusUnauthorized,
expectedError: "Unauthorized",
},
{
name: "PermissionDenied",
err: status.Error(codes.PermissionDenied, "access denied"),
expectedStatus: http.StatusForbidden,
expectedError: "Forbidden",
},
{
name: "NotFound",
err: status.Error(codes.NotFound, "resource not found"),
expectedStatus: http.StatusNotFound,
expectedError: "Not found",
},
{
name: "InvalidArgument",
err: status.Error(codes.InvalidArgument, "invalid input"),
expectedStatus: http.StatusBadRequest,
expectedError: "Invalid request",
},
{
name: "AlreadyExists",
err: status.Error(codes.AlreadyExists, "resource exists"),
expectedStatus: http.StatusConflict,
expectedError: "Resource already exists",
},
{
name: "Internal",
err: status.Error(codes.Internal, "internal error"),
expectedStatus: http.StatusInternalServerError,
expectedError: "Internal server error",
},
{
name: "Unavailable",
err: status.Error(codes.Unavailable, "service unavailable"),
expectedStatus: http.StatusServiceUnavailable,
expectedError: "Service unavailable",
},
{
name: "non-gRPC error",
err: assert.AnError,
expectedStatus: http.StatusInternalServerError,
expectedError: "Internal server error",
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
gateway := &Gateway{
log: &mockLogger{},
}
router := gin.New()
router.GET("/test", func(c *gin.Context) {
gateway.handleGRPCError(c, tt.err)
})
req := httptest.NewRequest(http.MethodGet, "/test", nil)
w := httptest.NewRecorder()
router.ServeHTTP(w, req)
assert.Equal(t, tt.expectedStatus, w.Code)
var response map[string]interface{}
err := json.Unmarshal(w.Body.Bytes(), &response)
require.NoError(t, err)
assert.Equal(t, tt.expectedError, response["error"])
})
}
}

View File

@@ -7,7 +7,6 @@ import (
"encoding/base64"
"errors"
"fmt"
"math"
"strings"
"golang.org/x/crypto/argon2"
@@ -78,44 +77,7 @@ func Verify(password, hash string) (bool, error) {
}
// Compute hash with same parameters
hashLen := len(expectedHash)
if hashLen < 0 || hashLen > math.MaxUint32 {
return false, fmt.Errorf("invalid hash length: %d", hashLen)
}
var hashLenUint32 uint32
if hashLen > math.MaxUint32 {
hashLenUint32 = math.MaxUint32
} else {
hashLenUint32 = uint32(hashLen)
}
// Bounds check for t and m to prevent overflow
var tUint32, mUint32 uint32
if t > math.MaxUint32 {
tUint32 = math.MaxUint32
} else if t < 0 {
tUint32 = 0
} else {
tUint32 = uint32(t) //nolint:gosec // bounds checked above
}
if m > math.MaxUint32 {
mUint32 = math.MaxUint32
} else if m < 0 {
mUint32 = 0
} else {
mUint32 = uint32(m) //nolint:gosec // bounds checked above
}
var pUint8 uint8
if p > math.MaxUint8 {
pUint8 = math.MaxUint8
} else if p < 0 {
pUint8 = 0
} else {
pUint8 = uint8(p)
}
actualHash := argon2.IDKey([]byte(password), salt, tUint32, mUint32, pUint8, hashLenUint32)
actualHash := argon2.IDKey([]byte(password), salt, uint32(t), uint32(m), uint8(p), uint32(len(expectedHash)))
// Constant-time comparison
if subtle.ConstantTimeCompare(expectedHash, actualHash) == 1 {

View File

@@ -1,210 +0,0 @@
package password
import (
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
func TestHash(t *testing.T) {
t.Parallel()
tests := []struct {
name string
password string
wantErr bool
}{
{
name: "valid password",
password: "testpassword123",
wantErr: false,
},
{
name: "empty password",
password: "",
wantErr: false, // Empty password is valid, just hashed
},
{
name: "long password",
password: "this is a very long password with many characters and symbols !@#$%^&*()",
wantErr: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
hash, err := Hash(tt.password)
if tt.wantErr {
require.Error(t, err)
assert.Empty(t, hash)
} else {
require.NoError(t, err)
assert.NotEmpty(t, hash)
// Verify hash format: $argon2id$v=19$m=65536,t=3,p=4$salt$hash
assert.Contains(t, hash, "$argon2id$")
assert.Contains(t, hash, "v=19")
assert.Contains(t, hash, "m=65536")
assert.Contains(t, hash, "t=3")
assert.Contains(t, hash, "p=4")
}
})
}
}
func TestVerify(t *testing.T) {
t.Parallel()
tests := []struct {
name string
password string
hash string
want bool
wantErr bool
skip bool
}{
{
name: "correct password",
password: "testpassword123",
hash: "", // Will be generated
want: true,
wantErr: false,
},
{
name: "incorrect password",
password: "wrongpassword",
hash: "", // Will be generated from different password
want: false,
wantErr: false,
},
{
name: "invalid hash format - too few parts",
password: "testpassword123",
hash: "$argon2id$v=19$m=65536",
want: false,
wantErr: true,
},
{
name: "invalid hash format - wrong algorithm",
password: "testpassword123",
hash: "$bcrypt$v=19$m=65536,t=3,p=4$salt$hash",
want: false,
wantErr: true,
},
{
name: "invalid hash format - malformed version",
password: "testpassword123",
hash: "$argon2id$v=invalid$m=65536,t=3,p=4$salt$hash",
want: false,
wantErr: true,
},
{
name: "invalid hash format - malformed parameters",
password: "testpassword123",
hash: "$argon2id$v=19$m=invalid,t=3,p=4$salt$hash",
want: false,
wantErr: true,
},
{
name: "invalid hash format - invalid base64 salt",
password: "testpassword123",
hash: "$argon2id$v=19$m=65536,t=3,p=4$invalid-base64$hash",
want: false,
wantErr: true,
},
{
name: "invalid hash format - invalid base64 hash",
password: "testpassword123",
hash: "", // Will be generated and then corrupted
want: false,
wantErr: true,
skip: true, // Skip this test - corrupting base64 is complex
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
// Skip test if marked
if tt.skip {
t.Skip("Skipping test")
}
var hash string
var err error
// Generate hash if needed
if tt.hash == "" {
if tt.name == "incorrect password" {
// Generate hash for a different password
hash, err = Hash("differentpassword")
require.NoError(t, err)
} else {
hash, err = Hash(tt.password)
require.NoError(t, err)
}
} else {
hash = tt.hash
}
// Verify
got, err := Verify(tt.password, hash)
if tt.wantErr {
require.Error(t, err)
} else {
require.NoError(t, err)
}
assert.Equal(t, tt.want, got)
})
}
}
func TestHash_Verify_RoundTrip(t *testing.T) {
t.Parallel()
passwords := []string{
"testpassword123",
"",
"!@#$%^&*()",
"very long password with spaces and special characters !@#$%^&*()_+-=[]{}|;:,.<>?",
"unicode-测试-пароль",
}
for _, password := range passwords {
t.Run(password, func(t *testing.T) {
hash, err := Hash(password)
require.NoError(t, err)
assert.NotEmpty(t, hash)
// Verify the same password
valid, err := Verify(password, hash)
require.NoError(t, err)
assert.True(t, valid, "Password should verify correctly")
// Verify different password
invalid, err := Verify("wrongpassword", hash)
require.NoError(t, err)
assert.False(t, invalid, "Wrong password should not verify")
})
}
}
func TestHash_Uniqueness(t *testing.T) {
t.Parallel()
password := "testpassword123"
hashes := make(map[string]bool)
// Generate multiple hashes for the same password
// They should be different due to random salt
for i := 0; i < 10; i++ {
hash, err := Hash(password)
require.NoError(t, err)
assert.NotContains(t, hashes, hash, "Each hash should be unique due to random salt")
hashes[hash] = true
// But all should verify correctly
valid, err := Verify(password, hash)
require.NoError(t, err)
assert.True(t, valid, "All hashes should verify correctly")
}
}