Adds main_test.go for each of the 6 cmd binaries that lacked them
(storaged already had main_test.go; that's where the pattern came
from). Each test file focuses on the cmd-specific surface — route
mounts, body caps, decode/validation paths — without re-testing
internal package logic that's covered elsewhere.
cmd/catalogd/main_test.go — 6 funcs
TestRoutesMounted: chi.Walk asserts /catalog/{register,manifest/*,list}
TestHandleRegister_BodyTooLarge: 5 MiB body → 4xx
TestHandleRegister_MalformedJSON: 400
TestHandleRegister_EmptyName_400: ErrEmptyName surfaces as 400
TestHandleGetManifest_404 + TestHandleList_EmptyShape
cmd/embedd/main_test.go — 8 funcs
stubProvider implements embed.Provider deterministically
TestRoutesMounted, MalformedJSON_400, EmptyTextRejected_400 (per
scrum O-W3), UpstreamError_502 (provider error → 502, not 500),
HappyPath_ProviderEcho, BodyTooLarge (4xx range), TestItoa
(covers the no-strconv helper)
cmd/gateway/main_test.go — 4 funcs
TestMustParseUpstream_HappyPaths: 3 valid URLs
TestMustParseUpstream_FailureExits: re-execs the test binary in a
subprocess with env flag (standard pattern for testing os.Exit
callers); subprocess invokes mustParseUpstream("127.0.0.1:3211")
[missing scheme]; expects exit non-zero. Same pattern for garbage.
TestUpstreamConfigKeys_DocumentedShape: locks the 6 _url keys
cmd/ingestd/main_test.go — 7 funcs
Stubs both storaged and catalogd via httptest.Server so the cmd
layer can be exercised without bringing the full chain up.
TestHandleIngest_MissingNameQueryParam: 400 with "name" in body
TestHandleIngest_MalformedMultipart: 400
TestHandleIngest_MissingFormFile: 400 (valid multipart, wrong field)
TestHandleIngest_BodyTooLarge: 4xx
TestEscapeKeyPath: 6-case URL-escape table (apostrophe, space, etc.)
TestParquetKeyPath_Format: locks the datasets/<n>/<fp>.parquet shape
per scrum C-DRIFT (any rename breaks idempotent re-ingest)
cmd/queryd/main_test.go — 6 funcs
Tests pre-DB paths (decode, body cap, empty SQL); db.QueryContext
itself needs DuckDB so it's covered by GOLAKE-040 in the proof
harness, not unit tests. handlers.db = nil here is intentional.
TestHandleSQL_EmptySQL_400: 3 cases (empty, whitespace, mixed-WS)
TestMaxSQLBodyBytes_Reasonable: locks the 64 KiB constant in a
sane range so a refactor can't blow it open
TestPrimaryBucket_Constant: locks "primary" — secrets lookup uses
this; rename = silent secret-resolution failure at boot
cmd/vectord/main_test.go — 14 funcs
All 6 routes verified mounted. handlers.persist = nil = pure
in-memory mode; persistence is GOLAKE-070 in the proof harness.
Coverage of every error branch in handleCreate/Add/Search/Delete:
missing index → 404, dim mismatch → 400, empty items → 400,
empty id → 400, malformed JSON → 400, body too large → 4xx,
happy create → 201, happy list → 200.
One real finding caught during writing:
Body-cap rejection is sometimes 413 (typed MaxBytesError survives
unwrap) and sometimes 400 (decoder wraps it as a generic decode
error). Both are valid client-error contracts; the contract isn't
"exactly 413" but "fails loud as 4xx, never silent 200 or 5xx."
Tests assert 4xx range. The proof harness's
proof_assert_status_4xx already had this shape — just bringing
the unit tests in line with it.
Verified:
go test -count=1 -short ./cmd/... — all 7 packages green
just verify — vet + test + 9 smokes 35s
Closes audit risk R-005 (6/7 cmd/main.go untested). Combined with
the proof harness's wiring coverage, every cmd-level handler now
has both unit-test and integration-test coverage of the wiring
layer. R-005 → CLOSED.
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
151 lines
4.2 KiB
Go
151 lines
4.2 KiB
Go
package main
|
|
|
|
import (
|
|
"bytes"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/go-chi/chi/v5"
|
|
|
|
"git.agentview.dev/profit/golangLAKEHOUSE/internal/catalogd"
|
|
"git.agentview.dev/profit/golangLAKEHOUSE/internal/storeclient"
|
|
)
|
|
|
|
// Closes R-005 for catalogd: cmd-level tests for route mounting,
|
|
// body-cap rejection, malformed JSON handling, and the decode-error
|
|
// paths in handleRegister. Deeper Registry semantics live in
|
|
// internal/catalogd/registry_test.go.
|
|
|
|
func newTestHandlers(t *testing.T) (*handlers, *httptest.Server) {
|
|
t.Helper()
|
|
// Stub storaged so the registry can hydrate (it needs nothing
|
|
// initially). Empty server = 404 on any GET; that's fine for
|
|
// these tests because we don't exercise storaged paths here.
|
|
stub := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, _ *http.Request) {
|
|
w.WriteHeader(http.StatusNotFound)
|
|
}))
|
|
t.Cleanup(stub.Close)
|
|
|
|
store := storeclient.New(stub.URL)
|
|
reg := catalogd.NewRegistry(store)
|
|
return newHandlers(reg), stub
|
|
}
|
|
|
|
func mountedRouter(h *handlers) chi.Router {
|
|
r := chi.NewRouter()
|
|
h.register(r)
|
|
return r
|
|
}
|
|
|
|
func TestRoutesMounted(t *testing.T) {
|
|
h, _ := newTestHandlers(t)
|
|
r := mountedRouter(h)
|
|
want := map[string]string{
|
|
"POST /catalog/register": "register endpoint",
|
|
"GET /catalog/manifest/*": "manifest endpoint",
|
|
"GET /catalog/list": "list endpoint",
|
|
}
|
|
got := map[string]bool{}
|
|
chi.Walk(r, func(method, route string, _ http.Handler, _ ...func(http.Handler) http.Handler) error {
|
|
got[method+" "+route] = true
|
|
return nil
|
|
})
|
|
for sig := range want {
|
|
if !got[sig] {
|
|
t.Errorf("expected route %q mounted; got %v", sig, got)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestHandleRegister_BodyTooLarge(t *testing.T) {
|
|
h, _ := newTestHandlers(t)
|
|
r := mountedRouter(h)
|
|
srv := httptest.NewServer(r)
|
|
defer srv.Close()
|
|
|
|
// 5 MiB body — over the 4 MiB cap.
|
|
big := bytes.Repeat([]byte("x"), 5<<20)
|
|
resp, err := http.Post(srv.URL+"/catalog/register", "application/json", bytes.NewReader(big))
|
|
if err != nil {
|
|
t.Fatalf("POST: %v", err)
|
|
}
|
|
defer resp.Body.Close()
|
|
// MaxBytesReader trips during JSON decode → 400 with "body too large"
|
|
// in the message, OR 413 if Content-Length up-front cap is added.
|
|
// Today the path returns 400 via decode error; lock that contract.
|
|
if resp.StatusCode < 400 || resp.StatusCode >= 500 {
|
|
t.Errorf("expected 4xx on oversize body, got %d", resp.StatusCode)
|
|
}
|
|
}
|
|
|
|
func TestHandleRegister_MalformedJSON(t *testing.T) {
|
|
h, _ := newTestHandlers(t)
|
|
r := mountedRouter(h)
|
|
srv := httptest.NewServer(r)
|
|
defer srv.Close()
|
|
|
|
resp, err := http.Post(srv.URL+"/catalog/register",
|
|
"application/json", strings.NewReader("not json"))
|
|
if err != nil {
|
|
t.Fatalf("POST: %v", err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusBadRequest {
|
|
t.Errorf("expected 400 on malformed JSON, got %d", resp.StatusCode)
|
|
}
|
|
}
|
|
|
|
func TestHandleRegister_EmptyName_400(t *testing.T) {
|
|
h, _ := newTestHandlers(t)
|
|
r := mountedRouter(h)
|
|
srv := httptest.NewServer(r)
|
|
defer srv.Close()
|
|
|
|
body := `{"name":"","schema_fingerprint":"sha256:x","objects":[{"key":"k","size":1}]}`
|
|
resp, err := http.Post(srv.URL+"/catalog/register", "application/json", strings.NewReader(body))
|
|
if err != nil {
|
|
t.Fatalf("POST: %v", err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusBadRequest {
|
|
t.Errorf("expected 400 on empty name, got %d", resp.StatusCode)
|
|
}
|
|
}
|
|
|
|
func TestHandleGetManifest_404(t *testing.T) {
|
|
h, _ := newTestHandlers(t)
|
|
r := mountedRouter(h)
|
|
srv := httptest.NewServer(r)
|
|
defer srv.Close()
|
|
|
|
resp, err := http.Get(srv.URL + "/catalog/manifest/nonexistent")
|
|
if err != nil {
|
|
t.Fatalf("GET: %v", err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusNotFound {
|
|
t.Errorf("expected 404 for missing manifest, got %d", resp.StatusCode)
|
|
}
|
|
}
|
|
|
|
func TestHandleList_EmptyShape(t *testing.T) {
|
|
h, _ := newTestHandlers(t)
|
|
r := mountedRouter(h)
|
|
srv := httptest.NewServer(r)
|
|
defer srv.Close()
|
|
|
|
resp, err := http.Get(srv.URL + "/catalog/list")
|
|
if err != nil {
|
|
t.Fatalf("GET: %v", err)
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusOK {
|
|
t.Errorf("expected 200, got %d", resp.StatusCode)
|
|
}
|
|
if ct := resp.Header.Get("Content-Type"); !strings.HasPrefix(ct, "application/json") {
|
|
t.Errorf("Content-Type = %q, want application/json", ct)
|
|
}
|
|
}
|