Files
breakpilot-compliance/ai-compliance-sdk/internal/ucca/legal_rag_test.go
Benjamin Admin 49ce417428
All checks were successful
CI/CD / go-lint (push) Has been skipped
CI/CD / python-lint (push) Has been skipped
CI/CD / nodejs-lint (push) Has been skipped
CI/CD / test-go-ai-compliance (push) Successful in 32s
CI/CD / test-python-backend-compliance (push) Successful in 34s
CI/CD / test-python-document-crawler (push) Successful in 23s
CI/CD / test-python-dsms-gateway (push) Successful in 21s
CI/CD / validate-canonical-controls (push) Successful in 11s
CI/CD / Deploy (push) Successful in 2s
feat: add compliance modules 2-5 (dashboard, security templates, process manager, evidence collector)
Module 2: Extended Compliance Dashboard with roadmap, module-status, next-actions, snapshots, score-history
Module 3: 7 German security document templates (IT-Sicherheitskonzept, Datenschutz, Backup, Logging, Incident-Response, Zugriff, Risikomanagement)
Module 4: Compliance Process Manager with CRUD, complete/skip/seed, ~50 seed tasks, 3-tab UI
Module 5: Evidence Collector Extended with automated checks, control-mapping, coverage report, 4-tab UI

Also includes: canonical control library enhancements (verification method, categories, dedup), control generator improvements, RAG client extensions

52 tests pass, frontend builds clean.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-14 21:03:04 +01:00

337 lines
9.5 KiB
Go

package ucca
import (
"context"
"encoding/json"
"net/http"
"net/http/httptest"
"strings"
"testing"
)
func TestSearchCollection_UsesCorrectCollection(t *testing.T) {
// Track which collection was requested
var requestedURL string
// Mock Ollama (embedding)
ollamaMock := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
json.NewEncoder(w).Encode(ollamaEmbeddingResponse{
Embedding: make([]float64, 1024),
})
}))
defer ollamaMock.Close()
// Mock Qdrant
qdrantMock := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
requestedURL = r.URL.Path
json.NewEncoder(w).Encode(qdrantSearchResponse{
Result: []qdrantSearchHit{},
})
}))
defer qdrantMock.Close()
// Parse qdrant mock host/port
client := &LegalRAGClient{
qdrantURL: qdrantMock.URL,
ollamaURL: ollamaMock.URL,
embeddingModel: "bge-m3",
collection: "bp_compliance_ce",
httpClient: http.DefaultClient,
}
// Test with explicit collection
_, err := client.SearchCollection(context.Background(), "bp_compliance_recht", "test query", nil, 3)
if err != nil {
t.Fatalf("SearchCollection failed: %v", err)
}
if !strings.Contains(requestedURL, "/collections/bp_compliance_recht/") {
t.Errorf("Expected collection bp_compliance_recht in URL, got: %s", requestedURL)
}
}
func TestSearchCollection_FallbackDefault(t *testing.T) {
var requestedURL string
ollamaMock := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
json.NewEncoder(w).Encode(ollamaEmbeddingResponse{
Embedding: make([]float64, 1024),
})
}))
defer ollamaMock.Close()
qdrantMock := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
requestedURL = r.URL.Path
json.NewEncoder(w).Encode(qdrantSearchResponse{
Result: []qdrantSearchHit{},
})
}))
defer qdrantMock.Close()
client := &LegalRAGClient{
qdrantURL: qdrantMock.URL,
ollamaURL: ollamaMock.URL,
embeddingModel: "bge-m3",
collection: "bp_compliance_ce",
httpClient: http.DefaultClient,
}
// Test with empty collection (should fall back to default)
_, err := client.SearchCollection(context.Background(), "", "test query", nil, 3)
if err != nil {
t.Fatalf("SearchCollection failed: %v", err)
}
if !strings.Contains(requestedURL, "/collections/bp_compliance_ce/") {
t.Errorf("Expected default collection bp_compliance_ce in URL, got: %s", requestedURL)
}
}
func TestScrollChunks_ReturnsChunksAndNextOffset(t *testing.T) {
qdrantMock := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if !strings.Contains(r.URL.Path, "/points/scroll") {
t.Errorf("Expected scroll endpoint, got: %s", r.URL.Path)
}
// Decode request to verify fields
var reqBody map[string]interface{}
json.NewDecoder(r.Body).Decode(&reqBody)
if reqBody["with_vectors"] != false {
t.Error("Expected with_vectors=false")
}
if reqBody["with_payload"] != true {
t.Error("Expected with_payload=true")
}
resp := map[string]interface{}{
"result": map[string]interface{}{
"points": []map[string]interface{}{
{
"id": "abc-123",
"payload": map[string]interface{}{
"text": "Artikel 35 DSGVO",
"regulation_code": "eu_2016_679",
"regulation_name": "DSGVO",
"regulation_short": "DSGVO",
"category": "regulation",
"article": "Art. 35",
"paragraph": "1",
"source_url": "https://example.com/dsgvo",
},
},
{
"id": "def-456",
"payload": map[string]interface{}{
"chunk_text": "AI Act Titel III",
"regulation_id": "eu_2024_1689",
"regulation_name_de": "KI-Verordnung",
"regulation_short": "AI Act",
"category": "regulation",
"source": "https://example.com/ai-act",
},
},
},
"next_page_offset": "def-456",
},
}
json.NewEncoder(w).Encode(resp)
}))
defer qdrantMock.Close()
client := &LegalRAGClient{
qdrantURL: qdrantMock.URL,
httpClient: http.DefaultClient,
}
chunks, nextOffset, err := client.ScrollChunks(context.Background(), "bp_compliance_ce", "", 100)
if err != nil {
t.Fatalf("ScrollChunks failed: %v", err)
}
if len(chunks) != 2 {
t.Fatalf("Expected 2 chunks, got %d", len(chunks))
}
// First chunk uses direct field names
if chunks[0].ID != "abc-123" {
t.Errorf("Expected ID abc-123, got %s", chunks[0].ID)
}
if chunks[0].Text != "Artikel 35 DSGVO" {
t.Errorf("Expected text 'Artikel 35 DSGVO', got '%s'", chunks[0].Text)
}
if chunks[0].RegulationCode != "eu_2016_679" {
t.Errorf("Expected regulation_code eu_2016_679, got %s", chunks[0].RegulationCode)
}
if chunks[0].Article != "Art. 35" {
t.Errorf("Expected article 'Art. 35', got '%s'", chunks[0].Article)
}
// Second chunk uses fallback field names (chunk_text, regulation_id, etc.)
if chunks[1].Text != "AI Act Titel III" {
t.Errorf("Expected fallback text 'AI Act Titel III', got '%s'", chunks[1].Text)
}
if chunks[1].RegulationCode != "eu_2024_1689" {
t.Errorf("Expected fallback regulation_code eu_2024_1689, got '%s'", chunks[1].RegulationCode)
}
if chunks[1].RegulationName != "KI-Verordnung" {
t.Errorf("Expected fallback regulation_name 'KI-Verordnung', got '%s'", chunks[1].RegulationName)
}
if nextOffset != "def-456" {
t.Errorf("Expected next_offset 'def-456', got '%s'", nextOffset)
}
}
func TestScrollChunks_EmptyCollection_ReturnsEmpty(t *testing.T) {
qdrantMock := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
resp := map[string]interface{}{
"result": map[string]interface{}{
"points": []interface{}{},
"next_page_offset": nil,
},
}
json.NewEncoder(w).Encode(resp)
}))
defer qdrantMock.Close()
client := &LegalRAGClient{
qdrantURL: qdrantMock.URL,
httpClient: http.DefaultClient,
}
chunks, nextOffset, err := client.ScrollChunks(context.Background(), "bp_compliance_ce", "", 100)
if err != nil {
t.Fatalf("ScrollChunks failed: %v", err)
}
if len(chunks) != 0 {
t.Errorf("Expected 0 chunks, got %d", len(chunks))
}
if nextOffset != "" {
t.Errorf("Expected empty next_offset, got '%s'", nextOffset)
}
}
func TestScrollChunks_WithOffset_SendsOffset(t *testing.T) {
var receivedBody map[string]interface{}
qdrantMock := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
json.NewDecoder(r.Body).Decode(&receivedBody)
resp := map[string]interface{}{
"result": map[string]interface{}{
"points": []interface{}{},
"next_page_offset": nil,
},
}
json.NewEncoder(w).Encode(resp)
}))
defer qdrantMock.Close()
client := &LegalRAGClient{
qdrantURL: qdrantMock.URL,
httpClient: http.DefaultClient,
}
_, _, err := client.ScrollChunks(context.Background(), "bp_compliance_ce", "some-offset-id", 50)
if err != nil {
t.Fatalf("ScrollChunks failed: %v", err)
}
if receivedBody["offset"] != "some-offset-id" {
t.Errorf("Expected offset 'some-offset-id', got '%v'", receivedBody["offset"])
}
if receivedBody["limit"] != float64(50) {
t.Errorf("Expected limit 50, got %v", receivedBody["limit"])
}
}
func TestScrollChunks_SendsAPIKey(t *testing.T) {
var receivedAPIKey string
qdrantMock := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
receivedAPIKey = r.Header.Get("api-key")
resp := map[string]interface{}{
"result": map[string]interface{}{
"points": []interface{}{},
"next_page_offset": nil,
},
}
json.NewEncoder(w).Encode(resp)
}))
defer qdrantMock.Close()
client := &LegalRAGClient{
qdrantURL: qdrantMock.URL,
qdrantAPIKey: "test-api-key-123",
httpClient: http.DefaultClient,
}
_, _, err := client.ScrollChunks(context.Background(), "bp_compliance_ce", "", 10)
if err != nil {
t.Fatalf("ScrollChunks failed: %v", err)
}
if receivedAPIKey != "test-api-key-123" {
t.Errorf("Expected api-key 'test-api-key-123', got '%s'", receivedAPIKey)
}
}
func TestSearch_StillWorks(t *testing.T) {
var requestedURL string
ollamaMock := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
json.NewEncoder(w).Encode(ollamaEmbeddingResponse{
Embedding: make([]float64, 1024),
})
}))
defer ollamaMock.Close()
qdrantMock := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
requestedURL = r.URL.Path
json.NewEncoder(w).Encode(qdrantSearchResponse{
Result: []qdrantSearchHit{
{
ID: "1",
Score: 0.95,
Payload: map[string]interface{}{
"chunk_text": "Test content",
"regulation_id": "eu_2016_679",
"regulation_name_de": "DSGVO",
"regulation_short": "DSGVO",
"category": "regulation",
"source": "https://example.com",
},
},
},
})
}))
defer qdrantMock.Close()
client := &LegalRAGClient{
qdrantURL: qdrantMock.URL,
ollamaURL: ollamaMock.URL,
embeddingModel: "bge-m3",
collection: "bp_compliance_ce",
httpClient: http.DefaultClient,
}
results, err := client.Search(context.Background(), "DSGVO Art. 35", nil, 5)
if err != nil {
t.Fatalf("Search failed: %v", err)
}
if len(results) != 1 {
t.Fatalf("Expected 1 result, got %d", len(results))
}
if results[0].RegulationCode != "eu_2016_679" {
t.Errorf("Expected regulation_code eu_2016_679, got %s", results[0].RegulationCode)
}
if !strings.Contains(requestedURL, "/collections/bp_compliance_ce/") {
t.Errorf("Expected default collection in URL, got: %s", requestedURL)
}
}