Files
breakpilot-compliance/backend-compliance/tests/test_vvt_tenant_isolation.py
Sharang Parnerkar 3320ef94fc refactor: phase 0 guardrails + phase 1 step 2 (models.py split)
Squash of branch refactor/phase0-guardrails-and-models-split — 4 commits,
81 files, 173/173 pytest green, OpenAPI contract preserved (360 paths /
484 operations).

## Phase 0 — Architecture guardrails

Three defense-in-depth layers to keep the architecture rules enforced
regardless of who opens Claude Code in this repo:

  1. .claude/settings.json PreToolUse hook on Write/Edit blocks any file
     that would exceed the 500-line hard cap. Auto-loads in every Claude
     session in this repo.
  2. scripts/githooks/pre-commit (install via scripts/install-hooks.sh)
     enforces the LOC cap locally, freezes migrations/ without
     [migration-approved], and protects guardrail files without
     [guardrail-change].
  3. .gitea/workflows/ci.yaml gains loc-budget + guardrail-integrity +
     sbom-scan (syft+grype) jobs, adds mypy --strict for the new Python
     packages (compliance/{services,repositories,domain,schemas}), and
     tsc --noEmit for admin-compliance + developer-portal.

Per-language conventions documented in AGENTS.python.md, AGENTS.go.md,
AGENTS.typescript.md at the repo root — layering, tooling, and explicit
"what you may NOT do" lists. Root CLAUDE.md is prepended with the six
non-negotiable rules. Each of the 10 services gets a README.md.

scripts/check-loc.sh enforces soft 300 / hard 500 and surfaces the
current baseline of 205 hard + 161 soft violations so Phases 1-4 can
drain it incrementally. CI gates only CHANGED files in PRs so the
legacy baseline does not block unrelated work.

## Deprecation sweep

47 files. Pydantic V1 regex= -> pattern= (2 sites), class Config ->
ConfigDict in source_policy_router.py (schemas.py intentionally skipped;
it is the Phase 1 Step 3 split target). datetime.utcnow() ->
datetime.now(timezone.utc) everywhere including SQLAlchemy default=
callables. All DB columns already declare timezone=True, so this is a
latent-bug fix at the Python side, not a schema change.

DeprecationWarning count dropped from 158 to 35.

## Phase 1 Step 1 — Contract test harness

tests/contracts/test_openapi_baseline.py diffs the live FastAPI /openapi.json
against tests/contracts/openapi.baseline.json on every test run. Fails on
removed paths, removed status codes, or new required request body fields.
Regenerate only via tests/contracts/regenerate_baseline.py after a
consumer-updated contract change. This is the safety harness for all
subsequent refactor commits.

## Phase 1 Step 2 — models.py split (1466 -> 85 LOC shim)

compliance/db/models.py is decomposed into seven sibling aggregate modules
following the existing repo pattern (dsr_models.py, vvt_models.py, ...):

  regulation_models.py       (134) — Regulation, Requirement
  control_models.py          (279) — Control, Mapping, Evidence, Risk
  ai_system_models.py        (141) — AISystem, AuditExport
  service_module_models.py   (176) — ServiceModule, ModuleRegulation, ModuleRisk
  audit_session_models.py    (177) — AuditSession, AuditSignOff
  isms_governance_models.py  (323) — ISMSScope, Context, Policy, Objective, SoA
  isms_audit_models.py       (468) — Finding, CAPA, MgmtReview, InternalAudit,
                                     AuditTrail, Readiness

models.py becomes an 85-line re-export shim in dependency order so
existing imports continue to work unchanged. Schema is byte-identical:
__tablename__, column definitions, relationship strings, back_populates,
cascade directives all preserved.

All new sibling files are under the 500-line hard cap; largest is
isms_audit_models.py at 468. No file in compliance/db/ now exceeds
the hard cap.

## Phase 1 Step 3 — infrastructure only

backend-compliance/compliance/{schemas,domain,repositories}/ packages
are created as landing zones with docstrings. compliance/domain/
exports DomainError / NotFoundError / ConflictError / ValidationError /
PermissionError — the base classes services will use to raise
domain-level errors instead of HTTPException.

PHASE1_RUNBOOK.md at backend-compliance/PHASE1_RUNBOOK.md documents
the nine-step execution plan for Phase 1: snapshot baseline,
characterization tests, split models.py (this commit), split schemas.py
(next), extract services, extract repositories, mypy --strict, coverage.

## Verification

  backend-compliance/.venv-phase1: uv python install 3.12 + pip -r requirements.txt
  PYTHONPATH=. pytest compliance/tests/ tests/contracts/
  -> 173 passed, 0 failed, 35 warnings, OpenAPI 360/484 unchanged

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-07 13:18:29 +02:00

206 lines
7.5 KiB
Python

"""Tests for VVT tenant isolation (Phase 1: Multi-Tenancy Fix).
Verifies that:
- tenant_utils correctly validates and resolves tenant IDs
- VVT routes filter data by tenant_id
- One tenant cannot see another tenant's data
- "default" tenant_id is rejected
"""
import pytest
import uuid
from unittest.mock import MagicMock, AsyncMock, patch
from datetime import datetime, timezone
from fastapi import HTTPException
from fastapi.testclient import TestClient
from compliance.api.tenant_utils import get_tenant_id, _validate_tenant_id
# =============================================================================
# tenant_utils unit tests
# =============================================================================
TENANT_A = "9282a473-5c95-4b3a-bf78-0ecc0ec71d3e"
TENANT_B = "aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee"
class TestValidateTenantId:
def test_valid_uuid(self):
assert _validate_tenant_id(TENANT_A) == TENANT_A
def test_valid_uuid_uppercase(self):
upper = TENANT_A.upper()
assert _validate_tenant_id(upper) == upper
def test_reject_default_string(self):
with pytest.raises(HTTPException) as exc_info:
_validate_tenant_id("default")
assert exc_info.value.status_code == 400
assert "default" in str(exc_info.value.detail)
def test_reject_empty_string(self):
with pytest.raises(HTTPException) as exc_info:
_validate_tenant_id("")
assert exc_info.value.status_code == 400
def test_reject_random_string(self):
with pytest.raises(HTTPException) as exc_info:
_validate_tenant_id("my-tenant")
assert exc_info.value.status_code == 400
def test_reject_partial_uuid(self):
with pytest.raises(HTTPException) as exc_info:
_validate_tenant_id("9282a473-5c95-4b3a")
assert exc_info.value.status_code == 400
class TestGetTenantId:
@pytest.mark.asyncio
async def test_header_takes_precedence(self):
result = await get_tenant_id(x_tenant_id=TENANT_A, tenant_id=TENANT_B)
assert result == TENANT_A
@pytest.mark.asyncio
async def test_query_param_fallback(self):
result = await get_tenant_id(x_tenant_id=None, tenant_id=TENANT_B)
assert result == TENANT_B
@pytest.mark.asyncio
async def test_env_fallback(self):
result = await get_tenant_id(x_tenant_id=None, tenant_id=None)
# Falls back to ENV default which is the well-known dev UUID
assert result == TENANT_A
@pytest.mark.asyncio
async def test_reject_default_via_header(self):
with pytest.raises(HTTPException):
await get_tenant_id(x_tenant_id="default", tenant_id=None)
# =============================================================================
# VVT Model tests — tenant_id column present
# =============================================================================
class TestVVTModelsHaveTenantId:
def test_organization_has_tenant_id(self):
from compliance.db.vvt_models import VVTOrganizationDB
assert hasattr(VVTOrganizationDB, 'tenant_id')
col = VVTOrganizationDB.__table__.columns['tenant_id']
assert col.nullable is False
def test_activity_has_tenant_id(self):
from compliance.db.vvt_models import VVTActivityDB
assert hasattr(VVTActivityDB, 'tenant_id')
col = VVTActivityDB.__table__.columns['tenant_id']
assert col.nullable is False
def test_audit_log_has_tenant_id(self):
from compliance.db.vvt_models import VVTAuditLogDB
assert hasattr(VVTAuditLogDB, 'tenant_id')
col = VVTAuditLogDB.__table__.columns['tenant_id']
assert col.nullable is False
def test_activity_no_global_unique_vvt_id(self):
"""vvt_id should NOT have a global unique constraint anymore."""
from compliance.db.vvt_models import VVTActivityDB
col = VVTActivityDB.__table__.columns['vvt_id']
assert col.unique is not True # unique moved to composite constraint
# =============================================================================
# VVT Route integration tests — tenant isolation via mocked DB
# =============================================================================
def _make_activity(tenant_id, vvt_id="VVT-001", name="Test", **kwargs):
"""Create a mock VVTActivityDB."""
act = MagicMock()
act.id = uuid.uuid4()
act.tenant_id = tenant_id
act.vvt_id = vvt_id
act.name = name
act.description = kwargs.get("description", "")
act.purposes = kwargs.get("purposes", [])
act.legal_bases = kwargs.get("legal_bases", [])
act.data_subject_categories = []
act.personal_data_categories = []
act.recipient_categories = []
act.third_country_transfers = []
act.retention_period = {}
act.tom_description = None
act.business_function = kwargs.get("business_function", "IT")
act.systems = []
act.deployment_model = None
act.data_sources = []
act.data_flows = []
act.protection_level = "MEDIUM"
act.dpia_required = False
act.structured_toms = {}
act.status = kwargs.get("status", "DRAFT")
act.responsible = None
act.owner = None
act.last_reviewed_at = None
act.next_review_at = None
act.created_by = "system"
act.dsfa_id = None
act.created_at = datetime.now(timezone.utc)
act.updated_at = datetime.now(timezone.utc)
return act
class TestVVTRouteTenantIsolation:
"""Verify that _activity_to_response and _log_audit accept tenant_id."""
def test_activity_to_response(self):
from compliance.api.vvt_routes import _activity_to_response
act = _make_activity(TENANT_A, "VVT-100", "Test Activity")
resp = _activity_to_response(act)
assert resp.vvt_id == "VVT-100"
assert resp.name == "Test Activity"
def test_log_audit_with_tenant(self):
from compliance.api.vvt_routes import _log_audit
db = MagicMock()
_log_audit(db, tenant_id=TENANT_A, action="CREATE", entity_type="activity")
db.add.assert_called_once()
entry = db.add.call_args[0][0]
assert entry.tenant_id == TENANT_A
assert entry.action == "CREATE"
def test_log_audit_different_tenants(self):
from compliance.api.vvt_routes import _log_audit
db = MagicMock()
_log_audit(db, tenant_id=TENANT_A, action="CREATE", entity_type="activity")
_log_audit(db, tenant_id=TENANT_B, action="UPDATE", entity_type="activity")
assert db.add.call_count == 2
entries = [call[0][0] for call in db.add.call_args_list]
assert entries[0].tenant_id == TENANT_A
assert entries[1].tenant_id == TENANT_B
# =============================================================================
# DSFA / Vendor — DEFAULT_TENANT_ID no longer "default"
# =============================================================================
class TestDSFADefaultTenantFixed:
def test_dsfa_default_is_uuid(self):
from compliance.api.dsfa_routes import DEFAULT_TENANT_ID
assert DEFAULT_TENANT_ID != "default"
assert len(DEFAULT_TENANT_ID) == 36
assert "-" in DEFAULT_TENANT_ID
def test_dsfa_get_tenant_id_fallback(self):
from compliance.api.dsfa_routes import _get_tenant_id
result = _get_tenant_id(None)
assert result != "default"
assert len(result) == 36
class TestVendorDefaultTenantFixed:
def test_vendor_default_is_uuid(self):
from compliance.api.vendor_compliance_routes import DEFAULT_TENANT_ID
assert DEFAULT_TENANT_ID != "default"
assert len(DEFAULT_TENANT_ID) == 36
assert "-" in DEFAULT_TENANT_ID