A previous `git pull --rebase origin main` dropped 177 local commits,
losing 3400+ files across admin-v2, backend, studio-v2, website,
klausur-service, and many other services. The partial restore attempt
(660295e2) only recovered some files.
This commit restores all missing files from pre-rebase ref 98933f5e
while preserving post-rebase additions (night-scheduler, night-mode UI,
NightModeWidget dashboard integration).
Restored features include:
- AI Module Sidebar (FAB), OCR Labeling, OCR Compare
- GPU Dashboard, RAG Pipeline, Magic Help
- Klausur-Korrektur (8 files), Abitur-Archiv (5+ files)
- Companion, Zeugnisse-Crawler, Screen Flow
- Full backend, studio-v2, website, klausur-service
- All compliance SDKs, agent-core, voice-service
- CI/CD configs, documentation, scripts
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
435 lines
14 KiB
Python
435 lines
14 KiB
Python
"""
|
|
Tests for the AutoRiskUpdater Service.
|
|
|
|
Sprint 6: CI/CD Evidence Collection & Automatic Risk Updates (2026-01-18)
|
|
"""
|
|
|
|
import pytest
|
|
from datetime import datetime
|
|
from unittest.mock import MagicMock, patch
|
|
from uuid import uuid4
|
|
|
|
from ..services.auto_risk_updater import (
|
|
AutoRiskUpdater,
|
|
ScanType,
|
|
FindingSeverity,
|
|
ScanResult,
|
|
RiskUpdateResult,
|
|
CONTROL_SCAN_MAPPING,
|
|
)
|
|
from ..db.models import (
|
|
ControlDB, ControlStatusEnum,
|
|
EvidenceDB, EvidenceStatusEnum,
|
|
RiskDB, RiskLevelEnum,
|
|
)
|
|
|
|
|
|
class TestDetermineControlStatus:
|
|
"""Tests for _determine_control_status method."""
|
|
|
|
def test_critical_findings_return_fail(self):
|
|
"""Any critical finding should result in FAIL status."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
findings = {"critical": 1, "high": 0, "medium": 0, "low": 0}
|
|
result = updater._determine_control_status(findings)
|
|
|
|
assert result == ControlStatusEnum.FAIL.value
|
|
|
|
def test_multiple_critical_findings_return_fail(self):
|
|
"""Multiple critical findings should result in FAIL status."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
findings = {"critical": 5, "high": 2, "medium": 10, "low": 50}
|
|
result = updater._determine_control_status(findings)
|
|
|
|
assert result == ControlStatusEnum.FAIL.value
|
|
|
|
def test_more_than_5_high_findings_return_fail(self):
|
|
"""More than 5 HIGH findings should result in FAIL status."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
findings = {"critical": 0, "high": 6, "medium": 0, "low": 0}
|
|
result = updater._determine_control_status(findings)
|
|
|
|
assert result == ControlStatusEnum.FAIL.value
|
|
|
|
def test_exactly_5_high_findings_return_partial(self):
|
|
"""Exactly 5 HIGH findings should result in PARTIAL status."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
findings = {"critical": 0, "high": 5, "medium": 0, "low": 0}
|
|
result = updater._determine_control_status(findings)
|
|
|
|
assert result == ControlStatusEnum.PARTIAL.value
|
|
|
|
def test_1_to_5_high_findings_return_partial(self):
|
|
"""1-5 HIGH findings should result in PARTIAL status."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
for high_count in [1, 2, 3, 4, 5]:
|
|
findings = {"critical": 0, "high": high_count, "medium": 0, "low": 0}
|
|
result = updater._determine_control_status(findings)
|
|
assert result == ControlStatusEnum.PARTIAL.value, f"Failed for {high_count} HIGH findings"
|
|
|
|
def test_more_than_10_medium_findings_return_partial(self):
|
|
"""More than 10 MEDIUM findings should result in PARTIAL status."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
findings = {"critical": 0, "high": 0, "medium": 11, "low": 0}
|
|
result = updater._determine_control_status(findings)
|
|
|
|
assert result == ControlStatusEnum.PARTIAL.value
|
|
|
|
def test_only_medium_and_low_findings_return_pass(self):
|
|
"""Only MEDIUM (<=10) and LOW findings should result in PASS status."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
findings = {"critical": 0, "high": 0, "medium": 5, "low": 100}
|
|
result = updater._determine_control_status(findings)
|
|
|
|
assert result == ControlStatusEnum.PASS.value
|
|
|
|
def test_no_findings_return_pass(self):
|
|
"""No findings should result in PASS status."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
findings = {"critical": 0, "high": 0, "medium": 0, "low": 0}
|
|
result = updater._determine_control_status(findings)
|
|
|
|
assert result == ControlStatusEnum.PASS.value
|
|
|
|
def test_empty_findings_return_pass(self):
|
|
"""Empty findings dict should result in PASS status."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
findings = {}
|
|
result = updater._determine_control_status(findings)
|
|
|
|
assert result == ControlStatusEnum.PASS.value
|
|
|
|
|
|
class TestGenerateStatusNotes:
|
|
"""Tests for _generate_status_notes method."""
|
|
|
|
def test_notes_include_tool_name(self):
|
|
"""Status notes should include the scan tool name."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
scan_result = ScanResult(
|
|
scan_type=ScanType.SAST,
|
|
tool="Semgrep",
|
|
timestamp=datetime(2026, 1, 18, 14, 30),
|
|
commit_sha="abc123",
|
|
branch="main",
|
|
control_id="SDLC-001",
|
|
findings={"critical": 1, "high": 2, "medium": 0, "low": 0},
|
|
)
|
|
|
|
notes = updater._generate_status_notes(scan_result)
|
|
|
|
assert "Semgrep" in notes
|
|
assert "1 CRITICAL" in notes
|
|
assert "2 HIGH" in notes
|
|
|
|
def test_notes_include_timestamp(self):
|
|
"""Status notes should include scan timestamp."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
scan_result = ScanResult(
|
|
scan_type=ScanType.DEPENDENCY,
|
|
tool="Trivy",
|
|
timestamp=datetime(2026, 1, 18, 10, 0),
|
|
commit_sha="def456",
|
|
branch="develop",
|
|
control_id="SDLC-002",
|
|
findings={"critical": 0, "high": 3, "medium": 5, "low": 10},
|
|
)
|
|
|
|
notes = updater._generate_status_notes(scan_result)
|
|
|
|
assert "2026-01-18 10:00" in notes
|
|
|
|
def test_notes_for_no_findings(self):
|
|
"""Status notes for no findings should indicate clean scan."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
scan_result = ScanResult(
|
|
scan_type=ScanType.SECRET,
|
|
tool="Gitleaks",
|
|
timestamp=datetime(2026, 1, 18, 12, 0),
|
|
commit_sha="ghi789",
|
|
branch="main",
|
|
control_id="SDLC-003",
|
|
findings={"critical": 0, "high": 0, "medium": 0, "low": 0},
|
|
)
|
|
|
|
notes = updater._generate_status_notes(scan_result)
|
|
|
|
assert "No significant findings" in notes
|
|
|
|
|
|
class TestGenerateAlerts:
|
|
"""Tests for _generate_alerts method."""
|
|
|
|
def test_alert_for_critical_findings(self):
|
|
"""Critical findings should generate an alert."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
scan_result = ScanResult(
|
|
scan_type=ScanType.DEPENDENCY,
|
|
tool="Trivy",
|
|
timestamp=datetime.utcnow(),
|
|
commit_sha="abc123",
|
|
branch="main",
|
|
control_id="SDLC-002",
|
|
findings={"critical": 2, "high": 0, "medium": 0, "low": 0},
|
|
)
|
|
|
|
alerts = updater._generate_alerts(scan_result, ControlStatusEnum.FAIL.value)
|
|
|
|
assert len(alerts) >= 1
|
|
assert any("CRITICAL" in alert for alert in alerts)
|
|
assert any("2 critical" in alert.lower() for alert in alerts)
|
|
|
|
def test_alert_for_fail_status(self):
|
|
"""Control status change to FAIL should generate an alert."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
scan_result = ScanResult(
|
|
scan_type=ScanType.SAST,
|
|
tool="Semgrep",
|
|
timestamp=datetime.utcnow(),
|
|
commit_sha="def456",
|
|
branch="main",
|
|
control_id="SDLC-001",
|
|
findings={"critical": 0, "high": 10, "medium": 0, "low": 0},
|
|
)
|
|
|
|
alerts = updater._generate_alerts(scan_result, ControlStatusEnum.FAIL.value)
|
|
|
|
assert any("FAIL" in alert for alert in alerts)
|
|
|
|
def test_alert_for_many_high_findings(self):
|
|
"""More than 10 HIGH findings should generate an alert."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
scan_result = ScanResult(
|
|
scan_type=ScanType.CONTAINER,
|
|
tool="Trivy",
|
|
timestamp=datetime.utcnow(),
|
|
commit_sha="ghi789",
|
|
branch="main",
|
|
control_id="SDLC-006",
|
|
findings={"critical": 0, "high": 15, "medium": 0, "low": 0},
|
|
)
|
|
|
|
alerts = updater._generate_alerts(scan_result, ControlStatusEnum.FAIL.value)
|
|
|
|
assert any("HIGH" in alert and "15" in alert for alert in alerts)
|
|
|
|
def test_no_alert_for_pass_with_low_findings(self):
|
|
"""No alert should be generated for PASS status with only low findings."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
scan_result = ScanResult(
|
|
scan_type=ScanType.SAST,
|
|
tool="Semgrep",
|
|
timestamp=datetime.utcnow(),
|
|
commit_sha="jkl012",
|
|
branch="main",
|
|
control_id="SDLC-001",
|
|
findings={"critical": 0, "high": 0, "medium": 5, "low": 20},
|
|
)
|
|
|
|
alerts = updater._generate_alerts(scan_result, ControlStatusEnum.PASS.value)
|
|
|
|
assert len(alerts) == 0
|
|
|
|
|
|
class TestControlScanMapping:
|
|
"""Tests for CONTROL_SCAN_MAPPING constant."""
|
|
|
|
def test_sdlc_001_maps_to_sast(self):
|
|
"""SDLC-001 should map to SAST scan type."""
|
|
assert CONTROL_SCAN_MAPPING["SDLC-001"] == ScanType.SAST
|
|
|
|
def test_sdlc_002_maps_to_dependency(self):
|
|
"""SDLC-002 should map to DEPENDENCY scan type."""
|
|
assert CONTROL_SCAN_MAPPING["SDLC-002"] == ScanType.DEPENDENCY
|
|
|
|
def test_sdlc_003_maps_to_secret(self):
|
|
"""SDLC-003 should map to SECRET scan type."""
|
|
assert CONTROL_SCAN_MAPPING["SDLC-003"] == ScanType.SECRET
|
|
|
|
def test_sdlc_006_maps_to_container(self):
|
|
"""SDLC-006 should map to CONTAINER scan type."""
|
|
assert CONTROL_SCAN_MAPPING["SDLC-006"] == ScanType.CONTAINER
|
|
|
|
def test_cra_001_maps_to_sbom(self):
|
|
"""CRA-001 should map to SBOM scan type."""
|
|
assert CONTROL_SCAN_MAPPING["CRA-001"] == ScanType.SBOM
|
|
|
|
|
|
class TestProcessEvidenceCollectRequest:
|
|
"""Tests for process_evidence_collect_request method."""
|
|
|
|
def test_parses_iso_timestamp(self):
|
|
"""Should correctly parse ISO format timestamps."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
|
|
# Mock the control repo to return None (control not found)
|
|
updater.control_repo.get_by_control_id = MagicMock(return_value=None)
|
|
|
|
result = updater.process_evidence_collect_request(
|
|
tool="Semgrep",
|
|
control_id="SDLC-001",
|
|
evidence_type="ci_semgrep",
|
|
timestamp="2026-01-18T14:30:00Z",
|
|
commit_sha="abc123",
|
|
findings={"critical": 0, "high": 0, "medium": 0, "low": 0},
|
|
)
|
|
|
|
# Control not found, so control_updated should be False
|
|
assert result.control_updated is False
|
|
|
|
def test_handles_invalid_timestamp(self):
|
|
"""Should handle invalid timestamps gracefully."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
updater.control_repo.get_by_control_id = MagicMock(return_value=None)
|
|
|
|
# Should not raise exception
|
|
result = updater.process_evidence_collect_request(
|
|
tool="Trivy",
|
|
control_id="SDLC-002",
|
|
evidence_type="ci_trivy",
|
|
timestamp="invalid-timestamp",
|
|
commit_sha="def456",
|
|
findings={"critical": 0, "high": 0, "medium": 0, "low": 0},
|
|
)
|
|
|
|
assert result is not None
|
|
|
|
def test_control_not_found_returns_result(self):
|
|
"""Should return appropriate result when control is not found."""
|
|
db = MagicMock()
|
|
updater = AutoRiskUpdater(db)
|
|
updater.control_repo.get_by_control_id = MagicMock(return_value=None)
|
|
|
|
result = updater.process_evidence_collect_request(
|
|
tool="Gitleaks",
|
|
control_id="UNKNOWN-001",
|
|
evidence_type="ci_gitleaks",
|
|
timestamp="2026-01-18T10:00:00Z",
|
|
commit_sha="ghi789",
|
|
findings={"critical": 0, "high": 0, "medium": 0, "low": 0},
|
|
)
|
|
|
|
assert result.control_id == "UNKNOWN-001"
|
|
assert result.control_updated is False
|
|
assert "not found" in result.message
|
|
|
|
|
|
class TestScanResult:
|
|
"""Tests for ScanResult dataclass."""
|
|
|
|
def test_scan_result_creation(self):
|
|
"""Should create ScanResult with all required fields."""
|
|
result = ScanResult(
|
|
scan_type=ScanType.SAST,
|
|
tool="Semgrep",
|
|
timestamp=datetime(2026, 1, 18, 14, 0),
|
|
commit_sha="abc123def456",
|
|
branch="main",
|
|
control_id="SDLC-001",
|
|
findings={"critical": 0, "high": 2, "medium": 5, "low": 10},
|
|
)
|
|
|
|
assert result.scan_type == ScanType.SAST
|
|
assert result.tool == "Semgrep"
|
|
assert result.control_id == "SDLC-001"
|
|
assert result.findings["high"] == 2
|
|
|
|
def test_scan_result_optional_fields(self):
|
|
"""Should handle optional fields correctly."""
|
|
result = ScanResult(
|
|
scan_type=ScanType.DEPENDENCY,
|
|
tool="Trivy",
|
|
timestamp=datetime.utcnow(),
|
|
commit_sha="xyz789",
|
|
branch="develop",
|
|
control_id="SDLC-002",
|
|
findings={"critical": 1},
|
|
raw_report={"vulnerabilities": []},
|
|
ci_job_id="github-actions-12345",
|
|
)
|
|
|
|
assert result.raw_report is not None
|
|
assert result.ci_job_id == "github-actions-12345"
|
|
|
|
|
|
class TestRiskUpdateResult:
|
|
"""Tests for RiskUpdateResult dataclass."""
|
|
|
|
def test_risk_update_result_creation(self):
|
|
"""Should create RiskUpdateResult with all fields."""
|
|
result = RiskUpdateResult(
|
|
control_id="SDLC-001",
|
|
control_updated=True,
|
|
old_status="pass",
|
|
new_status="fail",
|
|
evidence_created=True,
|
|
evidence_id="ev-12345",
|
|
risks_affected=["RISK-001", "RISK-002"],
|
|
alerts_generated=["Critical vulnerability found"],
|
|
message="Processed successfully",
|
|
)
|
|
|
|
assert result.control_updated is True
|
|
assert result.old_status == "pass"
|
|
assert result.new_status == "fail"
|
|
assert len(result.risks_affected) == 2
|
|
assert len(result.alerts_generated) == 1
|
|
|
|
|
|
class TestFindingSeverity:
|
|
"""Tests for FindingSeverity enum."""
|
|
|
|
def test_severity_levels(self):
|
|
"""Should have all expected severity levels."""
|
|
assert FindingSeverity.CRITICAL.value == "critical"
|
|
assert FindingSeverity.HIGH.value == "high"
|
|
assert FindingSeverity.MEDIUM.value == "medium"
|
|
assert FindingSeverity.LOW.value == "low"
|
|
assert FindingSeverity.INFO.value == "info"
|
|
|
|
|
|
class TestScanType:
|
|
"""Tests for ScanType enum."""
|
|
|
|
def test_scan_types(self):
|
|
"""Should have all expected scan types."""
|
|
assert ScanType.SAST.value == "sast"
|
|
assert ScanType.DEPENDENCY.value == "dependency"
|
|
assert ScanType.SECRET.value == "secret"
|
|
assert ScanType.CONTAINER.value == "container"
|
|
assert ScanType.SBOM.value == "sbom"
|