Files
MyGoNavi/internal/app/methods_jvm_test.go
Syngnat ffc4f2c2d9 🐛 fix(jvm): 强化变更确认令牌校验
将 JVM 变更确认从可重算校验值升级为服务端发放的一次性令牌,避免未预览、重放或上下文变更后继续执行高风险变更。
2026-04-28 09:42:21 +08:00

1884 lines
54 KiB
Go

package app
import (
"context"
"errors"
"fmt"
"os"
"path/filepath"
"strings"
"testing"
"time"
"GoNavi-Wails/internal/connection"
"GoNavi-Wails/internal/jvm"
)
type fakeJVMProvider struct {
testErr error
probe []jvm.Capability
probeErr error
list []jvm.ResourceSummary
listErr error
value jvm.ValueSnapshot
valueErr error
preview jvm.ChangePreview
previewSet bool
previewErr error
apply jvm.ApplyResult
applyErr error
applyFn func(context.Context, connection.ConnectionConfig, jvm.ChangeRequest) (jvm.ApplyResult, error)
previewReq *jvm.ChangeRequest
applyReq *jvm.ChangeRequest
}
func (f fakeJVMProvider) Mode() string { return jvm.ModeJMX }
func (f fakeJVMProvider) TestConnection(context.Context, connection.ConnectionConfig) error {
return f.testErr
}
func (f fakeJVMProvider) ProbeCapabilities(context.Context, connection.ConnectionConfig) ([]jvm.Capability, error) {
return f.probe, f.probeErr
}
func (f fakeJVMProvider) ListResources(context.Context, connection.ConnectionConfig, string) ([]jvm.ResourceSummary, error) {
return f.list, f.listErr
}
func (f fakeJVMProvider) GetValue(context.Context, connection.ConnectionConfig, string) (jvm.ValueSnapshot, error) {
return f.value, f.valueErr
}
func (f fakeJVMProvider) PreviewChange(_ context.Context, _ connection.ConnectionConfig, req jvm.ChangeRequest) (jvm.ChangePreview, error) {
if f.previewReq != nil {
*f.previewReq = req
}
if !f.previewSet {
return jvm.ChangePreview{Allowed: true, Summary: "preview", RiskLevel: "low"}, f.previewErr
}
return f.preview, f.previewErr
}
func (f fakeJVMProvider) ApplyChange(ctx context.Context, cfg connection.ConnectionConfig, req jvm.ChangeRequest) (jvm.ApplyResult, error) {
if f.applyReq != nil {
*f.applyReq = req
}
if f.applyFn != nil {
return f.applyFn(ctx, cfg, req)
}
return f.apply, f.applyErr
}
func swapJVMProviderFactory(factory func(mode string) (jvm.Provider, error)) func() {
prev := newJVMProvider
newJVMProvider = factory
return func() { newJVMProvider = prev }
}
func forceAuditAppendFailureAfterPending(t *testing.T, auditDir string) {
t.Helper()
auditPath := filepath.Join(auditDir, "jvm_audit.jsonl")
if err := os.Remove(auditPath); err != nil && !errors.Is(err, os.ErrNotExist) {
t.Fatalf("Remove audit file returned error: %v", err)
}
if err := os.RemoveAll(auditDir); err != nil {
t.Fatalf("RemoveAll audit dir returned error: %v", err)
}
if err := os.WriteFile(auditDir, []byte("blocker"), 0o600); err != nil {
t.Fatalf("WriteFile audit dir blocker returned error: %v", err)
}
}
func TestTestJVMConnectionUsesPreferredProvider(t *testing.T) {
app := NewAppWithSecretStore(nil)
var gotMode string
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
gotMode = mode
return fakeJVMProvider{}, nil
})
defer restore()
res := app.TestJVMConnection(connection.ConnectionConfig{
Type: "jvm",
Host: "orders.internal",
JVM: connection.JVMConfig{
PreferredMode: "endpoint",
AllowedModes: []string{"jmx", "endpoint"},
},
})
if !res.Success {
t.Fatalf("expected success, got %+v", res)
}
if gotMode != "endpoint" {
t.Fatalf("expected provider mode endpoint, got %q", gotMode)
}
if res.Message != "JVM 连接成功" {
t.Fatalf("expected success message %q, got %q", "JVM 连接成功", res.Message)
}
}
func TestTestJVMConnectionReturnsProviderError(t *testing.T) {
app := NewAppWithSecretStore(nil)
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{testErr: errors.New("dial failed")}, nil
})
defer restore()
res := app.TestJVMConnection(connection.ConnectionConfig{
Type: "jvm",
Host: "orders.internal",
JVM: connection.JVMConfig{
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
})
if res.Success {
t.Fatalf("expected failure, got %+v", res)
}
if res.Message != "dial failed" {
t.Fatalf("expected message %q, got %q", "dial failed", res.Message)
}
}
func TestTestJVMConnectionTranslatesJMXBusinessPortError(t *testing.T) {
app := NewAppWithSecretStore(nil)
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{testErr: errors.New("jmx test connection failed: jmx helper ping failed for localhost:18080: JMX command ping failed for localhost:18080: Failed to retrieve RMIServer stub: javax.naming.CommunicationException [Root exception is java.rmi.ConnectIOException: non-JRMP server at remote endpoint]; details={\"exception\":\"java.lang.IllegalStateException\"}")}, nil
})
defer restore()
res := app.TestJVMConnection(connection.ConnectionConfig{
Type: "jvm",
Host: "localhost",
Port: 18080,
JVM: connection.JVMConfig{
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
})
if res.Success {
t.Fatalf("expected failure, got %+v", res)
}
if !strings.Contains(res.Message, "不是标准 JMX 远程管理端口") {
t.Fatalf("expected translated summary, got %q", res.Message)
}
if !strings.Contains(res.Message, "业务 `server.port`") {
t.Fatalf("expected actionable suggestion, got %q", res.Message)
}
if !strings.Contains(res.Message, "技术细节:") {
t.Fatalf("expected raw technical detail to be preserved, got %q", res.Message)
}
}
func TestTestJVMConnectionTranslatesAgentConnectionRefused(t *testing.T) {
app := NewAppWithSecretStore(nil)
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{testErr: errors.New("agent probe request failed: Get \"http://127.0.0.1:19090/gonavi/agent/jvm\": dial tcp 127.0.0.1:19090: connect: connection refused")}, nil
})
defer restore()
res := app.TestJVMConnection(connection.ConnectionConfig{
Type: "jvm",
Host: "127.0.0.1",
JVM: connection.JVMConfig{
PreferredMode: "agent",
AllowedModes: []string{"agent"},
},
})
if res.Success {
t.Fatalf("expected failure, got %+v", res)
}
if !strings.Contains(res.Message, "目标 Agent 管理端口未监听") {
t.Fatalf("expected translated summary, got %q", res.Message)
}
if !strings.Contains(res.Message, "`-javaagent`") {
t.Fatalf("expected actionable suggestion, got %q", res.Message)
}
}
func TestTestJVMConnectionReturnsProviderFactoryError(t *testing.T) {
app := NewAppWithSecretStore(nil)
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return nil, errors.New("factory unavailable")
})
defer restore()
res := app.TestJVMConnection(connection.ConnectionConfig{
Type: "jvm",
Host: "orders.internal",
JVM: connection.JVMConfig{
PreferredMode: "endpoint",
AllowedModes: []string{"endpoint"},
},
})
if res.Success {
t.Fatalf("expected failure, got %+v", res)
}
if res.Message != "factory unavailable" {
t.Fatalf("expected message %q, got %q", "factory unavailable", res.Message)
}
}
func TestJVMProbeCapabilitiesReturnsCapabilityArray(t *testing.T) {
app := NewAppWithSecretStore(nil)
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
probe: []jvm.Capability{{Mode: jvm.ModeJMX, CanBrowse: true, CanWrite: false, CanPreview: false, DisplayLabel: "JMX"}},
}, nil
})
defer restore()
res := app.JVMProbeCapabilities(connection.ConnectionConfig{
Type: "jvm",
Host: "orders.internal",
JVM: connection.JVMConfig{
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
})
if !res.Success {
t.Fatalf("expected success, got %+v", res)
}
items, ok := res.Data.([]jvm.Capability)
if !ok || len(items) != 1 {
t.Fatalf("expected one capability, got %#v", res.Data)
}
}
func TestJVMProbeCapabilitiesIncludesReasonWhenProbeFails(t *testing.T) {
app := NewAppWithSecretStore(nil)
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
probeErr: errors.New("probe failed"),
}, nil
})
defer restore()
res := app.JVMProbeCapabilities(connection.ConnectionConfig{
Type: "jvm",
Host: "orders.internal",
JVM: connection.JVMConfig{
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
})
if !res.Success {
t.Fatalf("expected success, got %+v", res)
}
items, ok := res.Data.([]jvm.Capability)
if !ok || len(items) != 1 {
t.Fatalf("expected one capability, got %#v", res.Data)
}
if items[0].Reason != "probe failed" {
t.Fatalf("expected reason %q, got %#v", "probe failed", items[0])
}
}
func TestJVMProbeCapabilitiesTranslatesJMXProbeErrorUsingCurrentMode(t *testing.T) {
app := NewAppWithSecretStore(nil)
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
probeErr: errors.New("jmx test connection failed: jmx helper ping failed for localhost:18080: JMX command ping failed for localhost:18080: Failed to retrieve RMIServer stub: javax.naming.CommunicationException [Root exception is java.rmi.ConnectIOException: non-JRMP server at remote endpoint]; details={\"exception\":\"java.lang.IllegalStateException\"}"),
}, nil
})
defer restore()
res := app.JVMProbeCapabilities(connection.ConnectionConfig{
Type: "jvm",
Host: "localhost",
Port: 18080,
JVM: connection.JVMConfig{
PreferredMode: "endpoint",
AllowedModes: []string{"jmx"},
},
})
if !res.Success {
t.Fatalf("expected success, got %+v", res)
}
items, ok := res.Data.([]jvm.Capability)
if !ok || len(items) != 1 {
t.Fatalf("expected one capability, got %#v", res.Data)
}
if !strings.Contains(items[0].Reason, "不是标准 JMX 远程管理端口") {
t.Fatalf("expected translated JMX reason, got %#v", items[0])
}
}
func TestJVMProbeCapabilitiesIncludesReasonWhenProviderFactoryFails(t *testing.T) {
app := NewAppWithSecretStore(nil)
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return nil, errors.New("provider disabled")
})
defer restore()
res := app.JVMProbeCapabilities(connection.ConnectionConfig{
Type: "jvm",
Host: "orders.internal",
JVM: connection.JVMConfig{
PreferredMode: "endpoint",
AllowedModes: []string{"endpoint"},
},
})
if !res.Success {
t.Fatalf("expected success, got %+v", res)
}
items, ok := res.Data.([]jvm.Capability)
if !ok || len(items) != 1 {
t.Fatalf("expected one capability, got %#v", res.Data)
}
if items[0].Reason != "provider disabled" {
t.Fatalf("expected reason %q, got %#v", "provider disabled", items[0])
}
if items[0].DisplayLabel != "Endpoint" {
t.Fatalf("expected display label %q, got %#v", "Endpoint", items[0])
}
}
func TestJVMProbeCapabilitiesUsesReadableLabelForAgentValidationError(t *testing.T) {
app := NewAppWithSecretStore(nil)
restore := swapJVMProviderFactory(jvm.NewProvider)
defer restore()
res := app.JVMProbeCapabilities(connection.ConnectionConfig{
Type: "jvm",
Host: "orders.internal",
JVM: connection.JVMConfig{
PreferredMode: "agent",
AllowedModes: []string{"agent"},
},
})
if !res.Success {
t.Fatalf("expected success, got %+v", res)
}
items, ok := res.Data.([]jvm.Capability)
if !ok || len(items) != 1 {
t.Fatalf("expected one capability, got %#v", res.Data)
}
if items[0].DisplayLabel != "Agent" {
t.Fatalf("expected display label %q, got %#v", "Agent", items[0])
}
if !strings.Contains(items[0].Reason, "未填写 Agent Base URL") {
t.Fatalf("expected agent validation error, got %#v", items[0])
}
}
func TestJVMProbeCapabilitiesUsesReadableLabelForEndpointValidationError(t *testing.T) {
app := NewAppWithSecretStore(nil)
restore := swapJVMProviderFactory(jvm.NewProvider)
defer restore()
res := app.JVMProbeCapabilities(connection.ConnectionConfig{
Type: "jvm",
Host: "orders.internal",
JVM: connection.JVMConfig{
PreferredMode: "endpoint",
AllowedModes: []string{"endpoint"},
},
})
if !res.Success {
t.Fatalf("expected success, got %+v", res)
}
items, ok := res.Data.([]jvm.Capability)
if !ok || len(items) != 1 {
t.Fatalf("expected one capability, got %#v", res.Data)
}
if items[0].DisplayLabel != "Endpoint" {
t.Fatalf("expected display label %q, got %#v", "Endpoint", items[0])
}
if !strings.Contains(items[0].Reason, "未填写 Endpoint Base URL") {
t.Fatalf("expected endpoint validation error, got %#v", items[0])
}
}
func TestJVMListResourcesReturnsProviderPayload(t *testing.T) {
app := NewAppWithSecretStore(nil)
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
list: []jvm.ResourceSummary{
{
ID: "memory.heap",
Kind: "folder",
Name: "Heap",
Path: "/memory/heap",
ProviderMode: jvm.ModeJMX,
CanRead: true,
HasChildren: true,
},
},
}, nil
})
defer restore()
res := app.JVMListResources(connection.ConnectionConfig{
Type: "jvm",
Host: "orders.internal",
JVM: connection.JVMConfig{
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}, "/memory")
if !res.Success {
t.Fatalf("expected success, got %+v", res)
}
items, ok := res.Data.([]jvm.ResourceSummary)
if !ok || len(items) != 1 {
t.Fatalf("expected one resource summary, got %#v", res.Data)
}
if items[0].Path != "/memory/heap" {
t.Fatalf("expected resource path %q, got %#v", "/memory/heap", items[0])
}
}
func TestJVMGetValueReturnsProviderPayload(t *testing.T) {
app := NewAppWithSecretStore(nil)
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "memory.heap.used",
Kind: "metric",
Format: "number",
Value: 128,
Metadata: map[string]any{
"unit": "MiB",
},
},
}, nil
})
defer restore()
res := app.JVMGetValue(connection.ConnectionConfig{
Type: "jvm",
Host: "orders.internal",
JVM: connection.JVMConfig{
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}, "/memory/heap/used")
if !res.Success {
t.Fatalf("expected success, got %+v", res)
}
snapshot, ok := res.Data.(jvm.ValueSnapshot)
if !ok {
t.Fatalf("expected value snapshot, got %#v", res.Data)
}
if snapshot.ResourceID != "memory.heap.used" {
t.Fatalf("expected resource id %q, got %#v", "memory.heap.used", snapshot)
}
if snapshot.Metadata["unit"] != "MiB" {
t.Fatalf("expected unit metadata %q, got %#v", "MiB", snapshot.Metadata)
}
}
func TestJVMApplyChangeRequiresConfirmationTokenForHighRiskPreview(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
readOnly := false
var applyReq jvm.ChangeRequest
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
Value: map[string]any{
"status": "stale",
},
},
previewSet: true,
preview: jvm.ChangePreview{
Allowed: true,
Summary: "risky change",
RiskLevel: "high",
},
applyReq: &applyReq,
apply: jvm.ApplyResult{
Status: "applied",
},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
ReadOnly: &readOnly,
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{
"status": "ready",
},
})
if res.Success {
t.Fatalf("expected missing confirmation token to fail, got %+v", res)
}
if !strings.Contains(res.Message, "确认") && !strings.Contains(res.Message, "重新预览") {
t.Fatalf("expected confirmation guidance message, got %q", res.Message)
}
if applyReq.ResourceID != "" {
t.Fatalf("expected provider ApplyChange not to run, got %#v", applyReq)
}
}
func TestJVMApplyChangeReturnsProviderPayload(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
readOnly := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
Value: map[string]any{
"status": "stale",
},
},
apply: jvm.ApplyResult{
Status: "applied",
Message: "ok",
UpdatedValue: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
Value: map[string]any{
"status": "ready",
},
},
},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
ReadOnly: &readOnly,
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{
"status": "ready",
},
})
if !res.Success {
t.Fatalf("expected success, got %+v", res)
}
result, ok := res.Data.(jvm.ApplyResult)
if !ok {
t.Fatalf("expected apply result, got %#v", res.Data)
}
if result.Status != "applied" {
t.Fatalf("expected status %q, got %#v", "applied", result)
}
if result.UpdatedValue.ResourceID != "/cache/orders" {
t.Fatalf("expected updated resource id %q, got %#v", "/cache/orders", result.UpdatedValue)
}
}
func TestJVMApplyChangePreviewTokenAllowsConfirmedApply(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
readOnly := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
Value: map[string]any{
"status": "stale",
},
},
previewSet: true,
preview: jvm.ChangePreview{
Allowed: true,
RequiresConfirmation: true,
Summary: "risky change",
RiskLevel: "high",
},
apply: jvm.ApplyResult{
Status: "applied",
UpdatedValue: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
Value: map[string]any{
"status": "ready",
},
},
},
}, nil
})
defer restore()
cfg := connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
Environment: jvm.EnvPROD,
ReadOnly: &readOnly,
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}
req := jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{
"status": "ready",
},
}
previewRes := app.JVMPreviewChange(cfg, req)
if !previewRes.Success {
t.Fatalf("expected preview success, got %+v", previewRes)
}
preview, ok := previewRes.Data.(jvm.ChangePreview)
if !ok {
t.Fatalf("expected preview payload, got %#v", previewRes.Data)
}
if strings.TrimSpace(preview.ConfirmationToken) == "" {
t.Fatalf("expected confirmation token, got %#v", preview)
}
req.ConfirmationToken = preview.ConfirmationToken
applyRes := app.JVMApplyChange(cfg, req)
if !applyRes.Success {
t.Fatalf("expected apply success with confirmation token, got %+v", applyRes)
}
listRes := app.JVMListAuditRecords("conn-orders", 10)
if !listRes.Success {
t.Fatalf("expected audit list success, got %+v", listRes)
}
records, ok := listRes.Data.([]jvm.AuditRecord)
if !ok {
t.Fatalf("expected audit record slice, got %#v", listRes.Data)
}
var hasPending, hasApplied bool
for _, record := range records {
switch record.Result {
case "pending":
hasPending = true
case "applied":
hasApplied = true
}
}
if !hasPending || !hasApplied {
t.Fatalf("expected pending+applied records, got %#v", records)
}
}
func TestJVMApplyChangeRejectsUnissuedDeterministicConfirmationToken(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
readOnly := false
var applyReq jvm.ChangeRequest
provider := fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
Value: map[string]any{
"status": "stale",
},
},
previewSet: true,
preview: jvm.ChangePreview{
Allowed: true,
RequiresConfirmation: true,
Summary: "risky change",
RiskLevel: "high",
},
applyReq: &applyReq,
apply: jvm.ApplyResult{
Status: "applied",
},
}
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return provider, nil
})
defer restore()
cfg := connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
Environment: jvm.EnvPROD,
ReadOnly: &readOnly,
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}
req := jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{
"status": "ready",
},
}
preview, err := jvm.BuildChangePreview(context.Background(), provider, cfg, req)
if err != nil {
t.Fatalf("BuildChangePreview returned error: %v", err)
}
if strings.TrimSpace(preview.ConfirmationToken) == "" {
t.Fatalf("expected deterministic preview token, got %#v", preview)
}
req.ConfirmationToken = preview.ConfirmationToken
res := app.JVMApplyChange(cfg, req)
if res.Success {
t.Fatalf("expected unissued confirmation token to fail, got %+v", res)
}
if applyReq.ResourceID != "" {
t.Fatalf("expected provider ApplyChange not to run, got %#v", applyReq)
}
}
func TestJVMApplyChangeRejectsReplayedPreviewConfirmationToken(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
readOnly := false
applyCalls := 0
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
Value: map[string]any{
"status": "stale",
},
},
previewSet: true,
preview: jvm.ChangePreview{
Allowed: true,
RequiresConfirmation: true,
Summary: "risky change",
RiskLevel: "high",
},
applyFn: func(context.Context, connection.ConnectionConfig, jvm.ChangeRequest) (jvm.ApplyResult, error) {
applyCalls++
return jvm.ApplyResult{Status: "applied"}, nil
},
}, nil
})
defer restore()
cfg := connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
Environment: jvm.EnvPROD,
ReadOnly: &readOnly,
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}
req := jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{
"status": "ready",
},
}
previewRes := app.JVMPreviewChange(cfg, req)
if !previewRes.Success {
t.Fatalf("expected preview success, got %+v", previewRes)
}
preview, ok := previewRes.Data.(jvm.ChangePreview)
if !ok {
t.Fatalf("expected preview payload, got %#v", previewRes.Data)
}
req.ConfirmationToken = preview.ConfirmationToken
firstRes := app.JVMApplyChange(cfg, req)
if !firstRes.Success {
t.Fatalf("expected first apply success, got %+v", firstRes)
}
secondRes := app.JVMApplyChange(cfg, req)
if secondRes.Success {
t.Fatalf("expected replayed confirmation token to fail, got %+v", secondRes)
}
if applyCalls != 1 {
t.Fatalf("expected exactly one provider ApplyChange call, got %d", applyCalls)
}
}
func TestJVMApplyChangeRejectsExpiredPreviewConfirmationToken(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
app.jvmPreviewTokenTTL = time.Nanosecond
readOnly := false
applyCalls := 0
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
Value: map[string]any{
"status": "stale",
},
},
previewSet: true,
preview: jvm.ChangePreview{
Allowed: true,
RequiresConfirmation: true,
Summary: "risky change",
RiskLevel: "high",
},
applyFn: func(context.Context, connection.ConnectionConfig, jvm.ChangeRequest) (jvm.ApplyResult, error) {
applyCalls++
return jvm.ApplyResult{Status: "applied"}, nil
},
}, nil
})
defer restore()
cfg := connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
Environment: jvm.EnvPROD,
ReadOnly: &readOnly,
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}
req := jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{
"status": "ready",
},
}
previewRes := app.JVMPreviewChange(cfg, req)
if !previewRes.Success {
t.Fatalf("expected preview success, got %+v", previewRes)
}
preview, ok := previewRes.Data.(jvm.ChangePreview)
if !ok {
t.Fatalf("expected preview payload, got %#v", previewRes.Data)
}
time.Sleep(time.Millisecond)
req.ConfirmationToken = preview.ConfirmationToken
res := app.JVMApplyChange(cfg, req)
if res.Success {
t.Fatalf("expected expired confirmation token to fail, got %+v", res)
}
if applyCalls != 0 {
t.Fatalf("expected provider ApplyChange not to run, got %d calls", applyCalls)
}
}
func TestJVMApplyChangePersistsAuditSource(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
readOnly := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
Value: map[string]any{
"status": "stale",
},
},
apply: jvm.ApplyResult{
Status: "applied",
UpdatedValue: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
Value: map[string]any{
"status": "ready",
},
},
},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
ReadOnly: &readOnly,
PreferredMode: "endpoint",
AllowedModes: []string{"endpoint"},
},
}, jvm.ChangeRequest{
ProviderMode: "endpoint",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Source: "ai-plan",
Payload: map[string]any{
"status": "ready",
},
})
if !res.Success {
t.Fatalf("expected success, got %+v", res)
}
listRes := app.JVMListAuditRecords("conn-orders", 10)
if !listRes.Success {
t.Fatalf("expected audit list success, got %+v", listRes)
}
records, ok := listRes.Data.([]jvm.AuditRecord)
if !ok || len(records) < 2 {
t.Fatalf("expected at least two audit records (pending+terminal), got %#v", listRes.Data)
}
var hasPending, hasApplied bool
for _, record := range records {
if record.Source != "ai-plan" {
t.Fatalf("expected audit source %q, got %#v", "ai-plan", record)
}
switch record.Result {
case "pending":
hasPending = true
case "applied":
hasApplied = true
}
}
if !hasPending || !hasApplied {
t.Fatalf("expected pending and applied audit records, got %#v", records)
}
}
func TestJVMApplyChangeNormalizesRequestBeforeProviderAndAudit(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
readOnly := false
var previewReq jvm.ChangeRequest
var applyReq jvm.ChangeRequest
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
},
previewReq: &previewReq,
applyReq: &applyReq,
apply: jvm.ApplyResult{
Status: "applied",
UpdatedValue: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
},
},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
ReadOnly: &readOnly,
PreferredMode: "endpoint",
AllowedModes: []string{"endpoint"},
},
}, jvm.ChangeRequest{
ProviderMode: " endpoint ",
ResourceID: " /cache/orders ",
Action: " put ",
Reason: " repair cache ",
Source: " manual ",
Payload: map[string]any{
"status": "ready",
},
})
if !res.Success {
t.Fatalf("expected success, got %+v", res)
}
if previewReq.ProviderMode != "endpoint" || previewReq.ResourceID != "/cache/orders" || previewReq.Action != "put" || previewReq.Reason != "repair cache" {
t.Fatalf("expected normalized preview request, got %#v", previewReq)
}
if applyReq.ProviderMode != "endpoint" || applyReq.ResourceID != "/cache/orders" || applyReq.Action != "put" || applyReq.Reason != "repair cache" || applyReq.Source != "manual" {
t.Fatalf("expected normalized apply request, got %#v", applyReq)
}
listRes := app.JVMListAuditRecords("conn-orders", 10)
if !listRes.Success {
t.Fatalf("expected audit list success, got %+v", listRes)
}
records, ok := listRes.Data.([]jvm.AuditRecord)
if !ok || len(records) < 2 {
t.Fatalf("expected at least two audit records (pending+terminal), got %#v", listRes.Data)
}
var matchedTerminal bool
for _, record := range records {
if record.ProviderMode != "endpoint" || record.ResourceID != "/cache/orders" || record.Action != "put" || record.Reason != "repair cache" || record.Source != "manual" {
t.Fatalf("expected normalized audit record, got %#v", record)
}
if record.Result == "applied" {
matchedTerminal = true
}
}
if !matchedTerminal {
t.Fatalf("expected applied terminal audit record, got %#v", records)
}
}
func TestJVMPreviewChangeRejectsModeOutsideAllowedModes(t *testing.T) {
app := NewAppWithSecretStore(nil)
res := app.JVMPreviewChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
PreferredMode: "endpoint",
AllowedModes: []string{"endpoint"},
},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
})
if res.Success {
t.Fatalf("expected preview request to be rejected, got %+v", res)
}
if !strings.Contains(res.Message, "不允许使用") {
t.Fatalf("expected disallowed mode error, got %+v", res)
}
}
func TestJVMListAuditRecordsReturnsLatestRecords(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
store := jvm.NewAuditStore(filepath.Join(app.configDir, "jvm_audit.jsonl"))
for _, record := range []jvm.AuditRecord{
{Timestamp: 100, ConnectionID: "conn-orders", ProviderMode: "jmx", ResourceID: "/cache/orders", Action: "put", Reason: "first", Result: "applied"},
{Timestamp: 200, ConnectionID: "conn-other", ProviderMode: "jmx", ResourceID: "/cache/other", Action: "put", Reason: "other", Result: "applied"},
{Timestamp: 300, ConnectionID: "conn-orders", ProviderMode: "jmx", ResourceID: "/cache/orders", Action: "put", Reason: "latest", Result: "applied"},
} {
if err := store.Append(record); err != nil {
t.Fatalf("Append returned error: %v", err)
}
}
res := app.JVMListAuditRecords("conn-orders", 1)
if !res.Success {
t.Fatalf("expected success, got %+v", res)
}
records, ok := res.Data.([]jvm.AuditRecord)
if !ok {
t.Fatalf("expected audit record slice, got %#v", res.Data)
}
if len(records) != 1 {
t.Fatalf("expected one audit record, got %#v", records)
}
if records[0].Timestamp != 300 {
t.Fatalf("expected latest timestamp %d, got %#v", 300, records[0])
}
}
func TestJVMApplyChangeFailsClosedWhenInitialAuditWriteFails(t *testing.T) {
app := NewAppWithSecretStore(nil)
tempDir := t.TempDir()
blockerPath := filepath.Join(tempDir, "audit-blocker")
if err := os.WriteFile(blockerPath, []byte("blocker"), 0o600); err != nil {
t.Fatalf("WriteFile returned error: %v", err)
}
app.configDir = blockerPath
readOnly := false
var applyReq jvm.ChangeRequest
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
Value: map[string]any{
"status": "stale",
},
},
applyReq: &applyReq,
apply: jvm.ApplyResult{
Status: "applied",
},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
ReadOnly: &readOnly,
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{
"status": "ready",
},
})
if res.Success {
t.Fatalf("expected fail-closed when initial audit write fails, got %+v", res)
}
if !strings.Contains(res.Message, "审计") {
t.Fatalf("expected audit failure message, got %q", res.Message)
}
if applyReq.ResourceID != "" {
t.Fatalf("expected provider ApplyChange not to run, got %#v", applyReq)
}
}
func TestJVMApplyChangeLatestAuditRecordIsTerminal(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
readOnly := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
Value: map[string]any{
"status": "stale",
},
},
apply: jvm.ApplyResult{Status: "applied"},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
ReadOnly: &readOnly,
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{
"status": "ready",
},
})
if !res.Success {
t.Fatalf("expected apply success, got %+v", res)
}
latestRes := app.JVMListAuditRecords("conn-orders", 1)
if !latestRes.Success {
t.Fatalf("expected list success, got %+v", latestRes)
}
latestRecords, ok := latestRes.Data.([]jvm.AuditRecord)
if !ok || len(latestRecords) != 1 {
t.Fatalf("expected one latest audit record, got %#v", latestRes.Data)
}
if latestRecords[0].Result != "applied" {
t.Fatalf("expected latest record applied, got %#v", latestRecords[0])
}
}
func TestJVMApplyChangeApplySuccessKeepsSuccessWhenTerminalAuditFails(t *testing.T) {
app := NewAppWithSecretStore(nil)
tempDir := t.TempDir()
auditDir := filepath.Join(tempDir, "audit")
if err := os.MkdirAll(auditDir, 0o755); err != nil {
t.Fatalf("MkdirAll returned error: %v", err)
}
app.configDir = auditDir
readOnly := false
terminalAuditFailed := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
},
applyFn: func(_ context.Context, _ connection.ConnectionConfig, _ jvm.ChangeRequest) (jvm.ApplyResult, error) {
if !terminalAuditFailed {
terminalAuditFailed = true
forceAuditAppendFailureAfterPending(t, auditDir)
}
return jvm.ApplyResult{Status: "applied", Message: "ok"}, nil
},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
ReadOnly: &readOnly,
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{
"status": "ready",
},
})
if !res.Success {
t.Fatalf("expected success when apply succeeded, got %+v", res)
}
result, ok := res.Data.(jvm.ApplyResult)
if !ok {
t.Fatalf("expected apply result data, got %#v", res.Data)
}
if result.Status != "applied" {
t.Fatalf("expected applied status, got %#v", result)
}
if !strings.Contains(result.Message, "终态审计写入失败") {
t.Fatalf("expected terminal audit warning in result message, got %#v", result)
}
}
func TestJVMApplyChangeApplyFailureReportsFailedAuditWriteError(t *testing.T) {
app := NewAppWithSecretStore(nil)
tempDir := t.TempDir()
auditDir := filepath.Join(tempDir, "audit")
if err := os.MkdirAll(auditDir, 0o755); err != nil {
t.Fatalf("MkdirAll returned error: %v", err)
}
app.configDir = auditDir
readOnly := false
failedAuditBlocked := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
},
applyFn: func(_ context.Context, _ connection.ConnectionConfig, _ jvm.ChangeRequest) (jvm.ApplyResult, error) {
if !failedAuditBlocked {
failedAuditBlocked = true
forceAuditAppendFailureAfterPending(t, auditDir)
}
return jvm.ApplyResult{}, errors.New("provider apply failed")
},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
ReadOnly: &readOnly,
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{
"status": "ready",
},
})
if res.Success {
t.Fatalf("expected failure when apply fails, got %+v", res)
}
if !strings.Contains(res.Message, "provider apply failed") {
t.Fatalf("expected provider failure in message, got %q", res.Message)
}
if !strings.Contains(res.Message, "失败审计写入失败") {
t.Fatalf("expected failed audit write failure in message, got %q", res.Message)
}
}
func TestJVMApplyChangeApplyFailureKeepsProviderErrorWhenFailedAuditSucceeds(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
readOnly := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
},
applyErr: errors.New("provider apply failed"),
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
ReadOnly: &readOnly,
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{
"status": "ready",
},
})
if res.Success {
t.Fatalf("expected failure when provider apply fails, got %+v", res)
}
if res.Message != "provider apply failed" {
t.Fatalf("expected provider failure only when failed audit succeeds, got %q", res.Message)
}
}
func TestJVMApplyChangeUsesProviderErrorWhenFailedAuditAlsoFails(t *testing.T) {
app := NewAppWithSecretStore(nil)
tempDir := t.TempDir()
auditDir := filepath.Join(tempDir, "audit")
if err := os.MkdirAll(auditDir, 0o755); err != nil {
t.Fatalf("MkdirAll returned error: %v", err)
}
app.configDir = auditDir
readOnly := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{
ResourceID: "/cache/orders",
Kind: "entry",
Format: "json",
},
applyFn: func(_ context.Context, _ connection.ConnectionConfig, _ jvm.ChangeRequest) (jvm.ApplyResult, error) {
forceAuditAppendFailureAfterPending(t, auditDir)
return jvm.ApplyResult{}, errors.New("provider apply failed")
},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{
ReadOnly: &readOnly,
PreferredMode: "jmx",
AllowedModes: []string{"jmx"},
},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{
"status": "ready",
},
})
if res.Success {
t.Fatalf("expected failure when provider apply fails, got %+v", res)
}
if !strings.HasPrefix(res.Message, "provider apply failed") {
t.Fatalf("expected provider error prefix, got %q", res.Message)
}
if !strings.Contains(res.Message, "失败审计写入失败") {
t.Fatalf("expected failed audit write failure in message, got %q", res.Message)
}
}
func TestJVMApplyChangeTerminalAuditWarningAppendsToExistingResultMessage(t *testing.T) {
app := NewAppWithSecretStore(nil)
tempDir := t.TempDir()
auditDir := filepath.Join(tempDir, "audit")
if err := os.MkdirAll(auditDir, 0o755); err != nil {
t.Fatalf("MkdirAll returned error: %v", err)
}
app.configDir = auditDir
readOnly := false
terminalAuditFailed := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{ResourceID: "/cache/orders", Kind: "entry", Format: "json"},
applyFn: func(_ context.Context, _ connection.ConnectionConfig, _ jvm.ChangeRequest) (jvm.ApplyResult, error) {
if !terminalAuditFailed {
terminalAuditFailed = true
forceAuditAppendFailureAfterPending(t, auditDir)
}
return jvm.ApplyResult{Status: "applied", Message: "provider message"}, nil
},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{ReadOnly: &readOnly, PreferredMode: "jmx", AllowedModes: []string{"jmx"}},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{"status": "ready"},
})
if !res.Success {
t.Fatalf("expected success when apply succeeded, got %+v", res)
}
result, ok := res.Data.(jvm.ApplyResult)
if !ok {
t.Fatalf("expected apply result data, got %#v", res.Data)
}
if !strings.Contains(result.Message, "provider message") || !strings.Contains(result.Message, "终态审计写入失败") {
t.Fatalf("expected provider message with terminal audit warning, got %#v", result)
}
}
func TestJVMApplyChangeTerminalAuditWarningUsesStandaloneMessageWhenResultMessageEmpty(t *testing.T) {
app := NewAppWithSecretStore(nil)
tempDir := t.TempDir()
auditDir := filepath.Join(tempDir, "audit")
if err := os.MkdirAll(auditDir, 0o755); err != nil {
t.Fatalf("MkdirAll returned error: %v", err)
}
app.configDir = auditDir
readOnly := false
terminalAuditFailed := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{ResourceID: "/cache/orders", Kind: "entry", Format: "json"},
applyFn: func(_ context.Context, _ connection.ConnectionConfig, _ jvm.ChangeRequest) (jvm.ApplyResult, error) {
if !terminalAuditFailed {
terminalAuditFailed = true
forceAuditAppendFailureAfterPending(t, auditDir)
}
return jvm.ApplyResult{Status: "applied"}, nil
},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{ReadOnly: &readOnly, PreferredMode: "jmx", AllowedModes: []string{"jmx"}},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{"status": "ready"},
})
if !res.Success {
t.Fatalf("expected success when apply succeeded, got %+v", res)
}
result, ok := res.Data.(jvm.ApplyResult)
if !ok {
t.Fatalf("expected apply result data, got %#v", res.Data)
}
if !strings.Contains(result.Message, "终态审计写入失败") {
t.Fatalf("expected standalone terminal audit warning, got %#v", result)
}
}
func TestJVMApplyChangeFailedAuditFailureMessageIncludesUnderlyingError(t *testing.T) {
app := NewAppWithSecretStore(nil)
tempDir := t.TempDir()
auditDir := filepath.Join(tempDir, "audit")
if err := os.MkdirAll(auditDir, 0o755); err != nil {
t.Fatalf("MkdirAll returned error: %v", err)
}
app.configDir = auditDir
readOnly := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{ResourceID: "/cache/orders", Kind: "entry", Format: "json"},
applyFn: func(_ context.Context, _ connection.ConnectionConfig, _ jvm.ChangeRequest) (jvm.ApplyResult, error) {
forceAuditAppendFailureAfterPending(t, auditDir)
return jvm.ApplyResult{}, errors.New("provider apply failed")
},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{ReadOnly: &readOnly, PreferredMode: "jmx", AllowedModes: []string{"jmx"}},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{"status": "ready"},
})
if res.Success {
t.Fatalf("expected failure when apply fails, got %+v", res)
}
if !strings.Contains(res.Message, "失败审计写入失败") {
t.Fatalf("expected failed audit failure marker, got %q", res.Message)
}
if !strings.Contains(strings.ToLower(res.Message), "not a directory") {
t.Fatalf("expected underlying audit failure detail in message, got %q", res.Message)
}
}
func TestJVMApplyChangeFailureMessageSeparatorUsesChineseSemicolon(t *testing.T) {
app := NewAppWithSecretStore(nil)
tempDir := t.TempDir()
auditDir := filepath.Join(tempDir, "audit")
if err := os.MkdirAll(auditDir, 0o755); err != nil {
t.Fatalf("MkdirAll returned error: %v", err)
}
app.configDir = auditDir
readOnly := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{ResourceID: "/cache/orders", Kind: "entry", Format: "json"},
applyFn: func(_ context.Context, _ connection.ConnectionConfig, _ jvm.ChangeRequest) (jvm.ApplyResult, error) {
forceAuditAppendFailureAfterPending(t, auditDir)
return jvm.ApplyResult{}, errors.New("provider apply failed")
},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{ReadOnly: &readOnly, PreferredMode: "jmx", AllowedModes: []string{"jmx"}},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{"status": "ready"},
})
if res.Success {
t.Fatalf("expected failure when apply fails, got %+v", res)
}
if !strings.Contains(res.Message, ";失败审计写入失败") {
t.Fatalf("expected chinese semicolon separator in failure message, got %q", res.Message)
}
}
func TestJVMApplyChangeLatestAuditRecordIsFailedWhenApplyFails(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
readOnly := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{ResourceID: "/cache/orders", Kind: "entry", Format: "json"},
applyErr: errors.New("provider apply failed"),
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{ReadOnly: &readOnly, PreferredMode: "jmx", AllowedModes: []string{"jmx"}},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{"status": "ready"},
})
if res.Success {
t.Fatalf("expected apply failure, got %+v", res)
}
latestRes := app.JVMListAuditRecords("conn-orders", 10)
if !latestRes.Success {
t.Fatalf("expected list success, got %+v", latestRes)
}
records, ok := latestRes.Data.([]jvm.AuditRecord)
if !ok {
t.Fatalf("expected records slice, got %#v", latestRes.Data)
}
if len(records) < 2 {
t.Fatalf("expected at least pending and failed records, got %#v", records)
}
if records[0].Result != "failed" {
t.Fatalf("expected latest record failed, got %#v", records[0])
}
var pendingTs, failedTs int64
for _, record := range records {
switch record.Result {
case "pending":
pendingTs = record.Timestamp
case "failed":
failedTs = record.Timestamp
}
}
if pendingTs == 0 || failedTs == 0 {
t.Fatalf("expected pending and failed records, got %#v", records)
}
if failedTs <= pendingTs {
t.Fatalf("expected failed timestamp > pending timestamp, pending=%d failed=%d records=%#v", pendingTs, failedTs, records)
}
}
func TestJVMApplyChangePendingAndTerminalAuditTimestampsAreStrictlyIncreasing(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
readOnly := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{ResourceID: "/cache/orders", Kind: "entry", Format: "json"},
apply: jvm.ApplyResult{Status: "applied"},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{ReadOnly: &readOnly, PreferredMode: "jmx", AllowedModes: []string{"jmx"}},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache",
Payload: map[string]any{"status": "ready"},
})
if !res.Success {
t.Fatalf("expected apply success, got %+v", res)
}
listRes := app.JVMListAuditRecords("conn-orders", 10)
if !listRes.Success {
t.Fatalf("expected list success, got %+v", listRes)
}
records, ok := listRes.Data.([]jvm.AuditRecord)
if !ok {
t.Fatalf("expected records slice, got %#v", listRes.Data)
}
var pendingTs, terminalTs int64
for _, record := range records {
switch record.Result {
case "pending":
pendingTs = record.Timestamp
case "applied":
terminalTs = record.Timestamp
}
}
if pendingTs == 0 || terminalTs == 0 {
t.Fatalf("expected pending and applied records, got %#v", records)
}
if terminalTs <= pendingTs {
t.Fatalf("expected terminal timestamp > pending timestamp, pending=%d terminal=%d records=%#v", pendingTs, terminalTs, records)
}
}
func TestJVMApplyChangeTerminalAuditTimestampReflectsApplyCompletion(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
readOnly := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{ResourceID: "/cache/orders", Kind: "entry", Format: "json"},
applyFn: func(_ context.Context, _ connection.ConnectionConfig, _ jvm.ChangeRequest) (jvm.ApplyResult, error) {
time.Sleep(15 * time.Millisecond)
return jvm.ApplyResult{Status: "applied"}, nil
},
}, nil
})
defer restore()
res := app.JVMApplyChange(connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{ReadOnly: &readOnly, PreferredMode: "jmx", AllowedModes: []string{"jmx"}},
}, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: "repair cache delayed",
Payload: map[string]any{"status": "ready"},
})
if !res.Success {
t.Fatalf("expected apply success, got %+v", res)
}
listRes := app.JVMListAuditRecords("conn-orders", 10)
if !listRes.Success {
t.Fatalf("expected list success, got %+v", listRes)
}
records, ok := listRes.Data.([]jvm.AuditRecord)
if !ok {
t.Fatalf("expected records slice, got %#v", listRes.Data)
}
var pendingTs, terminalTs int64
for _, record := range records {
if record.Reason != "repair cache delayed" {
continue
}
switch record.Result {
case "pending":
pendingTs = record.Timestamp
case "applied":
terminalTs = record.Timestamp
}
}
if pendingTs == 0 || terminalTs == 0 {
t.Fatalf("expected pending and applied records for delayed apply, got %#v", records)
}
if terminalTs <= pendingTs+1 {
t.Fatalf("expected delayed terminal timestamp to be strictly greater than pending+1, pending=%d terminal=%d records=%#v", pendingTs, terminalTs, records)
}
}
func TestJVMApplyChangeTimestampGuaranteeHoldsAcrossMultipleApplies(t *testing.T) {
app := NewAppWithSecretStore(nil)
app.configDir = t.TempDir()
readOnly := false
restore := swapJVMProviderFactory(func(mode string) (jvm.Provider, error) {
return fakeJVMProvider{
value: jvm.ValueSnapshot{ResourceID: "/cache/orders", Kind: "entry", Format: "json"},
apply: jvm.ApplyResult{Status: "applied"},
}, nil
})
defer restore()
cfg := connection.ConnectionConfig{
Type: "jvm",
ID: "conn-orders",
Host: "orders.internal",
JVM: connection.JVMConfig{ReadOnly: &readOnly, PreferredMode: "jmx", AllowedModes: []string{"jmx"}},
}
for i := 0; i < 3; i++ {
res := app.JVMApplyChange(cfg, jvm.ChangeRequest{
ProviderMode: "jmx",
ResourceID: "/cache/orders",
Action: "put",
Reason: fmt.Sprintf("repair cache %d", i),
Payload: map[string]any{"status": "ready"},
})
if !res.Success {
t.Fatalf("apply %d expected success, got %+v", i, res)
}
}
listRes := app.JVMListAuditRecords("conn-orders", 20)
if !listRes.Success {
t.Fatalf("expected list success, got %+v", listRes)
}
records, ok := listRes.Data.([]jvm.AuditRecord)
if !ok {
t.Fatalf("expected records slice, got %#v", listRes.Data)
}
reasonLatestTs := map[string]int64{}
for _, record := range records {
if strings.HasPrefix(record.Reason, "repair cache ") {
reasonLatestTs[record.Reason+":"+record.Result] = record.Timestamp
}
}
for i := 0; i < 3; i++ {
reason := fmt.Sprintf("repair cache %d", i)
pendingTs := reasonLatestTs[reason+":pending"]
appliedTs := reasonLatestTs[reason+":applied"]
if pendingTs == 0 || appliedTs == 0 {
t.Fatalf("expected pending+applied for %s, got %#v", reason, records)
}
if appliedTs <= pendingTs {
t.Fatalf("expected applied ts > pending ts for %s, pending=%d applied=%d", reason, pendingTs, appliedTs)
}
}
}