JobsAdminControllerTest.php 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154
  1. <?php
  2. declare(strict_types=1);
  3. namespace App\Tests\Integration\Admin;
  4. use App\Domain\Auth\Role;
  5. use App\Domain\Auth\TokenKind;
  6. use App\Tests\Integration\Support\AppTestCase;
  7. /**
  8. * `/api/v1/admin/jobs/{status,trigger}` — admin-only wrapper that the UI
  9. * uses to invoke jobs without needing the internal token.
  10. */
  11. final class JobsAdminControllerTest extends AppTestCase
  12. {
  13. public function testStatusRequiresViewer(): void
  14. {
  15. $resp = $this->request('GET', '/api/v1/admin/jobs/status');
  16. self::assertSame(401, $resp->getStatusCode());
  17. }
  18. public function testStatusReturnsAllJobs(): void
  19. {
  20. $token = $this->createToken(TokenKind::Admin, Role::Viewer);
  21. $resp = $this->request('GET', '/api/v1/admin/jobs/status', ['Authorization' => 'Bearer ' . $token]);
  22. self::assertSame(200, $resp->getStatusCode());
  23. $body = $this->decode($resp);
  24. self::assertArrayHasKey('jobs', $body);
  25. foreach (['recompute-scores', 'cleanup-audit', 'enrich-pending', 'refresh-geoip', 'tick'] as $name) {
  26. self::assertArrayHasKey($name, $body['jobs']);
  27. }
  28. }
  29. public function testTriggerOperatorForbidden(): void
  30. {
  31. $token = $this->createToken(TokenKind::Admin, Role::Operator);
  32. $resp = $this->request(
  33. 'POST',
  34. '/api/v1/admin/jobs/trigger/recompute-scores',
  35. ['Authorization' => 'Bearer ' . $token],
  36. );
  37. self::assertSame(403, $resp->getStatusCode());
  38. }
  39. public function testTriggerUnknownJobReturns404(): void
  40. {
  41. $token = $this->createToken(TokenKind::Admin, Role::Admin);
  42. $resp = $this->request(
  43. 'POST',
  44. '/api/v1/admin/jobs/trigger/does-not-exist',
  45. ['Authorization' => 'Bearer ' . $token],
  46. );
  47. self::assertSame(404, $resp->getStatusCode());
  48. }
  49. /**
  50. * @return iterable<string, array{string}>
  51. */
  52. public static function malformedJobNames(): iterable
  53. {
  54. // SEC_REVIEW F44: any name outside `^[a-z0-9_-]+$` must 404
  55. // BEFORE flowing into `registry->has()` or the `job.triggered`
  56. // audit row. The Slim default segment regex `[^/]+` only
  57. // protects against `/`; everything else (uppercase, dots,
  58. // spaces, control chars, brackets) needs the controller gate.
  59. yield 'uppercase' => ['Recompute-Scores'];
  60. yield 'dotted' => ['recompute.scores'];
  61. yield 'space' => ['recompute scores'];
  62. yield 'newline injection' => ["recompute\nfaked"];
  63. yield 'cr injection' => ["recompute\rfaked"];
  64. yield 'bracket' => ['recompute[scores]'];
  65. yield 'percent' => ['recompute%20scores'];
  66. yield 'empty after url decode' => ['..'];
  67. }
  68. #[\PHPUnit\Framework\Attributes\DataProvider('malformedJobNames')]
  69. public function testTriggerRejectsMalformedJobName(string $name): void
  70. {
  71. $token = $this->createToken(TokenKind::Admin, Role::Admin);
  72. $resp = $this->request(
  73. 'POST',
  74. '/api/v1/admin/jobs/trigger/' . rawurlencode($name),
  75. ['Authorization' => 'Bearer ' . $token],
  76. );
  77. self::assertSame(404, $resp->getStatusCode(), "expected 404 for malformed name '{$name}'");
  78. // Critically: no audit row is emitted for the malformed name.
  79. $audit = $this->db->fetchOne(
  80. "SELECT COUNT(*) FROM audit_log WHERE action = 'job.triggered'"
  81. );
  82. self::assertSame(0, (int) $audit, "no audit row for malformed name '{$name}'");
  83. }
  84. public function testTriggerRecomputeRunsAndAuditsAsManual(): void
  85. {
  86. $token = $this->createToken(TokenKind::Admin, Role::Admin);
  87. $resp = $this->request(
  88. 'POST',
  89. '/api/v1/admin/jobs/trigger/recompute-scores',
  90. ['Authorization' => 'Bearer ' . $token, 'Content-Type' => 'application/json'],
  91. '{}',
  92. );
  93. self::assertSame(200, $resp->getStatusCode());
  94. $body = $this->decode($resp);
  95. self::assertSame('recompute-scores', $body['job']);
  96. self::assertSame('success', $body['status']);
  97. // job_runs.triggered_by = manual
  98. $row = $this->db->fetchAssociative(
  99. "SELECT triggered_by FROM job_runs WHERE job_name = 'recompute-scores' ORDER BY id DESC LIMIT 1"
  100. );
  101. self::assertSame('manual', $row['triggered_by']);
  102. // Audit row attributed to the admin token
  103. $audit = $this->db->fetchAssociative(
  104. "SELECT actor_kind, action, target_id, details_json FROM audit_log WHERE action = 'job.triggered' ORDER BY id DESC LIMIT 1"
  105. );
  106. self::assertIsArray($audit);
  107. self::assertSame('admin-token', $audit['actor_kind']);
  108. self::assertSame('recompute-scores', $audit['target_id']);
  109. $details = json_decode((string) $audit['details_json'], true);
  110. self::assertSame('manual', $details['triggered_by']);
  111. }
  112. public function testRefreshGeoip412UnderMaxmindWithoutKey(): void
  113. {
  114. // Swap the downloader binding to MaxMind without a key.
  115. if (method_exists($this->container, 'set')) {
  116. /** @var \DI\Container $c */
  117. $c = $this->container;
  118. $c->set(
  119. \App\Infrastructure\Enrichment\Downloaders\GeoIpDownloader::class,
  120. new \App\Infrastructure\Enrichment\Downloaders\MaxMindDownloader(new \GuzzleHttp\Client(), licenseKey: ''),
  121. );
  122. $c->set(
  123. \App\Application\Admin\JobsAdminController::class,
  124. $c->make(\App\Application\Admin\JobsAdminController::class),
  125. );
  126. $this->app = \App\App\AppFactory::build($this->container);
  127. }
  128. $token = $this->createToken(TokenKind::Admin, Role::Admin);
  129. $resp = $this->request(
  130. 'POST',
  131. '/api/v1/admin/jobs/trigger/refresh-geoip',
  132. ['Authorization' => 'Bearer ' . $token],
  133. );
  134. self::assertSame(412, $resp->getStatusCode());
  135. $body = $this->decode($resp);
  136. self::assertSame('no_credential', $body['error']);
  137. self::assertSame('maxmind', $body['provider']);
  138. self::assertSame('MAXMIND_LICENSE_KEY', $body['missing']);
  139. }
  140. }