package sources import ( "context" "net/http" "net/http/httptest" "testing" "time" "github.com/salvacybersec/keyhunter/pkg/providers" "github.com/salvacybersec/keyhunter/pkg/recon" ) <<<<<<< HEAD const circleFixtureJSON = `{ "items": [ { "id": "pipeline-uuid-1", "vcs": {"provider_name": "github", "target_repository_url": "https://github.com/alice/repo"} }, { "id": "pipeline-uuid-2", "vcs": {"provider_name": "github", "target_repository_url": ""} } ] }` func TestCircleCI_Sweep_ExtractsFindings(t *testing.T) { srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { if r.URL.Path != "/pipeline" { t.Errorf("unexpected path: %s", r.URL.Path) } if r.Header.Get("Circle-Token") == "" { t.Error("missing Circle-Token header") } w.Header().Set("Content-Type", "application/json") _, _ = w.Write([]byte(circleFixtureJSON)) })) defer srv.Close() src := &CircleCISource{ Token: "test-token", BaseURL: srv.URL, Registry: providers.NewRegistryFromProviders([]providers.Provider{ {Name: "openai", Keywords: []string{"sk-proj-"}}, }), Limiters: recon.NewLimiterRegistry(), Client: NewClient(), } out := make(chan recon.Finding, 16) ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second) defer cancel() if err := src.Sweep(ctx, "", out); err != nil { t.Fatalf("Sweep err: %v", err) } close(out) ======= func TestCircleCI_Name(t *testing.T) { s := &CircleCISource{} if s.Name() != "circleci" { t.Fatalf("expected circleci, got %s", s.Name()) } } func TestCircleCI_Enabled(t *testing.T) { s := &CircleCISource{} if s.Enabled(recon.Config{}) { t.Fatal("should be disabled without token") } s.Token = "cci-test" if !s.Enabled(recon.Config{}) { t.Fatal("should be enabled with token") } } func TestCircleCI_Sweep(t *testing.T) { mux := http.NewServeMux() mux.HandleFunc("/project/gh/", func(w http.ResponseWriter, r *http.Request) { w.Header().Set("Content-Type", "application/json") _, _ = w.Write([]byte(`{"items":[{"id":"pipe-abc-123","number":42}]}`)) }) mux.HandleFunc("/pipeline/pipe-abc-123/workflow", func(w http.ResponseWriter, r *http.Request) { _, _ = w.Write([]byte(`Build step: npm test Setting SECRET_KEY="sk-proj-CIRCLELEAK12345678" Tests completed successfully`)) }) srv := httptest.NewServer(mux) defer srv.Close() reg := providers.NewRegistryFromProviders([]providers.Provider{ {Name: "openai", Keywords: []string{"sk-proj-"}}, }) s := &CircleCISource{ Token: "cci-test", BaseURL: srv.URL, Registry: reg, Client: NewClient(), } out := make(chan recon.Finding, 10) ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second) defer cancel() err := s.Sweep(ctx, "", out) close(out) if err != nil { t.Fatalf("Sweep error: %v", err) } >>>>>>> worktree-agent-adad8c10 var findings []recon.Finding for f := range out { findings = append(findings, f) } <<<<<<< HEAD if len(findings) != 2 { t.Fatalf("expected 2 findings, got %d", len(findings)) } // First pipeline has VCS URL, second falls back to app URL. if findings[0].Source != "https://github.com/alice/repo" { t.Errorf("unexpected source[0]: %s", findings[0].Source) } if findings[1].Source != "https://app.circleci.com/pipelines/pipeline-uuid-2" { t.Errorf("unexpected source[1]: %s", findings[1].Source) } for _, f := range findings { if f.SourceType != "recon:circleci" { t.Errorf("unexpected SourceType: %s", f.SourceType) } } } func TestCircleCI_EnabledOnlyWithToken(t *testing.T) { s := &CircleCISource{} if s.Enabled(recon.Config{}) { t.Fatal("expected Enabled=false without token") } s.Token = "test" if !s.Enabled(recon.Config{}) { t.Fatal("expected Enabled=true with token") } } func TestCircleCI_NameAndRate(t *testing.T) { s := &CircleCISource{} if s.Name() != "circleci" { t.Errorf("unexpected name: %s", s.Name()) } if s.Burst() != 2 { t.Errorf("burst: %d", s.Burst()) } if s.RespectsRobots() { t.Error("expected RespectsRobots=false") ======= if len(findings) == 0 { t.Fatal("expected at least one finding from CircleCI pipeline log") } if findings[0].SourceType != "recon:circleci" { t.Fatalf("expected recon:circleci, got %s", findings[0].SourceType) >>>>>>> worktree-agent-adad8c10 } }