Files
Ilia Denisov 69fa6b30e1 tools/local-dev: docker-compose stack for UI development
Adds tools/local-dev/ with postgres + redis + mailpit + backend +
gateway plus a Make wrapper, so `make -C tools/local-dev up` brings
the full authenticated stack online and `pnpm -C ui/frontend dev`
talks to it directly. The committed `.env.development` already
points at the stack and pins the matching gateway response public
key from the dev keypair under tools/local-dev/keys/.

The backend ships a new opt-in env, BACKEND_AUTH_DEV_FIXED_CODE
(`tools/local-dev/.env` defaults it to 123456). When set,
ConfirmEmailCode accepts that literal in addition to the real
bcrypt-verified code; SendEmailCode still queues a real email so
Mailpit captures the issued code at http://localhost:8025/, and
both paths coexist. The override is rejected as non-six-digit by
config validation and emits a loud warning at backend startup.

The local-dev Dockerfiles mirror backend/Dockerfile and
gateway/Dockerfile but switch the runtime stage to alpine so
docker-compose healthchecks can wget /healthz; the gateway
Dockerfile additionally copies ui/core/ into the build context
because gateway/go.mod's `replace galaxy/core => ../ui/core` is
required to compile the gateway main.

Smoke tested:
- `make -C tools/local-dev up` boots all five services to healthy.
- send-email-code + confirm-email-code with code=123456 returns a
  device_session_id; a real code in Mailpit also redeems
  successfully.
- `pnpm test` 14/14, `pnpm exec playwright test` 44/44.
- `go test ./backend/internal/config/...` green.

Docs: tools/local-dev/README.md, tools/local-dev/keys/README.md,
new "Local development stack" section in ui/docs/testing.md, and a
short pointer in ui/README.md.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-08 09:42:29 +02:00

129 lines
3.9 KiB
Go

package config
import (
"strings"
"testing"
)
// validEnv enumerates the minimum environment required by Validate after
// LoadFromEnv. Tests start from this map and tweak individual entries.
func validEnv() map[string]string {
return map[string]string{
"BACKEND_POSTGRES_DSN": "postgres://galaxy:galaxy@127.0.0.1:5432/galaxy?sslmode=disable",
"BACKEND_SMTP_HOST": "smtp.example.test",
"BACKEND_SMTP_FROM": "noreply@example.test",
"BACKEND_DOCKER_NETWORK": "galaxy",
"BACKEND_GAME_STATE_ROOT": "/tmp/galaxy",
"BACKEND_GEOIP_DB_PATH": "/tmp/geoip.mmdb",
}
}
func setEnv(t *testing.T, env map[string]string) {
t.Helper()
for name, value := range env {
t.Setenv(name, value)
}
}
func TestLoadFromEnvAcceptsValidEnv(t *testing.T) {
setEnv(t, validEnv())
cfg, err := LoadFromEnv()
if err != nil {
t.Fatalf("LoadFromEnv returned error: %v", err)
}
if cfg.HTTP.Addr != defaultHTTPListenAddr {
t.Fatalf("HTTP.Addr = %q, want %q", cfg.HTTP.Addr, defaultHTTPListenAddr)
}
if cfg.GRPCPush.Addr != defaultGRPCPushListenAddr {
t.Fatalf("GRPCPush.Addr = %q, want %q", cfg.GRPCPush.Addr, defaultGRPCPushListenAddr)
}
if cfg.Postgres.DSN == "" {
t.Fatalf("Postgres.DSN must be populated from env")
}
if cfg.Telemetry.TracesExporter != defaultOTelTracesExporter {
t.Fatalf("Telemetry.TracesExporter = %q, want %q", cfg.Telemetry.TracesExporter, defaultOTelTracesExporter)
}
}
func TestLoadFromEnvFailsWithoutPostgresDSN(t *testing.T) {
env := validEnv()
delete(env, "BACKEND_POSTGRES_DSN")
setEnv(t, env)
if _, err := LoadFromEnv(); err == nil || !strings.Contains(err.Error(), "BACKEND_POSTGRES_DSN") {
t.Fatalf("expected BACKEND_POSTGRES_DSN error, got %v", err)
}
}
func TestValidateRejectsAdminUserWithoutPassword(t *testing.T) {
env := validEnv()
env["BACKEND_ADMIN_BOOTSTRAP_USER"] = "root"
setEnv(t, env)
if _, err := LoadFromEnv(); err == nil || !strings.Contains(err.Error(), "BACKEND_ADMIN_BOOTSTRAP_PASSWORD") {
t.Fatalf("expected admin password requirement, got %v", err)
}
}
func TestValidateRejectsUnknownTracesExporter(t *testing.T) {
env := validEnv()
env["BACKEND_OTEL_TRACES_EXPORTER"] = "kafka"
setEnv(t, env)
if _, err := LoadFromEnv(); err == nil || !strings.Contains(err.Error(), "BACKEND_OTEL_TRACES_EXPORTER") {
t.Fatalf("expected traces-exporter validation error, got %v", err)
}
}
func TestLoadFromEnvAcceptsDevFixedCode(t *testing.T) {
env := validEnv()
env["BACKEND_AUTH_DEV_FIXED_CODE"] = "123456"
setEnv(t, env)
cfg, err := LoadFromEnv()
if err != nil {
t.Fatalf("LoadFromEnv returned error: %v", err)
}
if cfg.Auth.DevFixedCode != "123456" {
t.Fatalf("Auth.DevFixedCode = %q, want \"123456\"", cfg.Auth.DevFixedCode)
}
}
func TestValidateRejectsDevFixedCodeWrongLength(t *testing.T) {
env := validEnv()
env["BACKEND_AUTH_DEV_FIXED_CODE"] = "12345"
setEnv(t, env)
if _, err := LoadFromEnv(); err == nil || !strings.Contains(err.Error(), "BACKEND_AUTH_DEV_FIXED_CODE") {
t.Fatalf("expected DEV fixed-code length error, got %v", err)
}
}
func TestValidateRejectsDevFixedCodeNonDecimal(t *testing.T) {
env := validEnv()
env["BACKEND_AUTH_DEV_FIXED_CODE"] = "abcdef"
setEnv(t, env)
if _, err := LoadFromEnv(); err == nil || !strings.Contains(err.Error(), "BACKEND_AUTH_DEV_FIXED_CODE") {
t.Fatalf("expected DEV fixed-code decimal error, got %v", err)
}
}
func TestValidateRejectsPrometheusWithoutAddr(t *testing.T) {
cfg := DefaultConfig()
cfg.Postgres.DSN = "postgres://x:y@127.0.0.1/galaxy"
cfg.SMTP.Host = "smtp"
cfg.SMTP.From = "from@x"
cfg.Docker.Network = "galaxy"
cfg.Game.StateRoot = "/tmp/galaxy"
cfg.GeoIP.DBPath = "/tmp/geo"
cfg.Telemetry.MetricsExporter = "prometheus"
cfg.Telemetry.PrometheusListenAddr = ""
if err := cfg.Validate(); err == nil || !strings.Contains(err.Error(), "BACKEND_OTEL_PROMETHEUS_LISTEN_ADDR") {
t.Fatalf("expected prometheus address requirement, got %v", err)
}
}