Hard gate #4: codified module boundaries as Go tests, so a new contributor (or AI agent) can't silently land an import that crosses a layer. Boundaries enforced (one architecture_test.go per package): - wsauth has no internal/* deps — auth leaf, must be unit-testable in isolation - models has no internal/* deps — pure-types leaf, reverse dep would create cycles since most packages depend on models - db has no internal/* deps — DB layer below business logic, must be testable with sqlmock without spinning up handlers/provisioner - provisioner does not import handlers or router — unidirectional layering: handlers wires provisioner into HTTP routes; the reverse is a cycle Each test parses .go files in its package via go/parser (no x/tools dep needed) and asserts forbidden import paths don't appear. Failure messages name the rule, the offending file, and explain WHY the boundary exists so the diff reviewer learns the rule. Note: the original issue's first two proposed boundaries (provisioner-no-DB, handlers-no-docker) don't match the codebase today — provisioner already imports db (PR #2276 runtime-image lookup) and handlers hold *docker.Client directly (terminal, plugins, bundle, templates). I picked the four boundaries that actually hold; the first two are aspirational and would need a refactor before they could be codified. Hand-tested by injecting a deliberate wsauth -> orgtoken violation: the gate fires red with the rule message before merge. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
69 lines
2.1 KiB
Go
69 lines
2.1 KiB
Go
package wsauth_test
|
|
|
|
// Architecture test (#2344): wsauth is a leaf package — it must not import
|
|
// any other internal/* package. The auth layer is below business logic;
|
|
// importing handlers, db, or any cousin package would force every wsauth
|
|
// test to spin up that subsystem, defeating the unit-test boundary that
|
|
// makes the auth code reviewable.
|
|
//
|
|
// If this test fails: you added an import that crosses a layer. Either
|
|
// move the dependency the other direction (consumer wires wsauth into
|
|
// itself), accept the boundary by inlining what you need, or — if the
|
|
// new coupling is genuinely correct — explicitly update this test with
|
|
// the new allowed import + a comment explaining why.
|
|
|
|
import (
|
|
"go/parser"
|
|
"go/token"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
"testing"
|
|
)
|
|
|
|
const moduleInternalPrefix = "github.com/Molecule-AI/molecule-monorepo/platform/internal/"
|
|
|
|
func TestWsauthHasNoInternalDependencies(t *testing.T) {
|
|
t.Parallel()
|
|
for path, file := range listImports(t, ".") {
|
|
if strings.HasPrefix(path, moduleInternalPrefix) {
|
|
t.Errorf(
|
|
"wsauth must not import other internal packages "+
|
|
"(found %q in %s) — wsauth is the auth leaf and must stay "+
|
|
"unit-testable without spinning up other subsystems. "+
|
|
"See workspace-server/internal/wsauth/architecture_test.go for context.",
|
|
path, file,
|
|
)
|
|
}
|
|
}
|
|
}
|
|
|
|
// listImports returns import-path → first-file-where-seen for non-test
|
|
// .go files in dir. Used by every architecture_test.go in this tree.
|
|
func listImports(t *testing.T, dir string) map[string]string {
|
|
t.Helper()
|
|
fset := token.NewFileSet()
|
|
entries, err := os.ReadDir(dir)
|
|
if err != nil {
|
|
t.Fatalf("read %s: %v", dir, err)
|
|
}
|
|
out := make(map[string]string)
|
|
for _, e := range entries {
|
|
name := e.Name()
|
|
if e.IsDir() || !strings.HasSuffix(name, ".go") || strings.HasSuffix(name, "_test.go") {
|
|
continue
|
|
}
|
|
f, err := parser.ParseFile(fset, filepath.Join(dir, name), nil, parser.ImportsOnly)
|
|
if err != nil {
|
|
t.Fatalf("parse %s: %v", name, err)
|
|
}
|
|
for _, imp := range f.Imports {
|
|
path := strings.Trim(imp.Path.Value, "\"")
|
|
if _, seen := out[path]; !seen {
|
|
out[path] = name
|
|
}
|
|
}
|
|
}
|
|
return out
|
|
}
|