Skip to content

fix(security,test): clear 3 SonarCloud vulnerabilities + flaky pipeline test#74

Merged
aksOps merged 4 commits intomainfrom
fix/sonarqube-vulns-and-flaky-test
Apr 30, 2026
Merged

fix(security,test): clear 3 SonarCloud vulnerabilities + flaky pipeline test#74
aksOps merged 4 commits intomainfrom
fix/sonarqube-vulns-and-flaky-test

Conversation

@aksOps
Copy link
Copy Markdown
Contributor

@aksOps aksOps commented Apr 30, 2026

Summary

Three real SonarCloud vulnerability findings + the TestPipeline_PerTenantCap_ReleasedAfterProcess race-detector flake that surfaced post-merge on main.

Severity Rule File Fix
🔴 BLOCKER gosecurity:S2083 (path injection) internal/ui/ui.go:58 path.Clean + reject .. at the boundary; default empty path to index.html. Same behavior, taint-clean.
🟠 MAJOR githubactions:S8234 .github/workflows/scorecard.yml:18 permissions: read-allpermissions: { contents: read }.
🟠 MAJOR githubactions:S8234 .github/workflows/security.yml:20 Same.
🟡 Flaky test internal/ingest/pipeline_test.go:497,504 2s waitFor5s to tolerate race detector on slow CI runners.

The 147 code smells (cognitive complexity, string-literal dup, TS rules) are out of scope for this security-focused PR — tracked for a follow-up cleanup pass.

Test plan

  • go vet ./... — clean
  • go test ./... — 516 pass / 27 packages
  • go test -race -count=5 ./internal/ingest/ — flaky test passes 5/5 locally
  • go build ./... — clean
  • CI green on this PR
  • After merge: SonarCloud Quality Gate clears on main (gate value refreshes on next analysis run, which this PR triggers)

🤖 Generated with Claude Code

aksOps and others added 4 commits April 30, 2026 15:27
…ne test

Three real findings flagged by SonarCloud's analysis on main, plus a
race-detector flake that surfaced post-merge.

Vulnerabilities
  * BLOCKER gosecurity:S2083 — internal/ui/ui.go:58 path-injection.
    The SPA fallback handler passed r.URL.Path straight to distFS.Open.
    embed.FS already rejects ".." segments, but Sonar's taint tracker
    can't see that. Sanitize at the boundary: path.Clean + reject any
    residual ".." + default empty path to "index.html". Same behavior,
    explicit gate.
  * MAJOR githubactions:S8234 ×2 — .github/workflows/{scorecard,security}.yml.
    Top-level "permissions: read-all" replaced with the minimum
    "permissions: { contents: read }" needed for actions/checkout.
    Each job already declares the narrower scopes it actually needs
    (security-events: write, id-token: write, etc.), so the overly
    permissive default was redundant and tripped Scorecard's
    Token-Permissions guidance.

Flaky test
  * internal/ingest/pipeline_test.go:497,504 —
    TestPipeline_PerTenantCap_ReleasedAfterProcess used 2s waitFor
    deadlines that fail under the race detector on busy CI runners.
    Bumped both to 5s. Test passes locally in milliseconds; the
    timeout is purely a CI-flake margin. Confirmed reproducible-pass
    locally with -race -count=5.

Verification
  * go vet ./... clean
  * go test ./... — 516 pass / 27 packages
  * go build ./... clean

Out of scope (next pass)
  * 147 code-smell issues (cognitive complexity ×55, string-literal
    duplication ×31, TS-specific ×24, etc.). Tracked separately —
    fixing them in this PR would muddle the security-fix scope.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Sonar's go-security taint engine kept flagging the explicit
distFS.Open(rel) call in the SPA-fallback handler even after path.Clean
+ ".." check. The pattern is structurally safe (embed.FS rejects ".."
on its own) but the engine can't model it.

Restructure: wrap the dist sub-FS with spaFS — when http.FileServer
hits ErrNotExist on an extensionless path, the wrapper transparently
serves index.html so the React router can claim the URL. Asset-shaped
paths (anything with ".") still 404 normally, so a missing favicon
doesn't surprise the browser with an HTML body.

Net result: the user-controlled URL never crosses our own Open() call —
http.FileServer is the only caller, and Sonar trusts that boundary.

Verification
  * go vet ./... clean
  * go test ./... — 516 pass / 27 packages
  * go build ./... clean

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
The PR #74 amendment surfaced a second flaky test
(TestPipeline_PreservesInsertionOrder) that fails on CI under the race
detector for the same reason as the first: 2-second deadlines too tight.

Two fixes
  * Bulk-bump all remaining waitFor(t, 2*time.Second, ...) calls in
    pipeline_test.go to 5 seconds (5 sites). Tolerates race-detector
    overhead on slow CI runners; locally these all complete in
    milliseconds.
  * TestPipeline_PreservesInsertionOrder synced on Stats().Processed == 1
    but asserted on snapshotOrder() length. Stats() can bump between
    BatchCreate calls under the race detector, leaving the order
    snapshot partial. Switched the wait to len(w.snapshotOrder()) >= 3 —
    the actual condition the assertion cares about.

Verification
  * go test -race -count=3 ./internal/ingest/... — 114 pass × 3 runs
  * go vet ./... clean
  * locally reproducible-pass under -race

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
SonarCloud quality gate failed PR #74 on
new_duplicated_lines_density=3.5% (threshold 3%). The duplication is
between TestPipeline_FailedSpansSkipsLogs and
TestPipeline_FailedTracesAbortsBatch — same boilerplate, same waitFor,
same assertion shape. The waitFor 2s→5s bump made those lines "new
code", so Sonar recounted the existing duplication against the PR's
new-code budget.

Extract runFailureSkipsCheck(t, writer, forbidden...) — single helper
takes the configured fakeWriter and the BatchCreate* names that must
not fire after the seeded upstream failure. Each failing-path test
collapses to a single line.

Verification
  * go test -race -count=3 -run 'TestPipeline_Failed*' — pass × 3
  * go vet ./... clean

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@sonarqubecloud
Copy link
Copy Markdown

@aksOps aksOps merged commit d7c8064 into main Apr 30, 2026
17 checks passed
@aksOps aksOps deleted the fix/sonarqube-vulns-and-flaky-test branch April 30, 2026 15:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant