Testing
[package_name] uses three testing layers: unit tests, integration tests with testcontainers, and E2E tests via HTTP.
graph TD
A[just test] -->|"-short flag"| B[Unit Tests]
C[just test-all] --> B
C --> D[Integration Tests]
C --> E[E2E Tests]
B --> F[Mocks + Testify]
D --> G[Testcontainers: Postgres/Redis]
E --> H[httptest + Real Router]
Running Tests
just test # unit tests only (fast, no Docker)
just test-all # all tests including integration
just test-coverage # generate HTML coverage report
just test-race # detect race conditions
just bench # benchmarks
just generate-mocks # regenerate mock filesTest File Conventions
| Pattern | Purpose |
|---|---|
*_test.go | Test file in same package |
testing.Short() | Skip integration tests in just test |
t.Helper() | Mark functions as test helpers |
testutil.Setup* | Container setup for integration tests |
1. Unit Tests with Testify
Use assert for non-fatal checks (test continues) and require for fatal checks (test stops).
package auth
import (
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
func TestValidateRole(t *testing.T) {
role, err := user.ValidateRole("user")
require.NoError(t, err) // fatal: stop if error
assert.Equal(t, user.RoleUser, role) // non-fatal: continue if wrong
}
func TestValidateRole_Invalid(t *testing.T) {
_, err := user.ValidateRole("superadmin")
assert.ErrorIs(t, err, user.ErrInvalidRole)
}Common Testify Assertions
require.NoError(t, err) // fatal if err != nil
require.NotNil(t, obj) // fatal if nil
assert.Equal(t, expected, actual) // compare values
assert.NotEqual(t, a, b) // values differ
assert.Contains(t, str, "substring") // substring check
assert.Len(t, slice, 3) // length check
assert.True(t, condition) // boolean check
assert.Error(t, err) // expect error
assert.ErrorIs(t, err, ErrSpecific) // error type check
assert.NotEmpty(t, val) // non-empty checkTable-Driven Tests
func TestUser_CanLogin(t *testing.T) {
tests := []struct {
name string
user user.User
wantErr error
}{
{
name: "active user can login",
user: user.User{IsActive: true},
wantErr: nil,
},
{
name: "inactive user cannot login",
user: user.User{IsActive: false},
wantErr: user.ErrUserNotActive,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
err := tt.user.CanLogin()
if tt.wantErr != nil {
assert.ErrorIs(t, err, tt.wantErr)
} else {
assert.NoError(t, err)
}
})
}
}2. Mocking with gomock
Mocks are generated from interfaces using go:generate directives.
Generating Mocks
The directive in internal/user/repository.go:
//go:generate mockgen -destination=mock/repository.go -package=mock [package_name]/internal/user UserRepository,CredentialsRepository,SessionRepository,MFARepository,VerificationTokenRepositoryRun just generate-mocks to regenerate all mocks after interface changes.
Using Mocks in Tests
package auth_test
import (
"context"
"errors"
"testing"
"time"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"go.uber.org/mock/gomock"
"[package_name]/internal/auth"
"[package_name]/internal/user"
mock_user "[package_name]/internal/user/mock"
)
func TestRegisterUseCase_Execute(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockUserRepo := mock_user.NewMockUserRepository(ctrl)
mockCredRepo := mock_user.NewMockCredentialsRepository(ctrl)
hasher := auth.NewArgonHasher()
uc := auth.NewRegisterUseCase(mockUserRepo, mockCredRepo, hasher)
ctx := context.Background()
input := auth.RegisterInput{
Email: "test@example.com",
Phone: "+49555000111",
Password: "securepassword",
Role: "user",
}
// Setup expectations: email and phone don't exist yet
mockUserRepo.EXPECT().
GetByEmail(ctx, input.Email).
Return(nil, errors.New("not found"))
mockUserRepo.EXPECT().
GetByPhone(ctx, input.Phone).
Return(nil, errors.New("not found"))
mockUserRepo.EXPECT().
Create(ctx, gomock.Any()).
Return(nil)
mockCredRepo.EXPECT().
Create(ctx, gomock.Any()).
Return(nil)
out, err := uc.Execute(ctx, input)
require.NoError(t, err)
assert.NotEmpty(t, out.UserID)
assert.Contains(t, out.Message, "Registration successful")
}
func TestRegisterUseCase_EmailExists(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockUserRepo := mock_user.NewMockUserRepository(ctrl)
mockCredRepo := mock_user.NewMockCredentialsRepository(ctrl)
hasher := auth.NewArgonHasher()
uc := auth.NewRegisterUseCase(mockUserRepo, mockCredRepo, hasher)
// Email already exists - return a user (no error)
mockUserRepo.EXPECT().
GetByEmail(gomock.Any(), "taken@example.com").
Return(&user.User{ID: "existing"}, nil)
_, err := uc.Execute(context.Background(), auth.RegisterInput{
Email: "taken@example.com",
Phone: "+49555000222",
Password: "securepassword",
Role: "user",
})
assert.ErrorIs(t, err, user.ErrEmailExists)
}gomock Matchers
gomock.Any() // match any value
gomock.Eq("exact") // exact match
gomock.Not(gomock.Eq("excluded")) // negation
gomock.Nil() // match nilExpecting Call Order
first := mockRepo.EXPECT().GetByEmail(gomock.Any(), "a@b.com").Return(nil, errNotFound)
mockRepo.EXPECT().Create(gomock.Any(), gomock.Any()).Return(nil).After(first)3. Integration Tests with Testcontainers
Integration tests spin up real Docker containers for Postgres and Redis.
Test Structure
func TestUserRepository_Integration(t *testing.T) {
if testing.Short() {
t.Skip("skipping integration test")
}
// Start real Postgres container
dsn, cleanup := testutil.SetupPostgres(t)
defer cleanup()
// Connect to database
db, err := database.New(dsn)
require.NoError(t, err)
defer db.Close()
// Run migrations
// ... apply schema ...
// Test real queries
repo := postgres.NewUserRepository(db.GetDB())
ctx := context.Background()
u := &user.User{
ID: ulid.New(),
Email: "test@example.com",
Phone: "+49555000111",
Role: user.RoleUser,
IsActive: true,
CreatedAt: time.Now().UTC(),
UpdatedAt: time.Now().UTC(),
}
err = repo.Create(ctx, u)
require.NoError(t, err)
got, err := repo.GetByEmail(ctx, "test@example.com")
require.NoError(t, err)
assert.Equal(t, u.ID, got.ID)
assert.Equal(t, u.Email, got.Email)
}Helper: testutil.SetupPostgres
Located in internal/testutil/postgres.go. Returns a DSN and cleanup function:
dsn, cleanup := testutil.SetupPostgres(t)
defer cleanup()Skips automatically when Docker is unavailable.
Helper: testutil.SetupRedis
Located in internal/testutil/redis.go:
addr, cleanup := testutil.SetupRedis(t)
defer cleanup()4. HTTP Handler Tests
Use httptest with the Gin router for testing HTTP endpoints without a running server.
package server_test
import (
"net/http"
"net/http/httptest"
"testing"
"github.com/stretchr/testify/assert"
"go.uber.org/mock/gomock"
mock_database "[package_name]/internal/database/mock"
)
func TestHealthEndpoint(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockDB := mock_database.NewMockDB(ctrl)
s := server.New(cfg, mockDB, log, nil)
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodGet, "/health", nil)
s.Router().ServeHTTP(w, req)
assert.Equal(t, http.StatusOK, w.Code)
assert.Contains(t, w.Body.String(), `"status":"ok"`)
}Testing POST Endpoints
func TestRegisterEndpoint(t *testing.T) {
// ... setup server with mocks ...
body := `{"email":"a@b.com","phone":"+49555111222","password":"securepass","role":"user"}`
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/auth/register", strings.NewReader(body))
req.Header.Set("Content-Type", "application/json")
s.Router().ServeHTTP(w, req)
assert.Equal(t, http.StatusCreated, w.Code)
var resp auth.RegisterOutput
err := json.Unmarshal(w.Body.Bytes(), &resp)
require.NoError(t, err)
assert.NotEmpty(t, resp.UserID)
}5. E2E Happy Path: Register -> Login -> Refresh -> Logout
This shows the full auth flow tested end-to-end through HTTP.
func TestAuthFlow_E2E(t *testing.T) {
if testing.Short() {
t.Skip("skipping e2e test")
}
dsn, cleanup := testutil.SetupPostgres(t)
defer cleanup()
// Setup real DB, run migrations, create server with real deps
db, err := database.New(dsn)
require.NoError(t, err)
defer db.Close()
// ... apply migrations, wire dependencies ...
router := s.Router()
// Step 1: Register
regBody := `{"[package_name].kg","phone":"+49700111222","password":"MyStr0ngPass!","role":"user"}`
w := httptest.NewRecorder()
req := httptest.NewRequest(http.MethodPost, "/auth/register", strings.NewReader(regBody))
req.Header.Set("Content-Type", "application/json")
router.ServeHTTP(w, req)
assert.Equal(t, http.StatusCreated, w.Code)
// Step 2: Login
loginBody := `{"[package_name].kg","password":"MyStr0ngPass!"}`
w = httptest.NewRecorder()
req = httptest.NewRequest(http.MethodPost, "/auth/login", strings.NewReader(loginBody))
req.Header.Set("Content-Type", "application/json")
router.ServeHTTP(w, req)
assert.Equal(t, http.StatusOK, w.Code)
var loginResp auth.LoginOutput
err = json.Unmarshal(w.Body.Bytes(), &loginResp)
require.NoError(t, err)
assert.NotEmpty(t, loginResp.Tokens.AccessToken)
assert.NotEmpty(t, loginResp.Tokens.RefreshToken)
// Step 3: Refresh token
refreshBody := fmt.Sprintf(`{"refresh_token":"%s"}`, loginResp.Tokens.RefreshToken)
w = httptest.NewRecorder()
req = httptest.NewRequest(http.MethodPost, "/auth/refresh", strings.NewReader(refreshBody))
req.Header.Set("Content-Type", "application/json")
router.ServeHTTP(w, req)
assert.Equal(t, http.StatusOK, w.Code)
var refreshResp auth.TokenPair
err = json.Unmarshal(w.Body.Bytes(), &refreshResp)
require.NoError(t, err)
assert.NotEmpty(t, refreshResp.AccessToken)
assert.NotEqual(t, loginResp.Tokens.RefreshToken, refreshResp.RefreshToken)
// Step 4: Logout
logoutBody := fmt.Sprintf(`{"refresh_token":"%s"}`, refreshResp.RefreshToken)
w = httptest.NewRecorder()
req = httptest.NewRequest(http.MethodPost, "/auth/logout", strings.NewReader(logoutBody))
req.Header.Set("Content-Type", "application/json")
router.ServeHTTP(w, req)
assert.Equal(t, http.StatusOK, w.Code)
// Step 5: Refresh with old token should fail
w = httptest.NewRecorder()
req = httptest.NewRequest(http.MethodPost, "/auth/refresh", strings.NewReader(logoutBody))
req.Header.Set("Content-Type", "application/json")
router.ServeHTTP(w, req)
assert.Equal(t, http.StatusUnauthorized, w.Code)
}6. Critical Tests Checklist
Auth Domain
| Test | Type | What it verifies |
|---|---|---|
| Register with valid data | Unit | User + credentials created |
| Register duplicate email | Unit | Returns ErrEmailExists |
| Register duplicate phone | Unit | Returns ErrPhoneExists |
| Register invalid role | Unit | Returns ErrInvalidRole |
| Login valid credentials | Unit | Returns token pair |
| Login wrong password | Unit | Returns ErrInvalidCredentials |
| Login inactive user | Unit | Returns ErrUserNotActive |
| Refresh valid token | Unit | Old session deleted, new pair issued |
| Refresh expired session | Unit | Returns ErrSessionExpired |
| Token generation + validation | Unit | Claims match, expiry works |
| Token type mismatch | Unit | Access token rejected as MFA |
| Password hash uniqueness | Unit | Same password -> different hashes |
Infrastructure
| Test | Type | What it verifies |
|---|---|---|
| DB connection + ping | Integration | Testcontainer Postgres works |
| Health endpoint | Unit | Returns 200 {"status":"ok"} |
| Request ID middleware | Unit | X-Request-ID header is 26-char ULID |
| Graceful shutdown | Unit | Server shuts down without error |
| Config defaults | Unit | Sensible defaults loaded |
| Config env override | Unit | Env vars override defaults |
| ULID uniqueness | Unit | No collisions across goroutines |
7. Test Organization
internal/
├── auth/
│ ├── jwt.go
│ ├── jwt_test.go # unit: token gen/validation
│ ├── password.go
│ ├── password_test.go # unit: hash/verify
│ ├── register.go
│ ├── register_test.go # unit: use case with mocks
│ ├── login.go
│ └── login_test.go # unit: use case with mocks
├── user/
│ ├── entity.go
│ ├── entity_test.go # unit: domain logic (CanLogin, etc.)
│ ├── repository.go # interfaces (mock source)
│ └── mock/
│ └── repository.go # generated mocks
├── database/
│ ├── database.go
│ ├── database_test.go # integration: testcontainers
│ └── mock/
│ └── database.go # generated mock
└── testutil/
├── postgres.go # testcontainer helper
└── redis.go # testcontainer helper8. Quick Reference
graph LR
subgraph "Unit (fast, no Docker)"
A[Domain Logic] --> B[testify assert/require]
C[Use Cases] --> D[gomock mocks]
E[HTTP Handlers] --> F[httptest.NewRecorder]
end
subgraph "Integration (requires Docker)"
G[Repository] --> H[testutil.SetupPostgres]
I[Cache] --> J[testutil.SetupRedis]
end
subgraph "Skip Control"
K["testing.Short() → skip integration"]
L["just test → -short flag"]
M["just test-all → runs everything"]
end