mirror of
https://github.com/SAP/jenkins-library.git
synced 2024-12-14 11:03:09 +02:00
2f83ba56da
Should avoid issues with this file being owned by root (perhaps via running in docker container), preventing the workspace from being cleaned properly.
185 lines
6.1 KiB
Go
185 lines
6.1 KiB
Go
package cmd
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"os"
|
|
"path/filepath"
|
|
"testing"
|
|
|
|
piperhttp "github.com/SAP/jenkins-library/pkg/http"
|
|
"github.com/SAP/jenkins-library/pkg/mock"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
type httpClientMock struct {
|
|
expectedError error
|
|
downloadedFiles map[string]string // src, dest
|
|
}
|
|
|
|
func (c *httpClientMock) SetOptions(options piperhttp.ClientOptions) {
|
|
|
|
}
|
|
|
|
func (c *httpClientMock) DownloadFile(url, filename string, header http.Header, cookies []*http.Cookie) error {
|
|
|
|
if c.expectedError != nil {
|
|
return c.expectedError
|
|
}
|
|
|
|
if c.downloadedFiles == nil {
|
|
c.downloadedFiles = make(map[string]string)
|
|
}
|
|
c.downloadedFiles[url] = filename
|
|
return nil
|
|
}
|
|
|
|
func TestRunDetect(t *testing.T) {
|
|
|
|
t.Run("success case", func(t *testing.T) {
|
|
s := mock.ShellMockRunner{}
|
|
fileUtilsMock := mock.FilesMock{}
|
|
fileUtilsMock.AddFile("detect.sh", []byte(""))
|
|
httpClient := httpClientMock{}
|
|
err := runDetect(detectExecuteScanOptions{}, &s, &fileUtilsMock, &httpClient)
|
|
|
|
assert.Equal(t, httpClient.downloadedFiles["https://detect.synopsys.com/detect.sh"], "detect.sh")
|
|
assert.True(t, fileUtilsMock.HasRemovedFile("detect.sh"))
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, ".", s.Dir, "Wrong execution directory used")
|
|
assert.Equal(t, "/bin/bash", s.Shell[0], "Bash shell expected")
|
|
expectedScript := "./detect.sh --blackduck.url= --blackduck.api.token= --detect.project.name=\\\"\\\" --detect.project.version.name=\\\"\\\" --detect.code.location.name=\\\"\\\""
|
|
assert.Equal(t, expectedScript, s.Calls[0])
|
|
})
|
|
|
|
t.Run("failure case", func(t *testing.T) {
|
|
s := mock.ShellMockRunner{ShouldFailOnCommand: map[string]error{"./detect.sh --blackduck.url= --blackduck.api.token= --detect.project.name=\\\"\\\" --detect.project.version.name=\\\"\\\" --detect.code.location.name=\\\"\\\"": fmt.Errorf("Test Error")}}
|
|
fileUtilsMock := mock.FilesMock{}
|
|
fileUtilsMock.AddFile("detect.sh", []byte(""))
|
|
httpClient := httpClientMock{}
|
|
err := runDetect(detectExecuteScanOptions{}, &s, &fileUtilsMock, &httpClient)
|
|
assert.EqualError(t, err, "Test Error")
|
|
assert.True(t, fileUtilsMock.HasRemovedFile("detect.sh"))
|
|
})
|
|
|
|
t.Run("maven parameters", func(t *testing.T) {
|
|
s := mock.ShellMockRunner{}
|
|
fileUtilsMock := mock.FilesMock{
|
|
CurrentDir: "root_folder",
|
|
}
|
|
fileUtilsMock.AddFile("detect.sh", []byte(""))
|
|
httpClient := httpClientMock{}
|
|
err := runDetect(detectExecuteScanOptions{
|
|
M2Path: ".pipeline/local_repo",
|
|
ProjectSettingsFile: "project-settings.xml",
|
|
GlobalSettingsFile: "global-settings.xml",
|
|
}, &s, &fileUtilsMock, &httpClient)
|
|
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, ".", s.Dir, "Wrong execution directory used")
|
|
assert.Equal(t, "/bin/bash", s.Shell[0], "Bash shell expected")
|
|
absoluteLocalPath := string(os.PathSeparator) + filepath.Join("root_folder", ".pipeline", "local_repo")
|
|
|
|
expectedParam := "\"--detect.maven.build.command='--global-settings global-settings.xml --settings project-settings.xml -Dmaven.repo.local=" + absoluteLocalPath + "'\""
|
|
assert.Contains(t, s.Calls[0], expectedParam)
|
|
})
|
|
}
|
|
|
|
func TestAddDetectArgs(t *testing.T) {
|
|
httpClient := piperhttp.Client{}
|
|
fileUtilsMock := mock.FilesMock{}
|
|
|
|
testData := []struct {
|
|
args []string
|
|
options detectExecuteScanOptions
|
|
expected []string
|
|
}{
|
|
{
|
|
args: []string{"--testProp1=1"},
|
|
options: detectExecuteScanOptions{
|
|
ScanProperties: []string{"--scan1=1", "--scan2=2"},
|
|
ServerURL: "https://server.url",
|
|
Token: "apiToken",
|
|
ProjectName: "testName",
|
|
Version: "1.0",
|
|
VersioningModel: "major-minor",
|
|
CodeLocation: "",
|
|
Scanners: []string{"signature"},
|
|
ScanPaths: []string{"path1", "path2"},
|
|
},
|
|
expected: []string{
|
|
"--testProp1=1",
|
|
"--scan1=1",
|
|
"--scan2=2",
|
|
"--blackduck.url=https://server.url",
|
|
"--blackduck.api.token=apiToken",
|
|
"--detect.project.name=\\\"testName\\\"",
|
|
"--detect.project.version.name=\\\"1.0\\\"",
|
|
"--detect.code.location.name=\\\"testName/1.0\\\"",
|
|
"--detect.blackduck.signature.scanner.paths=path1,path2",
|
|
},
|
|
},
|
|
{
|
|
args: []string{"--testProp1=1"},
|
|
options: detectExecuteScanOptions{
|
|
ServerURL: "https://server.url",
|
|
Token: "apiToken",
|
|
ProjectName: "testName",
|
|
Version: "1.0",
|
|
VersioningModel: "major-minor",
|
|
CodeLocation: "testLocation",
|
|
FailOn: []string{"BLOCKER", "MAJOR"},
|
|
Scanners: []string{"source"},
|
|
ScanPaths: []string{"path1", "path2"},
|
|
Groups: []string{"testGroup"},
|
|
},
|
|
expected: []string{
|
|
"--testProp1=1",
|
|
"--blackduck.url=https://server.url",
|
|
"--blackduck.api.token=apiToken",
|
|
"--detect.project.name=\\\"testName\\\"",
|
|
"--detect.project.version.name=\\\"1.0\\\"",
|
|
"--detect.project.user.groups=\\\"testGroup\\\"",
|
|
"--detect.policy.check.fail.on.severities=BLOCKER,MAJOR",
|
|
"--detect.code.location.name=\\\"testLocation\\\"",
|
|
"--detect.source.path=path1",
|
|
},
|
|
},
|
|
{
|
|
args: []string{"--testProp1=1"},
|
|
options: detectExecuteScanOptions{
|
|
ServerURL: "https://server.url",
|
|
Token: "apiToken",
|
|
ProjectName: "testName",
|
|
CodeLocation: "testLocation",
|
|
FailOn: []string{"BLOCKER", "MAJOR"},
|
|
Scanners: []string{"source"},
|
|
ScanPaths: []string{"path1", "path2"},
|
|
Groups: []string{"testGroup", "testGroup2"},
|
|
Version: "1.0",
|
|
VersioningModel: "major-minor",
|
|
},
|
|
expected: []string{
|
|
"--testProp1=1",
|
|
"--blackduck.url=https://server.url",
|
|
"--blackduck.api.token=apiToken",
|
|
"--detect.project.name=\\\"testName\\\"",
|
|
"--detect.project.version.name=\\\"1.0\\\"",
|
|
"--detect.project.user.groups=\\\"testGroup\\\",\\\"testGroup2\\\"",
|
|
"--detect.policy.check.fail.on.severities=BLOCKER,MAJOR",
|
|
"--detect.code.location.name=\\\"testLocation\\\"",
|
|
"--detect.source.path=path1",
|
|
},
|
|
},
|
|
}
|
|
|
|
for k, v := range testData {
|
|
t.Run(fmt.Sprintf("run %v", k), func(t *testing.T) {
|
|
got, err := addDetectArgs(v.args, v.options, &fileUtilsMock, &httpClient)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, v.expected, got)
|
|
})
|
|
}
|
|
}
|