mirror of
https://github.com/SAP/jenkins-library.git
synced 2024-12-14 11:03:09 +02:00
989c47db2c
* add test cases for sonar pkg
* add sonar pkg
* read task report and write reports JSON
* use alias
* rename type
* set read permission on created files
* archive reports
* handle empty report lists
* use filepath
* simplify report creation
* improve error message
* Revert "archive reports"
This reverts commit ba4b56fec1
.
* improve test cases
* Add descriptions
Co-Authored-By: Stephan Aßmus <stephan.assmus@sap.com>
* improve tests
Co-Authored-By: Stephan Aßmus <stephan.assmus@sap.com>
Co-authored-by: Stephan Aßmus <stephan.assmus@sap.com>
344 lines
12 KiB
Go
344 lines
12 KiB
Go
package cmd
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"net/http"
|
|
"os"
|
|
"os/exec"
|
|
"path/filepath"
|
|
"testing"
|
|
|
|
piperHttp "github.com/SAP/jenkins-library/pkg/http"
|
|
"github.com/SAP/jenkins-library/pkg/mock"
|
|
FileUtils "github.com/SAP/jenkins-library/pkg/piperutils"
|
|
"github.com/pkg/errors"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
//TODO: extract to mock package
|
|
type mockDownloader struct {
|
|
shouldFail bool
|
|
requestedURL []string
|
|
requestedFile []string
|
|
}
|
|
|
|
func (m *mockDownloader) DownloadFile(url, filename string, header http.Header, cookies []*http.Cookie) error {
|
|
m.requestedURL = append(m.requestedURL, url)
|
|
m.requestedFile = append(m.requestedFile, filename)
|
|
if m.shouldFail {
|
|
return errors.New("something happened")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *mockDownloader) SetOptions(options piperHttp.ClientOptions) {}
|
|
|
|
func mockFileUtilsExists(exists bool) func(string) (bool, error) {
|
|
return func(filename string) (bool, error) {
|
|
if exists {
|
|
return true, nil
|
|
}
|
|
return false, errors.New("something happened")
|
|
}
|
|
}
|
|
|
|
func mockExecLookPath(executable string) (string, error) {
|
|
if executable == "local-sonar-scanner" {
|
|
return "/usr/bin/sonar-scanner", nil
|
|
}
|
|
return "", errors.New("something happened")
|
|
}
|
|
|
|
func mockFileUtilsUnzip(t *testing.T, expectSrc string) func(string, string) ([]string, error) {
|
|
return func(src, dest string) ([]string, error) {
|
|
assert.Equal(t, filepath.Join(dest, expectSrc), src)
|
|
return []string{}, nil
|
|
}
|
|
}
|
|
|
|
func mockOsRename(t *testing.T, expectOld, expectNew string) func(string, string) error {
|
|
return func(old, new string) error {
|
|
assert.Regexp(t, expectOld, old)
|
|
assert.Equal(t, expectNew, new)
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func createTaskReportFile(t *testing.T, workingDir string) {
|
|
require.NoError(t, os.MkdirAll(filepath.Join(workingDir, ".scannerwork"), 0755))
|
|
require.NoError(t, ioutil.WriteFile(filepath.Join(workingDir, ".scannerwork", "report-task.txt"), []byte("projectKey=piper-test\nserverUrl=https://sonarcloud.io\nserverVersion=8.0.0.12345\ndashboardUrl=https://sonarcloud.io/dashboard/index/piper-test\nceTaskId=AXERR2JBbm9IiM5TEST\nceTaskUrl=https://sonarcloud.io/api/ce/task?id=AXERR2JBbm9IiMTEST"), 0755))
|
|
require.FileExists(t, filepath.Join(workingDir, ".scannerwork", "report-task.txt"))
|
|
}
|
|
|
|
func TestRunSonar(t *testing.T) {
|
|
mockRunner := mock.ExecMockRunner{}
|
|
mockClient := mockDownloader{shouldFail: false}
|
|
|
|
t.Run("default", func(t *testing.T) {
|
|
// init
|
|
tmpFolder, err := ioutil.TempDir(".", "test-sonar-")
|
|
require.NoError(t, err)
|
|
defer os.RemoveAll(tmpFolder)
|
|
createTaskReportFile(t, tmpFolder)
|
|
|
|
sonar = sonarSettings{
|
|
workingDir: tmpFolder,
|
|
binary: "sonar-scanner",
|
|
environment: []string{},
|
|
options: []string{},
|
|
}
|
|
options := sonarExecuteScanOptions{
|
|
CustomTLSCertificateLinks: "",
|
|
Token: "secret-ABC",
|
|
Host: "https://sonar.sap.com",
|
|
Organization: "SAP",
|
|
ProjectVersion: "1.2.3",
|
|
}
|
|
fileUtilsExists = mockFileUtilsExists(true)
|
|
os.Setenv("PIPER_SONAR_LOAD_CERTIFICATES", "true")
|
|
require.Equal(t, "true", os.Getenv("PIPER_SONAR_LOAD_CERTIFICATES"), "PIPER_SONAR_LOAD_CERTIFICATES must be set")
|
|
defer func() {
|
|
fileUtilsExists = FileUtils.FileExists
|
|
os.Unsetenv("PIPER_SONAR_LOAD_CERTIFICATES")
|
|
}()
|
|
// test
|
|
err = runSonar(options, &mockClient, &mockRunner)
|
|
// assert
|
|
assert.NoError(t, err)
|
|
assert.Contains(t, sonar.options, "-Dsonar.projectVersion=1.2.3")
|
|
assert.Contains(t, sonar.options, "-Dsonar.organization=SAP")
|
|
assert.Contains(t, sonar.environment, "SONAR_HOST_URL=https://sonar.sap.com")
|
|
assert.Contains(t, sonar.environment, "SONAR_TOKEN=secret-ABC")
|
|
assert.Contains(t, sonar.environment, "SONAR_SCANNER_OPTS=-Djavax.net.ssl.trustStore="+filepath.Join(getWorkingDir(), ".certificates", "cacerts"))
|
|
assert.FileExists(t, filepath.Join(sonar.workingDir, "sonarExecuteScan_reports.json"))
|
|
assert.FileExists(t, filepath.Join(sonar.workingDir, "sonarExecuteScan_links.json"))
|
|
})
|
|
t.Run("with custom options", func(t *testing.T) {
|
|
// init
|
|
tmpFolder, err := ioutil.TempDir(".", "test-sonar-")
|
|
require.NoError(t, err)
|
|
defer os.RemoveAll(tmpFolder)
|
|
createTaskReportFile(t, tmpFolder)
|
|
|
|
sonar = sonarSettings{
|
|
workingDir: tmpFolder,
|
|
binary: "sonar-scanner",
|
|
environment: []string{},
|
|
options: []string{},
|
|
}
|
|
options := sonarExecuteScanOptions{
|
|
Options: []string{"-Dsonar.projectKey=piper"},
|
|
}
|
|
fileUtilsExists = mockFileUtilsExists(true)
|
|
defer func() {
|
|
fileUtilsExists = FileUtils.FileExists
|
|
}()
|
|
// test
|
|
err = runSonar(options, &mockClient, &mockRunner)
|
|
// assert
|
|
assert.NoError(t, err)
|
|
assert.Contains(t, sonar.options, "-Dsonar.projectKey=piper")
|
|
})
|
|
}
|
|
|
|
func TestSonarHandlePullRequest(t *testing.T) {
|
|
t.Run("default", func(t *testing.T) {
|
|
// init
|
|
sonar = sonarSettings{
|
|
binary: "sonar-scanner",
|
|
environment: []string{},
|
|
options: []string{},
|
|
}
|
|
options := sonarExecuteScanOptions{
|
|
ChangeID: "123",
|
|
PullRequestProvider: "GitHub",
|
|
ChangeBranch: "feat/bogus",
|
|
ChangeTarget: "master",
|
|
Owner: "SAP",
|
|
Repository: "jenkins-library",
|
|
}
|
|
// test
|
|
err := handlePullRequest(options)
|
|
// assert
|
|
assert.NoError(t, err)
|
|
assert.Contains(t, sonar.options, "sonar.pullrequest.key=123")
|
|
assert.Contains(t, sonar.options, "sonar.pullrequest.provider=github")
|
|
assert.Contains(t, sonar.options, "sonar.pullrequest.base=master")
|
|
assert.Contains(t, sonar.options, "sonar.pullrequest.branch=feat/bogus")
|
|
assert.Contains(t, sonar.options, "sonar.pullrequest.github.repository=SAP/jenkins-library")
|
|
})
|
|
t.Run("unsupported scm provider", func(t *testing.T) {
|
|
// init
|
|
sonar = sonarSettings{
|
|
binary: "sonar-scanner",
|
|
environment: []string{},
|
|
options: []string{},
|
|
}
|
|
options := sonarExecuteScanOptions{
|
|
ChangeID: "123",
|
|
PullRequestProvider: "Gerrit",
|
|
}
|
|
// test
|
|
err := handlePullRequest(options)
|
|
// assert
|
|
assert.Error(t, err)
|
|
assert.Equal(t, "Pull-Request provider 'gerrit' is not supported!", err.Error())
|
|
})
|
|
t.Run("legacy", func(t *testing.T) {
|
|
// init
|
|
sonar = sonarSettings{
|
|
binary: "sonar-scanner",
|
|
environment: []string{},
|
|
options: []string{},
|
|
}
|
|
options := sonarExecuteScanOptions{
|
|
LegacyPRHandling: true,
|
|
ChangeID: "123",
|
|
Owner: "SAP",
|
|
Repository: "jenkins-library",
|
|
GithubToken: "some-token",
|
|
DisableInlineComments: true,
|
|
}
|
|
// test
|
|
err := handlePullRequest(options)
|
|
// assert
|
|
assert.NoError(t, err)
|
|
assert.Contains(t, sonar.options, "sonar.analysis.mode=preview")
|
|
assert.Contains(t, sonar.options, "sonar.github.pullRequest=123")
|
|
assert.Contains(t, sonar.options, "sonar.github.oauth=some-token")
|
|
assert.Contains(t, sonar.options, "sonar.github.repository=SAP/jenkins-library")
|
|
assert.Contains(t, sonar.options, "sonar.github.disableInlineComments=true")
|
|
})
|
|
}
|
|
|
|
func TestSonarLoadScanner(t *testing.T) {
|
|
mockClient := mockDownloader{shouldFail: false}
|
|
|
|
t.Run("use preinstalled sonar-scanner", func(t *testing.T) {
|
|
// init
|
|
ignore := ""
|
|
sonar = sonarSettings{
|
|
binary: "local-sonar-scanner",
|
|
environment: []string{},
|
|
options: []string{},
|
|
}
|
|
execLookPath = mockExecLookPath
|
|
defer func() { execLookPath = exec.LookPath }()
|
|
// test
|
|
err := loadSonarScanner(ignore, &mockClient)
|
|
// assert
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "local-sonar-scanner", sonar.binary)
|
|
})
|
|
|
|
t.Run("use downloaded sonar-scanner", func(t *testing.T) {
|
|
// init
|
|
url := "https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-4.3.0.2102-linux.zip"
|
|
sonar = sonarSettings{
|
|
binary: "sonar-scanner",
|
|
environment: []string{},
|
|
options: []string{},
|
|
}
|
|
execLookPath = mockExecLookPath
|
|
fileUtilsUnzip = mockFileUtilsUnzip(t, "sonar-scanner-cli-4.3.0.2102-linux.zip")
|
|
osRename = mockOsRename(t, "sonar-scanner-4.3.0.2102-linux", ".sonar-scanner")
|
|
defer func() {
|
|
execLookPath = exec.LookPath
|
|
fileUtilsUnzip = FileUtils.Unzip
|
|
osRename = os.Rename
|
|
}()
|
|
// test
|
|
err := loadSonarScanner(url, &mockClient)
|
|
// assert
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, url, mockClient.requestedURL[0])
|
|
assert.Regexp(t, "sonar-scanner-cli-4.3.0.2102-linux.zip$", mockClient.requestedFile[0])
|
|
assert.Equal(t, filepath.Join(getWorkingDir(), ".sonar-scanner", "bin", "sonar-scanner"), sonar.binary)
|
|
})
|
|
}
|
|
|
|
func TestSonarLoadCertificates(t *testing.T) {
|
|
mockRunner := mock.ExecMockRunner{}
|
|
mockClient := mockDownloader{shouldFail: false}
|
|
|
|
t.Run("use local trust store", func(t *testing.T) {
|
|
// init
|
|
sonar = sonarSettings{
|
|
binary: "sonar-scanner",
|
|
environment: []string{},
|
|
options: []string{},
|
|
}
|
|
fileUtilsExists = mockFileUtilsExists(true)
|
|
defer func() { fileUtilsExists = FileUtils.FileExists }()
|
|
// test
|
|
err := loadCertificates("", &mockClient, &mockRunner)
|
|
// assert
|
|
assert.NoError(t, err)
|
|
assert.Contains(t, sonar.environment, "SONAR_SCANNER_OPTS=-Djavax.net.ssl.trustStore="+filepath.Join(getWorkingDir(), ".certificates", "cacerts"))
|
|
})
|
|
|
|
t.Run("use local trust store with downloaded certificates", func(t *testing.T) {
|
|
// init
|
|
sonar = sonarSettings{
|
|
binary: "sonar-scanner",
|
|
environment: []string{},
|
|
options: []string{},
|
|
}
|
|
fileUtilsExists = mockFileUtilsExists(false)
|
|
os.Setenv("PIPER_SONAR_LOAD_CERTIFICATES", "true")
|
|
require.Equal(t, "true", os.Getenv("PIPER_SONAR_LOAD_CERTIFICATES"), "PIPER_SONAR_LOAD_CERTIFICATES must be set")
|
|
defer func() {
|
|
fileUtilsExists = FileUtils.FileExists
|
|
os.Unsetenv("PIPER_SONAR_LOAD_CERTIFICATES")
|
|
}()
|
|
// test
|
|
err := loadCertificates("https://sap.com/custom-1.crt,https://sap.com/custom-2.crt", &mockClient, &mockRunner)
|
|
// assert
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "https://sap.com/custom-1.crt", mockClient.requestedURL[0])
|
|
assert.Equal(t, "https://sap.com/custom-2.crt", mockClient.requestedURL[1])
|
|
assert.Regexp(t, "custom-1.crt$", mockClient.requestedFile[0])
|
|
assert.Regexp(t, "custom-2.crt$", mockClient.requestedFile[1])
|
|
assert.Contains(t, sonar.environment, "SONAR_SCANNER_OPTS=-Djavax.net.ssl.trustStore="+filepath.Join(getWorkingDir(), ".certificates", "cacerts"))
|
|
})
|
|
|
|
t.Run("use local trust store with downloaded certificates - deactivated", func(t *testing.T) {
|
|
// init
|
|
sonar = sonarSettings{
|
|
binary: "sonar-scanner",
|
|
environment: []string{},
|
|
options: []string{},
|
|
}
|
|
fileUtilsExists = mockFileUtilsExists(false)
|
|
require.Empty(t, os.Getenv("PIPER_SONAR_LOAD_CERTIFICATES"), "PIPER_SONAR_LOAD_CERTIFICATES must not be set")
|
|
defer func() { fileUtilsExists = FileUtils.FileExists }()
|
|
// test
|
|
err := loadCertificates("any-certificate-url", &mockClient, &mockRunner)
|
|
// assert
|
|
assert.NoError(t, err)
|
|
assert.NotContains(t, sonar.environment, "SONAR_SCANNER_OPTS=-Djavax.net.ssl.trustStore="+filepath.Join(getWorkingDir(), ".certificates", "cacerts"))
|
|
})
|
|
|
|
t.Run("use no trust store", func(t *testing.T) {
|
|
// init
|
|
sonar = sonarSettings{
|
|
binary: "sonar-scanner",
|
|
environment: []string{},
|
|
options: []string{},
|
|
}
|
|
fileUtilsExists = mockFileUtilsExists(false)
|
|
os.Setenv("PIPER_SONAR_LOAD_CERTIFICATES", "true")
|
|
require.Equal(t, "true", os.Getenv("PIPER_SONAR_LOAD_CERTIFICATES"), "PIPER_SONAR_LOAD_CERTIFICATES must be set")
|
|
defer func() {
|
|
fileUtilsExists = FileUtils.FileExists
|
|
os.Unsetenv("PIPER_SONAR_LOAD_CERTIFICATES")
|
|
}()
|
|
// test
|
|
err := loadCertificates("", &mockClient, &mockRunner)
|
|
// assert
|
|
assert.NoError(t, err)
|
|
assert.Empty(t, sonar.environment)
|
|
})
|
|
}
|