Skip to content

Commit 4be861f

Browse files
authored
Scan - Add Xray version to Xray graph scan params (jfrog#253)
1 parent de3a3b9 commit 4be861f

File tree

4 files changed

+19
-11
lines changed

4 files changed

+19
-11
lines changed

.github/workflows/test.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ concurrency:
1818
# Environment variables shared across all jobs.
1919
env:
2020
GOPROXY: direct
21-
GO_COMMON_TEST_ARGS: "-v github.com/jfrog/jfrog-cli-security --race --timeout 30m --jfrog.url=${{ secrets.PLATFORM_URL }} --jfrog.adminToken=${{ secrets.PLATFORM_ADMIN_TOKEN }}"
21+
GO_COMMON_TEST_ARGS: "-v github.com/jfrog/jfrog-cli-security --race --timeout 30m --jfrog.url=${{ secrets.PLATFORM_URL }} --jfrog.adminToken=${{ secrets.PLATFORM_ADMIN_TOKEN }} --test.containerRegistry=${{ secrets.CONTAINER_REGISTRY }}"
2222
GRADLE_OPTS: -Dorg.gradle.daemon=false
2323
CI: true
2424
JFROG_CLI_LOG_LEVEL: DEBUG
@@ -180,6 +180,10 @@ jobs:
180180
# Test
181181
- name: Run tests
182182
run: go test ${{ env.GO_COMMON_TEST_ARGS }} --test.xsc
183+
if: ${{ matrix.os != 'ubuntu' }}
184+
- name: Run security tests (with Docker Scan)
185+
run: go test ${{ env.GO_COMMON_TEST_ARGS }} --test.xsc --test.dockerScan --ci.runId=${{ runner.os }}-sec-test
186+
if: ${{ matrix.os == 'ubuntu' }}
183187

184188
Other_Scan_Commands_Integration_Tests:
185189
name: "[${{ matrix.os }}] Other Scan Commands Integration Tests"
@@ -204,7 +208,7 @@ jobs:
204208
run: go test ${{ env.GO_COMMON_TEST_ARGS }} --test.scan
205209
if: ${{ matrix.os != 'ubuntu' }}
206210
- name: Run security tests (with Docker Scan)
207-
run: go test ${{ env.GO_COMMON_TEST_ARGS }} --test.scan --test.dockerScan --test.containerRegistry=${{ secrets.CONTAINER_REGISTRY }} --ci.runId=${{ runner.os }}-sec-test
211+
run: go test ${{ env.GO_COMMON_TEST_ARGS }} --test.scan --test.dockerScan --ci.runId=${{ runner.os }}-sec-test
208212
if: ${{ matrix.os == 'ubuntu' }}
209213

210214
Other_Commands_Integration_Tests:

audit_test.go

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ import (
3838
)
3939

4040
func TestXrayAuditNpmJson(t *testing.T) {
41+
integration.InitAuditJavaScriptTest(t, scangraph.GraphScanMinXrayVersion)
4142
output := testAuditNpm(t, string(format.Json), false)
4243
validations.VerifyJsonResults(t, output, validations.ValidationParams{
4344
SecurityViolations: 1,
@@ -46,6 +47,7 @@ func TestXrayAuditNpmJson(t *testing.T) {
4647
}
4748

4849
func TestXrayAuditNpmSimpleJson(t *testing.T) {
50+
integration.InitAuditJavaScriptTest(t, scangraph.GraphScanMinXrayVersion)
4951
output := testAuditNpm(t, string(format.SimpleJson), true)
5052
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
5153
SecurityViolations: 1,
@@ -55,7 +57,6 @@ func TestXrayAuditNpmSimpleJson(t *testing.T) {
5557
}
5658

5759
func testAuditNpm(t *testing.T, format string, withVuln bool) string {
58-
integration.InitAuditJavaScriptTest(t, scangraph.GraphScanMinXrayVersion)
5960
_, cleanUp := securityTestUtils.CreateTestProjectEnvAndChdir(t, filepath.Join(filepath.FromSlash(securityTests.GetTestResourcesPath()), "projects", "package-managers", "npm", "npm"))
6061
defer cleanUp()
6162
// Run npm install before executing jfrog xr npm-audit
@@ -337,23 +338,24 @@ func testXrayAuditGradle(t *testing.T, format string) string {
337338
}
338339

339340
func TestXrayAuditMavenJson(t *testing.T) {
340-
output := testXscAuditMaven(t, string(format.Json))
341+
integration.InitAuditJavaTest(t, scangraph.GraphScanMinXrayVersion)
342+
output := testAuditMaven(t, string(format.Json))
341343
validations.VerifyJsonResults(t, output, validations.ValidationParams{
342344
Vulnerabilities: 1,
343345
Licenses: 1,
344346
})
345347
}
346348

347349
func TestXrayAuditMavenSimpleJson(t *testing.T) {
348-
output := testXscAuditMaven(t, string(format.SimpleJson))
350+
integration.InitAuditJavaTest(t, scangraph.GraphScanMinXrayVersion)
351+
output := testAuditMaven(t, string(format.SimpleJson))
349352
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
350353
Vulnerabilities: 1,
351354
Licenses: 1,
352355
})
353356
}
354357

355-
func testXscAuditMaven(t *testing.T, format string) string {
356-
integration.InitAuditJavaTest(t, scangraph.GraphScanMinXrayVersion)
358+
func testAuditMaven(t *testing.T, format string) string {
357359
_, cleanUp := securityTestUtils.CreateTestProjectEnvAndChdir(t, filepath.Join(filepath.FromSlash(securityTests.GetTestResourcesPath()), "projects", "package-managers", "maven", "maven"))
358360
defer cleanUp()
359361
// Add dummy descriptor file to check that we run only specific audit

commands/scan/scan.go

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -450,9 +450,11 @@ func (scanCmd *ScanCommand) createIndexerHandlerFunc(file *spec.File, cmdResults
450450
IncludeVulnerabilities: scanCmd.includeVulnerabilities,
451451
ProjectKey: scanCmd.projectKey,
452452
ScanType: services.Binary,
453+
MultiScanId: cmdResults.MultiScanId,
454+
XscVersion: cmdResults.XscVersion,
455+
XrayVersion: cmdResults.XrayVersion,
453456
}
454-
params.MultiScanId = cmdResults.MultiScanId
455-
params.XscVersion = cmdResults.XscVersion
457+
456458
if scanCmd.progress != nil {
457459
scanCmd.progress.SetHeadlineMsg("Scanning 🔍")
458460
}

xsc_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ func TestXscAuditNpmSimpleJsonWithWatch(t *testing.T) {
5252
func TestXscAuditMavenJson(t *testing.T) {
5353
_, _, cleanUp := integration.InitXscTest(t)
5454
defer cleanUp()
55-
output := testXscAuditMaven(t, string(format.Json))
55+
output := testAuditMaven(t, string(format.Json))
5656
validations.VerifyJsonResults(t, output, validations.ValidationParams{
5757
Vulnerabilities: 1,
5858
Licenses: 1,
@@ -62,7 +62,7 @@ func TestXscAuditMavenJson(t *testing.T) {
6262
func TestXscAuditMavenSimpleJson(t *testing.T) {
6363
_, _, cleanUp := integration.InitXscTest(t)
6464
defer cleanUp()
65-
output := testXscAuditMaven(t, string(format.SimpleJson))
65+
output := testAuditMaven(t, string(format.SimpleJson))
6666
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
6767
Vulnerabilities: 1,
6868
Licenses: 1,

0 commit comments

Comments
 (0)