Skip to content

Commit c40a287

Browse files
committed
fix some more tests
1 parent 0b8810b commit c40a287

File tree

13 files changed

+481
-921
lines changed

13 files changed

+481
-921
lines changed

audit_test.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,17 +40,17 @@ import (
4040
func TestXrayAuditNpmJson(t *testing.T) {
4141
output := testAuditNpm(t, string(format.Json), false)
4242
validations.VerifyJsonResults(t, output, validations.ValidationParams{
43-
SecurityViolations: 1,
44-
Licenses: 1,
43+
ScaSecurityViolations: 1,
44+
Licenses: 1,
4545
})
4646
}
4747

4848
func TestXrayAuditNpmSimpleJson(t *testing.T) {
4949
output := testAuditNpm(t, string(format.SimpleJson), true)
5050
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
51-
SecurityViolations: 1,
52-
Vulnerabilities: 1,
53-
Licenses: 1,
51+
ScaSecurityViolations: 1,
52+
Vulnerabilities: 1,
53+
Licenses: 1,
5454
})
5555
}
5656

scans_test.go

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,9 @@ func TestXrayBinaryScanJson(t *testing.T) {
5252
func TestXrayBinaryScanSimpleJson(t *testing.T) {
5353
output := testXrayBinaryScan(t, string(format.SimpleJson), true)
5454
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
55-
Vulnerabilities: 1,
56-
SecurityViolations: 1,
57-
Licenses: 1,
55+
Vulnerabilities: 1,
56+
ScaSecurityViolations: 1,
57+
Licenses: 1,
5858
})
5959
}
6060

@@ -73,9 +73,9 @@ func TestXrayBinaryScanSimpleJsonWithProgress(t *testing.T) {
7373
defer callback()
7474
output := testXrayBinaryScan(t, string(format.SimpleJson), true)
7575
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
76-
Vulnerabilities: 1,
77-
SecurityViolations: 1,
78-
Licenses: 1,
76+
Vulnerabilities: 1,
77+
ScaSecurityViolations: 1,
78+
Licenses: 1,
7979
})
8080
}
8181

@@ -181,7 +181,7 @@ func runDockerScan(t *testing.T, testCli *coreTests.JfrogCli, imageName, watchNa
181181
cmdArgs = append(cmdArgs, "--watches="+watchName)
182182
output = testCli.WithoutCredentials().RunCliCmdWithOutput(t, cmdArgs...)
183183
if assert.NotEmpty(t, output) {
184-
validations.VerifyJsonResults(t, output, validations.ValidationParams{SecurityViolations: minViolations})
184+
validations.VerifyJsonResults(t, output, validations.ValidationParams{ScaSecurityViolations: minViolations})
185185
}
186186
}
187187
}

tests/testdata/output/audit/audit_results.json

Lines changed: 0 additions & 326 deletions
Large diffs are not rendered by default.

tests/testdata/output/audit/audit_simple_json.json

Lines changed: 56 additions & 402 deletions
Large diffs are not rendered by default.

tests/testdata/output/dockerscan/docker_results.json

Lines changed: 378 additions & 163 deletions
Large diffs are not rendered by default.

tests/testdata/output/dockerscan/docker_summary.json

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,10 +32,23 @@
3232
"sast": {}
3333
},
3434
"violations": {
35+
"watches": [
36+
"Security_watch_2"
37+
],
3538
"sca": {
3639
"scan_ids": [
3740
"27da9106-88ea-416b-799b-bc7d15783473"
38-
]
41+
],
42+
"security": {
43+
"Critical": {
44+
"Undetermined": 1
45+
}
46+
}
47+
},
48+
"secrets": {
49+
"Medium": {
50+
"": 2
51+
}
3952
}
4053
}
4154
}

utils/results/conversion/convertor_test.go

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -39,13 +39,12 @@ func getAuditValidationParams() validations.ValidationParams {
3939
SastVulnerabilities: 4,
4040
SecretsVulnerabilities: 3,
4141

42-
Violations: 18,
43-
SecurityViolations: 11,
42+
Violations: 7,
43+
ScaSecurityViolations: 5,
4444
ApplicableViolations: 1,
45-
NotApplicableViolations: 7,
46-
NotCoveredViolations: 3,
47-
SastViolations: 4,
48-
SecretsViolations: 3,
45+
NotApplicableViolations: 4,
46+
SastViolations: 1,
47+
SecretsViolations: 1,
4948
}
5049
}
5150

@@ -55,6 +54,11 @@ func getDockerScanValidationParams(unique bool) validations.ValidationParams {
5554
params := validations.ValidationParams{
5655
ExactResultsMatch: true,
5756
SecretsVulnerabilities: 3,
57+
58+
Violations: 3,
59+
ScaSecurityViolations: 1,
60+
UndeterminedViolations: 1,
61+
SecretsViolations: 2,
5862
}
5963
if unique {
6064
params.Vulnerabilities = 11

utils/validations/test_validate_sarif.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ func ValidateSarifIssuesCount(t *testing.T, params ValidationParams, report *sar
6868
ValidateContent(t, params.ExactResultsMatch,
6969
// Total
7070
CountValidation[int]{Expected: params.Vulnerabilities, Actual: vulnerabilities, Msg: GetValidationCountErrMsg("vulnerabilities", "sarif report", params.ExactResultsMatch, params.Vulnerabilities, vulnerabilities)},
71-
CountValidation[int]{Expected: params.SecurityViolations, Actual: violations, Msg: GetValidationCountErrMsg("violations", "sarif report", params.ExactResultsMatch, params.SecurityViolations, violations)},
71+
CountValidation[int]{Expected: params.ScaSecurityViolations, Actual: violations, Msg: GetValidationCountErrMsg("violations", "sarif report", params.ExactResultsMatch, params.ScaSecurityViolations, violations)},
7272
// JAS Vulnerabilities
7373
CountValidation[int]{Expected: params.SastVulnerabilities, Actual: sastVulnerabilities, Msg: GetValidationCountErrMsg("sast vulnerabilities", "sarif report", params.ExactResultsMatch, params.SastVulnerabilities, sastVulnerabilities)},
7474
CountValidation[int]{Expected: params.IacVulnerabilities, Actual: iacVulnerabilities, Msg: GetValidationCountErrMsg("Iac vulnerabilities", "sarif report", params.ExactResultsMatch, params.IacVulnerabilities, iacVulnerabilities)},
@@ -91,7 +91,7 @@ func ValidateSarifIssuesCount(t *testing.T, params ValidationParams, report *sar
9191
CountValidation[int]{Expected: params.NotCoveredViolations, Actual: notCoveredViolationsResults, Msg: GetValidationCountErrMsg("not covered violations", "sarif report", params.ExactResultsMatch, params.NotCoveredViolations, notCoveredViolationsResults)},
9292
CountValidation[int]{Expected: params.NotApplicableViolations, Actual: notApplicableViolationsResults, Msg: GetValidationCountErrMsg("not applicable violations", "sarif report", params.ExactResultsMatch, params.NotApplicableViolations, notApplicableViolationsResults)},
9393
CountValidation[int]{Expected: params.MissingContextViolations, Actual: missingContextViolationsResults, Msg: GetValidationCountErrMsg("missing context violations", "sarif report", params.ExactResultsMatch, params.MissingContextViolations, missingContextViolationsResults)},
94-
CountValidation[int]{Expected: params.SecurityViolations, Actual: securityViolations, Msg: GetValidationCountErrMsg("security violations", "sarif report", params.ExactResultsMatch, params.SecurityViolations, securityViolations)},
94+
CountValidation[int]{Expected: params.ScaSecurityViolations, Actual: securityViolations, Msg: GetValidationCountErrMsg("security violations", "sarif report", params.ExactResultsMatch, params.ScaSecurityViolations, securityViolations)},
9595
CountValidation[int]{Expected: params.LicenseViolations, Actual: licenseViolations, Msg: GetValidationCountErrMsg("license violations", "sarif report", params.ExactResultsMatch, params.LicenseViolations, licenseViolations)},
9696
)
9797
}

utils/validations/test_validate_sca.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ func ValidateScanResponseIssuesCount(t *testing.T, params ValidationParams, cont
5858
ValidateContent(t, params.ExactResultsMatch,
5959
CountValidation[int]{Expected: params.Vulnerabilities, Actual: vulnerabilities, Msg: GetValidationCountErrMsg("vulnerabilities", "scan responses", params.ExactResultsMatch, params.Vulnerabilities, vulnerabilities)},
6060
CountValidation[int]{Expected: params.Licenses, Actual: licenses, Msg: GetValidationCountErrMsg("licenses", "scan responses", params.ExactResultsMatch, params.Licenses, licenses)},
61-
CountValidation[int]{Expected: params.SecurityViolations, Actual: securityViolations, Msg: GetValidationCountErrMsg("security violations", "scan responses", params.ExactResultsMatch, params.SecurityViolations, securityViolations)},
61+
CountValidation[int]{Expected: params.ScaSecurityViolations, Actual: securityViolations, Msg: GetValidationCountErrMsg("security violations", "scan responses", params.ExactResultsMatch, params.ScaSecurityViolations, securityViolations)},
6262
CountValidation[int]{Expected: params.LicenseViolations, Actual: licenseViolations, Msg: GetValidationCountErrMsg("license violations", "scan responses", params.ExactResultsMatch, params.LicenseViolations, licenseViolations)},
6363
CountValidation[int]{Expected: params.OperationalViolations, Actual: operationalViolations, Msg: GetValidationCountErrMsg("operational risk violations", "scan responses", params.ExactResultsMatch, params.OperationalViolations, operationalViolations)},
6464
)

utils/validations/test_validate_simple_json.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ func ValidateSimpleJsonIssuesCount(t *testing.T, params ValidationParams, result
133133
CountValidation[int]{Expected: params.NotCoveredViolations, Actual: notCoveredViolationsResults, Msg: GetValidationCountErrMsg("not covered violations", "simple-json", params.ExactResultsMatch, params.NotCoveredViolations, notCoveredViolationsResults)},
134134
CountValidation[int]{Expected: params.NotApplicableViolations, Actual: notApplicableViolationsResults, Msg: GetValidationCountErrMsg("not applicable violations", "simple-json", params.ExactResultsMatch, params.NotApplicableViolations, notApplicableViolationsResults)},
135135
CountValidation[int]{Expected: params.MissingContextViolations, Actual: missingContextViolationsResults, Msg: GetValidationCountErrMsg("missing context violations", "simple-json", params.ExactResultsMatch, params.MissingContextViolations, missingContextViolationsResults)},
136-
CountValidation[int]{Expected: params.SecurityViolations, Actual: securityViolations, Msg: GetValidationCountErrMsg("security violations", "simple-json", params.ExactResultsMatch, params.SecurityViolations, securityViolations)},
136+
CountValidation[int]{Expected: params.ScaSecurityViolations, Actual: securityViolations, Msg: GetValidationCountErrMsg("security violations", "simple-json", params.ExactResultsMatch, params.ScaSecurityViolations, securityViolations)},
137137
CountValidation[int]{Expected: params.LicenseViolations, Actual: licenseViolations, Msg: GetValidationCountErrMsg("license violations", "simple-json", params.ExactResultsMatch, params.LicenseViolations, licenseViolations)},
138138
CountValidation[int]{Expected: params.OperationalViolations, Actual: opRiskViolations, Msg: GetValidationCountErrMsg("operational risk violations", "simple-json", params.ExactResultsMatch, params.OperationalViolations, opRiskViolations)},
139139
)

0 commit comments

Comments
 (0)