Skip to content

Commit 44fc4c8

Browse files
authored
chore: run unit tests (#3773)
1 parent 71b341c commit 44fc4c8

22 files changed

+71
-112
lines changed

Makefile

+4-4
Original file line numberDiff line numberDiff line change
@@ -28,19 +28,19 @@ test-failing:
2828
CGO_ENABLED=0 go test -timeout=5m $(shell go list ./... | grep -v /vendor/) | grep FAIL
2929

3030
test:
31-
CGO_ENABLED=0 go test -timeout=5m $(shell go list ./... | grep -v /vendor/ | grep -v pkg/detectors)
31+
CGO_ENABLED=0 go test -timeout=5m $(shell go list ./... | grep -v /vendor/)
3232

3333
test-integration:
34-
CGO_ENABLED=0 go test -timeout=5m -tags=integration $(shell go list ./... | grep -v /vendor/ | grep -v pkg/detectors)
34+
CGO_ENABLED=0 go test -timeout=5m -tags=integration $(shell go list ./... | grep -v /vendor/)
3535

3636
test-race:
37-
CGO_ENABLED=1 go test -timeout=5m -race $(shell go list ./... | grep -v /vendor/ | grep -v pkg/detectors)
37+
CGO_ENABLED=1 go test -timeout=5m -race $(shell go list ./... | grep -v /vendor/)
3838

3939
test-detectors:
4040
CGO_ENABLED=0 go test -tags=detectors -timeout=5m $(shell go list ./... | grep pkg/detectors)
4141

4242
test-community:
43-
CGO_ENABLED=0 go test -timeout=5m $(shell go list ./... | grep -v /vendor/ | grep -v pkg/detectors | grep -v pkg/sources | grep -v pkg/analyzer/analyzers)
43+
CGO_ENABLED=0 go test -timeout=5m $(shell go list ./... | grep -v /vendor/ | grep -v pkg/sources | grep -v pkg/analyzer/analyzers)
4444

4545
bench:
4646
CGO_ENABLED=0 go test $(shell go list ./pkg/secrets/... | grep -v /vendor/) -benchmem -run=xxx -bench .

pkg/detectors/algoliaadminkey/algoliaadminkey_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ func TestAlgoliaAdminKey_Pattern(t *testing.T) {
2828
{
2929
name: "valid pattern",
3030
input: fmt.Sprintf("algolia: '%s'", validPattern),
31-
want: []string{"AlgoliaAdminKey010TESTINGPlmiOPCADMIN01KEY"},
31+
want: []string{"ADMIN01KEY:AlgoliaAdminKey010TESTINGPlmiOPC"},
3232
},
3333
{
3434
name: "valid pattern - key out of prefix range",

pkg/detectors/aws/access_keys/accesskey_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ func TestAWS_Pattern(t *testing.T) {
3737
{
3838
name: "valid pattern",
3939
input: validPattern,
40-
want: []string{"ABIAS9L8MS5IPHTZPPUQv2QPKHl7LcdVYsjaR4LgQiZ1zw3MAnMyiondXC63"},
40+
want: []string{"ABIAS9L8MS5IPHTZPPUQ:v2QPKHl7LcdVYsjaR4LgQiZ1zw3MAnMyiondXC63"},
4141
},
4242
{
4343
name: "invalid pattern",

pkg/detectors/aws/session_keys/sessionkeys_test.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ var (
1515
aws credentials{
1616
id: ASIABBKK02W42Q3IPSPG
1717
secret: fkhIiUwQY32Zu9e4a86g9r3WpTzfE1aXljVcgn8O
18-
session: >aSqfp/GTZbJP+=tXPNCZ9GoveoM0vgxtlYXdzPQ2uYNMPPgUkt0VT7SoTLasAo7iVqWWREOUC6DEenlcgDEKyzIEgQ=W5Ju/b9K/Z176uD2HJYCfq/lyowHtt5PvJi7LR=uf/urSorGbTcqNUvP=i42YP1Ps/4F6He9hQA1io3EAGBC3ICGHXWf2IlvFoTNUyPTqhjnPEKMWZ42jblqNA=dD7hLpzNXmmGhdLCjy99XK8+gjHdZHkOeD/FIjRPRZ7Jl0tdwdqFEwzRVCzL2uelMVMd3UaZ+d4I4Kf+J464piO//jxx48Fs/mG3zr5ba9m2S+6gvUZJq4j+0uJ+jf6cG/x2G9XSybqYQRwvxfNquKB4TcKiGVH5+ZbJT4ASkARadwoSPMGfvMPje+X2zAziSzXfsxYfIQKf6iJ9p7VavlDGi+Acr4kwFXW5IfQs4uGk6AVQFsoZK3o1hhLOkuOwWQEWhDQGNLXwJbFqXfELOnUQvM0Z5NUm46bjAAi4g+X9gLPNR/KjzXuuTTaWYrQEjXLb7PxS0sIttAb1w+sTXXtc1kDIsABC6KcsyGlEwji5sLkbkUa~
18+
session: aSqfp/GTZbJP+tXPNCZ9GoveoM0vgxtlYXdzPQ2uYNMPPgUkt0VT7SoTLasAo7iVqWWREOUC6DEenlcgDEKyzIEgQW5Ju/b9K/Z176uD2HJYCfq/lyowHtt5PvJi7LRuf/urSorGbTcqNUvPi42YP1Ps/4F6He9hQA1io3EAGBC3ICGHXWf2IlvFoTNUyPTqhjnPEKMWZ42jblqNAdD7hLpzNXmmGhdLCjy99XK8+gjHdZHkOeD/FIjRPRZ7Jl0tdwdqFEwzRVCzL2uelMVMd3UaZ+d4I4Kf+J464piO//jxx48Fs/mG3zr5ba9m2S+6gvUZJq4j+0uJ+jf6cG/x2G9XSybqYQRwvxfNquKB4TcKiGVH5+ZbJT4ASkARadwoSPMGfvMPje+X2zAziSzXfsxYfIQKf6iJ9p7VavlDGi+Acr4kwFXW5IfQs4uGk6AVQFsoZK3o1hhLOkuOwWQEWhDQGNLXwJbFqXfELOnUQvM0Z5NUm46bjAAi4g+X9gLPNR/KjzXuuTTaWYrQEjXLb7PxS0sIttAb1w+sTXXtc1kDIsABC6KcsyGlEwji5sLkbkUa=
1919
}
2020
`
2121
invalidPattern = `
@@ -27,7 +27,7 @@ var (
2727
)
2828

2929
func TestAWSSessionKey_Pattern(t *testing.T) {
30-
d := scanner{}
30+
d := New()
3131
ahoCorasickCore := ahocorasick.NewAhoCorasickCore([]detectors.Detector{d})
3232

3333
tests := []struct {
@@ -38,7 +38,7 @@ func TestAWSSessionKey_Pattern(t *testing.T) {
3838
{
3939
name: "valid pattern",
4040
input: validPattern,
41-
want: []string{"ASIABBKK02W42Q3IPSPGfkhIiUwQY32Zu9e4a86g9r3WpTzfE1aXljVcgn8OaSqfp/GTZbJP+=tXPNCZ9GoveoM0vgxtlYXdzPQ2uYNMPPgUkt0VT7SoTLasAo7iVqWWREOUC6DEenlcgDEKyzIEgQ=W5Ju/b9K/Z176uD2HJYCfq/lyowHtt5PvJi7LR=uf/urSorGbTcqNUvP=i42YP1Ps/4F6He9hQA1io3EAGBC3ICGHXWf2IlvFoTNUyPTqhjnPEKMWZ42jblqNA=dD7hLpzNXmmGhdLCjy99XK8+gjHdZHkOeD/FIjRPRZ7Jl0tdwdqFEwzRVCzL2uelMVMd3UaZ+d4I4Kf+J464piO//jxx48Fs/mG3zr5ba9m2S+6gvUZJq4j+0uJ+jf6cG/x2G9XSybqYQRwvxfNquKB4TcKiGVH5+ZbJT4ASkARadwoSPMGfvMPje+X2zAziSzXfsxYfIQKf6iJ9p7VavlDGi+Acr4kwFXW5IfQs4uGk6AVQFsoZK3o1hhLOkuOwWQEWhDQGNLXwJbFqXfELOnUQvM0Z5NUm46bjAAi4g+X9gLPNR/KjzXuuTTaWYrQEjXLb7PxS0sIttAb1w+sTXXtc1kDIsABC6KcsyGlEwji5sLkbkUa"},
41+
want: []string{"ASIABBKK02W42Q3IPSPG:fkhIiUwQY32Zu9e4a86g9r3WpTzfE1aXljVcgn8O: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"},
4242
},
4343
{
4444
name: "invalid pattern",

pkg/detectors/azure_entra/serviceprincipal/v1/spv1_test.go

+4-87
Original file line numberDiff line numberDiff line change
@@ -1,94 +1,11 @@
11
package v1
22

33
import (
4-
"context"
54
"testing"
65

76
"github.com/google/go-cmp/cmp"
8-
9-
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
10-
"github.com/trufflesecurity/trufflehog/v3/pkg/engine/ahocorasick"
11-
)
12-
13-
var (
14-
validPattern = `
15-
azure credentials:
16-
azureClientID: clientid9304d5df4-aac1-6117-552c-7f70c89a40d9
17-
azureTenant: tenant_idid9304d5df4-aac1-6117-552c-7f70c89a40d9
18-
azureClientSecret: clientsecretY_0w|[cGpan41k6ng.ol414sp4ccw2v_rkfmbs537i
19-
`
20-
invalidPattern = `
21-
azure credentials:
22-
azureClientID: 9304d5df4-aac1-6117-552c-7f70c89a
23-
azureTenant: id9304d5df4-aac1-6117-55-7f70c89a40d9
24-
azureClientSecret: Y_0w|[cGpan41k6ng.
25-
`
267
)
278

28-
func TestAzure_Pattern(t *testing.T) {
29-
d := Scanner{}
30-
ahoCorasickCore := ahocorasick.NewAhoCorasickCore([]detectors.Detector{d})
31-
32-
tests := []struct {
33-
name string
34-
input string
35-
want []string
36-
}{
37-
{
38-
name: "valid pattern",
39-
input: validPattern,
40-
want: []string{"304d5df4-aac1-6117-552c-7f70c89a40d9cGpan41k6ng.ol414sp4ccw2v_rkfmbs53304d5df4-aac1-6117-552c-7f70c89a40d9"},
41-
},
42-
{
43-
name: "invalid pattern",
44-
input: invalidPattern,
45-
want: nil,
46-
},
47-
}
48-
49-
for _, test := range tests {
50-
t.Run(test.name, func(t *testing.T) {
51-
matchedDetectors := ahoCorasickCore.FindDetectorMatches([]byte(test.input))
52-
if len(matchedDetectors) == 0 {
53-
t.Errorf("keywords '%v' not matched by: %s", d.Keywords(), test.input)
54-
return
55-
}
56-
57-
results, err := d.FromData(context.Background(), false, []byte(test.input))
58-
if err != nil {
59-
t.Errorf("error = %v", err)
60-
return
61-
}
62-
63-
if len(results) != len(test.want) {
64-
if len(results) == 0 {
65-
t.Errorf("did not receive result")
66-
} else {
67-
t.Errorf("expected %d results, only received %d", len(test.want), len(results))
68-
}
69-
return
70-
}
71-
72-
actual := make(map[string]struct{}, len(results))
73-
for _, r := range results {
74-
if len(r.RawV2) > 0 {
75-
actual[string(r.RawV2)] = struct{}{}
76-
} else {
77-
actual[string(r.Raw)] = struct{}{}
78-
}
79-
}
80-
expected := make(map[string]struct{}, len(test.want))
81-
for _, v := range test.want {
82-
expected[v] = struct{}{}
83-
}
84-
85-
if diff := cmp.Diff(expected, actual); diff != "" {
86-
t.Errorf("%s diff: (-want +got)\n%s", test.name, diff)
87-
}
88-
})
89-
}
90-
}
91-
929
type testCase struct {
9310
Input string
9411
Expected map[string]struct{}
@@ -155,10 +72,10 @@ configs = {"fs.azure.account.auth.type": "OAuth"`,
15572
Input: ` "AZUREAD-AKS-APPID-SECRET": "8w__IGsaY.6g6jUxb1.pPGK262._pgX.q-",`,
15673
Expected: map[string]struct{}{"8w__IGsaY.6g6jUxb1.pPGK262._pgX.q-": {}},
15774
},
158-
//"client_secret6": {
75+
// "client_secret6": {
15976
// Input: ``,
16077
// Expected: map[string]struct{}{"": {}},
161-
//},
78+
// },
16279

16380
"password": {
16481
Input: `# Login using Service Principal
@@ -175,12 +92,12 @@ $Credential = New-Object -TypeName System.Management.Automation.PSCredential -Ar
17592
az login --service-principal --username {{http://azure-cli-service-principal}} --password {{secret}} --tenant {{someone.onmicrosoft.com}}`,
17693
Expected: nil,
17794
},
178-
//"client_secret3": {
95+
// "client_secret3": {
17996
// Input: ``,
18097
// Expected: map[string]struct{}{
18198
// "": {},
18299
// },
183-
//},
100+
// },
184101
}
185102

186103
for name, test := range cases {

pkg/detectors/gcp/gcp_test.go

+7-7
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ func TestGCP_Pattern(t *testing.T) {
6767
{
6868
name: "escaped JSON",
6969
input: `{"credentials":"{\n \"type\": \"service_account\",\n \"project_id\": \"unit-test\",\n \"private_key_id\": \"10f922eb17fba903dc59f7baf753976233520012\",\n \"private_key\": \"-----BEGIN PRIVATE KEY-----\\nMIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQCgyAZHbtJu1MRf\\ng9+Wg==\\n-----END PRIVATE KEY-----\\n\",\n \"client_email\": \"[email protected]\",\n \"client_id\": \"123456476766156356779\",\n \"auth_uri\": \"https://accounts.google.com/o/oauth2/auth\",\n \"token_uri\": \"https://oauth2.googleapis.com/token\",\n \"auth_provider_x509_cert_url\": \"https://www.googleapis.com/oauth2/v1/certs\",\n \"client_x509_cert_url\": \"https://www.googleapis.com/robot/v1/metadata/x509/fake-value%40unit-test.iam.gserviceaccount.com\"\n}\n"}`,
70-
want: []string{"{\"type\":\"service_account\",\"project_id\":\"unit-test\",\"private_key_id\":\"10f922eb17fba903dc59f7baf753976233520012\",\"private_key\":\"-----BEGIN PRIVATE KEY-----\\nMIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQCgyAZHbtJu1MRf\\ng9+Wg==\\n-----END PRIVATE KEY-----\\n\",\"client_email\":\"[email protected]\",\"client_id\":\"123456476766156356779\",\"auth_uri\":\"https://accounts.google.com/o/oauth2/auth\",\"token_uri\":\"https://oauth2.googleapis.com/token\",\"auth_provider_x509_cert_url\":\"https://www.googleapis.com/oauth2/v1/certs\",\"client_x509_cert_url\":\"https://www.googleapis.com/robot/v1/metadata/x509/fake-value%40unit-test.iam.gserviceaccount.com\"}g"},
70+
want: []string{"{\"type\":\"service_account\",\"project_id\":\"unit-test\",\"private_key_id\":\"10f922eb17fba903dc59f7baf753976233520012\",\"private_key\":\"-----BEGIN PRIVATE KEY-----\\nMIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQCgyAZHbtJu1MRf\\ng9+Wg==\\n-----END PRIVATE KEY-----\\n\",\"client_email\":\"[email protected]\",\"client_id\":\"123456476766156356779\",\"auth_uri\":\"https://accounts.google.com/o/oauth2/auth\",\"token_uri\":\"https://oauth2.googleapis.com/token\",\"auth_provider_x509_cert_url\":\"https://www.googleapis.com/oauth2/v1/certs\",\"client_x509_cert_url\":\"https://www.googleapis.com/robot/v1/metadata/x509/fake-value%40unit-test.iam.gserviceaccount.com\"}"},
7171
},
7272
{
7373
name: "no private_key_id (1)",
@@ -103,21 +103,21 @@ GOOGLE_SERVICE_ACCOUNT_PRIVATE_KEY="-----BEGIN PRIVATE KEY-----\nMIIEvAIBADANBgk
103103
skip: true,
104104
},
105105
// TODO: Create an example of these.
106-
//{
106+
// {
107107
// name: "Slack mangled email",
108108
// input: ``,
109109
// want: []string{""},
110-
//},
111-
//{
110+
// },
111+
// {
112112
// name: "Empty client email",
113113
// input: ``,
114114
// want: []string{""},
115-
//},
116-
//{
115+
// },
116+
// {
117117
// name: "Carets",
118118
// input: ``,
119119
// want: []string{""},
120-
//},
120+
// },
121121
}
122122

123123
for _, test := range tests {

pkg/detectors/hubspot_apikey/v1/apikey_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ const hs = new HubSpotAPI({ hapikey: HAPI_KEY });`,
2929
// {
3030
// name: "hubapi",
3131
// input: `curl https://api.hubapi.com/contacts/v1/lists/all/contacts/all \
32-
//--header "Authorization: Bearer b71aa2ed-9c76-417d-bd8e-c5f4980d21ef"`,
32+
// --header "Authorization: Bearer b71aa2ed-9c76-417d-bd8e-c5f4980d21ef"`,
3333
// want: []string{"b71aa2ed-9c76-417d-bd8e-c5f4980d21ef"},
3434
// },
3535
{
@@ -61,7 +61,7 @@ const blogPosts = hs.blog.getPosts({ name: 'Inbound' });`,
6161
"method": "GET",
6262
"deprecated": false
6363
}]`,
64-
want: []string{""},
64+
want: []string{"hDNxPGyQ-AOMZ-w9Sp-aw5t-TwKLBQjQ85go"},
6565
},
6666
}
6767

pkg/detectors/kanbantool/kanbantool_integration_test.go

+3
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
//go:build detectors
2+
// +build detectors
3+
14
package kanbantool
25

36
import (

pkg/detectors/lemlist/lemlist_integration_test.go

+4-1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
//go:build detectors
2+
// +build detectors
3+
14
package lemlist
25

36
import (
@@ -7,9 +10,9 @@ import (
710
"time"
811

912
"github.com/kylelemons/godebug/pretty"
10-
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
1113

1214
"github.com/trufflesecurity/trufflehog/v3/pkg/common"
15+
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
1316
"github.com/trufflesecurity/trufflehog/v3/pkg/pb/detectorspb"
1417
)
1518

pkg/detectors/meraki/meraki_integration_test.go

+3
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
//go:build detectors
2+
// +build detectors
3+
14
package meraki
25

36
import (

pkg/detectors/monkeylearn/monkeylearn_integration_test.go

+4-1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
//go:build detectors
2+
// +build detectors
3+
14
package monkeylearn
25

36
import (
@@ -7,9 +10,9 @@ import (
710
"time"
811

912
"github.com/kylelemons/godebug/pretty"
10-
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
1113

1214
"github.com/trufflesecurity/trufflehog/v3/pkg/common"
15+
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
1316
"github.com/trufflesecurity/trufflehog/v3/pkg/pb/detectorspb"
1417
)
1518

pkg/detectors/opsgenie/opsgenie_integration_test.go

+4-1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
//go:build detectors
2+
// +build detectors
3+
14
package opsgenie
25

36
import (
@@ -7,9 +10,9 @@ import (
710
"time"
811

912
"github.com/kylelemons/godebug/pretty"
10-
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
1113

1214
"github.com/trufflesecurity/trufflehog/v3/pkg/common"
15+
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
1316
"github.com/trufflesecurity/trufflehog/v3/pkg/pb/detectorspb"
1417
)
1518

File renamed without changes.

pkg/detectors/privatekey/ssh_test.go pkg/detectors/privatekey/ssh_integration_test.go

+3
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
//go:build detectors
2+
// +build detectors
3+
14
package privatekey
25

36
import (

pkg/detectors/prodpad/prodpad_integration_test.go

+4-1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
//go:build detectors
2+
// +build detectors
3+
14
package prodpad
25

36
import (
@@ -7,9 +10,9 @@ import (
710
"time"
811

912
"github.com/kylelemons/godebug/pretty"
10-
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
1113

1214
"github.com/trufflesecurity/trufflehog/v3/pkg/common"
15+
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
1316
"github.com/trufflesecurity/trufflehog/v3/pkg/pb/detectorspb"
1417
)
1518

pkg/detectors/salesmate/salesmate_integration_test.go

+3
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
//go:build detectors
2+
// +build detectors
3+
14
package salesmate
25

36
import (

pkg/detectors/scalr/scalr_integration_test.go

+3
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
//go:build detectors
2+
// +build detectors
3+
14
package scalr
25

36
import (

pkg/detectors/shopify/shopify_integration_test.go

+3
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
//go:build detectors
2+
// +build detectors
3+
14
package shopify
25

36
import (

pkg/detectors/tokeet/tokeet_integration_test.go

+4-1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
//go:build detectors
2+
// +build detectors
3+
14
package tokeet
25

36
import (
@@ -7,9 +10,9 @@ import (
710
"time"
811

912
"github.com/kylelemons/godebug/pretty"
10-
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
1113

1214
"github.com/trufflesecurity/trufflehog/v3/pkg/common"
15+
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
1316
"github.com/trufflesecurity/trufflehog/v3/pkg/pb/detectorspb"
1417
)
1518

pkg/detectors/transferwise/transferwise_integration_test.go

+4-1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
//go:build detectors
2+
// +build detectors
3+
14
package transferwise
25

36
import (
@@ -7,9 +10,9 @@ import (
710
"time"
811

912
"github.com/kylelemons/godebug/pretty"
10-
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
1113

1214
"github.com/trufflesecurity/trufflehog/v3/pkg/common"
15+
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
1316
"github.com/trufflesecurity/trufflehog/v3/pkg/pb/detectorspb"
1417
)
1518

0 commit comments

Comments
 (0)