1- // Copyright 2022-2023 Contributors to the Veraison project.
1+ // Copyright 2022-2026 Contributors to the Veraison project.
22// SPDX-License-Identifier: Apache-2.0
33package policymanager
44
@@ -48,7 +48,7 @@ func TestPolicyMgr_getPolicy_not_found(t *testing.T) {
4848 pm := & PolicyManager {Store : & policy.Store {KVStore : store , Logger : log .Named ("test" )},
4949 Agent : agent }
5050
51- polKey := pm .getPolicyKey (appraisal )
51+ polKey := pm .getPolicyKey (appraisal . EvidenceContext . TenantId , appraisal . Scheme )
5252 assert .Equal (t , "0:TPM_ENACTTRUST:opa" , polKey .String ())
5353
5454 pol , err := pm .getPolicy (polKey )
@@ -82,7 +82,7 @@ func TestPolicyMgr_getPolicy_OK(t *testing.T) {
8282
8383 pm := & PolicyManager {Store : & policy.Store {KVStore : store }, Agent : agent }
8484
85- polKey := pm .getPolicyKey (appraisal )
85+ polKey := pm .getPolicyKey (appraisal . EvidenceContext . TenantId , appraisal . Scheme )
8686 assert .Equal (t , "0:TPM_ENACTTRUST:opa" , polKey .String ())
8787
8888 _ , err = pm .getPolicy (polKey )
@@ -129,6 +129,7 @@ func TestPolicyMgr_Evaluate_OK(t *testing.T) {
129129 endorsements := []string {"h0KPxSKAPTEGXnvOPPA/5HUJZjHl4Hu9eg/eYMTPJcc=" }
130130 ar := ear .NewAttestationResult ("test" , "test" , "test" )
131131 ap := & appraisal.Appraisal {EvidenceContext : ec , Result : ar , Scheme : "TPM_ENACTTRUST" }
132+ ap .Endorsements = endorsements
132133
133134 polID := "policy:TPM_ENACTTRUST"
134135 tier := ear .TrustTierAffirming
@@ -140,7 +141,7 @@ func TestPolicyMgr_Evaluate_OK(t *testing.T) {
140141 Evaluate (
141142 context .TODO (),
142143 gomock .Any (),
143- "test " ,
144+ "TPM_ENACTTRUST " ,
144145 gomock .Any (),
145146 gomock .Any (),
146147 ar .Submods ["test" ],
@@ -153,7 +154,7 @@ func TestPolicyMgr_Evaluate_OK(t *testing.T) {
153154 Agent : agent ,
154155 logger : log .Named ("manager" ),
155156 }
156- err := pm .Evaluate (context .TODO (), "test" , ap , endorsements )
157+ err := pm .Evaluate (context .TODO (), ap )
157158 require .NoError (t , err )
158159}
159160
@@ -174,17 +175,17 @@ func TestPolicyMgr_Evaluate_NOK(t *testing.T) {
174175 }
175176 endorsements := []string {"h0KPxSKAPTEGXnvOPPA/5HUJZjHl4Hu9eg/eYMTPJcc=" }
176177 ar := ear .NewAttestationResult ("test" , "test" , "test" )
177- ap := & appraisal.Appraisal {EvidenceContext : ec , Result : ar , Scheme : "TPM_ENACTTRUST" }
178+ ap := & appraisal.Appraisal {EvidenceContext : ec , Result : ar , Scheme : "TPM_ENACTTRUST" , Endorsements : endorsements }
178179 expectedErr := errors .New ("could not evaluate policy: policy returned bad update" )
179180 agent := mock_deps .NewMockIAgent (ctrl )
180181 agent .EXPECT ().GetBackendName ().Return ("opa" )
181- agent .EXPECT ().Evaluate (context .TODO (), gomock .Any (), "test " , gomock .Any (), gomock .Any (), ar .Submods ["test" ], ec , endorsements ).Return (nil , expectedErr )
182+ agent .EXPECT ().Evaluate (context .TODO (), gomock .Any (), "TPM_ENACTTRUST " , gomock .Any (), gomock .Any (), ar .Submods ["test" ], ec , endorsements ).Return (nil , expectedErr )
182183 pm := & PolicyManager {
183184 Store : & policy.Store {KVStore : store , Logger : log .Named ("store" )},
184185 Agent : agent ,
185186 logger : log .Named ("manager" ),
186187 }
187- err := pm .Evaluate (context .TODO (), "test" , ap , endorsements )
188+ err := pm .Evaluate (context .TODO (), ap )
188189 assert .ErrorIs (t , err , expectedErr )
189190
190191}
0 commit comments