scorecard/probes/securityPolicyPresent/impl_test.go
Spencer Schrock 0b9dfb656f
⚠️ Replace v4 module references with v5 (#4027)
Signed-off-by: Spencer Schrock <sschrock@google.com>
2024-04-12 14:51:50 -07:00

131 lines
3.1 KiB
Go

// Copyright 2023 OpenSSF Scorecard Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//nolint:stylecheck
package securityPolicyPresent
import (
"testing"
"github.com/google/go-cmp/cmp"
"github.com/google/go-cmp/cmp/cmpopts"
"github.com/ossf/scorecard/v5/checker"
"github.com/ossf/scorecard/v5/finding"
"github.com/ossf/scorecard/v5/probes/internal/utils/test"
"github.com/ossf/scorecard/v5/probes/internal/utils/uerror"
)
func Test_Run(t *testing.T) {
t.Parallel()
//nolint:govet
tests := []struct {
name string
raw *checker.RawResults
outcomes []finding.Outcome
err error
}{
{
name: "file present on repo",
raw: &checker.RawResults{
SecurityPolicyResults: checker.SecurityPolicyData{
PolicyFiles: []checker.SecurityPolicyFile{
{
File: checker.File{
Path: "SECURITY.md",
Type: finding.FileTypeText,
},
},
},
},
},
outcomes: []finding.Outcome{
finding.OutcomeTrue,
},
},
{
name: "file present on org",
raw: &checker.RawResults{
SecurityPolicyResults: checker.SecurityPolicyData{
PolicyFiles: []checker.SecurityPolicyFile{
{
File: checker.File{
Path: "SECURITY.md",
Type: finding.FileTypeURL,
},
},
},
},
},
outcomes: []finding.Outcome{
finding.OutcomeTrue,
},
},
{
name: "files present on org and repo",
raw: &checker.RawResults{
SecurityPolicyResults: checker.SecurityPolicyData{
PolicyFiles: []checker.SecurityPolicyFile{
{
File: checker.File{
Path: "SECURITY.md",
Type: finding.FileTypeURL,
},
},
{
File: checker.File{
Path: "SECURITY.md",
Type: finding.FileTypeText,
},
},
},
},
},
outcomes: []finding.Outcome{
finding.OutcomeTrue,
finding.OutcomeTrue,
},
},
{
name: "file not present",
raw: &checker.RawResults{},
outcomes: []finding.Outcome{
finding.OutcomeFalse,
},
},
{
name: "nil raw",
err: uerror.ErrNil,
},
}
for _, tt := range tests {
tt := tt // Re-initializing variable so it is not changed while executing the closure below
t.Run(tt.name, func(t *testing.T) {
t.Parallel()
findings, s, err := Run(tt.raw)
if !cmp.Equal(tt.err, err, cmpopts.EquateErrors()) {
t.Errorf("mismatch (-want +got):\n%s", cmp.Diff(tt.err, err, cmpopts.EquateErrors()))
}
if err != nil {
return
}
if diff := cmp.Diff(Probe, s); diff != "" {
t.Errorf("mismatch (-want +got):\n%s", diff)
}
test.AssertOutcomes(t, findings, tt.outcomes)
})
}
}