-
Notifications
You must be signed in to change notification settings - Fork 173
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Strict mode #1463
Strict mode #1463
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks pretty good! I think the main changes I'd ask for here are some clarity around how --static-only-analysis
and --strict
interact and a few comments.
One thing I forgot to mention is that I think this should be pretty easy to write tests for. I think that if you go to the tests for each of these strategies there is likely one that gets results from the "ideal" analysis. You can run the analysis using strict mode and just check that the output equals the output of the other test. I'd like it if you could try to make a few of these and see what the effort is like. Let me know if you'd like any help. |
------------------------
Carlos Cheung - Georgetown Club of Northern California, Board Member
Twitter: @carloskcheung | 415.515.1063 |
http://www.linkedin.com/in/carloscheung
"Learn to work then you'll always work; Work to learn then you'll always
learn"
…On Tue, Sep 3, 2024 at 10:45 AM Christopher Sasarak < ***@***.***> wrote:
One thing I forgot to mention is that I think this should be pretty easy
to write tests for. I think that if you go to the tests for each of these
strategies there is likely one that gets results from the "ideal" analysis.
You can run the analysis using strict mode and just check that the output
equals the output of the other test. I'd like it if you could try to make a
few of these and see what the effort is like. Let me know if you'd like any
help.
—
Reply to this email directly, view it on GitHub
<#1463 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAXKLILIL3ITIDRFTCQ6JYLZUXYVJAVCNFSM6AAAAABNNBEHFKVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDGMRXGA4TEOJTGU>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good. Please address my comments, but I don't think anything there should need me to look this over again unless you want me to.
Overview
We should allow users to enforce that the first strategy within our list of strategies passes. This is to ensure ‘ideal’ results and that no fallback strategies are ran.
Acceptance criteria
When running fossa analyze --strict :
Turn warnings into fatalities
Ensure that the first strategy in the list passes
Testing plan
Manually testing:
fossa analyze --strict --debug
(I scanned a Maven project)Risks
Would like to add some automated tests but wanted to get some opinions. Would it be sufficient to just create a test for
guardStrictMode
bc that's the main logic that powersstrict mode
? Unsure on how to best create tests for strict mode for specific languages / package managers.Metrics
References
Checklist
docs/
.docs/README.ms
and gave consideration to how discoverable or not my documentation is.Changelog.md
. If this PR did not mark a release, I added my changes into an# Unreleased
section at the top..fossa.yml
orfossa-deps.{json.yml}
, I updateddocs/references/files/*.schema.json
AND I have updated example files used byfossa init
command. You may also need to update these if you have added/removed new dependency type (e.g.pip
) or analysis target type (e.g.poetry
).docs/references/subcommands/<subcommand>.md
.