Skip to content

Commit

Permalink
Merge branch 'main' into fix/gitlab-host-path
Browse files Browse the repository at this point in the history
Signed-off-by: Spencer Schrock <sschrock@google.com>
  • Loading branch information
spencerschrock committed Jan 31, 2024
2 parents 426eca0 + 83ff808 commit 693712c
Show file tree
Hide file tree
Showing 54 changed files with 118 additions and 172 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/docker.yml
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ jobs:
fetch-depth: 2 # needed to diff changed files
- id: files
name: Get changed files
uses: tj-actions/changed-files@ae82ed4ae04587b665efad2f206578aa6f0e8539 #v42.0.0
uses: tj-actions/changed-files@90a06d6ba9543371ab4df8eeca0be07ca6054959 #v42.0.2
with:
files_ignore: '**.md'
- id: docs_only_check
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/gitlab.yml
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ jobs:
command: make e2e-gitlab-token

- name: codecov
uses: codecov/codecov-action@eaaf4bedf32dbdc6b720b63067d99c4d77d6047d # 3.1.4
uses: codecov/codecov-action@4fe8c5f003fae66aa5ebb77cfd3e7bfbbda0b6b0 # 3.1.5
with:
files: "*e2e-coverage.out"
verbose: true
2 changes: 1 addition & 1 deletion .github/workflows/integration.yml
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ jobs:
command: make e2e-gh-token

- name: codecov
uses: codecov/codecov-action@eaaf4bedf32dbdc6b720b63067d99c4d77d6047d # 3.1.4
uses: codecov/codecov-action@4fe8c5f003fae66aa5ebb77cfd3e7bfbbda0b6b0 # 3.1.5
with:
files: "*e2e-coverage.out"
verbose: true
4 changes: 2 additions & 2 deletions .github/workflows/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ jobs:
- name: Run unit-tests
run: make unit-test
- name: Upload codecoverage
uses: codecov/codecov-action@eaaf4bedf32dbdc6b720b63067d99c4d77d6047d # 3.1.4
uses: codecov/codecov-action@4fe8c5f003fae66aa5ebb77cfd3e7bfbbda0b6b0 # 3.1.5
with:
files: ./unit-coverage.out
verbose: true
Expand All @@ -83,7 +83,7 @@ jobs:
timeout_minutes: 30
command: make e2e-pat
- name: codecov
uses: codecov/codecov-action@eaaf4bedf32dbdc6b720b63067d99c4d77d6047d # 2.1.0
uses: codecov/codecov-action@4fe8c5f003fae66aa5ebb77cfd3e7bfbbda0b6b0 # 2.1.0
if: ${{ github.event_name != 'pull_request' || github.actor != 'dependabot[bot]' }}
with:
files: "*e2e-coverage.out"
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/scorecard-analysis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ jobs:
# https://docs.github.com/en/actions/advanced-guides/storing-workflow-data-as-artifacts
# Optional.
- name: "Upload artifact"
uses: actions/upload-artifact@694cdabd8bdb0f10b2cea11669e1bf5453eed0a6 # v3
uses: actions/upload-artifact@26f96dfa697d77e81fd5907df203aa23a56210a8 # v3
with:
name: SARIF file
path: results.sarif
Expand Down
4 changes: 1 addition & 3 deletions checks/branch_protection_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -431,9 +431,7 @@ func TestReleaseAndDevBranchProtected(t *testing.T) {
RepoClient: mockRepoClient,
}
r := BranchProtection(&req)
if !scut.ValidateTestReturn(t, tt.name, &tt.expected, &r, &dl) {
t.Fail()
}
scut.ValidateTestReturn(t, tt.name, &tt.expected, &r, &dl)
ctrl.Finish()
})
}
Expand Down
4 changes: 1 addition & 3 deletions checks/cii_best_practices_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -122,9 +122,7 @@ func TestCIIBestPractices(t *testing.T) {
}
res := CIIBestPractices(&req)
dl := scut.TestDetailLogger{}
if !scut.ValidateTestReturn(t, tt.name, &tt.expected, &res, &dl) {
t.Fail()
}
scut.ValidateTestReturn(t, tt.name, &tt.expected, &res, &dl)
ctrl.Finish()
})
}
Expand Down
4 changes: 1 addition & 3 deletions checks/dependency_update_tool_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -155,9 +155,7 @@ func TestDependencyUpdateTool(t *testing.T) {
}
res := DependencyUpdateTool(c)

if !scut.ValidateTestReturn(t, tt.name, &tt.expected, &res, &dl) {
t.Fail()
}
scut.ValidateTestReturn(t, tt.name, &tt.expected, &res, &dl)
})
}
}
Expand Down
4 changes: 1 addition & 3 deletions checks/evaluation/binary_artifacts_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -142,9 +142,7 @@ func TestBinaryArtifacts(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := BinaryArtifacts(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/branch_protection_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -573,9 +573,7 @@ func TestIsBranchProtected(t *testing.T) {
Score: score,
Error: err,
}
if !scut.ValidateTestReturn(t, tt.name, &tt.expected, actual, &dl) {
t.Fail()
}
scut.ValidateTestReturn(t, tt.name, &tt.expected, actual, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/ci_tests_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -111,9 +111,7 @@ func TestCITests(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := CITests(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/cii_best_practices_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -143,9 +143,7 @@ func TestCIIBestPractices(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := CIIBestPractices(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/code_review_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -216,9 +216,7 @@ func TestCodeReview(t *testing.T) {

dl := &scut.TestDetailLogger{}
res := CodeReview(tt.name, dl, tt.rawData)
if !scut.ValidateTestReturn(t, tt.name, &tt.expected, &res, dl) {
t.Error()
}
scut.ValidateTestReturn(t, tt.name, &tt.expected, &res, dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/contributors_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -83,9 +83,7 @@ func TestContributors(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := Contributors(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Error(tt.name)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/dangerous_workflow_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -252,9 +252,7 @@ func TestDangerousWorkflow(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := DangerousWorkflow(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/dependency_update_tool_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -164,9 +164,7 @@ func TestDependencyUpdateTool(t *testing.T) {

dl := scut.TestDetailLogger{}
got := DependencyUpdateTool(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/fuzzing_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -217,9 +217,7 @@ func TestFuzzing(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := Fuzzing(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/license_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -155,9 +155,7 @@ func TestLicense(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := License(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/maintained_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -127,9 +127,7 @@ func TestMaintained(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := Maintained(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/packaging_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -88,9 +88,7 @@ func TestPackaging(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := Packaging(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/pinned_dependencies_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -841,9 +841,7 @@ func Test_PinningDependencies(t *testing.T) {
ProcessingErrors: tt.processingErrors,
})

if !scut.ValidateTestReturn(t, tt.name, &tt.expected, &actual, &dl) {
t.Fail()
}
scut.ValidateTestReturn(t, tt.name, &tt.expected, &actual, &dl)
})
}
}
Expand Down
4 changes: 1 addition & 3 deletions checks/evaluation/sast_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -301,9 +301,7 @@ func TestSAST(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := SAST(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/security_policy_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -190,9 +190,7 @@ func TestSecurityPolicy(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := SecurityPolicy(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/signed_releases_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -303,9 +303,7 @@ func TestSignedReleases(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := SignedReleases(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
Expand Down
4 changes: 1 addition & 3 deletions checks/evaluation/vulnerabilities_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -139,9 +139,7 @@ func TestVulnerabilities(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := Vulnerabilities(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/evaluation/webhooks_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -229,9 +229,7 @@ func TestWebhooks(t *testing.T) {
t.Parallel()
dl := scut.TestDetailLogger{}
got := Webhooks(tt.name, tt.findings, &dl)
if !scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl) {
t.Errorf("got %v, expected %v", got, tt.result)
}
scut.ValidateTestReturn(t, tt.name, &tt.result, &got, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/fuzzing_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -169,9 +169,7 @@ func TestFuzzing(t *testing.T) {
return
}

if !scut.ValidateTestReturn(t, tt.name, &tt.expected, &result, &dl) {
t.Fatalf(tt.name, tt.expected)
}
scut.ValidateTestReturn(t, tt.name, &tt.expected, &result, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/license_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -92,9 +92,7 @@ func TestLicenseFileSubdirectory(t *testing.T) {

res := License(&req)

if !scut.ValidateTestReturn(t, tt.name, &tt.expected, &res, &dl) {
t.Fail()
}
scut.ValidateTestReturn(t, tt.name, &tt.expected, &res, &dl)

ctrl.Finish()
})
Expand Down
4 changes: 1 addition & 3 deletions checks/permissions_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -458,9 +458,7 @@ func TestGithubTokenPermissions(t *testing.T) {

res := TokenPermissions(&c)

if !scut.ValidateTestReturn(t, tt.name, &tt.expected, &res, &dl) {
t.Errorf("test failed: log message not present: %+v\n%+v", tt.expected, dl)
}
scut.ValidateTestReturn(t, tt.name, &tt.expected, &res, &dl)
})
}
}
Expand Down
4 changes: 1 addition & 3 deletions checks/raw/security_policy_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -165,9 +165,7 @@ func TestSecurityPolicy(t *testing.T) {

res, err := SecurityPolicy(&c)

if !scut.ValidateTestReturn(t, tt.name, &tt.want, &checker.CheckResult{}, &dl) {
t.Errorf("test failed: log message not present: %+v , for test %v", tt.want, tt.name)
}
scut.ValidateTestReturn(t, tt.name, &tt.want, &checker.CheckResult{}, &dl)

if (err != nil) != tt.wantErr {
t.Errorf("SecurityPolicy() error = %v, wantErr %v", err, tt.wantErr)
Expand Down
4 changes: 1 addition & 3 deletions checks/raw/vulnerabilities_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -114,9 +114,7 @@ func TestVulnerabilities(t *testing.T) {
}
}

if !scut.ValidateTestReturn(t, tt.name, &tt.expected, &checker.CheckResult{}, &dl) {
t.Fatalf("Test %s failed", tt.name)
}
scut.ValidateTestReturn(t, tt.name, &tt.expected, &checker.CheckResult{}, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/raw/webhooks_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -130,9 +130,7 @@ func TestWebhooks(t *testing.T) {
}
}

if !scut.ValidateTestReturn(t, tt.name, &tt.expected, &checker.CheckResult{}, &dl) {
t.Fatalf("Test %s failed", tt.name)
}
scut.ValidateTestReturn(t, tt.name, &tt.expected, &checker.CheckResult{}, &dl)
})
}
}
4 changes: 1 addition & 3 deletions checks/security_policy_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -197,9 +197,7 @@ func TestSecurityPolicy(t *testing.T) {

res := SecurityPolicy(c)

if !scut.ValidateTestReturn(t, tt.name, &tt.want, &res, &dl) {
t.Errorf("test failed: log message not present: %+v on %+v", tt.want, res)
}
scut.ValidateTestReturn(t, tt.name, &tt.want, &res, &dl)
})
}
}
Loading

0 comments on commit 693712c

Please sign in to comment.