@@ -73,6 +73,7 @@ func testAuditNpm(t *testing.T, format string, withVuln bool) string {
7373}
7474
7575func TestXrayAuditConanJson (t * testing.T ) {
76+ integration .InitAuditCTest (t , scangraph .GraphScanMinXrayVersion )
7677 output := testAuditConan (t , string (format .Json ), true )
7778 validations .VerifyJsonResults (t , output , validations.ValidationParams {
7879 Vulnerabilities : 8 ,
@@ -81,6 +82,7 @@ func TestXrayAuditConanJson(t *testing.T) {
8182}
8283
8384func TestXrayAuditConanSimpleJson (t * testing.T ) {
85+ integration .InitAuditCTest (t , scangraph .GraphScanMinXrayVersion )
8486 output := testAuditConan (t , string (format .SimpleJson ), true )
8587 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
8688 Vulnerabilities : 8 ,
@@ -89,7 +91,6 @@ func TestXrayAuditConanSimpleJson(t *testing.T) {
8991}
9092
9193func testAuditConan (t * testing.T , format string , withVuln bool ) string {
92- integration .InitAuditCTest (t , scangraph .GraphScanMinXrayVersion )
9394 _ , cleanUp := securityTestUtils .CreateTestProjectEnvAndChdir (t , filepath .Join (filepath .FromSlash (securityTests .GetTestResourcesPath ()), "projects" , "package-managers" , "conan" ))
9495 defer cleanUp ()
9596 // Run conan install before executing jfrog audit
@@ -104,6 +105,7 @@ func testAuditConan(t *testing.T, format string, withVuln bool) string {
104105}
105106
106107func TestXrayAuditPnpmJson (t * testing.T ) {
108+ integration .InitAuditJavaScriptTest (t , scangraph .GraphScanMinXrayVersion )
107109 output := testXrayAuditPnpm (t , string (format .Json ))
108110 validations .VerifyJsonResults (t , output , validations.ValidationParams {
109111 Vulnerabilities : 1 ,
@@ -112,6 +114,7 @@ func TestXrayAuditPnpmJson(t *testing.T) {
112114}
113115
114116func TestXrayAuditPnpmSimpleJson (t * testing.T ) {
117+ integration .InitAuditJavaScriptTest (t , scangraph .GraphScanMinXrayVersion )
115118 output := testXrayAuditPnpm (t , string (format .SimpleJson ))
116119 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
117120 Vulnerabilities : 1 ,
@@ -120,7 +123,6 @@ func TestXrayAuditPnpmSimpleJson(t *testing.T) {
120123}
121124
122125func testXrayAuditPnpm (t * testing.T , format string ) string {
123- integration .InitAuditJavaScriptTest (t , scangraph .GraphScanMinXrayVersion )
124126 _ , cleanUp := securityTestUtils .CreateTestProjectEnvAndChdir (t , filepath .Join (filepath .FromSlash (securityTests .GetTestResourcesPath ()), "projects" , "package-managers" , "npm" , "npm-no-lock" ))
125127 defer cleanUp ()
126128 // Run pnpm install before executing audit
@@ -131,6 +133,7 @@ func testXrayAuditPnpm(t *testing.T, format string) string {
131133}
132134
133135func TestXrayAuditYarnV2Json (t * testing.T ) {
136+ integration .InitAuditJavaScriptTest (t , scangraph .GraphScanMinXrayVersion )
134137 testXrayAuditYarn (t , "yarn-v2" , func () {
135138 output := runXrayAuditYarnWithOutput (t , string (format .Json ))
136139 validations .VerifyJsonResults (t , output , validations.ValidationParams {
@@ -141,6 +144,7 @@ func TestXrayAuditYarnV2Json(t *testing.T) {
141144}
142145
143146func TestXrayAuditYarnV2SimpleJson (t * testing.T ) {
147+ integration .InitAuditJavaScriptTest (t , scangraph .GraphScanMinXrayVersion )
144148 testXrayAuditYarn (t , "yarn-v3" , func () {
145149 output := runXrayAuditYarnWithOutput (t , string (format .SimpleJson ))
146150 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
@@ -151,6 +155,7 @@ func TestXrayAuditYarnV2SimpleJson(t *testing.T) {
151155}
152156
153157func TestXrayAuditYarnV1Json (t * testing.T ) {
158+ integration .InitAuditJavaScriptTest (t , scangraph .GraphScanMinXrayVersion )
154159 testXrayAuditYarn (t , "yarn-v1" , func () {
155160 output := runXrayAuditYarnWithOutput (t , string (format .Json ))
156161 validations .VerifyJsonResults (t , output , validations.ValidationParams {
@@ -161,6 +166,7 @@ func TestXrayAuditYarnV1Json(t *testing.T) {
161166}
162167
163168func TestXrayAuditYarnV1JsonWithoutDevDependencies (t * testing.T ) {
169+ integration .InitAuditJavaScriptTest (t , scangraph .GraphScanMinXrayVersion )
164170 unsetEnv := clientTests .SetEnvWithCallbackAndAssert (t , "NODE_ENV" , "production" )
165171 defer unsetEnv ()
166172 testXrayAuditYarn (t , "yarn-v1" , func () {
@@ -173,6 +179,7 @@ func TestXrayAuditYarnV1JsonWithoutDevDependencies(t *testing.T) {
173179}
174180
175181func TestXrayAuditYarnV1SimpleJson (t * testing.T ) {
182+ integration .InitAuditJavaScriptTest (t , scangraph .GraphScanMinXrayVersion )
176183 testXrayAuditYarn (t , "yarn-v1" , func () {
177184 output := runXrayAuditYarnWithOutput (t , string (format .SimpleJson ))
178185 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
@@ -183,7 +190,6 @@ func TestXrayAuditYarnV1SimpleJson(t *testing.T) {
183190}
184191
185192func testXrayAuditYarn (t * testing.T , projectDirName string , yarnCmd func ()) {
186- integration .InitAuditJavaScriptTest (t , scangraph .GraphScanMinXrayVersion )
187193 _ , cleanUp := securityTestUtils .CreateTestProjectEnvAndChdir (t , filepath .Join (filepath .FromSlash (securityTests .GetTestResourcesPath ()), "projects" , "package-managers" , "yarn" , projectDirName ))
188194 defer cleanUp ()
189195 // Run yarn install before executing jf audit --yarn. Return error to assert according to test.
@@ -199,6 +205,7 @@ func runXrayAuditYarnWithOutput(t *testing.T, format string) string {
199205
200206// Tests NuGet audit by providing simple NuGet project + multi-project NuGet project and asserts any error.
201207func TestXrayAuditNugetJson (t * testing.T ) {
208+ integration .InitAuditCTest (t , scangraph .GraphScanMinXrayVersion )
202209 var testdata = []struct {
203210 projectName string
204211 format string
@@ -256,6 +263,7 @@ func TestXrayAuditNugetJson(t *testing.T) {
256263}
257264
258265func TestXrayAuditNugetSimpleJson (t * testing.T ) {
266+ integration .InitAuditCTest (t , scangraph .GraphScanMinXrayVersion )
259267 var testdata = []struct {
260268 projectName string
261269 format string
@@ -299,7 +307,6 @@ func TestXrayAuditNugetSimpleJson(t *testing.T) {
299307}
300308
301309func testXrayAuditNuget (t * testing.T , projectName , format string , restoreTech string ) string {
302- integration .InitAuditCTest (t , scangraph .GraphScanMinXrayVersion )
303310 _ , cleanUp := securityTestUtils .CreateTestProjectEnvAndChdir (t , filepath .Join (filepath .FromSlash (securityTests .GetTestResourcesPath ()), "projects" , "package-managers" , "nuget" , projectName ))
304311 defer cleanUp ()
305312 // Add dummy descriptor file to check that we run only specific audit
@@ -313,6 +320,7 @@ func testXrayAuditNuget(t *testing.T, projectName, format string, restoreTech st
313320}
314321
315322func TestXrayAuditGradleJson (t * testing.T ) {
323+ integration .InitAuditJavaTest (t , scangraph .GraphScanMinXrayVersion )
316324 output := testXrayAuditGradle (t , string (format .Json ))
317325 validations .VerifyJsonResults (t , output , validations.ValidationParams {
318326 Vulnerabilities : 3 ,
@@ -321,6 +329,7 @@ func TestXrayAuditGradleJson(t *testing.T) {
321329}
322330
323331func TestXrayAuditGradleSimpleJson (t * testing.T ) {
332+ integration .InitAuditJavaTest (t , scangraph .GraphScanMinXrayVersion )
324333 output := testXrayAuditGradle (t , string (format .SimpleJson ))
325334 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
326335 Vulnerabilities : 3 ,
@@ -329,7 +338,6 @@ func TestXrayAuditGradleSimpleJson(t *testing.T) {
329338}
330339
331340func testXrayAuditGradle (t * testing.T , format string ) string {
332- integration .InitAuditJavaTest (t , scangraph .GraphScanMinXrayVersion )
333341 _ , cleanUp := securityTestUtils .CreateTestProjectEnvAndChdir (t , filepath .Join (filepath .FromSlash (securityTests .GetTestResourcesPath ()), "projects" , "package-managers" , "gradle" , "gradle" ))
334342 defer cleanUp ()
335343 // Add dummy descriptor file to check that we run only specific audit
@@ -364,17 +372,18 @@ func testAuditMaven(t *testing.T, format string) string {
364372}
365373
366374func TestXrayAuditGoJson (t * testing.T ) {
375+ integration .InitAuditGoTest (t , scangraph .GraphScanMinXrayVersion )
367376 output := testXrayAuditGo (t , false , string (format .Json ), "simple-project" )
368377 validations .VerifyJsonResults (t , output , validations.ValidationParams {Licenses : 1 , Vulnerabilities : 4 })
369378}
370379
371380func TestXrayAuditGoSimpleJson (t * testing.T ) {
381+ integration .InitAuditGoTest (t , scangraph .GraphScanMinXrayVersion )
372382 output := testXrayAuditGo (t , true , string (format .SimpleJson ), "simple-project" )
373383 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {Licenses : 3 , Vulnerabilities : 4 , NotCovered : 2 , NotApplicable : 2 })
374384}
375385
376386func testXrayAuditGo (t * testing.T , noCreds bool , format , project string ) string {
377- integration .InitAuditGoTest (t , scangraph .GraphScanMinXrayVersion )
378387 _ , cleanUp := securityTestUtils .CreateTestProjectEnvAndChdir (t , filepath .Join (filepath .FromSlash (securityTests .GetTestResourcesPath ()), "projects" , "package-managers" , "go" , project ))
379388 defer cleanUp ()
380389 // Add dummy descriptor file to check that we run only specific audit
@@ -429,6 +438,7 @@ func TestXrayAuditMultiProjects(t *testing.T) {
429438}
430439
431440func TestXrayAuditPipJson (t * testing.T ) {
441+ integration .InitAuditPythonTest (t , scangraph .GraphScanMinXrayVersion )
432442 output := testXrayAuditPip (t , string (format .Json ), "" )
433443 validations .VerifyJsonResults (t , output , validations.ValidationParams {
434444 Vulnerabilities : 3 ,
@@ -437,13 +447,15 @@ func TestXrayAuditPipJson(t *testing.T) {
437447}
438448
439449func TestXrayAuditCocoapods (t * testing.T ) {
450+ integration .InitAuditCocoapodsTest (t , scangraph .GraphScanMinXrayVersion )
440451 output := testXrayAuditCocoapods (t , string (format .Json ))
441452 validations .VerifyJsonResults (t , output , validations.ValidationParams {
442453 Vulnerabilities : 1 ,
443454 })
444455}
445456
446457func TestXrayAuditPipSimpleJson (t * testing.T ) {
458+ integration .InitAuditPythonTest (t , scangraph .GraphScanMinXrayVersion )
447459 output := testXrayAuditPip (t , string (format .SimpleJson ), "" )
448460 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
449461 Vulnerabilities : 3 ,
@@ -452,17 +464,18 @@ func TestXrayAuditPipSimpleJson(t *testing.T) {
452464}
453465
454466func TestXrayAuditPipJsonWithRequirementsFile (t * testing.T ) {
467+ integration .InitAuditPythonTest (t , scangraph .GraphScanMinXrayVersion )
455468 output := testXrayAuditPip (t , string (format .Json ), "requirements.txt" )
456469 validations .VerifyJsonResults (t , output , validations.ValidationParams {Vulnerabilities : 2 })
457470}
458471
459472func TestXrayAuditPipSimpleJsonWithRequirementsFile (t * testing.T ) {
473+ integration .InitAuditPythonTest (t , scangraph .GraphScanMinXrayVersion )
460474 output := testXrayAuditPip (t , string (format .SimpleJson ), "requirements.txt" )
461475 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {Vulnerabilities : 2 })
462476}
463477
464478func testXrayAuditPip (t * testing.T , format , requirementsFile string ) string {
465- integration .InitAuditPythonTest (t , scangraph .GraphScanMinXrayVersion )
466479 _ , cleanUp := securityTestUtils .CreateTestProjectEnvAndChdir (t , filepath .Join (filepath .FromSlash (securityTests .GetTestResourcesPath ()), "projects" , "package-managers" , "python" , "pip" , "pip-project" ))
467480 defer cleanUp ()
468481 // Add dummy descriptor file to check that we run only specific audit
@@ -475,7 +488,6 @@ func testXrayAuditPip(t *testing.T, format, requirementsFile string) string {
475488}
476489
477490func testXrayAuditCocoapods (t * testing.T , format string ) string {
478- integration .InitAuditCocoapodsTest (t , scangraph .GraphScanMinXrayVersion )
479491 _ , cleanUp := securityTestUtils .CreateTestProjectEnvAndChdir (t , filepath .Join (filepath .FromSlash (securityTests .GetTestResourcesPath ()), "projects" , "package-managers" , "cocoapods" ))
480492 defer cleanUp ()
481493 // Add dummy descriptor file to check that we run only specific audit
@@ -484,6 +496,7 @@ func testXrayAuditCocoapods(t *testing.T, format string) string {
484496}
485497
486498func TestXrayAuditPipenvJson (t * testing.T ) {
499+ integration .InitAuditPythonTest (t , scangraph .GraphScanMinXrayVersion )
487500 output := testXrayAuditPipenv (t , string (format .Json ))
488501 validations .VerifyJsonResults (t , output , validations.ValidationParams {
489502 Vulnerabilities : 3 ,
@@ -492,6 +505,7 @@ func TestXrayAuditPipenvJson(t *testing.T) {
492505}
493506
494507func TestXrayAuditPipenvSimpleJson (t * testing.T ) {
508+ integration .InitAuditPythonTest (t , scangraph .GraphScanMinXrayVersion )
495509 output := testXrayAuditPipenv (t , string (format .SimpleJson ))
496510 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
497511 Vulnerabilities : 3 ,
@@ -500,7 +514,6 @@ func TestXrayAuditPipenvSimpleJson(t *testing.T) {
500514}
501515
502516func testXrayAuditPipenv (t * testing.T , format string ) string {
503- integration .InitAuditPythonTest (t , scangraph .GraphScanMinXrayVersion )
504517 _ , cleanUp := securityTestUtils .CreateTestProjectEnvAndChdir (t , filepath .Join (filepath .FromSlash (securityTests .GetTestResourcesPath ()), "projects" , "package-managers" , "python" , "pipenv" , "pipenv-project" ))
505518 defer cleanUp ()
506519 // Add dummy descriptor file to check that we run only specific audit
@@ -509,6 +522,7 @@ func testXrayAuditPipenv(t *testing.T, format string) string {
509522}
510523
511524func TestXrayAuditPoetryJson (t * testing.T ) {
525+ integration .InitAuditPythonTest (t , scangraph .GraphScanMinXrayVersion )
512526 output := testXrayAuditPoetry (t , string (format .Json ))
513527 validations .VerifyJsonResults (t , output , validations.ValidationParams {
514528 Vulnerabilities : 3 ,
@@ -517,6 +531,7 @@ func TestXrayAuditPoetryJson(t *testing.T) {
517531}
518532
519533func TestXrayAuditPoetrySimpleJson (t * testing.T ) {
534+ integration .InitAuditPythonTest (t , scangraph .GraphScanMinXrayVersion )
520535 output := testXrayAuditPoetry (t , string (format .SimpleJson ))
521536 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
522537 Vulnerabilities : 3 ,
@@ -525,7 +540,6 @@ func TestXrayAuditPoetrySimpleJson(t *testing.T) {
525540}
526541
527542func testXrayAuditPoetry (t * testing.T , format string ) string {
528- integration .InitAuditPythonTest (t , scangraph .GraphScanMinXrayVersion )
529543 _ , cleanUp := securityTestUtils .CreateTestProjectEnvAndChdir (t , filepath .Join (filepath .FromSlash (securityTests .GetTestResourcesPath ()), "projects" , "package-managers" , "python" , "poetry" , "poetry-project" ))
530544 defer cleanUp ()
531545 // Add dummy descriptor file to check that we run only specific audit
@@ -546,29 +560,46 @@ func addDummyPackageDescriptor(t *testing.T, hasPackageJson bool) {
546560// JAS
547561
548562func TestXrayAuditSastCppFlagSimpleJson (t * testing.T ) {
549- output := testXrayAuditJas (t , securityTests .PlatformCli , filepath .Join ("package-managers" , "c" ), "3" , false , true , false , "" )
550- validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
551- Vulnerabilities : 1 ,
552- Sast : 1 ,
553- })
563+ integration .InitAuditJasTest (t , scangraph .GraphScanMinXrayVersion )
564+ testCase := []struct {
565+ name string
566+ withFlag bool
567+ expectedResults validations.ValidationParams
568+ }{
569+ {
570+ name : "withFlag" ,
571+ withFlag : true ,
572+ expectedResults : validations.ValidationParams {
573+ Vulnerabilities : 1 ,
574+ Sast : 1 ,
575+ },
576+ },
577+ {
578+ name : "withoutFlag" ,
579+ withFlag : false ,
580+ expectedResults : validations.ValidationParams {},
581+ },
582+ }
583+ for _ , tc := range testCase {
584+ t .Run (tc .name , func (t * testing.T ) {
585+ output := testXrayAuditJas (t , securityTests .PlatformCli , filepath .Join ("package-managers" , "c" ), "3" , false , tc .withFlag , false , "" )
586+ validations .VerifySimpleJsonResults (t , output , tc .expectedResults )
587+ })
588+ }
554589}
555590func TestXrayAuditSastCSharpFlagSimpleJson (t * testing.T ) {
556591 // Placeholder until C# Sast is implemented
557592 t .Skip ()
593+ integration .InitAuditJasTest (t , scangraph .GraphScanMinXrayVersion )
558594 output := testXrayAuditJas (t , securityTests .PlatformCli , filepath .Join ("package-managers" , "dotnet" , "dotnet-single" ), "3" , false , false , true , "" )
559595 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
560596 Vulnerabilities : 1 ,
561597 Sast : 1 ,
562598 })
563599}
564600
565- func TestXrayAuditWithoutSastCppFlagSimpleJson (t * testing.T ) {
566- output := testXrayAuditJas (t , securityTests .PlatformCli , filepath .Join ("package-managers" , "c" ), "3" , false , false , false , "" )
567- // verify no results for Sast
568- validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {})
569- }
570-
571601func TestXrayAuditJasMissingContextSimpleJson (t * testing.T ) {
602+ integration .InitAuditJasTest (t , scangraph .GraphScanMinXrayVersion )
572603 output := testXrayAuditJas (t , securityTests .PlatformCli , filepath .Join ("package-managers" , "maven" , "missing-context" ), "3" , false , false , false , "" )
573604 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {MissingContext : 1 })
574605}
@@ -598,6 +629,7 @@ func getNoJasAuditMockCommand() components.Command {
598629}
599630
600631func TestXrayAuditJasSimpleJson (t * testing.T ) {
632+ integration .InitAuditGeneralTests (t , scangraph .GraphScanMinXrayVersion )
601633 output := testXrayAuditJas (t , securityTests .PlatformCli , filepath .Join ("jas" , "jas" ), "3" , false , false , false , "" )
602634 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
603635 Sast : 1 ,
@@ -619,6 +651,7 @@ func TestXrayAuditJasSimpleJsonWithTokenValidation(t *testing.T) {
619651}
620652
621653func TestXrayAuditJasSimpleJsonWithOneThread (t * testing.T ) {
654+ integration .InitAuditGeneralTests (t , scangraph .GraphScanMinXrayVersion )
622655 output := testXrayAuditJas (t , securityTests .PlatformCli , filepath .Join ("jas" , "jas" ), "1" , false , false , false , "" )
623656 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
624657 Sast : 1 ,
@@ -634,6 +667,7 @@ func TestXrayAuditJasSimpleJsonWithOneThread(t *testing.T) {
634667}
635668
636669func TestXrayAuditJasSimpleJsonWithConfig (t * testing.T ) {
670+ integration .InitAuditGeneralTests (t , scangraph .GraphScanMinXrayVersion )
637671 output := testXrayAuditJas (t , securityTests .PlatformCli , filepath .Join ("jas" , "jas-config" ), "3" , false , false , false , "" )
638672 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
639673 Secrets : 1 ,
@@ -647,12 +681,12 @@ func TestXrayAuditJasSimpleJsonWithConfig(t *testing.T) {
647681}
648682
649683func TestXrayAuditJasNoViolationsSimpleJson (t * testing.T ) {
684+ integration .InitAuditGeneralTests (t , scangraph .GraphScanMinXrayVersion )
650685 output := testXrayAuditJas (t , securityTests .PlatformCli , filepath .Join ("package-managers" , "npm" , "npm" ), "3" , false , false , false , "" )
651686 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {Vulnerabilities : 1 , NotApplicable : 1 })
652687}
653688
654689func testXrayAuditJas (t * testing.T , testCli * coreTests.JfrogCli , project string , threads string , validateSecrets bool , validateSastCpp bool , validateSastCSharp bool , customExclusion string ) string {
655- integration .InitAuditGeneralTests (t , scangraph .GraphScanMinXrayVersion )
656690 _ , cleanUp := securityTestUtils .CreateTestProjectEnvAndChdir (t , filepath .Join (filepath .FromSlash (securityTests .GetTestResourcesPath ()), filepath .Join ("projects" , project )))
657691 defer cleanUp ()
658692 // Configure a new server named "default"
@@ -730,6 +764,7 @@ func TestAuditOnEmptyProject(t *testing.T) {
730764// xray-url only - the following tests check the case of adding "xray-url", instead of "url", which is the more common one
731765
732766func TestXrayAuditNotEntitledForJasWithXrayUrl (t * testing.T ) {
767+ integration .InitAuditGeneralTests (t , scangraph .GraphScanMinXrayVersion )
733768 cliToRun , cleanUp := integration .InitTestWithMockCommandOrParams (t , true , getNoJasAuditMockCommand )
734769 defer cleanUp ()
735770 output := testXrayAuditJas (t , cliToRun , filepath .Join ("jas" , "jas" ), "3" , false , false , false , "" )
@@ -740,6 +775,7 @@ func TestXrayAuditNotEntitledForJasWithXrayUrl(t *testing.T) {
740775}
741776
742777func TestXrayAuditJasSimpleJsonWithXrayUrl (t * testing.T ) {
778+ integration .InitAuditGeneralTests (t , scangraph .GraphScanMinXrayVersion )
743779 cliToRun := integration .GetTestCli (cli .GetJfrogCliSecurityApp (), true )
744780 output := testXrayAuditJas (t , cliToRun , filepath .Join ("jas" , "jas" ), "3" , false , false , false , "" )
745781 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
@@ -758,6 +794,7 @@ func TestXrayAuditJasSimpleJsonWithXrayUrl(t *testing.T) {
758794// custom excluded folders
759795
760796func TestXrayAuditJasSimpleJsonWithCustomExclusions (t * testing.T ) {
797+ integration .InitAuditJasTest (t , scangraph .GraphScanMinXrayVersion )
761798 output := testXrayAuditJas (t , securityTests .PlatformCli , filepath .Join ("jas" , "jas" ), "3" , false , false , false , "non_existing_folder" )
762799 validations .VerifySimpleJsonResults (t , output , validations.ValidationParams {
763800 Sast : 2 ,
0 commit comments