Skip to content

Commit fc3c156

Browse files
authored
Move skip tests calls (jfrog#254)
1 parent 4be861f commit fc3c156

File tree

2 files changed

+63
-23
lines changed

2 files changed

+63
-23
lines changed

audit_test.go

Lines changed: 59 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,7 @@ func testAuditNpm(t *testing.T, format string, withVuln bool) string {
7373
}
7474

7575
func TestXrayAuditConanJson(t *testing.T) {
76+
integration.InitAuditCTest(t, scangraph.GraphScanMinXrayVersion)
7677
output := testAuditConan(t, string(format.Json), true)
7778
validations.VerifyJsonResults(t, output, validations.ValidationParams{
7879
Vulnerabilities: 8,
@@ -81,6 +82,7 @@ func TestXrayAuditConanJson(t *testing.T) {
8182
}
8283

8384
func TestXrayAuditConanSimpleJson(t *testing.T) {
85+
integration.InitAuditCTest(t, scangraph.GraphScanMinXrayVersion)
8486
output := testAuditConan(t, string(format.SimpleJson), true)
8587
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
8688
Vulnerabilities: 8,
@@ -89,7 +91,6 @@ func TestXrayAuditConanSimpleJson(t *testing.T) {
8991
}
9092

9193
func testAuditConan(t *testing.T, format string, withVuln bool) string {
92-
integration.InitAuditCTest(t, scangraph.GraphScanMinXrayVersion)
9394
_, cleanUp := securityTestUtils.CreateTestProjectEnvAndChdir(t, filepath.Join(filepath.FromSlash(securityTests.GetTestResourcesPath()), "projects", "package-managers", "conan"))
9495
defer cleanUp()
9596
// Run conan install before executing jfrog audit
@@ -104,6 +105,7 @@ func testAuditConan(t *testing.T, format string, withVuln bool) string {
104105
}
105106

106107
func TestXrayAuditPnpmJson(t *testing.T) {
108+
integration.InitAuditJavaScriptTest(t, scangraph.GraphScanMinXrayVersion)
107109
output := testXrayAuditPnpm(t, string(format.Json))
108110
validations.VerifyJsonResults(t, output, validations.ValidationParams{
109111
Vulnerabilities: 1,
@@ -112,6 +114,7 @@ func TestXrayAuditPnpmJson(t *testing.T) {
112114
}
113115

114116
func TestXrayAuditPnpmSimpleJson(t *testing.T) {
117+
integration.InitAuditJavaScriptTest(t, scangraph.GraphScanMinXrayVersion)
115118
output := testXrayAuditPnpm(t, string(format.SimpleJson))
116119
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
117120
Vulnerabilities: 1,
@@ -120,7 +123,6 @@ func TestXrayAuditPnpmSimpleJson(t *testing.T) {
120123
}
121124

122125
func testXrayAuditPnpm(t *testing.T, format string) string {
123-
integration.InitAuditJavaScriptTest(t, scangraph.GraphScanMinXrayVersion)
124126
_, cleanUp := securityTestUtils.CreateTestProjectEnvAndChdir(t, filepath.Join(filepath.FromSlash(securityTests.GetTestResourcesPath()), "projects", "package-managers", "npm", "npm-no-lock"))
125127
defer cleanUp()
126128
// Run pnpm install before executing audit
@@ -131,6 +133,7 @@ func testXrayAuditPnpm(t *testing.T, format string) string {
131133
}
132134

133135
func TestXrayAuditYarnV2Json(t *testing.T) {
136+
integration.InitAuditJavaScriptTest(t, scangraph.GraphScanMinXrayVersion)
134137
testXrayAuditYarn(t, "yarn-v2", func() {
135138
output := runXrayAuditYarnWithOutput(t, string(format.Json))
136139
validations.VerifyJsonResults(t, output, validations.ValidationParams{
@@ -141,6 +144,7 @@ func TestXrayAuditYarnV2Json(t *testing.T) {
141144
}
142145

143146
func TestXrayAuditYarnV2SimpleJson(t *testing.T) {
147+
integration.InitAuditJavaScriptTest(t, scangraph.GraphScanMinXrayVersion)
144148
testXrayAuditYarn(t, "yarn-v3", func() {
145149
output := runXrayAuditYarnWithOutput(t, string(format.SimpleJson))
146150
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
@@ -151,6 +155,7 @@ func TestXrayAuditYarnV2SimpleJson(t *testing.T) {
151155
}
152156

153157
func TestXrayAuditYarnV1Json(t *testing.T) {
158+
integration.InitAuditJavaScriptTest(t, scangraph.GraphScanMinXrayVersion)
154159
testXrayAuditYarn(t, "yarn-v1", func() {
155160
output := runXrayAuditYarnWithOutput(t, string(format.Json))
156161
validations.VerifyJsonResults(t, output, validations.ValidationParams{
@@ -161,6 +166,7 @@ func TestXrayAuditYarnV1Json(t *testing.T) {
161166
}
162167

163168
func TestXrayAuditYarnV1JsonWithoutDevDependencies(t *testing.T) {
169+
integration.InitAuditJavaScriptTest(t, scangraph.GraphScanMinXrayVersion)
164170
unsetEnv := clientTests.SetEnvWithCallbackAndAssert(t, "NODE_ENV", "production")
165171
defer unsetEnv()
166172
testXrayAuditYarn(t, "yarn-v1", func() {
@@ -173,6 +179,7 @@ func TestXrayAuditYarnV1JsonWithoutDevDependencies(t *testing.T) {
173179
}
174180

175181
func TestXrayAuditYarnV1SimpleJson(t *testing.T) {
182+
integration.InitAuditJavaScriptTest(t, scangraph.GraphScanMinXrayVersion)
176183
testXrayAuditYarn(t, "yarn-v1", func() {
177184
output := runXrayAuditYarnWithOutput(t, string(format.SimpleJson))
178185
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
@@ -183,7 +190,6 @@ func TestXrayAuditYarnV1SimpleJson(t *testing.T) {
183190
}
184191

185192
func testXrayAuditYarn(t *testing.T, projectDirName string, yarnCmd func()) {
186-
integration.InitAuditJavaScriptTest(t, scangraph.GraphScanMinXrayVersion)
187193
_, cleanUp := securityTestUtils.CreateTestProjectEnvAndChdir(t, filepath.Join(filepath.FromSlash(securityTests.GetTestResourcesPath()), "projects", "package-managers", "yarn", projectDirName))
188194
defer cleanUp()
189195
// Run yarn install before executing jf audit --yarn. Return error to assert according to test.
@@ -199,6 +205,7 @@ func runXrayAuditYarnWithOutput(t *testing.T, format string) string {
199205

200206
// Tests NuGet audit by providing simple NuGet project + multi-project NuGet project and asserts any error.
201207
func TestXrayAuditNugetJson(t *testing.T) {
208+
integration.InitAuditCTest(t, scangraph.GraphScanMinXrayVersion)
202209
var testdata = []struct {
203210
projectName string
204211
format string
@@ -256,6 +263,7 @@ func TestXrayAuditNugetJson(t *testing.T) {
256263
}
257264

258265
func TestXrayAuditNugetSimpleJson(t *testing.T) {
266+
integration.InitAuditCTest(t, scangraph.GraphScanMinXrayVersion)
259267
var testdata = []struct {
260268
projectName string
261269
format string
@@ -299,7 +307,6 @@ func TestXrayAuditNugetSimpleJson(t *testing.T) {
299307
}
300308

301309
func testXrayAuditNuget(t *testing.T, projectName, format string, restoreTech string) string {
302-
integration.InitAuditCTest(t, scangraph.GraphScanMinXrayVersion)
303310
_, cleanUp := securityTestUtils.CreateTestProjectEnvAndChdir(t, filepath.Join(filepath.FromSlash(securityTests.GetTestResourcesPath()), "projects", "package-managers", "nuget", projectName))
304311
defer cleanUp()
305312
// Add dummy descriptor file to check that we run only specific audit
@@ -313,6 +320,7 @@ func testXrayAuditNuget(t *testing.T, projectName, format string, restoreTech st
313320
}
314321

315322
func TestXrayAuditGradleJson(t *testing.T) {
323+
integration.InitAuditJavaTest(t, scangraph.GraphScanMinXrayVersion)
316324
output := testXrayAuditGradle(t, string(format.Json))
317325
validations.VerifyJsonResults(t, output, validations.ValidationParams{
318326
Vulnerabilities: 3,
@@ -321,6 +329,7 @@ func TestXrayAuditGradleJson(t *testing.T) {
321329
}
322330

323331
func TestXrayAuditGradleSimpleJson(t *testing.T) {
332+
integration.InitAuditJavaTest(t, scangraph.GraphScanMinXrayVersion)
324333
output := testXrayAuditGradle(t, string(format.SimpleJson))
325334
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
326335
Vulnerabilities: 3,
@@ -329,7 +338,6 @@ func TestXrayAuditGradleSimpleJson(t *testing.T) {
329338
}
330339

331340
func testXrayAuditGradle(t *testing.T, format string) string {
332-
integration.InitAuditJavaTest(t, scangraph.GraphScanMinXrayVersion)
333341
_, cleanUp := securityTestUtils.CreateTestProjectEnvAndChdir(t, filepath.Join(filepath.FromSlash(securityTests.GetTestResourcesPath()), "projects", "package-managers", "gradle", "gradle"))
334342
defer cleanUp()
335343
// Add dummy descriptor file to check that we run only specific audit
@@ -364,17 +372,18 @@ func testAuditMaven(t *testing.T, format string) string {
364372
}
365373

366374
func TestXrayAuditGoJson(t *testing.T) {
375+
integration.InitAuditGoTest(t, scangraph.GraphScanMinXrayVersion)
367376
output := testXrayAuditGo(t, false, string(format.Json), "simple-project")
368377
validations.VerifyJsonResults(t, output, validations.ValidationParams{Licenses: 1, Vulnerabilities: 4})
369378
}
370379

371380
func TestXrayAuditGoSimpleJson(t *testing.T) {
381+
integration.InitAuditGoTest(t, scangraph.GraphScanMinXrayVersion)
372382
output := testXrayAuditGo(t, true, string(format.SimpleJson), "simple-project")
373383
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{Licenses: 3, Vulnerabilities: 4, NotCovered: 2, NotApplicable: 2})
374384
}
375385

376386
func testXrayAuditGo(t *testing.T, noCreds bool, format, project string) string {
377-
integration.InitAuditGoTest(t, scangraph.GraphScanMinXrayVersion)
378387
_, cleanUp := securityTestUtils.CreateTestProjectEnvAndChdir(t, filepath.Join(filepath.FromSlash(securityTests.GetTestResourcesPath()), "projects", "package-managers", "go", project))
379388
defer cleanUp()
380389
// Add dummy descriptor file to check that we run only specific audit
@@ -429,6 +438,7 @@ func TestXrayAuditMultiProjects(t *testing.T) {
429438
}
430439

431440
func TestXrayAuditPipJson(t *testing.T) {
441+
integration.InitAuditPythonTest(t, scangraph.GraphScanMinXrayVersion)
432442
output := testXrayAuditPip(t, string(format.Json), "")
433443
validations.VerifyJsonResults(t, output, validations.ValidationParams{
434444
Vulnerabilities: 3,
@@ -437,13 +447,15 @@ func TestXrayAuditPipJson(t *testing.T) {
437447
}
438448

439449
func TestXrayAuditCocoapods(t *testing.T) {
450+
integration.InitAuditCocoapodsTest(t, scangraph.GraphScanMinXrayVersion)
440451
output := testXrayAuditCocoapods(t, string(format.Json))
441452
validations.VerifyJsonResults(t, output, validations.ValidationParams{
442453
Vulnerabilities: 1,
443454
})
444455
}
445456

446457
func TestXrayAuditPipSimpleJson(t *testing.T) {
458+
integration.InitAuditPythonTest(t, scangraph.GraphScanMinXrayVersion)
447459
output := testXrayAuditPip(t, string(format.SimpleJson), "")
448460
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
449461
Vulnerabilities: 3,
@@ -452,17 +464,18 @@ func TestXrayAuditPipSimpleJson(t *testing.T) {
452464
}
453465

454466
func TestXrayAuditPipJsonWithRequirementsFile(t *testing.T) {
467+
integration.InitAuditPythonTest(t, scangraph.GraphScanMinXrayVersion)
455468
output := testXrayAuditPip(t, string(format.Json), "requirements.txt")
456469
validations.VerifyJsonResults(t, output, validations.ValidationParams{Vulnerabilities: 2})
457470
}
458471

459472
func TestXrayAuditPipSimpleJsonWithRequirementsFile(t *testing.T) {
473+
integration.InitAuditPythonTest(t, scangraph.GraphScanMinXrayVersion)
460474
output := testXrayAuditPip(t, string(format.SimpleJson), "requirements.txt")
461475
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{Vulnerabilities: 2})
462476
}
463477

464478
func testXrayAuditPip(t *testing.T, format, requirementsFile string) string {
465-
integration.InitAuditPythonTest(t, scangraph.GraphScanMinXrayVersion)
466479
_, cleanUp := securityTestUtils.CreateTestProjectEnvAndChdir(t, filepath.Join(filepath.FromSlash(securityTests.GetTestResourcesPath()), "projects", "package-managers", "python", "pip", "pip-project"))
467480
defer cleanUp()
468481
// Add dummy descriptor file to check that we run only specific audit
@@ -475,7 +488,6 @@ func testXrayAuditPip(t *testing.T, format, requirementsFile string) string {
475488
}
476489

477490
func testXrayAuditCocoapods(t *testing.T, format string) string {
478-
integration.InitAuditCocoapodsTest(t, scangraph.GraphScanMinXrayVersion)
479491
_, cleanUp := securityTestUtils.CreateTestProjectEnvAndChdir(t, filepath.Join(filepath.FromSlash(securityTests.GetTestResourcesPath()), "projects", "package-managers", "cocoapods"))
480492
defer cleanUp()
481493
// Add dummy descriptor file to check that we run only specific audit
@@ -484,6 +496,7 @@ func testXrayAuditCocoapods(t *testing.T, format string) string {
484496
}
485497

486498
func TestXrayAuditPipenvJson(t *testing.T) {
499+
integration.InitAuditPythonTest(t, scangraph.GraphScanMinXrayVersion)
487500
output := testXrayAuditPipenv(t, string(format.Json))
488501
validations.VerifyJsonResults(t, output, validations.ValidationParams{
489502
Vulnerabilities: 3,
@@ -492,6 +505,7 @@ func TestXrayAuditPipenvJson(t *testing.T) {
492505
}
493506

494507
func TestXrayAuditPipenvSimpleJson(t *testing.T) {
508+
integration.InitAuditPythonTest(t, scangraph.GraphScanMinXrayVersion)
495509
output := testXrayAuditPipenv(t, string(format.SimpleJson))
496510
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
497511
Vulnerabilities: 3,
@@ -500,7 +514,6 @@ func TestXrayAuditPipenvSimpleJson(t *testing.T) {
500514
}
501515

502516
func testXrayAuditPipenv(t *testing.T, format string) string {
503-
integration.InitAuditPythonTest(t, scangraph.GraphScanMinXrayVersion)
504517
_, cleanUp := securityTestUtils.CreateTestProjectEnvAndChdir(t, filepath.Join(filepath.FromSlash(securityTests.GetTestResourcesPath()), "projects", "package-managers", "python", "pipenv", "pipenv-project"))
505518
defer cleanUp()
506519
// Add dummy descriptor file to check that we run only specific audit
@@ -509,6 +522,7 @@ func testXrayAuditPipenv(t *testing.T, format string) string {
509522
}
510523

511524
func TestXrayAuditPoetryJson(t *testing.T) {
525+
integration.InitAuditPythonTest(t, scangraph.GraphScanMinXrayVersion)
512526
output := testXrayAuditPoetry(t, string(format.Json))
513527
validations.VerifyJsonResults(t, output, validations.ValidationParams{
514528
Vulnerabilities: 3,
@@ -517,6 +531,7 @@ func TestXrayAuditPoetryJson(t *testing.T) {
517531
}
518532

519533
func TestXrayAuditPoetrySimpleJson(t *testing.T) {
534+
integration.InitAuditPythonTest(t, scangraph.GraphScanMinXrayVersion)
520535
output := testXrayAuditPoetry(t, string(format.SimpleJson))
521536
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
522537
Vulnerabilities: 3,
@@ -525,7 +540,6 @@ func TestXrayAuditPoetrySimpleJson(t *testing.T) {
525540
}
526541

527542
func testXrayAuditPoetry(t *testing.T, format string) string {
528-
integration.InitAuditPythonTest(t, scangraph.GraphScanMinXrayVersion)
529543
_, cleanUp := securityTestUtils.CreateTestProjectEnvAndChdir(t, filepath.Join(filepath.FromSlash(securityTests.GetTestResourcesPath()), "projects", "package-managers", "python", "poetry", "poetry-project"))
530544
defer cleanUp()
531545
// Add dummy descriptor file to check that we run only specific audit
@@ -546,29 +560,46 @@ func addDummyPackageDescriptor(t *testing.T, hasPackageJson bool) {
546560
// JAS
547561

548562
func TestXrayAuditSastCppFlagSimpleJson(t *testing.T) {
549-
output := testXrayAuditJas(t, securityTests.PlatformCli, filepath.Join("package-managers", "c"), "3", false, true, false, "")
550-
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
551-
Vulnerabilities: 1,
552-
Sast: 1,
553-
})
563+
integration.InitAuditJasTest(t, scangraph.GraphScanMinXrayVersion)
564+
testCase := []struct {
565+
name string
566+
withFlag bool
567+
expectedResults validations.ValidationParams
568+
}{
569+
{
570+
name: "withFlag",
571+
withFlag: true,
572+
expectedResults: validations.ValidationParams{
573+
Vulnerabilities: 1,
574+
Sast: 1,
575+
},
576+
},
577+
{
578+
name: "withoutFlag",
579+
withFlag: false,
580+
expectedResults: validations.ValidationParams{},
581+
},
582+
}
583+
for _, tc := range testCase {
584+
t.Run(tc.name, func(t *testing.T) {
585+
output := testXrayAuditJas(t, securityTests.PlatformCli, filepath.Join("package-managers", "c"), "3", false, tc.withFlag, false, "")
586+
validations.VerifySimpleJsonResults(t, output, tc.expectedResults)
587+
})
588+
}
554589
}
555590
func TestXrayAuditSastCSharpFlagSimpleJson(t *testing.T) {
556591
// Placeholder until C# Sast is implemented
557592
t.Skip()
593+
integration.InitAuditJasTest(t, scangraph.GraphScanMinXrayVersion)
558594
output := testXrayAuditJas(t, securityTests.PlatformCli, filepath.Join("package-managers", "dotnet", "dotnet-single"), "3", false, false, true, "")
559595
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
560596
Vulnerabilities: 1,
561597
Sast: 1,
562598
})
563599
}
564600

565-
func TestXrayAuditWithoutSastCppFlagSimpleJson(t *testing.T) {
566-
output := testXrayAuditJas(t, securityTests.PlatformCli, filepath.Join("package-managers", "c"), "3", false, false, false, "")
567-
// verify no results for Sast
568-
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{})
569-
}
570-
571601
func TestXrayAuditJasMissingContextSimpleJson(t *testing.T) {
602+
integration.InitAuditJasTest(t, scangraph.GraphScanMinXrayVersion)
572603
output := testXrayAuditJas(t, securityTests.PlatformCli, filepath.Join("package-managers", "maven", "missing-context"), "3", false, false, false, "")
573604
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{MissingContext: 1})
574605
}
@@ -598,6 +629,7 @@ func getNoJasAuditMockCommand() components.Command {
598629
}
599630

600631
func TestXrayAuditJasSimpleJson(t *testing.T) {
632+
integration.InitAuditGeneralTests(t, scangraph.GraphScanMinXrayVersion)
601633
output := testXrayAuditJas(t, securityTests.PlatformCli, filepath.Join("jas", "jas"), "3", false, false, false, "")
602634
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
603635
Sast: 1,
@@ -619,6 +651,7 @@ func TestXrayAuditJasSimpleJsonWithTokenValidation(t *testing.T) {
619651
}
620652

621653
func TestXrayAuditJasSimpleJsonWithOneThread(t *testing.T) {
654+
integration.InitAuditGeneralTests(t, scangraph.GraphScanMinXrayVersion)
622655
output := testXrayAuditJas(t, securityTests.PlatformCli, filepath.Join("jas", "jas"), "1", false, false, false, "")
623656
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
624657
Sast: 1,
@@ -634,6 +667,7 @@ func TestXrayAuditJasSimpleJsonWithOneThread(t *testing.T) {
634667
}
635668

636669
func TestXrayAuditJasSimpleJsonWithConfig(t *testing.T) {
670+
integration.InitAuditGeneralTests(t, scangraph.GraphScanMinXrayVersion)
637671
output := testXrayAuditJas(t, securityTests.PlatformCli, filepath.Join("jas", "jas-config"), "3", false, false, false, "")
638672
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
639673
Secrets: 1,
@@ -647,12 +681,12 @@ func TestXrayAuditJasSimpleJsonWithConfig(t *testing.T) {
647681
}
648682

649683
func TestXrayAuditJasNoViolationsSimpleJson(t *testing.T) {
684+
integration.InitAuditGeneralTests(t, scangraph.GraphScanMinXrayVersion)
650685
output := testXrayAuditJas(t, securityTests.PlatformCli, filepath.Join("package-managers", "npm", "npm"), "3", false, false, false, "")
651686
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{Vulnerabilities: 1, NotApplicable: 1})
652687
}
653688

654689
func testXrayAuditJas(t *testing.T, testCli *coreTests.JfrogCli, project string, threads string, validateSecrets bool, validateSastCpp bool, validateSastCSharp bool, customExclusion string) string {
655-
integration.InitAuditGeneralTests(t, scangraph.GraphScanMinXrayVersion)
656690
_, cleanUp := securityTestUtils.CreateTestProjectEnvAndChdir(t, filepath.Join(filepath.FromSlash(securityTests.GetTestResourcesPath()), filepath.Join("projects", project)))
657691
defer cleanUp()
658692
// Configure a new server named "default"
@@ -730,6 +764,7 @@ func TestAuditOnEmptyProject(t *testing.T) {
730764
// xray-url only - the following tests check the case of adding "xray-url", instead of "url", which is the more common one
731765

732766
func TestXrayAuditNotEntitledForJasWithXrayUrl(t *testing.T) {
767+
integration.InitAuditGeneralTests(t, scangraph.GraphScanMinXrayVersion)
733768
cliToRun, cleanUp := integration.InitTestWithMockCommandOrParams(t, true, getNoJasAuditMockCommand)
734769
defer cleanUp()
735770
output := testXrayAuditJas(t, cliToRun, filepath.Join("jas", "jas"), "3", false, false, false, "")
@@ -740,6 +775,7 @@ func TestXrayAuditNotEntitledForJasWithXrayUrl(t *testing.T) {
740775
}
741776

742777
func TestXrayAuditJasSimpleJsonWithXrayUrl(t *testing.T) {
778+
integration.InitAuditGeneralTests(t, scangraph.GraphScanMinXrayVersion)
743779
cliToRun := integration.GetTestCli(cli.GetJfrogCliSecurityApp(), true)
744780
output := testXrayAuditJas(t, cliToRun, filepath.Join("jas", "jas"), "3", false, false, false, "")
745781
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
@@ -758,6 +794,7 @@ func TestXrayAuditJasSimpleJsonWithXrayUrl(t *testing.T) {
758794
// custom excluded folders
759795

760796
func TestXrayAuditJasSimpleJsonWithCustomExclusions(t *testing.T) {
797+
integration.InitAuditJasTest(t, scangraph.GraphScanMinXrayVersion)
761798
output := testXrayAuditJas(t, securityTests.PlatformCli, filepath.Join("jas", "jas"), "3", false, false, false, "non_existing_folder")
762799
validations.VerifySimpleJsonResults(t, output, validations.ValidationParams{
763800
Sast: 2,

0 commit comments

Comments
 (0)