aboutsummaryrefslogtreecommitdiffstats
path: root/sonar-scanner-engine/src/test/java/org/sonar/scanner
diff options
context:
space:
mode:
Diffstat (limited to 'sonar-scanner-engine/src/test/java/org/sonar/scanner')
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/externalissue/sarif/RulesSeverityDetectorTest.java59
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/externalissue/sarif/RunMapperTest.java70
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/issue/IssuePublisherTest.java58
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/repository/featureflags/DefaultFeatureFlagsLoaderTest.java85
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/repository/featureflags/DefaultFeatureFlagsRepositoryTest.java49
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/CliCacheServiceTest.java307
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/CliServiceTest.java376
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/ScaExecutorTest.java180
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/ScaPropertiesTest.java100
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/ProjectConfigurationProviderTest.java14
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/DirectoryFileVisitorTest.java53
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/HiddenFilesProjectDataTest.java160
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/HiddenFilesVisitorHelperTest.java315
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/ModuleInputComponentStoreTest.java157
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/MutableFileSystemTest.java99
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/DefaultSensorStorageTest.java6
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/ModuleSensorContextTest.java4
-rw-r--r--sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/ProjectSensorContextTest.java14
18 files changed, 1944 insertions, 162 deletions
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/externalissue/sarif/RulesSeverityDetectorTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/externalissue/sarif/RulesSeverityDetectorTest.java
index 5091dcf5a3a..f5d88016944 100644
--- a/sonar-scanner-engine/src/test/java/org/sonar/scanner/externalissue/sarif/RulesSeverityDetectorTest.java
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/externalissue/sarif/RulesSeverityDetectorTest.java
@@ -22,12 +22,16 @@ package org.sonar.scanner.externalissue.sarif;
import java.util.List;
import java.util.Map;
import java.util.Set;
+import javax.annotation.Nullable;
import org.assertj.core.api.Assertions;
import org.assertj.core.groups.Tuple;
-import org.junit.Before;
-import org.junit.Test;
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+import org.junit.jupiter.api.extension.RegisterExtension;
+import org.junit.jupiter.params.ParameterizedTest;
+import org.junit.jupiter.params.provider.NullAndEmptySource;
import org.slf4j.event.Level;
-import org.sonar.api.testfixtures.log.LogTester;
+import org.sonar.api.testfixtures.log.LogTesterJUnit5;
import org.sonar.sarif.pojo.ReportingConfiguration;
import org.sonar.sarif.pojo.ReportingDescriptor;
import org.sonar.sarif.pojo.Result;
@@ -44,12 +48,12 @@ import static org.sonar.sarif.pojo.Result.Level.WARNING;
import static org.sonar.scanner.externalissue.sarif.ResultMapper.DEFAULT_IMPACT_SEVERITY;
import static org.sonar.scanner.externalissue.sarif.ResultMapper.DEFAULT_SEVERITY;
-public class RulesSeverityDetectorTest {
+class RulesSeverityDetectorTest {
private static final String DRIVER_NAME = "Test";
private static final String RULE_ID = "RULE_ID";
- @org.junit.Rule
- public LogTester logTester = new LogTester().setLevel(Level.TRACE);
+ @RegisterExtension
+ private final LogTesterJUnit5 logTester = new LogTesterJUnit5();
private final Run run = mock(Run.class);
private final ReportingDescriptor rule = mock(ReportingDescriptor.class);
@@ -59,8 +63,8 @@ public class RulesSeverityDetectorTest {
private final ToolComponent extension = mock(ToolComponent.class);
private final ReportingConfiguration defaultConfiguration = mock(ReportingConfiguration.class);
- @Before
- public void setUp() {
+ @BeforeEach
+ void setUp() {
when(run.getResults()).thenReturn(List.of(result));
when(run.getTool()).thenReturn(tool);
when(tool.getDriver()).thenReturn(driver);
@@ -68,8 +72,8 @@ public class RulesSeverityDetectorTest {
// We keep this test for backward compatibility until we remove the deprecated severity
@Test
- public void detectRulesSeverities_detectsCorrectlyResultDefinedRuleSeverities() {
- Run run = mockResultDefinedRuleSeverities();
+ void detectRulesSeverities_detectsCorrectlyResultDefinedRuleSeverities() {
+ mockResultDefinedRuleSeverities();
Map<String, Result.Level> rulesSeveritiesByRuleId = RulesSeverityDetector.detectRulesSeverities(run, DRIVER_NAME);
@@ -78,8 +82,8 @@ public class RulesSeverityDetectorTest {
}
@Test
- public void detectRulesSeveritiesForNewTaxonomy_shouldReturnsEmptyMapAndLogsWarning_whenOnlyResultDefinedRuleSeverities() {
- Run run = mockResultDefinedRuleSeverities();
+ void detectRulesSeveritiesForNewTaxonomy_shouldReturnsEmptyMapAndLogsWarning_whenOnlyResultDefinedRuleSeverities() {
+ mockResultDefinedRuleSeverities();
Map<String, Result.Level> rulesSeveritiesByRuleId = RulesSeverityDetector.detectRulesSeveritiesForNewTaxonomy(run, DRIVER_NAME);
@@ -88,8 +92,8 @@ public class RulesSeverityDetectorTest {
}
@Test
- public void detectRulesSeverities_detectsCorrectlyDriverDefinedRuleSeverities() {
- Run run = mockDriverDefinedRuleSeverities();
+ void detectRulesSeverities_detectsCorrectlyDriverDefinedRuleSeverities() {
+ mockDriverDefinedRuleSeverities();
Map<String, Result.Level> rulesSeveritiesByRuleId = RulesSeverityDetector.detectRulesSeveritiesForNewTaxonomy(run, DRIVER_NAME);
@@ -103,9 +107,13 @@ public class RulesSeverityDetectorTest {
assertDetectedRuleSeverities(rulesSeveritiesByRuleId, tuple(RULE_ID, WARNING));
}
- @Test
- public void detectRulesSeverities_detectsCorrectlyExtensionsDefinedRuleSeverities() {
- Run run = mockExtensionsDefinedRuleSeverities();
+
+
+ @ParameterizedTest
+ @NullAndEmptySource
+ void detectRulesSeverities_detectsCorrectlyExtensionsDefinedRuleSeverities(@Nullable Set<ReportingDescriptor> rules) {
+ when(driver.getRules()).thenReturn(rules);
+ mockExtensionsDefinedRuleSeverities();
Map<String, Result.Level> rulesSeveritiesByRuleId = RulesSeverityDetector.detectRulesSeveritiesForNewTaxonomy(run, DRIVER_NAME);
@@ -120,8 +128,8 @@ public class RulesSeverityDetectorTest {
}
@Test
- public void detectRulesSeverities_returnsEmptyMapAndLogsWarning_whenUnableToDetectSeverities() {
- Run run = mockUnsupportedRuleSeveritiesDefinition();
+ void detectRulesSeverities_returnsEmptyMapAndLogsWarning_whenUnableToDetectSeverities() {
+ mockUnsupportedRuleSeveritiesDefinition();
Map<String, Result.Level> rulesSeveritiesByRuleId = RulesSeverityDetector.detectRulesSeveritiesForNewTaxonomy(run, DRIVER_NAME);
@@ -135,38 +143,33 @@ public class RulesSeverityDetectorTest {
assertDetectedRuleSeverities(rulesSeveritiesByRuleId);
}
- private Run mockResultDefinedRuleSeverities() {
+ private void mockResultDefinedRuleSeverities() {
when(run.getResults()).thenReturn(List.of(result));
when(result.getLevel()).thenReturn(WARNING);
when(result.getRuleId()).thenReturn(RULE_ID);
- return run;
}
- private Run mockDriverDefinedRuleSeverities() {
+ private void mockDriverDefinedRuleSeverities() {
when(driver.getRules()).thenReturn(Set.of(rule));
when(rule.getId()).thenReturn(RULE_ID);
when(rule.getDefaultConfiguration()).thenReturn(defaultConfiguration);
when(defaultConfiguration.getLevel()).thenReturn(ReportingConfiguration.Level.WARNING);
- return run;
}
- private Run mockExtensionsDefinedRuleSeverities() {
- when(driver.getRules()).thenReturn(Set.of());
+ private void mockExtensionsDefinedRuleSeverities() {
when(tool.getExtensions()).thenReturn(Set.of(extension));
when(extension.getRules()).thenReturn(Set.of(rule));
when(rule.getId()).thenReturn(RULE_ID);
when(rule.getDefaultConfiguration()).thenReturn(defaultConfiguration);
when(defaultConfiguration.getLevel()).thenReturn(ReportingConfiguration.Level.WARNING);
- return run;
}
- private Run mockUnsupportedRuleSeveritiesDefinition() {
+ private void mockUnsupportedRuleSeveritiesDefinition() {
when(run.getTool()).thenReturn(tool);
when(tool.getDriver()).thenReturn(driver);
when(driver.getRules()).thenReturn(Set.of());
when(tool.getExtensions()).thenReturn(Set.of(extension));
when(extension.getRules()).thenReturn(Set.of());
- return run;
}
private void assertNoLogs() {
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/externalissue/sarif/RunMapperTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/externalissue/sarif/RunMapperTest.java
index 90ddfadd9f3..164787f8cde 100644
--- a/sonar-scanner-engine/src/test/java/org/sonar/scanner/externalissue/sarif/RunMapperTest.java
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/externalissue/sarif/RunMapperTest.java
@@ -22,19 +22,19 @@ package org.sonar.scanner.externalissue.sarif;
import java.util.List;
import java.util.Map;
import java.util.Set;
-import org.junit.Before;
-import org.junit.Rule;
-import org.junit.Test;
-import org.junit.runner.RunWith;
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+import org.junit.jupiter.api.extension.ExtendWith;
+import org.junit.jupiter.api.extension.RegisterExtension;
import org.mockito.Answers;
import org.mockito.InjectMocks;
import org.mockito.Mock;
import org.mockito.MockedStatic;
-import org.mockito.junit.MockitoJUnitRunner;
+import org.mockito.junit.jupiter.MockitoExtension;
import org.slf4j.event.Level;
import org.sonar.api.batch.sensor.issue.NewExternalIssue;
import org.sonar.api.batch.sensor.rule.NewAdHocRule;
-import org.sonar.api.testfixtures.log.LogTester;
+import org.sonar.api.testfixtures.log.LogTesterJUnit5;
import org.sonar.sarif.pojo.ReportingDescriptor;
import org.sonar.sarif.pojo.Result;
import org.sonar.sarif.pojo.Run;
@@ -44,13 +44,14 @@ import org.sonar.scanner.externalissue.sarif.RunMapper.RunMapperResult;
import static org.assertj.core.api.Assertions.assertThat;
import static org.assertj.core.api.Assertions.assertThatIllegalArgumentException;
import static org.assertj.core.api.Assertions.assertThatNoException;
+import static org.mockito.Mockito.lenient;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.mockStatic;
import static org.mockito.Mockito.when;
import static org.sonar.sarif.pojo.Result.Level.WARNING;
-@RunWith(MockitoJUnitRunner.class)
-public class RunMapperTest {
+@ExtendWith(MockitoExtension.class)
+class RunMapperTest {
private static final String TEST_DRIVER = "Test driver";
public static final String RULE_ID = "ruleId";
@@ -66,21 +67,21 @@ public class RunMapperTest {
@Mock
private ReportingDescriptor rule;
- @Rule
- public LogTester logTester = new LogTester();
+ @RegisterExtension
+ public LogTesterJUnit5 logTester = new LogTesterJUnit5();
@InjectMocks
private RunMapper runMapper;
- @Before
- public void setUp() {
- when(run.getTool().getDriver().getName()).thenReturn(TEST_DRIVER);
- when(run.getTool().getExtensions()).thenReturn(null);
- when(rule.getId()).thenReturn(RULE_ID);
+ @BeforeEach
+ void setUp() {
+ lenient().when(run.getTool().getDriver().getName()).thenReturn(TEST_DRIVER);
+ lenient().when(run.getTool().getExtensions()).thenReturn(null);
+ lenient().when(rule.getId()).thenReturn(RULE_ID);
}
@Test
- public void mapRun_shouldMapExternalIssues() {
+ void mapRun_shouldMapExternalIssues() {
Result result1 = mock(Result.class);
Result result2 = mock(Result.class);
when(run.getResults()).thenReturn(List.of(result1, result2));
@@ -99,7 +100,7 @@ public class RunMapperTest {
}
@Test
- public void mapRun_shouldMapExternalRules_whenDriverHasRulesAndNoExtensions() {
+ void mapRun_shouldMapExternalRules_whenDriverHasRulesAndNoExtensions() {
when(run.getTool().getDriver().getRules()).thenReturn(Set.of(rule));
NewAdHocRule externalRule = mockMappedExternalRule();
@@ -115,7 +116,7 @@ public class RunMapperTest {
}
@Test
- public void mapRun_shouldMapExternalRules_whenRulesInExtensions() {
+ void mapRun_shouldMapExternalRules_whenRulesInExtensions() {
when(run.getTool().getDriver().getRules()).thenReturn(Set.of());
ToolComponent extension = mock(ToolComponent.class);
when(extension.getRules()).thenReturn(Set.of(rule));
@@ -134,7 +135,7 @@ public class RunMapperTest {
}
@Test
- public void mapRun_shouldNotFail_whenExtensionsDontHaveRules() {
+ void mapRun_shouldNotFail_whenExtensionsDontHaveRules() {
when(run.getTool().getDriver().getRules()).thenReturn(Set.of(rule));
ToolComponent extension = mock(ToolComponent.class);
when(extension.getRules()).thenReturn(null);
@@ -149,7 +150,7 @@ public class RunMapperTest {
}
@Test
- public void mapRun_shouldNotFail_whenExtensionsHaveEmptyRules() {
+ void mapRun_shouldNotFail_whenExtensionsHaveEmptyRules() {
when(run.getTool().getDriver().getRules()).thenReturn(Set.of(rule));
ToolComponent extension = mock(ToolComponent.class);
when(extension.getRules()).thenReturn(Set.of());
@@ -164,7 +165,7 @@ public class RunMapperTest {
}
@Test
- public void mapRun_ifRunIsEmpty_returnsEmptyList() {
+ void mapRun_ifRunIsEmpty_returnsEmptyList() {
when(run.getResults()).thenReturn(List.of());
RunMapperResult runMapperResult = runMapper.mapRun(run);
@@ -173,7 +174,7 @@ public class RunMapperTest {
}
@Test
- public void mapRun_ifExceptionThrownByResultMapper_logsThemAndContinueProcessing() {
+ void mapRun_ifExceptionThrownByResultMapper_logsThemAndContinueProcessing() {
Result result1 = mock(Result.class);
Result result2 = mock(Result.class);
when(run.getResults()).thenReturn(List.of(result1, result2));
@@ -194,7 +195,7 @@ public class RunMapperTest {
}
@Test
- public void mapRun_failsIfToolNotSet() {
+ void mapRun_failsIfToolNotSet() {
when(run.getTool()).thenReturn(null);
assertThatIllegalArgumentException()
@@ -203,7 +204,7 @@ public class RunMapperTest {
}
@Test
- public void mapRun_failsIfDriverNotSet() {
+ void mapRun_failsIfDriverNotSet() {
when(run.getTool().getDriver()).thenReturn(null);
assertThatIllegalArgumentException()
@@ -212,7 +213,7 @@ public class RunMapperTest {
}
@Test
- public void mapRun_failsIfDriverNameIsNotSet() {
+ void mapRun_failsIfDriverNameIsNotSet() {
when(run.getTool().getDriver().getName()).thenReturn(null);
assertThatIllegalArgumentException()
@@ -220,6 +221,25 @@ public class RunMapperTest {
.withMessage("The run does not have a tool driver name defined.");
}
+ @Test
+ void mapRun_shouldNotFail_whenDriverRulesNullAndExtensionsRulesNotNull() {
+ when(run.getTool().getDriver().getRules()).thenReturn(null);
+ ToolComponent extension = mock(ToolComponent.class);
+ when(extension.getRules()).thenReturn(Set.of(rule));
+ when(run.getTool().getExtensions()).thenReturn(Set.of(extension));
+ NewAdHocRule expectedRule = mock(NewAdHocRule.class);
+ when(ruleMapper.mapRule(rule, TEST_DRIVER, WARNING, WARNING)).thenReturn(expectedRule);
+
+ try (MockedStatic<RulesSeverityDetector> detector = mockStatic(RulesSeverityDetector.class)) {
+ detector.when(() -> RulesSeverityDetector.detectRulesSeverities(run, TEST_DRIVER)).thenReturn(Map.of(RULE_ID, WARNING));
+ detector.when(() -> RulesSeverityDetector.detectRulesSeveritiesForNewTaxonomy(run, TEST_DRIVER)).thenReturn(Map.of(RULE_ID, WARNING));
+
+ RunMapperResult runMapperResult = runMapper.mapRun(run);
+ assertThat(runMapperResult.getNewAdHocRules()).hasSize(1);
+ assertThat(runMapperResult.getNewAdHocRules().get(0)).isEqualTo(expectedRule);
+ }
+ }
+
private NewExternalIssue mockMappedExternalIssue(Result result) {
NewExternalIssue externalIssue = mock(NewExternalIssue.class);
when(result.getRuleId()).thenReturn(RULE_ID);
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/issue/IssuePublisherTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/issue/IssuePublisherTest.java
index 5a124b74214..24ce368bd7e 100644
--- a/sonar-scanner-engine/src/test/java/org/sonar/scanner/issue/IssuePublisherTest.java
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/issue/IssuePublisherTest.java
@@ -19,14 +19,15 @@
*/
package org.sonar.scanner.issue;
-import java.io.IOException;
+import java.io.File;
import java.util.Collections;
import java.util.HashSet;
import java.util.List;
-import org.junit.Before;
-import org.junit.Rule;
-import org.junit.Test;
-import org.junit.rules.TemporaryFolder;
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+import org.junit.jupiter.api.io.TempDir;
+import org.junit.jupiter.params.ParameterizedTest;
+import org.junit.jupiter.params.provider.ValueSource;
import org.junit.runner.RunWith;
import org.mockito.ArgumentCaptor;
import org.mockito.junit.MockitoJUnitRunner;
@@ -65,14 +66,13 @@ import static org.sonar.api.issue.impact.SoftwareQuality.MAINTAINABILITY;
import static org.sonar.api.issue.impact.SoftwareQuality.RELIABILITY;
@RunWith(MockitoJUnitRunner.class)
-public class IssuePublisherTest {
+class IssuePublisherTest {
private static final RuleKey JAVA_RULE_KEY = RuleKey.of("java", "AvoidCycle");
- private static final RuleKey NOSONAR_RULE_KEY = RuleKey.of("java", "NoSonarCheck");
private DefaultInputProject project;
- @Rule
- public TemporaryFolder temp = new TemporaryFolder();
+ @TempDir
+ public File temp;
public IssueFilters filters = mock(IssueFilters.class);
private final ActiveRulesBuilder activeRulesBuilder = new ActiveRulesBuilder();
@@ -80,12 +80,12 @@ public class IssuePublisherTest {
private final DefaultInputFile file = new TestInputFileBuilder("foo", "src/Foo.php").initMetadata("Foo\nBar\nBiz\n").build();
private final ReportPublisher reportPublisher = mock(ReportPublisher.class, RETURNS_DEEP_STUBS);
- @Before
- public void prepare() throws IOException {
+ @BeforeEach
+ void prepare() {
project = new DefaultInputProject(ProjectDefinition.create()
.setKey("foo")
- .setBaseDir(temp.newFolder())
- .setWorkDir(temp.newFolder()));
+ .setBaseDir(temp)
+ .setWorkDir(temp));
activeRulesBuilder.addRule(new NewActiveRule.Builder()
.setRuleKey(JAVA_RULE_KEY)
@@ -96,12 +96,12 @@ public class IssuePublisherTest {
}
@Test
- public void ignore_null_active_rule() {
- RuleKey INACTIVE_RULE_KEY = RuleKey.of("repo", "inactive");
+ void ignore_null_active_rule() {
+ RuleKey inactiveRuleKey = RuleKey.of("repo", "inactive");
initModuleIssues();
DefaultIssue issue = new DefaultIssue(project)
.at(new DefaultIssueLocation().on(file).at(file.selectLine(3)).message("Foo"))
- .forRule(INACTIVE_RULE_KEY);
+ .forRule(inactiveRuleKey);
boolean added = moduleIssues.initAndAddIssue(issue);
assertThat(added).isFalse();
@@ -109,7 +109,7 @@ public class IssuePublisherTest {
}
@Test
- public void ignore_null_rule_of_active_rule() {
+ void ignore_null_rule_of_active_rule() {
initModuleIssues();
DefaultIssue issue = new DefaultIssue(project)
@@ -122,7 +122,7 @@ public class IssuePublisherTest {
}
@Test
- public void add_issue_to_cache() {
+ void add_issue_to_cache() {
initModuleIssues();
final String ruleDescriptionContextKey = "spring";
@@ -156,7 +156,7 @@ public class IssuePublisherTest {
}
@Test
- public void add_issue_flows_to_cache() {
+ void add_issue_flows_to_cache() {
initModuleIssues();
DefaultMessageFormatting messageFormatting = new DefaultMessageFormatting().start(0).end(4).type(CODE);
@@ -198,7 +198,7 @@ public class IssuePublisherTest {
}
@Test
- public void add_external_issue_to_cache() {
+ void add_external_issue_to_cache() {
initModuleIssues();
DefaultExternalIssue issue = new DefaultExternalIssue(project)
@@ -215,7 +215,7 @@ public class IssuePublisherTest {
}
@Test
- public void initAndAddExternalIssue_whenImpactAndCleanCodeAttributeProvided_shouldPopulateReportFields() {
+ void initAndAddExternalIssue_whenImpactAndCleanCodeAttributeProvided_shouldPopulateReportFields() {
initModuleIssues();
DefaultExternalIssue issue = new DefaultExternalIssue(project)
@@ -234,7 +234,7 @@ public class IssuePublisherTest {
}
@Test
- public void dont_store_severity_if_no_severity_override_on_issue() {
+ void dont_store_severity_if_no_severity_override_on_issue() {
initModuleIssues();
DefaultIssue issue = new DefaultIssue(project)
@@ -250,7 +250,7 @@ public class IssuePublisherTest {
}
@Test
- public void filter_issue() {
+ void filter_issue() {
DefaultIssue issue = new DefaultIssue(project)
.at(new DefaultIssueLocation().on(file).at(file.selectLine(3)).message(""))
.forRule(JAVA_RULE_KEY);
@@ -264,7 +264,7 @@ public class IssuePublisherTest {
}
@Test
- public void should_ignore_lines_commented_with_nosonar() {
+ void should_ignore_lines_commented_with_nosonar() {
initModuleIssues();
DefaultIssue issue = new DefaultIssue(project)
@@ -279,11 +279,13 @@ public class IssuePublisherTest {
verifyNoInteractions(reportPublisher);
}
- @Test
- public void should_accept_issues_on_no_sonar_rules() {
+ @ParameterizedTest
+ @ValueSource(strings = {"NoSonarCheck", "S1291", "S1291Check"})
+ void should_accept_issues_on_no_sonar_rules(String noSonarRule) {
+ RuleKey noSonarRuleKey = RuleKey.of("java", noSonarRule);
// The "No Sonar" rule logs violations on the lines that are flagged with "NOSONAR" !!
activeRulesBuilder.addRule(new NewActiveRule.Builder()
- .setRuleKey(NOSONAR_RULE_KEY)
+ .setRuleKey(noSonarRuleKey)
.setSeverity(Severity.INFO)
.setQProfileKey("qp-1")
.build());
@@ -293,7 +295,7 @@ public class IssuePublisherTest {
DefaultIssue issue = new DefaultIssue(project)
.at(new DefaultIssueLocation().on(file).at(file.selectLine(3)).message(""))
- .forRule(NOSONAR_RULE_KEY);
+ .forRule(noSonarRuleKey);
when(filters.accept(any(InputComponent.class), any(ScannerReport.Issue.class), anyString())).thenReturn(true);
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/repository/featureflags/DefaultFeatureFlagsLoaderTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/repository/featureflags/DefaultFeatureFlagsLoaderTest.java
new file mode 100644
index 00000000000..59a73e86f16
--- /dev/null
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/repository/featureflags/DefaultFeatureFlagsLoaderTest.java
@@ -0,0 +1,85 @@
+/*
+ * SonarQube
+ * Copyright (C) 2009-2025 SonarSource SA
+ * mailto:info AT sonarsource DOT com
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 3 of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with this program; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ */
+package org.sonar.scanner.repository.featureflags;
+
+import com.google.gson.Gson;
+import java.io.Reader;
+import java.io.StringReader;
+import java.util.List;
+import java.util.Set;
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+import org.sonar.api.utils.MessageException;
+import org.sonar.scanner.WsTestUtil;
+import org.sonar.scanner.http.DefaultScannerWsClient;
+import org.sonar.scanner.scan.branch.BranchConfiguration;
+import wiremock.org.apache.hc.core5.http.HttpException;
+
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.assertThatException;
+import static org.mockito.ArgumentMatchers.any;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.verifyNoMoreInteractions;
+import static org.mockito.Mockito.when;
+
+class DefaultFeatureFlagsLoaderTest {
+
+ private DefaultFeatureFlagsLoader loader;
+ private DefaultScannerWsClient wsClient;
+
+ @BeforeEach
+ void setUp() {
+ wsClient = mock(DefaultScannerWsClient.class);
+ BranchConfiguration branchConfig = mock(BranchConfiguration.class);
+ when(branchConfig.isPullRequest()).thenReturn(false);
+ loader = new DefaultFeatureFlagsLoader(wsClient);
+ }
+
+ @Test
+ void load_shouldRequestFeatureFlagsAndParseResponse() {
+ WsTestUtil.mockReader(wsClient, "/api/features/list", response());
+
+ Set<String> features = loader.load();
+ assertThat(features).containsExactlyInAnyOrder("feature1", "feature2");
+
+ WsTestUtil.verifyCall(wsClient, "/api/features/list");
+
+ verifyNoMoreInteractions(wsClient);
+ }
+
+ @Test
+ void load_whenHasSomeError_shouldThrowIllegalStateException() {
+ when(wsClient.call(any())).thenThrow(MessageException.of("You're not authorized"));
+
+ assertThatException().isThrownBy(loader::load)
+ .isInstanceOf(IllegalStateException.class)
+ .withMessage("Unable to load feature flags");
+ }
+
+ private Reader response() {
+ return toReader(List.of("feature1", "feature2"));
+ }
+
+ private static Reader toReader(List<String> featureFlags) {
+ String json = new Gson().toJson(featureFlags);
+ return new StringReader(json);
+ }
+
+}
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/repository/featureflags/DefaultFeatureFlagsRepositoryTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/repository/featureflags/DefaultFeatureFlagsRepositoryTest.java
new file mode 100644
index 00000000000..e043fcfdd2f
--- /dev/null
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/repository/featureflags/DefaultFeatureFlagsRepositoryTest.java
@@ -0,0 +1,49 @@
+/*
+ * SonarQube
+ * Copyright (C) 2009-2025 SonarSource SA
+ * mailto:info AT sonarsource DOT com
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 3 of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with this program; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ */
+package org.sonar.scanner.repository.featureflags;
+
+import java.util.Set;
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.when;
+
+class DefaultFeatureFlagsRepositoryTest {
+
+ private DefaultFeatureFlagsRepository underTest;
+
+ @BeforeEach
+ void prepare() {
+ var loader = mock(FeatureFlagsLoader.class);
+ when(loader.load()).thenReturn(Set.of("feature1"));
+ underTest = new DefaultFeatureFlagsRepository(loader);
+ }
+
+ @Test
+ void start_shouldReturnFlagStatus() {
+ underTest.start();
+
+ assertThat(underTest.isEnabled("feature1")).isTrue();
+ assertThat(underTest.isEnabled("feature2")).isFalse();
+ }
+
+}
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/CliCacheServiceTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/CliCacheServiceTest.java
new file mode 100644
index 00000000000..6615ba4e4e4
--- /dev/null
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/CliCacheServiceTest.java
@@ -0,0 +1,307 @@
+/*
+ * SonarQube
+ * Copyright (C) 2009-2025 SonarSource SA
+ * mailto:info AT sonarsource DOT com
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 3 of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with this program; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ */
+package org.sonar.scanner.sca;
+
+import java.io.ByteArrayInputStream;
+import java.io.File;
+import java.io.IOException;
+import java.io.InputStream;
+import java.io.StringReader;
+import java.nio.charset.Charset;
+import java.nio.file.Files;
+import java.nio.file.Path;
+import java.nio.file.StandardCopyOption;
+import org.apache.commons.io.FileUtils;
+import org.apache.commons.lang.SystemUtils;
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+import org.junit.jupiter.api.extension.ExtendWith;
+import org.junit.jupiter.api.extension.RegisterExtension;
+import org.junit.jupiter.api.io.TempDir;
+import org.mockito.Mock;
+import org.mockito.MockedStatic;
+import org.mockito.junit.jupiter.MockitoExtension;
+import org.slf4j.event.Level;
+import org.sonar.api.testfixtures.log.LogTesterJUnit5;
+import org.sonar.api.utils.System2;
+import org.sonar.scanner.WsTestUtil;
+import org.sonar.scanner.bootstrap.SonarUserHome;
+import org.sonar.scanner.http.DefaultScannerWsClient;
+import org.sonar.scanner.repository.TelemetryCache;
+import org.sonarqube.ws.client.HttpException;
+import org.sonarqube.ws.client.WsResponse;
+
+import static java.lang.String.format;
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.assertThatThrownBy;
+import static org.mockito.ArgumentMatchers.any;
+import static org.mockito.ArgumentMatchers.eq;
+import static org.mockito.Mockito.lenient;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.mockStatic;
+import static org.mockito.Mockito.never;
+import static org.mockito.Mockito.reset;
+import static org.mockito.Mockito.verify;
+import static org.mockito.Mockito.when;
+import static org.sonar.scanner.sca.CliCacheService.CLI_WS_URL;
+
+@ExtendWith(MockitoExtension.class)
+class CliCacheServiceTest {
+ @Mock
+ private SonarUserHome sonarUserHome;
+ @Mock
+ private DefaultScannerWsClient scannerWsClient;
+ @Mock
+ private System2 system2;
+ @Mock
+ private TelemetryCache telemetryCache;
+ @RegisterExtension
+ private final LogTesterJUnit5 logTester = new LogTesterJUnit5();
+ @TempDir
+ public Path cacheDir;
+
+ private CliCacheService underTest;
+
+ @BeforeEach
+ void setup() {
+ lenient().when(sonarUserHome.getPath()).thenReturn(cacheDir);
+ lenient().when(telemetryCache.put(any(), any())).thenReturn(telemetryCache);
+
+ underTest = new CliCacheService(sonarUserHome, scannerWsClient, telemetryCache, system2);
+ }
+
+ @Test
+ void cacheCli_shouldDownloadCli_whenCacheDoesNotExist() {
+ String checksum = "checksum";
+ String id = "tidelift";
+ WsTestUtil.mockReader(scannerWsClient, CLI_WS_URL, new StringReader("""
+ [
+ {
+ "id": "%s",
+ "filename": "tidelift_darwin",
+ "sha256": "%s",
+ "os": "mac",
+ "arch": "x64_86"
+ }
+ ]""".formatted(id, checksum)));
+
+ WsTestUtil.mockStream(scannerWsClient, CLI_WS_URL + "/" + id, new ByteArrayInputStream("cli content".getBytes()));
+
+ assertThat(cacheDir).isEmptyDirectory();
+
+ File generatedFile = underTest.cacheCli();
+
+ assertThat(generatedFile).exists().isExecutable();
+ assertThat(cacheDir.resolve("cache").resolve(checksum)).exists().isNotEmptyDirectory();
+
+ verify(telemetryCache).put(eq("scanner.sca.download.cli.duration"), any());
+ verify(telemetryCache).put("scanner.sca.download.cli.success", "true");
+ verify(telemetryCache).put("scanner.sca.get.cli.cache.hit", "false");
+ verify(telemetryCache).put("scanner.sca.get.cli.success", "true");
+ }
+
+ @Test
+ void cacheCli_shouldThrowException_whenMultipleMetadatas() {
+ WsTestUtil.mockReader(scannerWsClient, CLI_WS_URL, new StringReader("""
+ [
+ {
+ "id": "tidelift",
+ "filename": "tidelift_darwin",
+ "sha256": "1",
+ "os": "mac",
+ "arch": "x64_86"
+ },
+ {
+ "id": "tidelift_other",
+ "filename": "tidelift",
+ "sha256": "2",
+ "os": "mac",
+ "arch": "x64_86"
+ }
+ ]"""));
+
+ assertThatThrownBy(underTest::cacheCli).isInstanceOf(IllegalStateException.class)
+ .hasMessageContaining("Multiple CLI matches found. Unable to correctly cache CLI.");
+
+ verify(telemetryCache).put("scanner.sca.get.cli.success", "false");
+
+ }
+
+ @Test
+ void cacheCli_shouldThrowException_whenNoMetadata() {
+ WsTestUtil.mockReader(scannerWsClient, CLI_WS_URL, new StringReader("[]"));
+
+ assertThatThrownBy(underTest::cacheCli).isInstanceOf(IllegalStateException.class)
+ .hasMessageMatching("Could not find CLI for .+ .+");
+
+ verify(telemetryCache).put("scanner.sca.get.cli.success", "false");
+
+ }
+
+ @Test
+ void cacheCli_shouldThrowException_whenServerError() {
+ HttpException http = new HttpException("url", 500, "some error message");
+ IllegalStateException e = new IllegalStateException("http error", http);
+ WsTestUtil.mockException(scannerWsClient, e);
+
+ assertThatThrownBy(underTest::cacheCli).isInstanceOf(IllegalStateException.class)
+ .hasMessageContaining("http error");
+
+ verify(telemetryCache).put("scanner.sca.get.cli.success", "false");
+ }
+
+ @Test
+ void cacheCli_shouldNotOverwrite_whenCachedFileExists() throws IOException {
+ String checksum = "checksum";
+ WsTestUtil.mockReader(scannerWsClient, CLI_WS_URL, new StringReader("""
+ [
+ {
+ "id": "tidelift",
+ "filename": "tidelift_darwin",
+ "sha256": "%s",
+ "os": "mac",
+ "arch": "x64_86"
+ }
+ ]""".formatted(checksum)));
+ when(system2.isOsWindows()).thenReturn(false);
+
+ String fileContent = "test content";
+ File existingFile = underTest.cacheDir().resolve(checksum).resolve("tidelift").toFile();
+ FileUtils.createParentDirectories(existingFile);
+ FileUtils.writeStringToFile(existingFile, fileContent, Charset.defaultCharset());
+
+ assertThat(existingFile).exists();
+ if (!SystemUtils.IS_OS_WINDOWS) {
+ assertThat(existingFile.canExecute()).isFalse();
+ }
+ assertThat(FileUtils.readFileToString(existingFile, Charset.defaultCharset())).isEqualTo(fileContent);
+
+ underTest.cacheCli();
+
+ WsTestUtil.verifyCall(scannerWsClient, CLI_WS_URL);
+ assertThat(existingFile).exists();
+ if (!SystemUtils.IS_OS_WINDOWS) {
+ assertThat(existingFile.canExecute()).isFalse();
+ }
+ assertThat(FileUtils.readFileToString(existingFile, Charset.defaultCharset())).isEqualTo(fileContent);
+
+ verify(telemetryCache).put("scanner.sca.get.cli.cache.hit", "true");
+ verify(telemetryCache).put("scanner.sca.get.cli.success", "true");
+ }
+
+ @Test
+ void cacheCli_shouldAllowLocationOverride(@TempDir Path tempDir) throws IOException {
+ File alternateCliFile = tempDir.resolve("alternate_cli").toFile();
+ FileUtils.writeStringToFile(alternateCliFile, "alternate cli content", Charset.defaultCharset());
+ when(system2.envVariable("TIDELIFT_CLI_LOCATION")).thenReturn(alternateCliFile.getAbsolutePath());
+
+ var returnedFile = underTest.cacheCli();
+
+ assertThat(returnedFile.getAbsolutePath()).isEqualTo(alternateCliFile.getAbsolutePath());
+ assertThat(logTester.logs(Level.INFO)).contains("Using alternate location for Tidelift CLI: " + alternateCliFile.getAbsolutePath());
+ verify(scannerWsClient, never()).call(any());
+ }
+
+ @Test
+ void cacheCli_whenOverrideDoesntExist_shouldRaiseError() {
+ var location = "incorrect_location";
+ when(system2.envVariable("TIDELIFT_CLI_LOCATION")).thenReturn(location);
+
+ assertThatThrownBy(underTest::cacheCli).isInstanceOf(IllegalStateException.class)
+ .hasMessageMatching("Alternate location for Tidelift CLI has been set but no file was found at " + location);
+
+ assertThat(logTester.logs(Level.INFO)).contains("Using alternate location for Tidelift CLI: " + location);
+ verify(scannerWsClient, never()).call(any());
+ }
+
+ @Test
+ void apiOsName_shouldReturnApiCompatibleName() {
+ when(system2.isOsWindows()).thenReturn(true);
+ when(system2.isOsMac()).thenReturn(false);
+ assertThat(underTest.apiOsName()).isEqualTo("windows");
+ reset(system2);
+
+ when(system2.isOsWindows()).thenReturn(false);
+ when(system2.isOsMac()).thenReturn(true);
+ assertThat(underTest.apiOsName()).isEqualTo("mac");
+
+ reset(system2);
+ when(system2.isOsWindows()).thenReturn(false);
+ when(system2.isOsMac()).thenReturn(false);
+ assertThat(underTest.apiOsName()).isEqualTo("linux");
+ }
+
+ @Test
+ void createTempDir_shouldReturnExistingDir() throws IOException {
+ Path dir = sonarUserHome.getPath().resolve("_tmp");
+ Files.createDirectory(dir);
+
+ assertThat(underTest.createTempDir()).isEqualTo(dir);
+ }
+
+ @Test
+ void createTempDir_shouldHandleIOException() {
+ try (MockedStatic<Files> mockFilesClass = mockStatic(Files.class)) {
+ mockFilesClass.when(() -> Files.createDirectory(any(Path.class))).thenThrow(IOException.class);
+
+ Path expectedDir = sonarUserHome.getPath().resolve("_tmp");
+ assertThatThrownBy(underTest::createTempDir).isInstanceOf(IllegalStateException.class)
+ .hasMessageContaining(format("Unable to create temp directory at %s", expectedDir));
+ }
+ }
+
+ @Test
+ void moveFile_shouldHandleIOException(@TempDir Path sourceFile, @TempDir Path targetFile) {
+ try (MockedStatic<Files> mockFilesClass = mockStatic(Files.class)) {
+ mockFilesClass.when(() -> Files.move(sourceFile, targetFile, StandardCopyOption.ATOMIC_MOVE)).thenThrow(IOException.class);
+ mockFilesClass.when(() -> Files.move(sourceFile, targetFile)).thenThrow(IOException.class);
+
+ assertThatThrownBy(() -> CliCacheService.moveFile(sourceFile, targetFile)).isInstanceOf(IllegalStateException.class)
+ .hasMessageContaining(format("Fail to move %s to %s", sourceFile, targetFile));
+
+ assertThat(logTester.logs(Level.WARN)).contains(format("Unable to rename %s to %s", sourceFile, targetFile));
+ assertThat(logTester.logs(Level.WARN)).contains("A copy/delete will be tempted but with no guarantee of atomicity");
+ }
+ }
+
+ @Test
+ void mkdir_shouldHandleIOException(@TempDir Path dir) {
+ try (MockedStatic<Files> mockFilesClass = mockStatic(Files.class)) {
+ mockFilesClass.when(() -> Files.createDirectories(dir)).thenThrow(IOException.class);
+
+ assertThatThrownBy(() -> CliCacheService.mkdir(dir)).isInstanceOf(IllegalStateException.class)
+ .hasMessageContaining(format("Fail to create cache directory: %s", dir));
+ }
+ }
+
+ @Test
+ void downloadBinaryTo_shouldHandleIOException(@TempDir Path downloadLocation) {
+ WsResponse mockResponse = mock(WsResponse.class);
+ InputStream mockStream = mock(InputStream.class);
+ when(mockResponse.contentStream()).thenReturn(mockStream);
+
+ try (MockedStatic<FileUtils> mockFileUtils = mockStatic(FileUtils.class)) {
+ mockFileUtils.when(() -> FileUtils.copyInputStreamToFile(mockStream, downloadLocation.toFile())).thenThrow(IOException.class);
+
+ assertThatThrownBy(() -> CliCacheService.downloadBinaryTo(downloadLocation, mockResponse)).isInstanceOf(IllegalStateException.class)
+ .hasMessageContaining(format("Fail to download SCA CLI into %s", downloadLocation));
+ }
+ }
+}
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/CliServiceTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/CliServiceTest.java
new file mode 100644
index 00000000000..33cf6c146e6
--- /dev/null
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/CliServiceTest.java
@@ -0,0 +1,376 @@
+/*
+ * SonarQube
+ * Copyright (C) 2009-2025 SonarSource SA
+ * mailto:info AT sonarsource DOT com
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 3 of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with this program; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ */
+package org.sonar.scanner.sca;
+
+import java.io.File;
+import java.io.IOException;
+import java.net.URISyntaxException;
+import java.net.URL;
+import java.nio.file.Files;
+import java.nio.file.Path;
+import java.util.List;
+import java.util.Map;
+import org.apache.commons.lang3.SystemUtils;
+import org.junit.jupiter.api.AfterEach;
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+import org.junit.jupiter.api.extension.RegisterExtension;
+import org.junit.jupiter.api.io.TempDir;
+import org.mockito.MockedStatic;
+import org.sonar.api.batch.bootstrap.ProjectDefinition;
+import org.sonar.api.batch.fs.InputFile;
+import org.sonar.api.batch.fs.internal.DefaultInputModule;
+import org.sonar.api.batch.scm.ScmProvider;
+import org.sonar.api.platform.Server;
+import org.sonar.api.testfixtures.log.LogTesterJUnit5;
+import org.sonar.api.utils.System2;
+import org.sonar.core.util.ProcessWrapperFactory;
+import org.sonar.scanner.config.DefaultConfiguration;
+import org.sonar.scanner.repository.TelemetryCache;
+import org.sonar.scanner.scan.filesystem.ProjectExclusionFilters;
+import org.sonar.scanner.scm.ScmConfiguration;
+import org.sonar.scm.git.GitScmProvider;
+import org.sonar.scm.git.JGitUtils;
+
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.mockito.ArgumentMatchers.any;
+import static org.mockito.Mockito.CALLS_REAL_METHODS;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.when;
+import static org.slf4j.event.Level.DEBUG;
+import static org.slf4j.event.Level.INFO;
+
+class CliServiceTest {
+ private TelemetryCache telemetryCache;
+ private DefaultInputModule rootInputModule;
+ private final Server server = mock(Server.class);
+ @RegisterExtension
+ private final LogTesterJUnit5 logTester = new LogTesterJUnit5();
+ @TempDir
+ Path rootModuleDir;
+ private final ScmConfiguration scmConfiguration = mock(ScmConfiguration.class);
+ private final ScmProvider scmProvider = mock(GitScmProvider.class);
+ ProcessWrapperFactory processWrapperFactory = mock(ProcessWrapperFactory.class, CALLS_REAL_METHODS);
+ private MockedStatic<JGitUtils> jGitUtilsMock;
+ DefaultConfiguration configuration = mock(DefaultConfiguration.class);
+ ProjectExclusionFilters projectExclusionFilters = mock(ProjectExclusionFilters.class);
+
+ private CliService underTest;
+
+ @BeforeEach
+ void setup() throws IOException {
+ telemetryCache = new TelemetryCache();
+ Path workDir = rootModuleDir.resolve(".scannerwork");
+ Files.createDirectories(workDir);
+ rootInputModule = new DefaultInputModule(
+ ProjectDefinition.create().setBaseDir(rootModuleDir.toFile()).setWorkDir(workDir.toFile()));
+ when(scmConfiguration.provider()).thenReturn(scmProvider);
+ when(scmProvider.key()).thenReturn("git");
+ when(scmConfiguration.isExclusionDisabled()).thenReturn(false);
+ jGitUtilsMock = org.mockito.Mockito.mockStatic(JGitUtils.class);
+ jGitUtilsMock.when(() -> JGitUtils.getAllIgnoredPaths(any(Path.class))).thenReturn(List.of("ignored.txt"));
+ when(server.getVersion()).thenReturn("1.0.0");
+ logTester.setLevel(INFO);
+ when(projectExclusionFilters.getExclusionsConfig(InputFile.Type.MAIN)).thenReturn(new String[0]);
+ when(configuration.getStringArray(CliService.SCA_EXCLUSIONS_KEY)).thenReturn(new String[0]);
+ when(configuration.getStringArray(CliService.LEGACY_SCA_EXCLUSIONS_KEY)).thenReturn(new String[0]);
+
+ underTest = new CliService(processWrapperFactory, telemetryCache, System2.INSTANCE, server, scmConfiguration, projectExclusionFilters);
+ }
+
+ @AfterEach
+ void teardown() {
+ if (jGitUtilsMock != null) {
+ jGitUtilsMock.close();
+ }
+ }
+
+ @Test
+ void generateManifestsArchive_shouldCallProcessCorrectly_andRegisterTelemetry() throws IOException, URISyntaxException {
+ assertThat(rootModuleDir.resolve("test_file").toFile().createNewFile()).isTrue();
+
+ when(configuration.getProperties()).thenReturn(Map.of(CliService.SCA_EXCLUSIONS_KEY, "foo,bar,baz/**"));
+ when(configuration.getStringArray(CliService.SCA_EXCLUSIONS_KEY)).thenReturn(new String[] {"foo", "bar", "baz/**"});
+
+ File producedArchive = underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ assertThat(producedArchive).exists();
+
+ var expectedArguments = List.of(
+ "projects",
+ "save-lockfiles",
+ "--xz",
+ "--xz-filename",
+ rootInputModule.getWorkDir().resolve("dependency-files.tar.xz").toString(),
+ "--directory",
+ rootInputModule.getBaseDir().toString(),
+ "--recursive",
+ "--exclude",
+ "foo,bar,baz/**,ignored.txt,.scannerwork/**");
+
+ assertThat(logTester.logs(INFO))
+ .contains("Arguments Passed In: " + String.join(" ", expectedArguments))
+ .contains("TIDELIFT_SKIP_UPDATE_CHECK=1")
+ .contains("TIDELIFT_ALLOW_MANIFEST_FAILURES=1")
+ .contains("Generated manifests archive file: " + producedArchive.getName());
+
+ assertThat(telemetryCache.getAll()).containsKey("scanner.sca.execution.cli.duration").isNotNull();
+ assertThat(telemetryCache.getAll()).containsEntry("scanner.sca.execution.cli.success", "true");
+ }
+
+ @Test
+ void generateManifestsArchive_whenDebugLogLevelAndScaDebugNotEnabled_shouldWriteDebugLogsToDebugStream() throws IOException, URISyntaxException {
+ logTester.setLevel(DEBUG);
+
+ assertThat(rootModuleDir.resolve("test_file").toFile().createNewFile()).isTrue();
+
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ var expectedArguments = List.of(
+ "projects",
+ "save-lockfiles",
+ "--xz",
+ "--xz-filename",
+ rootInputModule.getWorkDir().resolve("dependency-files.tar.xz").toString(),
+ "--directory",
+ rootInputModule.getBaseDir().toString(),
+ "--recursive",
+ "--exclude",
+ "ignored.txt,.scannerwork/**",
+ "--debug");
+
+ assertThat(logTester.logs(INFO))
+ .contains("Arguments Passed In: " + String.join(" ", expectedArguments));
+ }
+
+ @Test
+ void generateManifestsArchive_whenScaDebugEnabled_shouldWriteDebugLogsToInfoStream() throws IOException, URISyntaxException {
+ assertThat(rootModuleDir.resolve("test_file").toFile().createNewFile()).isTrue();
+
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ var expectedArguments = List.of(
+ "projects",
+ "save-lockfiles",
+ "--xz",
+ "--xz-filename",
+ rootInputModule.getWorkDir().resolve("dependency-files.tar.xz").toString(),
+ "--directory",
+ rootInputModule.getBaseDir().toString(),
+ "--recursive",
+ "--exclude",
+ "ignored.txt,.scannerwork/**");
+
+ assertThat(logTester.logs(INFO))
+ .contains("Arguments Passed In: " + String.join(" ", expectedArguments));
+ }
+
+ @Test
+ void generateManifestsArchive_shouldSendSQEnvVars() throws IOException, URISyntaxException {
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ assertThat(logTester.logs(INFO))
+ .contains("TIDELIFT_CLI_INSIDE_SCANNER_ENGINE=1")
+ .contains("TIDELIFT_CLI_SQ_SERVER_VERSION=1.0.0");
+ }
+
+ @Test
+ void generateManifestsArchive_includesIgnoredPathsFromGitProvider() throws Exception {
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ var expectedArguments = List.of(
+ "projects",
+ "save-lockfiles",
+ "--xz",
+ "--xz-filename",
+ rootInputModule.getWorkDir().resolve("dependency-files.tar.xz").toString(),
+ "--directory",
+ rootInputModule.getBaseDir().toString(),
+ "--recursive",
+ "--exclude",
+ "ignored.txt,.scannerwork/**");
+
+ assertThat(logTester.logs(INFO))
+ .contains("Arguments Passed In: " + String.join(" ", expectedArguments))
+ .contains("TIDELIFT_SKIP_UPDATE_CHECK=1")
+ .contains("TIDELIFT_ALLOW_MANIFEST_FAILURES=1")
+ .contains("TIDELIFT_CLI_INSIDE_SCANNER_ENGINE=1")
+ .contains("TIDELIFT_CLI_SQ_SERVER_VERSION=1.0.0");
+
+ }
+
+ @Test
+ void generateManifestsArchive_withNoScm_doesNotIncludeScmIgnoredPaths() throws Exception {
+ when(scmConfiguration.provider()).thenReturn(null);
+
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ String capturedArgs = logTester.logs().stream().filter(log -> log.contains("Arguments Passed In:")).findFirst().get();
+ assertThat(capturedArgs).contains("--exclude .scannerwork/**");
+ }
+
+ @Test
+ void generateManifestsArchive_withNonGit_doesNotIncludeScmIgnoredPaths() throws Exception {
+ when(scmProvider.key()).thenReturn("notgit");
+
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ String capturedArgs = logTester.logs().stream().filter(log -> log.contains("Arguments Passed In:")).findFirst().get();
+ assertThat(capturedArgs).contains("--exclude .scannerwork/**");
+ }
+
+ @Test
+ void generateManifestsArchive_withScmExclusionDisabled_doesNotIncludeScmIgnoredPaths() throws Exception {
+ when(scmConfiguration.isExclusionDisabled()).thenReturn(true);
+
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ String capturedArgs = logTester.logs().stream().filter(log -> log.contains("Arguments Passed In:")).findFirst().get();
+ assertThat(capturedArgs).contains("--exclude .scannerwork/**");
+ }
+
+ @Test
+ void generateManifestsArchive_withNoScmIgnores_doesNotIncludeScmIgnoredPaths() throws Exception {
+ jGitUtilsMock.when(() -> JGitUtils.getAllIgnoredPaths(any(Path.class))).thenReturn(List.of());
+
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ String capturedArgs = logTester.logs().stream().filter(log -> log.contains("Arguments Passed In:")).findFirst().get();
+ assertThat(capturedArgs).contains("--exclude .scannerwork/**");
+ }
+
+ @Test
+ void generateManifestsArchive_withExcludedManifests_appendsScmIgnoredPaths() throws Exception {
+ when(configuration.getStringArray(CliService.SCA_EXCLUSIONS_KEY)).thenReturn(new String[] {"**/test/**"});
+
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ String capturedArgs = logTester.logs().stream().filter(log -> log.contains("Arguments Passed In:")).findFirst().get();
+ assertThat(capturedArgs).contains("--exclude **/test/**,ignored.txt,.scannerwork/**");
+ }
+
+ @Test
+ void generateManifestsArchive_withExcludedManifestsContainingBadCharacters_handlesTheBadCharacters() throws Exception {
+ when(configuration.getStringArray(CliService.SCA_EXCLUSIONS_KEY)).thenReturn(new String[] {
+ "**/test/**", "**/path with spaces/**", "**/path'with'quotes/**", "**/path\"with\"double\"quotes/**"});
+
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ String capturedArgs = logTester.logs().stream().filter(log -> log.contains("Arguments Passed In:")).findFirst().get();
+
+ String expectedExcludeFlag = """
+ --exclude **/test/**,**/path with spaces/**,**/path'with'quotes/**,"**/path""with""double""quotes/**",ignored.txt
+ """.strip();
+ if (SystemUtils.IS_OS_WINDOWS) {
+ expectedExcludeFlag = """
+ --exclude "**/test/**,**/path with spaces/**,**/path'with'quotes/**,"**/path""with""double""quotes/**",ignored.txt
+ """.strip();
+ }
+ assertThat(capturedArgs).contains(expectedExcludeFlag);
+ }
+
+ @Test
+ void generateManifestsArchive_withExcludedManifestsContainingDupes_dedupes() throws Exception {
+ when(configuration.getStringArray(CliService.SCA_EXCLUSIONS_KEY)).thenReturn(new String[] {"**/test1/**", "**/test2/**", "**/test1/**"});
+ when(configuration.getStringArray(CliService.LEGACY_SCA_EXCLUSIONS_KEY)).thenReturn(new String[] {"**/test1/**", "**/test3/**"});
+
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ String capturedArgs = logTester.logs().stream().filter(log -> log.contains("Arguments Passed In:")).findFirst().get();
+ assertThat(capturedArgs).contains("--exclude **/test1/**,**/test2/**,**/test3/**,ignored.txt,.scannerwork/**");
+ }
+
+ @Test
+ void generateManifestsArchive_withExcludedManifestsAndSonarExcludesContainingDupes_mergesAndDedupes() throws Exception {
+ when(projectExclusionFilters.getExclusionsConfig(InputFile.Type.MAIN)).thenReturn(new String[] {"**/test1/**", "**/test4/**"});
+ when(configuration.getStringArray(CliService.SCA_EXCLUSIONS_KEY)).thenReturn(new String[] {"**/test1/**", "**/test2/**", "**/test1/**"});
+ when(configuration.getStringArray(CliService.LEGACY_SCA_EXCLUSIONS_KEY)).thenReturn(new String[] {"**/test1/**", "**/test3/**"});
+
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ String capturedArgs = logTester.logs().stream().filter(log -> log.contains("Arguments Passed In:")).findFirst().get();
+ assertThat(capturedArgs).contains("--exclude **/test1/**,**/test4/**,**/test2/**,**/test3/**,ignored.txt,.scannerwork/**");
+ }
+
+ @Test
+ void generateManifestsArchive_withScmIgnoresContainingBadCharacters_handlesTheBadCharacters() throws Exception {
+ jGitUtilsMock.when(() -> JGitUtils.getAllIgnoredPaths(any(Path.class)))
+ .thenReturn(List.of("**/test/**", "**/path with spaces/**", "**/path'with'quotes/**", "**/path\"with\"double\"quotes/**"));
+
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ String capturedArgs = logTester.logs().stream().filter(log -> log.contains("Arguments Passed In:")).findFirst().get();
+
+ String expectedExcludeFlag = """
+ --exclude **/test/**,**/path with spaces/**,**/path'with'quotes/**,"**/path""with""double""quotes/**"
+ """.strip();
+ if (SystemUtils.IS_OS_WINDOWS) {
+ expectedExcludeFlag = """
+ --exclude "**/test/**,**/path with spaces/**,**/path'with'quotes/**,"**/path""with""double""quotes/**"
+ """.strip();
+ }
+ assertThat(capturedArgs).contains(expectedExcludeFlag);
+ }
+
+ @Test
+ void generateManifestsArchive_withIgnoredDirectories_GlobifiesDirectories() throws Exception {
+ String ignoredDirectory = "directory1";
+ Files.createDirectories(rootModuleDir.resolve(ignoredDirectory));
+ String ignoredFile = "directory2/file.txt";
+ Path ignoredFilePath = rootModuleDir.resolve(ignoredFile);
+ Files.createDirectories(ignoredFilePath.getParent());
+ Files.createFile(ignoredFilePath);
+
+ jGitUtilsMock.when(() -> JGitUtils.getAllIgnoredPaths(any(Path.class))).thenReturn(List.of(ignoredDirectory, ignoredFile));
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+
+ String capturedArgs = logTester.logs().stream().filter(log -> log.contains("Arguments Passed In:")).findFirst().get();
+ assertThat(capturedArgs).contains("--exclude directory1/**,directory2/file.txt");
+ }
+
+ @Test
+ void generateManifestsArchive_withExternalWorkDir_DoesNotExcludeWorkingDir() throws URISyntaxException, IOException {
+ Path externalWorkDir = Files.createTempDirectory("externalWorkDir");
+ try {
+ rootInputModule = new DefaultInputModule(ProjectDefinition.create().setBaseDir(rootModuleDir.toFile()).setWorkDir(externalWorkDir.toFile()));
+ underTest.generateManifestsArchive(rootInputModule, scriptDir(), configuration);
+ String capturedArgs = logTester.logs().stream().filter(log -> log.contains("Arguments Passed In:")).findFirst().get();
+
+ // externalWorkDir is not present in the exclude flag
+ assertThat(capturedArgs).contains("--exclude ignored.txt");
+ } finally {
+ externalWorkDir.toFile().delete();
+ }
+ }
+
+ private URL scriptUrl() {
+ // There is a custom test Bash script available in src/test/resources/org/sonar/scanner/sca that
+ // will serve as our "CLI". This script will output some messages about what arguments were passed
+ // to it and will try to generate an archive file in the location the process specifies. This allows us
+ // to simulate a real CLI call without needing an OS specific CLI executable to run on a real project.
+ URL scriptUrl = CliServiceTest.class.getResource(SystemUtils.IS_OS_WINDOWS ? "echo_args.bat" : "echo_args.sh");
+ assertThat(scriptUrl).isNotNull();
+ return scriptUrl;
+ }
+
+ private File scriptDir() throws URISyntaxException {
+ return new File(scriptUrl().toURI());
+ }
+}
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/ScaExecutorTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/ScaExecutorTest.java
new file mode 100644
index 00000000000..ebe6007a1c1
--- /dev/null
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/ScaExecutorTest.java
@@ -0,0 +1,180 @@
+/*
+ * SonarQube
+ * Copyright (C) 2009-2025 SonarSource SA
+ * mailto:info AT sonarsource DOT com
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 3 of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with this program; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ */
+package org.sonar.scanner.sca;
+
+import java.io.File;
+import java.io.IOException;
+import java.util.Optional;
+import org.assertj.core.util.Files;
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+import org.junit.jupiter.api.extension.RegisterExtension;
+import org.junit.jupiter.api.io.TempDir;
+import org.slf4j.event.Level;
+import org.sonar.api.batch.bootstrap.ProjectDefinition;
+import org.sonar.api.batch.fs.internal.DefaultInputModule;
+import org.sonar.api.testfixtures.log.LogTesterJUnit5;
+import org.sonar.scanner.config.DefaultConfiguration;
+import org.sonar.scanner.protocol.output.ScannerReportWriter;
+import org.sonar.scanner.report.ReportPublisher;
+import org.sonar.scanner.repository.featureflags.FeatureFlagsRepository;
+
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.mockito.Mockito.doThrow;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.never;
+import static org.mockito.Mockito.verify;
+import static org.mockito.Mockito.verifyNoInteractions;
+import static org.mockito.Mockito.when;
+
+class ScaExecutorTest {
+ private final CliService cliService = mock(CliService.class);
+ private final CliCacheService cliCacheService = mock(CliCacheService.class);
+ private final ReportPublisher reportPublisher = mock(ReportPublisher.class);
+ private final FeatureFlagsRepository featureFlagsRepository = mock(FeatureFlagsRepository.class);
+ private final DefaultConfiguration configuration = mock(DefaultConfiguration.class);
+ @RegisterExtension
+ private final LogTesterJUnit5 logTester = new LogTesterJUnit5();
+ private final ScaExecutor underTest = new ScaExecutor(cliCacheService, cliService, reportPublisher, featureFlagsRepository, configuration);
+ @TempDir
+ File rootModuleDir;
+ private DefaultInputModule root;
+
+ @BeforeEach
+ void before() {
+ when(featureFlagsRepository.isEnabled("sca")).thenReturn(true);
+ root = new DefaultInputModule(
+ ProjectDefinition.create().setBaseDir(rootModuleDir).setWorkDir(rootModuleDir.toPath().getRoot().toFile()));
+ }
+
+ @Test
+ void execute_shouldCallCliAndPublisher() throws IOException {
+ File mockCliFile = Files.newTemporaryFile();
+ File mockManifestZip = Files.newTemporaryFile();
+ ScannerReportWriter mockReportWriter = mock(ScannerReportWriter.class);
+ when(cliCacheService.cacheCli()).thenReturn(mockCliFile);
+ when(cliService.generateManifestsArchive(root, mockCliFile, configuration)).thenReturn(mockManifestZip);
+ when(reportPublisher.getWriter()).thenReturn(mockReportWriter);
+
+ logTester.setLevel(Level.DEBUG);
+
+ underTest.execute(root);
+
+ verify(cliService).generateManifestsArchive(root, mockCliFile, configuration);
+ verify(mockReportWriter).writeScaFile(mockManifestZip);
+ assertThat(logTester.logs(Level.DEBUG)).contains("Zip ready for report: " + mockManifestZip);
+ assertThat(logTester.logs(Level.DEBUG)).contains("Manifest zip written to report");
+ }
+
+ @Test
+ void execute_whenIOException_shouldHandleException() throws IOException {
+ File mockCliFile = Files.newTemporaryFile();
+ when(cliCacheService.cacheCli()).thenReturn(mockCliFile);
+ doThrow(IOException.class).when(cliService).generateManifestsArchive(root, mockCliFile, configuration);
+
+ logTester.setLevel(Level.INFO);
+
+ underTest.execute(root);
+
+ verify(cliService).generateManifestsArchive(root, mockCliFile, configuration);
+ assertThat(logTester.logs(Level.ERROR)).contains("Error gathering manifests");
+ }
+
+ @Test
+ void execute_whenIllegalStateException_shouldHandleException() throws IOException {
+ File mockCliFile = Files.newTemporaryFile();
+ when(cliCacheService.cacheCli()).thenReturn(mockCliFile);
+ doThrow(IllegalStateException.class).when(cliService).generateManifestsArchive(root, mockCliFile, configuration);
+
+ logTester.setLevel(Level.INFO);
+
+ underTest.execute(root);
+
+ verify(cliService).generateManifestsArchive(root, mockCliFile, configuration);
+ assertThat(logTester.logs(Level.ERROR)).contains("Error gathering manifests");
+ }
+
+ @Test
+ void execute_whenNoCliFound_shouldSkipAnalysis() throws IOException {
+ File mockCliFile = new File("");
+ when(cliCacheService.cacheCli()).thenReturn(mockCliFile);
+
+ underTest.execute(root);
+
+ verify(cliService, never()).generateManifestsArchive(root, mockCliFile, configuration);
+ }
+
+ @Test
+ void execute_whenGlobalFeatureDisabled_skips() {
+ when(featureFlagsRepository.isEnabled("sca")).thenReturn(false);
+ logTester.setLevel(Level.DEBUG);
+
+ underTest.execute(root);
+
+ assertThat(logTester.logs()).contains("Dependency analysis skipped");
+ verifyNoInteractions(cliService, cliCacheService);
+ }
+
+ @Test
+ void execute_whenProjectPropertyDisabled_skips() {
+ when(configuration.getBoolean("sonar.sca.enabled")).thenReturn(Optional.of(false));
+ logTester.setLevel(Level.DEBUG);
+
+ underTest.execute(root);
+
+ assertThat(logTester.logs()).contains("Dependency analysis disabled for this project");
+ verifyNoInteractions(cliService, cliCacheService);
+ }
+
+ @Test
+ void execute_whenProjectPropertyExplicitlyEnabled_CallsCli() throws IOException {
+ when(configuration.getBoolean("sonar.sca.enabled")).thenReturn(Optional.of(true));
+ File mockCliFile = Files.newTemporaryFile();
+ File mockManifestZip = Files.newTemporaryFile();
+ ScannerReportWriter mockReportWriter = mock(ScannerReportWriter.class);
+ when(cliCacheService.cacheCli()).thenReturn(mockCliFile);
+ when(cliService.generateManifestsArchive(root, mockCliFile, configuration)).thenReturn(mockManifestZip);
+ when(reportPublisher.getWriter()).thenReturn(mockReportWriter);
+ logTester.setLevel(Level.DEBUG);
+
+ underTest.execute(root);
+
+ verify(cliService).generateManifestsArchive(root, mockCliFile, configuration);
+ verify(mockReportWriter).writeScaFile(mockManifestZip);
+ assertThat(logTester.logs(Level.DEBUG)).contains("Zip ready for report: " + mockManifestZip);
+ assertThat(logTester.logs(Level.DEBUG)).contains("Manifest zip written to report");
+ }
+
+ @Test
+ void execute_printsRuntime() throws IOException {
+ File mockCliFile = Files.newTemporaryFile();
+ File mockManifestZip = Files.newTemporaryFile();
+ ScannerReportWriter mockReportWriter = mock(ScannerReportWriter.class);
+ when(cliCacheService.cacheCli()).thenReturn(mockCliFile);
+ when(cliService.generateManifestsArchive(root, mockCliFile, configuration)).thenReturn(mockManifestZip);
+ when(reportPublisher.getWriter()).thenReturn(mockReportWriter);
+
+ logTester.setLevel(Level.INFO);
+
+ underTest.execute(root);
+
+ assertThat(logTester.logs(Level.INFO)).anyMatch(l -> l.matches("Load SCA project dependencies \\(done\\) \\| time=\\d+ms"));
+ }
+}
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/ScaPropertiesTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/ScaPropertiesTest.java
new file mode 100644
index 00000000000..70e7a6b6e53
--- /dev/null
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sca/ScaPropertiesTest.java
@@ -0,0 +1,100 @@
+/*
+ * SonarQube
+ * Copyright (C) 2009-2025 SonarSource SA
+ * mailto:info AT sonarsource DOT com
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 3 of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with this program; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ */
+package org.sonar.scanner.sca;
+
+import java.util.HashMap;
+import java.util.Map;
+import java.util.Optional;
+import org.junit.jupiter.api.Test;
+import org.sonar.scanner.config.DefaultConfiguration;
+
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.mockito.ArgumentMatchers.anyString;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.when;
+
+class ScaPropertiesTest {
+ private final DefaultConfiguration configuration = mock(DefaultConfiguration.class);
+
+ @Test
+ void buildFromScannerProperties_withNoProperties_returnsEmptyMap() {
+ when(configuration.get(anyString())).thenReturn(Optional.empty());
+
+ var result = ScaProperties.buildFromScannerProperties(configuration);
+
+ assertThat(result).isEqualTo(Map.of());
+ }
+
+ @Test
+ void buildFromScannerProperties_withUnmappedProperties_ignoresProperties() {
+ var inputProperties = new HashMap<String, String>();
+ inputProperties.put("sonar.sca.pythonBinary", "/usr/bin/python3");
+ inputProperties.put("sonar.sca.unknownProperty", "value");
+ inputProperties.put("sonar.somethingElse", "dont-include-non-sca");
+ inputProperties.put("sonar.sca.recursiveManifestSearch", "ignore-me");
+ when(configuration.getProperties()).thenReturn(inputProperties);
+ when(configuration.get(anyString())).thenAnswer(i -> Optional.ofNullable(inputProperties.get(i.getArgument(0, String.class))));
+
+ var result = ScaProperties.buildFromScannerProperties(configuration);
+
+ assertThat(result).containsExactly(
+ Map.entry("TIDELIFT_PYTHON_BINARY", "/usr/bin/python3"),
+ Map.entry("TIDELIFT_UNKNOWN_PROPERTY", "value"));
+ }
+
+ @Test
+ void buildFromScannerProperties_withLotsOfProperties_mapsAllProperties() {
+ var inputProperties = new HashMap<String, String>();
+ inputProperties.put("sonar.sca.goNoResolve", "true");
+ inputProperties.put("sonar.sca.gradleConfigurationPattern", "pattern");
+ inputProperties.put("sonar.sca.gradleNoResolve", "false");
+ inputProperties.put("sonar.sca.mavenForceDepPlugin", "plugin");
+ inputProperties.put("sonar.sca.mavenNoResolve", "true");
+ inputProperties.put("sonar.sca.mavenIgnoreWrapper", "false");
+ inputProperties.put("sonar.sca.mavenOptions", "-DskipTests");
+ inputProperties.put("sonar.sca.npmEnableScripts", "true");
+ inputProperties.put("sonar.sca.npmNoResolve", "true");
+ inputProperties.put("sonar.sca.nugetNoResolve", "false");
+ inputProperties.put("sonar.sca.pythonBinary", "/usr/bin/python3");
+ inputProperties.put("sonar.sca.pythonNoResolve", "true");
+ inputProperties.put("sonar.sca.pythonResolveLocal", "false");
+ when(configuration.getProperties()).thenReturn(inputProperties);
+ when(configuration.get(anyString())).thenAnswer(i -> Optional.ofNullable(inputProperties.get(i.getArgument(0, String.class))));
+
+ var expectedProperties = new HashMap<String, String>();
+ expectedProperties.put("TIDELIFT_GO_NO_RESOLVE", "true");
+ expectedProperties.put("TIDELIFT_GRADLE_CONFIGURATION_PATTERN", "pattern");
+ expectedProperties.put("TIDELIFT_GRADLE_NO_RESOLVE", "false");
+ expectedProperties.put("TIDELIFT_MAVEN_FORCE_DEP_PLUGIN", "plugin");
+ expectedProperties.put("TIDELIFT_MAVEN_NO_RESOLVE", "true");
+ expectedProperties.put("TIDELIFT_MAVEN_IGNORE_WRAPPER", "false");
+ expectedProperties.put("TIDELIFT_MAVEN_OPTIONS", "-DskipTests");
+ expectedProperties.put("TIDELIFT_NPM_ENABLE_SCRIPTS", "true");
+ expectedProperties.put("TIDELIFT_NPM_NO_RESOLVE", "true");
+ expectedProperties.put("TIDELIFT_NUGET_NO_RESOLVE", "false");
+ expectedProperties.put("TIDELIFT_PYTHON_BINARY", "/usr/bin/python3");
+ expectedProperties.put("TIDELIFT_PYTHON_NO_RESOLVE", "true");
+ expectedProperties.put("TIDELIFT_PYTHON_RESOLVE_LOCAL", "false");
+
+ var result = ScaProperties.buildFromScannerProperties(configuration);
+
+ assertThat(result).containsExactlyInAnyOrderEntriesOf(expectedProperties);
+ }
+}
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/ProjectConfigurationProviderTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/ProjectConfigurationProviderTest.java
index 21dcf58b114..3e3066e76e2 100644
--- a/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/ProjectConfigurationProviderTest.java
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/ProjectConfigurationProviderTest.java
@@ -52,10 +52,9 @@ public class ProjectConfigurationProviderTest {
private static final Map<String, String> PROJECT_SERVER_PROPERTIES = Map.of(NON_GLOBAL_KEY_PROPERTIES_1, NON_GLOBAL_VALUE_PROPERTIES_1);
private static final Map<String, String> DEFAULT_PROJECT_PROPERTIES = Map.of(DEFAULT_KEY_PROPERTIES_1, DEFAULT_VALUE_1);
- private static final Map<String, String> ALL_PROPERTIES_MAP =
- Stream.of(GLOBAL_SERVER_PROPERTIES, PROJECT_SERVER_PROPERTIES, DEFAULT_PROJECT_PROPERTIES)
- .flatMap(map -> map.entrySet().stream())
- .collect(Collectors.toMap(Map.Entry::getKey, Map.Entry::getValue));
+ private static final Map<String, String> ALL_PROPERTIES_MAP = Stream.of(GLOBAL_SERVER_PROPERTIES, PROJECT_SERVER_PROPERTIES, DEFAULT_PROJECT_PROPERTIES)
+ .flatMap(map -> map.entrySet().stream())
+ .collect(Collectors.toMap(Map.Entry::getKey, Map.Entry::getValue));
private static final Map<String, String> PROPERTIES_AFTER_FILTERING = Map.of("aKey", "aValue");
@@ -66,8 +65,6 @@ public class ProjectConfigurationProviderTest {
@Mock
private GlobalConfiguration globalConfiguration;
@Mock
- private MutableProjectSettings mutableProjectSettings;
- @Mock
private DefaultInputProject defaultInputProject;
@Mock
private SonarGlobalPropertiesFilter sonarGlobalPropertiesFilter;
@@ -75,7 +72,6 @@ public class ProjectConfigurationProviderTest {
@InjectMocks
private ProjectConfigurationProvider provider;
-
@Before
public void init() {
when(globalConfiguration.getDefinitions()).thenReturn(new PropertyDefinitions(System2.INSTANCE));
@@ -89,11 +85,11 @@ public class ProjectConfigurationProviderTest {
when(sonarGlobalPropertiesFilter.enforceOnlyServerSideSonarGlobalPropertiesAreUsed(ALL_PROPERTIES_MAP, GLOBAL_SERVER_PROPERTIES))
.thenReturn(PROPERTIES_AFTER_FILTERING);
- ProjectConfiguration provide = provider.provide(defaultInputProject, globalConfiguration, globalServerSettings, projectServerSettings, mutableProjectSettings);
+ ProjectConfiguration provide = provider.provide(defaultInputProject, globalConfiguration, globalServerSettings, projectServerSettings);
verify(sonarGlobalPropertiesFilter).enforceOnlyServerSideSonarGlobalPropertiesAreUsed(ALL_PROPERTIES_MAP, GLOBAL_SERVER_PROPERTIES);
assertThat(provide.getOriginalProperties()).containsExactlyEntriesOf(PROPERTIES_AFTER_FILTERING);
}
-} \ No newline at end of file
+}
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/DirectoryFileVisitorTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/DirectoryFileVisitorTest.java
index 01cb7d1bccf..277fc0dc68a 100644
--- a/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/DirectoryFileVisitorTest.java
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/DirectoryFileVisitorTest.java
@@ -27,20 +27,26 @@ import java.nio.file.Files;
import java.nio.file.LinkOption;
import java.nio.file.Path;
import java.nio.file.attribute.BasicFileAttributes;
+import java.util.Optional;
import org.apache.commons.lang3.SystemUtils;
+import org.junit.Before;
import org.junit.ClassRule;
import org.junit.Test;
import org.junit.rules.TemporaryFolder;
import org.sonar.api.batch.fs.InputFile;
import org.sonar.api.batch.fs.internal.DefaultInputModule;
+import org.sonar.scanner.bootstrap.SonarUserHome;
import org.sonar.scanner.fs.InputModuleHierarchy;
+import org.sonar.scanner.scan.ModuleConfiguration;
import static org.assertj.core.api.Assertions.assertThat;
import static org.junit.Assert.assertThrows;
import static org.mockito.ArgumentMatchers.any;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.never;
+import static org.mockito.Mockito.spy;
import static org.mockito.Mockito.verify;
+import static org.mockito.Mockito.when;
public class DirectoryFileVisitorTest {
@@ -48,33 +54,57 @@ public class DirectoryFileVisitorTest {
public static TemporaryFolder temp = new TemporaryFolder();
private final DefaultInputModule module = mock();
+ private final ModuleConfiguration moduleConfiguration = mock();
private final ModuleExclusionFilters moduleExclusionFilters = mock();
private final InputModuleHierarchy inputModuleHierarchy = mock();
private final InputFile.Type type = mock();
+ private final SonarUserHome sonarUserHome = mock();
+ private HiddenFilesProjectData hiddenFilesProjectData;
+
+ @Before
+ public void before() throws IOException {
+ Path sonarUserHomePath = temp.newFolder().toPath();
+ when(sonarUserHome.getPath()).thenReturn(sonarUserHomePath);
+ File workDir = temp.newFolder();
+ when(module.getWorkDir()).thenReturn(workDir.toPath());
+ hiddenFilesProjectData = spy(new HiddenFilesProjectData(sonarUserHome));
+ }
@Test
- public void visit_hidden_file() throws IOException {
+ public void should_not_visit_hidden_file() throws IOException {
+ when(moduleConfiguration.getBoolean("sonar.scanner.excludeHiddenFiles")).thenReturn(Optional.of(true));
DirectoryFileVisitor.FileVisitAction action = mock(DirectoryFileVisitor.FileVisitAction.class);
- File hidden = temp.newFile(".hidden");
- if (SystemUtils.IS_OS_WINDOWS) {
- Files.setAttribute(hidden.toPath(), "dos:hidden", true, LinkOption.NOFOLLOW_LINKS);
- }
-
+ File hidden = temp.newFile(".hiddenNotVisited");
+ setAsHiddenOnWindows(hidden);
- DirectoryFileVisitor underTest = new DirectoryFileVisitor(action, module, moduleExclusionFilters, inputModuleHierarchy, type);
+ DirectoryFileVisitor underTest = new DirectoryFileVisitor(action, module, moduleConfiguration, moduleExclusionFilters, inputModuleHierarchy, type, hiddenFilesProjectData);
underTest.visitFile(hidden.toPath(), Files.readAttributes(hidden.toPath(), BasicFileAttributes.class));
verify(action, never()).execute(any(Path.class));
}
@Test
+ public void should_visit_hidden_file() throws IOException {
+ when(moduleConfiguration.getBoolean("sonar.scanner.excludeHiddenFiles")).thenReturn(Optional.of(false));
+ DirectoryFileVisitor.FileVisitAction action = mock(DirectoryFileVisitor.FileVisitAction.class);
+
+ File hidden = temp.newFile(".hiddenVisited");
+ setAsHiddenOnWindows(hidden);
+
+ DirectoryFileVisitor underTest = new DirectoryFileVisitor(action, module, moduleConfiguration, moduleExclusionFilters, inputModuleHierarchy, type, hiddenFilesProjectData);
+ underTest.visitFile(hidden.toPath(), Files.readAttributes(hidden.toPath(), BasicFileAttributes.class));
+
+ verify(action).execute(any(Path.class));
+ }
+
+ @Test
public void test_visit_file_failed_generic_io_exception() throws IOException {
DirectoryFileVisitor.FileVisitAction action = mock(DirectoryFileVisitor.FileVisitAction.class);
File file = temp.newFile("failed");
- DirectoryFileVisitor underTest = new DirectoryFileVisitor(action, module, moduleExclusionFilters, inputModuleHierarchy, type);
+ DirectoryFileVisitor underTest = new DirectoryFileVisitor(action, module, moduleConfiguration, moduleExclusionFilters, inputModuleHierarchy, type, hiddenFilesProjectData);
assertThrows(IOException.class, () -> underTest.visitFileFailed(file.toPath(), new IOException()));
}
@@ -84,10 +114,15 @@ public class DirectoryFileVisitorTest {
File file = temp.newFile("symlink");
- DirectoryFileVisitor underTest = new DirectoryFileVisitor(action, module, moduleExclusionFilters, inputModuleHierarchy, type);
+ DirectoryFileVisitor underTest = new DirectoryFileVisitor(action, module, moduleConfiguration, moduleExclusionFilters, inputModuleHierarchy, type, hiddenFilesProjectData);
FileVisitResult result = underTest.visitFileFailed(file.toPath(), new FileSystemLoopException(file.getPath()));
assertThat(result).isEqualTo(FileVisitResult.CONTINUE);
}
+ private static void setAsHiddenOnWindows(File file) throws IOException {
+ if (SystemUtils.IS_OS_WINDOWS) {
+ Files.setAttribute(file.toPath(), "dos:hidden", true, LinkOption.NOFOLLOW_LINKS);
+ }
+ }
}
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/HiddenFilesProjectDataTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/HiddenFilesProjectDataTest.java
new file mode 100644
index 00000000000..d5a6e4ff843
--- /dev/null
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/HiddenFilesProjectDataTest.java
@@ -0,0 +1,160 @@
+/*
+ * SonarQube
+ * Copyright (C) 2009-2025 SonarSource SA
+ * mailto:info AT sonarsource DOT com
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 3 of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with this program; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ */
+package org.sonar.scanner.scan.filesystem;
+
+import java.io.File;
+import java.io.IOException;
+import java.nio.file.Files;
+import java.nio.file.LinkOption;
+import java.nio.file.Path;
+import org.apache.commons.lang3.SystemUtils;
+import org.junit.Before;
+import org.junit.BeforeClass;
+import org.junit.ClassRule;
+import org.junit.Test;
+import org.junit.rules.TemporaryFolder;
+import org.sonar.api.batch.fs.internal.DefaultInputModule;
+import org.sonar.scanner.bootstrap.SonarUserHome;
+
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.spy;
+import static org.mockito.Mockito.when;
+
+public class HiddenFilesProjectDataTest {
+
+ @ClassRule
+ public static TemporaryFolder temp = new TemporaryFolder();
+
+ private static final SonarUserHome sonarUserHome = mock(SonarUserHome.class);
+ private final DefaultInputModule inputModule = mock(DefaultInputModule.class);
+ private final DefaultInputModule secondInputModule = mock(DefaultInputModule.class);
+ private HiddenFilesProjectData underTest;
+
+ @BeforeClass
+ public static void setUp() throws IOException {
+ File userHomeFolder = temp.newFolder(".userhome");
+ setAsHiddenOnWindows(userHomeFolder);
+ when(sonarUserHome.getPath()).thenReturn(userHomeFolder.toPath());
+ }
+
+ @Before
+ public void before() {
+ underTest = spy(new HiddenFilesProjectData(sonarUserHome));
+ }
+
+ @Test
+ public void shouldContainNoMarkedHiddenFileOnConstruction() {
+ assertThat(underTest.hiddenFilesByModule).isEmpty();
+ }
+
+ @Test
+ public void shouldMarkWithCorrectAssociatedInputModule() {
+ Path myFile = Path.of("myFile");
+ Path myFile2 = Path.of("myFile2");
+ underTest.markAsHiddenFile(myFile, inputModule);
+ underTest.markAsHiddenFile(myFile2, inputModule);
+
+ assertThat(underTest.hiddenFilesByModule).hasSize(1);
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(myFile, inputModule)).isTrue();
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(myFile2, inputModule)).isTrue();
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(myFile, secondInputModule)).isFalse();
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(myFile2, secondInputModule)).isFalse();
+ }
+
+ @Test
+ public void shouldMarkWithCorrectAssociatedInputModuleForTwoDifferentModules() {
+ Path myFile = Path.of("myFile");
+ Path myFile2 = Path.of("myFile2");
+ underTest.markAsHiddenFile(myFile, inputModule);
+ underTest.markAsHiddenFile(myFile2, secondInputModule);
+
+ assertThat(underTest.hiddenFilesByModule).hasSize(2);
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(myFile, inputModule)).isTrue();
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(myFile2, inputModule)).isFalse();
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(myFile, secondInputModule)).isFalse();
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(myFile2, secondInputModule)).isTrue();
+ }
+
+ @Test
+ public void shouldNotShowAsHiddenFileWhenInputModuleIsNotExistingInData() {
+ Path myFile = Path.of("myFile");
+ Path notMarkedFile = Path.of("notMarkedFile");
+ underTest.markAsHiddenFile(myFile, inputModule);
+
+ assertThat(underTest.hiddenFilesByModule).isNotEmpty();
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(notMarkedFile, secondInputModule)).isFalse();
+ }
+
+ @Test
+ public void shouldClearMap() {
+ Path myFile = Path.of("myFile");
+ Path myFile2 = Path.of("myFile2");
+ underTest.markAsHiddenFile(myFile, inputModule);
+ underTest.markAsHiddenFile(myFile2, secondInputModule);
+
+ assertThat(underTest.hiddenFilesByModule).hasSize(2);
+
+ underTest.clearHiddenFilesData();
+ assertThat(underTest.hiddenFilesByModule).isEmpty();
+ }
+
+ @Test
+ public void shouldRemoveVisibilityAfterQuerying() {
+ Path myFile = Path.of("myFile");
+ Path myFile2 = Path.of("myFile2");
+ underTest.markAsHiddenFile(myFile, inputModule);
+ underTest.markAsHiddenFile(myFile2, inputModule);
+
+ assertThat(underTest.hiddenFilesByModule).hasSize(1);
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(myFile, inputModule)).isTrue();
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(myFile2, inputModule)).isTrue();
+
+ assertThat(underTest.hiddenFilesByModule).hasSize(1);
+ assertThat(underTest.hiddenFilesByModule.get(inputModule)).isEmpty();
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(myFile, inputModule)).isFalse();
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(myFile2, inputModule)).isFalse();
+ }
+
+ @Test
+ public void shouldOnlyRemoveModuleIfAllFilesAreRemoved() {
+ Path myFile = Path.of("myFile");
+ Path myFile2 = Path.of("myFile2");
+ underTest.markAsHiddenFile(myFile, inputModule);
+ underTest.markAsHiddenFile(myFile2, inputModule);
+
+ assertThat(underTest.hiddenFilesByModule).hasSize(1);
+ assertThat(underTest.getIsMarkedAsHiddenFileAndRemoveVisibilityInformation(myFile, inputModule)).isTrue();
+
+ assertThat(underTest.hiddenFilesByModule).isNotEmpty();
+ }
+
+ @Test
+ public void shouldNotFailOnUserPathResolving() throws IOException {
+ Path expectedPath = sonarUserHome.getPath().toRealPath(LinkOption.NOFOLLOW_LINKS).toAbsolutePath().normalize();
+ assertThat(underTest.getCachedSonarUserHomePath()).isEqualTo(expectedPath);
+ }
+
+ private static void setAsHiddenOnWindows(File file) throws IOException {
+ if (SystemUtils.IS_OS_WINDOWS) {
+ Files.setAttribute(file.toPath(), "dos:hidden", true, LinkOption.NOFOLLOW_LINKS);
+ }
+ }
+}
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/HiddenFilesVisitorHelperTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/HiddenFilesVisitorHelperTest.java
new file mode 100644
index 00000000000..8c111c7ea15
--- /dev/null
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/HiddenFilesVisitorHelperTest.java
@@ -0,0 +1,315 @@
+/*
+ * SonarQube
+ * Copyright (C) 2009-2025 SonarSource SA
+ * mailto:info AT sonarsource DOT com
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 3 of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with this program; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ */
+package org.sonar.scanner.scan.filesystem;
+
+import java.io.File;
+import java.io.IOException;
+import java.nio.file.Files;
+import java.nio.file.LinkOption;
+import java.nio.file.Path;
+import java.util.Optional;
+import org.apache.commons.lang3.SystemUtils;
+import org.junit.Before;
+import org.junit.BeforeClass;
+import org.junit.ClassRule;
+import org.junit.Test;
+import org.junit.rules.TemporaryFolder;
+import org.sonar.api.batch.fs.internal.DefaultInputModule;
+import org.sonar.scanner.bootstrap.SonarUserHome;
+import org.sonar.scanner.scan.ModuleConfiguration;
+
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.mockito.ArgumentMatchers.any;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.never;
+import static org.mockito.Mockito.spy;
+import static org.mockito.Mockito.verify;
+import static org.mockito.Mockito.when;
+
+public class HiddenFilesVisitorHelperTest {
+
+ @ClassRule
+ public static TemporaryFolder temp = new TemporaryFolder();
+
+ private static final SonarUserHome sonarUserHome = mock(SonarUserHome.class);
+ private static final DefaultInputModule inputModule = mock(DefaultInputModule.class);
+
+ private final ModuleConfiguration moduleConfig = mock(ModuleConfiguration.class);
+ private final HiddenFilesProjectData hiddenFilesProjectData = spy(new HiddenFilesProjectData(sonarUserHome));
+ private HiddenFilesVisitorHelper underTest;
+
+ @BeforeClass
+ public static void setUp() throws IOException {
+ File userHomeFolder = temp.newFolder(".userhome");
+ setAsHiddenOnWindows(userHomeFolder);
+ when(sonarUserHome.getPath()).thenReturn(userHomeFolder.toPath());
+
+ File workDir = temp.newFolder(".sonar");
+ setAsHiddenOnWindows(workDir);
+ when(inputModule.getWorkDir()).thenReturn(workDir.toPath());
+ }
+
+ @Before
+ public void before() {
+ hiddenFilesProjectData.clearHiddenFilesData();
+ underTest = spy(new HiddenFilesVisitorHelper(hiddenFilesProjectData, inputModule, moduleConfig));
+ }
+
+ @Test
+ public void verifyDefaultOnConstruction() {
+ assertThat(underTest.excludeHiddenFiles).isFalse();
+ assertThat(underTest.rootHiddenDir).isNull();
+ }
+
+ @Test
+ public void excludeHiddenFilesShouldBeSetToFalseFromConfigurationWhenNotConfigured() {
+ when(moduleConfig.getBoolean("sonar.scanner.excludeHiddenFiles")).thenReturn(Optional.empty());
+ HiddenFilesVisitorHelper configuredVisitorHelper = spy(new HiddenFilesVisitorHelper(hiddenFilesProjectData, inputModule, moduleConfig));
+
+ assertThat(configuredVisitorHelper.excludeHiddenFiles).isFalse();
+ }
+
+ @Test
+ public void excludeHiddenFilesShouldBeSetToFalseFromConfigurationWhenDisabled() {
+ when(moduleConfig.getBoolean("sonar.scanner.excludeHiddenFiles")).thenReturn(Optional.of(false));
+ HiddenFilesVisitorHelper configuredVisitorHelper = spy(new HiddenFilesVisitorHelper(hiddenFilesProjectData, inputModule, moduleConfig));
+
+ assertThat(configuredVisitorHelper.excludeHiddenFiles).isFalse();
+ }
+
+ @Test
+ public void excludeHiddenFilesShouldBeSetToTrueFromConfigurationWhenEnabled() {
+ when(moduleConfig.getBoolean("sonar.scanner.excludeHiddenFiles")).thenReturn(Optional.of(true));
+ HiddenFilesVisitorHelper configuredVisitorHelper = spy(new HiddenFilesVisitorHelper(hiddenFilesProjectData, inputModule, moduleConfig));
+
+ assertThat(configuredVisitorHelper.excludeHiddenFiles).isTrue();
+ }
+
+ @Test
+ public void shouldVisitHiddenDirectory() throws IOException {
+ File hiddenDir = temp.newFolder(".hiddenVisited");
+ setAsHiddenOnWindows(hiddenDir);
+
+ boolean visitDir = underTest.shouldVisitDir(hiddenDir.toPath());
+
+ assertThat(visitDir).isTrue();
+ assertThat(underTest.insideHiddenDirectory()).isTrue();
+ assertThat(underTest.rootHiddenDir).isEqualTo(hiddenDir.toPath());
+ verify(underTest).enterHiddenDirectory(hiddenDir.toPath());
+ }
+
+ @Test
+ public void shouldNotVisitHiddenDirectoryWhenHiddenFilesVisitIsExcluded() throws IOException {
+ when(moduleConfig.getBoolean("sonar.scanner.excludeHiddenFiles")).thenReturn(Optional.of(true));
+ HiddenFilesVisitorHelper configuredVisitorHelper = spy(new HiddenFilesVisitorHelper(hiddenFilesProjectData, inputModule, moduleConfig));
+
+ File hidden = temp.newFolder(".hiddenNotVisited");
+ setAsHiddenOnWindows(hidden);
+
+ boolean visitDir = configuredVisitorHelper.shouldVisitDir(hidden.toPath());
+
+ assertThat(visitDir).isFalse();
+ assertThat(configuredVisitorHelper.insideHiddenDirectory()).isFalse();
+ verify(configuredVisitorHelper, never()).enterHiddenDirectory(any());
+ }
+
+ @Test
+ public void shouldVisitNonHiddenDirectoryWhenHiddenFilesVisitIsExcluded() throws IOException {
+ when(moduleConfig.getBoolean("sonar.scanner.excludeHiddenFiles")).thenReturn(Optional.of(true));
+ HiddenFilesVisitorHelper configuredVisitorHelper = spy(new HiddenFilesVisitorHelper(hiddenFilesProjectData, inputModule, moduleConfig));
+
+ File nonHiddenFolder = temp.newFolder();
+
+ boolean visitDir = configuredVisitorHelper.shouldVisitDir(nonHiddenFolder.toPath());
+
+ assertThat(visitDir).isTrue();
+ assertThat(configuredVisitorHelper.insideHiddenDirectory()).isFalse();
+ verify(configuredVisitorHelper, never()).enterHiddenDirectory(any());
+ }
+
+ @Test
+ public void shouldVisitNonHiddenDirectory() throws IOException {
+ File nonHiddenFolder = temp.newFolder();
+
+ boolean visitDir = underTest.shouldVisitDir(nonHiddenFolder.toPath());
+
+ assertThat(visitDir).isTrue();
+ assertThat(underTest.insideHiddenDirectory()).isFalse();
+ verify(underTest, never()).enterHiddenDirectory(any());
+ assertThat(underTest.excludeHiddenFiles).isFalse();
+ }
+
+ @Test
+ public void shouldNotVisitModuleWorkDir() throws IOException {
+ Path workingDirectory = inputModule.getWorkDir().toRealPath(LinkOption.NOFOLLOW_LINKS).toAbsolutePath().normalize();
+ boolean visitDir = underTest.shouldVisitDir(workingDirectory);
+
+ assertThat(visitDir).isFalse();
+ assertThat(underTest.insideHiddenDirectory()).isFalse();
+ verify(underTest, never()).enterHiddenDirectory(any());
+ }
+
+ @Test
+ public void shouldNotVisitSonarUserHome() throws IOException {
+ Path userHome = sonarUserHome.getPath().toRealPath(LinkOption.NOFOLLOW_LINKS).toAbsolutePath().normalize();
+ boolean visitDir = underTest.shouldVisitDir(userHome);
+
+ assertThat(visitDir).isFalse();
+ assertThat(underTest.insideHiddenDirectory()).isFalse();
+ verify(underTest, never()).enterHiddenDirectory(any());
+ }
+
+ @Test
+ public void hiddenFileShouldBeVisited() throws IOException {
+ File hiddenFile = temp.newFile(".hiddenFileShouldBeVisited");
+ setAsHiddenOnWindows(hiddenFile);
+
+ assertThat(underTest.insideHiddenDirectory()).isFalse();
+ boolean visitFile = underTest.shouldVisitFile(hiddenFile.toPath());
+
+ assertThat(visitFile).isTrue();
+ verify(hiddenFilesProjectData).markAsHiddenFile(hiddenFile.toPath(), inputModule);
+ }
+
+ @Test
+ public void nonHiddenFileShouldBeVisitedInHiddenFolder() throws IOException {
+ File hidden = temp.newFolder(".hiddenFolder");
+ setAsHiddenOnWindows(hidden);
+
+ File nonHiddenFile = temp.newFile();
+
+ underTest.shouldVisitDir(hidden.toPath());
+ assertThat(underTest.insideHiddenDirectory()).isTrue();
+
+ boolean shouldVisitFile = underTest.shouldVisitFile(nonHiddenFile.toPath());
+
+ assertThat(shouldVisitFile).isTrue();
+ verify(hiddenFilesProjectData).markAsHiddenFile(nonHiddenFile.toPath(), inputModule);
+ }
+
+ @Test
+ public void shouldNotSetAsRootHiddenDirectoryWhenAlreadyEnteredHiddenDirectory() throws IOException {
+ File hidden = temp.newFolder(".outerHiddenFolder");
+ File nestedHiddenFolder = temp.newFolder(".outerHiddenFolder", ".nestedHiddenFolder");
+ setAsHiddenOnWindows(hidden);
+ setAsHiddenOnWindows(nestedHiddenFolder);
+
+ underTest.shouldVisitDir(hidden.toPath());
+ assertThat(underTest.insideHiddenDirectory()).isTrue();
+
+ boolean shouldVisitNestedDir = underTest.shouldVisitDir(nestedHiddenFolder.toPath());
+
+ assertThat(shouldVisitNestedDir).isTrue();
+ assertThat(underTest.rootHiddenDir).isEqualTo(hidden.toPath());
+ verify(underTest).enterHiddenDirectory(nestedHiddenFolder.toPath());
+ }
+
+ @Test
+ public void hiddenFileShouldNotBeVisitedWhenHiddenFileVisitExcluded() throws IOException {
+ when(moduleConfig.getBoolean("sonar.scanner.excludeHiddenFiles")).thenReturn(Optional.of(true));
+ HiddenFilesVisitorHelper configuredVisitorHelper = spy(new HiddenFilesVisitorHelper(hiddenFilesProjectData, inputModule, moduleConfig));
+
+ File hiddenFile = temp.newFile(".hiddenFileNotVisited");
+ setAsHiddenOnWindows(hiddenFile);
+
+ assertThat(configuredVisitorHelper.insideHiddenDirectory()).isFalse();
+
+ configuredVisitorHelper.shouldVisitFile(hiddenFile.toPath());
+ boolean shouldVisitFile = configuredVisitorHelper.shouldVisitFile(hiddenFile.toPath());
+
+ assertThat(shouldVisitFile).isFalse();
+ verify(hiddenFilesProjectData, never()).markAsHiddenFile(hiddenFile.toPath(), inputModule);
+ }
+
+ @Test
+ public void shouldCorrectlyExitHiddenFolderOnlyOnHiddenFolderThatEntered() throws IOException {
+ File hiddenFolder = temp.newFolder(".hiddenRootFolder");
+ setAsHiddenOnWindows(hiddenFolder);
+
+ boolean shouldVisitDir = underTest.shouldVisitDir(hiddenFolder.toPath());
+
+ assertThat(shouldVisitDir).isTrue();
+ assertThat(underTest.insideHiddenDirectory()).isTrue();
+ assertThat(underTest.rootHiddenDir).isEqualTo(hiddenFolder.toPath());
+ verify(underTest).enterHiddenDirectory(hiddenFolder.toPath());
+
+ File folder1 = temp.newFolder(".hiddenRootFolder", "myFolderExit");
+ File folder2 = temp.newFolder("myFolderExit");
+ File folder3 = temp.newFolder(".myFolderExit");
+ setAsHiddenOnWindows(folder3);
+
+ underTest.exitDirectory(folder1.toPath());
+ underTest.exitDirectory(folder2.toPath());
+ underTest.exitDirectory(folder3.toPath());
+
+ assertThat(underTest.insideHiddenDirectory()).isTrue();
+ assertThat(underTest.rootHiddenDir).isEqualTo(hiddenFolder.toPath());
+ verify(underTest, never()).resetRootHiddenDir();
+
+ underTest.exitDirectory(hiddenFolder.toPath());
+ assertThat(underTest.insideHiddenDirectory()).isFalse();
+ assertThat(underTest.rootHiddenDir).isNull();
+ verify(underTest).resetRootHiddenDir();
+ }
+
+ @Test
+ public void shouldNotInitiateResetRootDirWhenNotInHiddenDirectory() throws IOException {
+ File hiddenFolder = temp.newFolder(".hiddenFolderNonRoot");
+ setAsHiddenOnWindows(hiddenFolder);
+
+ underTest.exitDirectory(hiddenFolder.toPath());
+
+ verify(underTest, never()).resetRootHiddenDir();
+ }
+
+ @Test
+ public void filesShouldBeCorrectlyMarkedAsHidden() throws IOException {
+ File hiddenFolder = temp.newFolder(".hiddenFolderRoot");
+ setAsHiddenOnWindows(hiddenFolder);
+
+ File file1 = temp.newFile();
+ File file2 = temp.newFile();
+ File file3 = temp.newFile(".markedHiddenFile");
+ setAsHiddenOnWindows(file3);
+ File file4 = temp.newFile();
+ File file5 = temp.newFile(".markedHiddenFile2");
+ setAsHiddenOnWindows(file5);
+
+ underTest.shouldVisitFile(file1.toPath());
+ underTest.shouldVisitDir(hiddenFolder.toPath());
+ underTest.shouldVisitFile(file2.toPath());
+ underTest.shouldVisitFile(file3.toPath());
+ underTest.exitDirectory(hiddenFolder.toPath());
+ underTest.shouldVisitFile(file4.toPath());
+ underTest.shouldVisitFile(file5.toPath());
+
+ verify(hiddenFilesProjectData, never()).markAsHiddenFile(file1.toPath(), inputModule);
+ verify(hiddenFilesProjectData).markAsHiddenFile(file2.toPath(), inputModule);
+ verify(hiddenFilesProjectData).markAsHiddenFile(file3.toPath(), inputModule);
+ verify(hiddenFilesProjectData, never()).markAsHiddenFile(file4.toPath(), inputModule);
+ verify(hiddenFilesProjectData).markAsHiddenFile(file5.toPath(), inputModule);
+ }
+
+ private static void setAsHiddenOnWindows(File file) throws IOException {
+ if (SystemUtils.IS_OS_WINDOWS) {
+ Files.setAttribute(file.toPath(), "dos:hidden", true, LinkOption.NOFOLLOW_LINKS);
+ }
+ }
+}
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/ModuleInputComponentStoreTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/ModuleInputComponentStoreTest.java
index a0031f77633..07f7afec036 100644
--- a/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/ModuleInputComponentStoreTest.java
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/ModuleInputComponentStoreTest.java
@@ -19,80 +19,151 @@
*/
package org.sonar.scanner.scan.filesystem;
-import java.io.IOException;
-import org.junit.Before;
-import org.junit.Rule;
-import org.junit.Test;
-import org.junit.rules.TemporaryFolder;
+import java.io.File;
+import java.util.List;
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+import org.junit.jupiter.api.extension.ExtendWith;
+import org.junit.jupiter.api.io.TempDir;
+import org.mockito.Mock;
+import org.mockito.junit.jupiter.MockitoExtension;
import org.sonar.api.SonarRuntime;
import org.sonar.api.batch.fs.InputFile;
-import org.sonar.api.batch.fs.InputModule;
import org.sonar.api.batch.fs.internal.SensorStrategy;
-import org.sonar.api.batch.fs.internal.DefaultInputProject;
import org.sonar.api.batch.fs.internal.TestInputFileBuilder;
+import org.sonar.api.batch.sensor.internal.SensorContextTester;
import org.sonar.scanner.scan.branch.BranchConfiguration;
import static org.assertj.core.api.Assertions.assertThat;
import static org.mockito.ArgumentMatchers.any;
import static org.mockito.ArgumentMatchers.eq;
-import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.spy;
import static org.mockito.Mockito.verify;
import static org.mockito.Mockito.when;
-public class ModuleInputComponentStoreTest {
- @Rule
- public TemporaryFolder temp = new TemporaryFolder();
+@ExtendWith(MockitoExtension.class)
+class ModuleInputComponentStoreTest {
+
+ @TempDir
+ private File projectBaseDir;
+
+ @Mock
+ BranchConfiguration branchConfiguration;
+
+ @Mock
+ SonarRuntime sonarRuntime;
+
+ @Mock
+ InputComponentStore mockedInputComponentStore;
private InputComponentStore componentStore;
+ private SensorContextTester sensorContextTester;
private final String projectKey = "dummy key";
- @Before
- public void setUp() throws IOException {
- DefaultInputProject root = TestInputFileBuilder.newDefaultInputProject(projectKey, temp.newFolder());
- componentStore = new InputComponentStore(mock(BranchConfiguration.class), mock(SonarRuntime.class));
+ @BeforeEach
+ void setUp() {
+ TestInputFileBuilder.newDefaultInputProject(projectKey, projectBaseDir);
+ File moduleBaseDir = new File(projectBaseDir, "module");
+ moduleBaseDir.mkdir();
+ sensorContextTester = SensorContextTester.create(moduleBaseDir);
+ componentStore = spy(new InputComponentStore(branchConfiguration, sonarRuntime));
}
@Test
- public void should_cache_files_by_filename() {
+ void should_cache_module_files_by_filename() {
ModuleInputComponentStore store = newModuleInputComponentStore();
String filename = "some name";
- InputFile inputFile1 = new TestInputFileBuilder(projectKey, "some/path/" + filename).build();
+ InputFile inputFile1 = new TestInputFileBuilder(projectKey, "module/some/path/" + filename).build();
store.doAdd(inputFile1);
- InputFile inputFile2 = new TestInputFileBuilder(projectKey, "other/path/" + filename).build();
+ InputFile inputFile2 = new TestInputFileBuilder(projectKey, "module/other/path/" + filename).build();
store.doAdd(inputFile2);
- InputFile dummyInputFile = new TestInputFileBuilder(projectKey, "some/path/Dummy.java").build();
+ InputFile dummyInputFile = new TestInputFileBuilder(projectKey, "module/some/path/Dummy.java").build();
store.doAdd(dummyInputFile);
assertThat(store.getFilesByName(filename)).containsExactlyInAnyOrder(inputFile1, inputFile2);
}
@Test
- public void should_cache_files_by_extension() {
+ void should_cache_filtered_module_files_by_filename() {
+ ModuleInputComponentStore store = newModuleInputComponentStore();
+
+ String filename = "some name";
+ InputFile inputFile1 = new TestInputFileBuilder(projectKey, "some/path/" + filename).build();
+ InputFile inputFile2 = new TestInputFileBuilder(projectKey, "module/other/path/" + filename).build();
+ store.doAdd(inputFile2);
+
+ when(componentStore.getFilesByName(filename)).thenReturn(List.of(inputFile1, inputFile2));
+
+ assertThat(store.getFilesByName(filename)).containsOnly(inputFile2);
+ }
+
+ @Test
+ void should_cache_module_files_by_filename_global_strategy() {
+ ModuleInputComponentStore store = new ModuleInputComponentStore(sensorContextTester.module(), componentStore, new SensorStrategy());
+
+ String filename = "some name";
+ // None in the module
+ InputFile inputFile1 = new TestInputFileBuilder(projectKey, "some/path/" + filename).build();
+ InputFile inputFile2 = new TestInputFileBuilder(projectKey, "other/path/" + filename).build();
+
+ when(componentStore.getFilesByName(filename)).thenReturn(List.of(inputFile1, inputFile2));
+
+ assertThat(store.getFilesByName(filename)).containsExactlyInAnyOrder(inputFile1, inputFile2);
+ }
+
+ @Test
+ void should_cache_module_files_by_extension() {
ModuleInputComponentStore store = newModuleInputComponentStore();
- InputFile inputFile1 = new TestInputFileBuilder(projectKey, "some/path/Program.java").build();
+ InputFile inputFile1 = new TestInputFileBuilder(projectKey, "module/some/path/Program.java").build();
store.doAdd(inputFile1);
- InputFile inputFile2 = new TestInputFileBuilder(projectKey, "other/path/Utils.java").build();
+ InputFile inputFile2 = new TestInputFileBuilder(projectKey, "module/other/path/Utils.java").build();
store.doAdd(inputFile2);
- InputFile dummyInputFile = new TestInputFileBuilder(projectKey, "some/path/NotJava.cpp").build();
+ InputFile dummyInputFile = new TestInputFileBuilder(projectKey, "module/some/path/NotJava.cpp").build();
store.doAdd(dummyInputFile);
assertThat(store.getFilesByExtension("java")).containsExactlyInAnyOrder(inputFile1, inputFile2);
}
@Test
- public void should_not_cache_duplicates() {
+ void should_cache_filtered_module_files_by_extension() {
+ ModuleInputComponentStore store = newModuleInputComponentStore();
+
+ InputFile inputFile1 = new TestInputFileBuilder(projectKey, "some/path/NotInModule.java").build();
+ InputFile inputFile2 = new TestInputFileBuilder(projectKey, "module/some/path/Other.java").build();
+ store.doAdd(inputFile2);
+
+ when(componentStore.getFilesByExtension("java")).thenReturn(List.of(inputFile1, inputFile2));
+
+ assertThat(store.getFilesByExtension("java")).containsOnly(inputFile2);
+ }
+
+ @Test
+ void should_cache_module_files_by_extension_global_strategy() {
+ ModuleInputComponentStore store = new ModuleInputComponentStore(sensorContextTester.module(), componentStore, new SensorStrategy());
+
+ // None in the module
+ InputFile inputFile1 = new TestInputFileBuilder(projectKey, "some/path/NotInModule.java").build();
+ InputFile inputFile2 = new TestInputFileBuilder(projectKey, "some/path/Other.java").build();
+
+ when(componentStore.getFilesByExtension("java")).thenReturn(List.of(inputFile1, inputFile2));
+
+ assertThat(store.getFilesByExtension("java")).containsExactlyInAnyOrder(inputFile1, inputFile2);
+ }
+
+ @Test
+ void should_not_cache_duplicates() {
ModuleInputComponentStore store = newModuleInputComponentStore();
String ext = "java";
String filename = "Program." + ext;
- InputFile inputFile = new TestInputFileBuilder(projectKey, "some/path/" + filename).build();
+ InputFile inputFile = new TestInputFileBuilder(projectKey, "module/some/path/" + filename).build();
store.doAdd(inputFile);
store.doAdd(inputFile);
store.doAdd(inputFile);
@@ -102,12 +173,12 @@ public class ModuleInputComponentStoreTest {
}
@Test
- public void should_get_empty_iterable_on_cache_miss() {
+ void should_get_empty_iterable_on_cache_miss() {
ModuleInputComponentStore store = newModuleInputComponentStore();
String ext = "java";
String filename = "Program." + ext;
- InputFile inputFile = new TestInputFileBuilder(projectKey, "some/path/" + filename).build();
+ InputFile inputFile = new TestInputFileBuilder(projectKey, "module/some/path/" + filename).build();
store.doAdd(inputFile);
assertThat(store.getFilesByName("nonexistent")).isEmpty();
@@ -115,48 +186,42 @@ public class ModuleInputComponentStoreTest {
}
private ModuleInputComponentStore newModuleInputComponentStore() {
- InputModule module = mock(InputModule.class);
- when(module.key()).thenReturn("moduleKey");
- return new ModuleInputComponentStore(module, componentStore, mock(SensorStrategy.class));
+ SensorStrategy strategy = new SensorStrategy();
+ strategy.setGlobal(false);
+ return new ModuleInputComponentStore(sensorContextTester.module(), componentStore, strategy);
}
@Test
- public void should_find_module_components_with_non_global_strategy() {
- InputComponentStore inputComponentStore = mock(InputComponentStore.class);
+ void should_find_module_components_with_non_global_strategy() {
SensorStrategy strategy = new SensorStrategy();
- InputModule module = mock(InputModule.class);
- when(module.key()).thenReturn("foo");
- ModuleInputComponentStore store = new ModuleInputComponentStore(module, inputComponentStore, strategy);
+ ModuleInputComponentStore store = new ModuleInputComponentStore(sensorContextTester.module(), mockedInputComponentStore, strategy);
strategy.setGlobal(false);
store.inputFiles();
- verify(inputComponentStore).filesByModule("foo");
+ verify(mockedInputComponentStore).filesByModule(sensorContextTester.module().key());
String relativePath = "somepath";
store.inputFile(relativePath);
- verify(inputComponentStore).getFile(any(String.class), eq(relativePath));
+ verify(mockedInputComponentStore).getFile(any(String.class), eq(relativePath));
store.languages();
- verify(inputComponentStore).languages(any(String.class));
+ verify(mockedInputComponentStore).languages(any(String.class));
}
@Test
- public void should_find_all_components_with_global_strategy() {
- InputComponentStore inputComponentStore = mock(InputComponentStore.class);
+ void should_find_all_components_with_global_strategy() {
SensorStrategy strategy = new SensorStrategy();
- ModuleInputComponentStore store = new ModuleInputComponentStore(mock(InputModule.class), inputComponentStore, strategy);
-
- strategy.setGlobal(true);
+ ModuleInputComponentStore store = new ModuleInputComponentStore(sensorContextTester.module(), mockedInputComponentStore, strategy);
store.inputFiles();
- verify(inputComponentStore).inputFiles();
+ verify(mockedInputComponentStore).inputFiles();
String relativePath = "somepath";
store.inputFile(relativePath);
- verify(inputComponentStore).inputFile(relativePath);
+ verify(mockedInputComponentStore).inputFile(relativePath);
store.languages();
- verify(inputComponentStore).languages();
+ verify(mockedInputComponentStore).languages();
}
}
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/MutableFileSystemTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/MutableFileSystemTest.java
index 31d3312853b..485708c9936 100644
--- a/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/MutableFileSystemTest.java
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/scan/filesystem/MutableFileSystemTest.java
@@ -28,6 +28,9 @@ import org.sonar.api.batch.fs.InputFile;
import org.sonar.api.batch.fs.internal.TestInputFileBuilder;
import static org.assertj.core.api.Assertions.assertThat;
+import static org.mockito.Mockito.never;
+import static org.mockito.Mockito.spy;
+import static org.mockito.Mockito.verify;
public class MutableFileSystemTest {
@@ -44,9 +47,15 @@ public class MutableFileSystemTest {
}
@Test
- public void return_all_files_when_not_restricted() {
+ public void restriction_and_hidden_file_should_be_disabled_on_default() {
+ assertThat(underTest.restrictToChangedFiles).isFalse();
+ assertThat(underTest.allowHiddenFileAnalysis).isFalse();
+ }
+
+ @Test
+ public void return_all_non_hidden_files_when_not_restricted_and_disabled() {
assertThat(underTest.inputFiles(underTest.predicates().all())).isEmpty();
- addFileWithAllStatus();
+ addFilesWithAllStatus();
underTest.setRestrictToChangedFiles(false);
assertThat(underTest.inputFiles(underTest.predicates().all())).hasSize(3);
@@ -58,7 +67,7 @@ public class MutableFileSystemTest {
@Test
public void return_only_changed_files_when_restricted() {
assertThat(underTest.inputFiles(underTest.predicates().all())).isEmpty();
- addFileWithAllStatus();
+ addFilesWithAllStatus();
underTest.setRestrictToChangedFiles(true);
assertThat(underTest.inputFiles(underTest.predicates().all())).hasSize(2);
@@ -67,19 +76,95 @@ public class MutableFileSystemTest {
assertThat(underTest.inputFile(underTest.predicates().hasFilename(generateFilename(InputFile.Status.CHANGED)))).isNotNull();
}
- private void addFileWithAllStatus() {
+ @Test
+ public void return_all_files_when_allowing_hidden_files_analysis() {
+ assertThat(underTest.inputFiles(underTest.predicates().all())).isEmpty();
+ addFilesWithVisibility();
+ underTest.setAllowHiddenFileAnalysis(true);
+
+ assertThat(underTest.inputFiles(underTest.predicates().all())).hasSize(2);
+ assertThat(underTest.inputFile(underTest.predicates().hasFilename(generateFilename(true)))).isNotNull();
+ assertThat(underTest.inputFile(underTest.predicates().hasFilename(generateFilename(false)))).isNotNull();
+ }
+
+ @Test
+ public void return_only_non_hidden_files_when_not_allowing_hidden_files_analysis() {
+ assertThat(underTest.inputFiles(underTest.predicates().all())).isEmpty();
+ addFilesWithVisibility();
+ underTest.setAllowHiddenFileAnalysis(false);
+
+ assertThat(underTest.inputFiles(underTest.predicates().all())).hasSize(1);
+ assertThat(underTest.inputFile(underTest.predicates().hasFilename(generateFilename(true)))).isNull();
+ assertThat(underTest.inputFile(underTest.predicates().hasFilename(generateFilename(false)))).isNotNull();
+ }
+
+ @Test
+ public void hidden_file_predicate_should_preserve_predicate_optimization() {
+ addFilesWithVisibility();
+ var anotherHiddenFile = spy(new TestInputFileBuilder("foo", String.format("src/%s", ".myHiddenFile.txt"))
+ .setLanguage(LANGUAGE).setStatus(InputFile.Status.ADDED).setHidden(true).build());
+ underTest.add(anotherHiddenFile);
+ underTest.setAllowHiddenFileAnalysis(false);
+
+ assertThat(underTest.inputFile(underTest.predicates().hasFilename(generateFilename(true)))).isNull();
+ assertThat(underTest.inputFile(underTest.predicates().hasFilename(generateFilename(false)))).isNotNull();
+ // Verify that predicate optimization is still effective
+ verify(anotherHiddenFile, never()).isHidden();
+
+ // This predicate can't be optimized
+ assertThat(underTest.inputFiles(underTest.predicates().all())).hasSize(1);
+ verify(anotherHiddenFile).isHidden();
+ }
+
+ @Test
+ public void hidden_file_predicate_should_be_applied_first_for_non_optimized_predicates() {
+ // Checking the file type is not very costly, but it is not optimized. In real life, something more costly would be reading the file
+ // content, for example.
+ addFilesWithVisibility();
+ var anotherHiddenFile = spy(new TestInputFileBuilder("foo", String.format("src/%s", ".myHiddenFile." + LANGUAGE))
+ .setLanguage(LANGUAGE).setType(InputFile.Type.MAIN).setStatus(InputFile.Status.ADDED).setHidden(true).build());
+ underTest.add(anotherHiddenFile);
+ underTest.setAllowHiddenFileAnalysis(false);
+
+ assertThat(underTest.inputFiles(underTest.predicates().hasType(InputFile.Type.MAIN))).hasSize(1);
+ // Verify that the file type has not been evaluated
+ verify(anotherHiddenFile, never()).type();
+ }
+
+ private void addFilesWithVisibility() {
+ addFile(true);
+ addFile(false);
+ }
+
+ private void addFilesWithAllStatus() {
addFile(InputFile.Status.ADDED);
addFile(InputFile.Status.CHANGED);
addFile(InputFile.Status.SAME);
}
private void addFile(InputFile.Status status) {
- underTest.add(new TestInputFileBuilder("foo", String.format("src/%s", generateFilename(status)))
- .setLanguage(LANGUAGE).setStatus(status).build());
+ addFile(status, false);
+ }
+
+ private void addFile(boolean hidden) {
+ addFile(InputFile.Status.SAME, hidden);
+ }
+
+ private void addFile(InputFile.Status status, boolean hidden) {
+ underTest.add(new TestInputFileBuilder("foo", String.format("src/%s", generateFilename(status, hidden)))
+ .setLanguage(LANGUAGE).setType(InputFile.Type.MAIN).setStatus(status).setHidden(hidden).build());
+ }
+
+ private String generateFilename(boolean hidden) {
+ return generateFilename(InputFile.Status.SAME, hidden);
}
private String generateFilename(InputFile.Status status) {
- return String.format("%s.%s", status.name().toLowerCase(Locale.ROOT), LANGUAGE);
+ return generateFilename(status, false);
+ }
+
+ private String generateFilename(InputFile.Status status, boolean hidden) {
+ return String.format("%s.%s.%s", status.name().toLowerCase(Locale.ROOT), hidden, LANGUAGE);
}
}
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/DefaultSensorStorageTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/DefaultSensorStorageTest.java
index a6cabe242fb..355fb2cde0e 100644
--- a/sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/DefaultSensorStorageTest.java
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/DefaultSensorStorageTest.java
@@ -97,7 +97,6 @@ class DefaultSensorStorageTest {
public void prepare() {
MetricFinder metricFinder = mock(MetricFinder.class);
when(metricFinder.<Integer>findByKey(CoreMetrics.NCLOC_KEY)).thenReturn(CoreMetrics.NCLOC);
- when(metricFinder.<String>findByKey(CoreMetrics.FUNCTION_COMPLEXITY_DISTRIBUTION_KEY)).thenReturn(CoreMetrics.FUNCTION_COMPLEXITY_DISTRIBUTION);
when(metricFinder.<Integer>findByKey(CoreMetrics.LINES_TO_COVER_KEY)).thenReturn(CoreMetrics.LINES_TO_COVER);
settings = new MapSettings();
@@ -112,8 +111,9 @@ class DefaultSensorStorageTest {
branchConfiguration = mock(BranchConfiguration.class);
- underTest = new DefaultSensorStorage(metricFinder,
- moduleIssues, settings.asConfig(), reportPublisher, mock(SonarCpdBlockIndex.class), contextPropertiesCache, telemetryCache, new ScannerMetrics(), branchConfiguration);
+ underTest = new DefaultSensorStorage(
+ metricFinder, moduleIssues, settings.asConfig(), reportPublisher, mock(SonarCpdBlockIndex.class), contextPropertiesCache, telemetryCache, new ScannerMetrics(),
+ branchConfiguration);
project = new DefaultInputProject(ProjectDefinition.create()
.setKey("foo")
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/ModuleSensorContextTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/ModuleSensorContextTest.java
index 4ab9f46fb4a..3a0ff7fb4c2 100644
--- a/sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/ModuleSensorContextTest.java
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/ModuleSensorContextTest.java
@@ -68,7 +68,7 @@ class ModuleSensorContextTest {
@BeforeEach
void prepare() {
fs = new DefaultFileSystem(temp);
- underTest = new ModuleSensorContext(mock(DefaultInputProject.class), mock(InputModule.class), settings.asConfig(), settings, fs, activeRules, sensorStorage, runtime,
+ underTest = new ModuleSensorContext(mock(DefaultInputProject.class), mock(InputModule.class), settings.asConfig(), fs, activeRules, sensorStorage, runtime,
branchConfiguration, writeCache, readCache, analysisCacheEnabled, unchangedFilesHandler, executingSensorContext, pluginRepository);
}
@@ -104,7 +104,7 @@ class ModuleSensorContextTest {
@Test
void pull_request_can_skip_unchanged_files() {
when(branchConfiguration.isPullRequest()).thenReturn(true);
- underTest = new ModuleSensorContext(mock(DefaultInputProject.class), mock(InputModule.class), settings.asConfig(), settings, fs, activeRules, sensorStorage, runtime,
+ underTest = new ModuleSensorContext(mock(DefaultInputProject.class), mock(InputModule.class), settings.asConfig(), fs, activeRules, sensorStorage, runtime,
branchConfiguration, writeCache, readCache, analysisCacheEnabled, unchangedFilesHandler, executingSensorContext, pluginRepository);
assertThat(underTest.canSkipUnchangedFiles()).isTrue();
}
diff --git a/sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/ProjectSensorContextTest.java b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/ProjectSensorContextTest.java
index 3c7f3d36793..01c337a5ed0 100644
--- a/sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/ProjectSensorContextTest.java
+++ b/sonar-scanner-engine/src/test/java/org/sonar/scanner/sensor/ProjectSensorContextTest.java
@@ -59,8 +59,8 @@ class ProjectSensorContextTest {
private ExecutingSensorContext executingSensorContext = mock(ExecutingSensorContext.class);
private ScannerPluginRepository pluginRepository = mock(ScannerPluginRepository.class);
- private ProjectSensorContext underTest = new ProjectSensorContext(mock(DefaultInputProject.class), settings.asConfig(), settings, fs, activeRules, sensorStorage, runtime,
- branchConfiguration, writeCache, readCache, analysisCacheEnabled, unchangedFilesHandler, executingSensorContext, pluginRepository);
+ private ProjectSensorContext underTest = new ProjectSensorContext(mock(DefaultInputProject.class), settings.asConfig(), fs, activeRules, sensorStorage, runtime,
+ branchConfiguration, writeCache, readCache, analysisCacheEnabled, unchangedFilesHandler, executingSensorContext, pluginRepository);
private static final String PLUGIN_KEY = "org.sonarsource.pluginKey";
@@ -69,7 +69,6 @@ class ProjectSensorContextTest {
when(executingSensorContext.getSensorExecuting()).thenReturn(new SensorId(PLUGIN_KEY, "sensorName"));
}
-
@Test
void addTelemetryProperty_whenTheOrganizationIsSonarSource_mustStoreTheTelemetry() {
@@ -77,16 +76,21 @@ class ProjectSensorContextTest {
underTest.addTelemetryProperty("key", "value");
- //then verify that the defaultStorage is called with the telemetry property once
+ // then verify that the defaultStorage is called with the telemetry property once
verify(sensorStorage).storeTelemetry("key", "value");
}
@Test
- void addTelemetryProperty_whenTheOrganizationIsNotSonarSource_mustThrowExcaption() {
+ void addTelemetryProperty_whenTheOrganizationIsNotSonarSource_mustThrowException() {
when(pluginRepository.getPluginInfo(PLUGIN_KEY)).thenReturn(new PluginInfo(PLUGIN_KEY).setOrganizationName("notSonarsource"));
assertThrows(IllegalStateException.class, () -> underTest.addTelemetryProperty("key", "value"));
verifyNoInteractions(sensorStorage);
}
+
+ @Test
+ void settings_throwsUnsupportedOperationException() {
+ assertThrows(UnsupportedOperationException.class, () -> underTest.settings());
+ }
}