summaryrefslogtreecommitdiff
path: root/spec/lib/gitlab/ci/parsers/security/validators/schema_validator_spec.rb
diff options
context:
space:
mode:
Diffstat (limited to 'spec/lib/gitlab/ci/parsers/security/validators/schema_validator_spec.rb')
-rw-r--r--spec/lib/gitlab/ci/parsers/security/validators/schema_validator_spec.rb40
1 files changed, 40 insertions, 0 deletions
diff --git a/spec/lib/gitlab/ci/parsers/security/validators/schema_validator_spec.rb b/spec/lib/gitlab/ci/parsers/security/validators/schema_validator_spec.rb
new file mode 100644
index 00000000000..f434ffd12bf
--- /dev/null
+++ b/spec/lib/gitlab/ci/parsers/security/validators/schema_validator_spec.rb
@@ -0,0 +1,40 @@
+# frozen_string_literal: true
+
+require 'spec_helper'
+
+RSpec.describe Gitlab::Ci::Parsers::Security::Validators::SchemaValidator do
+ using RSpec::Parameterized::TableSyntax
+
+ where(:report_type, :expected_errors, :valid_data) do
+ :sast | ['root is missing required keys: vulnerabilities'] | { 'version' => '10.0.0', 'vulnerabilities' => [] }
+ :secret_detection | ['root is missing required keys: vulnerabilities'] | { 'version' => '10.0.0', 'vulnerabilities' => [] }
+ end
+
+ with_them do
+ let(:validator) { described_class.new(report_type, report_data) }
+
+ describe '#valid?' do
+ subject { validator.valid? }
+
+ context 'when given data is invalid according to the schema' do
+ let(:report_data) { {} }
+
+ it { is_expected.to be_falsey }
+ end
+
+ context 'when given data is valid according to the schema' do
+ let(:report_data) { valid_data }
+
+ it { is_expected.to be_truthy }
+ end
+ end
+
+ describe '#errors' do
+ let(:report_data) { { 'version' => '10.0.0' } }
+
+ subject { validator.errors }
+
+ it { is_expected.to eq(expected_errors) }
+ end
+ end
+end