use crate::analyzer::hadolint::parser::instruction::Instruction;
use crate::analyzer::hadolint::rules::{SimpleRule, simple_rule};
use crate::analyzer::hadolint::shell::ParsedShell;
use crate::analyzer::hadolint::types::Severity;
pub fn rule() -> SimpleRule<impl Fn(&Instruction, Option<&ParsedShell>) -> bool + Send + Sync> {
simple_rule(
"DL3056",
Severity::Warning,
"Label `org.opencontainers.image.source` is not a valid URL.",
|instr, _shell| match instr {
Instruction::Label(pairs) => {
for (key, value) in pairs {
if key == "org.opencontainers.image.source" && !is_valid_url(value) {
return false;
}
}
true
}
_ => true,
},
)
}
fn is_valid_url(url: &str) -> bool {
if url.is_empty() {
return false;
}
url.starts_with("http://") || url.starts_with("https://")
}
#[cfg(test)]
mod tests {
use super::*;
use crate::analyzer::hadolint::config::HadolintConfig;
use crate::analyzer::hadolint::lint::{LintResult, lint};
fn lint_dockerfile(content: &str) -> LintResult {
lint(content, &HadolintConfig::default())
}
#[test]
fn test_valid_url() {
let result = lint_dockerfile(
"FROM ubuntu:20.04\nLABEL org.opencontainers.image.source=\"https://github.com/example/repo\"",
);
assert!(!result.failures.iter().any(|f| f.code.as_str() == "DL3056"));
}
#[test]
fn test_invalid_url() {
let result = lint_dockerfile(
"FROM ubuntu:20.04\nLABEL org.opencontainers.image.source=\"not-a-url\"",
);
assert!(result.failures.iter().any(|f| f.code.as_str() == "DL3056"));
}
}