1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
use super::super::*;
#[derive(Debug)]
pub struct RestrictedPath {
path: String,
}
impl RestrictedPath {
pub fn new<S: ToString>(path: S) -> Self {
RestrictedPath {
path: path.to_string(),
}
}
}
impl Check for RestrictedPath {
fn name(&self) -> &str {
"restricted-path"
}
fn check(&self, _: &CheckGitContext, commit: &Commit) -> Result<CheckResult> {
let mut result = CheckResult::new();
let is_restricted = commit.diffs
.iter()
.map(|diff| diff.name.as_path())
.any(|path| path.starts_with(&self.path));
if is_restricted {
result.add_error(format!("commit {} not allowed; the `{}` path is restricted.",
commit.sha1_short,
self.path));
}
Ok(result)
}
}
#[cfg(test)]
mod tests {
use super::RestrictedPath;
use super::super::test::*;
static BAD_TOPIC: &'static str = "e845fa2521c17bdd31d5891c1c644fb17f0629db";
#[test]
fn test_restricted_path() {
let check = RestrictedPath::new("restricted");
let mut conf = GitCheckConfiguration::new();
conf.add_check(&check);
let result = test_check("test_restricted_path", BAD_TOPIC, &conf);
assert_eq!(result.warnings().len(), 0);
assert_eq!(result.alerts().len(), 0);
assert_eq!(result.errors().len(), 1);
assert_eq!(result.errors()[0],
"commit e845fa2 not allowed; the `restricted` path is restricted.");
assert_eq!(result.allowed(), false);
assert_eq!(result.pass(), false);
}
}