1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
use impl_prelude::*;
#[derive(Debug)]
pub struct RestrictedPath {
path: String,
required: bool,
}
impl RestrictedPath {
pub fn new<S: ToString>(path: S) -> Self {
RestrictedPath {
path: path.to_string(),
required: true,
}
}
pub fn required(&mut self, required: bool) -> &mut Self {
self.required = required;
self
}
}
impl Check for RestrictedPath {
fn name(&self) -> &str {
"restricted-path"
}
fn check(&self, _: &CheckGitContext, commit: &Commit) -> Result<CheckResult> {
let mut result = CheckResult::new();
let is_restricted = commit.diffs
.iter()
.map(|diff| diff.name.as_path())
.any(|path| path.starts_with(&self.path));
if is_restricted {
if self.required {
result.add_error(format!("commit {} not allowed; the `{}` path is restricted.",
commit.sha1,
self.path));
} else {
result.add_warning(format!("commit {} should be inspected; the `{}` path is \
restricted.",
commit.sha1,
self.path));
};
}
Ok(result)
}
}
#[cfg(test)]
mod tests {
use checks::RestrictedPath;
use checks::test::*;
static BAD_TOPIC: &'static str = "e845fa2521c17bdd31d5891c1c644fb17f0629db";
#[test]
fn test_restricted_path() {
let check = RestrictedPath::new("restricted");
let mut conf = GitCheckConfiguration::new();
conf.add_check(&check);
let result = test_check("test_restricted_path", BAD_TOPIC, &conf);
assert_eq!(result.warnings().len(), 0);
assert_eq!(result.alerts().len(), 0);
assert_eq!(result.errors().len(), 1);
assert_eq!(result.errors()[0],
"commit e845fa2521c17bdd31d5891c1c644fb17f0629db not allowed; the \
`restricted` path is restricted.");
assert_eq!(result.temporary(), false);
assert_eq!(result.allowed(), false);
assert_eq!(result.pass(), false);
}
#[test]
fn test_restricted_path_warning() {
let mut check = RestrictedPath::new("restricted");
let mut conf = GitCheckConfiguration::new();
check.required(false);
conf.add_check(&check);
let result = test_check("test_restricted_path_warning", BAD_TOPIC, &conf);
assert_eq!(result.warnings().len(), 1);
assert_eq!(result.warnings()[0],
"commit e845fa2521c17bdd31d5891c1c644fb17f0629db should be inspected; the \
`restricted` path is restricted.");
assert_eq!(result.alerts().len(), 0);
assert_eq!(result.errors().len(), 0);
assert_eq!(result.temporary(), false);
assert_eq!(result.allowed(), false);
assert_eq!(result.pass(), true);
}
}