Add determinism tests for verdict artifact generation and update SHA256 sums script

- Implemented comprehensive tests for verdict artifact generation to ensure deterministic outputs across various scenarios, including identical inputs, parallel execution, and change ordering.
- Created helper methods for generating sample verdict inputs and computing canonical hashes.
- Added tests to validate the stability of canonical hashes, proof spine ordering, and summary statistics.
- Introduced a new PowerShell script to update SHA256 sums for files, ensuring accurate hash generation and file integrity checks.
This commit is contained in:
StellaOps Bot
2025-12-24 02:17:34 +02:00
parent e59921374e
commit 7503c19b8f
390 changed files with 37389 additions and 5380 deletions

View File

@@ -399,7 +399,7 @@ internal static partial class CommandHandlers
format = format,
provider = providerName,
timestamp = DateTimeOffset.UtcNow.ToString("O"),
dataHash = Convert.ToHexString(System.Security.Cryptography.SHA256.HashData(data)).ToLowerInvariant(),
dataHash = CryptoHashFactory.CreateDefault().ComputeHashHex(data, HashAlgorithms.Sha256),
signature = "STUB-SIGNATURE-BASE64",
keyId = "STUB-KEY-ID"
};

View File

@@ -5,7 +5,6 @@ using System.IO.Compression;
using System.Security.Cryptography;
using System.Text;
using System.Text.Json;
using Microsoft.Extensions.Logging;
namespace StellaOps.Cli.Commands.PoE;
@@ -17,75 +16,56 @@ public class ExportCommand : Command
{
public ExportCommand() : base("export", "Export PoE artifacts for offline verification")
{
var findingOption = new Option<string?>(
name: "--finding",
description: "Specific finding to export (format: CVE-YYYY-NNNNN:pkg:...)")
var findingOption = new Option<string?>("--finding")
{
IsRequired = false
Description = "Specific finding to export (format: CVE-YYYY-NNNNN:pkg:...)",
Required = false
};
var scanIdOption = new Option<string>(
name: "--scan-id",
description: "Scan identifier")
var scanIdOption = new Option<string>("--scan-id")
{
IsRequired = true
Description = "Scan identifier",
Required = true
};
var outputOption = new Option<string>(
name: "--output",
description: "Output directory",
getDefaultValue: () => "./poe-export/");
var outputOption = new Option<string>("--output") { Description = "Output directory" };
outputOption.SetDefaultValue("./poe-export/");
var allReachableOption = new Option<bool>(
name: "--all-reachable",
description: "Export all reachable findings in scan",
getDefaultValue: () => false);
var allReachableOption = new Option<bool>("--all-reachable") { Description = "Export all reachable findings in scan" };
var includeRekorProofOption = new Option<bool>(
name: "--include-rekor-proof",
description: "Include Rekor inclusion proofs",
getDefaultValue: () => true);
var includeRekorProofOption = new Option<bool>("--include-rekor-proof") { Description = "Include Rekor inclusion proofs" };
includeRekorProofOption.SetDefaultValue(true);
var includeSubgraphOption = new Option<bool>(
name: "--include-subgraph",
description: "Include parent richgraph-v1",
getDefaultValue: () => false);
var includeSubgraphOption = new Option<bool>("--include-subgraph") { Description = "Include parent richgraph-v1" };
var includeSbomOption = new Option<bool>(
name: "--include-sbom",
description: "Include SBOM artifact",
getDefaultValue: () => false);
var includeSbomOption = new Option<bool>("--include-sbom") { Description = "Include SBOM artifact" };
var formatOption = new Option<ArchiveFormat>(
name: "--format",
description: "Archive format",
getDefaultValue: () => ArchiveFormat.TarGz);
var formatOption = new Option<ArchiveFormat>("--format") { Description = "Archive format" };
formatOption.SetDefaultValue(ArchiveFormat.TarGz);
var casRootOption = new Option<string?>(
name: "--cas-root",
description: "CAS root directory (default: from config)");
var casRootOption = new Option<string?>("--cas-root") { Description = "CAS root directory (default: from config)" };
AddOption(findingOption);
AddOption(scanIdOption);
AddOption(outputOption);
AddOption(allReachableOption);
AddOption(includeRekorProofOption);
AddOption(includeSubgraphOption);
AddOption(includeSbomOption);
AddOption(formatOption);
AddOption(casRootOption);
Add(findingOption);
Add(scanIdOption);
Add(outputOption);
Add(allReachableOption);
Add(includeRekorProofOption);
Add(includeSubgraphOption);
Add(includeSbomOption);
Add(formatOption);
Add(casRootOption);
this.SetHandler(async (context) =>
SetAction(async (parseResult, _) =>
{
var finding = context.ParseResult.GetValueForOption(findingOption);
var scanId = context.ParseResult.GetValueForOption(scanIdOption)!;
var output = context.ParseResult.GetValueForOption(outputOption)!;
var allReachable = context.ParseResult.GetValueForOption(allReachableOption);
var includeRekor = context.ParseResult.GetValueForOption(includeRekorProofOption);
var includeSubgraph = context.ParseResult.GetValueForOption(includeSubgraphOption);
var includeSbom = context.ParseResult.GetValueForOption(includeSbomOption);
var format = context.ParseResult.GetValueForOption(formatOption);
var casRoot = context.ParseResult.GetValueForOption(casRootOption);
var finding = parseResult.GetValue(findingOption);
var scanId = parseResult.GetValue(scanIdOption) ?? string.Empty;
var output = parseResult.GetValue(outputOption) ?? "./poe-export/";
var allReachable = parseResult.GetValue(allReachableOption);
var includeRekor = parseResult.GetValue(includeRekorProofOption);
var includeSubgraph = parseResult.GetValue(includeSubgraphOption);
var includeSbom = parseResult.GetValue(includeSbomOption);
var format = parseResult.GetValue(formatOption);
var casRoot = parseResult.GetValue(casRootOption);
var exporter = new PoEExporter(Console.WriteLine);
await exporter.ExportAsync(new ExportOptions(
@@ -97,10 +77,9 @@ public class ExportCommand : Command
IncludeSubgraph: includeSubgraph,
IncludeSbom: includeSbom,
Format: format,
CasRoot: casRoot
));
CasRoot: casRoot));
context.ExitCode = 0;
return 0;
});
}
}

View File

@@ -4,7 +4,6 @@ using System.CommandLine;
using System.Security.Cryptography;
using System.Text;
using System.Text.Json;
using Microsoft.Extensions.Logging;
namespace StellaOps.Cli.Commands.PoE;
@@ -16,63 +15,52 @@ public class VerifyCommand : Command
{
public VerifyCommand() : base("verify", "Verify a Proof of Exposure artifact")
{
var poeOption = new Option<string>(
name: "--poe",
description: "PoE hash (blake3:...) or file path to poe.json")
var poeOption = new Option<string>("--poe")
{
IsRequired = true
Description = "PoE hash (blake3:...) or file path to poe.json",
Required = true
};
var offlineOption = new Option<bool>(
name: "--offline",
description: "Enable offline mode (no network access)",
getDefaultValue: () => false);
var offlineOption = new Option<bool>("--offline") { Description = "Enable offline mode (no network access)" };
var trustedKeysOption = new Option<string?>(
name: "--trusted-keys",
description: "Path to trusted-keys.json file");
var trustedKeysOption = new Option<string?>("--trusted-keys") { Description = "Path to trusted-keys.json file" };
var checkPolicyOption = new Option<string?>(
name: "--check-policy",
description: "Verify policy digest matches expected value (sha256:...)");
var rekorCheckpointOption = new Option<string?>(
name: "--rekor-checkpoint",
description: "Path to cached Rekor checkpoint file");
var verboseOption = new Option<bool>(
name: "--verbose",
description: "Detailed verification output",
getDefaultValue: () => false);
var outputFormatOption = new Option<OutputFormat>(
name: "--output",
description: "Output format",
getDefaultValue: () => OutputFormat.Table);
var casRootOption = new Option<string?>(
name: "--cas-root",
description: "Local CAS root directory for offline mode");
AddOption(poeOption);
AddOption(offlineOption);
AddOption(trustedKeysOption);
AddOption(checkPolicyOption);
AddOption(rekorCheckpointOption);
AddOption(verboseOption);
AddOption(outputFormatOption);
AddOption(casRootOption);
this.SetHandler(async (context) =>
var checkPolicyOption = new Option<string?>("--check-policy")
{
var poe = context.ParseResult.GetValueForOption(poeOption)!;
var offline = context.ParseResult.GetValueForOption(offlineOption);
var trustedKeys = context.ParseResult.GetValueForOption(trustedKeysOption);
var checkPolicy = context.ParseResult.GetValueForOption(checkPolicyOption);
var rekorCheckpoint = context.ParseResult.GetValueForOption(rekorCheckpointOption);
var verbose = context.ParseResult.GetValueForOption(verboseOption);
var outputFormat = context.ParseResult.GetValueForOption(outputFormatOption);
var casRoot = context.ParseResult.GetValueForOption(casRootOption);
Description = "Verify policy digest matches expected value (sha256:...)"
};
var rekorCheckpointOption = new Option<string?>("--rekor-checkpoint")
{
Description = "Path to cached Rekor checkpoint file"
};
var verboseOption = new Option<bool>("--verbose") { Description = "Detailed verification output" };
var outputFormatOption = new Option<OutputFormat>("--output") { Description = "Output format" };
outputFormatOption.SetDefaultValue(OutputFormat.Table);
var casRootOption = new Option<string?>("--cas-root") { Description = "Local CAS root directory for offline mode" };
Add(poeOption);
Add(offlineOption);
Add(trustedKeysOption);
Add(checkPolicyOption);
Add(rekorCheckpointOption);
Add(verboseOption);
Add(outputFormatOption);
Add(casRootOption);
SetAction(async (parseResult, _) =>
{
var poe = parseResult.GetValue(poeOption) ?? string.Empty;
var offline = parseResult.GetValue(offlineOption);
var trustedKeys = parseResult.GetValue(trustedKeysOption);
var checkPolicy = parseResult.GetValue(checkPolicyOption);
var rekorCheckpoint = parseResult.GetValue(rekorCheckpointOption);
var verbose = parseResult.GetValue(verboseOption);
var outputFormat = parseResult.GetValue(outputFormatOption);
var casRoot = parseResult.GetValue(casRootOption);
var verifier = new PoEVerifier(Console.WriteLine, verbose);
var result = await verifier.VerifyAsync(new VerifyOptions(
@@ -83,10 +71,9 @@ public class VerifyCommand : Command
RekorCheckpointPath: rekorCheckpoint,
Verbose: verbose,
OutputFormat: outputFormat,
CasRoot: casRoot
));
CasRoot: casRoot));
context.ExitCode = result.IsVerified ? 0 : 1;
return result.IsVerified ? 0 : 1;
});
}
}
@@ -210,7 +197,7 @@ public class PoEVerifier
var policyDigest = poe.Metadata?.Policy?.PolicyDigest;
result.PolicyBindingValid = (policyDigest == options.CheckPolicyDigest);
if (result.PolicyBindingValid)
if (result.PolicyBindingValid == true)
{
_output($" ✓ Policy digest matches: {options.CheckPolicyDigest}");
}

View File

@@ -0,0 +1 @@
global using StellaOps.Cli.Extensions;

View File

@@ -2,9 +2,11 @@
// Sprint: SPRINT_4100_0006_0001 - Crypto Plugin CLI Architecture
// Task: T10 - Crypto profile validation on CLI startup
using Microsoft.Extensions.DependencyInjection;
using Microsoft.Extensions.Logging;
using Microsoft.Extensions.Options;
using StellaOps.Cryptography;
using StellaOps.Cryptography.DependencyInjection;
namespace StellaOps.Cli.Services;

View File

@@ -3,9 +3,10 @@
// Task: T11 - Integration tests for crypto commands
using System.CommandLine;
using System.CommandLine.IO;
using System.CommandLine.Parsing;
using Microsoft.Extensions.DependencyInjection;
using Spectre.Console;
using Spectre.Console.Testing;
using Xunit;
using StellaOps.Cli.Commands;
using StellaOps.Cryptography;
@@ -119,11 +120,21 @@ public class CryptoCommandTests
// Act
var console = new TestConsole();
var exitCode = await command.InvokeAsync("sign --input /nonexistent/file.txt", console);
var originalConsole = AnsiConsole.Console;
int exitCode;
try
{
AnsiConsole.Console = console;
exitCode = await command.Parse("sign --input /nonexistent/file.txt").InvokeAsync(cancellationToken);
}
finally
{
AnsiConsole.Console = originalConsole;
}
// Assert
Assert.NotEqual(0, exitCode);
var output = console.Error.ToString() ?? "";
var output = console.Output.ToString();
Assert.Contains("not found", output, StringComparison.OrdinalIgnoreCase);
}
@@ -143,11 +154,21 @@ public class CryptoCommandTests
// Act
var console = new TestConsole();
var exitCode = await command.InvokeAsync("profiles", console);
var originalConsole = AnsiConsole.Console;
int exitCode;
try
{
AnsiConsole.Console = console;
exitCode = await command.Parse("profiles").InvokeAsync(cancellationToken);
}
finally
{
AnsiConsole.Console = originalConsole;
}
// Assert
Assert.NotEqual(0, exitCode);
var output = console.Out.ToString() ?? "";
var output = console.Output.ToString();
Assert.Contains("No crypto providers available", output, StringComparison.OrdinalIgnoreCase);
}
@@ -167,11 +188,21 @@ public class CryptoCommandTests
// Act
var console = new TestConsole();
var exitCode = await command.InvokeAsync("profiles", console);
var originalConsole = AnsiConsole.Console;
int exitCode;
try
{
AnsiConsole.Console = console;
exitCode = await command.Parse("profiles").InvokeAsync(cancellationToken);
}
finally
{
AnsiConsole.Console = originalConsole;
}
// Assert
Assert.Equal(0, exitCode);
var output = console.Out.ToString() ?? "";
var output = console.Output.ToString();
Assert.Contains("StubCryptoProvider", output);
}
@@ -210,24 +241,18 @@ public class CryptoCommandTests
{
public string Name => "StubCryptoProvider";
public Task<byte[]> SignAsync(byte[] data, CryptoKeyReference keyRef, string algorithmId, CancellationToken ct = default)
{
return Task.FromResult(new byte[] { 0x01, 0x02, 0x03, 0x04 });
}
public bool Supports(CryptoCapability capability, string algorithmId) => true;
public Task<bool> VerifyAsync(byte[] data, byte[] signature, CryptoKeyReference keyRef, string algorithmId, CancellationToken ct = default)
{
return Task.FromResult(true);
}
public IPasswordHasher GetPasswordHasher(string algorithmId) => throw new NotSupportedException();
public Task<byte[]> EncryptAsync(byte[] data, CryptoKeyReference keyRef, string algorithmId, CancellationToken ct = default)
{
throw new NotImplementedException();
}
public ICryptoHasher GetHasher(string algorithmId) => throw new NotSupportedException();
public Task<byte[]> DecryptAsync(byte[] data, CryptoKeyReference keyRef, string algorithmId, CancellationToken ct = default)
{
throw new NotImplementedException();
}
public ICryptoSigner GetSigner(string algorithmId, CryptoKeyReference keyReference) => throw new NotSupportedException();
public void UpsertSigningKey(CryptoSigningKey signingKey) => throw new NotSupportedException();
public bool RemoveSigningKey(string keyId) => false;
public IReadOnlyCollection<CryptoSigningKey> GetSigningKeys() => Array.Empty<CryptoSigningKey>();
}
}

View File

@@ -0,0 +1,351 @@
// -----------------------------------------------------------------------------
// CliExitCodeTests.cs
// Sprint: SPRINT_5100_0009_0010_cli_tests
// Tasks: CLI-5100-001, CLI-5100-002, CLI-5100-003, CLI-5100-004
// Description: Model CLI1 exit code tests for CLI tool
// -----------------------------------------------------------------------------
using FluentAssertions;
using StellaOps.Cli.Commands;
using StellaOps.Cli.Commands.Proof;
using Xunit;
namespace StellaOps.Cli.Tests.ExitCodes;
/// <summary>
/// Exit code tests for the CLI tool.
/// Implements Model CLI1 test requirements:
/// - CLI-5100-001: Successful command → exit 0
/// - CLI-5100-002: User error (bad arguments) → exit 1
/// - CLI-5100-003: System error (API unavailable) → exit 2
/// - CLI-5100-004: Permission denied → exit 3
/// </summary>
[Trait("Category", "Unit")]
[Trait("Category", "ExitCodes")]
public sealed class CliExitCodeTests
{
// CLI-5100-001: Successful command exit codes
[Fact]
public void ProofExitCodes_Success_IsZero()
{
// Assert
ProofExitCodes.Success.Should().Be(0, "successful command should return exit 0");
}
[Fact]
public void OfflineExitCodes_Success_IsZero()
{
// Assert
OfflineExitCodes.Success.Should().Be(0, "successful command should return exit 0");
}
[Fact]
public void DriftExitCodes_Success_IsZero()
{
// Assert
DriftExitCodes.Success.Should().Be(0, "successful command should return exit 0");
}
[Fact]
public void DriftExitCodes_IsSuccess_ReturnsTrueForSuccessCodes()
{
// Assert - success range is 0-9
DriftExitCodes.IsSuccess(0).Should().BeTrue();
DriftExitCodes.IsSuccess(1).Should().BeTrue();
DriftExitCodes.IsSuccess(2).Should().BeTrue();
DriftExitCodes.IsSuccess(9).Should().BeTrue();
DriftExitCodes.IsSuccess(10).Should().BeFalse();
}
// CLI-5100-002: User error exit codes (bad arguments)
[Fact]
public void ProofExitCodes_InputError_IsNonZero()
{
// Assert
ProofExitCodes.InputError.Should().BeGreaterThan(0, "user error should return non-zero exit code");
}
[Fact]
public void ProofExitCodes_PolicyViolation_IsOne()
{
// Assert - policy violation is a user-facing error (not system)
ProofExitCodes.PolicyViolation.Should().Be(1, "policy violation should return exit 1");
}
[Fact]
public void OfflineExitCodes_FileNotFound_IsOne()
{
// Assert - missing file is user error
OfflineExitCodes.FileNotFound.Should().Be(1, "file not found should return exit 1");
}
[Fact]
public void DriftExitCodes_InputError_IsTen()
{
// Assert - input error in drift range
DriftExitCodes.InputError.Should().Be(10, "input error should be in error range");
DriftExitCodes.IsError(DriftExitCodes.InputError).Should().BeTrue();
}
// CLI-5100-003: System error exit codes (API unavailable)
[Fact]
public void ProofExitCodes_SystemError_IsTwo()
{
// Assert
ProofExitCodes.SystemError.Should().Be(2, "system error should return exit 2");
}
[Fact]
public void DriftExitCodes_NetworkError_IsNonZero()
{
// Assert
DriftExitCodes.NetworkError.Should().Be(14, "network error should be non-zero");
DriftExitCodes.IsError(DriftExitCodes.NetworkError).Should().BeTrue();
}
[Fact]
public void DriftExitCodes_StorageError_IsNonZero()
{
// Assert
DriftExitCodes.StorageError.Should().Be(12, "storage error should be non-zero");
DriftExitCodes.IsError(DriftExitCodes.StorageError).Should().BeTrue();
}
[Fact]
public void DriftExitCodes_UnknownError_Is99()
{
// Assert
DriftExitCodes.UnknownError.Should().Be(99, "unknown error should be 99");
}
// CLI-5100-004: Permission/verification denied exit codes
[Fact]
public void ProofExitCodes_VerificationFailed_IsThree()
{
// Assert
ProofExitCodes.VerificationFailed.Should().Be(3, "verification failed should return exit 3");
}
[Fact]
public void ProofExitCodes_TrustAnchorError_IsFour()
{
// Assert
ProofExitCodes.TrustAnchorError.Should().Be(4, "trust anchor error should return exit 4");
}
[Fact]
public void ProofExitCodes_KeyRevoked_IsSix()
{
// Assert
ProofExitCodes.KeyRevoked.Should().Be(6, "key revoked should return exit 6");
}
[Fact]
public void OfflineExitCodes_SignatureFailure_IsThree()
{
// Assert
OfflineExitCodes.SignatureFailure.Should().Be(3, "signature failure should return exit 3");
}
[Fact]
public void OfflineExitCodes_DsseVerificationFailed_IsFive()
{
// Assert
OfflineExitCodes.DsseVerificationFailed.Should().Be(5, "DSSE verification failure should return exit 5");
}
[Fact]
public void OfflineExitCodes_PolicyDenied_IsNine()
{
// Assert
OfflineExitCodes.PolicyDenied.Should().Be(9, "policy denied should return exit 9");
}
// Exit code naming and description tests
[Fact]
public void DriftExitCodes_GetName_ReturnsCorrectNames()
{
// Assert
DriftExitCodes.GetName(DriftExitCodes.Success).Should().Be("SUCCESS");
DriftExitCodes.GetName(DriftExitCodes.InputError).Should().Be("INPUT_ERROR");
DriftExitCodes.GetName(DriftExitCodes.NetworkError).Should().Be("NETWORK_ERROR");
DriftExitCodes.GetName(999).Should().Be("UNKNOWN_ERROR");
}
[Fact]
public void DriftExitCodes_GetDescription_ReturnsNonEmptyDescriptions()
{
// Assert - all exit codes should have descriptions
DriftExitCodes.GetDescription(DriftExitCodes.Success).Should().NotBeNullOrEmpty();
DriftExitCodes.GetDescription(DriftExitCodes.InputError).Should().NotBeNullOrEmpty();
DriftExitCodes.GetDescription(DriftExitCodes.NetworkError).Should().NotBeNullOrEmpty();
DriftExitCodes.GetDescription(999).Should().NotBeNullOrEmpty();
}
[Fact]
public void ProofExitCodes_GetDescription_ReturnsNonEmptyDescriptions()
{
// Assert - all exit codes should have descriptions
ProofExitCodes.GetDescription(ProofExitCodes.Success).Should().NotBeNullOrEmpty();
ProofExitCodes.GetDescription(ProofExitCodes.PolicyViolation).Should().NotBeNullOrEmpty();
ProofExitCodes.GetDescription(ProofExitCodes.SystemError).Should().NotBeNullOrEmpty();
ProofExitCodes.GetDescription(999).Should().NotBeNullOrEmpty();
}
// Exit code range consistency tests
[Fact]
public void DriftExitCodes_SuccessRange_IsZeroToNine()
{
// Assert - verify success range boundaries
DriftExitCodes.IsSuccess(0).Should().BeTrue("0 should be success");
DriftExitCodes.IsSuccess(9).Should().BeTrue("9 should be success");
DriftExitCodes.IsSuccess(10).Should().BeFalse("10 should not be success");
DriftExitCodes.IsSuccess(-1).Should().BeFalse("negative should not be success");
}
[Fact]
public void DriftExitCodes_ErrorRange_IsTenOrHigher()
{
// Assert - verify error range boundaries
DriftExitCodes.IsError(9).Should().BeFalse("9 should not be error");
DriftExitCodes.IsError(10).Should().BeTrue("10 should be error");
DriftExitCodes.IsError(99).Should().BeTrue("99 should be error");
}
[Fact]
public void DriftExitCodes_BlockingCodes_AreCorrect()
{
// Assert - blocking codes should stop CI/CD
DriftExitCodes.IsBlocking(DriftExitCodes.KevReachable).Should().BeTrue();
DriftExitCodes.IsBlocking(DriftExitCodes.AffectedReachable).Should().BeTrue();
DriftExitCodes.IsBlocking(DriftExitCodes.PolicyBlocked).Should().BeTrue();
// Non-blocking codes
DriftExitCodes.IsBlocking(DriftExitCodes.Success).Should().BeFalse();
DriftExitCodes.IsBlocking(DriftExitCodes.SuccessWithInfoDrift).Should().BeFalse();
}
// POSIX convention tests
[Fact]
public void AllExitCodes_FollowPosixConvention_ZeroIsSuccess()
{
// Assert - verify POSIX convention across all exit code classes
ProofExitCodes.Success.Should().Be(0);
OfflineExitCodes.Success.Should().Be(0);
DriftExitCodes.Success.Should().Be(0);
}
[Fact]
public void OfflineExitCodes_Cancelled_Is130()
{
// Assert - SIGINT standard exit code
OfflineExitCodes.Cancelled.Should().Be(130, "SIGINT cancellation should be 128+2=130");
}
// Exit code uniqueness tests
[Fact]
public void ProofExitCodes_AllCodesAreDistinct()
{
// Arrange
var codes = new[]
{
ProofExitCodes.Success,
ProofExitCodes.PolicyViolation,
ProofExitCodes.SystemError,
ProofExitCodes.VerificationFailed,
ProofExitCodes.TrustAnchorError,
ProofExitCodes.RekorVerificationFailed,
ProofExitCodes.KeyRevoked,
ProofExitCodes.OfflineModeError,
ProofExitCodes.InputError
};
// Assert
codes.Should().OnlyHaveUniqueItems("all exit codes should be distinct");
}
[Fact]
public void OfflineExitCodes_AllCodesAreDistinct()
{
// Arrange
var codes = new[]
{
OfflineExitCodes.Success,
OfflineExitCodes.FileNotFound,
OfflineExitCodes.ChecksumMismatch,
OfflineExitCodes.SignatureFailure,
OfflineExitCodes.FormatError,
OfflineExitCodes.DsseVerificationFailed,
OfflineExitCodes.RekorVerificationFailed,
OfflineExitCodes.ImportFailed,
OfflineExitCodes.VersionNonMonotonic,
OfflineExitCodes.PolicyDenied,
OfflineExitCodes.SelftestFailed,
OfflineExitCodes.ValidationFailed,
OfflineExitCodes.VerificationFailed,
OfflineExitCodes.PolicyLoadFailed,
OfflineExitCodes.Cancelled
};
// Assert
codes.Should().OnlyHaveUniqueItems("all exit codes should be distinct");
}
// DriftCommandResult tests
[Fact]
public void DriftCommandResult_CanBeCreated_WithRequiredProperties()
{
// Arrange & Act
var result = new DriftCommandResult
{
ExitCode = DriftExitCodes.Success,
Message = "No drift detected"
};
// Assert
result.ExitCode.Should().Be(0);
result.Message.Should().Be("No drift detected");
result.DeltaReachable.Should().Be(0);
result.DeltaUnreachable.Should().Be(0);
result.HasKevReachable.Should().BeFalse();
result.BlockedBy.Should().BeNull();
result.Suggestion.Should().BeNull();
result.SarifOutputPath.Should().BeNull();
}
[Fact]
public void DriftCommandResult_CanBeCreated_WithAllProperties()
{
// Arrange & Act
var result = new DriftCommandResult
{
ExitCode = DriftExitCodes.KevReachable,
Message = "KEV now reachable",
DeltaReachable = 5,
DeltaUnreachable = 2,
HasKevReachable = true,
BlockedBy = "kev-policy",
Suggestion = "Upgrade vulnerable package",
SarifOutputPath = "/tmp/results.sarif"
};
// Assert
result.ExitCode.Should().Be(DriftExitCodes.KevReachable);
result.Message.Should().Be("KEV now reachable");
result.DeltaReachable.Should().Be(5);
result.DeltaUnreachable.Should().Be(2);
result.HasKevReachable.Should().BeTrue();
result.BlockedBy.Should().Be("kev-policy");
result.Suggestion.Should().Be("Upgrade vulnerable package");
result.SarifOutputPath.Should().Be("/tmp/results.sarif");
}
}

View File

@@ -23,8 +23,12 @@
</ItemGroup>
<ItemGroup>
<PackageReference Include="FluentAssertions" Version="6.12.0" />
<PackageReference Include="Microsoft.NET.Test.Sdk" Version="17.14.0" />
<PackageReference Include="Moq" Version="4.20.72" />
<PackageReference Include="Spectre.Console.Testing" Version="0.48.0" />
<PackageReference Include="xunit" Version="2.9.2" />
<PackageReference Include="xunit.runner.visualstudio" Version="2.8.2" />
<ProjectReference Include="../../StellaOps.Cli/StellaOps.Cli.csproj" />
<ProjectReference Include="../../__Libraries/StellaOps.Cli.Plugins.NonCore/StellaOps.Cli.Plugins.NonCore.csproj" />
<ProjectReference Include="../../../__Libraries/StellaOps.Configuration/StellaOps.Configuration.csproj" />