2015-11-13 19:11:28 +00:00
// Copyright 2015 clair authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package fetchers
import (
"os"
"path"
"runtime"
"testing"
"github.com/coreos/clair/database"
"github.com/coreos/clair/utils/types"
"github.com/stretchr/testify/assert"
)
func TestRHELParser ( t * testing . T ) {
_ , filename , _ , _ := runtime . Caller ( 0 )
path := path . Join ( path . Dir ( filename ) )
// Test parsing testdata/fetcher_rhel_test.1.xml
testFile , _ := os . Open ( path + "/testdata/fetcher_rhel_test.1.xml" )
2015-12-01 19:58:17 +00:00
vulnerabilities , packages , err := parseRHSA ( testFile )
2015-11-13 19:11:28 +00:00
if assert . Nil ( t , err ) && assert . Len ( t , vulnerabilities , 1 ) {
assert . Equal ( t , "RHSA-2015:1193" , vulnerabilities [ 0 ] . ID )
assert . Equal ( t , "https://rhn.redhat.com/errata/RHSA-2015-1193.html" , vulnerabilities [ 0 ] . Link )
assert . Equal ( t , types . Medium , vulnerabilities [ 0 ] . Priority )
assert . Equal ( t , ` Xerces-C is a validating XML parser written in a portable subset of C++. A flaw was found in the way the Xerces-C XML parser processed certain XML documents. A remote attacker could provide specially crafted XML input that, when parsed by an application using Xerces-C, would cause that application to crash. ` , vulnerabilities [ 0 ] . Description )
2015-12-01 19:58:17 +00:00
expectedPackages := [ ] * database . Package {
& database . Package {
2015-11-13 19:11:28 +00:00
OS : "centos:7" ,
Name : "xerces-c" ,
Version : types . NewVersionUnsafe ( "3.1.1-7.el7_1" ) ,
2015-12-01 19:58:17 +00:00
} ,
& database . Package {
2015-11-13 19:11:28 +00:00
OS : "centos:7" ,
Name : "xerces-c-devel" ,
Version : types . NewVersionUnsafe ( "3.1.1-7.el7_1" ) ,
2015-12-01 19:58:17 +00:00
} ,
& database . Package {
2015-11-13 19:11:28 +00:00
OS : "centos:7" ,
Name : "xerces-c-doc" ,
Version : types . NewVersionUnsafe ( "3.1.1-7.el7_1" ) ,
2015-12-01 19:58:17 +00:00
} ,
2015-11-13 19:11:28 +00:00
}
2015-12-01 19:58:17 +00:00
for _ , expectedPackage := range expectedPackages {
assert . Contains ( t , packages , expectedPackage )
assert . Contains ( t , vulnerabilities [ 0 ] . FixedInNodes , expectedPackage . GetNode ( ) )
}
2015-11-13 19:11:28 +00:00
}
// Test parsing testdata/fetcher_rhel_test.2.xml
testFile , _ = os . Open ( path + "/testdata/fetcher_rhel_test.2.xml" )
2015-12-01 19:58:17 +00:00
vulnerabilities , packages , err = parseRHSA ( testFile )
2015-11-13 19:11:28 +00:00
if assert . Nil ( t , err ) && assert . Len ( t , vulnerabilities , 1 ) {
assert . Equal ( t , "RHSA-2015:1207" , vulnerabilities [ 0 ] . ID )
assert . Equal ( t , "https://rhn.redhat.com/errata/RHSA-2015-1207.html" , vulnerabilities [ 0 ] . Link )
assert . Equal ( t , types . Critical , vulnerabilities [ 0 ] . Priority )
assert . Equal ( t , ` Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. ` , vulnerabilities [ 0 ] . Description )
2015-12-01 19:58:17 +00:00
expectedPackages := [ ] * database . Package {
& database . Package {
2015-11-13 19:11:28 +00:00
OS : "centos:6" ,
Name : "firefox" ,
Version : types . NewVersionUnsafe ( "38.1.0-1.el6_6" ) ,
2015-12-01 19:58:17 +00:00
} ,
& database . Package {
2015-11-13 19:11:28 +00:00
OS : "centos:7" ,
Name : "firefox" ,
Version : types . NewVersionUnsafe ( "38.1.0-1.el7_1" ) ,
2015-12-01 19:58:17 +00:00
} ,
2015-11-13 19:11:28 +00:00
}
2015-12-01 19:58:17 +00:00
for _ , expectedPackage := range expectedPackages {
assert . Contains ( t , packages , expectedPackage )
assert . Contains ( t , vulnerabilities [ 0 ] . FixedInNodes , expectedPackage . GetNode ( ) )
}
2015-11-13 19:11:28 +00:00
}
}