// Copyright 2016 clair authors // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package debian import ( "os" "path/filepath" "runtime" "testing" "github.com/coreos/clair/database" "github.com/coreos/clair/ext/versionfmt" "github.com/coreos/clair/ext/versionfmt/dpkg" "github.com/coreos/clair/utils/types" "github.com/stretchr/testify/assert" ) func TestDebianParser(t *testing.T) { _, filename, _, _ := runtime.Caller(0) // Test parsing testdata/fetcher_debian_test.json testFile, _ := os.Open(filepath.Join(filepath.Dir(filename)) + "/testdata/fetcher_debian_test.json") response, err := buildResponse(testFile, "") if assert.Nil(t, err) && assert.Len(t, response.Vulnerabilities, 3) { for _, vulnerability := range response.Vulnerabilities { if vulnerability.Name == "CVE-2015-1323" { assert.Equal(t, "https://security-tracker.debian.org/tracker/CVE-2015-1323", vulnerability.Link) assert.Equal(t, types.Low, vulnerability.Severity) assert.Equal(t, "This vulnerability is not very dangerous.", vulnerability.Description) expectedFeatureVersions := []database.FeatureVersion{ { Feature: database.Feature{ Namespace: database.Namespace{ Name: "debian:8", VersionFormat: dpkg.ParserName, }, Name: "aptdaemon", }, Version: versionfmt.MaxVersion, }, { Feature: database.Feature{ Namespace: database.Namespace{ Name: "debian:unstable", VersionFormat: dpkg.ParserName, }, Name: "aptdaemon", }, Version: "1.1.1+bzr982-1", }, } for _, expectedFeatureVersion := range expectedFeatureVersions { assert.Contains(t, vulnerability.FixedIn, expectedFeatureVersion) } } else if vulnerability.Name == "CVE-2003-0779" { assert.Equal(t, "https://security-tracker.debian.org/tracker/CVE-2003-0779", vulnerability.Link) assert.Equal(t, types.High, vulnerability.Severity) assert.Equal(t, "But this one is very dangerous.", vulnerability.Description) expectedFeatureVersions := []database.FeatureVersion{ { Feature: database.Feature{ Namespace: database.Namespace{ Name: "debian:8", VersionFormat: dpkg.ParserName, }, Name: "aptdaemon", }, Version: "0.7.0", }, { Feature: database.Feature{ Namespace: database.Namespace{ Name: "debian:unstable", VersionFormat: dpkg.ParserName, }, Name: "aptdaemon", }, Version: "0.7.0", }, { Feature: database.Feature{ Namespace: database.Namespace{ Name: "debian:8", VersionFormat: dpkg.ParserName, }, Name: "asterisk", }, Version: "0.5.56", }, } for _, expectedFeatureVersion := range expectedFeatureVersions { assert.Contains(t, vulnerability.FixedIn, expectedFeatureVersion) } } else if vulnerability.Name == "CVE-2013-2685" { assert.Equal(t, "https://security-tracker.debian.org/tracker/CVE-2013-2685", vulnerability.Link) assert.Equal(t, types.Negligible, vulnerability.Severity) assert.Equal(t, "Un-affected packages.", vulnerability.Description) expectedFeatureVersions := []database.FeatureVersion{ { Feature: database.Feature{ Namespace: database.Namespace{ Name: "debian:8", VersionFormat: dpkg.ParserName, }, Name: "asterisk", }, Version: versionfmt.MinVersion, }, } for _, expectedFeatureVersion := range expectedFeatureVersions { assert.Contains(t, vulnerability.FixedIn, expectedFeatureVersion) } } else { assert.Fail(t, "Wrong vulnerability name: ", vulnerability.ID) } } } }