b8ceb0c461
We extracted oval parser from rhel and used that for opensuse and SUSE Linux Enterpise Signed-off-by: Thomas Boerger <tboerger@suse.de> Signed-off-by: Jordi Massaguer Pla <jmassaguerpla@suse.de>
67 lines
2.3 KiB
Go
67 lines
2.3 KiB
Go
// Copyright 2015 clair authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package opensuse
|
|
|
|
import (
|
|
"os"
|
|
"path/filepath"
|
|
"runtime"
|
|
"testing"
|
|
|
|
"github.com/coreos/clair/database"
|
|
"github.com/coreos/clair/utils/oval"
|
|
"github.com/coreos/clair/utils/types"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestOpenSUSEParser(t *testing.T) {
|
|
_, filename, _, _ := runtime.Caller(0)
|
|
path := filepath.Join(filepath.Dir(filename))
|
|
|
|
// Test parsing testdata/fetcher_opensuse_test.1.xml
|
|
testFile, _ := os.Open(path + "/testdata/fetcher_opensuse_test.1.xml")
|
|
ov := &oval.OvalFetcher{OsInfo: &OpenSUSEInfo{}}
|
|
vulnerabilities, err := ov.ParseOval(testFile)
|
|
if assert.Nil(t, err) && assert.Len(t, vulnerabilities, 1) {
|
|
assert.Equal(t, "CVE-2012-2150", vulnerabilities[0].Name)
|
|
assert.Equal(t, "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2150", vulnerabilities[0].Link)
|
|
// Severity is not defined for openSUSE
|
|
assert.Equal(t, types.Unknown, vulnerabilities[0].Severity)
|
|
assert.Equal(t, `xfs_metadump in xfsprogs before 3.2.4 does not properly obfuscate file data, which allows remote attackers to obtain sensitive information by reading a generated image.`, vulnerabilities[0].Description)
|
|
|
|
expectedFeatureVersions := []database.FeatureVersion{
|
|
{
|
|
Feature: database.Feature{
|
|
Namespace: database.Namespace{Name: "opensuse:42.1"},
|
|
Name: "xfsprogs",
|
|
},
|
|
Version: types.NewVersionUnsafe("3.2.1-5.1"),
|
|
},
|
|
{
|
|
Feature: database.Feature{
|
|
Namespace: database.Namespace{Name: "opensuse:42.1"},
|
|
Name: "xfsprogs-devel",
|
|
},
|
|
Version: types.NewVersionUnsafe("3.2.1-5.1"),
|
|
},
|
|
}
|
|
|
|
for _, expectedFeatureVersion := range expectedFeatureVersions {
|
|
assert.Contains(t, vulnerabilities[0].FixedIn, expectedFeatureVersion)
|
|
}
|
|
}
|
|
|
|
}
|