136 lines
4.2 KiB
Go
136 lines
4.2 KiB
Go
// Copyright 2017 clair authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package debian
|
|
|
|
import (
|
|
"os"
|
|
"path/filepath"
|
|
"runtime"
|
|
"testing"
|
|
|
|
"github.com/coreos/clair/database"
|
|
"github.com/coreos/clair/ext/versionfmt"
|
|
"github.com/coreos/clair/ext/versionfmt/dpkg"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestDebianParser(t *testing.T) {
|
|
_, filename, _, _ := runtime.Caller(0)
|
|
|
|
// Test parsing testdata/fetcher_debian_test.json
|
|
testFile, _ := os.Open(filepath.Join(filepath.Dir(filename)) + "/testdata/fetcher_debian_test.json")
|
|
response, err := buildResponse(testFile, "")
|
|
if assert.Nil(t, err) && assert.Len(t, response.Vulnerabilities, 3) {
|
|
for _, vulnerability := range response.Vulnerabilities {
|
|
if vulnerability.Name == "CVE-2015-1323" {
|
|
assert.Equal(t, "https://security-tracker.debian.org/tracker/CVE-2015-1323", vulnerability.Link)
|
|
assert.Equal(t, database.LowSeverity, vulnerability.Severity)
|
|
assert.Equal(t, "This vulnerability is not very dangerous.", vulnerability.Description)
|
|
|
|
expectedFeatureVersions := []database.FeatureVersion{
|
|
{
|
|
Feature: database.Feature{
|
|
Namespace: database.Namespace{
|
|
Name: "debian:8",
|
|
VersionFormat: dpkg.ParserName,
|
|
},
|
|
Name: "aptdaemon",
|
|
},
|
|
Version: versionfmt.MaxVersion,
|
|
},
|
|
{
|
|
Feature: database.Feature{
|
|
Namespace: database.Namespace{
|
|
Name: "debian:unstable",
|
|
VersionFormat: dpkg.ParserName,
|
|
},
|
|
Name: "aptdaemon",
|
|
},
|
|
Version: "1.1.1+bzr982-1",
|
|
},
|
|
}
|
|
|
|
for _, expectedFeatureVersion := range expectedFeatureVersions {
|
|
assert.Contains(t, vulnerability.FixedIn, expectedFeatureVersion)
|
|
}
|
|
} else if vulnerability.Name == "CVE-2003-0779" {
|
|
assert.Equal(t, "https://security-tracker.debian.org/tracker/CVE-2003-0779", vulnerability.Link)
|
|
assert.Equal(t, database.HighSeverity, vulnerability.Severity)
|
|
assert.Equal(t, "But this one is very dangerous.", vulnerability.Description)
|
|
|
|
expectedFeatureVersions := []database.FeatureVersion{
|
|
{
|
|
Feature: database.Feature{
|
|
Namespace: database.Namespace{
|
|
Name: "debian:8",
|
|
VersionFormat: dpkg.ParserName,
|
|
},
|
|
Name: "aptdaemon",
|
|
},
|
|
Version: "0.7.0",
|
|
},
|
|
{
|
|
Feature: database.Feature{
|
|
Namespace: database.Namespace{
|
|
Name: "debian:unstable",
|
|
VersionFormat: dpkg.ParserName,
|
|
},
|
|
Name: "aptdaemon",
|
|
},
|
|
Version: "0.7.0",
|
|
},
|
|
{
|
|
Feature: database.Feature{
|
|
Namespace: database.Namespace{
|
|
Name: "debian:8",
|
|
VersionFormat: dpkg.ParserName,
|
|
},
|
|
Name: "asterisk",
|
|
},
|
|
Version: "0.5.56",
|
|
},
|
|
}
|
|
|
|
for _, expectedFeatureVersion := range expectedFeatureVersions {
|
|
assert.Contains(t, vulnerability.FixedIn, expectedFeatureVersion)
|
|
}
|
|
} else if vulnerability.Name == "CVE-2013-2685" {
|
|
assert.Equal(t, "https://security-tracker.debian.org/tracker/CVE-2013-2685", vulnerability.Link)
|
|
assert.Equal(t, database.NegligibleSeverity, vulnerability.Severity)
|
|
assert.Equal(t, "Un-affected packages.", vulnerability.Description)
|
|
|
|
expectedFeatureVersions := []database.FeatureVersion{
|
|
{
|
|
Feature: database.Feature{
|
|
Namespace: database.Namespace{
|
|
Name: "debian:8",
|
|
VersionFormat: dpkg.ParserName,
|
|
},
|
|
Name: "asterisk",
|
|
},
|
|
Version: versionfmt.MinVersion,
|
|
},
|
|
}
|
|
|
|
for _, expectedFeatureVersion := range expectedFeatureVersions {
|
|
assert.Contains(t, vulnerability.FixedIn, expectedFeatureVersion)
|
|
}
|
|
} else {
|
|
assert.Fail(t, "Wrong vulnerability name: ", vulnerability.ID)
|
|
}
|
|
}
|
|
}
|
|
}
|