Files
trivy/pkg/detector/library/bundler/compare_test.go
Teppei Fukuda 8b3b5d0290 feat: support plugins (#878)
* fix(log): set the default logger

* feat: support plugins

* feat(plugin): add run command

* feat(plugin): add uninstall command

* test(plugin): add tests

* chore(ci): pin go version

* chore(ci): disable G204

* refactor: fix lint issues

* feat(plugin): skip downloading installed plugins

* feat: add TRIVY_RUN_AS_PLUGIN

* support Ubuntu 20.10 (#876)

* docs(README): update ubuntu versions (#877)

* add MkDocs implementation (#870)

* mkdocs: add top level nav

* mkdocs: add installation nav

* mkdocs: add quick-start nav

* mkdocs: add examples nav

* mkdocs: add CI nav

* mkdocs: add vuln-detection nav

* mkdocs: add comparison nav

* mkdocs: add usage nav

* mkdocs: add migration nav

* mkdocs: add FAQ nav

* mkdocs: add mkdocs.yml

* mkdocs: add github workflow

* docs: update documents

* fix links

* chore(ci): use ORG_GITHUB_TOKEN

* chore(mkdocs): use mike

* chore(ci): support dev

* chore(ci): documentation test

Co-authored-by: knqyf263 <knqyf263@gmail.com>

* docs: add plugins

* chore: remove stale workflow

* refactor: fix lint issues

Co-authored-by: Huang Huang <mozillazg101@gmail.com>
Co-authored-by: aprp <doelaudi@gmail.com>
2021-03-10 21:44:08 +02:00

103 lines
2.0 KiB
Go

package bundler_test
import (
"testing"
"github.com/stretchr/testify/assert"
"github.com/aquasecurity/trivy-db/pkg/types"
"github.com/aquasecurity/trivy/pkg/detector/library/bundler"
)
func TestRubyGemsComparer_IsVulnerable(t *testing.T) {
type args struct {
currentVersion string
advisory types.Advisory
}
tests := []struct {
name string
args args
want bool
}{
{
name: "happy path",
args: args{
currentVersion: "1.2.3",
advisory: types.Advisory{
PatchedVersions: []string{">=1.2.0"},
},
},
want: false,
},
{
name: "pre-release",
args: args{
currentVersion: "1.2.3.a",
advisory: types.Advisory{
PatchedVersions: []string{">=1.2.3"},
},
},
want: true,
},
{
name: "pre-release without dot",
args: args{
currentVersion: "4.1a",
advisory: types.Advisory{
UnaffectedVersions: []string{"< 4.2b1"},
},
},
want: false,
},
{
// https://github.com/aquasecurity/trivy/issues/108
name: "hyphen",
args: args{
currentVersion: "1.9.25-x86-mingw32",
advisory: types.Advisory{
PatchedVersions: []string{">=1.9.24"},
},
},
want: false,
},
{
// https://github.com/aquasecurity/trivy/issues/108
name: "pessimistic",
args: args{
currentVersion: "1.8.6-java",
advisory: types.Advisory{
PatchedVersions: []string{"~> 1.5.5", "~> 1.6.8", ">= 1.7.7"},
},
},
want: false,
},
{
name: "invalid version",
args: args{
currentVersion: "1.2..4",
advisory: types.Advisory{
PatchedVersions: []string{">=1.2.3"},
},
},
want: false,
},
{
name: "invalid constraint",
args: args{
currentVersion: "1.2.4",
advisory: types.Advisory{
PatchedVersions: []string{"!1.2.0"},
},
},
want: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
r := bundler.RubyGemsComparer{}
got := r.IsVulnerable(tt.args.currentVersion, tt.args.advisory)
assert.Equal(t, tt.want, got)
})
}
}