mirror of
https://github.com/aquasecurity/trivy.git
synced 2025-12-22 07:10:41 -08:00
491 lines
14 KiB
Go
491 lines
14 KiB
Go
package rpc
|
|
|
|
import (
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"google.golang.org/protobuf/types/known/timestamppb"
|
|
|
|
ftypes "github.com/aquasecurity/fanal/types"
|
|
ptypes "github.com/aquasecurity/go-dep-parser/pkg/types"
|
|
dbTypes "github.com/aquasecurity/trivy-db/pkg/types"
|
|
"github.com/aquasecurity/trivy-db/pkg/vulnsrc/vulnerability"
|
|
"github.com/aquasecurity/trivy/pkg/report"
|
|
"github.com/aquasecurity/trivy/pkg/types"
|
|
"github.com/aquasecurity/trivy/rpc/common"
|
|
"github.com/aquasecurity/trivy/rpc/scanner"
|
|
)
|
|
|
|
func TestConvertToRpcPkgs(t *testing.T) {
|
|
type args struct {
|
|
pkgs []ftypes.Package
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want []*common.Package
|
|
}{
|
|
{
|
|
name: "happy path",
|
|
args: args{
|
|
pkgs: []ftypes.Package{
|
|
{
|
|
Name: "binary",
|
|
Version: "1.2.3",
|
|
Release: "1",
|
|
Epoch: 2,
|
|
Arch: "x86_64",
|
|
SrcName: "src",
|
|
SrcVersion: "1.2.3",
|
|
SrcRelease: "1",
|
|
SrcEpoch: 2,
|
|
License: "MIT",
|
|
Layer: ftypes.Layer{
|
|
Digest: "sha256:6a428f9f83b0a29f1fdd2ccccca19a9bab805a925b8eddf432a5a3d3da04afbc",
|
|
DiffID: "sha256:39982b2a789afc156fff00c707d0ff1c6ab4af8f1666a8df4787714059ce24e7",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
want: []*common.Package{
|
|
{
|
|
Name: "binary",
|
|
Version: "1.2.3",
|
|
Release: "1",
|
|
Epoch: 2,
|
|
Arch: "x86_64",
|
|
SrcName: "src",
|
|
SrcVersion: "1.2.3",
|
|
SrcRelease: "1",
|
|
SrcEpoch: 2,
|
|
License: "MIT",
|
|
Layer: &common.Layer{
|
|
Digest: "sha256:6a428f9f83b0a29f1fdd2ccccca19a9bab805a925b8eddf432a5a3d3da04afbc",
|
|
DiffId: "sha256:39982b2a789afc156fff00c707d0ff1c6ab4af8f1666a8df4787714059ce24e7",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got := ConvertToRPCPkgs(tt.args.pkgs)
|
|
assert.Equal(t, tt.want, got, tt.name)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestConvertFromRpcPkgs(t *testing.T) {
|
|
type args struct {
|
|
rpcPkgs []*common.Package
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want []ftypes.Package
|
|
}{
|
|
{
|
|
args: args{
|
|
rpcPkgs: []*common.Package{
|
|
{
|
|
Name: "binary",
|
|
Version: "1.2.3",
|
|
Release: "1",
|
|
Epoch: 2,
|
|
Arch: "x86_64",
|
|
SrcName: "src",
|
|
SrcVersion: "1.2.3",
|
|
SrcRelease: "1",
|
|
SrcEpoch: 2,
|
|
License: "MIT",
|
|
Layer: &common.Layer{
|
|
Digest: "sha256:6a428f9f83b0a29f1fdd2ccccca19a9bab805a925b8eddf432a5a3d3da04afbc",
|
|
DiffId: "sha256:39982b2a789afc156fff00c707d0ff1c6ab4af8f1666a8df4787714059ce24e7",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
want: []ftypes.Package{
|
|
{
|
|
Name: "binary",
|
|
Version: "1.2.3",
|
|
Release: "1",
|
|
Epoch: 2,
|
|
Arch: "x86_64",
|
|
SrcName: "src",
|
|
SrcVersion: "1.2.3",
|
|
SrcRelease: "1",
|
|
SrcEpoch: 2,
|
|
License: "MIT",
|
|
Layer: ftypes.Layer{
|
|
Digest: "sha256:6a428f9f83b0a29f1fdd2ccccca19a9bab805a925b8eddf432a5a3d3da04afbc",
|
|
DiffID: "sha256:39982b2a789afc156fff00c707d0ff1c6ab4af8f1666a8df4787714059ce24e7",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got := ConvertFromRPCPkgs(tt.args.rpcPkgs)
|
|
assert.Equal(t, tt.want, got, tt.name)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestConvertFromRpcLibraries(t *testing.T) {
|
|
type args struct {
|
|
rpcLibs []*common.Library
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want []ftypes.Package
|
|
}{
|
|
{
|
|
name: "happy path",
|
|
args: args{
|
|
rpcLibs: []*common.Library{
|
|
{Name: "foo", Version: "1.2.3"},
|
|
{Name: "bar", Version: "4.5.6"},
|
|
},
|
|
},
|
|
want: []ftypes.Package{
|
|
{Name: "foo", Version: "1.2.3"},
|
|
{Name: "bar", Version: "4.5.6"},
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got := ConvertFromRPCLibraries(tt.args.rpcLibs)
|
|
assert.Equal(t, got, tt.want, tt.name)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestConvertToRpcLibraries(t *testing.T) {
|
|
type args struct {
|
|
libs []ptypes.Library
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want []*common.Library
|
|
}{
|
|
{
|
|
name: "happy path",
|
|
args: args{
|
|
libs: []ptypes.Library{
|
|
{Name: "foo", Version: "1.2.3"},
|
|
{Name: "bar", Version: "4.5.6"},
|
|
},
|
|
},
|
|
want: []*common.Library{
|
|
{Name: "foo", Version: "1.2.3"},
|
|
{Name: "bar", Version: "4.5.6"},
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got := ConvertToRPCLibraries(tt.args.libs)
|
|
assert.Equal(t, got, tt.want, tt.name)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestConvertToRpcVulns(t *testing.T) {
|
|
fixedPublishedDate := time.Unix(1257894000, 0)
|
|
fixedLastModifiedDate := time.Unix(1257894010, 0)
|
|
|
|
type args struct {
|
|
vulns []types.DetectedVulnerability
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want []*common.Vulnerability
|
|
}{
|
|
{
|
|
name: "happy path",
|
|
args: args{
|
|
vulns: []types.DetectedVulnerability{
|
|
{
|
|
VulnerabilityID: "CVE-2019-0001",
|
|
PkgName: "foo",
|
|
InstalledVersion: "1.2.3",
|
|
FixedVersion: "1.2.4",
|
|
Vulnerability: dbTypes.Vulnerability{
|
|
Title: "DoS",
|
|
Description: "Denial of Service",
|
|
Severity: "MEDIUM",
|
|
CVSS: dbTypes.VendorCVSS{
|
|
"redhat": {
|
|
V2Vector: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
V3Vector: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
V2Score: 7.2,
|
|
V3Score: 7.8,
|
|
},
|
|
},
|
|
References: []string{"http://example.com"},
|
|
PublishedDate: &fixedPublishedDate,
|
|
LastModifiedDate: &fixedLastModifiedDate,
|
|
},
|
|
Layer: ftypes.Layer{
|
|
Digest: "sha256:154ad0735c360b212b167f424d33a62305770a1fcfb6363882f5c436cfbd9812",
|
|
DiffID: "sha256:b2a1a2d80bf0c747a4f6b0ca6af5eef23f043fcdb1ed4f3a3e750aef2dc68079",
|
|
},
|
|
PrimaryURL: "https://avd.aquasec.com/nvd/CVE-2019-0001",
|
|
},
|
|
},
|
|
},
|
|
want: []*common.Vulnerability{
|
|
{
|
|
VulnerabilityId: "CVE-2019-0001",
|
|
PkgName: "foo",
|
|
InstalledVersion: "1.2.3",
|
|
FixedVersion: "1.2.4",
|
|
Title: "DoS",
|
|
Description: "Denial of Service",
|
|
Severity: common.Severity_MEDIUM,
|
|
Cvss: map[string]*common.CVSS{
|
|
"redhat": {
|
|
V2Vector: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
V3Vector: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
V2Score: 7.2,
|
|
V3Score: 7.8,
|
|
},
|
|
},
|
|
References: []string{"http://example.com"},
|
|
Layer: &common.Layer{
|
|
Digest: "sha256:154ad0735c360b212b167f424d33a62305770a1fcfb6363882f5c436cfbd9812",
|
|
DiffId: "sha256:b2a1a2d80bf0c747a4f6b0ca6af5eef23f043fcdb1ed4f3a3e750aef2dc68079",
|
|
},
|
|
PrimaryUrl: "https://avd.aquasec.com/nvd/CVE-2019-0001",
|
|
PublishedDate: timestamppb.New(fixedPublishedDate),
|
|
LastModifiedDate: timestamppb.New(fixedLastModifiedDate),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "invalid severity",
|
|
args: args{
|
|
vulns: []types.DetectedVulnerability{
|
|
{
|
|
VulnerabilityID: "CVE-2019-0002",
|
|
PkgName: "bar",
|
|
InstalledVersion: "1.2.3",
|
|
FixedVersion: "1.2.4",
|
|
Vulnerability: dbTypes.Vulnerability{
|
|
Title: "DoS",
|
|
Description: "Denial of Service",
|
|
Severity: "INVALID",
|
|
References: []string{"http://example.com"},
|
|
},
|
|
Layer: ftypes.Layer{
|
|
Digest: "sha256:154ad0735c360b212b167f424d33a62305770a1fcfb6363882f5c436cfbd9812",
|
|
DiffID: "sha256:b2a1a2d80bf0c747a4f6b0ca6af5eef23f043fcdb1ed4f3a3e750aef2dc68079",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
want: []*common.Vulnerability{
|
|
{
|
|
VulnerabilityId: "CVE-2019-0002",
|
|
PkgName: "bar",
|
|
InstalledVersion: "1.2.3",
|
|
FixedVersion: "1.2.4",
|
|
Title: "DoS",
|
|
Description: "Denial of Service",
|
|
Severity: common.Severity_UNKNOWN,
|
|
Cvss: make(map[string]*common.CVSS),
|
|
References: []string{"http://example.com"},
|
|
Layer: &common.Layer{
|
|
Digest: "sha256:154ad0735c360b212b167f424d33a62305770a1fcfb6363882f5c436cfbd9812",
|
|
DiffId: "sha256:b2a1a2d80bf0c747a4f6b0ca6af5eef23f043fcdb1ed4f3a3e750aef2dc68079",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got := ConvertToRPCVulns(tt.args.vulns)
|
|
assert.Equal(t, tt.want, got, tt.name)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestConvertFromRPCResults(t *testing.T) {
|
|
fixedPublishedDate := time.Date(2009, 11, 10, 23, 0, 0, 0, time.UTC)
|
|
fixedLastModifiedDate := time.Date(2009, 11, 10, 23, 0, 10, 0, time.UTC)
|
|
|
|
type args struct {
|
|
rpcResults []*scanner.Result
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want []report.Result
|
|
}{
|
|
{
|
|
name: "happy path",
|
|
args: args{rpcResults: []*scanner.Result{
|
|
{
|
|
Target: "alpine:3.10",
|
|
Type: vulnerability.Alpine,
|
|
Vulnerabilities: []*common.Vulnerability{
|
|
{
|
|
VulnerabilityId: "CVE-2019-0001",
|
|
PkgName: "musl",
|
|
InstalledVersion: "1.2.3",
|
|
FixedVersion: "1.2.4",
|
|
Title: "DoS",
|
|
Description: "Denial of Service",
|
|
Severity: common.Severity_MEDIUM,
|
|
SeveritySource: vulnerability.NVD,
|
|
CweIds: []string{"CWE-123", "CWE-456"},
|
|
Cvss: map[string]*common.CVSS{
|
|
"redhat": {
|
|
V2Vector: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
V3Vector: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
V2Score: 7.2,
|
|
V3Score: 7.8,
|
|
},
|
|
},
|
|
References: []string{"http://example.com"},
|
|
Layer: &common.Layer{
|
|
Digest: "sha256:154ad0735c360b212b167f424d33a62305770a1fcfb6363882f5c436cfbd9812",
|
|
DiffId: "sha256:b2a1a2d80bf0c747a4f6b0ca6af5eef23f043fcdb1ed4f3a3e750aef2dc68079",
|
|
},
|
|
PrimaryUrl: "https://avd.aquasec.com/nvd/CVE-2019-0001",
|
|
PublishedDate: timestamppb.New(fixedPublishedDate),
|
|
LastModifiedDate: timestamppb.New(fixedLastModifiedDate),
|
|
},
|
|
},
|
|
}},
|
|
},
|
|
want: []report.Result{
|
|
{
|
|
Target: "alpine:3.10",
|
|
Type: vulnerability.Alpine,
|
|
Vulnerabilities: []types.DetectedVulnerability{
|
|
{
|
|
VulnerabilityID: "CVE-2019-0001",
|
|
PkgName: "musl",
|
|
InstalledVersion: "1.2.3",
|
|
FixedVersion: "1.2.4",
|
|
Layer: ftypes.Layer{
|
|
Digest: "sha256:154ad0735c360b212b167f424d33a62305770a1fcfb6363882f5c436cfbd9812",
|
|
DiffID: "sha256:b2a1a2d80bf0c747a4f6b0ca6af5eef23f043fcdb1ed4f3a3e750aef2dc68079",
|
|
},
|
|
SeveritySource: vulnerability.NVD,
|
|
PrimaryURL: "https://avd.aquasec.com/nvd/CVE-2019-0001",
|
|
Vulnerability: dbTypes.Vulnerability{
|
|
Title: "DoS",
|
|
Description: "Denial of Service",
|
|
Severity: common.Severity_MEDIUM.String(),
|
|
CweIDs: []string{"CWE-123", "CWE-456"},
|
|
VendorSeverity: nil,
|
|
CVSS: dbTypes.VendorCVSS{
|
|
"redhat": {
|
|
V2Vector: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
V3Vector: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
V2Score: 7.2,
|
|
V3Score: 7.8,
|
|
},
|
|
},
|
|
References: []string{"http://example.com"},
|
|
PublishedDate: &fixedPublishedDate,
|
|
LastModifiedDate: &fixedLastModifiedDate,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "happy path - with nil dates",
|
|
args: args{rpcResults: []*scanner.Result{
|
|
{
|
|
Target: "alpine:3.10",
|
|
Type: vulnerability.Alpine,
|
|
Vulnerabilities: []*common.Vulnerability{
|
|
{
|
|
VulnerabilityId: "CVE-2019-0001",
|
|
PkgName: "musl",
|
|
InstalledVersion: "1.2.3",
|
|
FixedVersion: "1.2.4",
|
|
Title: "DoS",
|
|
Description: "Denial of Service",
|
|
Severity: common.Severity_MEDIUM,
|
|
SeveritySource: vulnerability.NVD,
|
|
CweIds: []string{"CWE-123", "CWE-456"},
|
|
Cvss: map[string]*common.CVSS{
|
|
"redhat": {
|
|
V2Vector: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
V3Vector: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
V2Score: 7.2,
|
|
V3Score: 7.8,
|
|
},
|
|
},
|
|
References: []string{"http://example.com"},
|
|
Layer: &common.Layer{
|
|
Digest: "sha256:154ad0735c360b212b167f424d33a62305770a1fcfb6363882f5c436cfbd9812",
|
|
DiffId: "sha256:b2a1a2d80bf0c747a4f6b0ca6af5eef23f043fcdb1ed4f3a3e750aef2dc68079",
|
|
},
|
|
PrimaryUrl: "https://avd.aquasec.com/nvd/CVE-2019-0001",
|
|
PublishedDate: nil,
|
|
LastModifiedDate: nil,
|
|
},
|
|
},
|
|
}},
|
|
},
|
|
want: []report.Result{
|
|
{
|
|
Target: "alpine:3.10",
|
|
Type: vulnerability.Alpine,
|
|
Vulnerabilities: []types.DetectedVulnerability{
|
|
{
|
|
VulnerabilityID: "CVE-2019-0001",
|
|
PkgName: "musl",
|
|
InstalledVersion: "1.2.3",
|
|
FixedVersion: "1.2.4",
|
|
Layer: ftypes.Layer{
|
|
Digest: "sha256:154ad0735c360b212b167f424d33a62305770a1fcfb6363882f5c436cfbd9812",
|
|
DiffID: "sha256:b2a1a2d80bf0c747a4f6b0ca6af5eef23f043fcdb1ed4f3a3e750aef2dc68079",
|
|
},
|
|
SeveritySource: vulnerability.NVD,
|
|
PrimaryURL: "https://avd.aquasec.com/nvd/CVE-2019-0001",
|
|
Vulnerability: dbTypes.Vulnerability{
|
|
Title: "DoS",
|
|
Description: "Denial of Service",
|
|
Severity: common.Severity_MEDIUM.String(),
|
|
CweIDs: []string{"CWE-123", "CWE-456"},
|
|
VendorSeverity: nil,
|
|
CVSS: dbTypes.VendorCVSS{
|
|
"redhat": {
|
|
V2Vector: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
V3Vector: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
V2Score: 7.2,
|
|
V3Score: 7.8,
|
|
},
|
|
},
|
|
References: []string{"http://example.com"},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got := ConvertFromRPCResults(tt.args.rpcResults)
|
|
assert.Equal(t, tt.want, got, tt.name)
|
|
})
|
|
}
|
|
}
|