mirror of
https://github.com/securego/gosec.git
synced 2025-07-15 01:04:43 +02:00
Report for Golang errors (#284)
* Report for Golang errors Right now if you use Gosec to scan invalid go file and if you report the result in a text, JSON, CSV or another file format you will always receive 0 issues. The reason for that is that Gosec can't parse the AST of invalid go files and thus will not report anything. The real problem here is that the user will never know about the issue if he generates the output in a file. Signed-off-by: Martin Vrachev <mvrachev@vmware.com>
This commit is contained in:
committed by
Grant Murphy
parent
9cdfec40ca
commit
62b5195dd9
@ -68,7 +68,7 @@ var _ = Describe("Analyzer", func() {
|
||||
pkg.Build()
|
||||
err := analyzer.Process(buildTags, pkg.Path)
|
||||
Expect(err).ShouldNot(HaveOccurred())
|
||||
_, metrics := analyzer.Report()
|
||||
_, metrics, _ := analyzer.Report()
|
||||
Expect(metrics.NumFiles).To(Equal(2))
|
||||
})
|
||||
|
||||
@ -90,7 +90,7 @@ var _ = Describe("Analyzer", func() {
|
||||
pkg2.Build()
|
||||
err := analyzer.Process(buildTags, pkg1.Path, pkg2.Path)
|
||||
Expect(err).ShouldNot(HaveOccurred())
|
||||
_, metrics := analyzer.Report()
|
||||
_, metrics, _ := analyzer.Report()
|
||||
Expect(metrics.NumFiles).To(Equal(2))
|
||||
})
|
||||
|
||||
@ -106,11 +106,36 @@ var _ = Describe("Analyzer", func() {
|
||||
controlPackage.AddFile("md5.go", source)
|
||||
controlPackage.Build()
|
||||
analyzer.Process(buildTags, controlPackage.Path)
|
||||
controlIssues, _ := analyzer.Report()
|
||||
controlIssues, _, _ := analyzer.Report()
|
||||
Expect(controlIssues).Should(HaveLen(sample.Errors))
|
||||
|
||||
})
|
||||
|
||||
It("should report for Golang errors and invalid files", func() {
|
||||
analyzer.LoadRules(rules.Generate().Builders())
|
||||
pkg := testutils.NewTestPackage()
|
||||
defer pkg.Close()
|
||||
pkg.AddFile("foo.go", `
|
||||
package main
|
||||
func main()
|
||||
}`)
|
||||
pkg.Build()
|
||||
err := analyzer.Process(buildTags, pkg.Path)
|
||||
Expect(err).ShouldNot(HaveOccurred())
|
||||
_, _, golangErrors := analyzer.Report()
|
||||
keys := make([]string, len(golangErrors))
|
||||
i := 0
|
||||
for key := range golangErrors {
|
||||
keys[i] = key
|
||||
i++
|
||||
}
|
||||
fileErr := golangErrors[keys[0]]
|
||||
Expect(len(fileErr)).To(Equal(1))
|
||||
Expect(fileErr[0].Line).To(Equal(4))
|
||||
Expect(fileErr[0].Column).To(Equal(5))
|
||||
Expect(fileErr[0].Err).Should(MatchRegexp(`expected declaration, found '}'`))
|
||||
})
|
||||
|
||||
It("should not report errors when a nosec comment is present", func() {
|
||||
// Rule for MD5 weak crypto usage
|
||||
sample := testutils.SampleCodeG401[0]
|
||||
@ -124,7 +149,7 @@ var _ = Describe("Analyzer", func() {
|
||||
nosecPackage.Build()
|
||||
|
||||
analyzer.Process(buildTags, nosecPackage.Path)
|
||||
nosecIssues, _ := analyzer.Report()
|
||||
nosecIssues, _, _ := analyzer.Report()
|
||||
Expect(nosecIssues).Should(BeEmpty())
|
||||
})
|
||||
|
||||
@ -141,7 +166,7 @@ var _ = Describe("Analyzer", func() {
|
||||
nosecPackage.Build()
|
||||
|
||||
analyzer.Process(buildTags, nosecPackage.Path)
|
||||
nosecIssues, _ := analyzer.Report()
|
||||
nosecIssues, _, _ := analyzer.Report()
|
||||
Expect(nosecIssues).Should(BeEmpty())
|
||||
})
|
||||
|
||||
@ -158,7 +183,7 @@ var _ = Describe("Analyzer", func() {
|
||||
nosecPackage.Build()
|
||||
|
||||
analyzer.Process(buildTags, nosecPackage.Path)
|
||||
nosecIssues, _ := analyzer.Report()
|
||||
nosecIssues, _, _ := analyzer.Report()
|
||||
Expect(nosecIssues).Should(HaveLen(sample.Errors))
|
||||
})
|
||||
|
||||
@ -175,7 +200,7 @@ var _ = Describe("Analyzer", func() {
|
||||
nosecPackage.Build()
|
||||
|
||||
analyzer.Process(buildTags, nosecPackage.Path)
|
||||
nosecIssues, _ := analyzer.Report()
|
||||
nosecIssues, _, _ := analyzer.Report()
|
||||
Expect(nosecIssues).Should(BeEmpty())
|
||||
})
|
||||
|
||||
@ -212,7 +237,7 @@ var _ = Describe("Analyzer", func() {
|
||||
nosecPackage.Build()
|
||||
|
||||
customAnalyzer.Process(buildTags, nosecPackage.Path)
|
||||
nosecIssues, _ := customAnalyzer.Report()
|
||||
nosecIssues, _, _ := customAnalyzer.Report()
|
||||
Expect(nosecIssues).Should(HaveLen(sample.Errors))
|
||||
|
||||
})
|
||||
|
Reference in New Issue
Block a user