mirror of
https://github.com/SAP/jenkins-library.git
synced 2024-12-14 11:03:09 +02:00
b59bac7892
* fix redundant type issues * cleanup * extract report function for protecode package * use speaking status constant for API results * remove unconsidered return value * correct switch statement * handle severe vulnerabilities * Apply suggestions from code review Co-authored-by: Stephan Aßmus <stephan.assmus@sap.com> * correct test name * return errors from WriteReport function * expose ReportData struct * set Error Category * refactor constant visibility * change type name * describe type * change type name * fail after report generation * do not fail on report write errors * add error as return value * fix typo * use require statements * assert major vulnerabilities Co-authored-by: Stephan Aßmus <stephan.assmus@sap.com>
128 lines
3.9 KiB
Go
128 lines
3.9 KiB
Go
package protecode
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestIsSevere(t *testing.T) {
|
|
t.Run("with severe cvss v3 vulnerability", func(t *testing.T) {
|
|
// init
|
|
vulnerability := Vulnerability{
|
|
Exact: true,
|
|
Triage: []Triage{},
|
|
Vuln: Vuln{
|
|
Cve: "Cve2",
|
|
Cvss: 8.0,
|
|
Cvss3Score: "7.3",
|
|
},
|
|
}
|
|
// test && assert
|
|
assert.True(t, isSevere(vulnerability))
|
|
})
|
|
t.Run("with severe cvss v2 vulnerability", func(t *testing.T) {
|
|
// init
|
|
vulnerability := Vulnerability{
|
|
Exact: true,
|
|
Triage: []Triage{},
|
|
Vuln: Vuln{
|
|
Cve: "Cve2",
|
|
Cvss: 8.0,
|
|
Cvss3Score: "0.0",
|
|
},
|
|
}
|
|
// test && assert
|
|
assert.True(t, isSevere(vulnerability))
|
|
})
|
|
t.Run("with non-severe cvss v3 vulnerability", func(t *testing.T) {
|
|
// init
|
|
vulnerability := Vulnerability{
|
|
Exact: true,
|
|
Triage: []Triage{},
|
|
Vuln: Vuln{
|
|
Cve: "Cve2",
|
|
Cvss: 4.0,
|
|
Cvss3Score: "4.0",
|
|
},
|
|
}
|
|
// test && assert
|
|
assert.False(t, isSevere(vulnerability))
|
|
})
|
|
t.Run("with non-severe cvss v2 vulnerability", func(t *testing.T) {
|
|
// init
|
|
vulnerability := Vulnerability{
|
|
Exact: true,
|
|
Triage: []Triage{},
|
|
Vuln: Vuln{
|
|
Cve: "Cve2",
|
|
Cvss: 4.0,
|
|
Cvss3Score: "0.0",
|
|
},
|
|
}
|
|
// test && assert
|
|
assert.False(t, isSevere(vulnerability))
|
|
})
|
|
t.Run("with non-severe vulnerability with missing cvss v3 rating", func(t *testing.T) {
|
|
// init
|
|
vulnerability := Vulnerability{
|
|
Exact: true,
|
|
Triage: []Triage{},
|
|
Vuln: Vuln{
|
|
Cve: "Cve2",
|
|
Cvss: 4.0,
|
|
Cvss3Score: "",
|
|
},
|
|
}
|
|
// test && assert
|
|
assert.False(t, isSevere(vulnerability))
|
|
})
|
|
}
|
|
|
|
func TestHasSevereVulnerabilities(t *testing.T) {
|
|
severeV3 := Vulnerability{Exact: true, Triage: []Triage{}, Vuln: Vuln{Cve: "Cve1", Cvss: 4.0, Cvss3Score: "8.0"}}
|
|
severeV2 := Vulnerability{Exact: true, Triage: []Triage{}, Vuln: Vuln{Cve: "Cve2", Cvss: 8.0, Cvss3Score: "0.0"}}
|
|
nonSevere1 := Vulnerability{Exact: true, Triage: []Triage{}, Vuln: Vuln{Cve: "Cve3", Cvss: 4.0, Cvss3Score: "4.0"}}
|
|
nonSevere2 := Vulnerability{Exact: true, Triage: []Triage{}, Vuln: Vuln{Cve: "Cve4", Cvss: 4.0, Cvss3Score: "4.0"}}
|
|
excluded := Vulnerability{Exact: true, Triage: []Triage{}, Vuln: Vuln{Cve: "Cve5", Cvss: 8.0, Cvss3Score: "8.0"}}
|
|
triaged := Vulnerability{Exact: true, Triage: []Triage{{ID: 1}}, Vuln: Vuln{Cve: "Cve6", Cvss: 8.0, Cvss3Score: "8.0"}}
|
|
historic := Vulnerability{Exact: false, Triage: []Triage{}, Vuln: Vuln{Cve: "Cve7", Cvss: 8.0, Cvss3Score: "8.0"}}
|
|
|
|
t.Run("with severe v3 vulnerabilities", func(t *testing.T) {
|
|
// init
|
|
data := Result{Components: []Component{{Vulns: []Vulnerability{nonSevere1, severeV3}}}}
|
|
// test && assert
|
|
assert.True(t, HasSevereVulnerabilities(data, ""))
|
|
})
|
|
t.Run("with severe v2 vulnerabilities", func(t *testing.T) {
|
|
// init
|
|
data := Result{Components: []Component{{Vulns: []Vulnerability{nonSevere1, severeV2}}}}
|
|
// test && assert
|
|
assert.True(t, HasSevereVulnerabilities(data, ""))
|
|
})
|
|
t.Run("without severe vulnerabilities", func(t *testing.T) {
|
|
// init
|
|
data := Result{Components: []Component{{Vulns: []Vulnerability{nonSevere1, nonSevere2}}}}
|
|
// test && assert
|
|
assert.False(t, HasSevereVulnerabilities(data, ""))
|
|
})
|
|
t.Run("with historic vulnerabilities", func(t *testing.T) {
|
|
// init
|
|
data := Result{Components: []Component{{Vulns: []Vulnerability{nonSevere1, triaged}}}}
|
|
// test && assert
|
|
assert.False(t, HasSevereVulnerabilities(data, ""))
|
|
})
|
|
t.Run("with excluded vulnerabilities", func(t *testing.T) {
|
|
// init
|
|
data := Result{Components: []Component{{Vulns: []Vulnerability{nonSevere1, excluded}}}}
|
|
// test && assert
|
|
assert.False(t, HasSevereVulnerabilities(data, "Cve5,Cve14"))
|
|
})
|
|
t.Run("with historic vulnerabilities", func(t *testing.T) {
|
|
// init
|
|
data := Result{Components: []Component{{Vulns: []Vulnerability{nonSevere1, historic}}}}
|
|
// test && assert
|
|
assert.False(t, HasSevereVulnerabilities(data, ""))
|
|
})
|
|
}
|