blob: c79e30dd7fbbf781ac49682540d63fa7e7ee78c3 [file] [log] [blame]
// Copyright 2022 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package report
import (
"path/filepath"
"reflect"
"testing"
"time"
"github.com/google/go-cmp/cmp"
"golang.org/x/vulndb/internal/osv"
)
func TestToOSV(t *testing.T) {
r := &Report{
ID: "GO-1991-0001",
Modules: []*Module{
{
Module: "example.com/vulnerable/v2",
Versions: []VersionRange{
{Fixed: "2.1.1"},
{Introduced: "2.3.4", Fixed: "2.3.5"},
{Introduced: "2.5.0"},
},
Packages: []*Package{
{
Package: "example.com/vulnerable/v2",
GOOS: []string{"windows"},
GOARCH: []string{"arm64"},
Symbols: []string{"A", "B.b"},
DerivedSymbols: []string{"D"},
},
},
}, {
Module: "vanity.host/vulnerable",
Versions: []VersionRange{
{Fixed: "2.1.1"},
{Introduced: "2.3.4", Fixed: "2.3.5"},
{Introduced: "2.5.0"},
},
Packages: []*Package{
{
Package: "vanity.host/vulnerable/package",
GOOS: []string{"windows"},
GOARCH: []string{"arm64"},
Symbols: []string{"A.b", "b"},
},
},
}, {
Module: "example.com/also-vulnerable",
Versions: []VersionRange{
{Fixed: "2.1.1"},
},
Packages: []*Package{
{
Package: "example.com/also-vulnerable/package",
GOOS: []string{"windows"},
GOARCH: []string{"arm64"},
Symbols: []string{"z"},
},
},
},
},
Description: "It's a real bad one, \nI'll tell you that.\n\n More info.\n",
CVEs: []string{"CVE-0000-0000"},
GHSAs: []string{"GHSA-abcd-efgh"},
Related: []string{"CVE-0000-0002"},
Credits: []string{"gopherbot"},
References: []*Reference{
{Type: osv.ReferenceTypeAdvisory, URL: "advisory"},
{Type: osv.ReferenceTypeReport, URL: "issue"},
{Type: osv.ReferenceTypeFix, URL: "fix"},
{Type: osv.ReferenceTypeWeb, URL: "web"},
},
}
wantEntry := osv.Entry{
SchemaVersion: SchemaVersion,
ID: "GO-1991-0001",
Details: "It's a real bad one, I'll tell you that.\n\nMore info.",
References: []osv.Reference{
{Type: "ADVISORY", URL: "advisory"},
{Type: "REPORT", URL: "issue"},
{Type: "FIX", URL: "fix"},
{Type: "WEB", URL: "web"},
},
Aliases: []string{"CVE-0000-0000", "GHSA-abcd-efgh"},
Related: []string{"CVE-0000-0002"},
Affected: []osv.Affected{
{
Module: osv.Module{
Path: "example.com/vulnerable/v2",
Ecosystem: "Go",
},
Ranges: []osv.Range{
{
Type: osv.RangeTypeSemver,
Events: []osv.RangeEvent{
{
Introduced: "0",
},
{
Fixed: "2.1.1",
},
{
Introduced: "2.3.4",
},
{
Fixed: "2.3.5",
},
{
Introduced: "2.5.0",
},
},
},
},
EcosystemSpecific: &osv.EcosystemSpecific{
Packages: []osv.Package{
{
Path: "example.com/vulnerable/v2",
GOOS: []string{"windows"},
GOARCH: []string{"arm64"},
Symbols: []string{"A", "B.b", "D"},
},
},
},
},
{
Module: osv.Module{
Path: "vanity.host/vulnerable",
Ecosystem: "Go",
},
Ranges: []osv.Range{
{
Type: osv.RangeTypeSemver,
Events: []osv.RangeEvent{
{
Introduced: "0",
},
{
Fixed: "2.1.1",
},
{
Introduced: "2.3.4",
},
{
Fixed: "2.3.5",
},
{
Introduced: "2.5.0",
},
},
},
},
EcosystemSpecific: &osv.EcosystemSpecific{
Packages: []osv.Package{
{
Path: "vanity.host/vulnerable/package",
GOOS: []string{"windows"},
GOARCH: []string{"arm64"},
Symbols: []string{"A.b", "b"},
},
},
},
},
{
Module: osv.Module{
Path: "example.com/also-vulnerable",
Ecosystem: "Go",
},
Ranges: []osv.Range{
{
Type: osv.RangeTypeSemver,
Events: []osv.RangeEvent{
{
Introduced: "0",
},
{
Fixed: "2.1.1",
},
},
},
},
EcosystemSpecific: &osv.EcosystemSpecific{
Packages: []osv.Package{
{
Path: "example.com/also-vulnerable/package",
GOOS: []string{"windows"},
GOARCH: []string{"arm64"},
Symbols: []string{"z"},
},
},
},
},
},
Credits: []osv.Credit{
{
Name: "gopherbot",
},
},
DatabaseSpecific: &osv.DatabaseSpecific{URL: "https://pkg.go.dev/vuln/GO-1991-0001"},
}
gotEntry := r.ToOSV(time.Time{})
if diff := cmp.Diff(wantEntry, gotEntry, cmp.Comparer(func(a, b time.Time) bool { return a.Equal(b) })); diff != "" {
t.Errorf("ToOSV() mismatch (-want +got):\n%s", diff)
}
}
func TestOSVFilename(t *testing.T) {
want := filepath.FromSlash("data/osv/GO-1999-0001.json")
r := &Report{ID: "GO-1999-0001"}
if got := r.OSVFilename(); got != want {
t.Errorf("got %s, want %s", got, want)
}
}
func TestAffectedRanges(t *testing.T) {
in := []VersionRange{
{
Introduced: "1.16.0",
Fixed: "1.17.0",
},
}
expected := []osv.Range{
{
Type: osv.RangeTypeSemver,
Events: []osv.RangeEvent{
{
Introduced: "1.16.0",
},
{
Fixed: "1.17.0",
},
},
},
}
out := AffectedRanges(in)
if !reflect.DeepEqual(out, expected) {
t.Fatalf("unexpected output: got %#v, want %#v", out, expected)
}
}
func TestToParagraphs(t *testing.T) {
for _, tc := range []struct {
name string
in string
want string
}{{
name: "empty",
in: "",
want: "",
},
{
name: "extra spaces",
in: `
The first paragraph
is split into multiple lines.
The second paragraph
contains tabs and multiple lines and extra spaces.
`,
want: `The first paragraph is split into multiple lines.
The second paragraph contains tabs and multiple lines and extra spaces.`,
},
{
name: "markdown elements preserved",
in: `Hello
* A point
* Point 2
- A different list
- Another
1. Numbered with tab
2. More numbered
10. Multi-digit numbered
1) Different numbering style with leading space
+ Plus sign
+ Another one
A separate paragraph containing inline list 1) and elements that might look like Markdown:
1,
2,
3
--flag
++i`,
want: `Hello
* A point
* Point 2
- A different list
- Another
1. Numbered with tab
2. More numbered
10. Multi-digit numbered
1) Different numbering style with leading space
+ Plus sign
+ Another one
A separate paragraph containing inline list 1) and elements that might look like Markdown: 1, 2, 3 --flag ++i`,
},
} {
t.Run(tc.name, func(t *testing.T) {
got := toParagraphs(tc.in)
if diff := cmp.Diff(tc.want, got); diff != "" {
t.Errorf("toParagraphs() mismatch (-want, +got):\n%s", diff)
}
})
}
}