-
-
Notifications
You must be signed in to change notification settings - Fork 302
Expand file tree
/
Copy pathtest_elixir_security_v2_importer.py
More file actions
108 lines (87 loc) · 3.36 KB
/
test_elixir_security_v2_importer.py
File metadata and controls
108 lines (87 loc) · 3.36 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
#
# Copyright (c) nexB Inc. and others. All rights reserved.
# VulnerableCode is a trademark of nexB Inc.
# SPDX-License-Identifier: Apache-2.0
# See http://www.apache.org/licenses/LICENSE-2.0 for the license text.
# See https://github.com/aboutcode-org/vulnerablecode for support or download.
# See https://aboutcode.org for more information about nexB OSS projects.
#
import shutil
from pathlib import Path
from unittest.mock import MagicMock
from unittest.mock import patch
import pytest
from vulnerabilities.importer import AdvisoryData
from vulnerabilities.pipelines.v2_importers.elixir_security_importer import (
ElixirSecurityImporterPipeline,
)
@pytest.fixture
def mock_vcs_response(tmp_path):
repo_dir = tmp_path / "repo"
repo_dir.mkdir()
packages_dir = repo_dir / "packages" / "some_package"
packages_dir.mkdir(parents=True)
advisory_file = packages_dir / "CVE-2022-9999.yml"
advisory_file.write_text(
"""
cve: "2022-9999"
package: "plug"
description: "Cross-site scripting vulnerability in plug < 1.11.1"
patched_versions:
- ">= 1.11.1"
unaffected_versions:
- "< 1.0.0"
disclosure_date: "2022-12-01"
link: "https://github.com/plug/plug/security/advisories/GHSA-xxxx-yyyy"
"""
)
mock = MagicMock()
mock.dest_dir = str(repo_dir)
mock.delete = MagicMock()
return mock
@pytest.fixture
def mock_fetch_via_vcs(mock_vcs_response):
with patch(
"vulnerabilities.pipelines.v2_importers.elixir_security_importer.fetch_via_vcs"
) as mock:
mock.return_value = mock_vcs_response
yield mock
def test_advisories_count(mock_fetch_via_vcs, mock_vcs_response):
importer = ElixirSecurityImporterPipeline()
importer.clone()
count = importer.advisories_count()
assert count == 1
def test_collect_advisories(mock_fetch_via_vcs, mock_vcs_response):
importer = ElixirSecurityImporterPipeline()
importer.clone()
advisories = list(importer.collect_advisories())
assert len(advisories) == 1
advisory: AdvisoryData = advisories[0]
assert advisory.advisory_id == "some_package/CVE-2022-9999"
assert advisory.summary.startswith("Cross-site scripting vulnerability")
assert advisory.affected_packages[0].package.name == "plug"
assert advisory.affected_packages[0].package.type == "hex"
assert (
advisory.references_v2[0].url
== "https://github.com/plug/plug/security/advisories/GHSA-xxxx-yyyy"
)
assert advisory.date_published.isoformat().startswith("2022-12-01")
def test_collect_advisories_skips_invalid_cve(mock_fetch_via_vcs, tmp_path):
repo_dir = tmp_path / "repo"
packages_dir = repo_dir / "packages"
if packages_dir.exists():
shutil.rmtree(packages_dir)
packages_dir.mkdir(parents=True, exist_ok=True)
advisory_file = packages_dir / "bad_advisory.yml"
advisory_file.write_text("cve: BAD-ID\npackage: x\n")
mock_response = MagicMock()
mock_response.dest_dir = str(repo_dir)
mock_response.delete = MagicMock()
with patch(
"vulnerabilities.pipelines.v2_importers.elixir_security_importer.fetch_via_vcs"
) as mock:
mock.return_value = mock_response
importer = ElixirSecurityImporterPipeline()
importer.clone()
advisories = list(importer.collect_advisories())
assert len(advisories) == 0