Пример #1
0
def test_csv():
    sr = filter_scan_results_by_cve_ids(
        ["CVE-2020-1000", "CVE-2020-1001", "CVE-2020-1005"])

    opt = MockOpt()
    opt.priority = "all"
    opt.unresolved = True

    formatter = CSVOutputFormatter(opt, null_logger())
    (results_msg, return_code) = formatter.format_output(sr, MockSysInfo())

    expected_csv_results = "CVE ID,PRIORITY,PACKAGE,FIXED_VERSION,REPOSITORY"
    expected_csv_results += "\nCVE-2020-1000,low,pkg3,,"
    expected_csv_results += (
        "\nCVE-2020-1001,high,pkg1,1:1.2.3-4+deb9u2ubuntu0.2,Ubuntu Archive")
    expected_csv_results += (
        "\nCVE-2020-1001,high,pkg2,1:1.2.3-4+deb9u2ubuntu0.2,Ubuntu Archive")
    expected_csv_results += ("\nCVE-2020-1005,low,pkg1,1:1.2.3-4+deb9u3,%s" %
                             const.UA_APPS)
    expected_csv_results += ("\nCVE-2020-1005,low,pkg2,1:1.2.3-4+deb9u3,%s" %
                             const.UA_APPS)
    expected_csv_results += ("\nCVE-2020-1005,low,pkg3,10.2.3-2ubuntu0.1,%s" %
                             const.UA_INFRA)

    assert results_msg == expected_csv_results
Пример #2
0
def test_medium_color(monkeypatch, table_only_cli_output_formatter):
    run_priority_color_test(
        monkeypatch,
        table_only_cli_output_formatter,
        MockSysInfo(),
        "CVE-2020-1003",
        const.MEDIUM,
    )
Пример #3
0
def test_negligible_color(monkeypatch, table_only_cli_output_formatter):
    run_priority_color_test(
        monkeypatch,
        table_only_cli_output_formatter,
        MockSysInfo(),
        "CVE-2020-1008",
        const.NEGLIGIBLE,
    )
Пример #4
0
def test_high_color(monkeypatch, table_only_cli_output_formatter):
    run_priority_color_test(
        monkeypatch,
        table_only_cli_output_formatter,
        MockSysInfo(),
        "CVE-2020-1001",
        const.HIGH,
    )
Пример #5
0
def test_low_color(monkeypatch, table_only_cli_output_formatter):
    run_priority_color_test(
        monkeypatch,
        table_only_cli_output_formatter,
        MockSysInfo(),
        "CVE-2020-1005",
        const.LOW,
    )
Пример #6
0
def test_no_tty_no_color(monkeypatch, table_only_cli_output_formatter):
    monkeypatch.setattr(sys.stdout, "isatty", lambda: False)
    sr = filter_scan_results_by_cve_ids(["CVE-2020-1001"])

    (results_msg, return_code) = table_only_cli_output_formatter.format_output(
        sr, MockSysInfo())

    assert "\u001b" not in results_msg
Пример #7
0
def test_untriaged_color(monkeypatch, table_only_cli_output_formatter):
    run_priority_color_test(
        monkeypatch,
        table_only_cli_output_formatter,
        MockSysInfo(),
        "CVE-2020-1006",
        const.UNTRIAGED,
    )
def test_no_patch_available_infra_experimental(cve_output_formatter):
    sr = filter_scan_results_by_cve_ids(["CVE-2020-1001", "CVE-2020-1003"])
    sr.append(ScanResult("CVE-2020-1000", "low", "pkg3", "1.2.3-4", const.UA_INFRA),)
    cve_output_formatter.opt.experimental_mode = False
    msg, rc = cve_output_formatter.format_output(sr, MockSysInfo())

    assert msg == "Vulnerable to CVE-2020-1000. There is no fix available, yet."
    assert rc == 3
Пример #9
0
def test_invalid_repository_disabled_color(monkeypatch,
                                           table_only_cli_output_formatter):
    table_only_cli_output_formatter.opt.unresolved = True

    sysinfo = MockSysInfo()
    sysinfo.esm_infra_enabled = True

    run_repository_color_test(monkeypatch, table_only_cli_output_formatter,
                              sysinfo, "CVE-2020-1011", False)
Пример #10
0
def test_ubuntu_repository_enabled_color(monkeypatch,
                                         table_only_cli_output_formatter):
    run_repository_color_test(
        monkeypatch,
        table_only_cli_output_formatter,
        MockSysInfo(),
        "CVE-2020-1001",
        True,
    )
Пример #11
0
def test_summary_priority_all(monkeypatch, summary_only_cli_output_formatter):
    monkeypatch.setattr(sys.stdout, "isatty", lambda: False)
    cof = summary_only_cli_output_formatter

    sr = filter_scan_results_by_cve_ids(["CVE-2020-1001"])

    (results_msg, return_code) = cof.format_output(sr, MockSysInfo())

    assert re.search(r"CVE Priority\s+All", results_msg)
def test_vulnerable_patch_available_infra(cve_output_formatter):
    sr = filter_scan_results_by_cve_ids(["CVE-2020-1001", "CVE-2020-1003"])
    sr.append(ScanResult("CVE-2020-1000", "low", "pkg3", "1.2.3-4", const.UA_INFRA),)
    msg, rc = cve_output_formatter.format_output(sr, MockSysInfo())

    assert (
        msg
        == f"Vulnerable to CVE-2020-1000, but fixes are available from {const.UA_INFRA}."
    )
Пример #13
0
def test_csv_show_links_header():
    opt = MockOpt()
    opt.priority = "all"
    opt.unresolved = True
    opt.show_links = True

    formatter = CSVOutputFormatter(opt, null_logger())
    (results_msg, return_code) = formatter.format_output([], MockSysInfo())

    assert "URL" in results_msg
def test_returns_json():
    opt = MockOpt()
    opt.syslog = True

    formatter = SyslogOutputFormatter(opt, null_logger(),
                                      MockJSONOutputFormatter())
    (results_msg, return_code) = formatter.format_output([], MockSysInfo())

    assert results_msg == expected_output
    assert return_code == 0
def test_return_code():
    opt = MockOpt()

    json_output_formatter = MockJSONOutputFormatter()
    json_output_formatter.return_code = 1
    formatter = SyslogOutputFormatter(opt, null_logger(),
                                      json_output_formatter)
    (results_msg, return_code) = formatter.format_output([], MockSysInfo())

    assert return_code == 1
def test_returns_json_light():
    opt = MockOpt()
    opt.syslog_light = True

    formatter = MockSyslogOutputFormatter(opt, null_logger(),
                                          MockJSONOutputFormatter())
    (results_msg, return_code) = formatter.format_output([], MockSysInfo())

    assert results_msg == "5 vulnerabilites can be fixed by running `sudo apt upgrade`"
    assert return_code == 0
Пример #17
0
def test_ua_infra_unknown_text(monkeypatch, table_only_cli_output_formatter):
    sysinfo = MockSysInfo()
    sysinfo.esm_infra_enabled = None

    sr = filter_scan_results_by_cve_ids("CVE-2020-1010")

    (results_msg,
     return_code) = table_only_cli_output_formatter.format_output(sr, sysinfo)

    assert "(disabled)" not in results_msg
Пример #18
0
def test_critical_color(monkeypatch, table_only_cli_output_formatter):
    sysinfo = MockSysInfo()
    sysinfo.esm_apps_enabled = True
    sysinfo.esm_infra_enabled = True
    run_priority_color_test(
        monkeypatch,
        table_only_cli_output_formatter,
        sysinfo,
        "CVE-2020-1007",
        const.CRITICAL,
    )
def test_always_show_links():
    sr = filter_scan_results_by_cve_ids(["CVE-2020-1004", "CVE-2020-1005"])
    opt = MockOpt()
    opt.unresolved = True
    opt.show_links = False
    formatter = JSONOutputFormatter(opt, null_logger())

    (results_msg, return_code) = formatter.format_output(sr, MockSysInfo())

    assert const.UCT_URL % "CVE-2020-1004" in results_msg
    assert const.UCT_URL % "CVE-2020-1005" in results_msg
Пример #20
0
def test_ua_apps_disabled_text(monkeypatch, table_only_cli_output_formatter):
    sysinfo = MockSysInfo()
    sysinfo.esm_apps_enabled = False
    sysinfo.esm_infra_enabled = True

    sr = filter_scan_results_by_cve_ids("CVE-2020-1009")

    (results_msg,
     return_code) = table_only_cli_output_formatter.format_output(sr, sysinfo)

    assert "(disabled)" in results_msg
Пример #21
0
def test_summary_fixes_applied_color(monkeypatch,
                                     summary_only_cli_output_formatter):
    sysinfo = MockSysInfo()
    sysinfo.esm_apps_enabled = True
    sysinfo.esm_infra_enabled = True

    run_fixes_not_applied_color_code_test(
        monkeypatch,
        summary_only_cli_output_formatter,
        sysinfo,
        const.REPOSITORY_ENABLED_COLOR_CODE,
        0,
    )
Пример #22
0
def test_summary_manifest_esm_unknown_color(monkeypatch,
                                            summary_only_cli_output_formatter):
    sysinfo = MockSysInfo()
    sysinfo.esm_apps_enabled = None
    sysinfo.esm_infra_enabled = None

    run_esm_color_code_test(
        monkeypatch,
        summary_only_cli_output_formatter,
        sysinfo,
        const.REPOSITORY_UNKNOWN_COLOR_CODE,
        "Unknown",
    )
Пример #23
0
def test_summary_esm_disabled_color(monkeypatch,
                                    summary_only_cli_output_formatter):
    sysinfo = MockSysInfo()
    sysinfo.esm_apps_enabled = False
    sysinfo.esm_infra_enabled = False

    run_esm_color_code_test(
        monkeypatch,
        summary_only_cli_output_formatter,
        sysinfo,
        const.REPOSITORY_DISABLED_COLOR_CODE,
        "No",
    )
Пример #24
0
def test_summary_fixes_unknown_color(monkeypatch,
                                     summary_only_cli_output_formatter):
    sysinfo = MockSysInfo()
    sysinfo.esm_apps_enabled = None
    sysinfo.esm_infra_enabled = None

    run_fixes_not_applied_color_code_test(
        monkeypatch,
        summary_only_cli_output_formatter,
        sysinfo,
        const.REPOSITORY_UNKNOWN_COLOR_CODE,
        3,
        unknown=True,
    )
def test_vulnerable_patch_available_repository(cve_output_formatter):
    sr = filter_scan_results_by_cve_ids(["CVE-2020-1001", "CVE-2020-1003"])
    sr.append(
        ScanResult("CVE-2020-1000", "low", "pkg3", "1.2.3-4", const.UBUNTU_ARCHIVE),
    )
    msg, rc = cve_output_formatter.format_output(sr, MockSysInfo())

    expected_msg = (
        "Vulnerable to CVE-2020-1000, but fixes are available from "
        "the Ubuntu Archive."
    )

    assert msg == expected_msg
    assert rc == 4
Пример #26
0
def test_no_results_no_header(monkeypatch):
    header_regex = r"CVE ID\s+PRIORITY\s+PACKAGE\s+FIXED VERSION\s+REPOSITORY"

    monkeypatch.setattr(sys.stdout, "isatty", lambda: False)
    cof = CLIOutputFormatter(MockOpt(), null_logger())
    sysinfo = MockSysInfo()

    cof.opt.experimental_mode = True
    cof.opt.unresolved = False

    sr = filter_scan_results_by_cve_ids(["CVE-2020-1003"])

    (results_msg, return_code) = cof.format_output(sr, sysinfo)

    assert not re.search(header_regex, results_msg)
def run_json_format_test(indent):
    sr = filter_scan_results_by_cve_ids(
        ["CVE-2020-1000", "CVE-2020-1001", "CVE-2020-1005"])

    opt = MockOpt()
    opt.priority = "all"
    opt.unresolved = True

    formatter = JSONOutputFormatter(opt, null_logger(), indent=indent)

    (results_msg, return_code) = formatter.format_output(sr, MockSysInfo())

    expected_output = json.dumps(sample_output, indent=indent, sort_keys=False)

    assert results_msg == expected_output
def test_vulnerable_patch_available_infra_repository_duplicates(cve_output_formatter):
    sr = filter_scan_results_by_cve_ids(["CVE-2020-1001", "CVE-2020-1003"])
    sr = sr + [
        ScanResult("CVE-2020-1000", "low", "pkg3", "1.2.3-4", const.UBUNTU_ARCHIVE),
        ScanResult("CVE-2020-1000", "low", "pkg5", "1.2.3-4", const.UA_INFRA),
        ScanResult("CVE-2020-1000", "low", "pkg6", "1.2.3-4", const.UA_INFRA),
    ]

    msg, rc = cve_output_formatter.format_output(sr, MockSysInfo())
    expected_msg = (
        "Vulnerable to CVE-2020-1000, but fixes are available from "
        f"{const.UA_INFRA} and the Ubuntu Archive."
    )

    assert msg == expected_msg
    assert rc == 4
def test_vulnerable_patch_available_apps_infra(cve_output_formatter):
    sr = filter_scan_results_by_cve_ids(["CVE-2020-1001", "CVE-2020-1003"])
    sr = sr + [
        ScanResult("CVE-2020-1000", "low", "pkg4", "1.2.3-4", const.UA_INFRA),
        ScanResult("CVE-2020-1000", "low", "pkg5", "1.2.3-4", const.UA_APPS),
    ]

    msg, rc = cve_output_formatter.format_output(sr, MockSysInfo())

    expected_msg = (
        "Vulnerable to CVE-2020-1000, but fixes are available from "
        f"{const.UA_APPS} and {const.UA_INFRA}."
    )

    assert msg == expected_msg
    assert rc == 4
Пример #30
0
def test_suggestions_empty_no_experimental_infra_enabled(
        monkeypatch, suggestions_only_cli_output_formatter):
    cof = suggestions_only_cli_output_formatter

    cof.opt.priority = const.LOW
    cof.opt.experimental_mode = False

    sysinfo = MockSysInfo()
    sysinfo.esm_apps_enabled = False
    sysinfo.esm_infra_enabled = True

    sr = filter_scan_results_by_cve_ids(["CVE-2020-1001", "CVE-2020-1010"])

    (results_msg, return_code) = cof.format_output(sr, sysinfo)

    assert (
        "additional security patch(es) are available if ESM for Infrastructure is enabled with\nUbuntu Advantage."
        not in results_msg)