#![warn(rust_2018_idioms, unused_qualifications)]
use rustsec::advisory::Category;
const ADVISORY_V2_PATH: &str = "./tests/support/example_advisory_v2.toml";
const ADVISORY_V3_PATH: &str = "./tests/support/example_advisory_v3.md";
fn load_advisory_v2() -> rustsec::Advisory {
rustsec::Advisory::load_file(ADVISORY_V2_PATH).unwrap()
}
#[test]
fn load_advisory_v3() {
let advisory = rustsec::Advisory::parse_v3(std::path::Path::new(ADVISORY_V3_PATH)).unwrap();
assert_eq!(advisory.metadata.id.as_str(), "RUSTSEC-2001-2101");
assert_eq!(advisory.metadata.package.as_str(), "base");
assert_eq!(advisory.metadata.title, "All your base are belong to us");
assert_eq!(
advisory.metadata.description,
"You have no chance to survive. Make your time."
);
}
#[test]
fn parse_metadata() {
let advisory = load_advisory_v2();
assert_eq!(advisory.metadata.id.as_str(), "RUSTSEC-2001-2101");
assert_eq!(advisory.metadata.package.as_str(), "base");
assert_eq!(advisory.metadata.title, "All your base are belong to us");
assert_eq!(
advisory.metadata.description,
"You have no chance to survive. Make your time."
);
assert_eq!(advisory.metadata.date.as_str(), "2001-02-03");
assert_eq!(
advisory.metadata.url.unwrap(),
"https://www.youtube.com/watch?v=jQE66WA2s-A"
);
for (i, category) in [Category::CodeExecution, Category::PrivilegeEscalation]
.iter()
.enumerate()
{
assert_eq!(*category, advisory.metadata.categories[i]);
}
for (i, kw) in ["how", "are", "you", "gentlemen"].iter().enumerate() {
assert_eq!(*kw, advisory.metadata.keywords[i].as_str());
}
}
#[test]
fn parse_affected() {
let affected = load_advisory_v2().affected.unwrap();
assert_eq!(affected.arch[0], platforms::target::Arch::X86);
assert_eq!(affected.os[0], platforms::target::OS::Windows);
let example_function = "base::belongs::All".parse().unwrap();
let req = &affected.functions.get(&example_function).unwrap()[0];
assert!(req.matches(&"1.2.2".parse().unwrap()));
assert!(!req.matches(&"1.2.3".parse().unwrap()));
}
#[test]
fn parse_aliases() {
let alias = &load_advisory_v2().metadata.aliases[0];
assert!(alias.is_cve());
assert_eq!(alias.year().unwrap(), 2001);
}
#[test]
fn parse_cvss_vector_string() {
let advisory = load_advisory_v2();
assert_eq!(
advisory.severity().unwrap(),
rustsec::advisory::Severity::Critical
);
let cvss = advisory.metadata.cvss.unwrap();
assert_eq!(cvss.av.unwrap(), cvss::v3::base::av::AttackVector::Network);
assert_eq!(cvss.ac.unwrap(), cvss::v3::base::ac::AttackComplexity::Low);
assert_eq!(
cvss.pr.unwrap(),
cvss::v3::base::pr::PrivilegesRequired::None
);
assert_eq!(cvss.ui.unwrap(), cvss::v3::base::ui::UserInteraction::None);
assert_eq!(cvss.s.unwrap(), cvss::v3::base::s::Scope::Changed);
assert_eq!(cvss.c.unwrap(), cvss::v3::base::c::Confidentiality::High);
assert_eq!(cvss.i.unwrap(), cvss::v3::base::i::Integrity::High);
assert_eq!(cvss.a.unwrap(), cvss::v3::base::a::Availability::High);
assert_eq!(cvss.score().value(), 10.0);
}
#[test]
fn parse_patched_version_reqs_v2() {
let req = &load_advisory_v2().versions.patched[0];
assert!(!req.matches(&"1.2.2".parse().unwrap()));
assert!(req.matches(&"1.2.3".parse().unwrap()));
assert!(req.matches(&"1.2.4".parse().unwrap()));
}