aboutsummaryrefslogtreecommitdiff
path: root/tests/cve.scm
blob: 3fbb22d3c666675659d284a45129b42da5f9e6e5 (about) (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
;;; GNU Guix --- Functional package management for GNU
;;; Copyright © 2015, 2016 Ludovic Courtès <ludo@gnu.org>
;;;
;;; This file is part of GNU Guix.
;;;
;;; GNU Guix is free software; you can redistribute it and/or modify it
;;; under the terms of the GNU General Public License as published by
;;; the Free Software Foundation; either version 3 of the License, or (at
;;; your option) any later version.
;;;
;;; GNU Guix is distributed in the hope that it will be useful, but
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
;;; GNU General Public License for more details.
;;;
;;; You should have received a copy of the GNU General Public License
;;; along with GNU Guix.  If not, see <http://www.gnu.org/licenses/>.

(define-module (test-cve)
  #:use-module (guix cve)
  #:use-module (srfi srfi-1)
  #:use-module (srfi srfi-64))

(define %sample
  (search-path %load-path "tests/cve-sample.xml"))

(define (vulnerability id packages)
  (make-struct (@@ (guix cve) <vulnerability>) 0 id packages))

(define %expected-vulnerabilities
  ;; What we should get when reading %SAMPLE.
  (list
   ;; CVE-2003-0001 has no "/a" in its product list so it is omitted.
   ;; CVE-2004-0230 lists "tcp" as an application, but lacks a version number.
   (vulnerability "CVE-2008-2335" '(("phpvid" "1.2" "1.1")))
   (vulnerability "CVE-2008-3522" '(("enterprise_virtualization" "3.5")
                                    ("jasper" "1.900.1")))
   (vulnerability "CVE-2009-3301" '(("openoffice.org" "2.3.0" "2.2.1" "2.1.0")))
   ;; CVE-2015-8330 has no software list.
   ))


(test-begin "cve")

(test-equal "xml->vulnerabilities"
  %expected-vulnerabilities
  (call-with-input-file %sample xml->vulnerabilities))

(test-equal "vulnerabilities->lookup-proc"
  (list (list (first %expected-vulnerabilities))
        '()
        '()
        (list (second %expected-vulnerabilities))
        (list (third %expected-vulnerabilities)))
  (let* ((vulns  (call-with-input-file %sample xml->vulnerabilities))
         (lookup (vulnerabilities->lookup-proc vulns)))
    (list (lookup "phpvid")
          (lookup "jasper" "2.0")
          (lookup "foobar")
          (lookup "jasper" "1.900.1")
          (lookup "openoffice.org" "2.3.0"))))

(test-end "cve")
inputs]: Adjust accordingly. 2022-07-06gnu: boost, boost-static: Consolidate libboost_python phases.Marius Bakke * gnu/packages/boost.scm (boost)[arguments]: Determine library extension based on #:make-flags in 'provide-libboost_python phase. (boost-static)[arguments]: Remove #:phases. 2022-07-06gnu: boost-mpi: Remove input labels.Marius Bakke * gnu/packages/boost.scm (boost-mpi)[native-inputs]: Use MODIFY-INPUTS and remove labels. [arguments]: Use G-expression. 2022-06-30gnu: Boost: Use G-expressions.Marius Bakke * gnu/packages/boost.scm (boost, boost-static, boost-for-mysql)[arguments]: Rewrite as gexp. Remove label usage. 2022-06-08Merge branch 'master' into core-updatesLudovic Courtès 2022-05-31gnu: Remove boost-with-python2.Maxim Cournoyer * gnu/packages/boost.scm (boost-with-python2): Delete variable. 2022-05-08gnu: boost: Update to 1.79.0.Greg Hogan * gnu/packages/boost.scm (boost): Update to 1.79.0. [source](patches): Add new and remove old upstream patches. Signed-off-by: Ludovic Courtès <ludo@gnu.org> 2022-03-28gnu: boost: Update to 1.78.0.Greg Hogan * gnu/packages/boost.scm (boost): Update to 1.78.0. [source](patches): Add upstream patch. Signed-off-by: Ludovic Courtès <ludo@gnu.org>